Date post: | 12-Nov-2014 |
Category: |
Technology |
Upload: | dell-data-protection |
View: | 625 times |
Download: | 0 times |
©2011 Quest Software, Inc. All rights reserved.
Best Practices & Time-Saving Techniques for Protecting Exchange
2
©2011 Quest Software, Inc. All rights reserved.
Agenda
• Challenges in protecting Exchange
• Recommended best practices for protecting and recovering Exchange
• Solutions for Exchange available today
• Quest data protection solutions
3
©2011 Quest Software, Inc. All rights reserved.
Challenges
• Exponential data growth
• Email is increasingly seen as mission-critical
• Less tolerance for data loss and prolonged downtime
• Increasing number of requests to discover and recover data from within Exchange
4
©2011 Quest Software, Inc. All rights reserved.
Plan for The Unexpected
• Server Failure – OS failure, hardware failure
• Database Failure– Database corruption or disk
failure
• Single Mailbox Loss– A mailbox is deleted and needs
to be recovered
• Single Mail Item Loss– A user inadvertently hard-
deletes an important mail item
• Site Disaster– Power outage, network outage,
natural disaster
5
©2011 Quest Software, Inc. All rights reserved.
Gather Organizational Requirements
• Measure the value your organization places on its email data
• What are the acceptable levels of data loss?
• What is the acceptable length of time for service and data restoration?
• Where are my Exchange Servers located?
6
©2011 Quest Software, Inc. All rights reserved.
Exchange Protection Approaches
7
©2011 Quest Software, Inc. All rights reserved.
Set Recovery Objectives
• Recovery Time Objective (RTO) – The amount of time elapsed between a loss or disaster and the
restoration of business operations. It is the time required to physically recover the data or application and have it ready for use
• Recovery Point Objective (RPO) – The point in time that recovered data will be recovered to.
– For example, if you recover a file that was backed up yesterday then your recovery point is one day
8
©2011 Quest Software, Inc. All rights reserved.
Create a Service Level Agreement (SLA)
• Obtain agreement on objectives in the form of a SLA
• Include the following categories:– Availability
– Hours of operation
– Performance measures
– Recovery parameters
– Support parameters
– Environmental dependencies and assumptions
9
©2011 Quest Software, Inc. All rights reserved.
Protecting Exchange
Your protection strategy should directly support your
recovery requirements
10
©2011 Quest Software, Inc. All rights reserved.
High Availability
• Database Availability Groups (DAG)– New framework introduced in Exchange 2010
– A group of mailbox servers (up to 16) that replicate to one another, providing database-level protection from outages
– Uses Exchange Continuous Replication (logs shipping) and a subset of Windows failover clustering technologies to provide continuous HA and site resiliency
11
©2011 Quest Software, Inc. All rights reserved.
Backup
• Traditional Backup– Protection for information stores, individual storage groups, or
individual databases
– Enterprise protection for heterogeneous environments (centralized management and monitoring)
– Target disk or tape
• Real-time Backup (Continuous Data Protection)– Watches all changes occurring during a defined period
– An initial sync/seed of the data to be protected is created
– All changes that occur after the initial sync/seed are captured and available for restore
12
©2011 Quest Software, Inc. All rights reserved.
Disaster Recovery
• Host-Based Replication– Cross-platform replication for applications like Microsoft Exchange, as
well as Microsoft SQL, MySQL, and PostgreSQL residing in Windows, Linux, Solaris and Mac OS X environments
– Centralized management and monitoring of replication
• Replication of Backup Copies– Replicates changes to protected datasets from one (or many) backup
servers to another backup server
13
©2011 Quest Software, Inc. All rights reserved.
Recovering Exchange
Clearly document and test recovery strategy to minimize
the chance for mistakes
14
©2011 Quest Software, Inc. All rights reserved.
Elements of a Restore Strategy
Include the following in your restore strategy:
• Build a communications plan– Identify the personnel involved in disaster recovery efforts, their
responsibilities and chain of command
• Set restore priorities– Prioritize what should be restored
• Provision a “dial-tone” system – Allow users to send and receive new email before the historical email
data has been fully restored
• Restore type– Use the recovery storage group to restore the data and merge the
restored data into the “dial-tone” database
15
©2011 Quest Software, Inc. All rights reserved.
PerformanceMonitoring
Development
Data Protection
Migration
Administration
Quest Data Protection Family
PHYSICAL I VIRTUAL I CLOUD
CAPABILITIES AND BENEFITS
• Best-of-breed solutions that span physical, virtual, and application-level data protection
• Heterogeneous platform support
• Reduce the amount of data required for backups by 90% while gaining scalability
• Object and application-level recovery to ensure availability and immediate access
FUNCTIONS PLATFORMS
IdentityManagement
PRODUCTS
16
©2011 Quest Software, Inc. All rights reserved.
Quest: A Leader in Data Protection & Application Management
#1
•Linux Backup: NetVault Backup (IDC Japan)
#1
•Oracle Backup: NetVault Backup (DCIG Buyer’s Guide)
#1
•Purpose-built backup for VMware (in speed, scalability, and number of customers)
Top 3
•Virtual Server Management Software Vendor: Quest Software (IDC US)
Top 10
•Worldwide Storage Management Software Vendor: Quest Software (Gartner)
17
©2011 Quest Software, Inc. All rights reserved.
NetVault BackupCross-platform backup and recovery
• Extensive platform/application support– Unix, Windows, Linux. Mac OS
– VMware ESX/ESXi, Hyper-V, Xen, KVM
– Protection for 12 popular business applications
• Scalable yet simple– 50% faster recovery, 30% faster backup than comparable
products
– 45 minute install and setup
• Broad tape and disk support
• Bare Metal Recovery (BMR) agent
18
©2011 Quest Software, Inc. All rights reserved.
NetVault FastRecoverReal-time backup and instant recovery
• Patented FlashRestore™ - Near instant recovery for Microsoft Exchange, as well as Oracle, SQL Server,
and Windows file-system data
• Efficient replication for remote offices- Bandwidth-friendly replication supports ROBO disaster recovery scenarios
• Integrates with existing backup products• Export and back up NVFR datasets via CIFS
• Eliminates backup windows
• Recover data from any point in time—even down to the second!
NVFR Timeline Indicator
19
©2011 Quest Software, Inc. All rights reserved.
Recovery Manager for ExchangeDiscover, Recover Individual Mail Items, Attachments & Conversations• Find and retrieve message-level data in minutes from
multiple sources• Exact items from a single-pass backup
• Eliminates the need for both a database backup and a brick-level backup
• Perform federated, intelligent searches• Search multiple email data sources simultaneously
• Search keywords in message body, ID, headers, message classes, categories, deleted items, conversation threads and attachment type and content
• Support for Backup Software• Find and retrieve data across Quest's NetVault Backup
and NetVault FastRecover, native Microsoft backups and most major third-party backup software
©2011 Quest Software, Inc. All rights reserved.
http://www.quest.com/data-protection