Recovery Solution™ 6.2 SP2 Reference Guide
Transcription
Recovery Solution™ 6.2 SP2 Reference Guide
ALTIRIS® Recovery Solution™ 6.2 SP2 Reference Guide Notice Altiris® Recovery Solution™ 6.2 SP2 © 1994-2007 Altiris, Inc. All rights reserved. Information in this document: (i) is provided for informational purposes only with respect to products of Altiris or its subsidiaries (“Products”), (ii) represents Altiris' views as of the date of publication of this document, (iii) is subject to change without notice (for the latest documentation, visit our Web site at www.altiris.com/Support), and (iv) should not be construed as any commitment by Altiris. Except as provided in Altiris' license agreement governing its Products, ALTIRIS ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTIES RELATING TO THE USE OF ANY PRODUCTS, INCLUDING WITHOUT LIMITATION, WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY THIRD-PARTY INTELLECTUAL PROPERTY RIGHTS. Altiris assumes no responsibility for any errors or omissions contained in this document, and Altiris specifically disclaims any and all liabilities and/or obligations for any claims, suits or damages arising in connection with the use of, reliance upon, or dissemination of this document, and/or the information contained herein. Altiris may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the Products referenced herein. The furnishing of this document and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any foregoing intellectual property rights. No part of this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the express written consent of Altiris, Inc. Customers are solely responsible for assessing the suitability of the Products for use in particular applications or environments. Products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. *All other names or marks may be claimed as trademarks of their respective companies. Recovery Solution Reference Guide 2 This product includes software developed by the Apache Software Foundation. Such software is subject to the below conditions. The Apache Software License, Version 1.1 Copyright (c) 1999-2004 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment: "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)." Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear. 4. The names "Xerces" and "Apache Software Foundation" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact apache@apache.org. 5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without prior written permission of the Apache Software Foundation. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OFUSE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ==================================================================== This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation and was originally based on software copyright (c) 1999, International Business Machines, Inc., http://www.ibm.com. For more information on the Apache Software Foundation, please see <http://www.apache.org/>. Recovery Solution Reference Guide 3 Contents Chapter 1: Introducing Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Recovery Solution Product Overview . . . . . . . . Recovery Solution Enterprise . . . . . . . . . . Local Recovery . . . . . . . . . . . . . . . . . . . . Local Recovery Pro . . . . . . . . . . . . . . . . . Integration with other Altiris Solutions . . . . . . Recovery Solution Documentation . . . . . . . . . Recovery Solution Terminology . . . . . . . . . . . Recovery Solution Architecture. . . . . . . . . . . . Familiarizing Yourself with the Altiris Console . . Altiris Console Overview . . . . . . . . . . . . . Recovery Solution Configuration Tools Recovery Solution Task Policies . . . . . Recovery Solution Reports . . . . . . . . . Resource Manager Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 14 15 15 15 16 17 19 21 21 22 23 23 24 Part I: Using Recovery Solution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Chapter 2: Installing Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Recovery Solution Server Component Requirements . . . . . . . . . . . . . . . . . . . . . . Setting up Recovery Solution Prerequisite Components . . . . . . . . . . . . . . . . . Configuring the Load Balancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the SQL Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install the Altiris Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Solution Client Component Requirements . . . . . . . . . . . . . . . . . . . . . . Requirements for Running the Recovery Agent in Server-based Mode. . . . . . . Requirements for Running the Recovery Agent in Local Mode (Local Recovery) Important Issues with Using the Recovery Agent and BootWorks Partitions . . . Installing Recovery Solution Server Components . . . . . . . . . . . . . . . . . . . . . . . . Installing Recovery Solution Program Files . . . . . . . . . . . . . . . . . . . . . . . . . Creating a Recovery Solution Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding Recovery Solution Servers to a Recovery Cluster . . . . . . . . . . . . . . . . After Server Installation Is Complete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing Recovery Solution Client Components . . . . . . . . . . . . . . . . . . . . . . . . . Upgrading Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrading Recovery Solution Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Licensing Recovery Solution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstalling Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstalling a Recovery Solution Server . . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstalling a Recovery Solution Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstalling the Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 27 27 28 29 30 31 33 34 34 34 36 40 41 42 42 42 44 44 44 44 45 Chapter 3: Getting Started with Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Creating a Recovery Solution Cluster . . . . . . Adding Recovery Solution Servers to Clusters Installing the Recovery Agent . . . . . . . . . . . Verifying the Recovery Agent Installed . . . . . Configuring a Recovery Solution Cluster . . . . Recovery Solution Reference Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 47 47 49 49 4 Monitoring the Recovery Solution Job Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Running Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Running Recovery Solution Utilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Chapter 4: Recovery Solution Agent Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Recovery Agent Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Agent Installation Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing the Recovery Agent in Server-based Mode. . . . . . . . . . . . . . . . . . . . . Recovery Agent Installation Policies (‘Push’ Installation) . . . . . . . . . . . . . . . Interactive Web-Based Agent Setup Wizard (‘Pull’ Installation) . . . . . . . . . . Unattended Recovery Agent Installation . . . . . . . . . . . . . . . . . . . . . . . . . . Registering the Recovery Agent in Server-based Mode . . . . . . . . . . . . . . . . Creating and Registering a New Account . . . . . . . . . . . . . . . . . . . . . . . Reinstalling the Recovery Agent using an Existing Account . . . . . . . . . . Changing the Server or Installation Type. . . . . . . . . . . . . . . . . . . . . . . Installing the Recovery Agent but the Server is not Available. . . . . . . . . Canceling the Registration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Agent Reinstallation and Repair . . . . . . . . . . . . . . . . . . . . . . . . . Installing the Recovery Agent in Local Mode . . . . . . . . . . . . . . . . . . . . . . . . . . Distribute Local Mode Prerequisite Package . . . . . . . . . . . . . . . . . . . . . . . . Install the Recovery Agent Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Partition to Store Your Files In . . . . . . . . . . . . . . . . . . . . . . . . . . Perform the First Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing the Recovery Agent in Mixed Mode . . . . . . . . . . . . . . . . . . . . . . . . . . Installing Recovery Agent Using an Image. . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrading Recovery Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Recovery Agent Rollout Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Agent Setup Command-Line Switches . . . . . . . . . . . . . . . . . . . . . . . . Uninstalling the Recovery Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Windows Add/Remove Programs . . . . . . . . . . . . . . . . . . . . . . . . Using Recovery Agent Policies to Uninstall the Recovery Agent Remotely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 51 52 53 53 55 56 57 57 58 59 59 59 60 61 62 63 64 65 66 66 67 69 73 73 74 Chapter 5: Configuring Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Configuring Recovery Agent Settings . . . . . . . . . . . . . . . . . . . . Creating Configuration Policies . . . . . . . . . . . . . . . . . . . . . . Using Inherited Default Agent Settings . . . . . . . . . . . . . Configuring Default Agent Settings . . . . . . . . . . . . . . . . . . . Configure Snapshot Settings . . . . . . . . . . . . . . . . . . . . Configure Excludes . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure Rollback Data . . . . . . . . . . . . . . . . . . . . . . . Configure Space Management . . . . . . . . . . . . . . . . . . . Configure Throttling and Connection (server-based only) Configure Remote Access (server-based only) . . . . . . . . Configure Performance (local mode only) . . . . . . . . . . . Configure Storage Management (local mode only) . . . . . Configure User’s Rights and Permissions . . . . . . . . . . . . Configure Miscellaneous Settings . . . . . . . . . . . . . . . . . Recovery Solution Cluster Configuration . . . . . . . . . . . . . . . . . . General Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring Server Job Schedules. . . . . . . . . . . . . . . . . . . . Configuring Event Notifications. . . . . . . . . . . . . . . . . . . . . . Configuring Storage Management. . . . . . . . . . . . . . . . . . . . Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Storage Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Solution Reference Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 . 75 . 76 . 77 . 78 . 81 . 87 . 88 . 90 . 91 . 92 . 92 . 92 . 94 . 96 . 97 . 98 101 101 102 103 5 Managing Recovery Solution Servers . . . . . . . . . . . . . . Managing Cluster Users. . . . . . . . . . . . . . . . . . . . . . . . Configuring Communication Settings . . . . . . . . . . . . . . Recovery Solution Security Role Management . . . . . . . . . . . Security Role Management . . . . . . . . . . . . . . . . . . . . . Configuring Recovery Server to Only Run Server Jobs. . . . . . Scan for applied critical patches and Software Delivery tasks. Manage Lost Recovery Solution Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 108 110 110 111 112 113 113 Chapter 6: Recovery Solution Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 General Recovery Solution Tasks in the Altiris Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Recovery-related Information about Individual Computers Using the Resource Manager Performing Basic Recovery Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running Server Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Performing Recovery Tasks on Individual Computers Using the Resource Manager . . . . . . . Accelerate a Scheduled Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Full System Recovery Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disable/Enable a Computer Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage Full System Recovery Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage Protected Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage the Users of a Protected Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mark the Client Computer Account to be Deleted . . . . . . . . . . . . . . . . . . . . . . . . . . . Mark Files for Deletion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Perform a Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Perform a Snapshot Now . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage Agent Setup Packages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 114 116 116 117 118 118 118 118 118 120 120 120 122 127 127 Chapter 7: Advanced Snapshot and Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . 128 Convert Encrypted Files on FAT Partitions . . . . . . . . . . . . . . . . . . . . . . Restoring a User’s Data to a Different Computer . . . . . . . . . . . . . . . . . Web-Based File Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reinstall Recovery Agent Using the Same Account . . . . . . . . . . . . . Restoring Data with the Migration Utility . . . . . . . . . . . . . . . . . . . . Full System Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery Overview . . . . . . . . . . . . . . . . . . . . . . . . . . Full System Snapshots Are Necessary for Full System Recovery . What Happens During Full System Recovery . . . . . . . . . . . . . . Constraints of Full System Recovery . . . . . . . . . . . . . . . . . . . . Full System Recovery Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . Items You Need at Recovery Time . . . . . . . . . . . . . . . . . . . . . Full System Recovery Disk Creation . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery Using PXE. . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery from USB Media . . . . . . . . . . . . . . . . . . . . . Preparing the USB media for Full System Recovery. . . . . . . . . . Running Full System Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Full System Recovery Without Formatting Drives Option. . Norton AntiVirus Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restoring Data From Full System Recovery Media . . . . . . . . . . . . . Erasing the Partition Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Snapshot Command-Line . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduling Snapshots with the Command-Line Interface. . . . . . . . . Command-Line Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Exit Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using RSACmd.exe Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Solution Reference Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 129 129 129 130 131 131 132 132 132 133 134 134 139 139 140 143 145 146 146 146 147 148 148 150 152 6 Chapter 8: Using Recovery Solution Reports and Job Queue . . . . . . . . . . . . . . . . . . . . 153 Part II: Using the Recovery Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Chapter 9: Getting Started with the Recovery Agent . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Manually Install the Recovery Agent . . . . . . . . . . . . Take the Initial Snapshot . . . . . . . . . . . . . . . . . . . . View Your Recovery Agent Options . . . . . . . . . . . . . Ensure Automatic Snapshots Are Taken Successfully. Take an Unscheduled Full System Snapshot . . . . . . . Take an Unscheduled Partial Snapshot . . . . . . . . . . View and Restore Protected Files . . . . . . . . . . . . . . Save and Restore Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 157 157 158 158 159 159 161 Chapter 10: Configuring the Recovery Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Snapshot and Restore Dialog Box . . . . . . . . . . . . . . . Last Snapshot/Restore Status . . . . . . . . . . . . . . Snapshot Options . . . . . . . . . . . . . . . . . . . . . . . Restore Options . . . . . . . . . . . . . . . . . . . . . . . . Throttling Options (server-based mode only) . . . . Performance Options (local mode only) . . . . . . . . Snapshot Selection Wizard Dialog Box . . . . . . . . Restore Selection Wizard Dialog Box . . . . . . . . . . Snapshot Schedule Dialog Box . . . . . . . . . . . . . . . . . Enable Schedule Snapshots (local mode only) . . . Snapshot type . . . . . . . . . . . . . . . . . . . . . . . . . Start Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . Use System Defaults. . . . . . . . . . . . . . . . . . . . . Administration Dialog Box (server-based mode only) . General Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . User Interface Language Preferences . . . . . . . . . Recovery Solution Logs . . . . . . . . . . . . . . . . . . . Altiris Recovery Partition for local snapshots (local Connection Settings (server-based mode only) . . Use System Defaults. . . . . . . . . . . . . . . . . . . . . Space Management Dialog Box . . . . . . . . . . . . . . . . Default Rules . . . . . . . . . . . . . . . . . . . . . . . . . . Exception Rules . . . . . . . . . . . . . . . . . . . . . . . . Use System Defaults. . . . . . . . . . . . . . . . . . . . . Misc Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery Dialog Box . . . . . . . . . . . . . . . Remote Access Dialog Box (server-based mode only) . Snapshot Type . . . . . . . . . . . . . . . . . . . . . . . . . Snapshot Settings . . . . . . . . . . . . . . . . . . . . . . Use System Defaults. . . . . . . . . . . . . . . . . . . . . Excludes Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . Files and Folders to Exclude Dialog Box . . . . . . . . Select Folder or File Name . . . . . . . . . . . . . . Choose the Type of Item to Exclude . . . . . . . Choose Where to Exclude This Folder or File . Exception from Exclude List . . . . . . . . . . . . . . . . Folder or File Name. . . . . . . . . . . . . . . . . . . Choose the Type of Item to Include . . . . . . . Choose Where to Include This Folder or File. . Recovery Solution Reference Guide ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... mode only) ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 164 164 165 165 166 166 166 167 167 167 167 169 169 170 170 170 170 171 172 172 172 173 173 173 174 175 175 176 177 177 177 178 178 178 179 179 179 179 7 Rollback Data Dialog Box. . . . . . . . . . . . . . . . . . . . Storage Locations Dialog Box (local mode only) . . . . Location for stored data on the Recovery Agent . Adding Additional Storage Locations . . . . . . . . . Managing Additional Storage Locations . . . . . . . Managing the Temporary Retention Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 180 180 181 181 182 Chapter 11: Advanced Recovery Agent Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Excluding Files from Snapshots . . . . . . . . . . . . . . . . . . . Why Exclude Files? . . . . . . . . . . . . . . . . . . . . . . Files and Folders You Should Never Exclude. . . . . Examples of Files and Folders to Exclude . . . . . . . Performing Rollbacks . . . . . . . . . . . . . . . . . . . . . . . . . . Rollback Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . Rollback Error Dialog Box . . . . . . . . . . . . . . . . . . . . Full System Recovery Options . . . . . . . . . . . . . . . . . . . . Local Full System Recovery from DVD-ROM . . . . . . . . Using the F11 Option in Local Mode . . . . . . . . . . . . . Using Web-Based File Recovery . . . . . . . . . . . . . . . . . . . Using Recovery Solution Event Viewer . . . . . . . . . . . . . . Event Log Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . View Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View Menu Options . . . . . . . . . . . . . . . . . . . . . . . . . Event Viewer Dialog Box . . . . . . . . . . . . . . . . . . . . . Find . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Event Viewer Elements . . . . . . . . . . . . . . . . . . . Event Details Dialog Box . . . . . . . . . . . . . . . . . . . . . Troubleshooting the Event Viewer . . . . . . . . . . . . . . Scheduling Snapshots to Run When Your Computer is Idle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 183 183 184 187 187 189 189 190 192 192 193 194 195 196 197 197 197 197 198 198 199 Part III: Recovery Solution Technical Reference . . . . . . . . . . . . . . . . . 200 Chapter 12: Recovery Solution Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Troubleshooting Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Event Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Using the Windows 98 Event Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Event Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Finding Specific Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Saving Events to Other Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Clearing the Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Automatically Overwriting Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 File Version Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Installation Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Server Installation Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 After installation, W3SVC warnings appear in System event log . . . . . . . . . . . . . . . . . . . 206 If Recovery Server uninstall encounters an error, uninstall rollback may fail . . . . . . . . . . 207 Altiris Recovery Server service error message after completing a Recovery Solution Server upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Recovery Server upgrade hangs with “Upgrade in progress” status forever . . . . . . . . . . . 207 Recovery Solution tasks are non-fuctional after aggregation of legacy servers . . . . . . . . . 208 Altiris Recovery Solution Server cannot be installed because 8.3 file names creation is disabled 208 Troubleshooting User Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Recovery Solution Reference Guide 8 Altiris Local Recovery Agent Registration fails . . . . . . . . . . . . . . . . . . . Error message appears during Recovery Agent Setup . . . . . . . . . . . . . . User account not validated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setup does not run properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Applications will not start after agent install. . . . . . . . . . . . . . . . . . . . . User Account & Logon Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protected Computers Cannot Connect to Server . . . . . . . . . . . . . . . . . . . . . User Logon Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protected users cannot be authenticated . . . . . . . . . . . . . . . . . . . . . . . . . . Data Protection & Recovery Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . Snapshot & File Restore Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . Snapshot Schedule for Certain Computers do not Run . . . . . . . . . . . . . User Cannot Log On to Start Snapshot . . . . . . . . . . . . . . . . . . . . . . . . Job Cannot Be Submitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protected computer drives missing from snapshots. . . . . . . . . . . . . . . . User Cannot Browse Protected Files . . . . . . . . . . . . . . . . . . . . . . . . . . User Cannot Access a Different Account Via Web-Based File Recovery . . Snapshots Fail Because Server Clocks Are Not Synchronized . . . . . . . . . General Snapshot & Recovery Problems . . . . . . . . . . . . . . . . . . . . . . . Short File Names Restored Incorrectly on FAT32 Partition . . . . . . . . . . . Full System Recovery Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . Disk space error appears during Full System Recovery disk creation . . . . Full System Recovery does not start properly . . . . . . . . . . . . . . . . . . . Error appears during Full System Recovery . . . . . . . . . . . . . . . . . . . . . Full System Recovery fails when creating disk structure . . . . . . . . . . . . Full System Recovery incomplete, but no error appears . . . . . . . . . . . . Problems occur after server upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . Error appears after Full System Recovery . . . . . . . . . . . . . . . . . . . . . . Recovery Agent not working after Full System Recovery . . . . . . . . . . . . Files missing or outdated after Full System Recovery . . . . . . . . . . . . . . Full System Recovery stalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery CD-ROM failure . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery and Windows 98 with Symantec Antivirus . . . . . . Cannot Cancel Restore of Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Norton AntiVirus Security Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . Account Disabled After Full System Recovery . . . . . . . . . . . . . . . . . . . . Full System Recovery fails on HP NetServer LC2000 . . . . . . . . . . . . . . . Recovery Fails on Computers with Phoenix nForce 6A61CPAAC-00 BIOS . Rollback Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unable to see Desired Snapshot During a System Rollback . . . . . . . . . . Rollback Cannot Be Started From the Console . . . . . . . . . . . . . . . . . . . Job Cannot Be Submitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . After Rollback, User Is Prompted to Uninstall . . . . . . . . . . . . . . . . . . . . Rollback Fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . After Rollback, a Restored Drive Contains No Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 208 209 210 211 211 211 212 213 213 213 213 214 214 214 214 214 215 215 215 216 216 216 217 220 220 221 221 222 222 222 222 223 223 223 223 223 224 224 224 225 225 225 225 226 Chapter 13: Recovery Agent Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Troubleshooting: Install/Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Unsupported Devices . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Problems Installing the Local Partition . . . . . . . . . . . . Troubleshooting: Cannot Update Recovery Agent . . . . . . . . . . . . . . . . . Troubleshooting: Settings Not Saved During Update . . . . . . . . . . . . . . . Troubleshooting: Unusable Clusters after Uninstall . . . . . . . . . . . . . . . . Troubleshooting: Install fails with unable to configure the settings error . Recovery Solution Reference Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 227 228 229 229 229 230 9 Troubleshooting: Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Snapshot Options Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Nothing Happens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Erratic Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Snapshots Don't Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Scheduled or Automated Snapshot Doesn't Run . . . . . . . . . . . Troubleshooting: Snapshot on Logoff Doesn't Run . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Snapshot Stops Prematurely . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Recovery Solution Stops During a Snapshot or Restore . . . . . . Troubleshooting: Windows Installer Appears During Snapshots . . . . . . . . . . . . . . . . Troubleshooting: Snapshot Is Missing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: File Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Cannot View Protected Files . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Protected File Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Cannot Find File Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Protected File Versions Are the Same . . . . . . . . . . . . . . . . . . . Troubleshooting: Restored Files Are Incorrect Versions . . . . . . . . . . . . . . . . . . . Troubleshooting: Not Enough Space Available to Restore (FAT32) . . . . . . . . . . . Troubleshooting: Miscellaneous File Version Problems . . . . . . . . . . . . . . . . . . . . Troubleshooting: Web-Based File Recovery Logon Doesn't Appear . . . . . . . . . . . . . . Troubleshooting: Restore Crashes Windows Explorer . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Recovery Solution Freezes During File Search . . . . . . . . . . . . . . . . Troubleshooting: Restore Stops Prematurely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Unknown Restore Type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Other Issues Relating to Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Custom user names for message queues gets renamed into the GUID-like names Troubleshooting: Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Messages in the Progress Dialog Box . . . . . . . . . . . . . . . . . . Troubleshooting: New Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Repeated Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Message Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Job Could Not Be Submitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Drive Configuration Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: System Low on Registry Quota. . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Can't Open Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Options Are Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Schedule Settings Cannot Be Displayed . . . . . . . . . . . . . . . . . . . . Troubleshooting: Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Messages.dll Is Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Event Log Full . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Messages in the Event Logs . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Virus Warning During Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback Has Missing or Damaged Files . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback Disables Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback General Protection Fault Error Message . . . . . . . . . . . . . . Troubleshooting: DHCP Problems After Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Other Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: DCOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: FrontPage 98 Personal Web Server Conflict. . . . . . . . . . . . . . . . . . Troubleshooting: Logon Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recovery Solution Reference Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 231 231 231 232 232 233 234 234 235 235 236 236 237 237 238 238 238 238 238 238 239 239 239 240 240 240 240 241 241 242 242 242 243 243 243 244 244 244 244 245 245 246 246 246 247 247 248 248 248 248 249 250 250 10 Troubleshooting: Troubleshooting: Troubleshooting: Troubleshooting: Troubleshooting: Cannot Access Dialog Box Buttons . Connection Firewall . . . . . . . . . . . Fast User Switching . . . . . . . . . . . Unknown Solution . . . . . . . . . . . . Event Viewer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 251 252 252 252 Chapter 14: Technical Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Product Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Performance Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Data Protection Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Restore Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Changing DCOM Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Configuring Microsoft Network Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Settings Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 User Account and Share Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Microsoft SQL Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Event Log Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Internet Information Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 ODBC Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 DCOM Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 RPC Dynamic Port Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Firewall Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Web-Based File Recovery Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Configuring Web-Based File Recovery to run on Windows Server 2003 . . . . . . . . . . . . . . 274 Job Schedule Worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Local Maintenance Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Technical Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Protected Computer IP Address Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 How Recovery Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 How the Temporary Operating System Is Created . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Recovery Disk Space Needed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Command Line Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 AeXRSEnc Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 AeXMigrt.com Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Command-line parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Input XML files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 BWINST Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 RECREATE Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Stopping and Starting the Recovery Solution Server Service . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Recovery Solution Infrastructure Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Recovery Solution Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Notification Server Database Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Recovery Solution Database Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Data Files Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Load Balancer Configuration Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Notification Server Database Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Data Files Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Recovery Solution Database Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Recovery Solution Reference Guide 11 Appendix A: Hard Disk Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Recovery Solution Reference Guide 12 Chapter 1 Introducing Recovery Solution The following topics contain general information about Altiris® Recovery Solution™: z Recovery Solution Product Overview (page 13) z Integration with other Altiris Solutions (page 15) z Recovery Solution Documentation (page 16) z Recovery Solution Terminology (page 17) z Recovery Solution Architecture (page 19) z Familiarizing Yourself with the Altiris Console (page 21) Recovery Solution Product Overview Recovery Solution protects operating systems, applications and data stored on desktops and notebooks from unintentional changes, accidental deletions, and catastrophic loss from hardware failure, virus corruption, or theft. By taking daily snapshots automatically, the solution works seamlessly and unobtrusively to protect your systems and data without impacting user productivity. Recovery Solution provides total and system-wide protection for your organization’s computers, including operating system, applications, network settings, drive mappings, peripheral drivers, data, and other configuration settings. Recovery Solution captures email messages, contacts, and calendar entries, even while the e-mail application is in use. Users can work completely unaware that snapshots are being taken. Remote users are prompted at login to allow the snapshot, but once it begins, the process is transparent and users can continue with their work uninterrupted. Recovery Solution provides a three-level approach to minimize bandwidth and CPU utilization with each snapshot: z Redundant File Elimination (RFE): Patented technology filters out files that already exist in the Altiris recovery repository or Altiris partition, storing common files once across your entire organization (Recovery Solution only). z Redundant Block Elimination (RBE): Patented technology that reduces data transmission size by transmitting and storing only the portions of each file that is different from the previous snapshot. z HLZS data compression is the industry standard for lossless data compression. These technologies work together to make the backup process as seamless and efficient as possible, and achieve compression ratios as high as 15:1, minimize network and CPU loads, and provide scalability to thousands of users per repository. Note For a list of new features for Recovery Solution 6.2 SP2, see the Recovery Solution Release Notes. There are three different versions of Recovery Solution: Recovery Solution Reference Guide 13 z Recovery Solution Enterprise (page 14) z Local Recovery (page 15) z Local Recovery Pro (page 15) Recovery Solution Enterprise Recovery Solution Enterprise has a new architecture that provides enhanced fault tolerance and scalability. You can now configure a cluster of Recovery Solution Servers that can work together to back up and restore data. To facilitate this, Recovery Solution leverages server load balancing, data mirroring, and Microsoft SQL Server clusters. Because it is now possible to leverage a single Notification Server and SQL installation, you can manage and get reports from multiple Recovery Solution Clusters, making reporting enterprise-wide. Computers that are connected to the network either continuously or periodically can have their data automatically backed up through the following three options: z Files are backed up to a Recovery Solution Cluster (server-based mode) z Files are backed up to a dedicated partition on the local hard drive (local mode) z Files are backed up to both the Recovery Solution Cluster and the local hard drive (mixed mode) Recovery Solution is integrated with Altiris® Notification Server™ that provides automated web-based reports, agent deployment, event processing, notification policies, and more. Additional product highlights include the following items: z Recovery Solution administrators can allow users to protect their own computers, or they can schedule automatic snapshots to ensure that the computers are always protected by receiving continuous scheduled backup. z Administrators can also control user rights, preventing users from performing certain tasks (such as disabling the schedule). When rights are granted, users can perform many tasks at will, reducing helpdesk involvement. z Recovery Solution provides full system protection. This means that not only are typical data files (such as word processing documents and spreadsheets) protected, but all of the programs installed on the computer and all of the user settings are also protected. Files that are encrypted, open, or locked can also be backed up. This allows the entire computer to be fully restored to an earlier state. z If a user's snapshot is cancelled or interrupted, they do not need to restart it from the beginning. You can restart the snapshot from the failure point or break point. This feature provides users with the ability to recover from a broken connection with the server at the exact same place as when their connection was broken. This is especially useful to remote users. z If a user's operating system becomes so damaged that the user cannot even start the computer, you can create Full System Recovery (FSR) disks that can be used to start the computer and repair the system. z The data protection process is secure. Protected data is stored within special “BLOB” files which can be mirrored, and also be encrypted while in transit. No user can access another user's files. Recovery Solution Reference Guide 14 z The Recovery Solution Console lets you manage the cluster and all its protected computers from any location on the network. If multiple clusters are configured, they can all be administered from a single console. Local Recovery Altiris® Local Recovery™ offers data and user-state protection for your organization's desktop and notebook computers. Local Recovery takes daily snapshots of computers automatically and stores backups locally in a hidden Altiris partition (known as local mode). Local Recovery is exceptionally end-user friendly. End users can initiate a backup or restore by simply right-clicking their mouse or pressing the F11 key in a pre-boot environment. By taking daily snapshots automatically, the solution works seamlessly and unobtrusively to protect your systems and data without impacting user productivity. Note Local Recovery runs only on computers manufactured by Altiris partners (HP/Compaq/ Dell). Local Recovery Pro Altiris® Local Recovery Pro™ provides the same functionality of Local Recovery with the following additional benefits: z Open and locked file support z Aggregate and individual status reporting z Support for all brands of computers z Create Altiris Partition on any drive z Install Recovery Agent on client computers based on Notification Server policies z Agent settings can be managed from Notification Server z Local Full System Recovery from DVD Integration with other Altiris Solutions Recovery Solution integrates with other Altiris solutions to provide broader functionality. Recovery Solution integrates with Altiris® Patch Management Solution™ to allow administrators to automatically take snapshots of PCs and servers prior to applying patches. This integration ensures that should something go wrong, the administrator can immediately roll a PC or server back to a known good and working state. Similarly, Recovery Solution works with Altiris® Software Delivery™ to provide restoration capabilities for PCs and servers receiving new applications. Integration with Patch Management and Software Delivery solutions lets administrators mark certain patches and Software Delivery tasks as critical. This makes all snapshots taken before applying the task or patch unavailable for rollback, and thus prevents the users at protected computers and helpdesk technicians at the console from restoring Recovery Solution Reference Guide 15 computers to an improper state. However, administrators still have the right to roll back computers to any snapshot taken before or after the task or patch was applied. Altiris® PC Transplant Solution™ integration allows administrators involved in operating system upgrades or hardware refreshes to perform migrations to the new or re-imaged hardware directly from the Recovery Server. This provides the quickest most direct form of migration to date. Recovery Solution integrates with Altiris® Helpdesk Solution™ by providing embedded Smart Tasks in the Helpdesk console. These embedded tasks allow helpdesk workers to initiate remedial Recovery Solution tasks, such as starting a snapshot or restoring a file for the end-user. Companies using Recovery Solution can now download a free monitor pack (Altiris Monitor Pack for Altiris Infrastructure) for use in Altiris® Monitor Solution™. This free plug-in allows administrators to gather and observe real-time information concerning their Recovery Solution servers. Recovery Solution also provides a custom view plugin for Altiris® Real-Time System Manager Solution™. Therefore, it is possible to see Recovery Solution Agent status on a remote machine. Recovery Solution integrates with Deployment Solution 6.5 to allow administrators to perform Full System Recovery using PXE (Pre-Boot Execution Environment) over network. For more information, see Full System Recovery Using PXE on page 139. Please see the integrated product’s documentation for more information. Recovery Solution Documentation The following documentation is provided with Recovery Solution: z Release Notes The release notes contain a list of the new features and known issues in this version of the product. It also contains any last-minute information that are not included in the main documentation. z Recovery Solution Reference Guide The reference guide provides instructions the administrator. This guide is available in both Adobe .PDF and Microsoft HTML Help formats. z Recovery Solution User’s Guide The user’s guide provides information about using the Recovery Agent. This guide is available in both Adobe .PDF and Microsoft HTML Help formats and provides users with instructions for protecting their computers. z Altiris Console and Recovery Agent Context Sensitive Help Click the help button to open the help. Altiris product documentation is available in Microsoft HTML Help (.CHM) and Adobe Acrobat (.PDF) formats. Documentation files are installed in the following directory: C:\Program Files\Altiris\Notification Server\NSCap\Help Recovery Solution Reference Guide 16 You can access documentation from the Altiris Console by clicking the following icons in the upper-right corner of the Altiris Console: Access the contextual online help by clicking the online help icon. Access an index of all help by clicking the index icon. The complete and most current versions of documentation are available from the Altiris Knowledge Base, which is available from the Altiris support Web page at www.altiris.com/support. Recovery Solution Terminology Altiris Partition A hidden partition on a local computer that Recovery Solution uses to store snapshots. This partition is created using the Recovery Agent Partition Wizard. baseline snapshot The first Recovery Solution snapshot of a protected computer. cluster A logical group of computers that consist of Recovery Solution servers. DCOM Microsoft Distributed Component Object Model consists of a set of system files that Recovery Solution uses when communicating with the server. DCOM provides both flexibility and added security for many applications that run on a network. Full System Recovery (FSR) A recovery of the whole system from scratch to any of the performed full system snapshots. Local Recovery database The database where Local Recovery Agent stores information about protected data included in snapshots. Local Recovery golden image The initial image of the client computer’s data performed by Altiris RapiDeploy® as part of the Local Recovery snapshot. This image is created right after the Altiris Recovery partition creation in Linux. The golden image is used for performing Full System Recovery on Local Recovery Agent computers. local database maintenance job A job that verifies the integrity of stored protected data and removes old data (by default, a job removes all file versions and data deleted from the client computer more than six days previously). Recovery Solution Reference Guide 17 partial snapshot A snapshot of only the drives you select. You can choose to include or exclude any local hard drive on your computer, whether or not it has system information on it. Note Files and folders that are specified in the Excludes for protected computer are not included in the snapshot. protected computer A user’s computer (workstation, notebook, and so on) whose data is protected by installing the Recovery Agent. Recovery Agent The software that manages backing up and restoring files on the computer. rollback Restoring files as well as computer’s registry from a snapshot that restores computers to a previous state. Rollback is used to repair your operating system and applications when your computer is not functioning properly. restore session The actual transference of data from a snapshot to a computer. server The computer that stores the snapshots of the protected computers running in serverbased mode. server authentication In server-based mode, Windows domain security is used. Your normal Windows logon account is used to give you access to Recovery Solution. If multiple users log onto your computer, each person’s account must have access rights to the server. Your administrator configures the access rights. space management job A server task that deletes files from snapshots. snapshot session The actual transferring of data to a snapshot. If data from multiple drives are included in a snapshot at the same time, Recovery Solution considers each drive a separate snapshot session, even though it performs all the snapshots right away. snapshots Snapshots contain one or more backed up files. storage location The location used by Recovery Solution or Local Recovery to store protected data. Recovery Solution Reference Guide 18 full system snapshot A snapshot of a protected computer that contains enough information to restore the computer in the event of a disaster. A Full System Recovery can only be performed from a Full System Snapshot. In addition to whatever files you select, a Full System Snapshot always contains the information about the protected computer’s disk partitions and drives and the Windows registry. You can also include any additional data from local drives. A Full System Snapshot does not have to contain all of the protected computer’s files and folders. VPN In a Virtual Private Network, the communications are encrypted between a remote computer (the VPN client) and the remote access VPN gateway (the VPN server) to which it connects. With a VPN, a protected computer can send data across a shared or public network in a manner that emulates a point-to-point private link. Recovery Solution Architecture Recovery Solution is a highly flexible and scalable system. It is designed to meet the backup and recovery needs of small, medium, and large organizations with diverse topologies and varying backup and recovery requirements. Because of this flexibility, it is important to plan the design and the deployment before installing or upgrading to Recovery Solution. This section provides information on system architecture and possible deployment of Recovery Solution. Recovery Solution consists of five main elements: Notification Server, Recovery Solution Cluster, Recovery Solution Server, Microsoft SQL Server, and data storage. Each element of the system is scalable not only to meet the exact backup and recovery needs but also the level of fault tolerance required by the origination. Logical Configuration of the Recovery Solution System In the figure below is a logical configuration of a full fault tolerance Recovery Solution system. This includes multiple Recovery Servers in a load balanced cluster, mirrored Blob data storage, and Microsoft SQL Server Cluster. Notes Microsoft SQL Server Cluster design and setup of a database fault tolerance is covered the Microsoft documentation. We recommended that the network that connects the Recovery Solutions Servers, Notification Server, MS SQL Server, and Data Locations be at least 100 Mbit or a switched network. Recovery Solution Reference Guide 19 Notification Server MS SQL Server Cluster Recovery Solution Cluster DB MS IIS Web Server MS IIS Web Server DB DB Recovery Administration DB Data Space & Mirror Blob Blob Load Balancer Protected servers, desktops, notebooks Figure 1 Altiris Notification Server In the versions of Recovery Solution earlier than 6.1, most administration tasks were performed in the Recovery Solution Administrator’s Console using the Microsoft Management Console (MMC). The MMC is no longer used. All recovery management tasks are now performed in the Web-based Altiris Console. The Notification Server is used to setup and modify cluster, servers, data base, data storage, and protected systems settings. Notification Server also communicates with the Recovery Solution Microsoft SQL Server data base to produce reports that are enterprise-wide. Note Both HTTP and DCOM are used for communication between Recovery Solution Server and Notification Server. Recovery Solution Cluster Recovery Solution Cluster is made up of at least one Recovery Solution Server. There can be multiple clusters with just one Recovery Solution Server in each cluster (this mimics the previous versions of Recovery Solution configuration). If load balancing is turned on and one of the supported load balancing solutions is used, then multiple Recovery Solution Servers can be assigned to a cluster. All settings for servers, Blob data storage locations, and Microsoft SQL Server configurations are administrated at the cluster level. Recovery Solution Reference Guide 20 Recovery Solution Server The Recovery Solution Server is a Microsoft Windows server running Internet Information Services (IIS). The protected computer or users connect to this server to backup and restore their files or systems. Authentication is handled by Active Directory domain accounts or Microsoft NT domain accounts (local computer accounts are not supported). A Recovery Solution Server must be assigned to a Recovery Solution Cluster. For information on how to configure a dedicated Recovery Solution Server for handling only server jobs, see General Settings on page 97. Microsoft SQL Server The Microsoft SQL Server stores information about Recovery Solution system data, protected computer data, and statistical information, including reporting data. Blob data storage User data is stored in encrypted blob data. The system can configure multiple physical hard drives to store this data. Additional space can be added to the storage if needed. The Blob data can now be mirrored, which occurs at the time of snapshots, to give an extra level of fault tolerance. Load Balancer If Load Balancing is turned on for a given Recovery Solution Cluster, multiple Recovery Solution Servers can be set up. The protected computer at the time of backup or recovery communicates with the load balancer, which then assigns the session to a recovery server. All load balancing is done through either HTTP or HTTPS and requires that the load balancer keeps users attached to only one server for the whole session until the session is ended by the recovery server. Microsoft Network Load Balancer (NLB) (a software based load balancer for IIS servers) and F5 BIG-IP Blade Controller have been tested and are supported. Protected Computers Protected computers are end users’ computers, laptops, and enterprise data servers that are protected by Recovery Solution. Depending on system configuration, one of the following protocols are used for communication between protected system and the Recovery Server for backing up and restoring data: DCOM, HTTP, and HTTPS. Note If load balancing is used, only HTTP and HTTPS are supported. Familiarizing Yourself with the Altiris Console In the versions of Recovery Solution earlier than 6.1, most administration tasks were performed in the Recovery Solution Administrator’s Console using the Microsoft Management Console (MMC). All recovery management tasks are now performed in the Altiris Console. See also: Altiris Console Overview (page 21). Altiris Console Overview To open the Altiris Console, click Start > Programs > Altiris > Altiris Console. Recovery Solution Reference Guide 21 The Altiris Console provides the following tools that help you manage Recovery Solution: z Recovery Solution Configuration Tools (page 22) z Recovery Solution Task Policies (page 23) z Recovery Solution Reports (page 23) z Resource Manager Tools (page 24) Note The computer running the Altiris Console must be able to connect to the Recovery Servers on your network to perform the Recovery Solution tasks for those servers. Specifically, make sure that TCP ports 80 and 135 are open on the Recovery Servers for communication with the Altiris Console and that you can ping the servers using their DNS names and IP addresses. For proper operation of the Altiris Console on computers running Windows XP SP2, you must disable pop-up blocking. In Internet Explorer window, click Tools > Pop-up Blocker > Turn Off Pop-up Blocker. Recovery Solution Configuration Tools Most recovery configuration tasks are performed in the Configuration tab of the Altiris Console. To access Recovery Solution configuration tools 1. Open the Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution. The following Recovery Solution configuration tools are available: z z z Recovery Agent Rollout Tools Recovery Agent Rollout tasks policies Recovery Agent Rollout software package Recovery Agent specific collections Recovery Agent Settings Configuration Tools Default Recovery Agent Settings configuration page Default Local Recovery Agent Settings configuration page Recovery Solution Cluster Tools Recovery Solution Cluster creation tools Recovery Solution Cluster nodes and configuration page Recovery Solution Server installation policies Upgrade and uninstall task policies Recovery Solution specific collections Recovery Solution Reference Guide 22 Recovery Solution Task Policies On the Tasks tab, predefined policies are available to perform the following tasks: Tasks Link to information Convert encrypted files on FAT partitions Convert Encrypted Files on FAT Partitions (page 128) Erase the protected computer’s partition table Full System Recovery incomplete, but no error appears (page 220) Manage Agent Setup package Manage Agent Setup Packages (page 127) Restore data from Full System Recovery CD/DVD-ROMs Restoring Data From Full System Recovery Media (page 146) Restore data using the Migrate utility Restoring Data with the Migration Utility (page 130) Agent Settings Encryption/ Decryption Utility AeXRSEnc Utility (page 279) Altiris Partition Removing Utility BWINST Utility (page 288) To access the Recovery Solution task policies, open the Altiris Console, click the Tasks tab, and then select Incident Resolution > Recovery Solution. For information on performing these tasks, click the policy and read the description and instructions in the right content pane. You can also click the links listed above. Recovery Solution Reports Recovery Solution provides several predefined reports that give information about your client computers and Recovery Servers. For these reports, Recovery Solution uses information from both the Notification Database and Recovery Solution Database. Note For reports to work, the related data must have been previously collected. For a list and description of Recovery Solution reports, open the Altiris Console and click the Reports tab and then Reports > Incident Management > Recovery Solution. Then click a report folder. Note The Local Reports are available for Local Recovery Pro users. The rest require the full Recovery Solution. You can modify these reports if desired or you can create your own reports. For more information on using reports and creating custom reports, see the Altiris Notification Server Help. Note Depending on your environment (your server and the number of computers being backed up) you may want to schedule reports using date x and date y. Scheduling some or all of these reports will greatly increase report performance when compared to running these reports live. You can then view the saved report runs. Recovery Solution Reference Guide 23 Resource Manager Tools You can use the Resource Manger to do the following: z View recovery-based information about individual client computers z Perform recovery tasks on individual computers z Create and view collections of computers To view the Resource Manager for a computer, click the computer item in either a report or collection. From a collection, you can also right-click a computer to perform recovery tasks on that computer. For more information, see Viewing Recovery-related Information about Individual Computers Using the Resource Manager (page 114). Recovery Solution Reference Guide 24 Part I Using Recovery Solution This section explain how to use Recovery Solution. The following chapters describe tasks that you can perform using Recovery Solution components in the Altiris Console: z Installing Recovery Solution (page 26) z Getting Started with Recovery Solution (page 46) z Recovery Solution Agent Installation (page 51) z Configuring Recovery Solution (page 75) z Recovery Solution Tasks (page 114) z Advanced Snapshot and Recovery Procedures (page 128) z Using Recovery Solution Reports and Job Queue (page 153) Part II contains chapters that explain how to use the Local Recovery Agent on client computers. Part III contains chapters that include troubleshooting and technical reference information. Recovery Solution Reference Guide 25 Chapter 2 Installing Recovery Solution This section lists the Recovery Solution product requirements and explains how to install Recovery Solution. z Recovery Solution Server Component Requirements (page 26) z Recovery Solution Client Component Requirements (page 30) z Installing Recovery Solution Server Components (page 34) z Installing Recovery Solution Client Components (page 42) z Upgrading Recovery Solution (page 42) z Licensing Recovery Solution (page 44) z Uninstalling Recovery Solution (page 44) For information on installing the Recovery Agent, see Recovery Solution Agent Installation on page 51. For information on installing Local Recovery Pro, see Installing the Recovery Agent in Local Mode on page 60. Recovery Solution Server Component Requirements This section lists the requirements of the computers that run the various components of Recovery Solution. Recovery Solution runs under Altiris Notification Server 6.0 SP3 and above. For a list of requirements to run Notification Server, please see the Altiris Notification Server Reference or help. The specific Recovery Solution configuration needs depend on your specific situation. The requirements depend on the number of client computers to be protected and on the homogeneity of the data on those computers. Software Requirements Software Description Operating System z Windows Server 2003 z Windows Server 2003 R2 z Windows Server 2000 SP2 or later z Microsoft SQL Server 2000 SP3 or later z Microsoft SQL Server 2005 Microsoft Windows Internet Information Services (IIS) z Microsoft IIS 5.0. This component is not installed by default with Windows 2000 or later. For Windows 2003, ASPNET needs to be enabled. Web Browser z Microsoft Internet Explorer 6.0 or later Altiris Software z Altiris Agent 6.0 SP3 or later SQL Database Recovery Solution Reference Guide 26 For Recovery Agent requirements, see Recovery Agent Requirements (page 51). Note If you have previously installed Local Recovery Pro on this computer before Notification Server was installed, after you have installed Notification Server, you will need to reinstall Local Recovery Pro for it to be recognized by Recovery Solution. See also: Setting up Recovery Solution Prerequisite Components (page 27). Setting up Recovery Solution Prerequisite Components You may need to perform the following steps before you can install Recovery Solution: z Configuring the Load Balancer (page 27) z Configuring the SQL Database (page 28) z Install the Altiris Agent (page 29) Configuring the Load Balancer If you will be using more than one Recovery Solution Server, you must use a load balanced cluster of servers. Recovery Solution supports the following load balancing technologies: z Microsoft Network Load Balancing z BIG IP by F5 Networks, Inc. The load balancer should be installed according to the installation instructions of the manufacturer. Microsoft Network Load Balancing Tips Microsoft Network Load Balancing uses a virtual IP and MAC address. If the network hardware is not setup correctly, it can cause network collisions to occur. To prevent this we recommend the following: z All Recovery Solution Servers are connected to a network hub z The network hub is connected to a programmable switch on your network z Program the switched port address table with the Network Load Balancing virtual MAC address. Example: if your hub is plugged in to port 8 on your switch, program the switch that the Virtual MAC address is connected as port 8. Configuring the BIG IP Controller Health Monitors BIG IP health monitors verify connections and services on nodes that are members of load balancing pools. The monitor checks the node at a set interval. If the node does not respond within a specified timeout period, the node is marked down and traffic is no longer directed to it. By default, an ICMP (Internet Control Message Protocol) monitor is associated with every node that is a member of a load balancing pool. This monitor is of the simplest type, checking only the node address and checking only for a ping response. To change the interval and timeout values of this default check, or to check specific services on a node, you need to configure a custom monitor or monitors to add to the default monitor. For the default icmp monitor, we select the icmp monitor template, as shown below: Recovery Solution Reference Guide 27 monitor type icmp { interval 5 timeout 16 dest * } The ICMP monitor template has three attributes: interval, timeout, and dest, each with a default value. (All monitor templates have these three basic attributes). For the default monitor, template ICMP is used as is, that is, as monitor ICMP with its default attribute values. To change any of these default values, you would need to create a custom monitor based upon ICMP, for example, my_icmp. Only the values that are actually to be changed would need to be specified in the definition of the custom monitor. Therefore, if you wanted to change the timeout values only, you would define the custom monitor as follows: b monitor my_icmp ’{ use icmp timeout 20 }’ This would create a new monitor in /config/bigip.conf, as show below: monitor my_icmp{ #type icmp use "icmp" interval 5 timeout 20 } You can display this monitor using the following command: b monitor my_icmp show Once the custom monitor exists, you associate it with a node or nodes using the Configuration utility or the bigpipe node command. Example: b node 11.11.11.1 11.11.11.2 11.11.11.3 monitor use my_icmp Note The nodes are identified by IP address only. ICMP can ping addresses only, not specific ports on addresses. This creates three instances of monitor my_icmp, one for each address. You can display the instances using the command b node monitor my_icmp show. Configuring the SQL Database If you plan to authenticate to the SQL Server using a Windows account, and if the SQL Server is set to Windows authentication mode only, you must set it to SQL Server and Windows (mixed) mode for Recovery Solution Server to work correctly. Caution If you are using the Microsoft SQL 2005 Server, the sys.xp_cmdshell component is required before you can create a Recovery Cluster. To enable the component, go to SQL Server 2005 Surface Area Configuration > Surface Area Configuration for Features > xp_cmdshell and select the Enable xp_cmdshell checkbox. After the Recovery Cluster creation is complete, the component can be safely disabled. Recovery Solution Reference Guide 28 To check or change the SQL authentication mode 1. Open the SQL Server Enterprise Manager (Start > Programs > Microsoft SQL Server > Enterprise Manager). 2. Right-click the SQL Server group you want to configure. 3. Click Properties. 4. Click the Security tab. 5. Under Authentication, select SQL Server and Windows. 6. Click OK. 7. Stop and restart the SQL service. For more information, see your SQL Server documentation. Install the Altiris Agent All potential servers and computers you want to manage must have the Altiris Agent installed if you have not done so already (through the use of other Altiris solutions that require the agent). When installing the agent, you specify the computers on which to install the agent. For large numbers of computers, you can use the Resource Discovery and Network Discovery features of Notification Server to discover the computers on your network and create a list from which you can select the computers on which to install the agent. If you have only a few computers to manage, such as during an evaluation, you can skip computer discovery and perform the agent installation procedure. Resource Discovery is used to discover Windows computers. The following procedure describes how to use this feature. Network Discovery can discover computers using Ping, Circular DNS resolution, SNMP, and NetBIOS name and domain. You can discover Linux/UNIX, Mac OS, and Windows computers. For details, see the Network Discovery Product Guide, which you can access from the Altiris Web site (altiris.com/support/documentation) or the Altiris Documentation page in the Altiris Console. You need administrator rights to install the Altiris Agent. For more information on the Altiris Agent, see the Notification Server documentation. To discover Windows computers using Resource Discovery 1. On the Notification Server computer, select Start > All Programs > Altiris > Altiris Console to open the Altiris Console. 2. In the console, click the Configuration tab. 3. In the left pane, select Configuration > Server Settings > Discovery Methods > Resource Discovery. 4. In the content pane, click and select the domains in which to search for computers. Optionally, enter the name of a domain and click 5. . Select the discovery methods you want to use. You must select at least one method. Recovery Solution Reference Guide Select the Domain Browse List option to discover computers (including Windows 98) that are currently sharing files. 29 Select the Domain Membership option to discover computers that have trust accounts in the domain and are running Windows NT, 2000, XP, and 2003. This method will not find any Windows 98 computers. 6. Click Discover Now. 7. After the discovery process completes, click Apply. The computers in the specified domains are discovered and can be selected to receive the agent. To install the Altiris Agent This procedure does not work with Windows 98 computers. For these operating systems, see the “Pull Method” in the Notification Server documentation. 1. On the Notification Server computer, select Start > All Programs > Altiris > Altiris Console to open the Altiris Console. 2. In the console, click the Configuration tab. 3. In the left pane, select Configuration > Altiris Agent> Altiris Agent Rollout> Altiris Agent Installation. 4. In the content pane, do one or both of the following: If you did not perform a computer discovery (because you only have a few computers on which you want to install the agent, such as during an evaluation) or you want to specify a computer manually, enter the name of the computer on which you want to install the agent in the field next to the Add button, and then click Add. Repeat this for all computers on which you want to install the agent. If you performed a computer discovery, click Select Computers. In the dialog that opens, select the computers to which you want to install the agent. Click OK. Note The fact that a computer can be discovered does not mean that you can push the agent to it. The computer must be running an operating system that supports having agents pushed to it. 5. Click Install Altiris Agent. The Options page opens to let you set configuration properties for the Altiris Agent. 6. Select the Show the Altiris Agent icon in the system tray option. 7. Click Proceed with Install. The Altiris Agent is installed to the computers. Recovery Solution Client Component Requirements The Recovery Agent is installed on Windows-based client computers. Recovery Agent Requirements This section lists the requirements for the Recovery Agent in the following topics: z Requirements for Running the Recovery Agent in Server-based Mode (page 31) z Requirements for Running the Recovery Agent in Local Mode (Local Recovery) (page 33) Recovery Solution Reference Guide 30 z Important Issues with Using the Recovery Agent and BootWorks Partitions (page 34) Requirements for Running the Recovery Agent in Server-based Mode Minimum Requirements (server-based) Operating System One of the following: z Windows Vista (32-Bit or 64-Bit Edition) z Windows Server 2003 (32-Bit or 64-Bit Edition) z Windows XP Professional (32-Bit or 64-Bit Edition) z Windows 2000 SP4 (Professional, Server, or Advanced Server) z Windows 98 SE (Second Edition) Note Multi-boot configurations are not supported. Additional Software z Microsoft Internet Explorer 5.0 or later Disk Space z At least 10 MB of free disk space is required to store client software. z Additional free disk space might be needed for DCOM and Dial-Up Networking updates required to use Recovery Solution. z For Full System Snapshot with Full System Recovery capability: Requires additional free disk space (after installation) equivalent to the size of the Windows registry. (20 MB should be sufficient in most cases.) z For recoveries (including Full System Recovery): Free disk space required is the greater of 1% of total disk space, or the size of the largest file on the drive. z TCP/IP network or RAS connection z Windows domain account for each user z If you have a firewall, you must have ports 80, 137, and 43190 opened in order for the Recovery Agent to register with the Recovery Solution Server. z 10 Mbit connection recommended for first snapshot z 28 Kbit or faster connection for subsequent Full System Snapshot Windows Networking Network Connection Recovery Solution Reference Guide 31 Other Hardware Display Altiris Software Recovery Solution Reference Guide For Full System Recovery z Bootable CD-ROM or DVD-ROM drive, or z CD-ROM or DVD-ROM drive and 3.5-inch 1.44 MB floppy drive z Full System Recovery currently does not support the use of software RAID controllers. A limited number of hardware RAID adapters is supported. z 800 x 600 or greater screen resolution z 256 or more colors z Altiris Agent 6.0 or later 32 Requirements for Running the Recovery Agent in Local Mode (Local Recovery) Minimum Requirements (Local Recovery and Local Recovery Pro) Note The Standard version of Local Recovery can only be installed on computers manufactured by Altiris partners. Local Recovery cannot be installed and run on computers with AMD K6-2 processor. Operating System One of the following: Microsoft Windows 2000 SP4 Microsoft Windows XP Home Microsoft Windows XP Professional (32-Bit or 64-Bit Edition) Microsoft Windows Server 2003 (32-Bit or 64-Bit Edition) Microsoft Windows Vista (32-Bit or 64-Bit Edition) Disk Drives and Space The following drive types are supported by Local Recovery and Local Recovery Pro: IDE Serial ATA* SCSI* Note To run the Recovery Agent in local mode, you must have enough free space on the local hard drive to store your snapshots. We recommend that you have between 40% and 50% of your hard drive free of space. This free space must exist within the existing primary partition for Local Recovery. Non-partitioned free space is not required. The Altiris Partition requires contiguous free space on the drive. For best results, run a disk defragmentation utility on the drive before installing. If the drive does not have enough contiguous free space, you will get an error stating “Altiris Recovery Agent failed to create initial image of the system.” For more information, see “Troubleshooting: Problems Installing the Local Partition” in the Recovery Solution Reference Guide. Display Other Hardware Local Mode Prerequisite Package z 800 x 600 or greater screen resolution z 256 or more colors For Full System Recovery from DVD z Bootable DVD-ROM drive The Local Mode Prerequisite Package contains the Recovery Agent Partition component and must be distributed to clients prior to running the Local Recovery Agent setup. *For a list of supported devices, see Hard Disk Support on page 297. Recovery Solution Reference Guide 33 Important Issues with Using the Recovery Agent and BootWorks Partitions Note The following information only applies to Deployment Solution 6.1 or older. Newer versions of Deployment Solution are compatible with Recovery Agent. Recovery Solution, when configured to run in local snapshot mode, stores the contents of snapshots in the hidden Altiris Partition on the computer’s hard drive. If you use Altiris® Deployment Solution™, computers may already have an embedded BootWorks partition on the hard drive. Currently, it is not possible for an embedded BootWorks partition and the Altiris Partition to reside simultaneously on the same physical drive. If you have an embedded BootWorks partition and you want to install the Recovery Agent and create an Altiris Partition, you will have to first uninstall the BootWorks partition (otherwise the Recovery Agent installation will be stopped). If you wish to use a BootWorks partition and have computer backup and recovery capabilities, you must use Recovery Solution in server-based mode only. Caution If you have the Recovery Agent and the Altiris Partition installed on a computer, and then you install a BootWorks partition, the BootWorks partition will not recognize that the Altiris Partition exists and, without warning, will delete the Altiris Partition and all snapshot data and the space will be lost! Uninstalling BootWorks If you want to uninstall BootWorks so you can use an Altiris Partition, you can use one of the following methods: z Using the bwinst -u command z Using Boot Disk Creator to create a BootWorks Windows Uninstall Package that can be deployed to computers For more information, see the “Uninstall BootWorks” section in the Altiris Deployment Solution Product Guide. Installing Recovery Solution Server Components This section contains instructions for installing Recovery Solution on your Notification Server. z Installing Recovery Solution Program Files (page 34) z Creating a Recovery Solution Cluster (page 36) z Adding Recovery Solution Servers to a Recovery Cluster (page 40) z After Server Installation Is Complete (page 41) Installing Recovery Solution Program Files After Notification Server has been installed, you can install Recovery Solution. The installation creates log files that record operations and errors that occurred during installation. For more information, see Check for Errors on page 41. Recovery Solution Reference Guide 34 Caution Do not install an evaluation version of Recovery Solution on a computer that already has a licensed installation of the solution. Doing so might cause loss of protected data. Notes You must be logged onto the computer as a user with administrative rights in order to install the solution. The Windows computer name of the server must contain only letters (a–z), numerals (0–9), and the hyphen character (-), and it must be no more than 15 characters long. In addition, the DNS host name configured in TCP/IP properties must match the Windows computer name. Make sure that file sharing for Microsoft networks is enabled before you start Setup. During installation, if you see an error message indicating that Setup could not start the SQL ServerAgent service, then the service is already started. You must stop the service manually using Control Panel before you can continue the installation. If you configure Recovery Solution to use a different database server than the Notification Database server, and if the Recovery Solution DBMS is configured with a different collation than the Notification Server's DBMS, then some reports may not run properly. To avoid this problem, make sure the DBMS on each database server is configured to use the same default collation. If the server has an A4 Tech Mouse, make sure that the A4 drivers are installed. If you rely on the default Windows mouse drivers, Recovery Solution Server Setup might not be able to complete successfully. If an error appears saying that the installer has insufficient privileges, as a workaround, you can try clicking Retry in the error dialog. To install Recovery Solution 1. 2. Access the Recovery Solution setup file: Option 1: From the Altiris Console through the Solution Center Option 2: From the files downloaded from the Altiris Web site Start the installation: a. In the Altiris Console, click the Getting Started tab. b. Click Install Altiris Solutions from the Solution Center. c. At the top of the page, under the Available Solutions tab, click the Solutions button. d. Click Altiris Recovery Solution. e. Click Start. This extracts the setup files and launches the installation wizard. 3. From the setup wizard Welcome page, click Next. To accept the license agreement, click I accept the terms in the license agreement and click Next. Recovery Solution Reference Guide 35 4. To start the installation, click Install. 5. After Recovery Solution has been installed, click Finish. The program files will be installed on the computer. You must now create a Recovery Solution cluster even if you are going to have a single server. By default, after you have installed Recovery Solution, the Cluster Creation Wizard will open automatically. For more information, see Creating a Recovery Solution Cluster on page 36. Note If the Web page does not appear, you need to add the host name to the trusted sites for internet explorer. Creating a Recovery Solution Cluster After you have installed the Recovery Solution program files, you need to create and configure a Recovery Solution Cluster. You must create a cluster even if you are going to have only one Recovery Solution Server. The Cluster Creation Wizard guides you through the cluster creation process. Note For information on how to configure a dedicated Recovery Solution Server for handling only server jobs, see General Settings on page 97. To create a Recovery Solution Cluster using the Cluster Creation Wizard 1. By default, after you have installed Recovery Solution, the Cluster Creation Wizard will open automatically. If you need to launch the wizard manually, do the following: 2. a. Open the Altiris Console by selecting Start > Programs > Altiris > Altiris Console. b. Click the Configuration tab, then select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Rollout. c. Click the Recovery Solution Cluster Creation. d. In the right content pane, click Launch Cluster Creation Wizard. Specify the cluster name. These values can be changed later. a. Enter a cluster name. This name will appear in the Altiris Console and will not be visible to client computers. b. Enter a cluster network address. This is how the cluster will be identified to client computers. If this will be a non-balanced cluster (containing only one Recovery Server), then you can use either a name (such as the Recovery Server computer name) or the server IP address. The name and the address can be the same if you choose to do so. If this will be a balanced cluster (containing more than one server), then enter the address of the virtual HTTP server created on the load balancer. For more information, see Configuring the Load Balancer on page 27. Recovery Solution Reference Guide 36 3. c. (Optional) If you want to configure a balanced cluster, select the Enable cluster load balancing support checkbox. d. (Optional) Enter the IP address or DNS name of the load balancer. e. Click Next. Specify the communication protocol. You can choose from three connection types: DCOM HTTP HTTPS If you are configuring a balanced cluster, you can only choose either HTTP or HTTPS. If you are using a non-balanced cluster, you can use any of the three. Generally, using DCOM can provide faster communication by as much as 10-20%. However, DCOM may not work well behind firewalls or on slow WAN connections. In those cases, HTTP is the preferred option. Notes This setting is for how the Cluster will communicate to the Client for the install of the Recovery Agent. The Agent can be configured to use a different protocol after install has completed. For HTTP and HTTPS, ports 8080 and 8081 should not be used as binding ports used by Recovery Solution if Altiris Deployment Server is installed on the same Notification Server. Both HTTP and DCOM are used for communication between Recovery Solution Server and Notification Server. 4. Enter the SQL server name that you want the Recovery Solution Database installed on. You can specify either a local or remote instance of a SQL server. Caution If you are using the Microsoft SQL 2005 Server, the sys.xp_cmdshell component is required before you can proceed creating the Recovery Cluster. To enable the component, go to SQL Server 2005 Surface Area Configuration > Surface Area Configuration for Features > xp_cmdshell and select the Enable xp_cmdshell checkbox. After the Recovery Cluster creation is complete, you can safely disable the component. Local Instance Notes By default, setup uses the default instance of the local SQL server (MSSQLSERVER). If the default instance of the local SQL server is not found, then the cluster creation wizard will try to enumerate non-default local SQL instances. If more than one nondefault instances is found, setup will use the first found instance and the user will be informed by a Multi-Instance SQL Server page. The SQL server instance that will be used will be displayed. The full SQL server name is specified in the following format: Recovery Solution Reference Guide 37 <SQL Server_name>\<SQL instance name> For a default SQL server instance (MSSQLSERVER) the name of the SQL server is: <SQL Server_name> a. Select one of the following authentication modes that you use to connect to the SQL server: Windows authentication (logged on user) SQL Server login - particular SQL server user The specified account must have administrative rights for the selected SQL server. For more information, or if you get an error about Windows authentication, see Configuring the SQL Database on page 28. b. Click Next. If you get an error that the server cannot be found, click Back to go to the Connection Type page, and click Next again. 5. Configure the database and data storage options. Caution Do not place the SQL Server database and log in a compressed or encrypted location. a. Accept the default database name or specify a new one. b. Specify the storage location and the size and location of your Recovery Solution database. The path must be local to the SQL Server computer. c. Specify the storage location and the size and location of your Recovery Solution log. The path must be local to the SQL Server computer. d. Specify the user name and password that will be used to connect to the Recovery database. Note If another cluster already exists on the server computer, the existing user name and password will be used. To change the existing Recovery database user credentials, see General Settings (page 97). Caution Two or more Recovery Solution clusters created on one or more server computers and connecting to the same SQL server must use the same Recovery database user credentials. e. 6. Click Next. Configure data storage points and their size. a. Enter the data (blob) file size in Mb. The maximum size of a single data file is 2000 Mb. b. To add a storage location, click Add (you must specify at least one location). Data storage location. To use a data location on the same computer where Recovery Solution Server will be installed, enter a local path, such as C:\AeXRSData. To use a data location on a different computer, enter an IP Recovery Solution Reference Guide 38 address, DNS name, or computer name where hard drive space will be used. The format for entering this information is \\<servername>\<sharename>\<directory>. Note A local server path cannot be used in a balanced cluster. Maximum space (Mb): Enter a maximum space limit (Mb), or enter 0 for unlimited. This is the maximum amount of space on this location to be used. Example: if you set a 1000 Mb maximum space limit and 200 Mb data file size, then 5 data files can be created on this location. If this is a remote location, provide authentication credentials. Notes Use domain (not local) user credentials, otherwise the storage location will be inaccessible. You probably do not have to specify credentials for local storage locations. A remote share permissions and folder security must be configured to allow full access to the user accessing the share. You must not add network storages located on computers from domains, which are not trusted by the Recovery Server domain. Also, do not use the credentials of users from the non-trusted domains to access the storage locations. Storage status will be reported ‘Inaccessible’ after adding such storages. The reason is that Recovery Server cannot be impersonated under a user account from a nontrusted domain. 7. c. Click OK. d. Click Next. Configure Recovery Solution Server users. The two default groups are: AeXRS_Users Each member of this group will be given the access rights to protect its own data with Recovery Solution. AeXRS_Managers Each member of this group will be given the access rights to other users’ data through Web Based File Recovery and Migration utility. User Group is the name of Microsoft Domain Group to be used by Recovery Solutions Users are a list of the current users in that group. You can either add more users to or remove users from this group. a. To remove a user, highlight the user you want to remove and click remove. b. To add user or group, click add, see To add a user or domain group to a Recovery Solution Cluster (page 108). Recovery Solution Reference Guide 39 c. Enable the Allow web-based restoration for all users option to allow for Web Based File Recovery to be available for all protected users after the cluster creation. d. Click Next. 8. Review the Recovery Solution Server Summary to confirm your selections. 9. To proceed with your selections, click Next. 10. To make any changes, click Back and change your selection options and then finish the wizard. After completing the wizard, an empty cluster is created. You must add at lease one server to the cluster. To see and manage the cluster settings, click the cluster node under the Recovery Cluster Configuration folder. For more information, see Recovery Solution Cluster Configuration (page 96). Adding Recovery Solution Servers to a Recovery Cluster After you have created a cluster, you can add one or more servers to the cluster. Notes You should avoid adding stand-alone servers, which are not members of a trusted domain or use local authentication, to a Recovery Solution Cluster, because your protected users will not be able to authenticate on such servers. The problem can appear even when Recovery Server is a member of a trusted domain if this domain has no trust for all the domains where Notification Server has trusting set up. If no servers offered for installation in Recovery Solution Server Install policy. The problem may appear because of following reasons: You have not Windows Servers with Altiris Agent installed. Recovery Solution Server can only be installed on either Win2003 or W2k Server. All your Windows Servers already have either Recovery Solution Server or Recovery Solution Agent installed. Recovery Solution Server cannot be installed to computer with Recovery Solution Agent. Inventory is not yet received from this server or collections not yet updated. To resolve the problem go to the Recovery Solution Cluster Configuration folder -> “Computers where Recovery Solution Server can be installed” collection and press Refresh button. If no computers appeared in the collection after this, then most probably you should wait inventory sending or accelerate the process manually. If you install the Recovery Server on Windows 2003 running Windows Firewall service (enabled by default on Windows 2003 Server with Service Pack 1), the Altiris Recovery Server Host Manager (ping service) will open the port 43190 in Windows Firewall on service start up. This port must be open during Recovery Server operations. To add a server to a cluster 1. Open the Altiris Console by selecting Start > Programs > Altiris > Altiris Console. Recovery Solution Reference Guide 40 2. Click the Configuration tab, then select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 3. Click the Recovery Solution Server Install task. 4. In the right content pane, select the cluster you want to add a server to. 5. Click the Add Server 6. Select the computer you want to install as a Recovery Solution Server. 7. Click OK. 8. (Optional) To override default installation folders, click Installation Settings. 9. Select the Cluster to install the server to. icon. 10. Click Install Server. 11. You can accept the default installation settings or changes them. Click Proceed with Install. It will take a few minutes for the server component to install. The rollout page shows the status of the server rollout process. Click the Refresh the page. icon to refresh Note If you install Recovery Server on Windows 2003 without a service pack, the Internet Sharing Configuration dialog box will appear during installation on the server computer asking you to give the C:\Program Files\Altiris\Recovery Solution\Server\Ahms.exe permission to edit this computer’s Internet Connection Protection settings. Click Yes to let the Altiris Recovery Server Host Manager (ping service) open the port 43190 in Windows Firewall. This port must be open during Recovery Server operations. After the installation is complete, the server will appear in the list of servers for the cluster under the Servers tab of the cluster properties page. Altiris Recovery Solution Server will also appear in the Add/Remove Programs list on the computer it was installed on. To view the servers tab of the cluster properties page 1. Click the cluster node in the Recovery Solution Cluster Configuration folder. 2. Click the Servers tab. 3. Click the Refresh icon. After Server Installation Is Complete After the Setup program for Recovery Solution Server is complete, you should perform the following steps before continuing. Check for Errors The Recovery Solution Server installation creates log files that record operations and errors that occurred during installation. The log files are text files that you can open in a text editor (such as Notepad). If any problems occurred, you should see them listed Recovery Solution Reference Guide 41 here. AeXCRSS.log lists all the high and medium level operations that server setup performed. During installation, AeXCRSS.log is created in the temporary folder that is used for server installation (by default, C:\WINNT\Temp). After installation is complete, this file is copied to the folder where the Recovery Solution Server is installed (by default, C:\Program Files\Altiris\Recovery Solution\Server). You may want to open these files to verify that there are no error messages before continuing with your use of Recovery Solution. Schedule Automatic Updates of Report Data For more information, see Using Recovery Solution Reports and Job Queue on page 153. Installing Recovery Solution Client Components For information, see Recovery Solution Agent Installation on page 51. Upgrading Recovery Solution Before upgrading Recovery Solution we strongly recommend making a full offline backup of the Recovery Solution SQL Server database. For information, see Recovery Solution Infrastructure Backup and Restore on page 290. Important Upgrades from versions earlier than Recovery Solution 6.1 are not supported. For information on upgrading previous Recovery Solution installations to version 6.1 or later, see corrensponding solution documentation. Upgrading from a previous 6.2 version or 6.1 requires the following steps: To install Recovery Solution through the Solution Center 1. In the Altiris Console, click the Getting Started tab. 2. Click Install Altiris Solutions from the Solution Center. 3. At the top of the page, under the Available Solutions tab, click the Solutions button. 4. Click Altiris Recovery Solution. 5. Click Start. This extracts the setup files and launches the installation wizard. 6. To start the installation, click Install. Note By default, after you have installed Recovery Solution, the Recovery Solution Cluster Upgrade policy will open automatically after the completing of the Solution upgrade. See also: Upgrading Recovery Solution Clusters (page 42) Upgrading Recovery Solution Clusters After you have upgraded the Recovery Solution program files, you must upgrade your Recovery Solution Clusters. Recovery Solution Reference Guide 42 During the installation on Recovery Solution, a Recovery Solution Cluster Upgrade policy is created. Use this policy to perform the upgrade process. To upgrade a cluster 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab, then click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Rollout. 3. Click the Recovery Solution Cluster Upgrade node. 4. (optional) Select After Cluster upgrade, automatically start Recovery Solution Server(s) upgrade. 5. In the right pane, click Start Upgrading Clusters. The Cluster begins to upgrade. If the After Cluster upgrade, automatically start Recovery Solution Server(s) upgrade checkbox was selected, the servers also upgrade; otherwise, you must, otherwise you must upgrade the servers manually. When the upgrade is completed you will need to restart the computer. It will take a few minutes for the server component to install. To view the status of the server upgrade or to launch upgrade of the servers manually, see the Servers tab of the cluster properties page or the Recovery Solution Server Upgrade policy on the Configuration tab of the Altiris Console (Configuration > Solution Settings > Incident Management > Recovery Solution Clusters > Recovery Solution Cluster Configuration). Notes After Recovery Server is upgraded, Recovery Solution Agent needs to be upgraded on client computers. For details, see Upgrading Recovery Agent on page 66. If the server upgrade failed, you can restart the upgrade by executing Setup.exe from \\<NS Server>\NSCAP\Bin\Win32\X86\Recovery Server Package location. The Start Recovery Solution Server(s) upgrade will only create and activate a Recovery Solution Server software delivery policy that may arrive at the Recovery Solution Server computer after a delay (when the computer requests the configuration from the Notification Server). If you wish to speed up the policy delivery process, on the Recovery Solution Server computer, use the Altiris Agent to request the configuration (right-click on the Altiris Agent Icon, select the Altiris Agent details and then click Update Configuration). We do not recommend clicking Reboot the computer(s) with the Recovery Solution Server after a successful upgrade is completed if Recovery Solution Server is installed on the same machine with Notification Server or there are several Recovery Solution Clusters installed on the Notification Server. It is possible that the Notification Server computer restart during the Recovery Solution SQL database upgrade may corrupt the database. Recovery Solution Reference Guide 43 Licensing Recovery Solution Each Altiris product comes with a 7-day trial license that is installed by default. You can register and obtain a 30-day evaluation license through our Web site at www.altiris.com or purchase a full product license. To view your current license, open the Altiris Console, click the Configuration tab and then Licensing. For more information, click the help button on the Licensing page. Uninstalling Recovery Solution This section describes how to uninstall Recovery Solution: z Uninstalling a Recovery Solution Cluster (page 44) z Uninstalling a Recovery Solution Server (page 44) z Uninstalling the Recovery Solution (page 45) Note We recommend uninstalling the Recovery Agent software from the client computers before uninstalling the solution. For details, see Uninstalling the Recovery Agent on page 73. Uninstalling a Recovery Solution Server This section explains how to uninstall an existing Recovery Solution Server. To uninstall a Recovery Solution Server 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab, and then click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 3. Click the Recovery Solution Server Uninstall node. 4. Select a cluster to view a list of servers assigned to that cluster. 5. Select the server to uninstall. 6. Click Uninstall Server. 7. Click Yes to confirm that you want to uninstall the server. Uninstalling a Recovery Solution Cluster This section explains how to uninstall an existing Recovery Solution Cluster. This will uninstall all servers assigned to this cluster, the database is deleted, and then the cluster is deleted from the Notification Database. Recovery Solution Reference Guide 44 Note This does not remove the BLOB files in the storage. You must manually delete the files after deleting the storage. All Recovery Servers attached to the cluster will be automatically uninstalled after the cluster removal. To uninstall a Recovery Solution Cluster 1. Open the Altiris Console by selecting Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab, and then select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Uninstall. 3. Click the Recovery Solution Cluster Uninstall node. 4. Select the cluster to uninstall. 5. Click Start Uninstalling Cluster. 6. Click Yes to confirm that you want to uninstall the cluster. Uninstalling the Recovery Solution This section describes how to uninstall Recovery Solution from the Notification Server. For information on uninstalling the Recovery Agent, see Uninstalling the Recovery Agent (page 73). To uninstall Recovery Solution and/or the Recovery Solution Server 1. From the Windows Start menu, select Settings > Control Panel Add/Remove Programs. 2. Click the component that you want to remove. The Altiris Recovery Solution Server and Altiris Recovery Solution (the application) are separate items. For a complete uninstall, remove both. 3. Click Remove. 4. Follow the instructions on the screen. For more information on uninstalling Notification Server components, see the Altiris Notification Server Help. Recovery Solution Reference Guide 45 Chapter 3 Getting Started with Recovery Solution The Getting Started tasks guide you through the basic setup, configuration, and use of Recovery Solution. Each task has a procedure and, in many cases, exercises to illustrate the steps of the procedure. There are two methods for performing each task: the Quick Start page and the Altiris Console. The Altiris Console is the primary interface for Altiris solutions. The Quick Start page provides access to setup, configuration, and basic tasks in a central location. You can access the Quick Start by doing the following: From the Altiris Console: 1. In the Altiris Console, click the Tasks tab. 2. In the left pane, select Tasks > Quick Starts. 3. In the content pane, select Recovery Solution Quick Start. From the Start Menu 1. In the Start Menu, click Start > Programs > Altiris > Quick Starts> Recovery Solution. Getting Started tasks z Creating a Recovery Solution Cluster (page 47) z Adding Recovery Solution Servers to Clusters (page 47) z Installing the Recovery Agent (page 47) z Configuring a Recovery Solution Cluster (page 49) z Monitoring the Recovery Solution Job Queue (page 49) z Running Reports (page 50) z Running Recovery Solution Utilities (page 50) z Verifying the Recovery Agent Installed (page 49) Prerequisites for Getting Started tasks z Notification Server 6.0 SP3. z Recovery Solution installed on the Notification Server. See Installing Recovery Solution (page 26). z One or two client computers to be configured as protected computers. See Recovery Agent Requirements (page 12). z Configure and install the Altiris Agent on the client computers. See Install the Altiris Agent (page 29). Recovery Solution Reference Guide 46 Note The Altiris Agent is not required in order to install and use stand-alone Local Recovery or Local Recovery Pro Agent. Creating a Recovery Solution Cluster By default, you had the option to create a Recovery Solution Cluster when you installed Recovery Solution. If you have not yet created a cluster, you can do so now. You must create a cluster before you can install any Recovery Solution Servers. To create a new cluster 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab and select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Rollout. 3. Click the Recovery Solution Cluster Creation node. 4. In the right pane, click Launch Cluster Creation Wizard. For information, see Creating a Recovery Solution Cluster (page 36). Adding Recovery Solution Servers to Clusters After you have created a cluster, you must add one or more servers to the cluster. To add a server to a cluster 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab and select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 3. Click the Recovery Solution Server Install task. The wizard will guide you through the process of installing a server. For information, see Adding Recovery Solution Servers to a Recovery Cluster (page 40). Installing the Recovery Agent Recovery Solution provides different options for installing the Recovery Agent on client computers. For information, see Recovery Agent Installation Options (page 51). Using Notification Server polices is the easiest way to roll out (push) the Recovery Agent to computers on your network is . To use rollout polices, the target computers must be discovered and have the Altiris Agent installed. It is helpful to have a working knowledge of policies, packages, programs, and collections (see the Altiris Notification Server Help). For information on installing the Altiris Agent, see Install the Altiris Agent (page 29). By default, these policies will perform tasks without any user intervention and will not cause a restart of the client computer. Recovery Solution Reference Guide 47 Note The user should manually restart the computer before using the Recovery Agent. You can also configure the policy to force a restart if your choose. Each policy uses the Recovery Agent installation file, AgentSetup.exe, with various command-line switches. AgentSetup.exe is located in the following folder: C:\Program Files\Altiris\Notification Server\NSCap\Bin\Win32\X86\Recovery Agent Package Install the Recovery Agent using rollout policies 1. From the Altiris Console, click the Configuration tab. 2. In the left pane select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Rollout. 3. Click the RS Agent Install policy. 4. In the right pane, select the Enable checkbox to enable the policy. 5. Verify the program name is configured for Install RS Agent. 6. (Optional) To have the client computer automatically restarted as part of the task, select the Reboot computers checkbox. Note The users logged on the client computers will be shown the default reboot prompt dialog that contains countdown timer and if user neither clicks Snooze nor Restart, the computer will be restarted automatically in 60 seconds. If no user is logged on at the target computer, the reboot will be performed automatically. The default reboot prompt will be shown or automatic reboot will be performed even if Recovery Agent rollout fails, if the Reboot computers checkbox was selected. 7. (Optional) To prevent the agent from performing an initial snapshot select the Disable initial snapshot checkbox. 8. Select the collection that the policy will use. This is the group of computers the policy will be run on. You can use the default or click the collection link to change or add other collections. Note If you are evaluating Recovery Solution solution in a lab environment, you can use the default collection and scheduling options. 9. Select the policy scheduling options. For information on configuring policies, see the Altiris Notification Server Help. 10. Click Apply. Recovery Solution Reference Guide 48 Verifying the Recovery Agent Installed You can view a collection that includes all the client computers that have the Recovery Solution Agent installed. To access the Computers with RS Agent Installed collection 1. From the Altiris Console, click the Configuration tab. 2. In the left navigation pane, click Configuration > Solution Settings > Incident Management > Recovery Solution> Recovery Agent Rollout > Computers with RS Agent installed. Several other collections available on the Configuration tab are useful for deploying Recovery Agent and tracking the agent status on client computers. These collections are located at Configuration > Solution Settings > Incident Management > Recovery Solution> Recovery Agent Rollout. Configuring a Recovery Solution Cluster You can configure the settings for cluster at any time. You can configure server job schedules, event notifications, storage management, and communication settings. You can also manage Recovery Servers and cluster users. To modify cluster settings, use the cluster properties page. To configure an existing cluster 1. In the Altiris Console, click the Configuration tab. 2. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 3. Click the cluster node. For more information on configuring clusters, see Recovery Solution Cluster Configuration (page 96). Monitoring the Recovery Solution Job Queue The Recovery Solution Clusters Job Queue shows all currently running jobs on all clusters. Monitoring the job queue enables you to monitor the job queue. To open the Recovery Solution job queue 1. In the Altiris Console, click the Reports tab. 2. Select Dashboards > RS Cluster Job Queue. This will show all currently running Jobs on all clusters. 3. Click the Show pending jobs icon to show all scheduled jobs as well as currently executing jobs on all clusters. 4. Click the Hide pending jobs icon Recovery Solution Reference Guide to show only current running jobs. 49 5. Click the Refresh the job queue icon to update the current view. Note You can see more details on a client job (like snapshot or rollback) by right-clicking on the job in the list and selecting Details from the drop-down menu. Running Reports Recovery Solution provides the following types of reports: z Client Reports z Local Reports z Server Reports To access Recovery Solution reports 1. In the Altiris Console, click the Reports tab. 2. In the right navigation pane, click the report type and the report you want to use. For more information about reports, see Using Recovery Solution Reports and Job Queue (page 153). Running Recovery Solution Utilities Recovery Solution includes the following utility programs: Tasks Link to information Convert encrypted files on FAT partitions Convert Encrypted Files on FAT Partitions (page 128) Erase the protected computer’s partition table Erasing the Partition Table (page 146) Manage Agent Setup package Manage Agent Setup Packages (page 127) Restore data from Full System Recovery CD or DVD-ROMs Restoring Data From Full System Recovery Media (page 146) Restore data using the Migrate utility Restoring Data with the Migration Utility (page 130) To access Recovery Solution utilities 1. In the Altiris Console, click the Tasks tab. 2. In the left pane, click Tasks > Incident Management > Recovery Solution. Recovery Solution Reference Guide 50 Chapter 4 Recovery Solution Agent Installation The Recovery Agent is software that is installed on computers that allows files on that computer to be backed up. The Recovery Agent can back up files to the Recovery Server (server-based mode), or it can back up files to a special Altiris Partition on the local computer (local mode). In server-based mode, computers that have the Recovery Agent installed and have their files backed up to a Recovery Server are called protected computers. Note If you are using Deployment Solution, before you install the Recovery Agent in local mode, please read Important Issues with Using the Recovery Agent and BootWorks Partitions on page 34. This section describes how to install the Recovery Agent on client computers. The following topics are covered: z Recovery Agent Requirements (page 51) z Recovery Agent Installation Options (page 51) z Installing the Recovery Agent in Server-based Mode (page 52) z Recovery Agent Reinstallation and Repair (page 59) z Installing the Recovery Agent in Local Mode (page 60) z Installing the Recovery Agent in Mixed Mode (page 65) z Installing Recovery Agent Using an Image (page 66) z Upgrading Recovery Agent (page 66) z Using Recovery Agent Rollout Policies (page 67) z Recovery Agent Setup Command-Line Switches (page 69) z Uninstalling the Recovery Agent (page 73) Recovery Agent Requirements The Recovery Agent is installed on Windows-based client computers. For a list of requirements, see Recovery Solution Client Component Requirements on page 30. Recovery Agent Installation Options How you install the Recovery Agent on protected computers depends on the mode you will be running the agent in. It also depends on whether you are using Recovery Solution or Local Recovery Pro with Notification Server, or if you are using Local Recovery or Local Recovery Pro stand-alone. Before installing the Recovery Agent, please read Recovery Solution Client Component Requirements on page 30. Recovery Solution Reference Guide 51 For installation instructions, refer to the following sections: z Installing the Recovery Agent in Server-based Mode on page 52 z Registering the Recovery Agent in Server-based Mode on page 56 z Installing the Recovery Agent in Local Mode on page 60 z Installing the Recovery Agent in Mixed Mode on page 65 z Installing Recovery Agent Using an Image on page 66 The following topics are also available: z Upgrading Recovery Agent on page 66 z Using Recovery Agent Rollout Policies on page 67 z Recovery Agent Setup Command-Line Switches on page 69 z Uninstalling the Recovery Agent on page 73 Installing the Recovery Agent in Server-based Mode When the Recovery Agent is installed in server-based mode, snapshots are stored on the Recovery Server. Any of the following methods can be used to deploy the Recovery Agent in server-based mode: z Recovery Agent Installation Policies (‘Push’ Installation) on page 53 z Interactive Web-Based Agent Setup Wizard (‘Pull’ Installation) on page 53 z Unattended Recovery Agent Installation on page 55 Before you actually deploy the Recovery Agent to users, we recommend that you install the software on one or more computers with typical configurations, then perform snapshots on these computers. This seeds the server with common files, making snapshots faster for other users. To learn more, see Data Protection Performance on page 254. Before deploying the Recovery Agent, you might want to complete the following items: Configuring Recovery Agent Settings (page 75) Full System Recovery Setup (page 133) Notes You can cause the data protection components (which allow snapshots and recoveries) to be disabled by default for all protected computer installations. This might be useful if you want to deploy the software but not activate it immediately. To disable protected computers by default, click Disable Computers By Default on the RS Agent Install policy. For protected computers running 2000/XP/2003, a user with administrator rights on the protected computer must be logged on in order to install the Recovery Agent. No special rights are required to use the software after it is installed. For protected computers running Windows 98, usernames, passwords, and domain names cannot contain extended ANSI characters. These characters have character codes greater than 127 and are commonly used in non-English languages (Example: umlauts and characters with accents). They cannot be used with Recovery Solution Recovery Solution Reference Guide 52 because of a limitation in the Microsoft DCOM security component. Make sure that the Windows domain authenticating user accounts do not have names that contain these characters, and that the usernames and passwords for Windows 98 users with access to Recovery Solution do not contain these characters either. The user who installed Recovery Agent on a protected computer can also re-install it if needed. If users encounter installation problems, see Troubleshooting User Installations on page 208. After the server is upgraded, each protected computer is automatically upgraded the next time it connects to the server. For more information, see Upgrading Recovery Agent on page 66. Recovery Agent Installation Policies (‘Push’ Installation) Using Recovery Agent installation polices, you can deploy (push) the Recovery Agent to computers. This is the recommended way to install the Recovery Agent. For more information, see Using Recovery Agent Rollout Policies (page 67). Interactive Web-Based Agent Setup Wizard (‘Pull’ Installation) The Interactive Web-Based Agent Setup Wizard is an easy method of deploying the Recovery Agent because it requires no interaction on the part of the administrator. Users simply access and run the setup wizard through a Web browser to install the software and create an account on the server. The interactive wizard is setup automatically during installation of the Recovery Server if the server has Microsoft Internet Information Server (IIS) version 4.0 installed. Notes A server must be installed into the Recovery Solution Cluster. Users must authenticate using a domain account. This option is available only if the program files for the server are installed on a drive formatted with the NTFS file system. If the server is already installed but the Web-based Setup wizard is not available (because IIS was not on the server at the time of installation), you can install IIS on the server, then “upgrade” the Recovery Server. Setup then configures the Web-based Setup wizard using IIS. You will not lose any data as long as you click the Upgrade option. To successfully install Recovery Agent from the Web-based Setup wizard, users must be running Microsoft Internet Explorer 5.0 or later. If a user is running a version of Internet Explorer older than 5.0, a browser script error will appear when the Web-based Setup wizard is accessed. 64-bit Recovery Agent installation is not available through the Web-Based Setup Wizard. Recovery Solution Reference Guide 53 To install the Recovery Agent using the Setup Wizard 1. Direct users to the following URL: http://IP address/rsagent where IP address is the address of the Recovery Solution Cluster specified when you created the cluster (step 2 on page 36). You can also see the cluster address from the cluster configuration page > General tab > Cluster address: 2. Log in with domain credentials. 3. From the Welcome page, click Next and follow the wizard. 4. Select the mode that you want the Recovery Agent to run in: Install the agent in Server-based mode (go to step 5) Install the agent in Local mode (go to step 6) Install the agent in Mixed mode (go to step 7) For information on the different modes, see Recovery Solution Product Overview on page 13. 5. To install the agent in server-based mode, select the Server-based mode checkbox. 6. To install the agent in local mode, complete the following tasks: a. Select the Local mode checkbox. b. (Optional) Select the Create a partition to store your files automatically checkbox. c. Specify the drive and size of the Altiris Partition. 7. To install the agent in mixed mode, complete both steps 5 and 6. 8. (Optional) Select additional setup options: 9. a. After the agent is installed, the computer must be rebooted. You can specify whether or not to be prompted for the reboot. b. You can skip the initial default snapshot. To continue, click Next. 10. Select the account type: If you are creating a Recovery Solution account for the first time, click Create New Account. If you are using an existing Recovery Solution account, click Re-Install Existing Account. 11. To install the agent and create a new account, do the following tasks: a. To download the wizard, click Install. b. Click Open or Run, not Save. Note After clicking Install, a Microsoft security warning may appear warning that the publisher could not be verified. Continue by clicking Run or Yes to download the AgentSetup.exe. Note that on Windows XP SP2, an additional warning might appear about the cab file. Continue by clicking Install. Recovery Solution Reference Guide 54 The wizard installs the agent. c. After the agent is installed, click Finish to exit the wizard. To complete the installation, you must restart the computer. d. To restart the computer, click Yes. After, the computer has restarted, the Altiris Recovery Agent Registration page opens. e. To create a new account, enter an account login name and password. f. Enter a description of the computer. g. Click Register. The account is created as a Protected User and is associated to the protected computer. 12. To install the agent using an existing account, do the following tasks: a. Select the account login name of the account you want to re-install from the drop-down list. b. Enter the password for the account. c. Click Next. d. To download the wizard, click Install. e. To start the wizard, click Open or Run. The wizard installs the agent. f. When the agent is installed, click Finish to exit the wizard. To complete the installation, you must restart the computer. g. To restart the computer, click Yes. Unattended Recovery Agent Installation You can use AgentSetup.exe to install the Recovery Agent. AgentSetup.exe is available to users through the following network share: \\<Recovery Server name>\agent Example: you can distribute a batch file through e-mail, CD-ROM, or a network share called AgentSetup.exe. You can also use command-line parameters for other installation options. The possible command-line parameters are explained in Recovery Agent Setup Command-Line Switches on page 69. Notes If you are using a load-balanced cluster, unattended Recovery Agent installation from the network share may be unavailable, depending on your load balancer configuration. In this case, you can perform either ‘Push’ or ‘Pull’ Agent installation. Recovery Agent installation does not require user logon and can be performed silently if Recovery Solution Reference Guide 55 Recovery Agent setup was launched with the correct command-line parameters. For details, see Recovery Agent Setup Command-Line Switches on page 69. 64-bit Recovery Agent installation package is not available from the default Recovery Server network share. Registering the Recovery Agent in Server-based Mode This sections provides information that is provided to users in the Recovery Solution User’s Guide. If you install the Recovery Agent in server-based mode, you will need to register an account on the Recovery Solution Server. Caution If you specify [/User:<username>] [/Domain:<domain>] [/Pass:<password>] command-line switches and proper parameters during Recovery Agent setup, account registration will be performed silently, without requiring additional user input. You can modify the default Recovery Agent Setup policy to use these command-line switches if you want the Agent registration to be performed silently upon policy execution. You must make sure that “User account should change password on next logon” option is not enabled for a user account prior to registering the account, otherwise the account registration will fail. The user account password must not be longer than 14 characters. Otherwise, the registration will fail to complete. After Recovery Solution is installed, the agent files are copied onto the computer. A default account is created on the server to provide basic protection. Note On Windows XP and Windows 2003 client computers without a service pack, the Internet Sharing Configuration dialog box will appear upon Altiris Recovery Agent service startup asking to give the C:\Program Files\Altiris\Recovery Soluiton Agent\AeXRSAgt.exe permission to edit Internet Connection Protection settings. Check Do not show this dialog again and then click Yes in the dialog to let the Recovery Agent service modify the Windows Firewall exceptions. The Recovery Agent Registration dialog box is displayed to register an account on the Recovery Solution Server. When an account is registered on the server, the Recovery Agent Options dialog box is available. The administrator may have performed an “unattended” installation and registration. If that was successful, you will simply see a confirmation message. This topic explains registering an account under the following scenarios: z Creating and Registering a New Account (page 57) z Reinstalling the Recovery Agent using an Existing Account (page 57) z Changing the Server or Installation Type (page 58) z Installing the Recovery Agent but the Server is not Available (page 59) z Canceling the Registration Process (page 59) Recovery Solution Reference Guide 56 Creating and Registering a New Account To back up files to a Recovery Solution Server, you must have an account on the server. Recovery Solution uses Windows Active Directory domain services to manage user accounts. If the currently logged-on user is a member of a group that is already configured as users of the Recovery Solution Server (Cluster), then the account is registered automatically and the registration dialog will not appear. Otherwise, you will need to create a new account. To register a new account using a domain account You can register an account on the Recovery Solution Server using your domain credentials. If you are currently logged on, the domain user account will be used and no other information needs to be provided. All you need to do is click Register. Notes The Recovery Solution Server name is displayed by default. Do not change the server name unless you have been specifically instructed to do so. If you specify [/User:<username>] [/Domain:<domain>] [/Pass:<password>] command-line switches and proper parameters during Recovery Agent setup, account registration will be performed silently, without requiring additional user input even if the currently logged on user is not an authorized Recovery Solution user, or even without logging on to the protected computer. Reinstalling the Recovery Agent using an Existing Account You may have a need to reinstall the Recovery Agent but use an existing account. To register the computer using an existing account, you must be able to provide the password for the account. To reinstall the Recovery Agent using an existing domain account 1. Access the Web-Based Agent Setup Wizard page on the Recovery Solution Server through a Web browser and click Next. 2. If the “Installation Type” is not listed as “Reinstall existing account”, click Change, and select Reinstall existing account (see Changing the Server or Installation Type on page 58). 3. In Select Account, select your account from the list. 4. In Select Computer, select your computer. 5. (Optional) Enter additional information that may be helpful in Computer Description. 6. Click Register. If the account is not a member of the Altiris Recovery Solution users group, you will be prompted for your password. Recovery Solution Reference Guide 57 Notes You can also reinstall Recovery Agent from the network share \\server\agent, where server is the name or IP address of the Recovery Solution Server computer, using the following command: AgentSetup.exe /reinstall /comp:<reinstalled computer name> [/user:<user name of the reinstalled account> /pass:<password> /domain:<domain>] For more information on other AgentSetup.exe command line switches, run “AgentSetup.exe /?” at command line prompt. Tip You can reinstall any Recovery Agent computer account with a user account from the Altiris Administrators group by executing the following command: AgentSetup.exe /Reinstall /User:<Altiris Admin account> /Xpass:<encrypted Altiris Admin password> /Domain:<user domain> /Comp:<reinstalled computer name> If the /Comp parameter is empty, the current computer name will be used. An encrypted password provided through the /Xpass parameter can be created using the XPassUtility available from the Altiris Support Services. Changing the Server or Installation Type When the Recovery Agent is installed on a computer, a default account for that computer is created on the Recovery Solution Server so that the computer is protected as soon as possible. If you change the Recovery Solution Server or the installation type in the Recovery Agent Registration dialog box, you will be prompted with a warning that the default account will be deleted. The default account is deleted to avoid having unused accounts. You are prompted whether or not you want to proceed. Caution If you confirm to delete the default account, the account will be deleted whether or not you complete the registration process. If you have any questions, contact your Recovery Solution Administrator. To change Recovery Solution Servers, enter the name or IP address of the new Recovery Solution Server. The Recovery Agent will then attempt to connect to the new server so that you can complete registration. To change the installation type, select whether to install a new account or reinstall an existing account. Recovery Solution Reference Guide 58 Installing the Recovery Agent but the Server is not Available If the client computer cannot communicate with the Recovery Solution Server, the Recovery Agent Registration dialog box will appear with the message that the specified server is not available. If this happens, contact your Recovery Solution administrator. After the server is available, you can click Register to reconnect to the server. If instructed to do so, you can change the Recovery Solution Server that you are registering to. To change the server, click Change in the Registration dialog box and select a new server, and then click Register. Caution If the default account was created on the first server, you will get a warning that the default account will be deleted. For more information, see Changing the Server or Installation Type on page 58 or contact your Recovery Solution administrator for assistance. Canceling the Registration Process If you cancel the registration process, a registration dialog will appear with one of two messages: z If a default account was created on the server, the computer will be protected, but the Recovery Agent Options dialog box will not be accessible until registration is completed. z If a default account was not created on the server, your computer is not protected until registration is completed. The default account may not be created if there is a connection problem with the server, if there is insufficient information about the computer, and so on. We recommend that you complete registration as soon as possible. If you have any questions, contact your Recovery Solution administrator. Recovery Agent Reinstallation and Repair It might sometimes be necessary to reinstall Recovery Agent on a protected computer, either after certain types of data recovery or because the software is simply not working properly. Reinstallation The user of a protected computer who originally installed the Recovery Agent or users who have used the Recovery Agent after it was installed can reinstall with that computer’s account. Note To prevent potential conflicts, reinstallation should only be performed with an account that has been uninstalled or that exists on a computer that can no longer run its installation of Recovery Solution. To reinstall from an installation package, you or the user can use the Web-based agent setup or specify command-line parameters for the Setup executable, “AgentSetup.exe.” Recovery Solution Reference Guide 59 For more information, see Interactive Web-Based Agent Setup Wizard (‘Pull’ Installation) on page 53 or Recovery Agent Setup Command-Line Switches on page 69. Repair An agent repair might be required if some agent files are missing on the client computer. A repair does not change any settings, but just recopies agent files. It can be performed either from the command line - \reinstall parameter or using RS Agent Reinstall Rollout policy. For more information, see Using Recovery Agent Rollout Policies on page 67 or Recovery Agent Setup Command-Line Switches on page 69. Installing the Recovery Agent in Local Mode When you install the Recovery Agent in local mode, snapshots are backed up on a special partition on the local computer’s hard drive and not on the Recovery Solution Server. This special partition is called the Altiris Partition. Caution If you are using Deployment Solution, before you install the Recovery Agent in local mode, please read Important Issues with Using the Recovery Agent and BootWorks Partitions on page 34. If you are going to install the Recovery Agent in local mode, you will perform the following tasks: z Distribute Local Mode Prerequisite Package (page 61) z Install the Recovery Agent Software (page 62) z Create a Partition to Store Your Files In (page 63) z Perform the First Snapshot (page 64) The first snapshot is taken in two different phases. The first phase is done in Linux using Altiris RapiDeploy®. This creates a snapshot of the entire file system. In the event that your Windows operating system becomes unusable, you can restore the file system from the snapshot. The second phase is done in Windows. This makes all the files recoverable from within Windows. Caution The Altiris Partition requires contiguous free space on the drive. For best results, run a disk defragmentation utility on the drive before installing. If the drive does not have enough contiguous free space, you will get an error stating “Altiris Recovery Agent failed to create initial image of the system.” For more information, see Troubleshooting: Problems Installing the Local Partition (page 228) An Altiris Partition cannot be created on a computer that has the entire drive compressed. Individual files can be compressed without causing a problem. If the entire drive is compressed, compression will need to be temporarily turned off. To check if a drive is compressed, in Windows Explorer, right-click on the drive (Local Disk C:), and make sure the Compress drive to save disk space checkbox is cleared. Recovery Solution Reference Guide 60 Notes Because this first snapshot is backing up all files, this will take several minutes. All subsequent snapshots are taken while running Windows. These snapshots will backup files that are new or changed, making the snapshots much faster. Windows allows you to set Compression and Encryption attributes to drives, folders, and files. Recovery Solution can back up and restore compressed and encrypted files. However, the initial snapshot performed in Linux and subsequent snapshots performed in Windows handle compressed and encrypted files differently. As a result, files that are compressed or encrypted before the Recovery Agent is installed will be backed up twice. If you have many compressed or encrypted files, this will take double the space to store snapshots of those files. We recommend that you turn compression and encryption off (or limit it to a small number of files) before you install the Recovery Agent. After the Recovery Agent is installed and the first snapshot is taken, you can turn compression and encryption on, and the Recovery Agent will make only one backup of those files. Distribute Local Mode Prerequisite Package The Recovery Agent Local Mode Prerequisite Package file (alrfileXXXX.frm, where XXXX is the package build number) contains the Recovery Agent Partition component that is required for running the Local Recovery Agent. The package must be distributed to clients prior to running the Altiris Local Recovery Agent setup. New builds of Local Mode Prerequisite Package can be provided by Altiris to enable Local Recovery support newer hardware. Whenever a new build is available, if needed, you can update your clients with the new package by reapplying the RS Agent Local Mode Prerequisite Package Install policy (see If you use the rollout policies for “Push” installation on page 61), or manually specifying the location path during Local Recovery Agent setup or using the /RSLMPPackagePath command-line parameter (see If you install Recovery Agent from a network share or locally on page 62). The Local Mode Prerequisite Package file is downloaded from http:// www.solutionsam.com/imports/6_2/recovery into “install path\Altiris\Notification Server\NSCap\Bin\Win32\X86\Recovery Agent Local Mode Prerequisite Package” folder on the Notification Server computer during the solution setup. In case the package was not downloaded properly (because of connectivity problems for example), enabling the RS Agent Local Mode Prerequisite Package Install policy in the Altiris Console can fail. In this case you can manually copy the package from and to the locations specified above. Caution All silent Local Recovery Agent installations and upgrades will fail unless the Recovery Agent Local Mode Prerequisite Package is distributed to client computers. The package can be distributed to clients in the following ways. If you use the rollout policies for “Push” installation For automatic rollout of package to client client during “Push” installation, you must use the RS Agent Local Mode Prerequisite Package Install policy in the Altiris Console > Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Rollout. For details, see Using Recovery Agent Rollout Policies on page 67. Recovery Solution Reference Guide 61 Notes You must enable the RS Agent Local Mode Prerequisite Package Install policy before you can enable other local-mode install policies. You must enable the RS Agent Local Mode Prerequisite Package Install policy before you can set the Enable Local Recovery Agent option (see the Configure User’s Rights and Permissions on page 92) in the Default Recovery Agent Settings policy. After the policy runs on client computers, the default package location is C:\Program Files\Altiris\Setup Files\Recovery Agent Local Mode Prerequisite Package. To reapply the RS Agent Local Mode Prerequisite Package Install policy on client computers that have already run the policy, click the Update button on the policy page. Clicking this button recreates the instance of the policy and enables the recurring rollout of a Local Mode Prerequisite package when, for example, a newer version of the package is available. If you use the Web-based Setup Wizard When you install the Recovery Agent using the Web-based Setup Wizard, the package will be downloaded from http://www.solutionsam.com/imports/6_2/recovery by default. In case Recovery Agent Setup cannot connect to the default location or find the package in the specified folder, Altiris Recovery Agent Setup will pause asking you to specify a URL, a network path, or a local folder where the file can be found by the Agent Setup. Note The package can be manually copied by a user to C:\Program Files\Altiris folder on a client computer. After that, no prompt for download will appear during Recovery Agent installation even if the package cannot be downloaded from the web. If you install Recovery Agent from a network share or locally If you manually install Recovery Agent by running the Recovery Agent setup executable from a network share or locally, you can place the package file in a non-default location and modify the default package location path by using the Recovery Agent Setup command-line parameter: /RSLMPPackagePath:<pathname>. For details, see Recovery Agent Setup Command-Line Switches on page 69. Install the Recovery Agent Software There are two ways to install the Recovery Agent software: z Using a Distribution Package z Using Notification Server Policies (see Using Recovery Agent Rollout Policies on page 67) To install the Recovery Agent using a distribution package Depending on the version you have purchased, the Recovery Agent is available in two different package files: z The standard Recovery Agent installation file is AeXRSLocalAgent.exe. z The Recovery Agent installation file for Local Recovery Pro is AeXLRPLocalAgent.exe. Recovery Solution Reference Guide 62 1. Locate the Recovery Agent distribution package. a. If you have already installed Recovery Solution on your Notification Server, the standard distribution file can be located in the following folder: C:\Program Files\Altiris\Notification Server\NSCap\Install\Recovery Server\Agent b. If you purchased Local Recovery Pro, copy and then open the package file on your Notification Server. This extracts and copies the setup files to the following folder: C:\Program Files\Altiris\Notification Server\NSCap\Install\Recovery Server\Agent It is intended that you will extract these files on your Notification Server. After the setup files are extracted, you can then distribute the actual setup file to any computer you want to install the Recovery Agent on. If you do not have a Notification Server, you can extract the files onto any computer. 2. Distribute the installation file to the computers you want to install the Recovery Agent on. You can distribute the file using e-mail, a network share, CD, and so on. 3. On the computer you want to install the Recovery Agent on, run the Recovery Agent installation file. The installation wizard runs and installs the agent program files. Note In case the Local Mode Prerequisite Package cannot be found in the default location or downloaded from http://www.solutionsam.com/imports/6_2/recovery during setup, the installation process will pause asking you to specify a URL, a network path or a local folder where the package file can be found. Click Rescan to rescan the possible locations again, or click Browse to locate the file and then click Next to proceed with installation. Click Finish. For information, see Distribute Local Mode Prerequisite Package on page 61. 4. Restart the computer. 5. The computer is restarted, a file system check is performed on the computer, the computer is restarted again, and the Recovery Agent Partition Wizard is loaded. Create a Partition to Store Your Files In The Recovery Agent Partition Wizard guides you through the process of creating the Altiris Recovery Partition that your snapshots will be stored in. The partition is a Linux-type partition created inside the existing Windows partition, hidden from the end user and protected against common Windows Disk Management utilities. The Altiris Partition can be created on any disk drive, including removable media such as a USB drive, which you can later use for recovery in case of system drive failure by booting from the drive where the Altiris Partition resides. Recovery Solution cannot change the size of the partition after it is created without removing and recreating the partition. You must either accept the default Recovery Solution Reference Guide 63 recommended or specify a new size when creating the partition. The following table helps you with the Altiris Partition sizing. Size Calculation The recommended size of the Altiris Recovery Partition ~40% of the total system hard disk drive The maximum size of the Altiris Recovery Partition placed on the system drive 45% of the total system volume size The maximum size of the Altiris Recovery Partition placed on a non-system drive (additional or external drive) formatted with NTFS 49% of the total volume size The maximum size of the Altiris Recovery Partition placed on a non-system drive (additional or external drive) formatted with FAT32 100% of the total volume size The minimum size of the Altiris Partition 70% of the space used on the system drive + 100MB (reserved for operations with the partition) To create a partition 1. From the Recovery Agent Partition Wizard introduction page, click Next. 2. Select the existing partition that you want to create the Altiris Recovery Partition on. You can use any supported hard disk drive on the computer. For a list of supported hard disk drives, see Hard Disk Support on page 297. 3. Set the size of the partition. Recovery Solution determines the size of the hard drive, and by default sets the partition size to 40% of the total drive space. To change the default partition size, a. Click Change. b. Set the size of the partition by either entering a value in Megabytes or a percentage of the hard disk. c. Click OK. 4. Click Next. 5. To complete the installation and start the first snapshot, click Finish. 6. After the files have been installed, click Yes to restart the computer. Perform the First Snapshot After creating the Altiris Recovery Partition, the computer restarts and is started in Linux. Altiris RapiDeploy is run to create the first phase of the first snapshot. This is called the golden image. Because all files are read and backed up on the same drive, this will take several minutes. On a computer with a lot of data, this snapshot can take up to an hour. If the computer has only an operating system installed and little data, it can take 20-30 minutes. Recovery Solution Reference Guide 64 When the first phase is completed, the computer will be restarted. You will be prompted to perform the second phase of the snapshot. This will make the files in your snapshot available for recovery through Windows. When the snapshot is completed, all the files on the computer are protected in a snapshot. Installing the Recovery Agent in Mixed Mode In mixed mode, Recovery Agent can be configured to back up files to both a local Altiris Partition and a Recovery Solution Server. Both modes are configured and function independently. When using mixed mode, and when a user opens the Recovery Agent Options, the user must select whether to configure options for server-based or local mode. How you install Recovery Agent in mixed mode is based on the following conditions: z If the Recovery Agent is not installed in any mode z If the Recovery Agent is already installed in server-based mode z If the Recovery Agent is already installed in local mode If the Recovery Agent is not installed in any mode If the Recovery Agent is not installed in any mode, you can do the following: Use the Interactive Web-Based Agent Setup Wizard (‘Pull’ Installation) (page 53) and select the Mixed mode. Use AgentSetup.exe with /local parameter (see Recovery Agent Setup Command-Line Switches on page 69). Use any other method for installing in server-based mode, then follow the instructions in If the Recovery Agent is already installed in server-based mode (page 65). If the Recovery Agent is already installed in server-based mode If the computer was configured in server-based mode first, do the following: 1. On the local computer, open the Recovery Agent Options. 2. Click the General tab. 3. Click Create to create a local Altiris Partition. The right to do this is disabled by default. To enable this right, see Enable Local Recovery Agent (server-based mode) on page 93. 4. Complete the Recovery Agent Partition Wizard. If the Recovery Agent is already installed in local mode If the computer was configured in local mode first, you can simply use any method to deploy the Recovery Agent in server-based mode. This will maintain local mode settings and files. Recovery Solution Reference Guide 65 Caution If you are using Deployment Solution, before you install the Recovery Agent in mixed mode, please read Important Issues with Using the Recovery Agent and BootWorks Partitions on page 34. Installing Recovery Agent Using an Image You can easily deploy the Recovery Agent to multiple computers (with similar hardware configurations) using an image. This is especially useful if you want to pre-install the Recovery Agent in local mode on several new computers. The following procedure describes the general steps in using an image to pre-install the Recovery Agent. 1. 2. Configure a baseline computer by doing the following: a. Install and configure the operating system. b. Install and configure the applications that you want the computers to have in common. c. Install the Recovery Agent in local mode with the desired partition size. d. Take the first snapshot. Make an image of the baseline computer. Caution Because the Recovery Agent uses Altiris RapiDeploy® create the Altiris Partition, you must use RapiDeploy to image the computer and maintain the Altiris Partition. 3. Place the image on the target computers. Upgrading Recovery Agent If the Recovery Solution Server is upgraded, you can use the RS Agent Upgrade rollout policy to upgrade the Recovery Agent on each protected computer. Until the upgrade occurs, the computer is displayed with an exclamation mark icon in the console, indicating that its software version is older than the version on the server. Warning Starting with Recovery Solution 6.2 SP2, Microsoft Windows 95, 98 (original release), ME, and NT 4.0 operating systems are no longer supported. You cannot upgrade the Recovery Agent on these platforms. During the upgrade, Recovery Solution creates a text file named AexCRAS.LOG in the program folder on the protected computer. You can look here for information about the status of the upgrade. If there are problems with the automatic upgrade, see Troubleshooting User Installations on page 208. Notes After the Recovery Agent has been upgraded on a client computer, previous snapshots are not shown in the Rollback dialog in the Altiris Console unless you select the Show Recovery Solution Reference Guide 66 critical snapshots and snapshots from previous RS Agent installations checkbox. This will not display previous snapshots on the client's Rollback dialog. For more information, see Perform a Rollback on page 122. If the user logged onto the protected computer at the time of the automatic upgrade is not the user who originally installed the software, then the user sees a prompt asking for new credentials. If the logged-on user has never manually accessed the existing installation of Recovery Solution, then the account is added as a new user of the computer’s account. If the automatic upgrade of a Windows 2000/XP protected computer is interrupted (Example: if the computer is restarted during the upgrade), the software is unable to repair itself. If this happens, the user should reinstall Recovery Agent using the computer’s existing account. If Recovery Solutions Agent Install policy was enabled with schedule set to ASAP, then this policy becomes a run-once policy. After it is executed it will never be executed again in the future, even if policy is upgraded (or a package that this policy refers to). If an Upgrade does not happen try to schedule this policy to execute at a certain date/time, or to change its type to Manual and then run the policy manually. See also: Using Recovery Agent Rollout Policies on page 67. Using Recovery Agent Rollout Policies Using Notification Server polices, you can roll out (push) the Recovery Agent to computers on your network. You can install the Recovery Agent in server-based mode or local mode. You can also use policies to reinstall, upgrade, and uninstall the Recovery Agent. To use rollout polices, the target computers must be discovered and have the Altiris Agent installed. It is helpful to have a working knowledge of policies, packages, programs, and collections. For information on installing the Altiris Agent and configuring policies, see the Altiris Notification Server Help. Recovery Solution includes the following predefined policies for Recovery Agent rollout: RS Agent Local Mode Prerequisite Package Install Installs the Recovery Solution Agent Local Mode Prerequisite Package. RS Agent Install Installs the Recovery Agent and creates an account to back up files to a Recovery Solution Server. RS Agent Install in Local Mode Installs the agent and creates a local Altiris Recovery Partition to back up files locally. Note You must enable the RS Agent Local Mode Prerequisite Package Install policy before this policy can be enabled Recovery Solution Reference Guide 67 RS Agent Promotion If Local Recovery is installed on the client computer, you can promote it to Local Recovery Pro version with more functionality or mixed mode depending on the solution you have. Note You must enable the RS Agent Local Mode Prerequisite Package Install policy before this policy can be enabled. RS Agent Reinstall Reinstalls the Recovery Agent to perform a repair. RS Agent Uninstall Removes the Recovery Agent from the protected computer. RS Agent Upgrade Upgrades older versions of the Recovery Agent to the current version. Note You must enable the RS Agent Local Mode Prerequisite Package Install policy before this policy can be enabled. Each policy uses the Recovery Agent setup executable (AgentSetup.exe) with various command-line switches. AgentSetup.exe is located in the following folder on Notification Server computer: install path\Altiris\Notification Server\NSCap\Bin\Win32\X86\Recovery Agent Package By default, a Recovery Agent Rollout policy is configured to restart computers after it runs if no user is logged on. Otherwise, the logged-on user will be prompted to restart the computer manually, or restart will be performed automatically after an interval. Note You must install at least one Recovery Server before you can push the Recovery Agent installations. To use Recovery Agent Rollout policies 1. From the Altiris Console, click the Configuration tab. 2. In the left pane, click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Rollout. 3. Click the policy you want to use. 4. In the right pane, enable the policy. Caution RS Agent Local Mode Prerequisite Package Install policy must be enabled before other local-mode install policies (RS Agent Install in Local mode, RS Agent Promotion) can be enabled. 5. Verify the program name for the task you want to perform. 6. (Optional) Enable status events. 7. (For installation in server-based mode) Select the Recovery Solution Cluster that this computer will be protected on. 8. To have the client computer automatically restarted as part of the task, select the Reboot computers checkbox. Recovery Solution Reference Guide 68 Notes The users logged on the client computers will be shown the default computer restart prompt dialog that contains the countdown timer. If the user neither clicks Snooze nor Restart, the computer will be restarted automatically in 60 seconds. If no user is logged on at the target computer, the reboot will be performed automatically. The default reboot prompt will be shown or automatic reboot will be performed even if Recovery Agent rollout fails, if the Reboot computers checkbox was selected. 9. (For installation in server-based mode) To have the client computer installed but disabled, select the Disable computers by default checkbox. 10. (For installation in server-based mode) To have the client computer installed but skip the initial snapshot, select the Disable initial snapshot checkbox. 11. (For uninstall) To have the account deleted, click the Delete account from Recovery Solution cluster checkbox. All data backed up from the deleted account will be removed during the next space management job. 12. Select the collection that the policy will use. This is the group of computers the policy will be run on. 13. Select the policy scheduling options. For more information on configuring policies, see the Altiris Notification Server Help. 14. Click Apply. To check the Recovery Agent Rollout policy status A rollout policy returns the status code as it runs. You can check the Recovery Agent rollout status using the standard Notification Server report (Reports > Notification Server Infrastructure > Agent > Altiris Agent Tasks Status) Recovery Agent Setup Command-Line Switches You can use command-line switches to automate installation, reinstallation, uninstall, upgrade, and repair of the Recovery Agent. For SMS deployment, the required switches must be specified when the SMS package is created. For interactive deployment, switches can be specified in a batch file or by the user performing the installation. Caution /Reboot command-line switch is required for unattended Recovery Agent installation in all modes. /Silent switch option causes Agent setup progress dialog to be hidden from a user. For silent registration upon Recovery Agent installation in server-based mode, you must specify valid /User, /Domain, and /Pass command-line parameter values. For silent installation in local mode, you must correctly specify /BWPart and /BWVolume parameters that cause automatic creation of Local Recovery partition. Recovery Solution Reference Guide 69 The following are examples of syntax (with possible parameters) for using commandline switches: New Installation agentsetup.exe [/Local] [/Server:<server name>[;http|https][;port number]] [/User:<username>] [/Domain:<domain>] [/Pass[:<password>] [/BWPart:<partition_size>] [/BWVolume:<volume>] [/RSLMPPackagePath:<pathname>][/Reboot] [/Silent] [/Disable] [/InitialSnapshot] Reinstallation agentsetup.exe /Reinstall [/Comp:<computer>] [/User:<username>] [/Domain:<domain>] [/Pass[:<password>]] [/ID:<computer ID>] [/Server:<server name>[;http|https][;port number]] [/Reboot] [/Silent] Support SMS during installation agentsetup.exe /SMS [/MIF:<mif file(no extension)>][/Reboot] [/Silent] Uninstall agentsetup.exe /Uninstall [/Delaccount] [/Reboot] [/Silent] Upgrade initiation agentsetup.exe /Upgrade [/Reboot] [/Silent] Repair installation agentsetup.exe /Reinstall [/Reboot] [/Silent] Local Agent installation agentsetup.exe /LocalOnly [/BWPart:<partition_size>] [/BWVolume:<volume>][/RSLMPPackagePath:<pathname>] [/Reboot] [/Silent] The command-line parameters are described below. Recovery Solution Reference Guide 70 Notes Command-line parameters are not case-sensitive, but any passwords specified are casesensitive. Unless the /Server parameter is specified, all protected user accounts are created on the server from which the setup package was made. Parameter Description /User /Domain Specify the username, domain, and password of the user account for which Agent registration will be performed. /Pass If you supply valid credentials, Agent registration will be performed silently. /BWPart Default Value Create a partition for “Local Snapshot” with the specified size. Example: /BWPart:10000 - to specify size in MB or /BWPart:80% - to specify the size as the percentage of the overall space. All invalid sizes will be skipped and the default behavior will be used. /BWVolume Create a partition for “Local Snapshot” on specified volume where <volume> is drive letter (Example: /BWVolume:D). / RSLMPPack agePath Specify the full pathname of the Local Mode Prerequisite Package file (URL, UNC, or local path) placed in a non-default location. Note that the path cannot contain Unicode characters. (Example: / RSLMPPackagePath:\\server\share\alrfileXXXX.frm) / Delaccoun t Deletes account from server in uninstall case (for server-based agent only). /Disable Disables account for protected user (for server-based agent only). / InitialSn apshot Determines whether to perform an initial snapshot: /Local Install Agent in Mixed mode Recovery Solution Reference Guide 0 - Do not show initial snapshot dialog 1- Show initial snapshot dialog 71 Parameter Description / LocalOnly Installs Agent in “Local Snapshot” mode only /MIF:.MIF file Specifies a Management Information Format (.MIF) file for use with SMS deployments. No default value. Do not include the .MIF file extension. Not required. If not specified, no .MIF file is used. Specifies that Setup should automatically restart the computer after the installation is complete. No default value. Not required. If not specified, the user is prompted to restart the computer. Specifies that this is a reinstallation of the software. No default value. /Reboot / Reinstall Required only to continue using an existing account. This ensures that the user continues to have access to existing protected data on the server. /Server: server; http(s);p ort Not required. The name of the server that stores this protected computer’s account for Recovery Solution. This can be the Windows name, the full Internet DNS name, or the IP address of the server. You might have to specify the IP address if the server is on a different subnet from the protected computer. Optionally, you can specify the protocol to be used during Recovery Agent registration (HTTP or HTTPS) and the port number. /Silent Performs a silent installation of Recovery Agent. Note If you do not include the /Reboot parameter, the user must reboot the computer before Recovery Agent becomes functional. Not required. Recovery Solution Reference Guide Default Value If not specified, a new installation is performed. The default name is the name of the server from which the Setup package was created. The default protocol is DCOM. No default value. If not specified, the installation is interactive. 72 Parameter Description Default Value /SMS Specifies that Setup is being distributed through Microsoft Systems Management Server (SMS). No default value. Required only for distribution through Microsoft SMS. If not specified, the Setup package is not configured for SMS. / Uninstall Perform an account uninstall. /Upgrade Initiates a Client Auto Update. Uninstalling the Recovery Agent You can uninstall the Recovery Agent from a protected computer in one of the two following ways: z Using Windows Add/Remove Programs (page 73) z Using Recovery Agent Policies to Uninstall the Recovery Agent Remotely (page 74) Using Windows Add/Remove Programs To uninstall the Recovery Agent and/or Local Recovery (Pro) from a protected computer 1. On the protected computer, click Start > Settings > Control Panel > Add/ Remove Programs. 2. On the Install/Uninstall tab, scroll down and select Altiris Recovery Solution Agent and/or Altiris Local Recovery (Pro). 3. Click Remove. Caution This will uninstall the program files and the recovery partition, including all backed up files. 4. The following screen lets you uninstall Recovery Agent either removing (default) or leaving account on the server. To remove account you should enter credentials of a user that installed this account or used it later. In case of a mixed mode agent you can choose to uninstall Local Recovery Agent, Server-based Recovery Solution Agent or both. Recovery Solution Reference Guide 73 Notes These options are applicable only to the uninstallation of the server-based Recovery Agent. This screen does not appear in case Recovery Server not available at the time of uninstall. Using Recovery Agent Policies to Uninstall the Recovery Agent Remotely You can use Recovery Agent policies to uninstall the Recovery Agent remotely. This allows you to uninstall the agent from multiple computers at one time. For more information, see Using Recovery Agent Rollout Policies on page 67. Recovery Solution Reference Guide 74 Chapter 5 Configuring Recovery Solution This section contains information about configuring Recovery Solution. This chapter provides information about the following topics: z Configuring Recovery Agent Settings (page 75) z Recovery Solution Cluster Configuration (page 96) z Recovery Solution Security Role Management (page 110) z General Settings (page 97) z Scan for applied critical patches and Software Delivery tasks (page 113) z Manage Lost Recovery Solution Agents (page 113) Configuring Recovery Agent Settings You can configure the default settings for the Recovery Agent that is running in either server-based mode or local mode on protected computers. Default Recovery Agent settings are managed through configuration policies that will apply to all computers in the collections you specify. For more information about changing and setting up custom collections, see the Notification Server help. When the Recovery Agent is installed on a computer, the default settings will be used on the protected computer. If you change the default settings, the new default settings will be applied to all existing computers in the collections you specify. You can configure multiple configuration policies that can be applied to different computers. For each configuration policy, you can modify the settings and apply it to different collections. For more information, see Creating Configuration Policies on page 75. Rather than modifying the existing Default Recovery Agent Settings policy, we recommend that you create new configuration policies by cloning the existing policy and modifying the copy of the policy. The following topics describe how to clone policies and then configure default agent settings. z Creating Configuration Policies (page 75) z Configuring Default Agent Settings (page 77) Creating Configuration Policies Caution The following is a “best practice” for handling multiple configuration policies. By default, there is one Default Recovery Agent Settings policy for protected computers running in server-based mode and one Default Local Recovery Agent Settings policy for protected computers running local mode. Rather than modifying the existing default Recovery Solution Reference Guide 75 Recovery Agent settings policy, we recommend that you create new configuration policies by cloning the existing policy and modifying the copy of the policy. Any settings changed within the original policy will change all other settings in cloned policies following the rules of inheritance. As a result, we strongly recommend working with multiple policies in the following way: z Disable the Default Recovery Agent Settings (page 76) z Clone the Default Recovery Agent Policy (page 76) z Configure a Copy of Default Local Recovery Agent Settings (page 76) Disable the Default Recovery Agent Settings 1. From the Altiris Console, click the Configuration tab, then click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Settings. 2. Click on the policy named either Default Recovery Agent Settings or Default Local Recovery Agent Settings. 3. Click the Snapshot tab. 4. Under Policy Settings, clear the Enable checkbox. 5. Click Apply. Clone the Default Recovery Agent Policy 1. Click the Configuration tab, then click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Settings. 2. Right-click on a policy. Example: Default Local Recovery Agent Settings. 3. Click Clone. 4. Click Ok. This will create a policy called Copy of Default Local Recovery Agent Settings. You can rename this policy. Configure a Copy of Default Local Recovery Agent Settings For details, see Configuring Default Agent Settings on page 77. Creating additional policies When creating additional policies, either clone Default Recovery Agent Settings (which is your default policy) or clone your new created policy. Example: accounting department policy. If you do clone your newly created policy, all rules of inheritance will be applied and should be done with caution. Using Inherited Default Agent Settings Recovery Solution supports multiple generation inheritance. Grand parent properties are passed to the parent which are passed to the child unless the inheritance tree is broken. The Default Recovery Agent Settings is a policy group that the following inheritance trees: z Snapshot z Excludes Recovery Solution Reference Guide 76 z Rollback Data z Space Management z Bandwidth Throttling Settings z Connection Management z Remote Access z User Rights z Miscellaneous Settings z Health Alerts Settings z Storage Space Limits z Communication Settings z Performance Settings z Storage Management z F11 Recovery Settings Two of these trees, Excludes and Rollback Data, can be appended to at each level of inheritance. At any level of inheritance of this policy group for each of these eleven trees you can turn off the inheritance and inheritances will be started new for that tree within that policy group. These new settings are inherited to its children and grand children. Any change to a policy group will in real time affect its children and grandchildren. Configuring Default Agent Settings To configure default Recovery Agent settings 1. From the Altiris Console, click the Configuration tab. 2. In the left pane, click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Settings. 3. Click the Recovery Agent Settings policy you want to configure. To configure the Local Recovery Agent settings, use the Default Local Recovery Agent Settings policy. To configure the server-based Recovery Agent settings, use the Default Recovery Agent Settings policy. Rather than modifying the existing Default Recovery Agent Settings policy directly, we recommend that you create new configuration policies by cloning the existing policy and modifying the copy of the policy. For more information, see Creating Configuration Policies (page 75). 4. Under Policy Settings, select the Enable checkbox (this will enable the policy). 5. Use the existing Notification Server collection or click the collection link to select a different or additional collections. 6. Configure the default settings. 7. Click Apply. The following topics describe the default settings that you can configure. Recovery Solution Reference Guide 77 Note The topic name defines whether it applies only to the Default Local Recovery Agent Settings policy (local mode only), server-based Default Recovery Agent Settings policy (server-based only), or both. z Configure Snapshot Settings (page 78) z Configure Excludes (page 81) z Configure Rollback Data (page 87) z Configure Space Management (page 88) z Configure Throttling and Connection (server-based only) (page 90) z Configure Remote Access (server-based only) (page 91) z Configure Performance (local mode only) (page 92) z Configure Storage Management (local mode only) (page 92) z Configure User’s Rights and Permissions (page 92) z Configure Miscellaneous Settings (page 94) Notes If you change the default Recovery Agent settings shortly after installing the agent on a client computer, the updated settings may not immediately get updated on the client computer. When the Recovery Agent is installed on a computer, it may take several minutes for the Notification Server to process all the database information about that computer. The time require depends on your settings (Example: see Automatic Collection Updating in Configuration > Server Settings > Notification Server Settings). After the Notification Server information is updated, then the new default settings will be applied the next time the agents settings are updated on the client computer. Configure Snapshot Settings Recovery Solution lets you schedule snapshots to ensure that they are being done on a regular basis. You can specify when to automatically take a snapshot. You can also specify what data you want to protect. By default, Recovery Solution protects all drives on all users’ computers. Tip You can use the enhanced exclude list to specify a partial snapshot that will capture only specific files or filetypes on your drive instead of having tons of other unnecessary files in the snapshot. For information, see Using Exceptions (page 82). By default, protected computers always inherit the default schedule for the collections. Default snapshots are scheduled Monday through Friday inclusive, between 7:00 a.m. and 7:00 p.m. Because of the advanced compression techniques used by Recovery Solution, there is usually little network traffic associated with a snapshot. But in some cases you might want to change the default schedule to better suit your time zone and network environment. Recovery Agent inherits the default schedule of the collections that the protected computer is a member of. For more information, see Using Inherited Default Agent Settings on page 76. Recovery Solution Reference Guide 78 To change the default schedule 1. Click the Snapshot tab. 2. You can decide whether or not to allow users to change their settings. For more information, see Configure User’s Rights and Permissions on page 92. 3. By default, the scheduled snapshots are enabled. To disable scheduled snapshots, clear the Enable Scheduled Snapshot checkbox. 4. Select the Snapshot type: Full system snapshot or Partial snapshot. We recommend that you keep Snapshot Type set to Full System Snapshot. Partial snapshots do not provide Full System Recovery protection. 5. Select the boxes next to the days of the week that you want snapshots to run. 6. In the Start Scheduled Snapshot, select the time range in which you want members of the collection snapshot to start. This is not necessarily when it will be completed by. In addition to scheduled time intervals, you can set up the following options. Allow Recovery Agent to initiate scheduled snapshot While this option is disabled (by default), Recovery Server initiates snapshots by sending TCP/IP packets on client’s 43189 port. This may not be acceptable in case client is behind a firewall. Select this box to initiate snapshots from the client side. Notes Scheduled snapshots initiated from the client may start with a short delay (up to 5 minutes). Client jobs started from the Altiris Console will work even in case 43189 port is closed. But the jobs (snapshot, restore, rollback) may be delayed up to 15 minutes. As soon as user turns on the computer Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer is turned on. It is not necessary for a user to log onto the computer for the snapshot to start, but the computer must already have a physical connection to the network. Note The snapshot will not start immediatelly after logon. It starts after a 12-minute timeout in local mode or after a 10-minute timeout in network mode. This option is generally useful for desktop computers connected to a LAN. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer is turned on. Recovery Solution Reference Guide As soon as user resumed the computer 79 Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer is resumed (after having been suspended). Note The snapshot will not start immediatelly after resuming the computer. It starts after a 8-minute timeout in local mode or after a 6-minute timeout in network mode. This option is generally useful for laptop computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer is suspended and resumed. As soon as user docks the computer Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer is docked. Note The snapshot will not start immediatelly after docking the computer. It starts after a 7-minute timeout in local mode or after a 5-minute timeout in network mode. This option is generally useful for laptop computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer is docked. As soon as the computer idle state reaches Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer goes into an idle state. Specify the timeout (6 minutes in local mode or 4 minutes in network mode by default) in the field nearby. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer goes into an idle state. 7. Miscellaneous Snapshot Settings Take snapshot when user is logging off Select this box to have Recovery Solution start a snapshot as soon as a user logs off, restarts, or shuts down the protected computer. At logoff time, the snapshot runs automatically after a short delay. Before it runs, the user has the chance to skip the snapshot. A snapshot will run again the next time a user logs off the computer. Recovery Solution Reference Guide 80 Note The Windows registry setting that controls the application timeout should be set to at least 20000 (the value in milliseconds) on the protected computer in order to ensure that snapshots have time to start before Windows completes the logoff process. The registry value is HKEY_CURRENT_USER\Control Panel\Desktop\HungAppTimeout, which is a string value that is configurable per user. Attempt to wake the Agent before a scheduled snapshot This option allows for computers that are sleeping (standby) to be woken up to have snapshots taken. This allows snapshots to be done after hours during low network usage times. This option is enabled by default and is configurable on the protected computer’s properties page. For Wake on LAN from standby to work properly, the NIC needs to support Wake on LAN and the Wake on LAN needs to be enabled in the NIC properties in MS Windows For Wake on LAN from hibernate\shutdown to work properly, the NIC and the motherboard should support Wake on LAN from shutdown\hibernate and Wake on LAN needs to be enabled in the BIOS. Note The protected computer is returned to standby when snapshot is completed. Backup mount points, junction points and other reparse points (not the data they reference) Select this box to allow backup of NTFS reparse points, which is a new capability added to NTFS version 5 with the release of Windows 2000. Backup of the following reparse points is supported by default: Symbolic Links Junction Points Volume Mount Points Remote Storage Server (RSS) Note Snapshot of reparse points allows you to restore only the reparse point objects, not the data they reference. If the referenced location or data is unavailable after restore, your reparse points may become non-functional 8. Click Apply. Configure Excludes Excluding Files From Snapshots You do not want users to waste valuable server disk space by protecting unimportant files such as files in temporary folders and cache folders. You can apply exclude rules to file types, files, folders, and drives. You can set global rules that apply to a collection. You can also export an exclude list to import to other collections. Recovery Solution Reference Guide 81 Using Exceptions It is possible to add exceptions to the exclude list. For example, if you want to exclude all *.NSF files, but to include Names.NSF file, use the Edit exceptions list option . The Exceptions enhancement lets you specify only the files that you want backed up instead of having tons of exclude filters. In other words, if you only support certain applications, then you know the filetypes to include in snapshots and just configure that instead of having every other file on the filter. Example: Using the enhanced exclude list you can specify a partial snapshot that will only capture *.DOC and *.XLS files on your drive. To enable the functionality, follow these steps: 1. In the Altiris Console, select Configuration tab > Solution settings > Incident management > Recovery Solution > Recovery Agent Settings > Default Recovery Agent Settings > Excludes tab. 2. Add one or more drives into the Excludes list (for example, to exclude the whole drive C, enter “C:\” without quotes). For details, see To exclude files (page 82) 3. Add file extensions you want to include into snapshots to the exceptions list for the drive. For details, see To edit exceptions (page 83). 4. After this, schedule a partial snapshot of the drive. For details, see Configure Snapshot Settings (page 78). The snapshot will now skip all data on the designated drive except the file extensions you added as an exception. For more information, see the following: z Exporting and Importing Exclude Lists (page 83) z Files and Folders You Should Never Exclude (page 84) z Examples of Files and Folders to Exclude (page 85) To exclude files 1. Click the Excludes tab. 2. You can decide whether or not to allow users to change their settings. For more information, see Configure User’s Rights and Permissions on page 92. 3. Configure exclusion options. The list shows the currently excluded items defined for all computer or groups you are viewing. If a folder icon appears next to an item, then this item is a folder. Files by this name are not excluded unless you add another item to the list and indicate that it is a file. The reverse is true if a file icon appears next to an item. 4. Click the to add a new item to the list, or select an item and click to edit. A dialog box appears. Enter the file type, file, or folder you want to exclude; specify whether the path you entered is to a file or folder; and finally specify whether the path applies to all files or folders on a specific drive or on all drives. Enter each file, file type, or folder individually. Recovery Solution Reference Guide 82 Notes Extended ANSI characters are case–sensitive in the exclude list. Example: excluding the file type. To exclude all files on all drives, enter "*.*" and select Exclude everythere. If you select Exclude only this path and File type options, only the files in the specified folders will be excluded from snapshot; all subfolders will be included into snapshot. If you select Exclude only this path and Folder type options, all subfolders on the drive will be excluded (but not files in the root folder) will be excluded during the snapshot. You can use system environment variables when specifying the excluded items. Please note that user environment variables cannot be used. 5. Click OK. You can continue adding, editing, and removing excluded items as needed. 6. Click OK again to apply the new properties. To edit exceptions 1. Configure an exclude list using the steps listed under To exclude files on page 82. 2. On the Excludes tab, select an item and click Edit exceptions list icon . The list shows the current exceptions defined for excludes you are viewing. 3. Click the to add a new item to the list, or select an item and click to edit. The following dialog box appears. Enter the file type, file, or folder you wish to make exception for; specify whether the path you entered is to a file or folder; and finally specify whether the path applies to all files or folders on a specific drive or on all drives. Enter each file, file type, or folder individually. Note You can use system environment variables when specifying the exceptions. Please note that user environment variables cannot be used. 4. Click OK. You can continue adding, editing, and removing excluded items as needed. 5. Click OK again to apply the new properties. Exporting and Importing Exclude Lists You can configure an export list that you want to reuse for another computer or groups of computers. You can export an exclude list and then import that list for use on another computer. When you export an exclude list, the folders and files in the list are saved in a text file with an .ELF extension (Exclude List File). When you import an Exclude List File, the paths and files are added to the existing excludes. Recovery Solution Reference Guide 83 To export an exclude list 1. Configure an exclude list using the steps listed under To exclude files on page 82. 2. From the Excludes tab, click Export icon 3. Browse to the path where you want to save the Exclude List File (.ELF). 4. Enter a name for the Exclude List File (.ELF). 5. Click Save. . To import an exclude list 1. Open the exclude list for a computer or groups of computers using the steps listed under To exclude files on page 82. 2. From the Excludes tab, click Import icon 3. Browse to the path of the Exclude List File (.ELF) you want to use. 4. Select the Exclude List File (.ELF). 5. Click Open. . The contents of the .ELF are added to the exclude list. Files and Folders You Should Never Exclude Certain files and folders are required for the proper system configuration, and Full System Recovery cannot be performed without them. In addition, some file extensions, such as .DLL, are nearly always associated with valid data. z C:\, C:\DOS, C:\WINDOWS, and C:\WINNT These are boot and operating system folders necessary to start the computer. If the contents of these folders are excluded, Full System Recovery might be impossible. You should include all subfolders of the Windows folder, particularly the SYSTEM and SYSTEM32 subfolders. The only exceptions are the specific cache subfolders specified below, the contents of which you might want to exclude. z C:\BOOT.INI, C:\NTDETECT.COM, C:\NTLDR These files in the root folder are needed to start Windows 2000/XP. z *.BAT, *.COM, *.EXE These are program and command-line script files. z *.386, *.DLL, *.DRV, *.PNF, *.SYS, *.VXD These are system files needed for proper system configuration. If they are damaged, the computer might not start. Without them, Full System Recovery is impossible. z *.INI These are configuration settings. z *.DOS, *.W40 On multi-boot computers, these files store information necessary to start the computer in other operating systems. Recovery Solution Reference Guide 84 Examples of Files and Folders to Exclude If you are aware of common cache and temporary files used by your standard applications, you can exclude them from snapshots. Below are some examples of files and folders that you might want to exclude. In general, these files are not needed to completely restore a computer to working condition, but you should read the description of each item carefully before you decide to exclude it. While the data in these files is not needed by most users, some users might have a good reason for protecting them. Some of these files are excluded by default. z _RESTORE Folders by this name might be created in Windows Me and Windows XP, if the user performs a System Restore using the Windows System Restore tool. The folders contain information about past System Restores so that they can be undone. Recovery Solution provides similar but more flexible functionality with the rollback feature. z PAGEFILE.SYS This file is used to create virtual memory while Windows is running. It is usually stored in the root folder of drive C. Depending upon the computer’s configuration, the file can become quite large, although it does not contain any data that is saved between one Windows session and the next. z WIN386.SWP Like PAGEFILE.SYS, the file WIN386.SWP is used in Windows 98 to create virtual memory, and can become quite large. WIN386.SWP is a temporary file that Windows deletes whenever the computer is shut down or restarted. It is usually stored in the Windows folder. z 386SPART.PAR This is the Windows 3.1 equivalent of WIN386.SWP. If users upgraded from Windows 3.1 to their current versions of Windows, 386SPART.PAR might still exist on their computers, even though it is no longer needed. z Disk compression container files When a protected computer is running a disk compression program, such as DriveSpace (included with Windows 95), Stacker, or SuperStore, you should exclude the container files that store the compressed information. (Example: a typical DriveSpace file is named DRVSPACE.000; a typical compressed Stacker file is STACVOL.DSK). Because the container files actually hold much of the data on an entire compressed drive, it is very likely that these files will change every day. It takes much longer for Recovery Solution to find the changes in such large files and copy the data than it takes to take a snapshot of the drive itself. Simply include the letter of the compressed drive, but exclude the container files, and all data is protected. z Hibernation files Some computers and operating systems support hibernation, which allows a user to effectively turn off the computer without losing any data in memory. This is accomplished by writing the data in memory to special hibernation files, which can become quite large. Protecting these files could significantly slow down snapshots, increase the strain on the network and the server, and in some cases prevent recoveries from working properly. Recovery Solution Reference Guide 85 As long as users save their work before putting their computers into hibernation, the only contents of the hibernation files will be nonessential information, such as the current running applications, window positions, and view settings. Listed below are some of the hibernation files used by various systems. z HIBERFIL.SYS is used by Windows XP and Windows 2000. HIBRN8.DAT is used on Compaq notebooks. PM_HIBER.BIN is used on IBM notebooks. SAVE2DSK.BIN is used on IBM notebooks. TOSHIBER.DAT is used on Toshiba computers. VMMHIBER.W9X is used by Windows Me. C:\TEMP Some computers use this folder as a storage place for temporary files. z C:\WINDOWS\TEMP and C:\WINNT\TEMP These folders store temporary files. z *.TMP Files with this extension are usually temporary files. z ~*.* Files that begin with a tilde ( ~ ) are usually temporary files. z Web browser cache As users browse the Web, the browser stores files, such as HTML documents and graphics files, in a cache folder on the computer. Over time, the cache folder can become quite large, sometimes containing thousands of files. These files are saved only to improve the speed of Web browsing; they are usually not needed by the browser or by users. If Microsoft Internet Explorer is the Web browser, the browser cache file is usually the TEMPORARY INTERNET FILES subfolder of the Windows folder. If the Web browser is Netscape Navigator, the browser cache is usually located somewhere within the Netscape Navigator folder. z *\MSDOWNLD.TMP Folders by this name are created and used by Microsoft Web sites when software is downloaded and installed from those sites. These folders are usually created in the root of a hard drive, and they might exist on multiple hard drives. They are not needed once the software installation is complete. z Internet history If Microsoft Internet Explorer is used, the HISTORY subfolder of the Windows folder contains information about Web sites that have been visited, allowing users to easily return to those sites at a later time. This information is generally not important. z *.GID, *.FTS, *.FTG Files with these extensions are usually cache files that get created automatically when a Help file is opened. These cache files do not store any information that is necessary to use Help. z *.BAK Files with this extension are typically backup files that applications create automatically while the main data files are being edited. A *.BAK file can sometimes Recovery Solution Reference Guide 86 be used to restore the data in case the main file becomes corrupted, but since copies of the main data file are also being stored on the server, there should rarely be a need to include *.BAK files in snapshots. z RB001.CAB, RB002.CAB, RB003.CAB, RB004.CAB, RB005.CAB Some versions of Windows store registry backups using these file names. Since the registry is protected during Full System Snapshots, there should be no need to include the registry backup files as well. z C:Program Files\Altiris\Recovery Solution Agent\Data\C\*.DTF These cache files are used by Recovery Solution to help speed up snapshots. Recovery Solution will recreate them if necessary. If users have more than 1 hard disk drive, you might want to add the additional DATA subfolders DATA\D\*.DTF, DATA\E\*.DTF, and so forth, to exclude all these files. Caution You should not exclude all .DTF files everywhere (*.DTF). This file extension is also used by other applications. Configure Rollback Data Here you specify the file types to exclude from rolling back and deleting. These file types are considered to be user data files or documents and will not be rolled back or deleted unless you select Restore all files in the Rollback settings. To exclude files from rolling back and deleting 1. Click the Rollback Data tab. 2. You can decide whether or not to allow users to change their settings. For more information, see Configure User’s Rights and Permissions on page 92. 3. Configure exclusion options. The list shows the currently excluded items defined for all computers or groups you are viewing. If a folder icon appears next to an item, then this item is a folder. Files by this name are not excluded unless you add another item to the list and indicate that it is a file. The reverse is true if a file icon appears next to an item. 4. Click the to add a new item to the list, or select an item and click . A dialog box appears. Enter the file type, file, or folder you want to exclude; specify whether the path you entered is to a file or folder; and finally specify whether the path applies to all files or folders on a specific drive or on all drives. Enter each file, file type, or folder individually. Note Extended ANSI characters are case–sensitive in the exclude list. Example: excluding the file type. 5. Click OK. You can continue adding, editing, and removing excluded items as needed. Recovery Solution Reference Guide 87 6. Click OK again to apply the new properties. Exporting and Importing Exclude Lists You can configure an export list that you want to reuse for another computer or group of computers. You can export an exclude list and then import that list for use on another computer. When you export an exclude list, the folders and files in the list are saved in a text file with an .XML extension. When you import an Exclude List File, the paths and files are added to the existing list. To export an exclude list 1. From the Rollback Data tab, click Export icon . 2. Browse to the path where you want to save the Exclude List File (.XML). 3. Enter a name for the Exclude List File (.XML). 4. Click Save. To import an exclude list 1. From the Rollback Data tab, click Import icon . 2. Browse to the path of the Exclude List File (.XML) you want to use. 3. Select the Exclude List File (.XML). 4. Click Open. The contents of the .XML are added to the exclude list. Configure Space Management Use space management to specify how long you want to keep protected files for. You set up space management policies in two stages: 1. Set rules that tell Recovery Solution what files you want to delete and how old they must be. 2. Schedule one or more times each week for Recovery Solution to actually delete the files. To set space management rules 1. Click the Space Management tab. 2. To limit the computer storage space on the server on per protected computer basis, select the Enable quota checkbox. If the protected computer exceeds the quota, then all snapshots from the protected computer will be blocked until the limit is increased or the storage space used by this protected computer on the server is decreased during retention job. Note We strongly recommend not using storage space limits until most of the protected computers have successfully completed their initial snapshots. You can specify the following settings: Recovery Solution Reference Guide Storage space limit per protected computer 88 Issue warning when storage usage reaches The warning message will be displayed on clients. Log event when a user exceeds warning level Select this box if you want to log the event when the level is exceeded. Show message to the user Select this box if you want to show a message to the user when the level is exceeded. 3. If you want to apply default rules to all files, then under Default Rules, check either or both of the following: Delete snapshots older than This option deletes all files from the snapshots of the protected computers you have selected, after the amount of time you specify has elapsed. Delete files after they have been deleted from a Protected Computer This option deletes only files that were included in a snapshot but that a protected computer has since deleted. The files are deleted from the snapshots only after the originals have been removed from the computers, and then only after the amount of time specified here has elapsed. 4. Under Exception Rules, use the Add icon make exceptions to the default rules. , Remove icon , and Edit icon to You can specify exceptions at the folder or file level, and you can use wild cards to specify files of a specific type. You can specify as many exception rules as you wish. The exceptions always take precedence over the default rules. It does not matter whether the period of time you specify for the exception is longer or shorter than the default. However, if a particular file is included in more than one exception rule, it is kept for the longest length of time specified by any of the rules that contain it. Example: if you keep the folder “C:\My Documents” for 1 year and “*.doc” files for 2 years, then the file “C:\My Documents\Status.doc” is kept for 2 years. In each rule, you can select or clear the box labeled This item is critical for Rollback or FSR. Select this box to indicate that the item in this rule must be present in a snapshot in order for rollback or Full System Recovery to succeed. Once this item has been deleted from a snapshot, the snapshot no longer appears in the list of snapshots that are valid for rollback or Full System Recovery. Note By default, a rule is added for the file WINFAL.LOG to ensure that you do not accidentally remove it. This file is stored by Recovery Solution on each protected computer, and it contains a record of all the files needed to start the computer. You can change the rule, but remember that this file must be present in a snapshot if you intend to perform a Full System Recovery from the snapshot. 5. When you have finished, click OK. 6. Click Apply. Recovery Solution Reference Guide 89 Configure Throttling and Connection (server-based only) You can set bandwidth throttling options that let you limit the network bandwidth used when taking snapshots and restoring files. You can set bandwidth throttling options globally for all protected computers, for protected computer groups, or individual protected computers. You can also give the user rights to set bandwidth throttling options from the Recovery Agent Options dialog. For more information, see Configure User’s Rights and Permissions (page 92). To configure bandwidth throttling options 1. Click the Throttling tab. 2. Set Snapshot Throttling Settings: Limit snapshot speed to You can select the maximum network bandwidth used when taking snapshots. Do not start snapshot if transfer rate is less than You can select the minimum network bandwidth used when taking snapshots. Do not start automatic snapshots over WAN connection Select this box to restrict automatic scheduled snapshots from running when client computer is on the WAN, connected using Virtual Private Networking (VPN), or Remote Access Service (RAS). Consider protected computer to be on WAN connection if the number of gateways between the computer and Recovery Solution Server is greater than Specify the number of hops that the signal sent from a protected computer to the server must perform in order for the protected computer’s location to be regarded as Wide Area Network (WAN). (Default: 2) 3. Set Restore Throttling Settings Limit restore speed to You can select the maximum network bandwidth used when restoring files. 4. Configure Connection Management. Your organization may have a large number of users running snapshots and restoring data on the cluster, so you will want to be sure the network does not come to a halt because too many users are accessing it simultaneously. You can limit the number of connections to the cluster during the day or night, and control network bandwidth using the Throttling tab. 5. Under Work time definition, specify when daytime starts and ends. 6. Under Maximum simultaneous connections, specify throttling options for scheduled snapshots. Note These settings have no effect on server jobs (such as server space management). Recovery Solution Reference Guide Specify the maximum number of scheduled jobs that can be running at any one time during the day. 90 Daytime is defined with the Work time definition options on this tab. Nighttime is defined with the Work time definition options on this tab. 7. Under Manual jobs, specify throttling options for manual protected computer jobs. Manual jobs include snapshots started by users and recoveries (including Full System Recovery). Note These settings have no effect on server jobs (such as server space management). Daytime is defined with the Work time definition options on this tab. Nighttime is defined with the Work time definition options on this tab. 8. Click Apply. Configure Remote Access (server-based only) Recovery Solution lets you define how it will handle snapshots through remote access (Example: dial up connections or VPN connections). By default, protected computers always inherit the default remote access settings for the collections. But in some cases you might want to change the default settings to better suit your time zone and network environment. To change the Remote Access settings 1. Click the Remote Access tab. 2. Chose a Snapshot type: Full system snapshot or Partial snapshot. We recommend that you keep Snapshot Type set to Full System Snapshot. Partial snapshots do not provide Full System Recovery protection. 3. Choose which drives to take a snapshot of. By default, all local drives are selected. 4. Snapshot Settings Take each day’s snapshot as soon as I start remote access Select this box to have Recovery Solution start a snapshot as soon as the protected computer has a remote access connection. Note Changing this setting will only affect clients that have configured remote access connection (VPN or dial up). 5. Display a message before taking the snapshot Take each day’s snapshot as soon as computer connects to server Continue incomplete snapshot from the break point Skip Outlook files snapshot Click Apply. Recovery Solution Reference Guide 91 Configure Performance (local mode only) To set the performance settings 1. Click the Performance tab. 2. You can decide whether or not to allow users to change their settings. For more information, see Configure User’s Rights and Permissions on page 92. 3. Set the Priority of Recovery Agent operations. Priority Level The priority level indicates how much of the computer resource, such as CPU and disk access, Recovery Agent will leave for other applications. The lower the setting the more resources for other applications. 4. Click Apply. Configure Storage Management (local mode only) This tells the Recovery Agent at install where to create the Altiris partition for snapshot data. As an administrator, you can change the rights assigned to each collection of users. To manage your storage 1. Click the Storage Management tab. 2. You can decide whether or not to allow users to change their settings. For more information, see Configure User’s Rights and Permissions on page 92. 3. Click the Add Storage icon 4. Enter the path to the storage location. . The following restrictions apply (otherwise the location will not be added): Additional storage location cannot reside on a system hard disk drive. Additional storage location must exist on clients to which the policy is applied. 5. If you want to limit the amount of disk space used then check Limit storage capacity to enter a maximum MB to use. 6. Click OK. 7. If you want to specify where the Temporary retention folder is to be located, enter the string. By default, it is located in the system temporary folder. 8. Click Apply. Configure User’s Rights and Permissions By default, all Recovery Solution users are allowed to use certain parts of the software. As an administrator, you can change the rights assigned to each user. Note All these options can also be set on each specific settings page. Recovery Solution Reference Guide 92 To assign rights to a protected computer 1. Click the Rights tab. 2. Select Inherit rights if you want this computer’s rights to be inherited from the group or the server that contains it. 3. Select or clear the Protected Users Rights options you want. The following rights can be configured. Perform manual snapshots Select this box to allow users of this computer to manually initiate snapshots. Perform restore Select this box to allow users of this computer to perform restore. Perform rollback Select this box to allow users of this computer to perform rollbacks. Accelerate scheduled snapshots Select this box to allow users of this computer to manually initiate snapshots. Enable Local Recovery Agent (server-based mode) Check this box to allow users of this computer to enable Local Recovery Agent functionality. Manage Altiris Partition (local mode) Select this box to allow users of this computer to change the Altiris Partition settings. Create Recovery DVD (local mode) Select this box to allow users of this computer to create Full System Recovery DVDs locally. 4. Select or clear the User Permissions options you want. The following rights can be configured. 5. Allow to edit snapshot settings Allow to append snapshot excludes Allow to append rollback excludes Allow to edit space management settings Allow to edit performance settings (local mode) Allow to edit storage management settings (local mode) Allow to edit miscellaneous settings Allow to edit F11 recovery settings Allow to edit bandwidth throttling settings Communication settings (server-based mode) Remote access settings (server-based mode) Click Apply. Recovery Solution Reference Guide 93 Configure Miscellaneous Settings The following Recovery Agent options can be configured by an administrator as well as by a user at a protected computer: z Display Settings z Health Alerts Setting (server-based only) z Communication Settings (server-based only) z F11 Recovery Settings (local-mode only) To configure miscellaneous settings 1. Click the Misc tab. 2. You can decide whether or not to allow users to change their settings. For more information, see Configure User’s Rights and Permissions on page 92. 3. Under Miscellaneous Settings, select or clear the Display Options you want. Notify user when a scheduled snapshot completes successfully Select this box if you want the user at the protected computer to see a message when snapshots that have been scheduled complete successfully. Notify user when a scheduled snapshot fails Select this box if you want the user at the protected computer to see a message when a scheduled snapshot fails. Notify user when disk configuration change(s) Select this box if you want a user at the protected computer to see a message after a drive configuration change. To ensure that all files are protected, the user or administrator should verify the computer’s schedule for snapshots as soon as possible after a drive configuration change. If the schedule is not updated, then files stored on new drives or drives for which drive letter assignments have changed might not get included in snapshots. Show progress indication of the scheduled snapshot This option configures the status indicator dialog to be displayed during a snapshot. This option is disabled by default and is configurable on the protected computer’s properties page. Show the Welcome Screen when I start Window This option configures the welcome screen to be displayed during login to windows. This option is enabled by default and is configurable on the protected computer’s properties page. Show the status icon in the Welcome system tray This option configures the status icon to be displayed into the system tray. This option is enabled by default and is configurable on the protected computer’s properties page. Show Recovery Agent options in Start Menu This options defines whether the Recovery Agent menu will be put in the Windows Start menu. Recovery Solution Reference Guide 94 Show Recovery Agent desktop icon This option configures the Recovery Agent Icon will be put on the desktop of the protected computer. This option is enabled by default and is configurable on the protected computer’s properties page. Hide client UI This option configures the status indicator dialog to not be displayed during a snapshot. This option is disabled by default and is configurable on the protected computer’s properties page. User interface language This option configures the language to be displayed in the Recovery Agent on the protected computer. This option is disabled by default and is configurable on the protected computer’s properties page. 4. Select or clear the Other Options you want (server-based only). Use encryption when communicating with the Server This option is disabled by default and is configurable on the protected computer’s properties page. 5. Select or clear the Health Alerts Settings you want. Show health alert if a snapshot has not occurred in Select this box if you want the user at the protected computer to see a message when snapshots that have been scheduled complete successfully. The user will always see a message if a snapshot fails, whether or not this box is selected. Show health alert if an upgrade has not occurred in Select this box if you want a user at the protected computer to see a message if the Recovery Solution User’s software needs an upgrade. 6. Modify the Communication Settings (server-based only). Connection type You can choose from three connection types for the protected computer to communicate to the Recovery Server: DCOM HTTP HTTPS If you are using balanced cluster, you can either use HTTP or HTTPS. If you are using a non-balanced cluster, you can use any of the three. Generally, using DCOM can provide faster communication by as much as 10-20%. However, DCOM may not work well behind fire walls or on slow WAN connections. In those cases, HTTP will be the preferred option. The Recovery Server supports multiple protocols being used at the same time. It is possible to have a different protected computer use a different protocol, depending on the collection and policy that a protected computer is using. Recovery Solution Reference Guide Use Altiris Agent proxy settings for HTTP/HTTPS communication between Recovery Agent and Server 95 (enabled by default) Clear this checkbox if you do not want the Recovery Agent to use the Altiris Agent proxy settings (in case they are configured on the client computer) for HTTP/HTTPS communication with the server. Notes The Altiris Agent on client computers uses the proxy server settings configured through Windows Control Panel > Internet Options > Internet Properties > Connections tab > LAN Settings > Proxy server. The Recovery Server computer must be visible to the proxy server used by the client for communication. Enable Altiris Recovery Agent to modify Windows Firewall settings Clear this checkbox if you do not want the Recovery Agent to modify Windows Firewall port exception rules on client computers. Note By default, when the Recovery Agent service starts on protected computers running Windows XP or Windows 2003 Server, it will add port 43189 to the Windows Firewall exceptions. On Windows XP and Windows 2003 client computers without a service pack or with SP1, the Internet Sharing Configuration dialog box will appear upon Altiris Recovery Agent service startup asking to give the C:\Program Files\Altiris\Recovery Solution Agent\AeXRSAgt.exe permission to edit Internet Connection Protection settings. The users must select Do not show this dialog again and then click Yes to let the Recovery Agent service modify the Windows Firewall exceptions. When the Recovery Agent service stops, the port 43189 will be removed from the Windows Firewall exceptions. 7. Modify the F11 Recovery Settings (local-mode only): Show F11 Recovery prompt Clear this box if you want the F11 Recovery prompt not to appear at the protected computer start. Protect F11 Recovery with password Select this box if you want the user to be prompted for a password when launching the F11 Recovery. Specify the password in the Password field. 8. Click Apply. Recovery Solution Cluster Configuration Using the cluster properties page, you can perform the following cluster configuration tasks: z General Settings (page 97) z Configuring Server Job Schedules (page 98) z Configuring Event Notifications (page 101) z Configuring Storage Management (page 101) Recovery Solution Reference Guide 96 z Managing Recovery Solution Servers (page 106) z Managing Cluster Users (page 108) z Configuring Communication Settings (page 110) For information on creating a cluster, see Creating a Recovery Solution Cluster (page 36). To open the cluster properties page 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab 3. In the left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 4. Click the cluster node. General Settings Changing General Cluster Settings 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. In the left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the General tab. 6. Change the name of the cluster. 7. Change the address of the cluster. 8. Change the Recovery Solution database user credentials. Note If you have multiple cluster databases on the server, changing credentials for one them will affect the other clusters as well. Caution Two or more Recovery Solution clusters created on one or more server computers and connecting to the same SQL server must use the same Recovery database user credentials. 9. (optional) Select or clear Enable cluster load balancing support. If selected, the Cluster Address needs to be the virtual IP address of the load balancer. 10. (optional) Enter or Change the IP Address of the Load Balancer. Note This is only used for F5 BIG-IP Blade Controller. 11. Click Apply. Recovery Solution Reference Guide 97 Note If the storage locations are entered not using UNC paths, then you must change them from local paths to UNC paths before you uninstall the Recovery Server, otherwise you cannot change the cluster. Without an active Recovery Server, the storage type will not be changed in the Recovery Database. Configuring Server Job Schedules There are serveral types of jobs that are not associated with any particular protected computer. These are collectively called server jobs. Delete Marked Items This job deletes files and folders marked for deletion and initiates storage compaction to consolidate the “empty space” after deletion. Note You do not have to schedule Deletion Jobs if Server Space Management jobs are already scheduled. Server Space Management automatically deletes any files or folders marked for deletion. Integrity check This job checks to make sure that all of the data included in snapshots actually exists on the server. Recovery Solution verifies the presence of the data, but does not verify that the information is intact or recoverable. This job also updates statistics in the database in order to keep performance optimized The following options are available for the Integrity Check server job: z Delete lost protected data files Check this option to have the Integrity Check job delete the information about the protected data file in the database in case the file is missing from the raw storage. z Delete unrecoverable protected data files Check this box to have the Integrity Check job delete the information about the protected data file in the database in case the file is corrupted. If integrity job finds a corrupted block, it will try do the following things: 1. If there is more than one storage group, then integrity job will try looking for the valid block located in other storage groups. 2. Integrity job will perform database cleanup. This involves database information that refers to the corrupted blob block and will be removed from the database. There are three cases: File data block is corrupted - the entire file will be removed from the database, the user will not be able to restore the file or some of its revisions. Security data block is corrupted - only security record will be removed from the database, so user will not be able to restore file security for some files. Full system recovery block is corrupted - full system recovery blocks will be removed from the database, so user will not be able to perform full system recovery or rollback from the snapshots that refer to that full system recovery block, that snapshot will not be visible in data recovery wizard. Recovery Solution Reference Guide 98 Note The same process runs during snapshot - if the agent that performs the snapshot tries reading the corrupted block, the references to this block will be removed from the database, and the agent should backup that data again. If data was corrupted, the file will be backed up again; if the security block is corrupted, the security descriptors will be backed up again. There is no handling for corrupted full system recovery blocks. Perform CRC Select this box to have the Integrity Check job use Cyclical Redundancy Checking to verify that the data found matches the original data stored during snapshots. Recovery Solution checks the integrity of the information in the “BLOB” files. While a successful integrity check with CRC makes it likely that most files can be recovered, it does not guarantee that any individual file is actually recoverable, as it handles file corruptions the same way as integrity check without CRC. Using this option can cause the Integrity Check job take a very long time to run, so you should be selective when and how often you run it. Server Space Management This job provides the same functionality of Delete Marked Items job with the following additional benefits: z Blob data storage retention occurs according to the Server Space Management rules. z Server space management job CPU throttling can be managed via the console. Storage Locations Synchronization This Job performs regular storage synchronization between synchronous storage groups (i.e. Main Storage) and asynchronous mirrors. The frequency of this job determines how current these mirrors are. This server job only needs to be scheduled if the cluster has asynchronous storage. To schedule server jobs 1. Click the Server Schedules tab. 2. From the Job list, click the type of job you want to schedule. Note Although you can only select one job at a time from the list, you can enter its schedule, then click other items to schedule them. 3. In the Days area, check the boxes next to the days of the week you want this job to run. 4. Under Start Job, specify a time window within which you want the job to start. Note The job is not necessarily completed within this time window. However, you should ensure that the start window is reasonably long, because if the server is busy when Recovery Solution tries to start the job then it might be skipped until the next day or week (depending on your schedule). Recovery Solution Reference Guide 99 You might want to use the Job Schedule Worksheet (page 274) to help you plan out appropriate times to run server jobs. 5. (Server Space Management Job only) Force deletion of the recently excluded files During the SSM job, this will cause the automatic deletion of any files or folders that have been configured by the user to be excluded. 6. (Server Space Management Job only) Server space management job CPU throttling This is the maximum amount of server processing to be use for this job. 7. (Server Space Management Job only) Storage Compaction Compaction is a form of compression used on NTFS volumes performed by Recovery Solution itself rather than the operating system. Compaction works by consolidating the “empty space” stored inside protected data (“BLOB”) files. In most cases the main benefits of compaction occur when protected data is deleted. Recovery Solution only applies compaction to the data during server space management and deletion jobs. 8. (optional) Compact compressed volumes This will use compaction on operating system compressed volumes 9. (optional) Minimum space to reclaim (% data file size): default is 50%. This option configures the minimum amount of unused space in a raw storage file (BLOB) that would trigger the compaction. The purpose of the Compaction is to reclaim space on non-compressed NTFS and FAT16/32 volumes. It also decreases the actual number of BLOBs, that is useful if you plan to backup BLOBs to tape. Decreasing the number of BLOB files is also good for the general file-system performance. Setting this option to a lower value, 10% for example, causes the Compaction to occur even if the amount of unused space is as low as 10% of the entire disk space occupied by a BLOB. A higher value set, 50% for example, makes the Server Space Management job reclaim unused space only when at least 50% of the entire BLOB file is empty. Thus a lower value reclaims more disk space to the prejudice of the speed of the job. On the contrary, a higher value makes the job complete faster while more free space is retained unused. An optimal value depends on the specific Server Space Management job schedule and the amount of data in raw storage. Note In most environments enabling Compaction or changing its settings will not result in any reduction of space utilization, as normally BLOBs are already compressed by NTFS compression. 10. Click Apply. In addition, any pending job in the job queue that is scheduled to run at a later time can be accelerated to run immediately. For more information, see Job Schedule Worksheet (page 274). Notes All server jobs runs on only one Recovery Solution Server and it is not fault tolerant. All server jobs run according to the time setting of the Recovery Solution Server that is the machine physically running the job. Recovery Solution Reference Guide 100 Configuring Event Notifications Recovery Solution can notify by e-mail if a specific event has occurred. An example of such an event is “Unable to recover file”. Note SMTP server and port settings used for notifications must be properly configured during Notification Server setup or afterwards through the Altiris Console > Configuration tab > Server Settings > Notification Server Settings > E-mail Configuration, otherwise Recovery Solution e-mail notifications will not work. To add an event notification 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. In the left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Events tab. 6. Enter an e-mail address to send the alert to. 7. Enter the subject line of the alert. 8. Click the add event notification icon 9. Select an event. . 10. Click Apply. 11. Click Apply. To delete an event notification 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Events tab. 6. Choose the event you wish to delete. 7. Click the delete event notification icon . Configuring Storage Management A Storage Group defines a logical group of physical storage space to be managed as a unit. Storage Groups are used to simplify the management of storage devices. They allow groups of physical storage to be treated as a single resource. When additional storage groups are added, the data is synchronized from the main storage group and Recovery Solution Reference Guide 101 after synchronization then all groups are synchronous updated and the system is mirrored. Note There must be one synchronous storage group in a cluster. Storage Group By default there is a Main Storage storage group. By adding additional storage groups you are mirroring the BLOB data. There are two types of mirrors that can be added synchronous and asynchronous. A synchronous mirror adds the data is update in the mirror at the same time the data is update in the Main Storage. Asynchronous mirror updates when the Storage Locations Synchronization server job runs which needs to be scheduled by the administrator. In case one mirror goes offline during snapshot (restore), snapshot continues to (from) another mirror. Space management and Integrity Check jobs work simultaneously with all mirrors. In case whole BLOB file created only on one mirror, then it is copied to other mirrors by Storage Locations Synchronization job. In case only some blocks were unsynchronized, then these blocks also synchronized by Synchronization job. There are three actions you can do to a storage group: add, edit and delete. To add a storage group 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Click the add group name icon 7. Enter a name for the new group. 8. (optional) If the group is to be updated Asynchronous, select the checkbox. 9. Click Ok. . To edit a storage group 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Choose the group you wish to edit. 7. Click the edit group name icon Recovery Solution Reference Guide next to the group name. 102 8. You can either change the name of the group or change updating between synchronous and asynchronous. 9. Click Ok. To delete a storage group 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Choose the group you wish to delete. Click the delete storage group icon next to the group name. Storage Location In the Main Storage storage group there will be at least one storage location that was specified at installation of Recovery Solution. There are six actions you can do to the storage location: add, edit, enable, disable, move and delete. To add a storage location 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Choose the group you want to add a storage location to. 7. Click the Add Storage Location icon 8. Enter a data storage location. This can be either an IP address, a DNS name, or a computer name where hard drive space will be used. The format for entering this information is \\<servername>\<sharename>\<directory>. 9. Select Limit storage capacity to if you do not want to use all the free space on the specified drive. Enter a maximum space to be used (MB), or enter 0 for unlimited. above list of storage location for that group. 10. If this is a remote location, provide authentication credentials. Notes Use domain (not local) user credentials, otherwise the storage location will be inaccessible. A remote share permissions and folder security must be configured to allow full access to the user accessing the share. Recovery Solution Reference Guide 103 You must not add network storages located on computers from domains, which are not trusted by the Recovery Server domain. Also, do not use the credentials of users from the non-trusted domains to access the storage locations. Storage status will be reported ‘Inaccessible’ after adding such storages. The reason is that Recovery Server cannot be impersonated under a user account from a non-trusted domain. 11. Click OK. 12. Click Apply. To edit a storage location 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Select the group you want to add a storage location to. 7. Click the Edit Storage Location icon group. 8. You may edit the amount of storage space to use and authentication credentials. 9. Click OK. above the list of storage locations for that 10. Click Apply. To enable a storage location 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Select the group you want to enable a storage location too. 7. Select the storage location you wish to enable. 8. Click the Enable Storage Location icon group. 9. Click Apply. above the list of storage locations for that To disable a storage location 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. Recovery Solution Reference Guide 104 3. Click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Select the group you want to disable a storage location. 7. Select the storage location you wish to disable. 8. Click the Disable Storage Location icon group. 9. Click Apply. above the list of storage locations for that To move data files 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Select the group you want to move a data file from. 7. Select the storage location you which data file you wish to move. 8. Click Move Data File. 9. Select where you wish to move the data file to. 10. (optional) Click Disable the storage after its contents has been moved. 11. (optional) Click Delete the storage after its contents has been moved. 12. Select one Move all This will move all the data from the one location to the other. Move an mount of storage from the totaled stored Move the ID in a range 13. Select one Start Job Now will start the data file move now. Schedule job allows you to choose a data and start time frame for the job to be executed. 14. Click Ok. 15. Click Apply. To delete a storage location 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. Recovery Solution Reference Guide 105 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Storage Management tab. 6. Select the group you want to delete a storage location. 7. Select the storage location you wish to delete. 8. Click the Delete Storage Location icon above the list of storage locations for that group. 9. Click Apply. Note You must manually delete the storage files after deleting a storage location. Managing Recovery Solution Servers A Recovery Solution Cluster must have at least one Recovery Solution Server. If Load Balancing is turned on for a given Recovery Solution Cluster, multiple Recovery Solution Servers can be set up. To install a Recovery Solution Server 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab, and then click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 3. Click the Recovery Solution Server Install task. 4. In the right content pane, select the cluster you want to add a server to. 5. Click the Add Server 6. Select the computer you want to install as a Recovery Solution Server. 7. Click OK. 8. (Optional) To override default installation folders, click Installation Settings. 9. Click Install Server. icon. 10. You can accept the default installation settings or changes them. Click Proceed with Install. It will take a few minutes for the server component to install. The rollout page shows the status of the server rollout process. Click the Refresh the page. icon to refresh After the installation is complete, the server will appear in the list of servers for the cluster under the Servers tab of the cluster properties page. Altiris Recovery Solution Server will also appear in the Add/Remove Programs list on the computer it was installed on. Recovery Solution Reference Guide 106 To view Recovery Solution Servers 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Servers tab. The following information is displayed for each server for that cluster: Name of the server Domain which the server resides The IP address of the server The current status of the server To disable a Recovery Solution Server 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Servers tab. 6. Highlight the server to disable. 7. Click the Disable Server icon 8. Click Yes. 9. Click Apply. . To enable a disabled Recovery Solution Server 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Servers tab. 6. Highlight the server to enable. 7. Click the Enable Server icon 8. Click Apply. . To uninstall a Recovery Solution Server 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. Recovery Solution Reference Guide 107 2. Click the Configuration tab. In teh left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. 3. Click the Recovery Solution Server Uninstall task. 4. Select the cluster which you want to uninstall a server from. 5. Highlight the server you wish to uninstall. 6. Click Uninstall Server. 7. Click Yes. To stop or start a Recovery Solution Server service See Stopping and Starting the Recovery Solution Server Service (page 289). Managing Cluster Users Recovery Solution uses Microsoft Domain users and groups only for authentication. To view users of a Recovery Solution Cluster 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Users tab. To add a user or domain group to a Recovery Solution Cluster 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Users tab. 6. Click the User Add icon 7. Check User if you wish to add a Domain User. 8. Check Groups if you wish to add a Domain Group. 9. Select where to search: . Local Domain enter the domain name 10. Select type of query either Equals or Starts With. 11. Enter name or part of name to search for. Recovery Solution Reference Guide 108 12. Click Find. 13. Highlight users to add. 14. Click Ok. 15. Click Apply. To delete a user or domain group from a Recovery Solution Cluster 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Users tab. 6. Highlight the User or Group to be deleted. 7. Click the User Delete icon 8. Click Apply. . To enable Web-Based File Recovery for all new users 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Users tab. 6. Enable the Allow web-based restoration for all new users checkbox. Note This setting will affect all newly installed clients. 7. Click Apply. To enable Web-Based File Recovery for all existing users 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Right-click the cluster node. 5. Select Recovery Solution tasks > Administration > Change Web Access settings > Enable from in the drop-down list. 6. In the Enable Web Access dialog, click Ok. Recovery Solution Reference Guide 109 Configuring Communication Settings 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Configuration tab. 3. Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. 4. Click the cluster node. 5. Click the Communication tab. 6. Manage Server(s) from Altiris Console Using HTTP Binding port: the default is 80 this can be change to another port. 7. Recovery Solution Agents communication with server(s): You can choose from three connection types: DCOM HTTP HTTPS If you are configuring a balanced cluster, you can either use HTTP or HTTPS. If you are using a non-balanced cluster, you can use any of the three. Generally, using DCOM can provide faster communication by as much as 10-20%. However, DCOM may not work well behind firewalls or on slow WAN connections. In those cases, HTTP will be the preferred option. This setting is used when the cluster communicates to protected computers during the Recovery Agent installation and registration. The protocol may be different when the Recovery Agent communicates to the Recovery Server farther on. Configuration of transport protocol used after the installation can be configured on the Misc tab of Recovery Agent Settings policy. For more information on Recovery Solution Agent communication settings see Configure Miscellaneous Settings on page 94 Notes If you are using HTTP for communication the binding port will be the same port as communications between the Altiris Console and Recovery Servers If you are using HTTPS for communication the binding secure port will default to port 443 and can be change by the administrator if need. For HTTP and HTTPS ports 8080 and 8081 should not be used as binding ports used by Recovery Solution if Altiris Deployment Server is installed on the same Notification Server. Both HTTP and DCOM is used for communication between Recovery Solution Server and Notification Server. Recovery Solution Security Role Management Recovery Solution setup creates new folders and items in the Altiris Console. Each of these folders and items has certain permissions available to assign to users. In the Recovery Solution Reference Guide 110 Notification Server, roles are assigned access rights to various elements in the console. By default, setup creates new role named Altiris Recovery Solution Helpdesk Technicians, which applies specifically to the solution. Administrator can manage roles and assign each role its own set of Global Privileges in the Role Management window. Note For information on Altiris Console permissions, security and role management, see Altiris Notification Server Help. See also: Security Role Management (page 111). Security Role Management The Security Role Management page allows you to handle all of your Role Management settings. In the Notification Server roles are assigned access rights to various elements in the console. So, a user's console rights are dependent on which roles they are a member. To access this page 1. In the Altiris Console, select the Configuration tab. 2. In the treeview pane, navigate to Configuration > Server Settings > Notification Server Settings. 3. In the treeview pane, select Security Role Management. Note There are a number of default roles in the Role Management window and each has its own set of Global Privileges. The following table lists the Recovery Solution global privileges and their default assignments. Privilege Description Assigned roles Manage Recovery Solution Agent Jobs Roles with this privilege can manage content and Recovery Solution Agent jobs which include start/cancel snapshots, restores, rollbacks. z Altiris Administrators z Altiris Recovery Solution Helpdesk Technicians Roles with this privilege can create media for Full System Recovery. z Altiris Administrators z Altiris Recovery Solution Helpdesk Technicians Roles with this privilege can start/ cancel Recovery Solution clusters' jobs. z Altiris Administrators Create FSR Media Manage Recovery Solution Cluster Jobs Recovery Solution Reference Guide 111 Privilege Description Assigned roles Manage Protected Computers Roles with this privilege can manage protected computers which include enable/disable accounts, manage users, and mark data for deletion. z Altiris Administrators Run Critical Rollbacks Roles with this privilege can run snapshots performed prior to a critical patch or a software update installation. z Altiris Administrators Administrator can control role’s access permissions for every Recovery Solution interface item in the Altiris Console by changing Security Descriptor Settings for the item. To see security settings for the item, click on the Security tab of Properties window accessible via the item’s right-click menu. Notes By default, Altiris Recovery Solution Helpdesk Technicians can only perform Recovery Agent Rollouts and have read-only access to the Recovery Agent Settings via the Altiris Console. For more information about Altiris Console permissions, security and role management, see Altiris Notification Server Help. Configuring Recovery Server to Only Run Server Jobs You may want server jobs (such as server space management) to run on a dedicated Recovery Solution Server that does not run client jobs. To configure a Recovery Solution Server to only run server jobs 1. 2. Create a new load balanced Recovery Solution Cluster. For instructions, see Creating a Recovery Solution Cluster on page 36. If you are planning to distribute client jobs among several servers, use the load balancer address to specify Recovery Solution Cluster address. Configure the load balancer properly to forward requests from the clients to the server. For additional information, see Configuring the Load Balancer on page 27. If you are planning to distribute server and client jobs between two servers, use the address of the server that will run client jobs. Add the new servers to the cluster. For instructions, see Adding Recovery Solution Servers to a Recovery Cluster on page 40. By default, all the servers can run both server and client jobs. The server dedication to running server or client jobs is determined by the value stored in the Role column of the Vault table found in the Recovery Solution database. You can use Microsoft SQL Server tools to modify the server role. Recovery Solution Reference Guide 112 Caution Be extremely careful when modifying the Recovery Solution database. If you accidentally change or delete the wrong values, the solution may stop working properly. The following values can be assigned: 0 - the server is dedicated for snapshots 1 - the server is dedicated for server jobs 2 - the server accepts any kind of jobs Example If you want some server to run only server jobs, change the value in the column Role for the server to 1. If you want some server to run only server jobs, change the value to 0. Scan for applied critical patches and Software Delivery tasks This policy updates Recovery Solution databases with patch and Software Delivery task execution data. You can either enable the policy to run on schedule, or execute the policy once by clicking on the Execute button. To access and enable the policy 1. From the Altiris Console, click the Configuration tab. 2. Click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. Scan for applied critical patches and Software Delivery tasks. 3. Set the Enable checkbox and click Apply. Manage Lost Recovery Solution Agents Using this policy, you can manage clients that are not displayed in other Notification Server collections. These may be clients, for which two or more accounts exist in the Recovery Solution Database, or for which the account exists in the Recovery database but is missing in the Altiris database. To access this policy 1. In the Altiris Console, click the Configuration tab. 2. In the left pane, click Confguration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration > Manage Lost Recovery Solution Agents. Recovery Solution Reference Guide 113 Chapter 6 Recovery Solution Tasks This chapter lists the tasks that you can perform using Recovery Solution. z General Recovery Solution Tasks in the Altiris Console (page 114) z Viewing Recovery-related Information about Individual Computers Using the Resource Manager (page 114) z Performing Basic Recovery Tasks (page 116) z Manage Agent Setup Packages (page 127) General Recovery Solution Tasks in the Altiris Console On the Tasks tab, predefined policies perform the following tasks: Tasks Link to information Agent Settings Decryption/ Encryption Utility AeXRSEnc Utility (page 279) Altiris Partition Removing Utility BWINST Utility (page 288) Convert encrypted files on FAT partitions Convert Encrypted Files on FAT Partitions (page 128) Erase the protected computer’s partition table Erasing the Partition Table (page 146) Manage Agent Setup package Manage Agent Setup Packages (page 127) Restore data from Full System Recovery CD or DVD-ROMs Restoring Data From Full System Recovery Media (page 146) Restore data using the Migrate utility Restoring Data with the Migration Utility (page 130) To access the Recovery Solution task policies, open the Altiris Console, click the Tasks tab, and then click Tasks > Incident Management > Recovery Solution. Viewing Recovery-related Information about Individual Computers Using the Resource Manager You can use the Resource Manager to view recovery-based information about individual client computers. You can view the following information: z Summary Information: The cluster that files are backed up to The last snapshot start and end time Recovery Solution Reference Guide 114 z z z The snapshot status The number of files and amount of bytes backed up The space used to store backed up files Inventory Information: Name, version, and last update time of the Recovery Agent. Address of Recovery Solution Cluster the computer is connected to Altiris Partition: size, available space, amount of recovery data Size and date of image creation Recovery Agent database: size and last update time Event Information (Example): Agent registration Snapshots started and completed Snapshots failed Service started Connection failures Recovery Agent settings defined and customized by a user (not the administrator) Notes Inventory information is available only after the Altiris Agent on the client computer has reported inventory data to the Notification Server. By default, inventory data is reported once daily. Only the settings defined by the user will be displayed (not the settings defined by the administrator). To view the recovery-based information about a computer in the Resource Manager 1. Click the computer item in either a report or collection. a. Example: click the Configuration tab, In the left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Settings folder. b. Click the Computers with Recovery Agent installed to cluster collection. c. Double-click a computer in the collection. The resource manager for the computer opens. 2. For summary information, click Recovery Summary under the Summaries tab. 3. For inventory information, click Recovery Solution > AeX RSA Configuration under the Inventory tab. 4. For event information, click Recovery Solution > AeX RSA Events under the Events tab. Recovery Solution Reference Guide 115 Performing Basic Recovery Tasks Users can recover their own files by browsing to them in Windows. Instructions for recovering files are contained in Recovery Solution User’s Guide. Normal file recovery is possible as long as Windows and Recovery Solution are functioning properly. If the computer cannot be started, it might be necessary to perform Full System Recovery. For more information see Full System Recovery on page 131. For information on more advanced tasks, see Advanced Snapshot and Recovery Procedures on page 128. Caution You cannot restore encrypted files to drives using FAT or FAT32. See also: z Running Server Jobs (page 116) z Performing Recovery Tasks on Individual Computers Using the Resource Manager (page 117). Running Server Jobs You can run various server jobs through the cluster right-click menu in the Altiris Console (Configuration > Solution Settings > Incident Management > Recovery Solution Recovery Solution Clusters > Recovery Solution Cluster Configuration > (right-click a cluster) > Recovery Solution Tasks > Start Server Job). The following server jobs are available for immediate running: z Delete Marked Items For information about this job, see Delete Marked Items on page 98. z Integrity Check For information about this job, see Integrity check on page 98. z Server Space Management For information about this job, see Server Space Management on page 99. z Storage Locations Synchronization For information about this job, see Storage Locations Synchronization on page 99. You can also delete all users’ snapshot data from data storage and from the Recovery Database by right-clicking the cluster name > Recovery Solution Tasks > Delete All User Data. In addition, the following administration and client tasks are available through the cluster right-click menu (Configuration > Solution Settings > Incident Management > Recovery Solution Recovery Solution Clusters > Recovery Solution Cluster Configuration > (right-click a cluster) > Recovery Solution Tasks). These tasks apply to all clients installed on the Recovery Solution cluster. z z Administration Change Account’s Status Change Web Access Settings Mark Files for Deletion Start Client Jobs Recovery Solution Reference Guide 116 z Rollback To the Last marked Snapshot To the Last Snapshot Accelerate Scheduled Snapshot Snapshot Now... Performing Recovery Tasks on Individual Computers Using the Resource Manager Administrators or helpdesk personnel can restore or delete files and/or folders from snapshots without having to remote control in to the client. If you need to perform recovery tasks on an individual client computer, you can do so through the Resource Manager. You can use the Resource Manager tasks to do the following: z Accelerate a Scheduled Snapshot (page 118) z Create a Full System Recovery Image (page 118) z Disable/Enable a Computer Account (page 118) z Manage Full System Recovery Image (page 118) z Manage Protected Data (page 118) z Manage the Users of a Protected Computer (page 120) z Mark the Client Computer Account to be Deleted (page 120) z Mark Files for Deletion (page 120) z Perform a Rollback (page 122) z Perform a Snapshot Now (page 127) Note Recovery tasks are available only after the Altiris Agent on the client computer has reported inventory data to the Notification Server. By default, inventory data is reported once daily. In case port 43189 port is closed, client jobs (such as snapshot, restore, rollback) initiated from the Altiris Console may start with a delay of up to 15 minutes. For details, see Configure Snapshot Settings on page 78. To perform recovery-based tasks on a computer using the Resource Manager Click the computer item in either a report or collection. 1. Example: on the Configuration tab, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Settings folder. 2. Click the Computers with Recovery Agent installed to cluster collection. 3. Double-click a computer in the collection. The resource manager for the computer opens. Recovery Solution Reference Guide 117 You can also select a collection or one or more computers in a collection and choose Recovery Solution Tasks from the right-click menu to access a list of recovery tasks. Accelerate a Scheduled Snapshot You can start the next scheduled snapshot for the protected computer. 1. From the Task tab of the Resource Manager, click Accelerate Scheduled Snapshot. The snapshots run immediately on the computer, and their schedules are modified to clear all further snapshots for the remainder of the day. A snapshot for each computer runs on the next day defined in its schedule. Create a Full System Recovery Image You can create a Full System Recovery Image for the protected computer. For more information, see Full System Recovery Disk Creation on page 134. Disable/Enable a Computer Account You can enable or disable the computer’s ability to perform recovery tasks. 1. From the Task tab of the Resource Manager, click Disable/Enable Account... 2. Check or clear the checkbox to Enable or Disable the account 3. Click Ok. Note You can enable or disable all computers at once through the right-click context menu for a cluster or a collection of computers with Recovery Solution Agent installed: right-click the cluster name > Recovery Solution Tasks > Change Account's Status > Disable/ Enable Accounts. Manage Full System Recovery Image You can manage Full System Recovery images for the computer. This option lets you copy or delete Full System Recovery images for the computer. 1. From the Task tab of the Resource Manager, click Manage FSR Images... A list shows the Full System Recovery images and their properties. 2. To copy an image, highlight it and click the copy icon. 3. To delete an image, highlight it and click the delete icon. Manage Protected Data This feature lets administrators view which files are backed up and delete the files that do not need to be protected. The restore function will restore files and folders to the original location on the protected computer. You can restore the following file revisions: z Latest Version Recovery Solution Reference Guide 118 Choose this option to display only the most recent snapshot of each file. Even files that were not included in the most recent snapshot are displayed, as long as they were in some previous snapshot. z All Versions Choose this option to display all snapshots of your files. If you're viewing all file details (View menu), the Snapshot Taken column shows the date and time that each snapshot was originally run. Note In some cases the time displayed under Snapshot Taken might be the only distinguishable difference between two or more versions of a file. This could happen if the file itself did not change between snapshots, but the properties of the file did. Example: Recovery Solution creates a new version of the file if the only change is in its NTFS security attributes. If you have installed the Recovery Agent more than once (or if your software was automatically updated from the server), you might have the following additional options: z Snapshots From All Installations Choose this option to display protected files from all of your Recovery Agent installations. If you're viewing all file details (View menu), the Snapshot Taken column shows the date and time that each snapshot was originally run. z Snapshots From Current Installation Choose this option to display protected files only from your current Recovery Agent installation. z Snapshots From Previous Installations Choose this option to display protected files only from your previous Recovery Agent installations. If you're viewing all file details (View menu), the Snapshot Taken column shows the date and time that each snapshot was originally run. Note If a particular file or folder originated on an NTFS drive, and you do not have at least read access to the file or folder, then you cannot see it in the list of protected files. However, if you restore a folder containing the secure item, the item will also be restored (but you still won't have access to open it). To restore and delete files 1. From the Task tab of the Resource Manager, click Manage Protected Data. 2. In the left pane, select the path. 3. In the right pane, select the folders and files you want to mange. 4. To restore data, click Restore. After the file/folder restore is completed, the console displays a completion message. A message is also displayed on the protected computer informing the user that a file/folder restore has been performed by the Recovery Solution Administrator. Recovery Solution Reference Guide 119 5. To delete data from a snapshot, click Delete. You can manually delete specific files and folders that were accidentally backed up to the server, or that you no longer need. Files are manually deleted in two stages. 6. You tell Recovery Solution which items you want to delete. This is known as marking the items for deletion. You schedule one or more times each week for Recovery Solution to actually delete the files. For more information, see Configuring Server Job Schedules on page 98. To unmark data for deletion, click the undelete. Manage the Users of a Protected Computer This option lets you add and remove users. It can be useful to add or remove users using the dialog because this enables users to perform Web-Based File Recovery of their account data, restore data using the Migrate utility or reinstall the account using the existing account. 1. From the Task tab of the Resource Manager, click Manage Users. 2. Select a user and click the enable to disable icon, or click + to add a user, or X to delete. 3. Click Ok. Mark the Client Computer Account to be Deleted This option lets you mark the account to be deleted. This will delete all unique data stored on the server for this account. Do this only of you are sure you will never need access to the data associate with this account again. Data stored locally on the user’s computer will not be affected. Note To optimize Recovery Solution Server performance, this task will be performed during the server management job. 1. From the Task tab of the Resource Manager, click Mark Computer Account for Delete... 2. To mark the account for deletion, click Ok. Mark Files for Deletion This option lets you mark files, folders, or file types to be deleted from snapshots that were accidentally backed up to the server, or that you no longer need. You can have files deleted from a certain path only or all locations. Files are manually deleted in two stages. z You tell Recovery Solution which items you want to delete. This is known as marking the items for deletion. z You schedule one or more times each week for Recovery Solution to actually delete the files. For more information, see Configuring Server Job Schedules on page 98. Recovery Solution Reference Guide 120 Notes You can use the Largest Files report in order to determine the files taking up most space on the server. For instructions, see Using Recovery Solution Reports and Job Queue on page 153. In order to prevent the server from backing up the files and folders marked for deletion, make sure to exclude these files and folders from future snapshots. For instructions, see Excluding Files From Snapshots on page 81. To mark files or folders for deletion 1. From the Task tab of the Resource Manager, click Mark files for Delete... 2. Click the add or edit icon. 3. Under Enter the name of the folder, file or file type you wish to mark for deletion, type the name of the item you want to delete. If you want to browse for files and folders and mark them for deletion, use the Manage Protected Data (page 118) option. You can use wild cards to specify files. Example: “Cache*.*” means all files that start with “Cache”. If you want to delete a specific file or folder, you must enter the full path to that file, starting with the drive letter. If you want to delete a file or file type no matter where it exists on the drive, do not enter a path. 4. Under Enter the name of the folder or file you wish to mark for deletion, choose the description that matches the type of item you specified above. This is a folder Choose this option to specify that the name you entered above is a folder rather than a file. Files by this name will not be deleted. This is a file Choose this option to specify that the name you entered above is a file rather than a folder. Folders by this name will not be deleted. This is a file type Choose this option to specify that the name you entered above is a file type or extension. All files with this extension will be deleted. 5. Under Choose where to mark for deletion this folder or file select the locations from which you want the item to be deleted. Exclude this folder or file name everywhere Choose this option to delete the item from every location on the server. Exclude only this path on Choose this option to specify that the text you entered above should be treated as a path to a specific folder or file. If you choose this option but you specify only a folder or filename without a path, the folder or file is only deleted from the root of the drive. Example: if you type LOGFILE.TXT as the name of the item to delete, then choose “Mark this path for deletion on,” Recovery Solution deletes files such as C:\LOGFILE.TXT Recovery Solution Reference Guide 121 and D:\LOGFILE.TXT (depending on your drive settings below). However, LOGFILE.TXT files found elsewhere on a drive are not deleted. Specify below which drives you want to delete the item from. - All drives Choose this option to delete the above path from every drive. - This drive only Choose this option to delete the above path only from a specific drive. Specify the drive letter in the box. 6. Click Ok. Perform a Rollback The rollback option lets you return a computer to the state it was in at the time of a Full System Snapshot. This is useful if a protected computer can be started but is not functioning properly. (If the computer cannot even be started, you need to use Full System Recovery instead.) A rollback can be performed by the administrator, or by the user (if the administrator has allowed it). Notes You can only roll back a computer if the disk configuration is the same as it was at the time of the snapshot you are recovering. Example: if drive letters were changed or drives were re-sized on the computer since the time of a snapshot, then you cannot roll the computer back to this point. You cannot roll back a Windows 2000/XP protected computer that uses disk volume sets, stripe sets, or fault-tolerant drives. Performing a rollback could cause some evaluation software to claim that it has expired, preventing further use of the software. Before rolling back a computer, Recovery Solution automatically runs a Full System Snapshot of the computer to ensure that the most recent files are protected. After the rollback, the user can restore any needed files that were overwritten by the rollback. If you do not need the extra level of data protection (Example: if the protected computer’s current data is already backed up somewhere) you can prevent the snapshot from running. To do so, modify the protected computer’s Windows registry to add or edit the following value: HKEY_LOCAL_MACHINE\SOFTWARE\Altiris\eXpress\Recovery Solution Agent\NoSnapshotRollback This is a DWORD value that should be set to either 0 (meaning the snapshot will be performed) or 1 (meaning the snapshot will be skipped). For additional rollback help, see Rollback Troubleshooting on page 224. Recovery Solution Reference Guide 122 To roll back a protected computer 1. Before starting a rollback, you should ensure that there are no other programs open on the protected computer. Recovery Solution automatically runs a Full System Snapshot before the rollback starts (unless you have turned that option off), so closing all programs helps to ensure that the latest versions of all data files are protected. 2. From the Task tab of the Resource Manager, click Rollback... 3. Select a snapshot to return the protected computer to that point in time. Only Full System Snapshots are listed. If any date and time settings are different between the computer and the server, some older snapshots might not be available for rollback. To see all available snapshots, the following settings must be identical on your computer and the server: the date and time, the time zone, the state of the option to automatically adjust the clock for Daylight Savings Time (whether this option is on or off). The snapshots affected by the Server Space Management job or containing some corrupted data removed by the Integrity check job are not displayed. The snapshots performed before applying a critical patch and from previous Recovery Agent installations (performed before upgrade or reinstallation with an existing account) will not be displayed on the server’s Rollback dialog unless you enable the Show critical snapshots and snapshots from previous RS Agent installations option. This will not display previous snapshots on the client's Rollback dialog. You can show snapshots from a previous Recovery Agent installation, but it is not recommended. Notes If the protected computer previously had Microsoft Office 97 installed but upgraded to Microsoft Office 2000, you should try to avoid rolling back the computer to a point in time when Office 97 was installed. This might cause some Office files to be restored incorrectly. If you must do this, you might need to reinstall Office 2000 after the rollback is complete. If any date and time settings are different between the protected computer and the server, some older snapshots might not be available for rollback. To see all available snapshots, the following settings must be identical on the protected computer and the server: (1) the date and time; (2) the time zone; (3) the state of the option to automatically adjust the clock for Daylight Savings Time (whether this option is on or off). 4. Select the items to restore. Note If rollback is performed using a snapshot from an earlier version of Recovery Solution, then after the recovery is complete, Recovery Agent must be reinstalled on the protected computer with the user’s existing account. Recovery Solution Reference Guide 123 Restore system and application files only: Choose this option to restore only those files required to run the operating system and installed applications. User data files are not restored. Note Recovery Solution determines if a file is considered “user data” by looking at the file extension. The list of user data file extensions is specified on the Rollback Data tab of the protected computer’s properties. All file extensions not listed here are considered to be system or application files, and are restored during any type of rollback. (The configuration of rollback data is available only to administrators through the console, not to protected computer users.) It is not always obvious from a file’s extension whether the file is a system file or a data file. Example: the .DAT file extension is used by some applications to store information that is actually part of the program, while other applications use it to store options or cached data, and still others use it as a default file extension for data files created by users. Before you start a rollback of system files only, you should examine the list of user data file extensions to be sure that they match the set of files that you consider to be user data. By default, Recovery Solution considers most files to be system data. This is done to ensure that the system works properly after the rollback. However, you might want to add data file extensions to the user data list (thereby preventing the rollback of these files) for the following reasons. z Files that are not excluded from the rollback are overwritten if an older version exists in the snapshot. z Excluding files that do not need to be rolled back means that the rollback can be completed in a shorter amount of time. Here are some examples of additional data file types you might want to specify. *.bmp (bitmaps) *.htm (HTML files) *.mp3 (compressed sound files) *.nsf (Lotus Notes mail files) *.txt (text files) *.wav (sound files) *.zip (compressed zip files) Restore all files (including your data files): Choose this option to restore data files as well as program files. All of your applications and settings will be returned to their previous state, and all of your data will be restored. Caution This option overwrites data files as well as program files. Some of your files might be overwritten with older versions. Recovery Solution Reference Guide 124 Roll back master boot record Click Roll back master boot record if you want to restore the computer’s master boot record and the boot sectors of all primary partitions. The master boot record is necessary to start Windows. It contains information about the computer’s disk partitions and passes this information along to other programs in order to start the computer. The partition tables themselves are not rolled back by Recovery Solution, but the program that reads the partition information is. You might want to roll it back if you suspect that it has become damaged or infected by a virus. Note Some virus protection programs, such as Norton Antivirus 5.0, have an option to protect the computer’s boot code. If the protected computer has Norton Antivirus installed with this option turned on, and the master boot record has changed since the time of the snapshot being restored, then during the rollback Norton Antivirus prompts the user to accept or reject the rollback changes to the master boot record. Whether the user decides to accept or reject the change, the rollback continues normally but does not restore either the master boot record or the Windows registry. Caution If the file system of a drive has been changed since the snapshot selected for rollback (Example: from FAT to NTFS), then the drive’s boot sector is not restored during rollback. This could cause the drive to become unbootable after the rollback is complete. Enable Rollback file deletion Click Enable Rollback file deletion if you want to delete protected computer files that are not present in the snapshot you are rolling back to. Which files get deleted depends on what you choose to roll back. If you roll back only system and application files, then only system and application files that are not present in the snapshot are deleted. If you do not choose this option, no files are deleted during the rollback. Note You can set a default value for this option for each protected computer in the protected computer’s properties (Rollback Data tab). Note After the rollback is complete, a text file named DELETION.LOG, stored in the protected computer’s installation folder for Recovery Agent, contains information about which files were deleted. 5. Select the rollback method. Recovery Solution Reference Guide 125 This selects the method you want to use to determine whether or not files have changed. An item is restored only if it is different from the protected copy on the server. Check file properties only (faster) Choose this option if you want Recovery Solution to check the properties (size, date/time) of each file to determine whether or not it has changed. If any of these file properties are different for the file on the protected computer than they are for the protected copy on the server, the file is restored. If all file properties are the same, the file on the protected computer is assumed to match the protected copy, and restoration of that file is skipped. Although unlikely, it is possible that two files can have the same file properties but contain different data. If you want to ensure that such files are restored, click Check all file data (more thorough). Check all file data (more thorough) 6. Choose this option if you want Recovery Solution to check the contents each file to determine whether or not it has changed. This is a more thorough method than checking only the file properties, but if you choose this option, the rollback might take considerably longer. Click Ok to begin the rollback. Notes If you are rolling a computer to a state where protected files must be replaced, a Windows File Protection message may appear on the protected computer. If there is a user at the protected computer, the user should either cancel the prompt to restore files (choosing to keep the existing files), or simply ignore the prompt altogether. Certain error conditions that cause the rollback not to succeed might not report that condition back to the console. If the rollback seems to be running for an excessively long time, you should check the protected computer itself to see if any errors have occurred. An administrator can cancel the job from the console job queue. Depending on the files restored, the protected computer might need to be restarted at the end of the rollback process. If the protected computer’s drive configuration has changed since the time of the snapshot to which you are rolling back, then the old drive configuration is restored, but it is possible that one or more drives contains no data. To restore the data, perform a second rollback to the snapshot you chose for the first rollback. Temporary folders might have to be recreated manually. These are usually not included in snapshots and are therefore not restored to the protected computer. Certain applications might require the existence of temporary folders before they will work properly. In versions of Windows that include the System Restore feature, Recovery Solution creates a restore point before starting the rollback. Recovery Solution Reference Guide 126 Perform a Snapshot Now This option lets you start a snapshot of a protected computer without affecting its schedule (a snapshot still runs at the next scheduled time). 1. From the Task tab of the Resource Manager, click Snapshot Now. 2. Specify the snapshot type. 3. Select the path to take a snapshot of. 4. To change the path, click the pencil icon. 5. Click OK. Manage Agent Setup Packages Using this utility the administrators can modify what files and get installed on the Protected Computer at time of install. A common uses is installing custom corporate splash screen. To perform recovery-based tasks on a computer using the Resource Manager 1. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. 2. Click the Tasks tab 3. Select the Tasks > Incident Management > Recovery Solution folder. 4. Click the Manage Agent Setup package policy. 5. Download the application ASPack Utility by clicking on the link. 6. Execute ASPack. 7. Enter the location of the package. The default path for the Recovery Agent Solutions Setup files is C:\Program Files\Altiris\Notification Server\NSCap\Bin\Win32\X86\Recovery Agent Package 8. There are two files that can be modified: AgentSetup.exe and Data1.cab. 9. Select if you want to overwrite the source package. If you clear this box, enter a location and filename of the new package. 10. Select the action to perform for AgentSetup: you can only modify the package files Data1.cab: you can modify the package files or change the client splash screen. 11. Click Start. 12. Add and delete files as needed and click Finish. Recovery Solution Reference Guide 127 Chapter 7 Advanced Snapshot and Recovery Procedures This section describes procedures for performing certain types of advanced snapshots and recoveries. These are procedures that are likely to be performed by an administrator or to involve administrator assistance to users. Normal data protection and recovery of typical workstations should not require these procedures. Ordinarily, Recovery Solution performs snapshots according to a set schedule (see Configure Snapshot Settings on page 78). This section describes the following procedures: z Convert Encrypted Files on FAT Partitions (page 128) z Restoring a User’s Data to a Different Computer (page 129) z Full System Recovery (page 131) z Using the Snapshot Command-Line (page 147) z Using RSACmd.exe Utility (page 152) Convert Encrypted Files on FAT Partitions A user can restore encrypted files on FAT partitions. Because these files are restored in raw encrypted form, the user cannot read them. To convert restored files from the raw encrypted form into the regular encrypted form, the user can use the EFSCONV utility. After the files are converted, the user can access the converted files, but only if they had access to the files before the backup. EFSCONV can be used to convert raw encrypted files restored by Web-based File Recovery. EFSCONV can also be used when the Recovery Agent failed to apply the “encrypted” attribute to a restored file (Example: when there is not enough space to create the regular encrypted file). In this case the restored file remains in raw encrypted form and the user can use EFSCONV to convert it to the regular encrypted form. Efsconv.exe is located on the Recovery Solution Server at C:\Program Files\Altiris\Recovery Solution\Console. You can also access it through the Altiris Console on the Tasks tab under Tasks > Incident Resolution > Recovery Solution > Convert Encrypted Files on FAT Partitions. To Convert Encrypted Files on FAT Partitions 1. Restore encrypted files to a FAT partition, or use the Web-based File Recovery. 2. Enter the following command at the command prompt: EFSCONV.EXE <restored raw file path> <destination file path> Note The destination path must be on the NTFS partition. Recovery Solution Reference Guide 128 Restoring a User’s Data to a Different Computer The following options are available for restoring a user’s data to a different computer. z Web-Based File Recovery (page 129) z Reinstall Recovery Agent Using the Same Account (page 129) z Restoring Data with the Migration Utility (page 130) z Restoring Data From Full System Recovery Media (page 146) Note Members of AeXRS_Managers group created during cluster setup can restore user data using Web-Based File Recovery and the Migration utility for any protected computer. Web-Based File Recovery Users can recover files over the Internet by browsing to a Web site located on the server for Recovery Solution. This allows users to access their protected data from any location, not just from computers that have Recovery Agent installed. For information about using Web-Based File Recovery, see Using Web-Based File Recovery (page 57). Note Using Web-Based File Recovery, you cannot restore file and directory data from symbolic links and junctions ("soft links"). Reinstall Recovery Agent Using the Same Account If the installation is done using an existing account, the user will have access to all previous snapshot data. Note With Windows domain security, multiple computers being protected by the same server can use the same NT account. However, if installation using the same account is done on a new computer, make sure that the new computer has a unique computer name. For more information on how to re-install the Recovery Agent, see Interactive WebBased Agent Setup Wizard (‘Pull’ Installation) (page 53). For specific information on how to install the Recovery Agent using an existing account, see Reinstalling the Recovery Agent using an Existing Account on page 57. After the agent has been re-installed, you can view files from previous installations. To view files from previous installations 1. On the protected computer, open the Recovery Agent Options dialog box 2. Click the Snapshot and Restore tab. 3. Click Restore Files. 4. Click Advanced Selection. 5. In Windows Explorer, click View > Recovery Solution Versions > Snapshots From Previous Installations. Recovery Solution Reference Guide 129 Restoring Data with the Migration Utility You can use the Migrate utility to restore data to a computer other than the one from which it was protected. Users can restore data to or from any computer on the network that is accessible with their domain user account. The ability to restore to alternate destinations makes the migrate utility very versatile. Use the utility to do the following: z Restore data to a new or upgraded computer. z Restore data to alternate media, such as a CD-ROM. Example: you can restore to a computer connected to a storage device such as a CD-ROM writer. Then use the CD-ROM writer software to write to the CD-ROM. This can be useful if the user is offsite and you need to ship data from the user’s desktop. Note This utility allows you to migrate only data files. If you need to migrate a user’s entire system, including all application settings, you should use the full migration feature instead. To run the Migrate utility 1. Download the program AeXMigrt.exe. The migrate utility, AeXMigrt.exe is located on the Recovery Solution Server at C:\Program Files\Altiris\Recovery Solution\Console. You can also access it through the Altiris Console on the Tasks tab under Tasks > Incident Resolution > Recovery Solution >Restore Data with the Migration Utility. 2. At the user’s computer, do the following. Ensure that Recovery Agent is installed. Ensure that the user is logged on appropriately. If this user has originally installed the Recovery Agent, then he or she will not be prompted to log on. Otherwise, this user will need to log on and supply a domain name as well. 3. Copy AeXMigrt.exe from the floppy to the hard drive of the destination computer and run it. 4. In the dialog box that opens, enter the user’s logon information. 5. Click OK to continue. A dialog box shows all of the user’s snapshot data. Use the dialog box to select folders or files for restore and specify a location on the destination computer. If the user ran snapshots on more than one computer, each computer appears in the dialog box. 6. When the restore is complete, remove the floppy from the destination computer and delete AeXMigrt.exe from the computer’s hard drive. Recovery Solution Reference Guide 130 Caution Protect network security. Do not leave the utility on a user’s computer. The utility is for use when you need to restore data from a different protected computer, but with this capability, users might access data that you do not want them to. Failure Messaging If a failure occurs during a restore, information is provided in a log file. The log file is stored as C:\Program Files\Altiris\Recovery Soluiton Agent\Data\ CRA_Restore_<date of the restore>.log. You can open the log file in a text editor. Migrating a User to a New Computer Altiris provides a way to migrate user accounts, computer settings, and files through Altiris® PC Transplant Pro™. For more information, see www.altiris.com/products/ pctransplantpro/. Full System Recovery When other recovery methods are not possible, you can use Full System Recovery to recover an entire protected computer using CD/DVD-ROMs, PXE, and USB media. This section explains how to create Full System Recovery images and use Full System Recovery in server-based mode. z Full System Recovery Overview (page 131) z Full System Recovery Setup (page 133) z Full System Recovery Disk Creation (page 134) z Full System Recovery Using PXE (page 139) z Full System Recovery from USB Media (page 139) z Running Full System Recovery (page 143) z Restoring Data From Full System Recovery Media (page 146) z Erasing the Partition Table (page 146) Note Full System Recovery is also available for protected computers running Local Recovery Agent. For details, see Full System Recovery Options (page 54). Full System Recovery Overview Use Full System Recovery when other recovery methods, such as file restore and rollback, cannot be used. Full System Recovery restores an entire protected computer to the state it was in at the time of a Full System Snapshot that you choose. The operating system itself is recovered, as well as all applications, settings, and data files. This includes disk partitions and volumes and the restored disk must be either the same size or larger. The main reason to use Full System Recovery is if a protected computer is damaged to the point that it cannot even start Windows. However, you might also use Full System Recovery from to recover notebooks or other computers that do not have a fast Recovery Solution Reference Guide 131 connection to the network. For those computers, alternatives such as rollback might take too long. See also: z Full System Snapshots Are Necessary for Full System Recovery (page 132) z What Happens During Full System Recovery (page 132) z Constraints of Full System Recovery (page 132) Full System Snapshots Are Necessary for Full System Recovery To ensure Full System Recovery protection, computers must have periodic snapshots with the Full System Snapshot option selected. The other snapshot type, Partial snapshot, does not provide Full System Recovery protection. In addition, you should make sure that snapshots include all files necessary to start the protected computer. Although boot and system drives are always included in Full System Snapshots and cannot be removed, it is possible that some files required to start specific drivers, services, or applications could be stored on other drives. Unless you have a good reason for excluding a particular drive, you should ensure that schedules include all protected computer drives. For instructions on scheduling snapshots, see Configure Snapshot Settings on page 78. What Happens During Full System Recovery While most users can manage ordinary recoveries of their own data files, Full System Recovery does require some administrator involvement. If a computer fails, the typical Full System Recovery process is the following. 1. The administrator creates a set of Full System Recovery disks. 2. The administrator or the user starts Full System Recovery by restarting the protected computer with the Full System Recovery disk. 3. User input is required to initiate the DOS part of a FSR (except for Full System Recovery from USB media), authentication is required to start the file recovery, and a restart is required at the end of the FSR. Recovery Solution performs the following steps during Full System Recovery. z Partitions and formats the hard disk drives. z Restores the basic operating system and settings. z Restores the remaining data. Constraints of Full System Recovery The following are conditions that must be met in order to successfully perform Full System Recovery. z Full System Recovery can be performed from a Full System Snapshot that was done using previous versions of Recovery Solution. To use snapshots from earlier versions (back to 3.2), you must add all the user data to the CD/DVD-ROM image set. Recovery Solution Reference Guide 132 z Drives formatted with the NTFS file system are always recovered with the default allocation unit size of 512 bytes, regardless of the allocation unit size the drive originally had. z Full System Recovery cannot be performed on a protected computer running disk compression software (such as DriveSpace or Stacker). z Full System Recovery cannot be performed on a Windows 2000/XP protected computer that uses dynamic disks. For a list of RAID adapters certified for Full System Recovery, see Hard Disk Support on page 297. z In general, Full System Recovery can only be performed on the same protected computer from which the Full System Snapshot was performed. In some cases Full System Recovery can be performed on a computer that is not the same as the originally protected computer, but there are limitations. Specifically, the recovered computer must match the originally protected computer in the following ways. The hard disk adapter types must match. Example: if the original computer had an IDE hard disk adapter, the recovered computer cannot have a SCSI hard disk adapter. The network adapter cards must match. The drivers required to run the hardware must match. The hard disks on the recovered computer must be large enough to hold the protected drives; during Full System Recovery, Recovery Solution cannot separate files that were originally stored on the same drive. z Full System Recovery cannot re-create RAID configuration. So, before starting the Full System Recovery on a computer with RAID, you must ensure that the configuration is correct, or manually recreate the RAID configuration to be the same as it used to be at the time of the snapshot selected for Full System Recovery. z The trial periods of shareware applications (like PerfectDisk, for example) can expire after Full System Recovery because of the license violation prevention mechanisms these applications use. z Full System Recovery can be performed only with the same keyboard and mouse, which were used during snapshot selected for Full System Recovery. For example, Full System Recovery will not work if PS2-compatible mouse and keyboard were used during snapshot, but during FSR USB-compatible mouse and keyboard were attached. Full System Recovery Setup Caution The most important step you can take to prepare for Full System Recovery is to ensure that all protected computers have regular Full System Snapshots scheduled. Partial snapshots do not provide Full System Recovery protection. For instructions on scheduling snapshots, see Configure Snapshot Settings on page 78. You must also create a folder for storing FSR images and share that folder. Example: \\servername\FSRShare. See also: Items You Need at Recovery Time (page 134). Recovery Solution Reference Guide 133 Items You Need at Recovery Time You need to have the following items ready when you run Full System Recovery. z Hardware and software required to create CDs or DVDs (for Full System Recovery from CD/DVD) Recovery Solution does not create CD/DVD-ROMs for you. You must create CD/ DVD-ROMs from the Full System Recovery images before you can recover the protected computer. z z 1 blank or reusable 3.5" 1.44 MB diskette (if the protected computer cannot boot from CD-ROM or DVD) Make sure that the disk is blank or that you do not need any of the existing data on it. When the Full System Recovery is complete you no longer need the disk, so you can reuse it for future recoveries. CD-ROM or DVD driver (if the protected computer cannot boot from CDROM or DVD, and its CD-ROM or DVD drive has a SCSI interface) for Full System Recovery from CD/DVD. The boot diskette supports most EIDE CD-ROM drives automatically. If the protected computer has a SCSI CD-ROM drive that requires drivers to be loaded before it can be accessed, you must add the drivers to the boot floppy disk. For more information, see Full System Recovery Disk Creation on page 134. Full System Recovery Disk Creation Creating the CD-ROMs or DVDs for Full System Recovery is usually a simple procedure. You can create the disks at the time you need to run Full System Recovery. To create Full System Recovery media 1. In the Altiris Console, select any protected computer. a. Example: Click the Configuration tab. In the left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Agent Settings folder. b. Click the Computers with Recovery Agent installed to cluster collection. c. Double-click a computer in the collection. The resource manager for the computer opens. d. Click the Tasks tab. e. Click Create FSR Image. Notes Your browser must be set to run ActiveX applets. If the Altiris Web site is configured to require SLL, to use the Full System Recovery Wizard, you must either clear the Require SSL checkbox before downloading the Wizard ActiveX component or use the Altiris Console from the computer where Notification Server has been installed. You can also right-click the computer in the collection and select Recovery Solution Tasks to access a list of recovery tasks. In this case, right-click the Recovery Solution Reference Guide 134 computer and click Recovery Solution Tasks > FSR Tasks > Create FSR Image. 2. Click Specify path. 3. Specify the share location where Full System Recovery images will be stored (see Full System Recovery Setup on page 133). 4. Click Ok. 5. Click Run FSR Wizard. 6. Click an item from the Snapshot date drop-down list. The snapshot you choose determines which versions of the protected computer’s files are restored. To ensure that the most recent data is restored, choose Use latest snapshot data available at restore time. Notes The Snapshot date list does not include snapshots that are missing files due to server space management and snapshots containing corrupted data (in case this data was removed during Integrity Check job). If any date and time settings are different between the protected computer and the server, some older snapshots might not be available for Full System Recovery. To see all available snapshots, the following settings must be identical on the protected computer and the server: (1) the date and time; (2) the time zone; (3) the state of the option to automatically adjust the clock for Daylight Savings Time (whether this option is on or off). Full System Recovery can be performed from a Full System Snapshot that was done using previous versions of Recovery Solution. When you use snapshots from earlier versions, all user data will be included in the image. 7. Under FSR media capacity, specify the type of media you are using. 8. (Optional) To do the entire recovery from CD-ROM or DVD, select Include all user data on CD-ROM. Select this option if you want to do the entire recovery from CD-ROM or DVD. Otherwise, only the temporary operating system is stored on the CD-ROM or DVD, and Recovery Solution will connect to the server to restore the remaining data. Note Make sure that the network share for Full System Recovery has free disk space equal to the total size of the CD-ROM or DVD images plus the maximum amount of data for a single CD-ROM (up to 750 MB) or DVD, depending on the capacity of your blank media. Choosing this option makes the Use latest snapshot data available at restore time option equivalent to simply choosing the snapshot with the latest date from the list. If all the data is included on the CD-ROM or DVDs, Recovery Solution does not connect to the server during Full System Recovery. 9. (Optional) Password protect the image. If you include all the user’s data on the CD-ROM or DVD, select the Password protect CD-ROM. This prevents anyone from browsing the CD-ROM or DVD Recovery Solution Reference Guide 135 contents and restoring files without performing Full System Recovery. Note that if only the temporary operating system is stored on the CD-ROM or DVD, this option is not available; at recovery time, the user must log on to the server to restore the remaining data anyway. a. Select the Account name. The is the domain account name of the user. b. Enter and confirm the account password. 10. Edit image description. You can edit the Image description field if you want to find this temporary operating system image later. 11. (Optional) Create boot floppy disk. If the protected computer is unable to start from CD-ROM or DVD, you can create a boot floppy disk. a. Modify the boot floppy image. You can add, delete, or edit the files that will be placed on the boot disk. To modify the image, click Modify Boot Floppy Image. SCSI CD-ROM Drivers The Full System Recovery boot floppy provides broad support for EIDE CD-ROM drives. However, if a protected computer uses a SCSI CD-ROM drive, a driver for that particular SCSI controller must be added to the Full System Recovery boot floppy. Which DOS SCSI driver (also known as “ASPI Manager”) to use depends on the manufacturer and model of the SCSI controller. Generally, adding DOS SCSI drivers to the Full System Recovery boot floppy involves the following: Determine which SCSI driver to add to the boot floppy. Adaptec DOS SCSI drivers and information are available from Adaptec’s FAQ page, at http://www.adaptec.com/worldwide/support/faqindex.html. LSI Logic (maker of Symbios brand products) provides DOS SCSI drivers and information on its web site, http://www.lsilogic.com/support/index.html. Many other SCSI controller manufacturers also provide DOS SCSI drivers for the products on their web sites. In the root directory of the Full System Recovery boot floppy, locate the config.sys file. In that file, you will need to replace the EIDE CD-ROM driver information with the necessary lines to install the DOS SCSI CD-ROM drivers. Replace the line DEVICE=OAKCDROM.SYS /D:mscd001 as follows: For the Adaptec 2940U/UW controller: DEVICE=A:ASPI8DOS.SYS /D DEVICE=A:ASPICD.SYS /D:mscd001 For the Symbios SYM53C8XX line of SCSI controllers: DEVICE=C:[PATH]ASPI8XX.SYS DEVICE=C:[PATH]SYMCD.SYS /D:mscd001 Recovery Solution Reference Guide 136 Note Microsoft’s CD-ROM Extension “MSCDEX.EXE” is added automatically to the Full System Recovery boot floppy and set to execute from the “AUTOEXEC.BAT” file, with the line LH MSCDEX.EXE /D:mscd001. Note that the device name “mscd001” matches the device name given with the /D switch used when loading the DOS SCSI drivers above. b. Insert a blank or removable 1.44 MB 3.5-inch floppy disk. c. Click Create Boot Floppy Disk. 12. Check temporary operating systems settings. When you choose a snapshot, Recovery Solution immediately checks the protected data to verify that it contains the information required to run Full System Recovery. Temporary operating system During Full System Recovery, Recovery Solution starts by installing just enough of the protected computer’s operating system to run Recovery Agent and securely communicate with the server. This temporary operating system consists mainly of files that Recovery Solution has detected as being required to start the protected computer. This set of files should be sufficient to start the computer. However, you have the option to add files from the protected computer’s snapshot to its temporary operating system. Click the Advanced button in the Protected Computer Settings area if you want to modify it, and then click Modify temporary OS contents. Note Make sure the temporary operating system fits on a single media (Example: one 650 MB or one 4GB DVD) . Otherwise, Full System Recovery will not succeed. The Protected Computer Files file tree shows all of the files contained in the Full System Snapshot that you are recovering. The files with red check marks are included in the temporary operating system image. The folders with red check marks each contain one or more files that are included in the temporary operating system image. The green files and folders without check marks were added manually. The Temporary Operating System file tree shows all of the files currently contained in the temporary operating system that Recovery Solution will use to start the computer during Full System Recovery. Note If the protected computer had an LMHOSTS file specifying network access configurations, verify that this file is included in the list of temporary operating system files. Inclusion of this file ensures that the protected computer will retain its network configuration during recovery. Use the Add and Remove buttons to modify the temporary operating system. You can select multiple items by holding down the CTRL (1 item at a time) and/ or SHIFT (range of items) key while making your selections. Choose Reset Image to put the temporary operating system image back to the default set of files detected by Recovery Solution. 13. You can also modify the following options in the Advanced settings dialog: Recovery Solution Reference Guide 137 Don’t restore the partition table and don’t format the volumes if they’re already formatted Enabling this option may be useful in case Full System Recovery fails when recreating drives structure. See Using Full System Recovery Without Formatting Drives Option (page 145). Don’t delete source files after the ISO files creation Enabling this option may be useful in case the administrator wants to perform Full System Recovery from PXE or USB media. Don’t use compression in temporary OS CAB files Enabling this option may be useful in case data copying from FSR media fails in DOS mode. 14. Click OK to close the Advanced settings dialog window. 15. Click Start to begin creating the Full System Recovery disk. Progress information appears in the window as the disk is created. Note During this process, Recovery Solution creates large image files on the server. If you cancel the process, the files already created are not automatically deleted. You should delete them manually to conserve disk space. 16. Choose one of the following options to write Full System Recovery images to CD/ DVD-ROM. Use a CD/DVD writer on a computer from which you can access the shared network folder for Full System Recovery. You need to find the image within the shared folder. Within the main folder you should see a folder with the name of the server. Beneath this are folders that have names in the format Computer_xxxx.IMG, where Computer is the name of the protected computer you are creating the CD/DVD-ROMs for, and xxxx is a number indicating the snapshot used (sequential from the oldest one on the server). The folder contains an ISO image file for each CD/DVD-ROM in the set. Copy the images from the shared network folder to a location from which you can write it to a CD/DVD. You can do this from the Altiris Console. Select the protected computer, and from the Action menu or the context menu, click Full System Recovery, then Manage Images. Select the one you want, then click Copy To to copy the image to another location. Note Depending on the size of the image, the copying process could take a long time. When the folder is accessible to your CD/DVD writer, you can begin making the CD/ DVD-ROMs. You can use any standard CD/DVD writing software to create a CD/ DVD-ROM from the image file. Recovery Solution Reference Guide 138 Notes These files are CD-ROM images. To create CD-ROMs from these images, you must use the feature of your CD writing software that is specifically designed to extract the image information from a standard .ISO file and write it to a CD-ROM. The option is typically called something like “Create CD From Image File.” If you simply copy the file to the CD-ROM, it will not work for Full System Recovery. Some CD-ROM drives might not be able to read CD-ROMs that have not been finalized (or “closed”). This happens frequently with older NEC drives.* If you encounter problems such as error messages claiming that files or folders cannot be found, or if you find that the data on the CD-ROM cannot be browsed or manually restored, you might need to ensure that you finalize the discs in your CD writing software. The easiest way to do this is to create the CD-ROMs using the “disc-atonce” option. * Information courtesy of Andy McFadden’s CD-Recordable FAQ (http:// www.cdrfaq.org). Full System Recovery Using PXE Recovery Solution integrates with Deployment Solution 6.5 and lets administrators perform a Full System Recovery using PXE (Pre-Boot Execution Environment) over network without physically attending the problematic computer and burning any Full System Recovery CD or DVD-ROMs. Instead, the Full System Recovery data is accessible through a network share. For information on how to configure the Full System Recovery and PXE, see Article # 18934 in the Altiris Knowledgebase. Full System Recovery from USB Media Universal Serial Bus (USB) is the standard for connecting additional equipment to your computer, like printers, scanners, webcam's, digital camera's, keyboards, mouse, hard disks, etc. One of these devices is the so called thumbdrive, keychange disk, USB pen, or flash drive etc. whatever you want to call them. You can use one of those as well as USB hard disk drives to boot the protected computer and perform Full System Recovery similarly as you would with the Full System Recovery CD/DVD. Full System Recovery from USB media can be particularly useful for recovery of protected computers which do not have a CD/DVD-ROM drive. Unlike Full System Recovery from CD/DVD-ROM, using the USB media for the same purpose requires specific preparation steps to be manually performed by the user. Note “Include All User Data” option is not supported for Full System Recovery from USB. Only basic operating system (Mini OS) image can be restored from USB media. Requirements for Full System Recovery from USB media These are requirements for Full System Recovery from USB media. z The USB media must be bootable (most USB flash drives and hard disk drives are compatible). z BIOS on target computer must support booting from a USB device. Recovery Solution Reference Guide 139 z USB drive must be properly formatted as bootable FAT16 partition before it can be used as Full System Recovery media. z Full System Recovery floppy content and source Mini OS files (Full System Recovery image content) must be copied to the USB drive and specially modified. z The selected snapshot size plus the size of Full System Recovery floppy files cannot exceed 2GB (FAT16 partition limitation). Note Full System Recovery from USB media process is the same as the original Full System Recovery from CD/DVD-ROM. The only step that is omitted is the 30-second timeout at start-up when Full System Recovery prompts the user to press any key to initiate Full System Recovery, since the USB bootable media is not formatted by the Recovery Console Full System Recovery Wizard. See also: Preparing the USB media for Full System Recovery (page 140). Preparing the USB media for Full System Recovery To prepare the USB media for Full System Recovery take the following steps in order: 1. Create the Full System Recovery boot floppy disk (page 140) 2. Create the Full System Recovery source files (page 140) 3. Format the bootable USB media (page 141) 4. Copy the Full System Recovery content to USB media (page 141) Create the Full System Recovery boot floppy disk Create a bootable Full System Recovery floppy. For information, see Full System Recovery Disk Creation (page 134) step 11. Create the Full System Recovery source files For Full System Recovery from USB media, we need the temporary Full System Recovery image source .CAB files created by Full System Recovery Wizard at run time. The files are created in the Full System Recovery image location (see Full System Recovery Setup on page 133) subfolder when the ISO image is compiled. Configure the Full System Recovery Wizard with the following options and run the image creation process (for details, see Full System Recovery Disk Creation on page 134). 1. Choose the required snapshot. 2. Select “CD 650MB” for FSR Media Capacity. 3. Clear the Include all user data on CD-ROM checkbox. 4. Set the Don’t delete source files after the ISO files creation check box in the Advanced settings dialog of Full System Recovery Wizard to keep the source files after the Full System Recovery image is created. 5. Click Start. Tip The Full System Recovery souce files can also be obtained from the ISO image file using a third-party ISO extraction utility. Recovery Solution Reference Guide 140 Format the bootable USB media Format the USB hard disk or flash drive as a bootable FAT16 DOS partition (2GB maximum) manually or by using a third-party tool. Note Altiris Recovery Solution does not format the USB media. You must buy or find a freeware tool for it. Examples: z For HP Drive Key or DiskOnKey USB Device, use Windows-based format utility found at http://h18000.www1.hp.com/support/files/serveroptions/us/download/ 20306.html. z Use the FlashBoot utility (http://www.prime-expert.com/flashboot/). This utility supports formatting of both USB hard drives and memory sticks, performing all the steps that are required to make it bootable. z Format the USB media manually (for example, see http://www.weethet.nl/english/ hardware_bootfromusbstick.php). Both methods let you create a bootable USB media with the boot OS (Free DOS, MS-DOS, Caldera DOS etc.). Copy the Full System Recovery content to USB media 1. Copy all files, except system files, from the Full System Recovery floppy into the root folder of USB media. The following files are required (highlighted on the picture). autoexec.bat config.sys display.sys ega.cpi keyb.com mode.com pclean.exe readme.txt restore.dat rndm_dr.exe strings.ini vdisk.sys Recovery Solution Reference Guide 141 2. Modify and save the AUTOEXEC.BAT, CONFIG.SYS and RESTORE.DAT files (for example, using Notepad application) in the USB media root folder. a. AUTOEXEC.BAT. Remove all references to MSCDEX.EXE, Nwcache.exe and hardcoded paths. The file must look as follows: @echo off mode con codepage prepare=((437)ega.cpi) mode con codepage select=437 rndm_dr.exe b. CONFIG.SYS. Remove all references to oakcdrom.sys driver. The file must look as follows: files=30 lastdrive=z DEVICE=Vdisk.sys 4096 512 128 /E:8 /X DEVICE=DISPLAY.SYS CON=(EGA,,1) c. RESTORE.DAT. Adding “USBFSR=1” line. The file must look as follows: CD=1 FLOPPY=1 USBFSR=1 3. Copy the following Mini OS source files (created at Create the Full System Recovery source files on page 140) into the root folder of USB media as is — no other modifications needed: DISK1 (folder) Browse CD.cds FLOPPY.IMG Readme.txt Recovery Solution Reference Guide 142 Finally, the USB drive content should look similar to the contents of the USB drive F on the picture (Free-DOS was used in this example, MS-DOS or Caldera DOS can be used as well) Running Full System Recovery Before running Full System Recovery, ensure that a snapshot is not scheduled for the day. Otherwise, it could run during Full System Recovery and interfere with the process. Then, run an integrity check job to ensure that the database is refreshed before recovery starts. Note By default, performing a Full System Recovery will reformat the computer’s hard dive. If the computer has data that is not part of a snapshot, and you want to preserve the data, you can run the Full System Recovery without formatting the hard drive. For more information, see Using Full System Recovery Without Formatting Drives Option (page 145). To run a Full System Recovery 1. Turn the computer off. Note It is important to turn the computer off rather than simply restarting it. When you turn the computer off, all of the memory is cleared, which helps ensure that you will not run into memory problems when you boot from the Full System Recovery disk. 2. Insert the first disk or CD-ROM in the recovery set (if you are using a disk, make sure the disk is not write-protected) or insert the USB media into the slot and turn the computer on. Recovery Solution Reference Guide 143 Notes Some Toshiba computers cannot be recovered by booting from the floppy disk. For Toshiba computers, insert the first CD-ROM, then press the C key during bootup to force the computer to boot from the CD-ROM. Booting from the CD-ROM is the preferred solution for Toshiba computers, since it can take up to half an hour to boot from the floppy disk. Important In case of Full System Recovery from USB media, the computer BIOS must be configured to boot from the USB device. 3. A confirmation prompt with a countdown appears. To boot from Full System Recovery disk and begin the recovery, press any key. If you do not answer the prompt within the timeout period, the computer boots normally from the hard disk. To restart Full System Recovery, turn the computer off and back on again. Notes This confirmation prompt appears whenever the computer is started with Full System Recovery media in a bootable drive. For subsequent restarts during Full System Recovery, you should either remove the disks before the restart, or you should ignore the prompt and let the computer start normally. The confirmation prompt does not appear in case of Full System Recovery from USB media. 4. The Full System Recovery confirmation appears. To start the recovery, press F10. Recovery Solution partitions and formats the hard drives. It also installs the temporary operating system on the hard disk, and Windows Setup restarts the computer. This could take some time, depending on the size of the temporary operating system. Expect it to take up to 30 minutes for Windows 2000 computers. Note If the Full System Recovery fails in formatting the hard drives, see Using Full System Recovery Without Formatting Drives Option (page 145). 5. When prompted, remove the Full System Recovery disk. Recovery Solution restarts the computer and continues the Full System Recovery. 6. When prompted, you can choose to restore the remaining data either directly from the CD-ROM or over the network, from the Recovery Solution Server. If the data is not accessible from one of these places, the appropriate option is disabled, and you must choose the other one. 7. If you are recovering from a CD-ROM that is not password protected, Full System Recovery continues automatically after 30 seconds, or you can click OK to continue immediately. Otherwise, specify the account information according to the recovery data source: If you are restoring data over the network, specify the account information of any authorized Recovery Solution user. Recovery Solution Reference Guide 144 If you are restoring data directly from CD-ROM, specify the account information of the user the administrator selected when he created the recovery CD-ROM set for this computer. If the CD-ROM set has been password-protected, you will also need the password that was assigned to the CD-ROM set at that time. 8. Recovery Solution restores the complete snapshot to the protected computer (from the Recovery Solution Server or from CD-ROM), and restarts the computer. Note If there are a large number of files on the CD-ROM set, data restore might be very slow, and might appear to be making no progress for some minutes. In this case, Full System Recovery has not failed; the process is simply slow. 9. Temporary folders might have to be recreated manually. These are usually not included in snapshots and are therefore not restored to the protected computer. Certain applications might require the existence of temporary folders before they will work properly. Using Full System Recovery Without Formatting Drives Option If the Full System Recovery fails in formatting the hard drives, you can perform a Full System Recovery with a no-format option. You can also use this option to protect data that is not part of a snapshot. Caution If you decide to use the “No format” option, partitions must be formatted prior to running the Full System Recovery; otherwise, the recovery can fail leaving the computer in an unusable state in case the non-formatted partitions are incorrectly identified. Notes If you are using this option because the Full System Recovery failed, you should first manually re-format your hard drives and create a new system partition. The system partition that you create must correspond with the Windows system, which will be restored by Full System Recovery. The copying of the Mini OS under DOS cannot be performed on NTFS volumes. All partitions which contain Mini OS data should be reformatted as FAT or FAT32. The partitions will later be converted back to NTFS. This feature cannot be performed on FAT partitions larger than 2 GB, or on NTFS partitions larger than 2 GB. To run Full System Recovery without formatting hard drives 1. Complete the first four steps from To run a Full System Recovery (page 143). 2. Press and hold the Ctrl key during the boot from Full System Recovery media. 3. From the No format Full System Recovery menu, select to start Full System Recovery without formatting drives. After this, Full System Recovery will proceed as usual, but without drives formatting. Recovery Solution Reference Guide 145 Norton AntiVirus Notes If the protected computer has Norton AntiVirus installed, you may encounter the following errors during Full System Recovery. z If you begin Full System Recovery by restarting the protected computer with the Full System Recovery disk or CD-ROM inserted, Norton AntiVirus might claim that it detects a boot sector virus, even though there is not one. To work around the virus error, remove the disk or CD-ROM, turn the computer off, then restart the computer with the Full System Recovery disk or CD-ROM already inserted. z After Recovery Solution copies the temporary operating system files, you might see a Norton AntiVirus error regarding the file SYMEVNT.386. This happens because virus protection program files are not included in the temporary operating system. Press Enter to continue past this error and the Full System Recovery continues normally. z After Full System Recovery is complete, you might see a Norton AntiVirus warning indicating that security resources have been tampered with. You can safely close and ignore this error. z After Full System Recovery is complete, evaluation versions of Norton AntiVirus might claim that they are expired and stop working. Restoring Data From Full System Recovery Media A user can restore data directly from Full System Recovery CD/DVD-ROMs and other media. This method can be used to move files to a new or upgraded computer. Data can also be restored this way if a protected computer is functional but Full System Recovery is impossible or inconvenient. An administrator can ensure that the CD/DVD-ROM is password-protected, so only a user who knows the username and password that the files were protected under can retrieve them. To restore data from Full System Recovery CD/DVD-ROM 1. Start the computer in Windows. 2. Insert the CD or DVD-ROM that you want to restore your data from. 3. If Recovery Agent is not installed or is not working properly, run the CD/DVD-ROM file Disk1\Agent\CDViewer.exe to enable browsing of the image. You do not have to do this if Recovery Agent is still functional on the computer. 4. Open the file Browse CD.cds from the root folder of the media. 5. If prompted, enter the username and password that were used to protect the data. 6. Browse and restore drives, folders, and files from the CD/DVD-ROM as you normally would do using Windows Explorer. Erasing the Partition Table You may need to erase the partition table on a client computer if after a full system recovery converts partitions to NTFS, computer restarts, but does not boot. This symptom could occur when the partition information in a disk’s Master Boot Record (MBR) does not match the information in the disk controller. Recovery Solution Reference Guide 146 To fix the problem, you need to erase the partition table from the MBR. You can use the pclean.exe program installed with the console for this purpose. Pclean.exe is located on the Recovery Solution Server at C:\Program Files\Altiris\Recovery Solution\Console. You can also access it through the Altiris Console on the Tasks tab under Tasks > Incident Resolution > Recovery Solution > Erase Partition Table. To erase the protected computer’s partition tables 1. Boot the protected computer to DOS. To do this you can boot using Full System Recovery disks and then press N to cancel. 2. From the DOS prompt, run pclean.exe. 3. You will be prompted to enter disk numbers from which you want to erase the partition tables. If you know which disk is causing the problem, you can erase only that partition table. Otherwise, you might have to erase them all. 4. After you have erased the partition tables, restart Full System Recovery. Using the Snapshot Command-Line Ordinarily, Recovery Solution performs snapshots according to a set schedule. In some cases, however, you might want to take a snapshot of a computer as part of the process of running an application on the computer, in order to ensure that information changed by the application is protected in case of potential problems with the data later on. Example: if a user is updating a local copy of one or more central databases over the Internet and there are problems during the transmission of these files, it might be necessary to restore the local copies of the databases to their pre-transmission state and restart the update. But if some of the files are protected, it might be possible to restore later versions of the files and avoid re-transmitting much of the content. A command-line interface in Recovery Agent can be used to start a snapshot in these situations. To run it, include a call to the executable file install path\Altiris\Recovery Solution Agent\AeXCmd.exe in your application’s batch command file. You can also run this file manually from a DOS-style command prompt. AeXCmd.exe determines which data to protect as follows. 1. If the protected computer has remote access options configured for Recovery Agent, the files specified in the remote access options are included in the snapshot. 2. If no remote access options are defined, a Full System Snapshot is performed on all local drives. (There is no way to restrict the files being protected to those created by the application.) Note AeXCmd.exe runs manual snapshots. If additional snapshots are scheduled, they will still be performed. See also: z Scheduling Snapshots with the Command-Line Interface (page 148) z Command-Line Syntax (page 148) Recovery Solution Reference Guide 147 z Exit Codes (page 150) Scheduling Snapshots with the Command-Line Interface Under certain circumstances, you might want to schedule snapshots using the command-line interface instead of the protected computer’s properties. One reason for doing this is to be able to process additional commands just before or after running the snapshot, stopping services to ensure that important files are not locked during the snapshot. You can include all of the commands that you want to run together in a batch file that you can schedule as a single item. Tasks can be scheduled using Windows Task Scheduler on any protected computer that has a recent version of Windows and Internet Explorer installed. Tasks can also be scheduled in Windows 2000/XP using the AT command-line program (see Windows Help for details.) You might want to disable the normal schedule for snapshots in the protected computer’s properties so that all snapshots run from the command line together with the associated commands, and you will not have to try to figure out which snapshots are valid later on. Note By default, Windows 2000/XP runs scheduled tasks using the credentials of the local computer’s SYSTEM account. This means that if the server is running in Windows domain security mode, then the user is prompted for valid credentials before the snapshot runs. The prompt can be circumvented by specifying the credentials in scheduled task created with Task Manager. Command-Line Syntax The following usage scenarios are available using the AeXCmd command-line: z Full system snapshot. By default, all drives will be included in snapshot. aexcmd.exe /RunFullSnapshot [/AutoClose] [/Wait] [/Local] [/Folder:<drive letter:>] [/Silent] z Partial snapshot. A partial snapshot does not include registry backup and FSR data collection. Rollbacks cannot be initiated to such snapshot. aexcmd.exe /RunSnapshot [/AutoClose] [/Wait] [/Local] [/Folder:<path to folder>] [/File:<path to file>] [/Silent] At least one parameter (/folder or /file) must be used, otherwise an error will be reported. You can specify one or more “/folder” and “/file” arguments. Example aexcmd.exe /runsnapshot /folder:"c:\folder1" /folder:"d:\folder2" /file:"e:\somefile" /wait z Rollback. By default, only system and application files will be restored. aexcmd.exe /Rollback [/AutoClose] [/Wait] [/Local] [/NoReboot] Recovery Solution Reference Guide 148 [/Folder:<drive letter:>] [/AllData] [/Silent] z Restore. By default, it restores the same data that was backed up during the snapshot. aexcmd.exe /Restore [/AutoClose] [/Wait] [/Local] [/Folder:<drive letter:>] [/Silent] z Apply settings. This command can be used to reapply Recovery Agent settings on clients. aexcmd.exe /ApplySettings Parameters description The command-line parameters are described below. Parameters are not case-sensitive. AeXCmd.exe command-line parameters Parameter Description /Runfullsnapshot Performs a full snapshot (same as without parameters). /Runsnapshot Performs a partial snapshot. Usage: /Runsnapshot [/file:<full file path> or /folder:<full folder path>] /rollback Performs a rollback to latest full snapshot performed by AexCmd utility. By default, only system and application files will be restored. To restore all data, add the ‘/AllData’ switch. /restore Performs a restore of data from the latest snapshot performed by AeXCmd. Usage: /folder:<drive letter> Use the /folder:<drive letter> parameter to select a drive to restore. Example: if the previous snapshot included C: and D: drives, then using /Restore with /Folder:D: will start a restore of all data backed up from D: drive only. /Wait Specifies that the program should not exit until the snapshot is complete or returns an error code in the case of failure. In a batch file, this prevents any subsequent commands from running until the snapshot has finished. If this parameter is not specified, subsequent commands run while the snapshot is running. /AutoClose Recovery Solution Reference Guide The progress screen will be closed after snapshot/restore/ rollback is finished. 149 AeXCmd.exe command-line parameters (Continued) Parameter Description /Local For mixed mode, forces a local snapshot/restore/rollback to be performed. If not specified, a remote operation will be performed in mixed mode. /NoReboot The automatic restart will not be performed after rollback. /Folder Specifies a full path to folder (or drive) that must be backed up/restored (only drive letters are accepted by restore/ rollback operations). /File Specifies a full path to file that must be backed up. /Archive Creates an “archived” snapshot that will not be deleted through Server Space Management jobs. This is useful for creating a “golden” image of a computer. This parameter can only be used with local snapshots, not server-based snapshots. /Silent All operations will be performed silently, invisible to the user. /AllData Instructs rollback to restore all data files as well as program files. All of your applications and settings will be returned to their previous state, and all of your data will be restored. /ApplySettings Rereads and reapplies Recovery Agent settings. In most cases, the /AutoClose and /Wait parameters should be used together. If the /Wait parameter is used alone, the restore or rollback process can stop, waiting for user input. When performing a full snapshot, you can limit the number of drives/volumes that are backed up by specifying them using the /folder parameter. By default, all volumes are backed up. The system and boot volumes will always be included in full snapshot. Exit Codes AeXCmd.exe returns exit codes that can be retrieved in a batch file by checking the ERRORLEVEL value. For more information about checking exit codes, see Windows Help. AeXCmd.exe exit codes Exit Code Description 0 Success. 1 Failure. The protected computer is disabled for snapshots and recoveries. 2 Failure. Another task is already running on the protected computer. 3 Failure. Recovery Agent must be upgraded before a snapshot can run. 128 “Invalid command line arguments.” 129 “Failed to initialize MFC.” Recovery Solution Reference Guide 150 AeXCmd.exe exit codes (Continued) Exit Code Description 130 “Failed to initialize COM.” 131 “Failed to initialize event chain.” 132 “Failed to query mediator interface.” 133 “Failed to obtain mediator state.” 134 “Update is required.” 135 “Error creating manual snapshot specification.” 136 “Error submitting job.” 137 “Job failed or was cancelled.” 138 “Cannot reschedule job.” 139 “Failed to query job queue interface.” 140 “Failed to initiate scheduled job start.” 141 “Failed to update job status.” 142 “Created snapshot specification is empty.” 143 “Created restore job specification is empty.” 144 “Failed to obtain registered volumes list.” 145 “Failed to obtain client key.” 146 “Failed to obtain snapshot job data.” 147 “Error creating restore specification.” 148 “Failed to query DSSBS interface.” 149 “Failed to query DSFileSystemView interface.” 150 “Failed to submit rollback job.” 151 “Failed to obtain client information.” 152 “Failed to create metajob specification.” 153 “Cannot read job key from registry.” 154 “Rollback cannot be initiated from partial snapshot.” 155 “Failed to obtain system folder.” 156 “Failed to obtain client rights.” 157 “Insufficient rights to perform rollback.” 158 “Insufficient rights to perform restore.” 159 “Insufficient rights to perform snapshot.” 160 “Invalid context was selected for rollback/restore operation.” 161 “Memory allocation error.” 162 “Registry agent failed to restore registry.” 163 “Failed to query DSFileSystem interface.” 164 “The snapshot was critically retentioned.” Recovery Solution Reference Guide 151 Using RSACmd.exe Utility RSACmd.exe utility, provided for integration with Altiris® PC Transplant Solution™, is located on each protected computer at install path\Altiris\Recovery Solution Agent. You can use this utility locally on a protected computer to initiate Full System Snapshot and to restore separate files. In order to restore files, you need to specify them in XML (Extensible Markup Language) and supply the specification file using command-line switches. RSACmd command-line parameters Parameter Description /FullSnapshot Take full system snapshot /Job:<path to XML file specifying items to restore>” Restore items specified in XML file /? Display help on RSACmd.exe input parameters The following are some examples of syntax (with possible parameters) for using RSACmd.exe utility with command-line switches. Note Command-line parameters are not case-sensitive. Run full system snapshot rsacmd.exe /fullsnapshot Restore files RSACmd.exe /job :”<path to XML file specifying items to restore>” XML file format <?xml version=”1.0” encoding=”utf-8” ?> <Jobs> <Job type=”restore”> </Items <File Name=”source file name” Source=”source folder path” Dest=”destination folder path”/> </Items> </Job> </Jobs> Recovery Solution Reference Guide 152 Chapter 8 Using Recovery Solution Reports and Job Queue Recovery Solution lets administrators monitor Recovery jobs using the Recovery Solution job queue and provides the following reports: z Client Reports Client reports provide summaries of the data on the server. You can use this information to help you manage snapshots and recoveries. The following client reports are available: z Client Event History Clients with No Full Snapshot in Last ‘N’ Days File Extensions Backed Up by Client File Recovery History Full System Recovery History Most Recent Recovery Solution Events Recovery Solution Clients by Version Recovery Solution Jobs in Last ‘N’ Days Snapshot History Snapshot Status System Rollback History Local Reports Local reports provide summaries of the data on the server. You can use this information to help you manage snapshots and recoveries. The following local reports are available: z Computers by Agent Version Computers with Local Agent Computers with Potential Space Issues Computers without Local Agent Most Recent Recovery Solution Events Computers with Local Agent by Linux Kernel Version Server Reports Server reports provide summaries of the data on the server. You can use this information to help you manage snapshots and recoveries. The following server reports are available: Cluster Space Usage Trend Computers with more than one Recovery Agents Settings Policy Applied Recovery Solution Reference Guide 153 z Data Collector File Extensions Backed Up by Cluster Health Alerts Largest Files Search for a File Cluster Disk Space Currently Used Unsuccessful Jobs in Last ‘N’ Days Users Users with Web Based File Recovery Access Users without Web Based File Recovery Access Clients Clients registered under default account Critical Software Bulletins Critical Software Delivery Tasks To open the Recovery Solution job queue 1. In the Altiris Console, click the Reports tab. 2. Select Dashboards > RS Cluster Job Queue. This will show all currently running Jobs on all clusters. 3. Click Show pending jobs icon to show all scheduled jobs as well as currently executing jobs on all clusters. 4. Click the Hide pending jobs icon 5. Click the Refresh the job queue icon to show only current running jobs. to update the current view. Note You can view details for a running client job. Right-click on a job in the list and select Details from the menu. No details are available for server jobs. To access Recovery Solution reports 1. In the Altiris Console, click the Reports tab. 2. In the left pane, click the report type and report you want to use. Recovery Solution Reference Guide 154 Part II Using the Recovery Agent The following chapters describe how to manually install and perform tasks using the Recovery Agent on client computers: z Getting Started with the Recovery Agent (page 156) z Configuring the Recovery Agent (page 162) z Advanced Recovery Agent Tasks (page 183) Recovery Solution Reference Guide 155 Chapter 9 Getting Started with the Recovery Agent The Getting Started tasks guide you through the basic setup, configuration, and use of the Recovery Agent. Getting Started tasks z Manually Install the Recovery Agent (page 156) z Take the Initial Snapshot (page 157) z View Your Recovery Agent Options (page 157) z Ensure Automatic Snapshots Are Taken Successfully (page 158) z Take an Unscheduled Full System Snapshot (page 158) z Take an Unscheduled Partial Snapshot (page 159) z View and Restore Protected Files (page 159) z Save and Restore Network Settings (page 161) Prerequisites for Getting Started tasks z Notification Server 6.0 with SP3. z Recovery Solution 6.2 SP2. z One client computer running a supported Windows operating system with the Altiris Notification Server 6.0 Agent and the Recovery Agent 6.2 SP2 installed on it. Manually Install the Recovery Agent The Recovery Agent Setup Wizard lets you install the Recovery Agent, which will run on the computer and take automatic snapshots of all the data. To install the Recovery Agent 1. Open the Recovery Agent Setup Wizard by entering the page address provided by your administrator in the Internet Explorer Address bar. Click Next. Notes The default address of the Recovery Agent Setup Wizard page is http://server/ rsagent, where server is the address of the Recovery Server computer. 64-bit Recovery Agent installation is not available through the Web-Based Setup Wizard. 2. On the Customize your Altiris Recovery Agent page, select one or both of the following options: Server-based Mode In this mode, files are backed up to and restored from a Recovery Server. Recovery Solution Reference Guide 156 Local Mode In this mode, files are backed up to and restored from your computer's hard disk. The Recovery Agent will create the Recovery Agent Partition where your snapshots will be stored. The partition is created inside the existing Windows partition. 3. Select additional setup options: a. Select Do not prompt to reboot after Recovery Agent installation. Your computer will restart automatically. b. Select Skip the initial snapshot after the agent installation. By default, the Recovery Agent attempts to take a snapshot of the computer immediately after successful installation. If you select this option, the initial snapshot will not be started but your data will be backed up during the next scheduled snapshot or you can back them up manually. 4. Click Next. 5. On the Select Installation Type page, click Create New Account to create a new account on the server. 6. Click Next. 7. Click Install and follow the instructions on the screen to complete the installation. Take the Initial Snapshot After you install the Recovery Agent and restart the computer, a dialog will prompt you to take a Full System Snapshot of the system. To take the initial snapshot 1. In the Take initial snapshot dialog, click Take Snapshot Now. Note (Local mode only) Clear the Update snapshot schedule box at the bottom of the dialog if you do not want the existing snapshot schedule updated according to the specified settings. 2. In the Take Snapshot dialog, select the required Snapshot type. View Your Recovery Agent Options You can see how the Recovery Agent is configured on your computer and change the settings if your administrator granted the appropriate rights. For information on changing the agent options, see Configuring the Recovery Agent (page 19). To view Recovery Agent options These are the ways to access the Recovery Agent Options dialog: z Option 1: Double-click the Recovery Agent icon Recovery Solution Reference Guide located on the desktop. 157 Note If the icon is not on the desktop, you might have moved it to your “My Computer” folder. z Option 2: Select Start > Programs > Altiris > Recovery Agent > Recovery Agent Options. Ensure Automatic Snapshots Are Taken Successfully The Recovery Agent has a default automatic snapshot schedule. Your administrator can configure Recovery Agent so that snapshots of your files are taken regularly. Notes To view the snapshot schedule and options for your computer, see View Your Recovery Agent Options (page 157). You can make changes to your snapshot schedule if your administrator granted you the rights. See Configuring the Recovery Agent (page 19). Follow these guidelines to ensure that your scheduled snapshots are taken. z Schedule snapshots at appropriate times. The best time for your snapshots to run is while you are not using your computer. Although you can continue using your computer while the snapshot is taken, we recommend taking snapshots when the computer is not being used because it degrades computer performance. If you use a portable computer in server-based mode, your snapshots will usually run when you connect to the network, regardless of the scheduled snapshot time. z Determine whether the Wake on LAN option is enabled on your computer (see Attempt to wake the client before a scheduled snapshot on page 31). If it is not, leave your computer on all the time. You can log out or use a password-protected screen saver to ensure security. z Continue to use the regular backup features that come with programs (such as Microsoft Office) because Recovery Agent usually takes a snapshot of your computer once a day, so if something happens to your files just before your snapshot runs, you could still lose a whole day’s work. Take an Unscheduled Full System Snapshot The Full System Snapshot includes your computer’s configuration and operating system files. In server-based mode, this makes Full System Recovery possible in case your computer’s disk drive fails. This makes a Full System Recovery possible in case Windows fails to start. A Full System Snapshot will include everything on a selected drive except for excluded files. For immediate protection of recently created files, you can perform snapshots manually through Windows Explorer. To run the Full System Snapshot manually 1. Right-click the My Computer icon and click Snapshot. Recovery Solution Reference Guide 158 2. Click Full System Snapshot. The dialog box lists all the drives in your computer. Set or clear the check box next to any drive that you do not want to exclude or include in the snapshot. You cannot clear either the startup drive or the drive with the installed operating system. (Usually, they are both on drive C.) 3. Click OK to continue with the snapshot. 4. In the Snapshot of Local Drive(s) dialog, click Start. The Altiris Recovery Agent Snapshot Progress dialog window appears. Take an Unscheduled Partial Snapshot A partial snapshot protects only the files that you select. In case of failure, you cannot use a partial snapshot for Full System Recovery of your computer. To run a partial snapshot 1. In Windows Explorer, select one or more drives, folders, and files to include in the snapshot. 2. Right-click your selections and click Snapshot. Note The Snapshot command is not available if none of the selected items are stored on supported media. 3. A dialog box opens and prompts you for a descriptive label for your snapshot. Accept the default description that uses the current date and time. 4. Click Start. 5. The Snapshot Progress window appears and shows the status of the snapshot. You can use your computer during the snapshot. To cancel the snapshot, click Stop. Start the snapshot again to ensure that your data is protected. When the snapshot finishes, the Stop button changes to Close. Click Close. View and Restore Protected Files Using the Recovery Agent folder in the Windows Explorer tree, you can view the files and folders in the snapshots. To view protected files 1. In the Recovery Agent Options dialog, click the Snapshot and Restore tab. 2. Click Restore Files. 3. Click Advanced Selection. 4. Select the Altiris Recovery Agent folder, which displays drive snapshots. 5. Browse the folders in the snapshot. 6. Double-click a drive in the window to view folders and files. Recovery Solution Reference Guide 159 To view earlier versions 1. In Windows Explorer, click the View menu. 2. Select Recovery Solution Versions. 3. Select one of the following options: All Versions Choose this option to display all snapshots of your files. If you are viewing all file details (View > Details), the Snapshot Taken column shows the date and time that each snapshot originally ran. Note In some cases, the time displayed in the Snapshot Taken column is the only way to distinguish the difference between two or more versions of a file. This happens if the file itself did not change between snapshots, but some properties of the file did. Example: Recovery Solution creates a new version of the file if the only change is in its NTFS security attributes. Latest Version Only Choose this option to display the most recent snapshot of each file. Even files that were excluded in the most recent snapshot are displayed, as long as they were in a previous snapshot. 4. If you have installed the Recovery Agent more than once (or if the software was automatically updated from the server), select from the following additional options: Snapshots From All Installations (default) Choose this option to display protected files from all of your Recovery Agent installations. Snapshots From Current Installation Choose this option to display protected files only from your current Recovery Agent installation. Snapshots From Previous Installations Choose this option to display protected files only from your previous Recovery Agent installations. Notes If you are viewing all file details (View > Details), the Snapshot Taken column shows the date and time that each snapshot originally ran. If a particular file or folder originated on an NTFS drive, and you do not have at least read access to the file or folder, then you cannot see it in the list of protected files. However, if you restore a folder containing the secure item, the item will also be restored (but you still will not have access to open it). To restore files You can restore any version of a file that is displayed. 1. Browse the items in the snapshot. See To view protected files (page 159). 2. Select the items to restore, and then drag the files to their destination on your local hard disk. Alternatively, you can right-click the selected items and click Restore. Recovery Solution Reference Guide 160 If files or folders with the same name already exist at the destination, Recovery Solution lets you choose whether to replace them. The Restore Progress window appears, showing the status of the restore. 3. To cancel the restore, click Stop. When the restore finishes, the Stop button changes to Close. Click Close. For information about other ways to restore files and computer settings in case of failure, see the following sections: z Performing Rollbacks (page 39) z Full System Recovery Options (page 41) z Using Web-Based File Recovery (page 44) Save and Restore Network Settings Whenever you start your computer or make a successful Dial-Up Networking connection, Recovery Agent saves your computer’s remote network settings, including all of your Dial-Up Networking, Virtual Private Networking connections, and Direct Connection settings (if you are running Windows 2000/XP). If your networking settings change and you cannot make a connection, restore the settings from one of the network setting snapshots. To save and restore network settings 1. In the system tray, right-click the Recovery Agent icon. 2. Click Network Setting Snapshots. In this dialog box, you can create and delete snapshots, as well as restore settings from existing snapshots. Recovery Solution Reference Guide 161 Chapter 10 Configuring the Recovery Agent You can configure Recovery Agent options by using the Recovery Agent Options dialog box. Note If a section of the dialog box is disabled or missing, only the administrator can change those settings. To change Recovery Agent options 1. Open the Recovery Agent Options dialog box (see View Your Recovery Agent Options on page 15). Note When you are using the Recovery Agent in mixed mode, you will be prompted to select one mode to view the settings. In the Recovery Agent Options dialog box, the following tabs are displayed: Recovery Agent Options Tabs Tab Function Snapshot and Restore Displays status information about your See Snapshot and Restore snapshots and restores, and lets you Dialog Box on page 164. perform snapshot and restore tasks. Link Snapshot Schedule Lists the schedule and settings for your See Snapshot Schedule Dialog automatic snapshots. Box on page 167. Administration (server-based mode only) Lets you view and change preference settings. Go here to change your Recovery Agent description on the server. See Administration Dialog Box (server-based mode only) on page 169. General Lets you view log files related to your computer’s snapshots and restore jobs. Go here to create and remove the Altiris Recovery Partition for local snapshots. See General Dialog Box on page 170. Space Management These rules determine when old snapshots are automatically deleted. See Space Management Dialog Box on page 172 Misc Lets you set miscellaneous snapshot and agent settings. See Misc Dialog Box on page 173. Full System Recovery (local mode only) Lets you set Full System Recovery See Full System Recovery settings and launch the Recovery DVD Dialog Box on page 174. Wizard. Recovery Solution Reference Guide 162 Recovery Agent Options Tabs (Continued) Remote Access (server-based mode only) If you use a modem or other remote connection to log on to your office network, use this tab to set up Recovery Solution to run automatic snapshots with a modem or remote connection. See Space Management Dialog Box on page 172. Note This tab only appears if you have DialUp Networking installed. Excludes The files you enter here are excluded from all manual and automatic snapshots. Choose excluded files carefully (see Excluding Files from Snapshots on page 35). See Excludes Dialog Box on page 177. Notes Full System Recovery cannot be performed if you exclude certain files and folders. For details, see Files and Folders You Should Never Exclude on page 35. In server-based mode, this tab is available only if the administrator has granted you rights. Rollback Data Lets you specify file types, which will not be rolled back when the Restore system and application files only Rollback option is selected. See Rollback Data Dialog Box on page 180. Storage Locations (local mode only) Lets you view and edit the location where your snapshots are saved. See Storage Locations Dialog Box (local mode only) on page 180. 2. Click one of the tabs in the dialog box to view or change settings. 3. Make your changes and then click OK. Note After clicking OK, you should open the Options dialog box again to ensure that the Schedule tab AM/PM fields of the Start Time and End Time are correct. A known problem with the scheduling controls sometimes causes a “PM” time to be reset to “AM.” How Administrator Settings Might Affect You The Recovery Solution administrator can limit your ability to perform certain tasks and modify various Recovery Agent settings. When any of the user rights are disabled, you may not have access to some of the Recovery Agent settings and actions described in the User’s Guide. If you have more than one computer, the restrictions may be different for each one. Recovery Solution Reference Guide 163 Snapshot and Restore Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Snapshot and Restore tab. This section contains the following topics: z Last Snapshot/Restore Status (page 164) z Snapshot Options (page 164) z Restore Options (page 165) z Throttling Options (server-based mode only) (page 165) z Performance Options (local mode only) (page 166) z Snapshot Selection Wizard Dialog Box (page 166) z Restore Selection Wizard Dialog Box (page 166) Last Snapshot/Restore Status The “Last Snapshot/Restore Status” section provides information about your computer’s most recent snapshot or restore job. Time This box shows the date and time that your computer’s most recent snapshot or restore was run. Description This box shows a description of your computer’s most recent snapshot. Status This box indicates whether your computer’s most recent snapshot or restore succeeded or failed. Snapshot Options Snapshot options can be configured using the Misc tab. For more information, see Misc Dialog Box on page 173. Snapshot Click the Snapshot button to launch the Snapshot Selection Wizard that guides you through taking a snapshot. If this button is not available, then you do not have permission to perform a snapshot manually. Accelerate Click the Accelerate button to accelerate scheduled snapshot to be performed immediately See also: Snapshot Selection Wizard Dialog Box (page 166). Recovery Solution Reference Guide 164 Restore Options These options let you restore files from a snapshot of your computer. Restore Files Click the Restore Files button to restore one or more specific files, folders, or drives from the Recovery Solution Server. Rollback Click the Rollback button to open the Rollback dialog box and to return your entire computer to its state at the time of any previous Full System Snapshot. For more information, click Help. If this button is not available, then you do not have permission to perform a rollback. Contact your Recovery Solution administrator if you need to return your computer to a previous state. See also: Restore Selection Wizard Dialog Box (page 166). Throttling Options (server-based mode only) The Bandwidth Throttling page contains settings that let you limit the network bandwidth used when taking snapshots and restoring files. This option is only available if the administrator has granted rights to you to change these settings. If you have rights to view this page, you will see the values that have been set by the administrator. You may want to change these settings especially if you are using dial-up networking. Note Network bandwidth limits can be set in kilobits (Kbps) or megabits per second (Mbps). Default Options z Use system defaults By selecting this check box, Recovery Solution will use the system defaults, which is unlimited bandwidth. Snapshot throttling options z Limit snapshot speed to You can select the maximum network bandwidth used when taking snapshots. z Do not start snapshot if transfer rate is less than You can select the minimum network bandwidth used when taking snapshots. If this minimum bandwidth is not available, the current snapshot will be cancelled. z Do not start automatic snapshots over WAN connection Select this box to restrict snapshots from running when the client computer is on the WAN. Restore throttling options z Limit restore speed to You can select the maximum network bandwidth used when restoring files. Recovery Solution Reference Guide 165 Performance Options (local mode only) Click Performance to open the Recovery Agent Performance Options page. This page lets you set computer performance options for taking snapshots or restoring files. You can use system defaults or select your own options. Snapshot Selection Wizard Dialog Box This wizard helps you make a snapshot of your files. To access the wizard, open Recovery Agent Options (see View Your Recovery Agent Options on page 15), go to the Snapshot and Restore tab, and click Snapshot. Full System Snapshot A snapshot of a computer that contains enough information to restore the computer in the event of a disaster. A Full System Recovery can only be performed from a Full System Snapshot. In addition to whatever files you select, a Full System Snapshot always contains the information about the computer’s disk partitions and drives and the Windows registry. You can also include any additional data from local drives. A Full System Snapshot does not have to contain all of the computer’s files and folders. Search Click this button to search for specific files. Type the name of the file or folder to find. You can also search for multiple files that match a search pattern. Use standard wildcard characters, such as “?” and “*”, to look for multiple files or folders. Advanced Selection Opens Windows Explorer so you can search for files yourself. You can take snapshots of files from within Windows Explorer by right clicking them and selecting Snapshot in the drop-down menu. Restore Selection Wizard Dialog Box This wizard helps you restore your files. Search Use this option to search for specific files. Type the name of the file or folder to find. You can also search for multiple files that match a search pattern. Use standard wildcard characters, such as ? and *, to look for multiple files or folders. Click this button to search for specific files. Advanced Selection Opens Windows Explorer so you can search for files yourself. You can restore files from within Windows Explorer by right clicking them and selecting Restore in the drop-down menu. For more information on rollbacks, see Rollback Dialog Box on page 39. Recovery Solution Reference Guide 166 Snapshot Schedule Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Snapshot Schedule tab. This section contains the following options: z Enable Schedule Snapshots (local mode only) (page 167) z Snapshot type (page 167) z Start Time (page 167) z Use System Defaults (page 169) Enable Schedule Snapshots (local mode only) To enable automatic scheduled snapshots, select the Enable Schedule Snapshots check box. By clearing this check box, all scheduling functions are disabled. Next snapshot time Shows the time that your next snapshot is currently scheduled to be taken. Snapshot type Select the snapshot type you want to schedule. Full System Snapshot A snapshot of a computer that contains enough information to restore the computer in the event of a disaster. A Full System Recovery can only be performed from a Full System Snapshot. In addition to whatever files you select, a Full System Snapshot always contains the information about the computer’s disk partitions and drives and the Windows registry. You can also include any additional data from local drives. A Full System Snapshot does not have to contain all of the computer’s files and folders. Partial snapshot Choose this option to have Recovery Solution include only the files and folders you select in the snapshot. You must specifically add files and folders to the snapshot, using the Add, Remove, and Edit buttons. Note Files and folders that are specified on the Exclude tab of the Recovery Agent Options for this computer are not included. Start Time Days Select the box next to each day of the week that you want Recovery Solution to take a snapshot. The snapshot is started during the scheduled interval you choose below. Choose the time of day at which you want scheduled snapshots to start. Recovery Solution Reference Guide 167 After Choose the desired start time for scheduled snapshots. This is the earliest time at which the snapshot can occur on each scheduled day. Recovery Solution attempts to start the snapshot at this time. If the snapshot cannot be started at this time because the computer was turned off or off-line, Recovery Solution will keep trying until the latest start time you specify in the next field. Before Choose the latest time at which you want to allow scheduled snapshots. On each day, a snapshot is scheduled, Recovery Solution keeps attempting to start the snapshot until either it succeeds or the time you specify here is reached. If this time is reached and Recovery Solution has been unable to start the snapshot, no scheduled snapshot occurs on this day. Conditions The following settings control when a snapshot will occur. As soon as user turns on the computer: Select this box to have Recovery Solution start a day’s scheduled snapshot as soon as your computer is turned on. In server-based mode, it is not necessary to log onto the computer to take the snapshot, but your computer must already have a physical connection to the network. This option is generally useful for desktop computers connected to a LAN. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the previous day’s snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled period. Only one scheduled snapshot is taken each day, no matter how many times the computer is turned on. Note The snapshot will not start immediatelly after logon. It starts after a 12-minute timeout in local mode or after a 10-minute timeout in network mode. As soon as user resumes the computer: Select this box to have Recovery Solution start a day’s scheduled snapshot as soon as your computer is resumed after you have suspended it. This option is generally useful for notebook computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the previous day’s snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled time period. Only one scheduled snapshot is taken each day, no matter how many times the computer is suspended and resumed. Note The snapshot will not start immediatelly after logon. It starts after a 8-minute timeout in local mode or after a 6-minute timeout in network mode. As soon as user docks the computer: Select this box to have Recovery Solution start a day’s scheduled snapshot as soon as your computer is docked on the network. This option is generally useful for laptop computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the previous day’s snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled time period. Only one scheduled snapshot is taken each day, no matter how many times the computer is docked. Recovery Solution Reference Guide 168 Note The snapshot will not start immediatelly after logon. It starts after a 7-minute timeout in local mode or after a 5-minute timeout in network mode. As soon as computer goes into idle state: Select this box to have Recovery Solution start a day’s scheduled snapshot as soon as your computer goes idle. Note The snapshot will not start immediatelly after logon. It starts after a 6-minute timeout in local mode or after a 4-minute timeout in network mode. Use System Defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Administration Dialog Box (server-based mode only) To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Administration tab. Recovery Solution Server This area displays information and options relating to the Altiris Recovery Solution Server and your data on it. Server name This area displays the name of the Recovery Server that stores the snapshots of your computer. You cannot change this name here. To use a different server, you must uninstall and reinstall the Recovery Agent. Change Recovery Agent Description Click this button to change the description of the computer. When the Change Recovery Agent Description dialog box appears, type a description for your computer. This description is used for Recovery Solution and is not necessarily related to your Windows computer description. In most cases, you do not need to change this value. Server storage space used This is the amount of disk space on the server that has already been used by your computer. For common files that are identical to files stored on other computers, your disk space usage is calculated as a fraction of the total storage space required for the file. This is because Recovery Solution stores the file only once on the server, no matter how many computers have it in their snapshots. Example: if 20 computers each protect an identical copy of the system file kernel32.dll, that is 731920 bytes in size, this counts as 731920 / 20 = 36596 bytes of storage space used by your computer. Recovery Solution Reference Guide 169 Server storage space usage quota The server storage quota limits the computer storage space on the server. If the storage quota is enabled by administrator and you exceed the quota then all snapshots from your computer will be blocked until the limit is increased or the storage space used by this computer on the server is decreased during the space management job. General Dialog Box These options allow you to view log files related to your computer’s snapshots and restore jobs and manage the Altiris Recovery Partition for local snapshots. To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the General tab. This section contains the following options: z User Interface Language Preferences (page 170) z Recovery Solution Logs (page 170) z Altiris Recovery Partition for local snapshots (local mode only) (page 170) z Connection Settings (server-based mode only) (page 171) z Use System Defaults (page 172) User Interface Language Preferences You can select the language the Recovery Agent user interface is displayed in. However, the language settings will not take effect in the currently opened Recovery Agent windows and dialogs. Close the options dialog box and reopen it to apply the language change. Recovery Solution Logs Activity Log Click this button to view a history of your computer’s Recovery Solution activity, including all snapshot and restore jobs. This log is stored in a text file. Event Log Click this button to open the Event Viewer so you can view all logged Recovery Solution events. This information is provided in the event viewer. Altiris Recovery Partition for local snapshots (local mode only) When using Recovery Solution in local mode, snapshots are stored in a hidden partition on your hard disk called the Altiris Recovery Partition. By default the Altiris Recovery Partition is created when the Recovery Agent is installed. These buttons create and remove Altiris Recovery Partitions. Create If no Altiris Recovery Partition exists, click this button to create a partition that local snapshots can be stored on. This enables the functionality of local snapshots. Recovery Solution Reference Guide 170 To add additional storage resources, see Storage Locations Dialog Box (local mode only) on page 180. Resize If an Altiris Recovery Partition exists, click this button to delete the existing partition and create a new one. Caution If you have snapshots on this partition, all your local snapshots will be lost. Data Removal Click this button to launch the Recovery Solution Data Removal wizard to remove all user data from the Altiris Recovery Partition. This disables the functionality of local snapshots. Caution If you have snapshots on this partition, all your local snapshots will be lost. Check Now You can have Recovery Solution do a self-check of the Altiris Recovery Partition. This procedure requires the computer to be restarted. Connection Settings (server-based mode only) Connection type This shows the connection type used to communicate with the Recovery Solution Server—DCOM, HTTP, or HTTPS. Port You can see the port number to be used for communication with Recovery Server. Use encryption when communicating with the Recovery Solution Server Check this box to turn on DCOM encryption. This causes Recovery Solution to perform the following functions when sending or retrieving data from the server. z Validation on the source of the data. Recovery Solution does a second check to ensure that files in your snapshot are really coming from your computer rather than from some other source, and that files you restore are really coming from the server. z Data integrity checking. Recovery Solution verifies that the data are intact and free of errors, reducing the chances of data corruption. z Data encryption. Encryption is especially useful if you are concerned about transmitting confidential data through connections that may not be secure, such as Dial-Up Networking (RAS) or the Internet. Snapshots, restores, and file information are encrypted during transmission only. The data stored on your computer and on the server are not encrypted. Recovery Solution Reference Guide 171 Note On Windows 98 computers, only data that is transmitted to the server is encrypted, not data that comes from the server (Example: snapshots are encrypted, but recoveries are not). This is because of a limitation of Windows 98, which cannot receive encrypted DCOM data. Because of government regulations in France, no data encryption is performed if you are running Recovery Solution on a French version of Windows. However, this option still enables source validation and data integrity checking. Use System Defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Space Management Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Space Management tab. Note This tab only appears if your administrator has given you the right to edit your own space management rules. This section contains the following options: z Default Rules (page 172) z Exception Rules (page 173) z Use System Defaults (page 173) Default Rules This area specifies the default space management rules that you want to apply to all files on your computer. You can make exceptions to these rules in the Exception Rules area below. Delete snapshots older than Specify the length of time for which the snapshot of the item should be kept. If you select this box, then the item will be deleted after the amount of time you specify. Delete files after they have been deleted from your computer Specify the length of time for which the snapshot of the item should stay after the original copy has been deleted from your computer. If the original item is not deleted, then the snapshot copy will not be deleted either. Recovery Solution Reference Guide 172 Exception Rules This area specifies exceptions to the default rules that are configured above. You can make exceptions for any number of folders or files. The exceptions always override the default rules, regardless of whether the length of time you specify is longer or shorter than the default. Use System Defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Misc Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Misc tab. This area contains miscellaneous Recovery Agent options. Note Some of these features may not be available in the standard Local Recovery version. If a setting is inactive, you do not have the rights to change it. Take a snapshot whenever I log off my computer This option configures Recovery Solution to start a snapshot as soon as you log off, restart, or shut down your computer. At logoff time, the snapshot runs automatically after a short delay. Before it runs, you have the chance to skip that specific snapshot. Another snapshot will run the next time you log off. In server-based mode, your computer must have a physical connection to the network. Notes The snapshot prompt appears no matter which logoff option you choose (log off, restart, or shut down). However, you should check that the logoff option displayed in the dialog box is the one you actually want. If Windows continues logging off before the snapshot timeout is complete, you might need to configure Windows to give Recovery Solution enough time to start the snapshot before the logoff occurs. Notify me when a scheduled snapshot completes successfully Select this box if you want to see a message when your scheduled snapshots complete successfully. You will always see a message if your snapshot fails, whether or not this box is checked. Notify me when a scheduled snapshot fails This option configures the Recovery Agent to display a message if a scheduled snapshot fails. Recovery Solution Reference Guide 173 Show progress indication of the scheduled snapshot Select this option if you want to show the progress indicator when scheduled snapshots are taken. Clear the check box to have the indictor hidden during scheduled snapshots. Attempt to wake the client before a scheduled snapshot If this option is selected in server-based mode, and if your computer has a Wake on LAN enabled network card, and if your computer is not in “awake” status, Recovery Solution will attempt to wake your computer in order to perform a scheduled snapshot. If this option is selected in local mode, and the computer uses OnNow power management, Recovery Solution will attempt to wake your computer while it is in stand-by mode in order to perform a scheduled snapshot. Show the Welcome screen when I start Windows Select this box to display the Recovery Solution startup screen whenever your computer starts. Show the status icon in the Windows system tray Select this box to display the Recovery Agent icon in the tray at the end of your Windows task bar. This icon shows the status of Recovery Solution. You can also use the icon to access Recovery Solution features. Show Recovery Agent options in Start Menu Select this box to show the Recovery Agent options in Windows Start menu programs. Show Recovery Agent Desktop icon Enable this to show the Recovery Agent desktop icon. Use system defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Full System Recovery Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Full System Recovery tab. Note This option is available only in local mode. This area contains Recovery Agent options for Full System Recovery. F11 Recovery Settings This section lets you configure the F11 Recovery prompt appearing on computer startup. Configure the following options in this section: Show F11 Recovery prompt Lets you disable the F11 Recovery prompt appearing on computer startup Recovery Solution Reference Guide 174 Note If this option is disabled, pressing F11 on computer startup still starts Full System Recovery even though the prompt does not appear. Protect F11 Recovery with password Lets you specify the password for protection Use system defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Create Recovery DVD Click this button to launch the Recovery DVD Wizard. If this button is not available, then you do not have permission to create Full System Recovery DVDs. Contact your Recovery Solution administrator if you need to create Full System Recovery DVDs for your computer. See also: Full System Recovery Options (page 41). Remote Access Dialog Box (server-based mode only) These options control snapshots that are taken when your computer uses remote access to connect to a Recovery Solution Server, such as dial-up networking and VPN connections. To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Remote Access tab. This section contains the following options: z Snapshot type (page 167) z Start Time (page 167) z Use System Defaults (page 177) Snapshot Type Full System Snapshot A snapshot of a computer that contains enough information to restore the computer in the event of a disaster. A Full System Recovery can only be performed from a Full System Snapshot. In addition to whatever files you select, a Full System Snapshot always contains the information about the computer’s disk partitions and drives and the Windows registry. You can also include any additional data from local drives. A Full System Snapshot does not have to contain all of the computer’s files and folders. Recovery Solution Reference Guide 175 Partial snapshot Click this option to have Recovery Solution take a snapshot of only the drives you select. You can choose to include or exclude any local hard drive on your computer, whether or not it has system information on it. Note Files and folders that are specified on the Exclude tab of the Recovery Solution properties for this computer are not included in the snapshot. Take a snapshot of all data on Check the box next to each drive of which you want Recovery Solution to take a snapshot. If this is a Full System Snapshot, you cannot clear the check box next to the drive that contains the operating system or other files needed for a Full System Recovery. If you do not need a Full System Snapshot and do not want to include these files, click Partial snapshot as the snapshot type. We recommend that you include all drives, both to protect all the data and to ensure that any files needed to start your computer are included, even if they are not stored on the boot or system drives. Snapshot Settings Take each day’s snapshot as soon as I start remote access Select this box to have Recovery Solution take a day’s scheduled snapshot as soon as a remote connection is made to the network. This is the best way to guarantee that your data is protected. Even while connected to the network, portable and remote computers are often difficult for the server to reach because they frequently are not configured to use Domain Name System (DNS) names. Display a message before taking the snapshot Select this box to have Recovery Solution prompt you before taking an automatic snapshot over a remote connection to the network. You will have the option to start or cancel the snapshot. If this box is cleared, Recovery Solution does not prompt you, but starts taking the snapshot automatically. Take each day’s snapshot as soon as computer connects to the server Select this box to have Recovery Solution take a day’s scheduled snapshot as soon as the computer connects to the server. Continue incomplete snapshot from the break point This option configures Recovery Solution to restart the snapshot from the failure point or break point if a user’s snapshot was cancelled or interrupted. This feature provides users with the ability to recover from a broken connection with the server at the exact same place as when their connection was broken. This is especially useful to remote users. If this feature is enabled, or if you manually restart an interrupted snapshot, a dialog is displayed giving the option of continuing the snapshot from the break point or skipping the incomplete snapshot and starting a new one. Skip Outlook files snapshot To increase performance while doing backups, you can exclude Microsoft Outlook PST files from being backed up. Recovery Solution Reference Guide 176 Use System Defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Excludes Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Excludes tab. Caution The files you enter here are excluded from all manual and automatic snapshots. Choose excluded files carefully (see Excluding Files from Snapshots on page 35). Excluding the wrong files might mean that there is not enough information in a snapshot to perform a Full System Recovery. Files and folders to exclude from all snapshots From the list, choose the files and folders that you do not want included in your snapshots or add a new item. Use the buttons below the list to modify the items in the list. If a folder icon appears next to an item, then this item is a folder. Any files with the listed name are not excluded unless you add another item to the list and indicate that it is a file. The reverse is true if a file icon appears next to an item. If the icon next to an item appears with a padlock , then you cannot change it. When you add or edit the excluded items, the following options are available: z Files and Folders to Exclude Dialog Box (page 177) z Exception from Exclude List (page 179) Use system defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Files and Folders to Exclude Dialog Box This dialog box appears when you add or edit an item in the Files and folders to exclude from all snapshots list on the Excludes tab. See also: z Select Folder or File Name (page 178) z Choose the Type of Item to Exclude (page 178) z Choose Where to Exclude This Folder or File (page 178) Recovery Solution Reference Guide 177 Select Folder or File Name Type the name of the file or folder to exclude from snapshots. Browse Click the browse button to browse to the folder or the file you want to add to the list. This button is only available if you choose Exclude only this path under Choose where to exclude this folder or file. Otherwise, the Browse button is dimmed. The dialog box that appears when you choose Browse depends on the option you selected under Choose the type of item to exclude. If you specified that this is a folder, you will be able to browse for a folder here. If you specified that this is a file, then you can browse for a file. Choose the Type of Item to Exclude Choose the appropriate option to describe the name you entered above. Recovery Solution only adds items to the list if they match the type you specify. Example: if you enter “C:\TEMP” and select This is a file, Recovery Solution does not exclude the C:\TEMP folder. This is a folder Click this option to specify that the name you entered above is a folder rather than a file. This is a file Click this option to specify that the name you entered above is a file rather than a folder. Choose Where to Exclude This Folder or File Choose the locations from which you want Recovery Solution to exclude the item you entered above. Exclude this folder or file name everywhere Choose this option to exclude the item from every location that Recovery Solution encounters it during a snapshot. Exclude only this path on Choose this option to specify that the text you entered above should be treated as a path to a specific folder or file. If you choose this option but you specify only a folder or file name without a path, Recovery Solution only excludes that folder or file from the root directory of the drive. Example: if you type logfile.txt as the name of the item to exclude, then choose Exclude only this path on, Recovery Solution excludes files such as c:\logfile.txt and d:\logfile.txt (depending on your drive settings below). However, Recovery Solution does not exclude logfile.txt files found elsewhere on a drive. Specify below which drives you want to exclude the path from. All drives Choose this option to exclude the above path from every drive during Recovery Solution snapshots. Recovery Solution Reference Guide 178 This drive only Choose this option to exclude the above path only from a specific drive. Type the drive letter in the box. Exception from Exclude List This dialog box appears when you add or edit an item in the Exceptions list in the Excludes dialog window. The files and folders added to the exceptions will be included into the snapshot even if there is a rule according to which they must be excluded. See also: z Folder or File Name (page 179) z Choose the Type of Item to Include (page 179) z Choose Where to Include This Folder or File (page 179) Folder or File Name Type the name of the file or folder to include into snapshots. Browse Click the browse button to browse to the folder or the file you want to add to the list. This button is only available if you choose Include only this path under Choose where to include this folder or file. Otherwise, the Browse button is dimmed. The dialog box that appears when you choose Browse depends on the option you selected under Choose the type of item to include. If you specified that this is a folder, you will be able to browse for a folder here. If you specified that this is a file, then you can browse for a file. Choose the Type of Item to Include Choose the appropriate option to describe the name you entered above. Recovery Solution only adds items to the list if they match the type you specify. Example: if you enter “C:\TEMP” and select This is a file, Recovery Solution does not include the C:\TEMP folder. This is a folder Click this option to specify that the name you entered above is a folder rather than a file. This is a file Click this option to specify that the name you entered above is a file rather than a folder. Choose Where to Include This Folder or File Choose the locations where the included item (entered above) can be found. Include this folder or file name everywhere Choose this option to include the item from every location that Recovery Solution encounters it during a snapshot. Recovery Solution Reference Guide 179 Include only this path on Choose this option to specify that the text you entered above should be treated as a path to a specific folder or file. If you choose this option but you specify only a folder or file name without a path, Recovery Solution only includes that folder or file from the root directory of the drive. Example: if you type logfile.txt as the name of the item to include, then choose Include only this path on, Recovery Solution includes files such as c:\logfile.txt and d:\logfile.txt (depending on your drive settings below). However, Recovery Solution does not include logfile.txt files found elsewhere on a drive. All drives Choose this option to include the above path from every drive during Recovery Solution snapshots. This drive only Choose this option to include the above path only from a specific drive. Type the drive letter in the box. Rollback Data Dialog Box To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Rollback Data tab. File types to exclude from rolling back and deleting You can exclude specific file types from being restored. The excluded file types are listed. To add a file type to the list, click the Add button, and select a file type from the list. To remove a file type from the list, select the file type and click Remove. Use system defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Storage Locations Dialog Box (local mode only) To access this dialog box, open Recovery Agent Options (see View Your Recovery Agent Options on page 15) and click the Storage Locations tab. This section contains the following options: z Location for stored data on the Recovery Agent (page 180) z Adding Additional Storage Locations (page 181) z Managing Additional Storage Locations (page 181) z Managing the Temporary Retention Folder (page 182) Location for stored data on the Recovery Agent This lists the storage locations on your computer where snapshots are stored. By default, the Altiris Recovery Partition that was created when the Recovery Agent was Recovery Solution Reference Guide 180 installed is listed. If you have created other storage locations, they will be displayed as well. If the icon is a light blue disk, the location is active. If the icon is light blue but has an X through it, the location is full or is not active. If the icon is red, the location is disabled. If the icon is yellow, the location has been specified, but has not been saved. The Maximum size shows the total size of the storage location. This size is set when the partition is created. The Used space shows the combined size of all the files on the storage location. The Free space shows the amount of free space on the storage location. Adding Additional Storage Locations Note This feature is not available in the standard Local Recovery version. If you need additional space to store snapshots, you can either increase the size of the original Altiris Recovery Partition or create additional storage locations. To increase the size of the original Altiris Recovery Partition, click Resize on the General Tab to re-create the partition with a different size. For more information, see General Dialog Box on page 170. You can add additional storage locations to other hard drives on your computer. Additional storage locations have the following requirements: z It cannot exist on a system hard disk drive (HDD0) z It cannot be removable media, it must be a fixed hard drive z It cannot be a network resource, it must be a local hard drive To add an additional storage location 1. Click Add. 2. Enter or browse to the path on the other drive. 3. (Optional) If you want to limit the size of the location, clear the No storage limit check box, and enter the maximum size. 4. Click OK. 5. Click Apply. Managing Additional Storage Locations Note This feature is not available in the standard Local Recovery version. From the Storage Locations tab, you can manage additional storage locations that you have created after Recovery Agent was installed. You cannot manage the original Altiris Recovery Partition here. Instead, you must use the General Tab. For more information, see General Dialog Box on page 170. Click Edit to modify the properties of an additional storage location. Click Delete to remove an additional storage location. Recovery Solution Reference Guide 181 Note If data is on the location, you cannot delete it. Click Disable to prevent Recovery Solution from storing snapshots to that storage location. Managing the Temporary Retention Folder The Temporary retention folder specifies the path used to store temporary files during space management jobs. Use system defaults By default, the Use systems defaults checkbox is selected. When selected, the Recovery Agent uses the settings configured by the administrator or the default settings. To customize settings, clear the checkbox. To revert back to the administrator’s settings, select the checkbox. Recovery Solution Reference Guide 182 Chapter 11 Advanced Recovery Agent Tasks This section describes the following advanced Recovery Agent tasks: z Excluding Files from Snapshots (page 183) z Performing Rollbacks (page 187) z Full System Recovery Options (page 189) z Using Web-Based File Recovery (page 192) Excluding Files from Snapshots Recovery Solution lets you specify files and folders to exclude from all snapshots. To exclude files, use the Excludes Dialog Box (page 34). This section contains the following topics: z Why Exclude Files? (page 183) z Files and Folders You Should Never Exclude (page 183) z Examples of Files and Folders to Exclude (page 184) Why Exclude Files? Excluding files and folders you do not need has several advantages. z Snapshots and some restore operations are performed more quickly. z Snapshots take up less space. z Folder snapshots contain only the files you really need, making it easier to locate important data when you need to restore it. Files and Folders You Should Never Exclude Certain files and folders are required for the proper system configuration, and a Full System Recovery cannot be performed without them. In addition, some file extensions, such as .DLL, are nearly always associated with valid data. C:\, C:\DOS, C:\WINDOWS, and C:\WINNT These are boot and operating system folders necessary to start the computer. If the contents of these folders are excluded, Full System Recovery might be impossible. You should include all subfolders of the Windows folder, particularly the SYSTEM and SYSTEM32 subfolders. The only exceptions are the specific cache subfolders specified below, the contents of which you might want to exclude. C:\BOOT.INI, C:\NTDETECT.COM, C:\NTLDR These files in the root folder are needed to start Windows 2000/XP. Recovery Solution Reference Guide 183 *.BAT, *.COM, *.EXE These are program and command-line script files. *.386, *.DLL, *.DRV, *.PNF, *.SYS, *.VXD These are system files needed for proper system configuration. If they are damaged, the computer might not start. Without them, Full System Recovery is impossible. *.INI These are configuration settings. *.DOS, *.W40 On multi-boot computers, these files store information necessary to start the computer in other operating systems. Examples of Files and Folders to Exclude Below are some examples of files and folders that you might want to exclude from Recovery Solution snapshots. Read the description of each item carefully before you decide to exclude it. While most users do not need the data in these files, you might have a good reason for including them in your snapshots. Some of these files are excluded by default. Caution Even if you exclude these files from your Recovery Solution snapshots, do not delete the files themselves from your computer. Even though they probably contain no critical data, it is necessary that some of these files exist for Windows to work properly. _RESTORE Folders with this name might be created in Windows XP if you perform a System Restore using the Windows System Restore tool. The folders contain information about past System Restores so that they can be undone. Recovery Solution provides similar but more flexible functionality with the rollback feature. PAGEFILE.SYS This file is used to create virtual memory while Windows is running. It is usually stored in the root folder of drive C. Depending upon the computer’s configuration, the file can become quite large, although it does not contain any data that is saved between one Windows session and the next. WIN386.SWP Like pagefile.sys, the file win386.swp is used in Windows 98 to create virtual memory, and can become quite large. The temporary file that Windows deletes whenever the computer is shut down or restarted is win386.swp. It is usually stored in the Windows folder. 386SPART.PAR This is the Windows 3.1 equivalent of win386.swp. If you upgraded from Windows 3.1 to your current version of Windows, 386spart.par might still exist on your computer, even though it is no longer needed. Recovery Solution Reference Guide 184 Disk compression container files If you are running a disk compression program (such as DriveSpace, Stacker, or SuperStore), exclude the container files, which store the compressed information created by the programs. Example: a typical DriveSpace file is named drvspace.000; a typical compressed Stacker file is stacvol.dsk. Because the container files actually hold much of the data on an entire compressed drive, it is very likely that these files will change every day. It takes much longer for Recovery Solution to find the changes in such large files and take their snapshot than to take a snapshot of the drive itself. Simply include the letter of the compressed drive, but exclude the container files, and all data is included. Hibernation files Some computers and operating systems support hibernation that lets you turn off your computer without losing any data in memory. This is accomplished by writing the data in memory to special hibernation files, which can become quite large. Protecting these files could significantly slow down your snapshots, increase the strain on the network and the server, and in some cases prevent recoveries from working properly. You should always save your work before putting your computer into hibernation. As long as you do, the only contents of the hibernation files will be nonessential information such as the current running applications, window positions, and view settings. Listed below are some of the hibernation files used by various systems. z hiberfil.sys is used by Windows XP and Windows 2000. z hibrn8.dat is used on Compaq notebooks. z pm_hiber.bin is used on IBM notebooks. z save2dsk.bin is used on IBM notebooks. z toshiber.dat is used on Toshiba computers. C:\TEMP Some computers use this folder as a storage place for temporary files. C:\WINDOWS\TEMP or C:\WINNT\TEMP This folder stores temporary files. Substitute your own Windows folder in this path if Windows was not installed in the default folder. *.TMP Files with this extension are usually temporary files. ~*.* Files that begin with a tilde (~) are usually temporary files. Web browser cache As you browse the Web, the browser stores files, such as HTML documents and graphics files, in a cache folder on the computer. Over time, the cache folder can become quite large, sometimes containing thousands of files. These files are saved only to improve the speed of Web browsing; they are usually not needed by the browser or by you. Recovery Solution Reference Guide 185 If Microsoft Internet Explorer is your Web browser, your browser cache file is usually the TEMPORARY INTERNET FILES subfolder of your Windows folder. If the Web browser is Netscape Navigator, the browser cache is usually located somewhere within the Netscape Navigator folder. *\MSDOWNLD.TMP Folders by this name are created and used by Microsoft Web sites when you download and install software from those sites. These folders are usually created in the root of a hard drive, and they might exist on multiple hard drives. They are not needed after the software installation is complete. Internet history If you use Microsoft Internet Explorer as your Web browser, the HISTORY subfolder of the Windows folder contains information about Web sites that you have visited, allowing you to easily return to those sites later. If you do not need this information, you can exclude it from your Recovery Solution snapshots. *.GID, *.FTS, *.FTG Files with these extensions are usually cache files that are created automatically when a Help file is opened. These cache files do not store any information that is necessary to use Help. *.BAK Files with this extension are typically backup files that applications create automatically while the main data files are being edited. A *.BAK file can sometimes be used to restore the data in case the main file becomes corrupted, but because copies of the main data file are also being stored on the server, there should rarely be a need to include *.BAK files in snapshots. RB001.CAB, RB002.CAB, RB003.CAB, RB004.CAB, RB005.CAB Some versions of Windows store registry backups using these file names. Because the registry is protected during Full System Snapshots, there should be no need to include the registry backup files as well. C:\Program Files\Altiris\Recovery Solution Agent\Data\C\*.DTF These cache files are used by Recovery Solution to help speed up snapshots. Recovery Solution will re-create them if necessary. If you have more than 1 hard disk drive, you can add the additional DATA subfolders \Data\D\*.DTF, \Data\E\*.DTF, and so forth, to exclude all these files. Caution You should not exclude all .DTF files everywhere (*.DTF). This file extension is also used by other applications. Recovery Solution Reference Guide 186 Performing Rollbacks This section describes how to roll back computers to a previous state. Rollback is used to repair your operating system and applications when your computer is not functioning properly. If you can start your operating system and open the Recovery Agent Options dialog, you can use the Rollback feature. To roll back the computer from Windows, open Recovery Agent Options (see View Your Recovery Agent Options on page 15). On the Snapshot and Restore tab, click Rollback (see Rollback Dialog Box on page 187). Note You can replace all the files on your computer with the files in your Full System Snapshot. This will replace all the files on your computer with the files that were copied during your initial snapshot. You can then use the Recovery Agent to restore files from a more current snapshot. Rollback Dialog Box Use this dialog box to return part or your entire computer to the state it was in at the time of a specific Full System Snapshot. Caution You might lose some data that is currently on your computer because some of your files will be overwritten with older versions. Only use Rollback as a last resort. If the file system of a drive has been changed because the snapshot is selected for rollback (Example: from FAT to NTFS), then the drive’s boot sector is not restored during rollback. This could prevent the drive from starting after the rollback is complete. Before starting the rollback, you should close all open programs on your computer. Recovery Solution automatically runs a Full System Snapshot before the rollback starts. Therefore, closing all programs helps to ensure that the latest versions of all data files are protected. Do not perform rollbacks from Windows XP with Service Pack 1 or Service Pack 2 to a “clean” Windows XP as it may cause your computer to become unusable. Use Windows Add/Remove Programs to remove the Service Pack instead, then run rollback if needed. Notes You can only roll back your computer if your disk configuration is the same as it was at the time of the snapshot you are restoring. Example: if you changed drive letters or resized your drives since the time of a snapshot, then you cannot roll back to this particular snapshot. You cannot roll back your computer if your computer uses Windows 2000/XP disk volume sets, stripe sets, or fault-tolerant drives. There is a setting that determines whether or not files that did not exist in the snapshot you roll back to are deleted from your computer during the rollback. The default is to delete the files. In server-based mode, your administrator specifies the setting. In local mode, the setting is in this dialog box. Recovery Solution Reference Guide 187 If you were previously running Microsoft Office 97 but upgraded to Microsoft Office 2000, you should try to avoid rolling back your computer to a point in time when you had Office 97 installed. This might cause some Office files to be restored incorrectly. If you must do this, you might need to reinstall Office after the rollback is complete. If you are running Windows 2000 with Service Pack 2, and you are to roll your computer back to a previous operating system, a Windows File Protection message might appear during the rollback. You can either cancel the prompt to restore Service Pack 2 files (choosing to keep the existing files), or simply ignore the prompt altogether. Do not restore the files. If you do, your computer will be in an indeterminate state and could stop working properly. Performing a rollback could cause some evaluation software to claim that it has expired, preventing you from continuing to use the software. If your computer’s drive configuration has changed since the time of the snapshot to which you are rolling back, then the rollback restores your old drive configuration, but it is possible that one or more of your drives contains no data after the rollback is complete. To restore the data, perform a second rollback to the same snapshot you chose for the first rollback. After the rollback is complete, you might have to re-create temporary folders manually. These are usually not included in snapshots and are therefore not restored to your computer. Certain applications might require the existence of temporary folders before they will work properly. In versions of Windows that include the System Restore feature, Recovery Solution creates a restore point before starting the rollback. Before rolling back your computer, Recovery Solution automatically takes a snapshot of your computer to ensure that your most recent files are protected. After the rollback, you can restore any files you need that were overwritten by the rollback. Snapshot list: Choose a snapshot to return to. Only Full System Snapshots are listed. Notes (server-based mode) If any date and time settings are different between your computer and the server, some older snapshots might not be available for rollback. To see all available snapshots, the following settings must be identical on your computer and the server: the date and time, the time zone, the state of the option to automatically adjust the clock for Daylight Savings Time (whether this option is on or off). The snapshots performed before an upgrade will not appear in the list. Items to restore: Choose which files you want to restore to your computer. Restore system and application files only: Choose this option to restore just operating system and application files. This type of rollback will not restore data files, which are determined by file name extension. If you are not sure whether any file you wish to restore is an application or data file, check Restore all files. Note You can specify which file types are considered to be user data files or documents and will not be rolled back or deleted on the Rollback Data tab (if your administrator allowed this through the Altiris Console). For details, see Rollback Data Dialog Box on page 37. Recovery Solution Reference Guide 188 Restore all files (including your data files): Choose this option to restore data files as well as program files. All of your applications and settings will be returned to their previous state, and all of your data will be restored. Caution This option overwrites data files as well as program files. Some of your files might be overwritten with older versions. Roll back master boot record: (server-based mode only) Choose this option if you want to restore the computer's master boot record and the boot sectors of all primary partitions. The master boot record is necessary to start Windows. It contains information about the computer's disk partitions and passes this information along to other programs in order to start the computer. The partition tables themselves are not rolled back by Recovery Solution, but the program that reads the partition information is. You might want to roll it back if you suspect that it has become damaged or infected by a virus. Caution If the file system of a drive has been changed since the snapshot selected for rollback (Example: from FAT to NTFS), then the drive's boot sector is not restored during rollback. This could cause the drive from starting after the rollback is complete. Enable Rollback file deletion: Choose this option if you want to delete computer files that are not present in the snapshot you are rolling back to. Which files are deleted depends on what you choose to roll back. If you roll back only system and application files, then only system and application files that are not present in the snapshot are deleted. If you do not choose this option, no files are deleted during the rollback. Note After the rollback is complete, a text file named DELETION.LOG, stored in the computer's installation folder for Recovery Agent, contains information about which files were deleted. Continue: Click this button to continue with the rollback. See also: Rollback Error Dialog Box (page 189). Rollback Error Dialog Box This dialog box appears when errors occur during rollback. One reason you might see this message is if the server is temporarily unavailable. If you cannot fix the error, you might be able to restart the computer, and then continue with manual file restore. For more information about manual file restore, see View and Restore Protected Files on page 17. Full System Recovery Options If you take full system snapshots of your system regularly, you can perform full system recovery of your computer in case of failure. You can use a full system recovery in a variety of situations, such as fixing an operating system that cannot start or recovering data to a replaced hard disk or stolen notebook. Recovery Solution Reference Guide 189 In the case where the operating system can start, a rollback is preferable because it requires less time. Note In server-based mode, you can use the server-based Full System Recovery Wizard to create the full system recovery CD/DVD-ROMs. This section contains the following topics: z Local Full System Recovery from DVD-ROM (page 190) z Using the F11 Option in Local Mode (page 192) Local Full System Recovery from DVD-ROM You can perform a full system recovery using the DVD-ROM created using the Local Full System Recovery Wizard. The Full System Recovery Wizard lets you create bootable DVD ISO images and burn them to single-layer (4.7 GB) or double-layer (8.5 GB) DVDs, which you can later use to perform a full system recovery. To create the Recovery DVD set in local mode To start the Full System Recovery DVD Wizard, open Recovery Agent Options (see View Your Recovery Agent Options on page 15). On the Full System Recovery tab, click Create Recovery DVD to launch the Recovery DVD Wizard. Note The Full System Recovery Wizard creates large image files in the temporary folder that you specify. Depending on the amount of data on your hard drive, there must be enough space on your computer to hold these files. To create DVD-ROMs from the full system recovery images, you must use the feature of your DVD writing software that is specifically designed to extract the image information from a standard .ISO file and write it to a DVD-ROM. The option is typically called something like "Create DVD From Image File." If you simply copy the file to the DVDROM, it will not work for full system recovery. To run full system recovery from DVD-ROM Start the computer from the first disk in the Full System Recovery DVD-ROM set and follow the instructions on the screen. The Full System Recovery process runs automatically. Caution The Full System Recovery process reformats all the local hard disk drives. All existing information will be lost. The number and the size of hard disk drives on a computer at the time of full system recovery must be the same as or larger than the number and the size of drives present at the time of the full system snapshot selected for recovery. DVD drives connected to a USB or a Serial ATA controller without IDE compatibility mode are not supported for full system recovery from DVD. Recovery Solution Reference Guide 190 Local Full System Recovery DVD Wizard Tips z You can create a new full system snapshot or use an existing snapshot for Full System Recovery DVD creation. Creating a new snapshot ensures that the Full System Recovery DVD set contains all the latest data. Snapshots performed before an upgrade and some snapshots affected by the Storage Space Management job will not appear in the list of existing snapshots. z You can password-protect your Full System Recovery DVD set. In this case, you will be prompted for a password on any attempt to start Full System Recovery or to restore data manually. z The target folder for Full System Recovery images can be your local hard disk drive or, if there is not enough space, a network storage location. z If there is not enough space, you can create the Full System Recovery images one by one burning each image as soon as it has been created and deleting it after burning. z We recommend verifying the Full System Recovery images after burning. For that, use your DVD burning software feature or manually copy all data from DVD disks to a hard drive. Warning Protect your Full System Recovery media. If the Full System Recovery media becomes corrupted, the Full System Recovery process will fail and all data may be lost. Local Full System Recovery from DVD Tips z The Full System Recovery process must be started using the first created DVD disk in the Full System Recovery DVD set. After starting the computer from the Full System Recovery DVD, initiate the Full System Recovery on prompt by pressing F10 on the keyboard. If the Full System Recovery DVD set was password-protected, you will be prompted for a password. z During the first phase, all fixed local hard disk drives will be reformatted and the original disk configuration will be restored. Then, the minimal set of Windows files will be copied and the restore process will continue. This phase may take up to 30 minutes. z After a restart, all FAT32 partitions will be converted to NTFS if needed. Each FAT32to-NTFS conversion requires an additional computer restart. z The computer will be restarted to Windows and all remaining user data will be restored. If the Full System Recovery DVD set contains more than one DVD disk, you will be prompted to insert the disks one by one, otherwise the whole Full System Recovery process can run unattended. Local Full System Recovery from DVD Limitations z All fixed local hard disk drives are reformatted during the Full System Recovery process. z The number and the size of hard disk drives must be the same as or larger than the number and the size of disks present at the moment of the full system snapshot selected for Full System Recovery. z Full System Recovery DVD creation cannot be scheduled - you must launch it manually. Recovery Solution Reference Guide 191 The Full System Recovery from DVD can be performed even in case of a stolen notebook or a totally destructed hardware. For that to occur, you must replace the computer with the same model and start it from the Full System Recovery DVD. Using the F11 Option in Local Mode On Local Recovery client computers, the full system recovery can be performed by pressing F11 on the startup of a computer you want to restore. Note On some of Fujitsu Siemens Computers computer models (like LIFEBOOK), Full System Recovery can also be initiated by pressing the specially designated Recovery button. Typically, you can run a full system recovery in many cases, such as when a computer has an operating system that won’t start. It does not help in the case of a stolen notebook because all the backed up data is stored locally on the drive, unless the Altiris Local Recovery partition was located on a removable disk drive that you can use to restore your data to another computer. If you created the Local Recovery partition on a non-system disk, you can run Full System Recovery from that disk in case your system hard drive fails. Simply replace the unrecoverable system disk with disk of the same or larger size and set your computer to start from the drive that contains the Local Recovery partition to perform Full System Recovery. After the restore from the disk drive hosting the Altiris partition, you should change the startup order back to the original in computer BIOS (start from the system disk drive, to which the restore was performed). After this the Full System Recovery will proceed. The disk partitioning layout will be restored to the time of a snapshot that you selected during the Full System Recovery image creation. The following limitation applies to running Full System Recovery in case of a system hard drive failure. z If the new drive is smaller than the original one, there may not be enough space for all of the data. Using Web-Based File Recovery Recovery Solution lets you access protected data and recover files over the Internet using a Web browser from any computer. To recover files 1. Use Microsoft Internet Explorer 5.0 (or later) or Mozilla Firefox 2.0 to access http:// server/wbfr where server is the name or address of the Recovery Server. Notes If the server name contains the “_” sign, you must use the server IP address (http:/ /IP address/wbfr) to access the Web Based File Recovery page. Recovery Solution administrator can change the address of the Web-Based File Recovery web site. 2. Enter valid Recovery user credentials when prompted. Recovery Solution Reference Guide 192 3. Click the computer name in the list of protected computers. 4. Select the files and follow the instructions on the screen to restore. Notes For the Web-Based File Recovery feature to become available, Microsoft Internet Information Server (IIS) must be installed and running on the Recovery Server computer during server setup. If IIS was not installed on the server, or if Web-based file recovery was not automatically configured for any other reason, then it can be configured manually. The Recovery Solution administrator can disable the Web-based File Recovery access for users. Before accessing the Web-Based File Recovery page, you must ensure that the latest version of Microsoft Java Virtual Machine or Sun Java Runtime Environment is installed (downloadable at http://java.com/en/download/). Caution If a user runs Web-based file recovery from a computer that is accessible to other users, then when Web-based file recovery is complete, all browser windows should be closed in order to clear cached password information from the browser. If any browser windows remain open, then it may be possible for someone else to browse to the server without entering any credentials, and access the original user’s data. Note If you are running Windows 98, Recovery Solution writes events to the Recovery Solution event log instead. For more information, see Using Recovery Solution Event Viewer on page 193. If you are in Windows 98, click Application from the Log menu to display the Application event log. , or Delete Event Log in the Windows 98 Recovery Solution Event Viewer, and on Windows 98 computers the file will be removed from your computer Using Recovery Solution Event Viewer If you are running Windows 98, the Recovery Solution Event Viewer is automatically installed with Recovery Solution. This tool lets you view the Recovery Solution event log. The event log stores Recovery Solution events. An event is an important occurrence that is caused by Recovery Solution or that affects Recovery Solution somehow. Examples include successful snapshots, security data, and error messages. The Event Viewer window allows you to view, print, or delete the event log, or to save it under a different name. You work with the entire log at once. You cannot change or delete individual entries. However, you can open and save the event log to a file in text format so it can be opened in any text editor. For a description of each of the log entry fields, see the description of the Event Details Dialog Box on page 198. Recovery Solution Reference Guide 193 Note If you are running Windows 2000/XP, Recovery Solution writes events to the Windows Application Event Log. Event Log Menu How to Print the Event Log From the Event Viewer Log menu, click Print. Log Menu: Open Opens an event log file. If you have copied or renamed an event log file, you might have several of them on your disk. When you start the program, Recovery Solution Event Viewer opens the default log file. Use the Open command to open a different file. You cannot use the Event Viewer to view an event log file that was saved in ASCII text format; use a text editor, such as Notepad, instead. Open is also on the Event Viewer toolbar. Log Menu: Save As Saves the event log in one of the two formats: z As a Recovery Solution event log file, readable in the Event Viewer. z As a comma-delimited ASCII file formatted for importing into a database or a spreadsheet, readable in a text editor. Saving the event log file under another name does not affect the current event log. If you want to start a new event log, you can rename the event log file. Recovery Solution automatically creates a new file with the default name when it needs to write another event. Note To save the log file with an extension other than .EVT or .TXT, choose the file type from the list, and then type the file name in quotation marks. Save As is also on the Event Viewer toolbar. KEYBOARD: Ctrl+S Log Menu: Delete Event Log Deletes the entire event log from your computer. Because the event log can become very large, you might want to do this occasionally. You cannot edit the event log or delete individual events within the Event Viewer window. However, before deleting it, you can move or rename the event log file in Windows, or from the Event Viewer window, you can save it under another name. When you click Delete, the opened event log file is immediately deleted. Recovery Solution automatically creates a new file with the default name when it needs to write another event. Recovery Solution Reference Guide 194 Delete Event Log is also on the Event Viewer toolbar. KEYBOARD: Del Log Menu: Print Prints the entire event log. Windows displays a Print dialog box in which you can set printing options or choose a printer before sending the print job. Print is also on the Event Viewer toolbar. KEYBOARD: Ctrl+P Log Menu: Exit Closes the Recovery Solution Event Viewer. KEYBOARD: Alt+F4 KEYBOARD: Alt+X View Menu View Menu Toolbar Shows or hides the Event Viewer toolbar. The toolbar contains buttons for common Event Viewer commands. Open: Opens an event log file. Save As: Saves the current event log to a new file. Print: Prints the current event log. Find: Searches for specific events. Filter Events: Limits what events are displayed in the Event Viewer window. Delete Log: Removes the current Recovery Solution event log from your computer. Event Details: Displays more detailed information about the selected event. View Menu Status Bar Shows or hides the status bar at the bottom of the Event Viewer window. The status bar displays the following information: z A brief help message: This area of the status bar displays brief help messages about commands as you work in the Event Viewer window. Example: if you rest the Recovery Solution Reference Guide 195 mouse pointer on a toolbar icon or a menu command, you will see a description of that command in the status bar. z The total number of events the log currently contains: This area of the status bar displays the total number of events that the currently open event log contains. z The total size of the event log file: This area of the status bar displays the total size (in KB) of the currently open event log file. View Menu Options Filter Events Limits the events displayed in the Event Viewer window. You can filter events based on any combination of the event log fields. Filter Events is also on the Event Viewer toolbar. Find Searches for specific events in the currently open event log. You can search on any combination of the event log fields. After finding an event, you can search for the next event that matches the same criteria by using the Find Next command. Find is also on the Event Viewer toolbar. KEYBOARD: Ctrl+F Find Next Searches for the next event that meets the criteria of your last search. KEYBOARD: F3 Event Details Displays detailed information about the selected event. All information is read-only. Event Details is also on the Event Viewer toolbar. KEYBOARD: Enter You can also open the Details dialog box by double-clicking an event date in the list. Refresh Updates the information in the Event Viewer window. If events occur while the event log is open, you will need to click Refresh to force the Event Viewer to update the information. KEYBOARD: F5 About Recovery Solution Displays license and version information about Recovery Solution. Recovery Solution Reference Guide 196 Event Viewer Dialog Box Find To open this dialog box, click Find in the Event Viewer’s View menu. Use this dialog box to search for events that match the criteria you give. You can specify any combination of criteria listed below. z Type Information Warning Error Success Audit Failure Audit z Description z Computer z User z Source z Find For more information, see Event Viewer Elements on page 197. Filter To open this dialog box, click Filter in the Event Viewer’s View menu. Use this dialog box to limit the events displayed in the Event Viewer window. You can specify any combination of criteria listed below. z Type Information Warning Error Success Audit Failure Audit z Description z Computer z User Event Viewer Elements Recovery Solution Reference Guide 197 Event Details Dialog Box To view the details of an event, select the event and click Event Details from the Event Viewer View menu. You cannot change any of the information in this dialog box. Date: The date the event occurred. Time: The time the event occurred. Type: The category into which this event falls. The following are the event types. Information Warning Error Success Audit Failure Audit Source: The part of the program that caused the event. User: The username of the person who was logged on to the computer when the event occurred. Computer: The name of the computer on which the event occurred. Description: Detailed information about the event. System Error: An error message generated by the operating system that is associated with the event you are viewing. This field only appears if there is a system error associated with the event. It appears below the Description field. Close: Click this button to close the dialog box. Previous: Displays the details of the previous event in the list. (In the default sort order, this is the next chronological event.) This button shows the previous visible event. If events are filtered, you will not see the ones that are not being displayed. Next: Displays the details of the next event in the list. (In the default sort order, this is the previous chronological event.) This button shows the next visible event. If events are filtered, you will not see the ones that are not being displayed. Troubleshooting the Event Viewer Troubleshooting: Event Log Needs Information If you are running the Recovery Agent under Windows 98, the event log is probably empty, in which case the file might not even exist. The event log might be empty for any of the following reasons. z You just installed the Recovery Agent and no events have yet been logged. z You recently renamed or deleted the event log. The log file will be re-created the next time an event occurs. Recovery Solution Reference Guide 198 Scheduling Snapshots to Run When Your Computer is Idle If desired, you can have snapshots run while your computer is in an idle state. When activated, the “snapshot on idle” option causes a snapshot to run after a specified amount of idle time (time with no mouse or keyboard input to the computer). In serverbased mode, the default idle time is four minutes, and in local mode, the default is six minutes. To activate the “snapshot on idle” option, click the Snapshot Schedule tab, and select the As soon as computer goes into idle state check box. After the snapshot starts, it will run to completion unless you cancel it manually. Even if the snapshot is already running, you can resume working on the computer without affecting snapshot progress. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for yesterday’s snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled period. Only one scheduled snapshot is taken each day, no matter how many times the computer is turned on. Additionally, no snapshot is started on idle if another Snapshot Schedule option has already caused a snapshot to run (see Snapshot Schedule Dialog Box on page 24). These options include the following. z Take each day’s snapshot as soon as user turns on the computer z Take each day’s snapshot as soon as user resumes the computer z Take each day’s snapshot as soon as user docks the computer Recovery Solution Reference Guide 199 Part III Recovery Solution Technical Reference This part contains the following chapters: z Recovery Solution Troubleshooting (page 201) z Recovery Agent Troubleshooting (page 227) z Technical Reference (page 253) z Hard Disk Support (page 297) Recovery Solution Reference Guide 200 Chapter 12 Recovery Solution Troubleshooting Use the information in this section to solve problems you might encounter with Recovery Solution. Be sure to also read Release Notes for important information that might not have made it into the documentation. You can also review Product Limits on page 253 to view information about a few of the things that Recovery Solution is not designed to do. If you cannot find the information you need, you can visit the support page at www.altiris.com. z Troubleshooting Resources (page 201) z Installation Troubleshooting (page 206) z User Account & Logon Problems (page 211) z Data Protection & Recovery Troubleshooting (page 213) Troubleshooting Resources This section describes other resources you can use when troubleshooting problems with Recovery Solution. z Event Logs (page 201) z Using the Windows 98 Event Viewer (page 202) z File Version Details (page 205) Event Logs An event is an important occurrence that is caused by Recovery Solution or affects Recovery Solution in some way. Examples include security data and error messages. Different Recovery Solution components report information in several log files. z Recovery Solution Setup, Recovery Solution Cluster Creation Wizard and Altiris Console report events into the Notification Server log that you can view at http:// <server name>/Altiris/NS/LogView.asp. z Recovery Solution Agent Setup logs events into the agent installation log (AexCRAS.log) found on client computer. z Recovery Server Setup logs events into the server installation log (AexCRSS.log) found on the server computer in %ProgramFiles%\Altiris\Recovery Solution\Server folder by default. Both Recovery Solution and Recovery Agent write events to an event log. In Windows 2000/XP, events are written to the Windows Application event log. System events might also affect or be affected by Recovery Solution. In Windows 9x/Me, events are written to an event log file maintained by Recovery Solution. Viewing the appropriate event logs is a good way to help troubleshoot Recovery Solution. You should make a note of the Recovery Solution Reference Guide 201 information that gets logged when problems occur. This information can greatly assist systems engineers and any other technical support staff you might contact for help. To view event messages on the server 1. From the Windows Start menu, click Administrative Tools (Common). 2. Click Event Viewer. 3. From the Log menu, click either Application or System to view each event log. To view event messages on a protected computer 1. Open Recovery Agent Options. 2. On the General tab, click Events Log. For details about an event, double-click it in the list, or highlight it and press ENTER. Note If an event reported by Recovery Solution is associated with a system event reported by Windows or an operating system component, then the System Event Code of the Windows event is reported along with the other event information. System events are documented by Microsoft. The system events associated with Recovery Solution are frequently reported by the following Windows components. The typical system event codes listed below are meant only as a guide; it is possible that these components could report other codes and that these codes could be reported by other components. Windows Components Typical System Event Code DCOM Starts with 0x8004. Windows Starts with 0x8007. RPC Starts with 0x8008. Using the Windows 98 Event Viewer This section describes the Event Viewer installed with Recovery Solution on Windows 98 computers. Note The Windows Event Viewer used on Windows 2000/XP computers is an operating system component (see Windows Help for instructions on using it). See also: z Event Details (page 203) z Finding Specific Events (page 203) z Saving Events to Other Files (page 204) z Clearing the Event Log (page 204) z Automatically Overwriting Events (page 204) Recovery Solution Reference Guide 202 Event Details Some information about each event is displayed in the main Event Viewer window. For complete details on an event, select it in the list, then from the View menu, click Event Details. The following information is associated with each event. z Date This is the date on which the event occurred. z Time This is the time of day at which the event occurred. z Type The category into which this event falls. The following are the event types. Information Something that occurred without any problems. Warning A potential problem that might prevent the program from performing as expected. Error A problem that prevented the program from performing as expected. z Source This is the part of the program that caused the event. z User This is the user name of the person who was logged on to the computer when the event occurred. z Computer This is the name of the computer on which the event occurred. z Description This is detailed information about the event. z System Error If an error message generated by the operating system is associated with this event, the system message is displayed here, below the main description. Otherwise, this field does not appear. Finding Specific Events You can locate specific events in the event log in the following ways. z On the View menu, click Filter Events to limit the events displayed in the Event Viewer window. You can filter events based on any combination of the event log fields. Leave a field blank if you do not want to filter on it. z On the View menu, click Find to search for specific events. You can search on any combination of the event log fields. Leave a field blank if you do not want to search on it. Recovery Solution Reference Guide 203 After finding an event, you can search for the next event that matches the same criteria by using the Find Next command. Saving Events to Other Files If the event log gets too full but you do not want to delete the events, you can save the log under a different file name. Use the File menu Open and Save As commands to work with event log files other than the default. You can then clear the main event log. You also have the option to save the event log as a comma-delimited ASCII text file formatted for importing into a database or a spreadsheet. Simply click this option from the Save as type list when saving the file. Note You cannot use Event Viewer to open an event log file that you saved in text format. If you want to be able to view the event log file from within the Event Viewer, save it as an event log file. Clearing the Event Log You can clear the event log at any time. You might want to do this to if the file becomes too large. You can view the file size and the number of events in the file from the status bar. When you clear the event log, all events are deleted, and the file is removed from the computer. You cannot delete just a portion of the event log, but you can rename the event log file instead of deleting it, or you can save the event log under a different filename before you delete it. To clear the event log 1. From the Log menu, click Delete Event Log. 2. Follow the confirmation prompts on the screen. Automatically Overwriting Events Because the event log can grow quite large, you might want to limit its size. You can configure the Event Viewer to automatically overwrite old events as new ones occur. To configure the Event Viewer to overwrite events 1. From the Windows Start menu, click Run. 2. Type REGEDIT.EXE and then click OK. Caution Be extremely careful when using the Registry Editor. If you accidentally change or delete the wrong values, the computer could stop working properly. You might want to print the Registry Editor Help topic To restore the registry before making any changes. This topic describes how to revert to an old version of the registry if the computer will not start. 3. Browse to the following registry location. HKEY_LOCAL_MACHINE\SOFTWARE\Altiris\eXpress\Recovery Solution Agent\EventLog Recovery Solution Reference Guide 204 4. If you do not see an Overwrite Mode value in the right-hand pane, then click the Edit menu, click New and then click DWORD Value. Type Overwrite Mode. 5. Select the Overwrite Mode value. 6. From the Edit menu, click Modify. 7. Under Value data, specify one of the following. 0 This tells the Event Viewer to overwrite events as needed. The log size will not exceed the maximum size specified by the Maximum Log Size registry value (default 128 KB). 1 This tells the Event Viewer to overwrite events that are older than the number of days specified in the Overwrite Days registry value. 2 This tells the Event Viewer to never overwrite log events. Caution If you specify this option, there is no limit to the size of the event log file. The file could eventually grow to fill all of the remaining space on the drive. If you want to keep all old events, you should periodically archive the event log file and delete it from the local drive. 8. Click OK. 9. Repeat the above procedure to create or edit the following values as appropriate. Note While editing values, be sure you specify Decimal for the Base option, unless you truly intend to enter the numbers using hexadecimal notation. If you chose to overwrite log events as needed and you want to change the maximum size for the log file, repeat the above procedure to create or edit the value named Maximum Log Size, and specify the maximum number of kilobytes (KB) you want the file to consume. 10. If you chose to have overwrite log events after a specified number of days, repeat the above procedure to create or edit the value named Overwrite Days, and specify the maximum number of days for which you want Recovery Solution to store events in the log. File Version Details You can view detailed version information about most of the program files for any component of Recovery Solution (server, console, or agent). This information might be useful if you need to obtain product support. When you first install Recovery Solution most of the file version numbers probably match, but this could change if you apply updates to your installation. Recovery Solution Reference Guide 205 To view detailed program file information At any computer with any component of Recovery Solution installed, browse to the installed program files folder for Recovery Solution and run the program AeXVer.exe. On protected computers, file version details for Recovery Agent can also be viewed from the Options dialog box, by choosing the General tab, the About Recovery Solution link, and finally the Details button. To save the program file details to a text file 1. While viewing program file details, from the File menu, click Save As. 2. Specify a filename and then click Save. Installation Troubleshooting Use the information in this section to solve problems you might encounter while installing or getting started with Recovery Solution. z Server Installation Troubleshooting (page 206) z Troubleshooting User Installations (page 208) Server Installation Troubleshooting This section provides troubleshooting tips for installing the server. Choose the item that best describes the problem you are having, or scroll down to browse the information. z After installation, W3SVC warnings appear in System event log (page 206) z If Recovery Server uninstall encounters an error, uninstall rollback may fail (page 207) z Altiris Recovery Server service error message after completing a Recovery Solution Server upgrade (page 207) z Recovery Server upgrade hangs with “Upgrade in progress” status forever (page 207) z Recovery Solution tasks are non-fuctional after aggregation of legacy servers (page 208) z Altiris Recovery Solution Server cannot be installed because 8.3 file names creation is disabled (page 208) After installation, W3SVC warnings appear in System event log After Recovery Solution Server is installed on a computer with IIS, whenever Windows is restarted the System event log on the server might log warnings that the Web shares for Recovery Solution could not be created. In fact, the shares are created and you can safely ignore these warnings. If you would prefer to eliminate the warnings, you must edit the security properties of the shared folders to grant the computer’s SYSTEM read access. By default, the shared Web folder for Recovery Agent Setup is: Recovery Solution Reference Guide 206 C:\Program Files\Altiris\Notification Server\Client Recovery Server\Agent\AgentWeb and the shared Web folder for Web-based file recovery is: C:\Program Files\Altiris\Notification Server\Client Recovery Server\WBFR. If Recovery Server uninstall encounters an error, uninstall rollback may fail If Recovery Server is brought to unusable state after uninstall rollback encounters an error, you can try these steps to complete the server uninstall. Try uninstalling Altiris Recovery Solution Server via Control Panel > Add/ Remove Programs on the Recovery Server machine. Initiate Recovery Server Install on the same machine from Altiris Console and try uninstalling later again. Altiris Recovery Server service error message after completing a Recovery Solution Server upgrade After the setup program for Recovery Solution Server is complete, you see the following error message in the server event log: “Service 'Altiris Recovery Solution Server' (Altiris Recovery Solution Server) could not be installed. Verify that you have sufficient privileges to install system services.” You should check the AeXCRSS.log file created by the server installation for the following message: “Setup has detected that version of selected Altiris Recovery Solution Cluster is older than version of this Recovery Solution Server installation package.” Note For instructions on locating the log file, see “After Server Installation Is Complete” on page 41. The error may occur, if the Microsoft Services MMC snap-in widow was open on the server during upgrade. This causes upgrade to fail when replacing the Recovery Solution Server service components. If this occurs, close the Services window and other running applications on the server and retry running the Recovery Solution Server Install. Recovery Server upgrade hangs with “Upgrade in progress” status forever After starting Recovery Server upgrade never ends as the server status is shown as "Upgrade in progress” on the Recovery Solution Servers in this Cluster page. Accelerate Scheduled Snapshot and Full System Recovery Wizard functionalities may fail with error saying that no available server is found. The problem may appear if Recovery Server upgrade occurs while Notification Server is offline. The workaround for this problem is to uninstall the Recovery Server for which the status cannot be updated and to install it again using the corresponding policies. Recovery Solution Reference Guide 207 Recovery Solution tasks are non-fuctional after aggregation of legacy servers Recovery Solution tasks (such as Manage Protected Data, Disable or enable account, Full System Recovery image creation) may become non-functional after an aggregation of a remote legacy Recovery Server and a Notification Server has already been running Recovery Solution with a not yet upgraded Recovery Server. Upgrading local Recovery Server should resolve the issue. Altiris Recovery Solution Server cannot be installed because 8.3 file names creation is disabled 8.3 file names creation must be enabled on a computer before installing the Recovery Solution server, otherwise the error "Altiris Recovery Server cannot be installed because 8.3 file names creation is disabled" will appear during installation. The '8.3 file names creation' can be enabled the following way: Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem Parameter: NtfsDisable8dot3NameCreation Type: string Set this value to 0 to enable 8.3 name creation. Troubleshooting User Installations Listed below are some of the potential problems users might experience when trying to install Recovery Agent. Choose the item that best describes the problem you are having, or scroll down to browse the information. z Altiris Local Recovery Agent Registration fails (page 208) z Error message appears during Recovery Agent Setup (page 208) z User account not validated (page 209) z Setup does not run properly (page 210) z Applications will not start after agent install (page 211) Altiris Local Recovery Agent Registration fails Local client registration can fail after installation with error 0x80004005 or 0x80070057 if Windows default temporary folder (%WINDIR%\Temp) is missing on the client computer. The workaround is to recreate the Windows Temp folder. For information, see Microsoft Knowledgebase article 251254. Error message appears during Recovery Agent Setup Script error appears in browser when user tries to install Recovery Agent from Web-based Setup wizard Recovery Solution Reference Guide 208 z The server might be running an earlier version of Microsoft Internet Explorer. Internet Explorer 5.0 or later is required. z The user might be running an earlier version of Microsoft Internet Explorer. Internet Explorer 5.0 or later is required. z If Microsoft SQL Server on the server is running under the SYSTEM account or another account that is not part of the AeXRS_Users group on the server, this user must be added to AeXRS_Users before the Web installation can be accessed. An administrator can make this change using Web Console. z "Page not found" error appears in browser when user tries to access Altiris Recovery Agent Setup Wizard or Web Based File Recovery page on Windows 2003 Server. To resolve this problem, change the status of Active Server Pages to Allowed in the Web Service Extension list in IIS 6.0. For more information about, visit the Microsoft Support Web Site. “Cannot read the Windows registry” error This could happen if the Windows computer name of the server does not match the Domain Name System (DNS) host name in its TCP/IP properties. One of these names should be changed to match the other. User account not validated Setup package prompts for credentials but does not accept them If the server is using Windows domain security, and the user installing the software is not a user (has never used the Recovery Agent on the computer), then the /User parameter and account credentials must be specified on the command line. Users unable to reinstall using their previous accounts z If the server is using Windows domain security, and the domain structure has been changed in such a way that a user’s original installation account or the domain containing it has been moved or renamed, then reinstallation requires one of the following. z For users reinstalling through the Web-based Setup wizard, an account with the user’s original username and password must exist in the domain containing the server, or in a trusted domain. Under certain situations, a user might see a message saying that the installation cannot be performed because there is more than one protected computer with that user name. This could happen if the server is using Windows domain security and different accounts were reinstalled to the same computer. To resolve the conflict, an administrator must locate the user’s conflicting accounts within the console. This might be easiest to do using the Protected Users list. The administrator must then do one of the following. Rename the computer that is not being used for the reinstallation. Delete the account that is not being used for the reinstallation. This can be done by selecting the protected computer, then from the Action menu or the context menu, choosing Mark For Delete, then Computer Account. The account is deleted during the next deletion or server space management job. For instructions on scheduling these jobs, see Configuring Server Job Schedules on page 98. Recovery Solution Reference Guide 209 Caution Deleting an account also deletes all protected data associated with that account. User with expired password is prompted to change it during Web installation, but then installation stops This appears to be an issue with the way Internet Explorer handles account authentication. If a user’s password has expired, it should be changed through Windows before installing Recovery Agent. Setup does not run properly After user chooses to let browser run installation automatically, file downloads, but nothing happens z Check the available disk space on the user’s computer. There should be free space equal to at least 3 times the size of the installation files to allow for the creation of temporary files during the browser download and the installation. If there is not even enough disk space to download the file, browser limitations might prevent the problem from being reported, but the installation will fail to run. z If the user is running Windows 2000/XP, see the server detection problem description. During SMS deployment, Setup runs twice This could happen during installation on a Windows 9x computer, if operating system components such as DCOM or Dial-Up Network need to be updated. To fix the problem, the person configuring SMS can do one of the following. z Create separate deployment packages for each operating system component, and deploy them before deploying Recovery Agent. This is the recommended fix, since deploying all components in the same package could potentially result in an incorrect installation status being reported to the SMS server. z Make a change to the SMS program properties for the distribution package. On the General tab, for the After running option, click Program restarts the computer. The automatic upgrade fails. The following are potential causes of this problem. z If the user who is logged on at the time the upgrade starts is not an authorized user of Recovery Solution, the upgrade might fail. To fix the problem, the user can be added to the user group for Recovery Solution (AeXRS_Users by default), or someone else can log onto the protected computer as a valid user of Recovery Solution, and let the upgrade run again. You can cause the upgrade to start by simply browsing the computer’s protected files. z The Setup files for the upgrade are downloaded to the TEMP subfolder of the installed program files folder for Recovery Agent (C:\Program Files\Altiris\Recovery Solution Agent). If there is not enough disk space on this drive, the upgrade could fail. z If Windows System Restore is used to return a protected computer to a point at which a previous version of Recovery Agent was installed, the automatic upgrade does not re-upgrade Recovery Solution to the current version. In this case, a reinstallation of Recovery Agent must be performed, using the computer’s existing account. Recovery Solution Reference Guide 210 z If the automatic upgrade of a Windows 2000/XP protected computer is interrupted (Example: if the computer is restarted during the upgrade), the software is unable to repair itself. If this happens, the user should reinstall Recovery Agent using the computer’s existing account. z If you are upgrading from Recovery Solution version 2.2 or earlier, and the protected computer’s IP address has changed since its most recent contact with the server, then the server cannot contact the protected computer to start the upgrade. This is most likely to happen if the protected computer is configured to use a dynamic IP address. To correct the problem, an administrator can go to the server and run the “RefreshClientsIP.exe” file from the installed program files folder. This updates the IP addresses of all protected computers in the database. If you the upgrade is being done gradually (a few computers at a time), the program can be run as many times as needed until all protected computers have been upgraded. Before running it, the administrator must make sure that (1) the server specifies the correct settings for your DNS server in its TCP/IP properties (if applicable), and (2) each protected computer’s DNS host name matches its Windows computer name. Alternatively, a user at a protected computer can start a snapshot manually, which will cause the protected computer to send its updated information to the server. After reinstallation from command line, Recovery Agent does not work This can occur if the server is running in Windows domain security mode, and no domain was specified as part of the installation command. In this case, it is impossible to configure Recovery Agent options or initiate a snapshot after reinstallation. To solve this problem, you can do either of the following: z Run the installation command again as described in Recovery Agent Setup Command Line, being sure to specify the domain parameter. z Reinstall Recovery Agent using the Web-based Setup wizard. Applications will not start after agent install After the Recovery Agent has been installed, the computer must be restarted. If the computer is not restarted, applications may not start properly. User Account & Logon Problems This section provides information on the following topics: z Protected Computers Cannot Connect to Server (page 211) z User Logon Issues (page 212) z Protected users cannot be authenticated (page 213) Protected Computers Cannot Connect to Server If protected computers receive errors when trying to connect to the server, check the following. z If the address of the cluster is changed, you must change the cluster address on the general tab of the Recovery Solution cluster configuration page (Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration). Recovery Solution Reference Guide 211 z If the protected computer connects to the server via a Dial-Up or Virtual Private Networking (VPN) connection, and any of these remote networking settings have recently changed on the computer, it might have affected the ability of the computer to communicate with the server. You can use Recovery Solution to return the settings to a previous state. Each time a protected computer starts, Recovery Solution saves the computer’s Dial-Up Networking settings in a snapshot that is stored locally on the protected computer. These settings can be restored without making a connection to the server. To access snapshots of network settings, the user clicks Network Settings Snapshots from the context menu of the desktop or system tray icon for Recovery Solution. This opens a window from which snapshots can be managed. Before restoring settings, it is a good idea to first save the current settings so that they can also be restored if necessary. Then any previously saved settings can be restored. z The DCOM configuration of either the server or the protected computer might not be correct. For information about checking the DCOM configuration settings, see DCOM Configuration on page 266. z If there is a firewall between a protected computer and the server, it must be configured to let DCOM traffic through. For documentation about DCOM and how it works with firewalls, visit the Microsoft Web site (http://www.microsoft.com). User Logon Issues Under certain conditions, Windows 2000 running on the server counts all connections from Recovery Agent as invalid logon attempts, even if the account is authenticated properly. This can occur if the protected computer is running Windows 98 SE. Depending on the account policy settings in place on the server, it is possible under these conditions for an account to become locked out without any failed logon notifications to the user. Recovery Solution connects to the server whenever Windows starts, so if the user restarts the computer several times in a short period, the limit for invalid logon attempts might be reached, and the account locked out. Possible symptoms of this problem that might appear to the user include the following. z Manual snapshots cannot be run. The user is prompted for logon information, but the credentials are never accepted. z The user cannot browse protected files. z The main folder in Windows Explorer cannot be expanded. Trying to open the protected files folder in its own window causes Windows to display an Action canceled Internet Explorer page. When trying to view options for Recovery Solution, the user sees a message saying that the schedule settings cannot be displayed. If a user encounters these problems, check the System event log on the server to see if the account is being locked out. If it is, you can change the user’s account so that it is not disabled and then have the user restart the protected computer. To prevent this problem in the future, you might consider changing the account policy to allow more bad logon attempts and/or to reduce the reset time. Recovery Solution Reference Guide 212 Protected users cannot be authenticated Domain users become a member of the Recovery Solution user group (AeXRS_Users) by default on the Altiris Recovery Solution Server service startup. If, e.g. because of a network connection problem, your domain controller is unavailable as the service starts, then your protected users will not be able to authenticate on the Recovery Solution server. To fix the problem, verify that your domain controller is available and restart the Altiris Recovery Solution Server service. Data Protection & Recovery Troubleshooting Use the information in this section to solve problems you or Recovery Agent users might encounter while protecting or recovering data. The topics below describe specific problems you might need to resolve. If you suspect other problems with the protected data that is stored on the server, see Configuring Server Job Schedules on page 98. z Snapshot & File Restore Troubleshooting (page 213) z Full System Recovery Troubleshooting (page 216) z Rollback Troubleshooting (page 224) Snapshot & File Restore Troubleshooting The following are some specific problems that might occur during snapshots. Choose the item that best describes the problem you are having, or scroll down to browse the information. z Snapshot Schedule for Certain Computers do not Run (page 213) z User Cannot Log On to Start Snapshot (page 214) z Job Cannot Be Submitted (page 214) z Protected computer drives missing from snapshots (page 214) z User Cannot Browse Protected Files (page 214) z User Cannot Access a Different Account Via Web-Based File Recovery (page 214) z Snapshots Fail Because Server Clocks Are Not Synchronized (page 215) z General Snapshot & Recovery Problems (page 215) z Short File Names Restored Incorrectly on FAT32 Partition (page 215) Snapshot Schedule for Certain Computers do not Run If the protected computer is running Windows XP or Windows Me, its connection to the server could be hampered by the Windows connection firewall, which prevents the server from reaching the computer. If the protected computer is behind a corporate firewall, or on a VPN connection to a network that has a firewall, it is probably protected by that firewall, so the user can Recovery Solution Reference Guide 213 usually turn off the personal firewall. Assuming that the server is on the same network, this should allow all features to work properly. Note Internet Connection Sharing uses the Windows firewall by default, so if the protected computer uses Internet Connection Sharing then you could run into the same problem. User Cannot Log On to Start Snapshot For more information, see User Logon Issues on page 212. Job Cannot Be Submitted z In Windows 2000/XP, one cause of this error is that the drive that contains the files being protected uses the NTFS file system, and the local SYSTEM account on the protected computer does not have full access to the drive. Recovery Solution uses this account to read and write data. To fix the problem, make sure that the SYSTEM account has access to the drive. z If multiple users report this problem at the same time, it might be an issue with the server. Try to restart the server, following the instructions in Stopping and Starting the Recovery Solution Server Service on page 289. Protected computer drives missing from snapshots If some files or drives are missing from a snapshot, if may be because the protected computer’s disk configuration changed. If the disk configuration changes on a protected computer, Recovery Agent should be reinstalled using the existing account to ensure that the updated drives are protected. Following are some of the specific disk configuration changes that might require reinstallation of the software. z A hard drive is added to or removed from the computer. z A drive is resized. z A hard drive letter is changed. z A drive’s file system is changed (Example: from FAT to NTFS). User Cannot Browse Protected Files For more information, see User Logon Issues on page 212. User Cannot Access a Different Account Via WebBased File Recovery Under some circumstances, Web browsers can obtain valid logon credentials without prompting the user for them. This could make it difficult for the user to access protected files that are stored under a different account name. The Web-based file recovery logon prompt might not appear if any of the following conditions are true. Recovery Solution Reference Guide 214 z The user has already accessed Web-based file recovery during the same Web browser session. Even if the user chooses the Log Off button, the credentials are not necessarily cleared from the browser’s cache, so returning to the page might not require another logon. z The user is running Internet Explorer, and the user’s logon credentials for Windows are the same as those for Recovery Solution. In this case, Internet Explorer just uses the Windows credentials without prompting for a logon. If a logon prompt is required (Example: if the user wants to access protected files that are stored under a different account name), then the user can do one of the following. Log onto Windows using different credentials. Access Web-based file recovery using Netscape, which is available for free from the Netscape Web site (http://www.netscape.com). Snapshots Fail Because Server Clocks Are Not Synchronized If computers’ clocks on two or more Recovery Servers in a cluster are unsynchronized, snapshots may fail. You must ensure that server clocks are synchronized. If Recovery Server computer is a member of a domain, its computer clock can be synchronized automatically by a network time server. If Recovery Server computer is not a member of a domain, the computer’s clock may be automatically and regularly synchronized by an Internet time server. To quickly synchronize computer’s clock with that of another Recovery Server computer, open a command prompt on the server and enter the following command: NET TIME \\computername /SET General Snapshot & Recovery Problems If the server is running MSDE (the lite version of Microsoft SQL Server), then the number of SQL Server connections used by Recovery Solution should not be set to anything greater than 5. If too many simultaneous connections are allowed, certain tasks could fail. For instructions on setting the number of connections used by Recovery Solution, see Licensing Recovery Solution on page 44. Short File Names Restored Incorrectly on FAT32 Partition If you restore files on FAT32 partition on Windows Vista or XP 64-Bit Edition, the short file names may be different from the originally backed up short file names. This is a current FAT32 limitation. File restore on an NTFS partition works properly with short file names. Recovery Solution Reference Guide 215 Full System Recovery Troubleshooting This document contains troubleshooting information you can use in case a Full System Recovery does not work properly. For instructions on performing a Full System Recovery, see Running Full System Recovery on page 143. Choose the item that best describes the problem you are having, or scroll down to browse the information. z Disk space error appears during Full System Recovery disk creation (page 216) z Full System Recovery does not start properly (page 216) z Error appears during Full System Recovery (page 217) z Full System Recovery fails when creating disk structure (page 220) z Full System Recovery incomplete, but no error appears (page 220) z Problems occur after server upgrade (page 221) z Error appears after Full System Recovery (page 221) z Recovery Agent not working after Full System Recovery (page 222) z Files missing or outdated after Full System Recovery (page 222) z Full System Recovery stalls (page 222) z Full System Recovery CD-ROM failure (page 222) z Full System Recovery and Windows 98 with Symantec Antivirus (page 223) z Cannot Cancel Restore of Folder (page 223) z Norton AntiVirus Security Warning (page 223) z Account Disabled After Full System Recovery (page 223) z Recovery Fails on Computers with Phoenix nForce 6A61CPAAC-00 BIOS (page 224) z Full System Recovery fails on HP NetServer LC2000 (page 223) Disk space error appears during Full System Recovery disk creation Make sure that the network share for Full System Recovery has free disk space equal to the total size of the CD/DVD-ROM images plus the maximum amount of data for a single CD/DVD-ROM (depending on the capacity of your blank CD/DVD media). Full System Recovery does not start properly Computer starts normally, but nothing else happens After the computer starts, run the Full System Recovery program (RNDM_DR.EXE) at the command prompt. If the program still does not start, create a new Full System Recovery disk. Temporary operating system does not start If the operating system appears to have been copied correctly but it does not start, it is possible that the disk partition or drive information was not restored correctly. Example: some types of computers use a special utility partition that is stored at the beginning of Recovery Solution Reference Guide 216 the hard disk. If this partition is not restored correctly, the temporary operating system might not be able to start. To correct the problem, you can use a disk partition tool such as PartitionMagic to restore the original partitions and drive letters. After you restart the computer Full System Recovery should continue from the point at which it stopped. Cannot log into temporary operating system when starting Full System Recovery There may be a problem with the temporary operating system copied to CD-ROM as part of the Full System Recovery image. A problem occurs when a Windows NT computer has non-English regional settings (stored in the system’s .NLS files). If this is the case, it is impossible to log on, because the logon prompt does not accept keyboard input. This problem can be fixed by creating new Full System Recovery disks that include, in the temporary operating system, all of the .NLS files from the SYSTEM32 subfolder of the protected computer’s Windows folder (by default, C:\WINNT\SYSTEM32). You must then restart Full System Recovery using the new disks. Error appears during Full System Recovery “Cannot load DOS. Press any key to retry.” If the computer is booting from a floppy disk, the disk might be bad. Ordinarily this would be detected at the console, but if the floppy disk drive at the console is better at handling disk errors than the floppy disk drive at the protected computer is, Recovery Solution might not be able to detect the problem when you create the Full System Recovery disk. Try creating a new Full System Recovery disk with a different floppy disk. “VDISK memory allocator already installed. XMS driver not installed.” You might have started the Full System Recovery by simply restarting the computer instead of turning it off. Be sure to turn the computer off to clear its memory, then with the first disk or CD-ROM inserted, turn the computer back on. “Partition table file is invalid” The Full System Recovery cannot continue because there is a problem with your computer’s file system. This error usually appears if you have chosen to continue a Full System Recovery that you started previously. You might need to restart the Full System Recovery from the beginning. “Hard disk [C:] is smaller than the original.” The partition table cannot be restored. The hard disks on the computer to which you are restoring data are too small to hold all of the protected data from the original hard disks. For Full System Recovery to work, the computer to restore must have at least as many hard disks as the original protected computer, and the contents of each original disk must fit entirely onto one of the restored computer’s disks. Listed below are some specific circumstances that might cause this error to occur. z A hard disk has been removed from the protected computer since the time of the Full System Snapshot. Recovery Solution Reference Guide 217 z You are trying to restore to a different computer than the one from which the Full System Snapshot was run. z The protected computer uses Windows 2000/XP disk volume sets or stripe sets. In this case, there must be physical disks on the recovered computer large enough to store the entire contents of the logical disks from the snapshot. “Cannot open partition information file.” Recovery Solution cannot access the information about the computer’s file system. This might be because the data is invalid, or it might just be a temporary access problem. You should start the Full System Recovery again. If you attempt to continue from where you left off and you still see this message, you will have to restart the Full System Recovery from the beginning. “Invalid volume information file.” The Full System Recovery cannot continue because there is a problem with the information about your hard drives. This error usually appears if you have chosen to continue a Full System Recovery that you started previously. You might need to restart the Full System Recovery from the beginning. “Cannot open volume information file.” Recovery Solution cannot access the information about your computer’s hard drives. This might be because the data is invalid, or it might just be a temporary access problem. You should start the Full System Recovery again. If you attempt to continue from where you left off and you still see this message, you will have to restart the Full System Recovery from the beginning. “Run-Time error R6003. Attempt to divide by 0” You might see this message in the following cases. z On computers with certain BIOS versions, if you attempt to recover from a bootable CD-ROM. Example: computers with American Megatrends AMIBIOS Version 1.00.04.DK0K cannot be recovered from bootable CD-ROM. One possible work around is to use the console to create a bootable floppy disk, and restart the Full System Recovery from the floppy disk. However, this might not work on all BIOS versions. “Disk Write Error. Could not write to disk %c.” It is possible that part of the disk specified is damaged. You might try using a tool such as ScanDisk to mark the bad clusters as unusable. If there is enough disk space left over to recover the system, you can try again. Otherwise, you can install the operating system manually and perform a data-only Full System Recovery. You could also replace the hard disk with another one that is at least the same size as the original one and then run the Full System Recovery again. “Original boot sector not found” You might see this message on computers with a single SCSI drive and certain BIOS versions installed, if you attempt to recover from a bootable CD-ROM. One possible work Recovery Solution Reference Guide 218 around is to use the console to create a bootable floppy disk, and restart the Full System Recovery from the floppy disk. “ntldr not found” If the protected computer has multiple SCSI hard disks, and the computer is configured in the BIOS to boot from one of these SCSI hard disks with an ID greater than 0, you cannot perform a Full System Recovery on the computer. If the computer will not boot, you must install the operating system manually. Then you can restore the data from the Full System Recovery CD-ROM. “Cannot extract files to disk” You might see this message if you are recovering from a CD-ROM set in which the temporary operating system spans more than 1 disc. To fix the problem, you must recreate the discs with a temporary operating system smaller than the capacity of a CDROM (650 MB). The same error can also appear in case of a bad CD media. “The modem has detected an internal error” You might see this message during Full System Recovery on the IBM ThinkPad 600E, along with options to restart or shut down the modem. Simply choose to shut down the modem, and the Full System Recovery should continue normally. “D:\DISK1 is not accessible. Folder was moved or removed” Some CD-ROM drives, notably certain NEC models, might not be able to read CD-ROMs that have not been finalized (or “closed”). If you encounter error messages claiming that files or folders cannot be found, you might need to finalize the CD-ROMs with your CD writing software. Some CD writing programs let you finalize discs that you have already written. If you do not have this option, you must create the discs again. In that case, the easiest way to finalize the discs is to create them using the “disc-at-once” option. System file errors If you see Windows errors relating to system files that cannot be replaced, or Windows Update errors relating to .DLLs, you might be attempting to recover the computer from a Full System Snapshot that was performed in the middle of the installation of a program. If a user installs a program that requires the computer to be restarted, but a Full System Snapshot is performed before the computer is restarted, you cannot recover the computer from this snapshot. Try creating a new Full System Recovery disk from a different snapshot. Service Control Manager and other Windows errors During the Windows part of Full System Recovery, you might see error messages relating to services not starting or files not being found. Often these messages appear because certain items specified in the Windows registry were not included in the temporary operating system being used to restore the computer’s files. The Full System Recovery should continue normally in the background, even if these messages appear. They should not appear when the Full System Recovery is complete. After the temporary operating system is installed, the protected computer cannot connect to the server to complete Full System Recovery If a network device driver was installed or updated just before the snapshot used for Full System Recovery, and the protected computer was not restarted between the driver installation and the snapshot, then it is possible that the required driver files were not included in the temporary operating system. This occurs because Recovery Solution only checks for required system files while the computer starts up. If the required files are Recovery Solution Reference Guide 219 missing, the network card might not function correctly, and a connection to the server becomes impossible. The problem can sometimes be corrected by recreating Full System Recovery disks and adding the entire Windows folder to the temporary operating system. “psAuthInfo or psAuthInfo->psAuthIdentityData is Null” You might see this error if you chose a snapshot from a version of Recovery Solution earlier than 4.0 as the source for Full System Recovery. You can use snapshots from Recovery Solution 3.2 or later, but to do so you must include all user data on the CDROMs. Full System Recovery fails when creating disk structure If the Full System Recovery fails when creating the disk structure, you can perform a Full System Recovery without formatting the hard drive. For information, see Using Full System Recovery Without Formatting Drives Option (page 145). Full System Recovery incomplete, but no error appears After partitions converted to NTFS, computer restarts, but does not boot This symptom could occur when the partition information in a disk’s Master Boot Record (MBR) does not match the information in the disk controller. To fix the problem, you need to erase the partition table from the MBR. You can use the pclean.exe program installed with the console for this purpose. Pclean.exe is located on the Recovery Solution Server at C:\Program Files\Altiris\Recovery Solution\Console. You can also access it through the Altiris Console on the Tasks tab under Tasks > Incident Resolution > Recovery Solution > Erase Partition Table. To erase the protected computer’s partition tables 1. Boot the protected computer to DOS. To do this you can boot using Full System Recovery disks and then press N to cancel. 2. From the DOS prompt, run pclean.exe. 3. You will be prompted to enter disk numbers from which you want to erase the partition tables. If you know which disk is causing the problem, you can erase only that partition table. Otherwise, you might have to erase them all. 4. After you have erased the partition tables restart Full System Recovery. I’m prompted to insert next CD-ROM, but it has already been inserted, or current CD-ROM is last of recovery set The most likely cause of this error is a bad CD. Try the following to resolve the problem. z Click Try Again in the dialog box that appears following the error message. Recovery Solution Reference Guide 220 z Recreate the CD-ROM that was being processed at the time of failure. This is not the CD-ROM that you inserted after the prompt, but the previous one. Be sure not to rerecord the data onto the faulty CD-ROM. Try to continue with the new CD-ROM. Full System Recovery stops First make sure that the Full System Recovery has really stopped. z Check the status messages on the screen to see if Recovery Solution is in the middle of a task. z Check the hard disk activity light on the computer casing to see if there data is being read from or written to the hard disk. z Even after you are convinced that the system has stopped prematurely, wait 10 minutes to be sure. If you are still convinced that the Full System Recovery has stopped before it is done, you can try the following. z Restart the computer. The Full System Recovery might continue normally once you restart. z If the recovery does not continue, you might have to start over again. If you attempted a fully automatic Full System Recovery that failed, you can try a dataonly Full System Recovery. Problems occur after server upgrade After the server has been upgraded, certain limitations of Full System Recovery may apply. If you are performing Full System Recovery over the network, you cannot use an image created with an older version of the software. In this case, the server cannot automatically upgrade the protected computer, and user’s account becomes disabled. To successfully perform Full System Recovery from an old image after a server upgrade, and ensure that the user’s account remains active, use only Full System Recovery from CD-ROM (and not over the network). A similar issue arises (the user’s account becomes disabled because the new version of Recovery Agent cannot use data restored from the older version), but the user can then reinstall Recovery Agent after Full System Recovery is completed to fix the problem. Error appears after Full System Recovery Norton AntiVirus security warning If the protected computer is running Windows Me, then after Full System Recovery is complete, Norton AntiVirus might display a warning indicating that security resources have been tampered with. You can safely close and ignore this error. Hibernation Utility: “Your computer cannot go into hibernation mode” If you are using a Toshiba notebook computer with Windows 98 SE, you may see this error message after you have run a Full System Recovery and restarted the recovered computer. This error message appears because a hibernation file was not restored during Full System Recovery. Hibernation files are not included in Full System Recovery or snapshot operations, because they can take up large amounts of memory, and contain non-essential information such as current running applications and their window positions. To work around this error, you can restore the computer’s hibernation file using a hibernation utility named “Halloc.exe”. Recovery Solution Reference Guide 221 To restore a hibernation file 1. Restart the computer in MS-DOS mode. 2. Go to the directory “C:\Windows\”. 3. Type Halloc /C. Note The file “Halloc.exe” will be in “C:\Windows” if you installed Windows on the computer from the original Toshiba CD. If you do not have this file in the Windows directory, you can obtain it from the Toshiba Web site (http://www.toshiba.com). 4. After you see a “File is created” message, restart the computer. Recovery Agent not working after Full System Recovery If Recovery Solution was uninstalled before the Full System Recovery, you might have trouble running snapshots and restoring files once the Full System Recovery is complete. That’s because the uninstall process removed some of the information about the protected computer from the server. To fix this problem, reinstall Recovery Agent using the same account as before. After the software is reinstalled, snapshots and restores should work normally. Note Full System Recovery can be performed from a Full System Snapshot that was done using previous versions of Recovery Solution. To use snapshots from earlier versions, you must add all the user data to the CD-ROM set. Files missing or outdated after Full System Recovery If you completed a Full System Recovery but some of your files are missing or outdated, the Full System Recovery disk might have been created with an older snapshot specified. Once the protected computer is up and running with Recovery Agent installed, the user can restore the missing files by using Recovery Agent options. For instructions, see the Recovery Solution User’s Guide. Full System Recovery stalls If there is a large number of files on a CD-ROM recovery set, data restore may be slow, and may even appear to be making no progress for some minutes. In this case, recovery has not failed; it is simply slow. Full System Recovery CD-ROM failure During Full System Recovery from CD-ROM, processing of a particular CD-ROM may fail. One of the following scenarios may occur: z During recovery, you are prompted to insert the next CD-ROM, but the CD-ROM being processed is the last in the recovery set. Recovery Solution Reference Guide 222 z During processing of a CD-ROM, you are prompted to insert the next CD-ROM in the recovery set. Upon insertion of the next CD-ROM, recovery fails. Try the following in order to resolve the problem: z Click the Try Again button in the Recovery Solution Full System Recovery error dialog box. z Re-record the CD that was being processed at the time of failure. This is not the CD inserted after the prompt for the next CD, but the previous one. Data from the CD being read at the time of failure must be re-recorded onto a different CD. Full System Recovery and Windows 98 with Symantec Antivirus After the Full System Recovery DOS part finishes and the computer is restarted, the following message may appear. Cannot find device that might be needed to run windows or windows application c:\progra~1\symantec\symevnt.386 Press any key Pressing any key will boot Windows without problems Cannot Cancel Restore of Folder Files from the folder for which you're trying to cancel the restore process are probably stored on multiple CD-ROMs. To cancel restore of the folder, you must insert and confirm cancellation for each CD-ROM containing data from that folder. Norton AntiVirus Security Warning If you are running Windows Me and have Norton AntiVirus installed, then after Full System Recovery is complete, Norton AntiVirus might display a warning indicating that security resources have been tampered with. You can safely close and ignore this error. Account Disabled After Full System Recovery After Full System Recovery has been performed on your computer, you might see a message saying that your account has been disabled. This can happen if your computer is recovered to a point in time from before your current account status. Example: the following situations could cause this message to appear. z You have reinstalled Recovery Agent, but your computer is recovered to a point in time before you reinstalled. z You have uninstalled Recovery Agent, and your computer is recovered using Recovery Solution Full System Recovery. To fix the problem, simply reinstall using your existing account. Full System Recovery fails on HP NetServer LC2000 Full System Recovery can fail when creating disk structure on HP NetServer LC2000 with Phoenix BIOS 4.06.23 PV. For information, see Full System Recovery fails when creating disk structure on page 220. Recovery Solution Reference Guide 223 Recovery Fails on Computers with Phoenix nForce 6A61CPAAC-00 BIOS Computers with Phoenix nForce BIOS ver. 6A61CPAAC-00 (BIOS date 10/22/04) may fail to start after RapiDeploy image creation and after RapiDeploy image restore during F11 recovery with the following error: Booting Production partition.... NTLDR is missing Press Ctrl+Alt+Del Restart the computer manually once again. The problem should be resolved. Rollback Troubleshooting Certain error conditions that cause the rollback not to succeed might not report that condition back to the console. If the rollback seems to be running for an excessively long time, you should check the protected computer itself to see if any errors have occurred. You can cancel the job from the console job queue. The following are some specific errors you could encounter while trying to perform a rollback. Choose the item that best describes the problem you are having, or scroll down to browse the information. z Unable to see Desired Snapshot During a System Rollback (page 224) z Rollback Cannot Be Started From the Console (page 225) z Job Cannot Be Submitted (page 225) z After Rollback, User Is Prompted to Uninstall (page 225) z Rollback Fails (page 225) z After Rollback, a Restored Drive Contains No Data (page 226) Unable to see Desired Snapshot During a System Rollback Problem: When the agent software is reinstalled or upgraded, the snapshots from the previous installation do not appear in the Steam Rollback wizard. Cause: This was done by design to hide old snapshots. Solution: You must add a registry value to use snapshots from previous installations for a System Rollback. 1. Open the Windows registry editor. 2. Browse to the following registry key: HKEY_LOCAL_MACHINE\Software\Altiris\eXpress\Recovery Solution Agent 3. Right-click on the details pane and select New and then DWORD value. 4. Type in the name ShowRedSnapshots. 5. Double-click ShowRedSnapshots and type in a value of 1. Recovery Solution Reference Guide 224 Rollback Cannot Be Started From the Console If the protected computer is running Windows XP or Windows Me, its connection to the server could be hampered by the Windows connection firewall, which prevents the server from reaching the computer. If the protected computer is behind a corporate firewall, or on a VPN connection to a network that has a firewall, it is probably protected by that firewall, so the user can usually turn off the personal firewall. Assuming that the server is on the same network, this should allow all features to work properly. Note Internet Connection Sharing uses the Windows firewall by default, so if the protected computer uses Internet Connection Sharing then you could run into the same problem. Job Cannot Be Submitted In Windows 2000/XP, one cause of this error is that the drive that contains the files being restored uses the NTFS file system, and the local SYSTEM account on the protected computer does not have full access to the drive. Recovery Solution uses this account to read and write data. To fix the problem, make sure that the SYSTEM account has access to the drive. After Rollback, User Is Prompted to Uninstall If rollback is performed using a snapshot from an earlier version of Recovery Solution, then after the recovery is complete, Recovery Agent must be reinstalled on the protected computer with the user’s existing account. Rollback Fails The following are potential causes of this problem. z If the server is running MSDE (the lite version of Microsoft SQL Server), then the number of SQL Server connections used by Recovery Solution should not be set to anything greater than 5. If too many simultaneous connections are allowed, certain tasks could fail. For instructions on setting the number of connections used by Recovery Solution, see Licensing Recovery Solution on page 44. z There might not be enough registry free space on the protected computer. Under Windows 2000/XP, Recovery Solution requires that a certain percentage of the space allocated for the registry be free in order for snapshots or rollback operations to work. If the registry quota is insufficient, the registry cannot be restored properly during rollback. To correct the problem, you must increase the maximum registry size so that there is enough free space for Recovery Solution to use. The change is made in the Virtual Memory dialog box along with the Windows paging file sizes. Start by following the recommendations published by Microsoft for increasing the maximum registry size. They are included in the Microsoft Knowledge Base article Q176083, which you can obtain from a number of Microsoft technical publications or from the Microsoft Web site (http://www.microsoft.com). Recovery Solution Reference Guide 225 If rollback still fails, it might be necessary to increase the maximum registry size even more. You might find you need to increase the maximum registry size to as much as 50 MB. After Rollback, a Restored Drive Contains No Data If the protected computer’s drive configuration has changed since the time of the snapshot to which you are rolling back, then the old drive configuration is restored, but it is possible that one or more drives contains no data. To restore the data, perform a second rollback to the snapshot you chose for the first rollback. Recovery Solution Reference Guide 226 Chapter 13 Recovery Agent Troubleshooting To troubleshoot the Recovery Agent, choose the troubleshooting topic that applies to your situation. z Troubleshooting: Install/Uninstall on page 227 z Troubleshooting: Snapshots on page 230 z Troubleshooting: Restoring Data on page 236 z Troubleshooting: Error Messages on page 240 z Troubleshooting: Options on page 243 z Troubleshooting: Event Logs on page 244 z Troubleshooting: Rollback on page 246 z Troubleshooting: Other Issues on page 248 Troubleshooting: Install/Uninstall What type of installation problem are you having? z When installing Local Recovery, I get an error stating that I am using non-supported devices. See Troubleshooting: Unsupported Devices on page 227. z I cannot install the Altiris Partition for Local Recovery. See Troubleshooting: Problems Installing the Local Partition (page 228). z I cannot update my Recovery Agent installation. See Troubleshooting: Cannot Update Recovery Agent on page 229. z When I update Recovery Agent, my settings are lost. See Troubleshooting: Settings Not Saved During Update on page 229. z After Uninstalling Recovery Agent, bad clusters still exist on hard drive. SeeTroubleshooting: Unusable Clusters after Uninstall on page 229 z When Installing Recovery Agent fails with error “unable to configure the settings. See Troubleshooting: Install fails with unable to configure the settings error on page 230 Troubleshooting: Unsupported Devices When installing Local Recovery, you may get an error message similar to the following: Found hardware, which is not supported by the current version of the Local Recovery. Local snapshot functionality will not work. Please review the drivers in the Hardware Device Manger and disable the unsupported hardware. Local Recovery and Local Recovery Pro cannot be installed on the following drive types: Serial ATA RAID Recovery Solution Reference Guide 227 SCSI* (*Adaptec 3800/3900 series are supported, others are not) If your computer uses these devices, you will need to remove them before installing Local Recovery. If your computer does not use these devices, you may still get this error message. Some computers may have drivers loaded for devices that are not actually used in the computer. If you get this error message, but you are not using this devices, view your Windows Device Manager. If a driver for one of these devices is loaded, uninstall it, restart your computer, and try the installation again. Troubleshooting: Problems Installing the Local Partition Problems Launching the Recovery Agent Partition Wizard If you have compression turned on for the drive that you are trying to install Local Recovery on, you will get the following error: “Recovery Agent failed to launch Partition Wizard. Procedure failed with error 0x1F. If problem persists, please contact support for Altiris Recovery Solution.” Local Recovery cannot create the Altiris Partition on a compressed drive. To solve this problem, disable compression for the drive, and reinstall Local Recovery. For more information on using compression with Local Recovery, see the notes under Installing the Recovery Agent in Local Mode on page 60. Problems Creating the Altiris Partition When trying to create the Altiris partition for local recovery, the user may get the following message: “Altiris Recovery Agent failed to create initial image of the system.” This message usually indicates that it was not possible to find enough contiguous free space on the drive to create the partition of the size specified. To correct this situation the user can do one of two things; first, they can try and create a partition smaller than the suggested size or second, they can exit the install and run a defragmentation utility to attempt to create enough contiguous space for the partition creation. Problems Creating the Initial Snapshot After the creation of the Altiris partition, the user may get the following error: “Altiris Recovery Agent failed to create the initial image of the system.” On computers where 50% or more of the hard drive is used prior to the creation of the Altiris Partition, users may encounter problems taking the initial snapshot. If this message is encountered and the drive is more than 50% full, the user can try the following steps to correct the issue: 1. Cancel the snapshot. 2. Reboot to Windows. 3. Run Windows Disk Cleanup. 4. Delete any unnecessary files. 5. Run Windows Disk Defragmenter. 6. Restart the installation. Recovery Solution Reference Guide 228 Troubleshooting: Cannot Update Recovery Agent The following are some potential causes of update problems. z If the automatic update doesn't seem to work, make sure that you are logged on as an authorized user of Recovery Solution, then let the upgrade run again. You can cause the upgrade to start by simply browsing your protected files. z To install the Recovery Agent on a Windows 2000/XP computer, you must be a member of the Administrators user group or have administrative rights on your computer. If you don't have administrative rights, ask the Recovery Solution administrator to install the software for you. z If you get errors trying to install the Recovery Agent over an older version, try uninstalling the Recovery Agent first, then install the new version. In some cases Setup might prompt for a user name and password, but not accept them even if they are valid. This could occur if you are trying to reinstall from a command-line Setup package provided by your administrator, and you are not the original user who installed Recovery Agent on your computer. In this case, you need to specify user credentials on the command line as follows: AgentSetup.exe /Reinstall /Comp:computer /User:primary_username / GUser:your_username /Pass:your_password If your administrator provided other command-line switches to use, be sure to include them as well. The order that switches appear on the command line is not important. Troubleshooting: Settings Not Saved During Update During a regular software update or reinstallion using the same account, all your settings should be saved. However, some settings might revert back to the default state under any of the following circumstances. z You completely uninstall the software first, then reinstall it. Uninstalling the software removes all settings. If you want to update the software and keep your old settings, simply install it over the existing copy. z You install the software on a different computer from the one you originally installed it on. Some settings are stored on your computer rather than on the server, so even if you use the same account, those settings are not kept when you install the software on a different computer. Troubleshooting: Unusable Clusters after Uninstall After uninstalling the Recovery Agent, there still may be clusters on the computer’s hard drive that are not made available. To repair the clusters, you can download a BWINST utility from Altiris Technical Support. Then from a command prompt, run it with the following parameters: BWINST -rs -u -d:<disk number> Recovery Solution Reference Guide 229 Troubleshooting: Install fails with unable to configure the settings error During install you get the following error: Error 25015. The setup has detected that Recovery Agent is unable to configure the settings for this computer. See more details in to the AexCRAS.log file which is available in your Windows temporary folder. The reason for this error is that the current logged in user on the computer can not access of modify settings in the registry, the user can try the following steps to correct the issue: 1. Run Regedit 2. go to the following entry HKEY_LOCAL_MACHINE\SOFTWARE\Altiris\eXpress 3. right click on eXpress folder and select Permissions.... 4. Reset Permissions for all users to Full Control and Read 5. Rerun the Recovery Solution agent install Troubleshooting: Snapshots What happens when you try to take a snapshot? z The snapshot options are disabled or otherwise not available. See Troubleshooting: Snapshot Options Unavailable on page 231. z I start a manual snapshot, but nothing happens. See Troubleshooting: Nothing Happens on page 231. z I start a manual snapshot, but my computer locks up or otherwise fails to respond as expected. Troubleshooting: Erratic Behavior on page 231. z I scheduled a timed or automated snapshot that does not appear to have been performed. See Troubleshooting: Snapshots Don't Run on page 232. z The snapshot starts correctly, but stops before it is completed. See Troubleshooting: Snapshot Stops Prematurely on page 234. z During the snapshot, the Windows Installer screen appears. See Troubleshooting: Windows Installer Appears During Snapshots on page 235. z The snapshot does not contain all my files. See Troubleshooting: Snapshot Is Missing Files on page 235. z I receive an error message while the snapshot is being taken. See Troubleshooting: Error Messages on page 240. z I am prompted to log on, but then nothing happens. See Troubleshooting: Logon Problems on page 250 z I am prompted to log on, but my user name and password are not accepted. See Troubleshooting: Logon Problems on page 250. Recovery Solution Reference Guide 230 Troubleshooting: Snapshot Options Unavailable z An administrator can disable snapshot and recovery activity on your computer. This might be done temporarily for maintenance purposes. z If you want to take a snapshot of a specific file or folder, and you browse to the folder using Windows Explorer, you can start a snapshot by right-clicking the file or folder and clicking Snapshot from the menu. You can also select the file or folder and click File > Snapshot. In some cases, the Snapshot option is not available. This problem can occur if using a version of Windows Internet Explorer earlier than 6.0. To solve this problem, upgrade Internet Explorer to 6.0 or newer. Troubleshooting: Nothing Happens If you choose an Recovery Solution option but nothing happens, it could be for the following reasons. z Under some circumstances, if you are starting a snapshot or restore, it might take up to several minutes for the progress window to appear, so it seems as if nothing is happening. z If for some reason the server is not working properly, it might also be several minutes before an error message appears. You can check the availability of the server by looking at the Windows taskbar. The Recovery Agent system tray icon, usually located at the bottom right of your screen, displays a red mark if there is a problem contacting the server. If the server is unavailable, contact your Recovery Solution administrator for further assistance. If the server is available, there might be a configuration problem. See Troubleshooting: Options on page 243. If the progress window opens but does not continue, see Troubleshooting: Recovery Solution Stops During a Snapshot or Restore on page 234. z If you are using Windows XP and your computer is not part of a Windows domain, you might be running into problems with Fast User Switching. For more information, see Troubleshooting: Fast User Switching on page 252. Troubleshooting: Erratic Behavior There appear to be some incompatibilities between Recovery Agent and other products that could cause some Recovery Solution functions to fail. Check to see if you have the programs below installed. If you do, you might need to uninstall the other product before you can continue. z Legato Replica z Replica for HP SureStore Tape z Stac Replica Tape z Timbuktu Enterprise 2.0 Build 635 z Tivoli Data Protection for Workgroups Recovery Solution Reference Guide 231 Troubleshooting: Snapshots Don't Run Snapshots can be performed at specific times (scheduled), or they can be associated with specific events (Example: snapshots that start when you log off). What type of snapshot are you having trouble with? z Scheduled snapshots. See Troubleshooting: Scheduled or Automated Snapshot Doesn't Run on page 232. z Snapshot on logoff. See Troubleshooting: Snapshot on Logoff Doesn't Run on page 233. Troubleshooting: Scheduled or Automated Snapshot Doesn't Run Automated snapshots can be performed at specific times (scheduled), or they can be associated with specific events (Example: snapshots that start when you log off). There are a number of reasons that a scheduled or automated snapshot might not start when you expect it to. If a scheduled or automated snapshot does not run, check the following. z Scheduled snapshots that are based on a time of day take place according to the internal clock of the server, not your computer. When scheduling your snapshots, you should allow for typical deviations in clock settings. Example: suppose your computer's clock reads 1:00 P.M., while the server's clock reads 1:10 P.M. If you schedule a snapshot to start at 1:05 P.M., you might expect it to run in 5 minutes, but it won't because according to the server 1:05 P.M. is already past. The snapshot won't run until the next scheduled day. For proper operation, the clocks on the Recovery Solution Servers and clients must be synchronized. z If you are running Windows XP or Windows Me, a connection firewall might be preventing the server from reaching your computer. For more information, see Troubleshooting: Connection Firewall on page 251. z Your computer might have been off. You do not have to be logged on with a user name and password, but your computer must be on for a snapshot to be run. If you're running Windows 9x/Me, your computer must be started in Windows mode (not MS-DOS mode). z To ensure that all your files are protected, you should reinstall the software as soon as possible after an upgrade to Windows. If you don't reinstall, then your scheduled or automated snapshots might not occur. z The Recovery Solution administrator can limit the number of simultaneous connections to the server. If many scheduled snapshots are running at the same time, then some snapshots might get delayed because they are not all allowed to run at the same time. As long as the server is not constantly using the maximum number of connections throughout the entire scheduled time range for your snapshot, the snapshot should start (though probably not at the beginning of the time range). On the other hand, if many other protected computers are accessing the server constantly during the entire time range scheduled for your snapshot, the scheduled snapshot might not run on that day, and your computer won't take an automatic snapshot again until the next scheduled snapshot time. If you are allowed to change Recovery Solution Reference Guide 232 your own snapshot schedule, you can increase the time range to give your snapshot a greater chance of being taken. If your snapshots are frequently skipped because of limited access to the server, you should notify the Recovery Solution administrator. z If there's a problem on the server or if the server is simply not running during your scheduled snapshot time, the snapshot won't start. z A local-mode snapshot on event (such as log on, idle, resume, or dock) may fail to start in case HP Wireless Assistant 1.01 is installed on the computer. The workaround is to uninstall the HP Wireless Assistant software or to rely on automatic scheduled snapshots. You can still use the Snapshot on Logoff feature, as it is not affected by this issue. Troubleshooting: Snapshot on Logoff Doesn't Run Snapshot on logoff might not run for the following reason. z Windows might be logging you off before the snapshot has a chance to run. This behavior is controlled with an application timeout registry setting that is different for each user on the computer. In most versions of Windows, the default for this timeout is long enough that it does not interfere with the snapshot on logoff timeout. However, in Windows XP and Windows 2000, the default timeout is too short. Recovery Solution automatically increases this timeout when Setup is run, but if the setting was subsequently changed, or if you are not the user who installed the software, then you might have to change the setting manually. To increase the Windows application timeout 1. From the Windows Start menu, click Run. 2. Type regedit.exe, and click OK. Caution Be extremely careful when editing the Windows registry. If you accidentally change or delete the wrong values, your computer could stop working properly. You might want to print the Registry Editor Help topic “To restore the registry” before making any changes. This topic describes how to revert to an old version of the registry if your computer won't start. 3. Browse to the following Registry location. HKEY_CURRENT_USER\Control Panel\Desktop 4. In the list of values (usually on the right), select HungAppTimeout. 5. From the Edit menu, click Modify. 6. Under Base, click Decimal so you can enter the number you want in regular decimal format. 7. Under Value data, specify the number of milliseconds you want Windows to wait before automatically trying to close an application. Be sure this value is at least 20000. 8. Click OK. Recovery Solution Reference Guide 233 For additional troubleshooting information, see Troubleshooting: Snapshots Don't Run on page 232. Troubleshooting: Snapshot Stops Prematurely What happens when the snapshot stops? z The Progress window stays on the screen for a long time without continuing. See Troubleshooting: Recovery Solution Stops During a Snapshot or Restore on page 234. z Recovery Solution completes the snapshot, but the snapshot does not contain all of my files. See Troubleshooting: Snapshot Is Missing Files on page 235. z Recovery Solution stops the snapshot and displays an error message. See Troubleshooting: Error Messages on page 240. z The Progress window closes. See Troubleshooting: Unknown Solution on page 252. z Something else happens. See Troubleshooting: Unknown Solution on page 252. Troubleshooting: Recovery Solution Stops During a Snapshot or Restore z If you're running a snapshot, check to see if the Close button is available. When a snapshot is complete, the Close button replaces the Stop button, and a Snapshot complete message appears. Sometimes the statistics mistakenly indicate that there is still more information to be copied, but this is not the case. Once the Close button becomes available, all files have been successfully included in the snapshot. Note Be careful not to close the window too soon. If you are running a snapshot on multiple drives, the progress is displayed separately for each drive and reaches 100% after each drive is finished. If more data still needs to be included, the button reads Stop, not Close, and if you choose it, the rest of the files will not included. z If you start a snapshot and the Close button becomes available but no files appear to have been protected (the percentage complete stays at 0%), you might be using the McAfee VirusScan Safe & Sound feature. If you use this feature to store backup files as “protected volume files,” your snapshots might not run successfully. The problem can be fixed by either turning off Safe & Sound, or by reconfiguring it to store backups as folders instead. z If you are restoring many files, the message “Initializing the list of items to restore. Please wait...” might stay on the screen for a very long time. This is normal behavior. You can continue working in other programs while the restore process initializes. z If you think your snapshot or restore is really stalled, try clicking the Stop button in the Progress window. (If you don't see a Stop button but you see a Close button, then the snapshot or restore is finished, and you can close the window.) If you cannot close the Progress window, close your other programs and restart your computer, then try the snapshot or restore again. If it still fails, contact the Recovery Solution administrator. There might be a problem with the server. Recovery Solution Reference Guide 234 Troubleshooting: Windows Installer Appears During Snapshots You might see the Windows Installer screen appear during your snapshots if you have Microsoft Office 2000 installed on your computer, and any of its components are configured with the option to Install on first use (which is the default for many components). If you cancel the installer, the snapshot should continue normally. Troubleshooting: Snapshot Is Missing Files Listed below are some reasons that your snapshots might be missing files. z The files are excluded from the snapshot. A file might be excluded from a snapshot in any of the following ways. By not including the drive in the snapshot. If performing a manual snapshot, make sure you select the drive on which you want to run a snapshot. For scheduled snapshot, make sure the drive is checked in the snapshot schedule options. By excluding the file automatically from all snapshots (manual or scheduled). This is configured in the snapshot exclude options. There are a number of ways you that the exclude options might be configured to make Recovery Solution ignore a file during a snapshot. For more information, see the “Snapshot Exclusion Notes” in the Recovery Solution User’s Guide. z The files are open or locked during snapshot. Under certain conditions, Recovery Agent fails to backup files, which are locked or open. These conditions include the following: · Recovery Agent is running Windows 9x/Me. Recovery Agent for Windows 9x/Me does not include the OFM driver, hence, it does not provide open and locked file support. · Protected computer is running Local Recovery Agent. Local Recovery Agent does not provide support for open and locked files. Note Local Recovery Pro provides open and locked file support. For more information on the additional benefits of Local Recovery Pro, see Local Recovery Pro on page 15· OFM synchronization fails during snapshot. Sometimes, when the write activity rate spread is uneven among the protected computer multiple hard drives, the most active drive’s write operations may cause OFM synchronization to fail even though this particular drive was excluded from the snapshot. In this case, you need to change the OFMState value to enable OFM synchronization by volume (as opposed to the default “synchronize the whole system” setting). Recovery Solution Reference Guide 235 Warning Before using “Sync by volume” option, make sure there are no databases or applications that span across multiple volumes in your environment. z If you start a snapshot and the Close button becomes available but no files appear to have been protected (the percentage complete stays at 0%), you might be using the McAfee VirusScan Safe & Sound feature. If you use this feature to store backup files as “protected volume files,” your snapshots might not run successfully. The problem can be fixed by either turning off Safe & Sound, or by reconfiguring it to store backups as folders instead. Troubleshooting: Restoring Data Which type of data restore are you trying to perform? z I am trying to restore files by browsing my snapshot data. See Troubleshooting: File Restores on page 236. z I am trying to perform a rollback. See Rollback Troubleshooting (page 224). z I am trying to perform a Full System Recovery. See Full System Recovery Troubleshooting (page 216). z I am trying to restore files with a Web browser. See Troubleshooting: Web-Based File Recovery Logon Doesn't Appear on page 238. z I don't know the difference between the restore types. See Troubleshooting: Unknown Restore Type on page 240. z Other Issues Relating to Restoring Data on page 240 Troubleshooting: File Restores What happens when you try to restore data? z I cannot view my protected files. See Troubleshooting: Cannot View Protected Files on page 237. z I'm having trouble understanding file versions or getting a particular file version. See Troubleshooting: Protected File Versions on page 237. z I choose Restore or drag file snapshots to my computer, but nothing happens. See Troubleshooting: Nothing Happens on page 231. z I am prompted to log on, but then nothing happens. See Troubleshooting: Logon Problems on page 250. z I am prompted to log on, but my user name and password are not accepted. See Troubleshooting: Logon Problems on page 250. z I cannot log on with a different account when using Web-based file recovery. See Troubleshooting: Web-Based File Recovery Logon Doesn't Appear on page 238. z Windows Explorer crashes. See Troubleshooting: Restore Crashes Windows Explorer on page 239. z Recovery Agent freezes during a search for files to restore. See Troubleshooting: Recovery Solution Freezes During File Search on page 239. Recovery Solution Reference Guide 236 z I choose Restore, but my computer locks up or otherwise fails to respond as expected. See Troubleshooting: Erratic Behavior. z The restore process starts correctly, but stops before it is completed. See Troubleshooting: Restore Stops Prematurely on page 239. z I receive an error message during the restore process. See Troubleshooting: Error Messages on page 240. z I cannot restore a file larger than 4GB on a FAT32 disk. See Troubleshooting: Not Enough Space Available to Restore (FAT32) on page 238. z I completed a manual restore, but some of the files I tried to restore are missing or damaged. Troubleshooting: Unknown Solution on page 252. Troubleshooting: Cannot View Protected Files The following are potential causes of this problem. z If a particular file or folder originated on an NTFS drive, and you do not have at least read access to the file or folder, then you cannot see it in the list of protected files. However, if you restore a folder containing the secure item, the item will also be restored (but you still won't have access to open it). z It's possible that your account has been locked out from the server. Possible symptoms of this problem include the following. You cannot expand the Client Recovery Agent folder in Windows Explorer. Trying to open the Client Recovery Agent folder in its own window causes Windows to display an Action canceled Internet Explorer page. An account lockout is most likely to occur if you are running Windows 9x/Me, and the server is authenticating users locally (not via a domain). In this case, the operating system on the server counts all Recovery Solution connections as invalid logon attempts. If you've restarted your computer several times in a row, you might have to wait until the account lockout expires, then restart your computer again in order to access Recovery Solution. Your administrator should be able to determine what the account lockout policy on the server is. z If you are using Windows XP and your computer is not part of a Windows domain, you might be running into problems with Fast User Switching. For more information, see Troubleshooting: Fast User Switching on page 252. Troubleshooting: Protected File Versions What type of file version problem are you having? z I don't know how to find the version I need. See Troubleshooting: Cannot Find File Versions on page 238. z I cannot tell the difference between file versions. See Troubleshooting: Protected File Versions Are the Same on page 238. z When I restore a folder, I get the wrong version of one or more files. See Troubleshooting: Restored Files Are Incorrect Versions on page 238. z I have a different problem. See Troubleshooting: Miscellaneous File Version Problems on page 238. Recovery Solution Reference Guide 237 Troubleshooting: Cannot Find File Versions While browsing protected files, you can change which file versions are displayed by clicking the View menu, then Recovery Solution Versions. For details about the view options, see “Viewing and Restoring Protected Files” in the Recovery Solution User’s Guide. Troubleshooting: Protected File Versions Are the Same If you are viewing multiple versions of your protected files and you encounter two or more files that appear to be identical, look at the Snapshot Taken column. The date and time shown here might be the only distinguishable difference between versions of a file. This could happen if the file itself did not change between snapshots, but the properties of the file did. Example: Recovery Solution creates a new version of the file if the only change is in its NTFS security attributes. In most cases, you'll probably want to restore the file that has the latest snapshot date. Troubleshooting: Restored Files Are Incorrect Versions If you are running Windows 9x/Me, there is a small chance that when you manually restore a folder, you will not get the latest protected version of every file. This can happen if the letters in a filename on your computer have changed from uppercase to lowercase or vice versa (Example: renaming “testfile.txt” to “Testfile.txt”), because protected files stored on the server are case-sensitive. This is unlikely to happen to data files unless the cases of the file names are intentionally changed. However, it is possible this could happen to program files during software upgrades. You can still view all versions of your files and manually recover the specific file you need. Troubleshooting: Not Enough Space Available to Restore (FAT32) If you try to restore a file larger than 4 GB on a disk formatted with FAT32 file system, you will receive the error “Not enough space available to restore file” even though there may be enough free space available on the disk. This is a limitation of the FAT32 file system. The largest possible file for a FAT32 volume is 4 GB minus 2 bytes. Troubleshooting: Miscellaneous File Version Problems For details about the view options, see “Viewing and Restoring Protected Files” in the Recovery Solution User’s Guide. Troubleshooting: Web-Based File Recovery Logon Doesn't Appear Under some circumstances, Web browsers can obtain valid logon credentials without prompting you. This could make it difficult for you to access protected files that are stored under an account name that is different from the one the browser automatically obtains. Recovery Solution Reference Guide 238 The Web-based file recovery logon prompt might not appear if any of the following conditions are true. z You have already accessed Web-based file recovery during the same Web browser session. Even if you choose the Log Off button, your logon credentials are not necessarily cleared from the browser's cache, so returning to the page might not require another logon. z You are running Internet Explorer, and your logon credentials for Windows are the same as those for Recovery Solution. In this case, Internet Explorer just uses your Windows user name and password without prompting for a logon. If a logon prompt is required (Example: if you want to access protected files that are stored under a different account name), then you can do one of the following. Log onto Windows with a different user account. Access Web-based file recovery using Netscape, which is available for free from the Netscape Web site. Troubleshooting: Restore Crashes Windows Explorer There appears to a compatibility problem between Recovery Solution and a program called PowerArchiver. If PowerArchiver is installed, you might need to disable its Explorer shell extension feature before you can restore files. To disable the PowerArchiver shell extension, do the following. 1. Open PowerArchiver. 2. Click Options. 3. Click Configuration. 4. Click the Explorer Shell Extensions tab. 5. Clear the Use Explorer Shell Extensions checkbox. 6. Click OK. Troubleshooting: Recovery Solution Freezes During File Search If you are searching for files to restore and the Recovery Agent freezes, it may be because the search operation was interrupted and then restarted. If your computer is running Windows Me, the Restore Selection Wizard is likely to freeze after a search is canceled. In this case, you may need to restart your computer in order to continue using Recovery Solution. Troubleshooting: Restore Stops Prematurely What happens when the restore stops? z Recovery Solution stops the restore and displays an error message. See Troubleshooting: Error Messages (page 240). Recovery Solution Reference Guide 239 Troubleshooting: Unknown Restore Type You can restore data in the following ways. z Regular Restore You are performing a regular restore if your computer works, but you have lost some identifiable data that you need to retrieve from a snapshot. You are browsing your snapshot and restoring the files you need. z Rollback You are performing a rollback if you can start your computer, but it is not working properly and you want to return it to a previous state. z Full System Recovery You are performing a Full System Recovery if your files have become so damaged that your computer no longer works properly, and you have lost most or all of your data. You are restoring files by using a Full System Recovery disk created for you by the Recovery Solution administrator. Which type of data restore are you trying to perform? z I am trying to restore files by browsing my snapshot data. See Troubleshooting: File Restores on page 236. z I am trying to perform a rollback. See “Performing Rollbacks” in the Recovery Solution User’s Guide. z I am trying to perform a Full System Recovery. See “Recovery Solution Full System Recovery” in the Recovery Solution User’s Guide. Other Issues Relating to Restoring Data Custom user names for message queues gets renamed into the GUID-like names Sometimes after a rollback or full system recovery, the custom user names for the message queues get renamed into GUID-like names. Such names will be returned back to the normal view after the user sends a new message into the queue or after restarting the Message Queueing service. Troubleshooting: Error Messages Where do you see this error message appear? z The message appears in the Progress dialog box. See Troubleshooting: Error Messages in the Progress Dialog Box on page 241. z The message pops up in its own window. See Troubleshooting: Error Message Boxes on page 242. z I found the message in the event logs. See Troubleshooting: Error Messages in the Event Logs on page 246. Recovery Solution Reference Guide 240 Troubleshooting: Error Messages in the Progress Dialog Box If the message says that there was an error restoring the registry, see Troubleshooting: System Low on Registry Quota. Otherwise, have you previously performed the same task without seeing this error? z Yes, I was once able to perform this task successfully. See Troubleshooting: New Error. z No, this error often appears when I perform this task. See Troubleshooting: Repeated Error. Troubleshooting: New Error A new error indicates that something on your computer, on the server, or on the network has changed recently. z First, try again. Sometimes temporary conditions on the network prevent normal communications from occurring, and a retry is all that's required. You might also find that restarting your computer makes the problem disappear. z If you recently changed any settings (particularly network settings) or installed any new software on your computer, it's possible that Windows replaced some of the shared files required by Recovery Agent. If the files were replaced with older versions, then Recovery Agent might no longer work properly. Specifically, some programs replace the DCOM system files that Recovery Solution uses to communicate between your computer and the server, which could prevent you from running snapshots and restoring data. Ask your Recovery Solution administrator to help you get the correct files back on your computer. Note To minimize this problem, always keep the newer versions of files when given the choice. Windows usually asks whether or not you want to keep your existing version of a file when it is newer than the one being installed, and you should always choose Yes. Some programs (such as Internet Explorer 4.0 and the Windows 98 Upgrade) replace files without asking, so you might still see this problem occasionally. Windows 98 includes a Version Conflict Manager that you can use to restore files that were on your computer before you installed Windows 98. z If you recently installed FrontPage 98 Personal Web Server, you might need to change one of the default Personal Web Server settings to allow you to continue taking snapshots manually. For instructions, see Troubleshooting: FrontPage 98 Personal Web Server Conflict on page 250. z If any network settings changed recently, Recovery Solution might not have the information it needs to communicate properly across the network. If you changed the network configuration of your own computer, you might try putting your settings back the way they were to see if it fixes the problem. If you're running certain versions of Windows, you can use Recovery Solution to do this. For details, see “Saving and Restoring Network Settings” in the Recovery Solution User’s Guide. If your network administrator changed settings somewhere else on the network, or if anything on the Recovery Solution server was changed, you might ask if other Recovery Solution users are encountering problems as well. If they are, there's a good chance that the network change has something to do with the problem. You'll have to work with the network administrator or the Recovery Solution administrator to correct the problem. Recovery Solution Reference Guide 241 For more recommendations, see Troubleshooting: Error Checklist on page 246. Troubleshooting: Repeated Error z If you haven't restarted your computer in a long time, restart it and try again. Sometimes restarting the computer clears temporary problems from memory. z If you haven't successfully run a snapshot yet, try reinstalling Recovery Agent using your existing account. z If you have FrontPage 98 Personal Web Server installed, you might need to change one of the default Personal Web Server settings to allow you to take snapshots manually. For instructions, see Troubleshooting: FrontPage 98 Personal Web Server Conflict on page 250. For more recommendations, see Troubleshooting: Error Checklist on page 246. Troubleshooting: Error Message Boxes Here are some specific types of error messages that you might see. For information about solving each problem, follow the appropriate link. z The message says that the job could not be submitted. See Troubleshooting: Job Could Not Be Submitted on page 242. z The message says that my computer's drive configuration has changed, but it hasn't. See Troubleshooting: Drive Configuration Message on page 243. z The message says that the system is running low on registry quota. See Troubleshooting: System Low on Registry Quota on page 243. z My virus protection program warns me about changes to my computer. See Troubleshooting: Virus Warning During Rollback on page 247. z The message indicates a problem with an “authentication service.” See Troubleshooting: Options on page 243. z The message indicates an error in the module tapeng.exe. If your error message does not appear above, have you previously performed the same task without seeing this error? z Yes, I was once able to perform this task successfully. See Troubleshooting: New Error on page 241. z No, this error often appears when I perform this task. See Troubleshooting: Repeated Error on page 242. Troubleshooting: Job Could Not Be Submitted In Windows 2000/XP, one cause of this error is that the drive that contains the files you are protecting or restoring uses the NTFS file system, and the local SYSTEM account on your computer does not have full access to the drive. Recovery Solution uses this account to read and write data. To fix the problem, you need to give the SYSTEM account access to the drive. For information on modifying security settings to a drive, see Windows Help. Recovery Solution Reference Guide 242 Troubleshooting: Drive Configuration Message Recovery Solution detects when your computer's drive configuration has changed and informs you of this because you might need to check your settings in order to ensure that all your files are protected under the new configuration. It is possible that configuration changes could occur that cause Recovery Solution to display this message even though no real changes to your drive configuration have been made. One circumstance under which this could occur is if you are using the McAfee VirusScan Safe & Sound feature to store backup files as “protected volume files.” In this configuration, McAfee creates a virtual drive on your computer. Although this “drive” does not contain any data that needs to be protected (since it's all stored in McAfee's backup file), it causes Recovery Solution to display the drive configuration message. The problem can be fixed by either turning off Safe & Sound, or by reconfiguring it to store backups as folders instead. Troubleshooting: System Low on Registry Quota Under Windows 2000/XP, Recovery Solution requires that a certain percentage of the space allocated for the registry be free in order for snapshots to work. If the registry is already using most of the space available for it, then you might see this message when you perform a Full System Snapshot. An insufficient registry quota can also prevent the registry from being restored properly. To correct the problem, you must increase the maximum registry size so that there's enough free space for Recovery Solution to use. The change is made in the Virtual Memory dialog box along with the Windows paging file sizes. Start by following the recommendations published by Microsoft for increasing the maximum registry size. They are included in the Microsoft Knowledge Base article Q176083, which you can obtain from a number of Microsoft technical publications or from the Microsoft Web site. If you still encounter the error, it might be necessary to increase the maximum registry size even more. When performing a rollback, you might find you need to increase the maximum registry size to as much as 50 MB. Troubleshooting: Options What type of problem are you having with the options? z I can't open the Recovery Agent Options dialog box. See Troubleshooting: Can't Open Options. z A message appears saying that my computer's drive configuration has changed, but it hasn't. See Troubleshooting: Drive Configuration Message on page 243. z Some options don't appear and/or are disabled. See Troubleshooting: Options Are Unavailable. z A message appears saying that the schedule settings cannot be displayed. See Troubleshooting: Schedule Settings Cannot Be Displayed. z When I click the button to change my credentials, nothing happens. See Troubleshooting: Fast User Switching on page 252. z I can't close the Recovery Agent Options dialog box. See Troubleshooting: Cannot Access Dialog Box Buttons on page 251. Recovery Solution Reference Guide 243 Troubleshooting: Can't Open Options What happens when you try to view the options? z I can't find the Recovery Agent icon. See Troubleshooting: Fast User Switching. z Nothing happens. See Troubleshooting: Nothing Happens on page 231. z I am prompted to log on, but then nothing happens. See Troubleshooting: Logon Problems. z I am prompted to log on, but my user name and password are not accepted. See Troubleshooting: Logon Problems. z I get a different error message. See Troubleshooting: Error Message Boxes on page 242. Troubleshooting: Options Are Unavailable Options might be unavailable for any of the following reasons. z Your version of Recovery Agent does not include the option you are looking for. z Your computer might not have the required support installed for an option. Example: if you do not have Dial-Up Networking installed on your computer, the options for protecting your computer remotely do not appear. z You might not have the rights to view or change some options. By default, some options are not available to you. Also, your Recovery Solution administrator can enable or disable certain options for you. z If you see a message saying that your schedule settings cannot be displayed. See Troubleshooting: Schedule Settings Cannot Be Displayed on page 244. z If you are using Windows XP and your computer is not part of a Windows domain, you might be running into problems with Fast User Switching. For more information, see Troubleshooting: Fast User Switching on page 252. Troubleshooting: Schedule Settings Cannot Be Displayed If you see a message saying that your schedule settings cannot be displayed, it's possible that your account has been locked out from the server. An account lockout is most likely to occur if you are running Windows 9x/Me, and the server is authenticating users locally (not via a domain). In this case, the operating system on the server counts all Recovery Solution connections as invalid logon attempts. If you've restarted your computer several times in a row, you might have to wait until the account lockout expires, then restart your computer again in order to access Recovery Solution. Your administrator should be able to determine what the account lockout policy on the server is. Troubleshooting: Event Logs What type of problem are you having with the event log? z When I open the Event Viewer, I see an error regarding the file messages.dll. See Troubleshooting: Messages.dll Is Missing on page 245. Recovery Solution Reference Guide 244 z After installing Recovery Agent under Windows NT, I get frequent messages informing me that the event log is full. See Troubleshooting: Event Log Full on page 245. z I don't understand the event messages. See Troubleshooting: Error Messages in the Event Logs on page 246. z More information: Troubleshooting: Error Checklist on page 246. Troubleshooting: Messages.dll Is Missing You might see this message if you're running the Recovery Agent under Windows 9x/Me, and your software was automatically upgraded from an earlier version. To fix the problem, do one of the following. z Reinstall Recovery Agent using your existing account. z Edit the Windows registry as follows. 1. From the Windows Start menu, click Run. 2. Type regedit.exe, then click OK. Caution Be extremely careful when editing the Windows registry. If you accidentally change or delete the wrong values, your computer could stop working properly. You might want to print the Registry Editor Help topic To restore the registry before making any changes. This topic describes how to revert to an old version of the registry if your computer won't start. 3. Browse to the following registry location. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Applicat ion\Altiris CR Solution 4. In the list of values (usually on the right), select EventMessageFile. 5. From the Edit menu, click Modify. 6. Under Value data, enter the following. C:\Program Files\Altiris\Recovery Solution Agent\messages.dll 7. Click OK. Troubleshooting: Event Log Full Recovery Solution stores errors and other messages in the event log. Depending on how frequently you use Recovery Solution, the event log could fill up very quickly—especially if other installed programs are also writing to the same log. You have two options for dealing with this problem. z Clear the log each time you receive the message. You'll have the option of saving the log before you delete it. z Change the Event Viewer settings to automatically overwrite events. If you do this, you won't have a chance to save old log information, but in most cases it is only the recent log information that is valuable. Recovery Solution Reference Guide 245 Troubleshooting: Error Messages in the Event Logs See your Recovery Solution administrator for information about all Recovery Solution event messages, including errors. Troubleshooting: Error Checklist Here are some additional things to try if you're still receiving errors. z Make sure the version of Recovery Agent you're running is the same as the version that's on the server. Your Recovery Solution administrator should have installation software for the correct version of Recovery Agent. z If you're running Windows 9x/Me, your computer's network access control settings must be configured in one of the following ways. Choose any item for information about where these settings are located. For User-level access control. See the Windows Help topic To control access by using a list of names for instructions. For the Windows NT domain name, be sure to specify the name of the domain that your computer logs onto. For Share-level access control, with your network adapter bound to the TCP/IP protocol. See the Windows Help topic To control access by using passwords for instructions on setting up share-level access control. Windows Help also has information on binding an adapter to a protocol. For Share-level access control, with NetBIOS over TCP/IP enabled. To enable NetBIOS over TCP/IP, do the following. 1. From the Windows Start menu, click Settings. 2. Click Control Panel. 3. Click the Network icon. 4. On the Configuration tab, scroll down until you find the TCP/IP protocol, and select it. If you see more than one TCP/IP protocol, select the one that you use when running snapshots or restoring files with Recovery Solution. 5. Click Properties. 6. Click the NetBIOS tab. 7. Check the box labeled I want to enable NetBIOS over TCP/IP. 8. Click OK. Troubleshooting: Rollback What happens when you try to perform the rollback? z I don't know how to perform a rollback. See “Performing Rollbacks” in the Recovery Solution User’s Guide. z I choose a snapshot to restore from, but nothing happens. See Troubleshooting: Nothing Happens on page 231. Recovery Solution Reference Guide 246 z The restore process starts correctly, but stops before it is completed. See Troubleshooting: Restore Stops Prematurely on page 239. z My virus protection program warns me about changes to my computer. See Troubleshooting: Virus Warning During Rollback on page 247. z I receive an error message during the restore process. See Troubleshooting: Error Messages on page 240. z I completed a rollback, but some of the files I tried to restore are missing or damaged. See Troubleshooting: Rollback Has Missing or Damaged Files on page 247. z I completed a rollback, then I received a message saying that my computer has been disabled. See Troubleshooting: Rollback Disables Computer on page 248. z After rolling back my system, I see an error in the module tapeng.exe. See Troubleshooting: Rollback General Protection Fault Error Message on page 248. z After Rollback, the DHCP server was not started and error 1811 is recorded in the event log. See Troubleshooting: DHCP Problems After Rollback on page 248. z I need to restore data, but I can't start the computer. See “Recovery Solution Full System Recovery Dialog Box” in the Recovery Solution User’s Guide. Troubleshooting: Virus Warning During Rollback Some virus protection programs, such as Norton Antivirus 5.0, have an option to protect the computer's boot code. If you are running Norton Antivirus with this option turned on, and the master boot record has changed since the time of the snapshot being restored, then during the rollback Norton Antivirus prompts you to accept or reject the rollback changes to the master boot record. No matter which option you choose, the rollback continues normally but does not restore either the master boot record or the Windows registry. If you suspect problems with the master boot record or the registry and need these files restored, you should disable the option to protect the boot code, then run the rollback (or have your administrator run it) again. Troubleshooting: Rollback Has Missing or Damaged Files There are some specific issues related to rolling back computers that have Microsoft Office installed. z If you are running Microsoft Office 97, a rollback might cause the Office Shortcut Bar icons to be incorrect. (They all show the same icon.) These are caused by outdated temporary files that remain on the computer after the rollback. To correct the problem, close the Office Shortcut Bar and delete the following files from your computer. They are located in the “Office\Shortcut Bar” subfolder of the folder containing your Microsoft Office program files (by default “C:\Program Files\Microsoft Office”). off3071.tmp off3071h.tmp off3071s.tmp Once the files have been deleted, the Office Shortcut Bar should display the correct icons. Recovery Solution Reference Guide 247 z If you were previously running Microsoft Office 97 but upgraded to Microsoft Office 2000, you should try to avoid rolling back your computer to a point in time when you had Office 97 installed. This might cause some Office files to be restored incorrectly. To correct the problem, you might need to reinstall Office. z If your computer's drive configuration has changed since the time of the snapshot to which you are rolling back, then the rollback restores your old drive configuration, but it's possible that one or more of your drives contains no data after the rollback is complete. To restore the data, perform a second rollback to the same snapshot you chose for the first rollback. Troubleshooting: Rollback Disables Computer If you roll back to a snapshot that was performed using a previous version of Recovery Agent, your Recovery Agent software is also rolled back. To bring your system up to date, you should reinstall the software using your existing account. Troubleshooting: Rollback General Protection Fault Error Message Certain Toshiba DVD-ROM drives, including the Toshiba Tecra 750 DVD, include a utility called Toshiba Access Panel. Under certain situations, a minor bug in this utility causes a General Protection Fault error “in module tapeng.exe at 0137:0040d919.” This error might occur after files are restored during a rollback using Recovery Solution. However, the rollback is successful; this error does not affect your data. Simply close the error message and restart the computer. Troubleshooting: DHCP Problems After Rollback Sometimes after a rollback is completed on the client computer, the DHCP service is not started and an error -1811 appears in event log. This can occur if during the rollback, the client computer requested the IP Address from the DHCP server. To resolve this problem, delete j50.chk from the Windows DHCP folder and then restart server or start DHCP service manually. Troubleshooting: Other Issues z Troubleshooting: DCOM on page 249 z Troubleshooting: FrontPage 98 Personal Web Server Conflict on page 250 z Troubleshooting: Logon Problems on page 250 z Troubleshooting: Cannot Access Dialog Box Buttons on page 251 z Troubleshooting: Connection Firewall on page 251 z Troubleshooting: Fast User Switching on page 252 z Troubleshooting: Unknown Solution on page 252 z Troubleshooting: Event Viewer on page 252 Recovery Solution Reference Guide 248 Troubleshooting: DCOM DCOM is a Windows component that Recovery Solution uses for communication between your computer and the server. Usually it is installed and configured automatically, and you don't have to do anything with it. However, installing or removing certain Windows components can result in configuration changes that prevent Recovery Solution from being able to use DCOM. The specific symptoms of DCOM configuration problems are different depending on which version of Windows you are running. Windows 2000/XP This section describes DCOM configuration problems you might encounter under Windows 2000 and Windows XP. Symptom Trying to view protected files or open the options window results in the error “The authentication service is unknown (0x800706d3).” Explanation It's likely that the remote procedure call (RPC) locator service has been removed from your computer. This is a communication service required for proper DCOM operation. The RPC service gets removed if you uninstall the Client for Microsoft Networks networking component. Solution You must reinstall Client for Microsoft Networks. To do so, see To add a network component in Windows Help. Once it is installed, you can disable it by clearing the checkbox next to it in the list. This prevents the client component from being used, but it does not remove the RPC files that DCOM applications require. Windows 98 SE This section describes DCOM configuration problems you might encounter under Windows 98 SE. Symptom When you try to view protected files or open the options window, nothing happens. Explanation It's likely that the Client for Microsoft Networks networking component has been removed from your computer. DCOM is frequently configured to use this networking component for communications. Solution You must reconfigure DCOM. To do this, run the file dcomcnfg.exe, which is usually located in the SYSTEM subfolder of your Windows folder. Click the Default Properties tab, then under Default Authentication Level, click (None). Click OK to apply the changes and close the window, then restart your computer. Recovery Solution Reference Guide 249 Troubleshooting: FrontPage 98 Personal Web Server Conflict If you have FrontPage 98 Personal Web Server installed, you might need to change the following default Personal Web Server setting to allow you to take snapshots manually. 1. From the Windows Start menu, click Settings. 2. Click Control Panel. 3. Open the Network applet. 4. Click Personal Web Server. 5. Click Properties. 6. Change the Use Local Security option to FALSE. 7. Click OK. Troubleshooting: Logon Problems There are a number of reasons that you might have difficulty logging onto the server. z If you entered your user name and password and nothing is happening, it might just be taking a while. Your connection to the server depends on various conditions. If nothing happens after several minutes, see the items below. z If your user name and password are not accepted, make sure they are correct. Passwords are case-sensitive, so “PASSWORD” is not the same as “password.” z If you keep getting prompted to reregister your computer or enter your logon information, and you are sure you have entered your user name and password correctly, it's possible that one of the following has happened: The server software has been recently reinstalled. Restart your computer and try again. Your account has been locked out. This is most likely to happen if you are running Windows 9x/Me, and the server is authenticating users locally (not via a domain). In this case, the operating system on the server counts all Recovery Solution connections as invalid logon attempts. If you've restarted your computer several times in a row, you might have to wait until the account lockout expires, then restart your computer again in order to access Recovery Solution. Your administrator should be able to determine what the account lockout policy on the server is. z If the administrator has upgraded the copy of the console that is installed on the server, but has not yet upgraded the server software, you'll be unable to use Recovery Solution until the administrator completes the upgrade. You might want to let the administrator know that you are having problems. z If you are running Windows 9x/Me and you log onto a Windows NT domain, make sure that your user name and password, as well as the name of the domain itself, do not contain extended ANSI characters. These characters have character codes greater than 127 and are commonly used in non-English languages (Example: umlauts and characters with accents). They cannot be used with Recovery Solution because of a limitation in the Microsoft DCOM security component. For more information, see Troubleshooting: DCOM on page 249. If your account contains such characters, you can do one of the following: Recovery Solution Reference Guide 250 z If you have another account without extended ANSI characters, you can uninstall Recovery Agent, log onto Windows using your other account, then reinstall Recovery Agent. If you do not have another account without extended ANSI characters, or if these characters are in the domain name itself, contact your administrator for help. Certain networking and security components are required to be installed on your computer in order for Recovery Agent to work correctly. For more information, see Troubleshooting: DCOM on page 249. If you still have problems, contact your Recovery Solution administrator for help. Troubleshooting: Cannot Access Dialog Box Buttons The minimum screen resolution requirement for Recovery Agent is 800 x 600. z If you are using an 800 x 600 screen resolution and displaying Large Fonts, you might need to move the Recovery Agent Options dialog box up a little bit on your screen before you can access the buttons. To do this, click the very bottom tip of the window title bar and drag it up as far as it will go. The buttons at the bottom should come into view. z The 640 x 480 screen resolution is not supported. z If you are running at this resolution, you should change to an 800 x 600 or higher resolution if possible. If you need to access the Recovery Agent Options dialog box buttons at a 640 x 480 resolution, you can use the following shortcut keys while the dialog box is displayed. ENTER to click the OK button. ESC to click the Cancel button. Troubleshooting: Connection Firewall If you are running either Windows XP or Windows Me, you have the option of using a built-in Windows firewall to safeguard your computer while it is connected to the Internet. Unfortunately, this firewall prevents the server from reaching your computer, meaning that some Recovery Solution functions will not work. Recovery Solution features that do not work through a Windows connection firewall include the following. z Scheduled snapshots. z Rollbacks started by your administrator. Note Internet Connection Sharing uses the Windows firewall by default, so if you use Internet Connection Sharing then you could run into the same problem. If you are behind a corporate firewall, or on a VPN connection to a network that has a firewall, your computer is probably protected by that firewall and you can turn your personal firewall off. Assuming that the server is on the same network, this should allow all features to work properly. See also Firewall Configuration on page 271. Recovery Solution Reference Guide 251 Troubleshooting: Fast User Switching If you are running Windows XP and your computer is not part of a Windows domain, then a feature known as “Fast User Switching” might be enabled on your computer. This feature lets multiple users log onto the computer simultaneously, and then the computer can be quickly switched from one user's settings to another. Recovery Solution does not currently support this environment. We recommend that you disable Fast User Switching while Recovery Solution is installed. If you do not disable Fast User Switching, the most noticeable issue is that only one logged-on user at a time will be able to interact fully with Recovery Solution. The other logged-on users won't see the Recovery Agent desktop and system tray icons, and might not be able to open certain Recovery Agent windows or perform manual tasks with the program. Which user is able to perform these tasks might vary depending on order in which they logged on. Troubleshooting: Unknown Solution Recovery Agent Help does not appear to have a solution for your problem. If you need additional assistance, check with your Recovery Solution administrator. Troubleshooting: Event Viewer For more information, see “Troubleshooting the Event Viewer” in the Recovery Solution User’s Guide. Recovery Solution Reference Guide 252 Chapter 14 Technical Reference This section contains additional information about Recovery Solution. z Product Limits (page 253) z Performance Tips (page 254) z Settings Information (page 257) z Technical Information (page 276) z Command Line Utilities (page 279) z Stopping and Starting the Recovery Solution Server Service on page 289 z Recovery Solution Infrastructure Backup and Restore (page 290) Product Limits Listed below are some of the known limits of Recovery Solution. z Data Protection & Recovery Limits The following restrictions apply to snapshots. z Recycle Bin files are automatically excluded from all snapshots. You cannot change this option. A maximum of 32767 versions of any one protected file can be stored on the cluster. On Windows 9x/Me protected computers, data that is transmitted to the server can be encrypted while in transit, but data that comes from the server cannot (i.e., snapshots are encrypted, but recoveries are not). This is because of a limitation of Windows 9x/Me, which cannot receive encrypted DCOM data. Full System Recovery Limits The following restrictions apply to Full System Recovery. Full System Recovery cannot be performed on a protected computer running disk compression software (such as DriveSpace or Stacker). Full System Recovery that copies data from the network might not work on Windows 95/98 computers that are using real-mode DOS drivers. Protected computers that were upgraded from Windows 3.1 to Windows 9x might be using such drivers. To perform Full System Recovery on these computers, you must either configure them to use Windows drivers, or include the real-mode drivers in the temporary operating system you place on CD-ROM. Alternatively, you can recover these computers completely from CD-ROM. Be sure to click the option to Include all user data on CD-ROM when creating the CD-ROM. Recovery Solution Reference Guide 253 Performance Tips Though not required to use Recovery Solution, the following information could help you get better performance from the product. The following topics are covered in this section: z Data Protection Performance (page 254) z Restore Performance (page 255) z Changing DCOM Protocols (page 255) z Configuring Microsoft Network Load Balancing (page 256) Data Protection Performance Following are some tips you can use to ensure that snapshots run efficiently. z You can help to improve the speed of baseline snapshots by seeding the cluster with files that exist on most users’ computers. Since Recovery Solution checks for the existence of each file on the cluster and only transfers it if is not already there, seeding the cluster with common operating systems, programs, and other files can reduce the amount of time that the initial snapshot takes for most or all protected computers. Seed the cluster just after you set it up, and before allowing users to take a snapshot. Many of the files being protected will then already exist on the cluster. Here are some examples of files you might want to initially add to the cluster. Windows XP, Windows 2000, Windows NT, Windows Me, Windows 98, and Windows 95 installations. Applications used throughout your company, particularly those that take up moderate to large amounts of disk space. Common examples are Microsoft Office, Microsoft Internet Explorer, Netscape Communicator, and Lotus Notes. Common data files that might reside on many users’ hard disks. If you seed the cluster with multiple protected computer installations, you should perform snapshots one at a time, allowing each one to complete before starting the next one. That way you are sure to get the maximum benefit from Redundant File Elimination and Redundant Block Elimination. z Try to avoid having a remotely connected computer be the first one to protect any particular application. Instead, protect a computer on the network that has this application installed to eliminate the need to transfer the application over a slow link. z If snapshots are exceptionally slow for protected computers running Windows 2000/ XP, you might benefit from changing the primary DCOM protocol being used for communications. For more information, see Changing DCOM Protocols on page 255. z If you are using Microsoft Network Load Balancing with Recovery Solution, snapshot performance can be improved by appropriately configuring your Network Load Balancing Cluster settings. For more information, see Configuring Microsoft Network Load Balancing on page 256. z If your protected computers use HTTP protocol for communication with Recovery Server (for information, see Configuring Communication Settings on page 110), you can improve the performance of jobs on clients running Windows 98 SE and Recovery Solution Reference Guide 254 Windows 2000, by clearing the Enable Integrated Windows Authentication (requires restart) checkbox in Windows Control Panel > Internet Options > Advanced tab > Security on client computers. In this case, a less secure (but more robust) NTLM protocol will be used for authentication with the server. Restore Performance Following are some tips you can use to ensure that recoveries run efficiently. z Over a dial-up connection, it is practical to restore up to a few tens of megabytes. For larger file sets, or for Full System Recovery, it makes more sense to ship user data on CD–ROM to the remote location. Alternatively, you can send the protected computer to a place where it can be connected at high speed to the server, and restore the data from there. z If recoveries are exceptionally slow for protected computers running Windows 2000/ XP, you might benefit from changing the primary DCOM protocol being used for communications. For more information, see Changing DCOM Protocols on page 255. Changing DCOM Protocols Most of the data transferred back and forth between protected computers and the server is sent via Microsoft Distributed Component Object Model (DCOM). DCOM itself employs RPC (remote procedure call) to actually send messages from one networked computer to another. When running on Windows 2000/XP, DCOM can be configured to use any of several different RPC network protocols to send and receive messages. By default, Windows uses UDP (commonly known as datagram packets) protocol. UDP typically uses less network bandwidth and is quicker than TCP—unless packets start getting lost regularly. Since UDP is a connectionless protocol, DCOM itself handles the retransmitting of packets that fail or become lost. If the network is busy or has other problems that cause a number of DCOM packets to get lost, then data transfer rates can become very slow because DCOM has to retransmit a large number of packets. This can greatly impact the performance of snapshots and recoveries. To improve performance in these situations, you can configure a protected computer to use TCP as its primary DCOM protocol. Note This change is not applicable to Windows 9x/Me computers, which always use TCP for DCOM communications. To configure DCOM to use TCP as its primary protocol 1. On the protected computer, from the Windows Start menu, click Run. 2. Enter DCOMCNFG.EXE. 3. Do one of the following: z Change the list of DCOM protocols used specifically for Recovery Solution. This is safer than changing the default DCOM protocols for the entire system. However, it involves a few more steps, and if Recovery Agent is ever uninstalled and reinstalled on the protected computer, the changes are lost and must be made again. Recovery Solution Reference Guide 255 To change the list of protocols for Recovery Solution, do the following. a. On the Applications tab, in the Applications list, select Altiris Recovery Solution Agent. b. Click Properties. c. Click Endpoints. d. Click Add to add all missing protocols except Connection-oriented TCP/IP to the DCOM Protocols and endpoints list. This helps to ensure that a connection can be established even if something goes wrong with the TCP/IP communications. z e. If Connection-oriented TCP/IP appears in the list but is not at the top, select it and click the Remove button. This is the only way to change its position in the list. f. If Connection-oriented TCP/IP does not appear in the list, add it to the list as follows. Click Add. In the Protocol Sequence list, click Connection-oriented TCP/IP. Click OK. Click OK to accept the changes. Change the default list of DCOM protocols for the entire system. Changing the default protocols for the system might give you similar advantages for other applications, but it might also cause problems for other applications that use DCOM and must use UDP for communications. In most cases, however, it should not matter which protocol is used. Example To change the list of default protocols, do the following: g. Click the Default Protocols tab. h. In the DCOM Protocols list, look for the item Connection-oriented TCP/IP. If you do not see it, add it to the list as follows. Click Add. In the Protocol Sequence list, click Connection-oriented TCP/IP. Click OK. i. In the DCOM Protocols list, select Connection-oriented TCP/IP. j. Click the Move Up button repeatedly until Connection-oriented TCP/IP is at the top of the list. 4. Click OK to save the changes and exit Distributed COM Configuration Properties. 5. Restart the computer. Configuring Microsoft Network Load Balancing If you are using Microsoft Network Load Balancing with Recovery Solution, you can configure your Network Load Balancing cluster properties to improve snapshot performance as follows. Recovery Solution Reference Guide 256 1. Open Network Load Balancing Manager console for your cluster through Windows Start menu > Control Panel > Administrative Tools. 2. Right-click cluster name in the Network Load Balancing Clusters list on the left and select Cluster Properties from the drop-down menu. 3. In the Cluster Properties dialog window on the Port Rules tab select the Defined port rules for Recovery Solution and click the Edit button to open the Add/Edit Port Rule dialog window. 4. Set Affinity to Single in the Filtering mode section. 5. Click OK to save the settings and close the Add/Edit Port Rule dialog window. 6. In the Cluster Properties dialog window go to Cluster Parameters tab and set Cluster operation mode to Multicast. 7. Click OK to save settings and exit Network Load Balancing Manager. Settings Information This section contains additional information about settings created and used by Recovery Solution. z User Account and Share Configuration (page 257) z Microsoft SQL Server Settings (page 259) z Event Log Configuration (page 261) z Internet Information Server Configuration (page 261) z ODBC Configuration (page 265) z DCOM Configuration (page 266) z RPC Dynamic Port Allocation (page 270) z Firewall Configuration (page 271) z Web-Based File Recovery Configuration (page 272) z Job Schedule Worksheet (page 274) User Account and Share Configuration During Setup, Recovery Solution Server creates Windows users and shared folders as needed to simplify deployment and to allow the server to communicate with the protected computers.Automated Account Configuration Recovery Solution Reference Guide 257 Recovery Solution automatically creates the following user accounts and groups. Account Configuration Account or Group Description XUSR_RepNDM User Account (Local) Recovery Solution requires this special account for communicating (via DCOM) between the server and the protected computers. This account is given the minimum default rights assigned to users; it requires only the Access this computer from the network right to be used by Recovery Solution. The account is created locally on the server, so it cannot be used to access other computers on the domain. All the required accesses are configured through DCOM. AeXRS_Users User Group (Local) This group is given the access rights to protect and restore files with Recovery Solution. You can change its name during Recovery Solution Server Setup, but not thereafter. By default, this group contains the Domain Users group, which means that all domain users have the necessary rights to protect their computers. Notes If you have users on trusted domains that you want to be able to use the server, you must add those users to the Domain Users group for the server or the AeXRS_Users group before they can use Recovery Solution. If the server is installed using local server security, this user group is granted the Log on locally right on the server, which is required for access to Web-based file recovery. If you do not intend to use Web-based file recovery, you can remove this right through Windows. If you want to restrict access to certain individual users, you will have to remove Domain Users from AeXRS_Users. Windows domains allow different types of user groups, including local and global. Because of the way the Windows security model works, you can simplify administration tasks by using a combination of local and global groups. Global groups can only contain users, but local groups can contain both users and global groups. For granting access, we recommend that you create a new global group in the domain, add the users to the global group, and then add the global group to the local group AeXRS_Users. This strategy offers you maximum flexibility in more complicated situations—you get the ease of managing a global group for the individual users combined with the ease of adding other entire groups to the local AeXRS_Users group as appropriate. Example: if you begin your deployment by allowing access to a select group of pilot users (by creating a global group of those users and adding it to the AeXRS_Users local group), you can then easily expand by allowing access to one department at a time, simply by adding their department global groups to the AeXRS_Users local group. Recovery Solution Reference Guide 258 Account Configuration (Continued) Account or Group Description AeXRS_Manage rs User Group (Local) This group is given the rights to restore data for any client using the Migrate utility and Web-Based File Recovery. Altiris Helpdesk Technicians User Group (Local) Members of this group have rights to perform certain Recovery Solution tasks through the Altiris Console. Shared Folders Recovery Solution Server Setup automatically creates a folder for Recovery Agent installation files and shares it so that users can easily install the software from this folder. By default, the folder is stored within the server program files folder. Microsoft SQL Server Settings Recovery Solution Server Setup automatically configures Microsoft SQL Server. Following is a list of the changes that are made. Performance Enhancements Currently, Recovery Solution Server Setup changes only the Max Worker Threads setting from its default. This change is based upon our experiences in two sets of early Beta deployments of the product. Max Worker Threads Configures the number of worker threads that are available to SQL Server processes. SQL Server makes use of the native thread services of the operating system. Instead of one worker thread, there are many. Each network that SQL Server simultaneously supports is supported by one or more threads, another thread handles database checkpoints, and a pool of threads handles all users. The max worker threads option allows you to control the number of threads allocated to the user pool. When the number of user connections is less than max worker threads, one thread handles each connection. However, if the number of connections exceeds max worker threads, thread pooling occurs. Additionally, if the configured value for worker threads is exceeded, the request is handled by the next worker thread that completes its current task. The default is 255. —Microsoft Transact-SQL Reference Additional Information A worker thread performs a database operation on behalf of a client. While it may seem that one thread per connection is ideal for performance, an excessive number of threads will cause the server to spend more time simply managing the threads and can result in significant contention for CPU time among the threads. In a 1996 Compaq TPC-C benchmark with SQL Server 6.5 running on Windows NT 4.0, the optimal setting for max worker threads was 100, even with 5000 concurrent users. Recovery Solution Reference Guide 259 Databases Setup creates and configures databases as follows. z Recovery Solution Database The default name for this database is AeXRSDatabase, although during a custom installation you have the option to change it. Setup creates and configures the database as needed. z Database Backups Setup creates a backup device for the database. It also schedules regular backups of the database. For more information, see Job Schedule Worksheet on page 274.) Caution Make sure that the schedules for database backup and Recovery Server jobs (such as Server Space Management and Integrity Check) do not coincide; otherwise data storage corruption can occur. Security Setup makes the following changes to Microsoft SQL Server security settings. z SQL Login To limit any security risks, Recovery Solution creates its own Microsoft SQL Server login (named AeXRSDatabaseUser by default) that it uses whenever it needs to access the Recovery Solution database. This login is a member only of the db_owner fixed database role (not the sysadmin role as it used to be Recovery Solution 6.1 and earlier versions) in and has full access only to the Recovery Solution database. Its default password is password. Note The default password cannot be changed. z Authentication In Microsoft SQL Server 2000, the default authentication mode is Windows only. Recovery Solution Server Setup changes this to SQL Server and Windows to allow authentication via the SQL login created specifically for Recovery Solution. Note For Recovery Solution to function properly, Notification Server admin must have dbo rights for Recovery Solution database. Recovery Solution Reference Guide 260 Event Log Configuration During server setup, Recovery Solution automatically makes the following changes to the configuration of the Windows event logs. Event Log Table Log Change Made Reason System Event Log Prevents warning messages from appearing on the server when the event log fills up. Wrapping: Overwrite Events as needed. Application Maximum Log Size: Ensures that enough log entries are retained so that troubleshooting can be performed if necessary. 10240 KB (10 MB) Application Event Log Wrapping: Overwrite Events as Needed Prevents warning messages from appearing on the server when the event log fills up. Recovery Solution Server uses this event log extensively, so it can fill up quickly. We recommend that you leave these settings the way Setup has configured them. Internet Information Server Configuration This section describes the Microsoft Internet Information Server settings that Recovery Solution needs in order for the Web-based installation wizard to function properly. If you did not accept the default settings during IIS installation, or if you changed your IIS configuration, you might need to verify your settings with the list below. Recovery Solution Reference Guide 261 The following virtual directories must exist in the IIS configuration on the server. Their settings must match those in the following table. Virtual Directory Name Agent AsMext LogFiles WBFR Actual Folder The “AgentWeb” subfolder of the shared Recovery Agent installation subfolder of the program installation folder. By default, this is C:\Program Files\Altiris\Recovery Solution\Server\Agent\ AgentWeb. The “ASMext” subfolder of the shared Recovery Agent installation subfolder of the program installation folder. By default, this is C:\Program Files\Altiris\Reco very Solution\Server\ Agent\ASMext. The “LogFiles” subfolder of the “System32” subfolder of the Windows folder. By default, this is %WINDIR%\ System32\ LogFiles. The folder where the Web-based file recovery program files are stored. Web access permissions Read must be checked None required. Read must be checked. Read must be checked. Web application permissions Execute (including scripts) must be selected. Execute (including scripts) must be selected. Default Document(s) for Web Browsing Enable Default Document must be checked, and “Default.htm” must be included as a default document. Recovery Solution Reference Guide Not required. If Web-based file recovery was configured automatically during installation of the server, then this is the folder that was specified for Webbased file recovery during Setup. By default, the folder is C:\Program Files\Altiris\Recovery Solution\Server\WBFR None required. Script must be selected. Not required. Enable Default Document must be checked, and “Default.asp” must be included as a default document. 262 Virtual Directory Name Agent Web Authentication Methods z Basic Authentication must be checked. z Integrated Windows authentication (Windows 2000) Windows Folder Security Settings z The SYSTEM user must have Full Access. z The AeXRS_Manager s (or the name of your administrators group for Recovery Solution) must have Read access. z The AeXRS_Users (or the name of your administrators group for Recovery Solution) must have Read access. AsMext LogFiles z Allow Anonymous Access must be checked. z Allow Anonymous Access must be checked. z Integrated Windows authenticatio n (Windows 2000) z Integrated Windows authentication (Windows 2000) The Everyone user group must have Full Access. The Everyone user group must have Full Access. WBFR z Integrated Windows authentication (Windows 2000) z For Windows 2000, the folder and all contents must have the Allow inheritable permissions from parent to propagate to this object box cleared. z The user group for Recovery Solution (by default AeXRS_Users) must have Read access to the main folder. z The Everyone user group must have Full Access to the following contents. All files in the “Image” subfolder. All files in the “Image” subfolder. All files in the “Image” subfolder. All “*.class” files. “FileDownload.asp” “GetFiles.asp” “GetFolders.asp” “Global.asa” “LogOff.asp” “ServerUtils.asp” “Styles.css” Recovery Solution Reference Guide 263 Virtual Directory Name AeXRSVault Actual Folder The “HTTPVault” subfolder of the shared Recovery Agent installation subfolder of the program installation folder. By default, this is C:\Program Files\Altiris\Recovery Solution\Server\HTTPVault. Web access permissions Read must be checked Web application permissions Execute (including scripts) must be selected. Default Document(s) for Web Browsing Enable Default Document must be checked, and “Default.htm” must be included as a default document. Web Authentication Methods z Basic Authentication must be checked. z Integrated Windows authentication (Windows 2000) Windows Folder Security Settings z The SYSTEM user must have Full Access. z The AeXRS_Managers (or the name of your administrators group for Recovery Solution) must have Read, List, and Execute access. z The AeXRS_Users (or the name of your administrators group for Recovery Solution) must have Read, List, and Execute access. z The XUSR_RepNDM user must have Read, List, and Execute access. Notes You can require users to establish an encrypted channel (https:// rather than http://) with your server before accessing the Web-based Setup Wizard or Web-Based File Recovery. The use of an encrypted channel, however, requires that the user's Web browser and your Web server both support the encryption scheme used to secure the channel. Before enabling encryption, you must install a valid server certificate. To require encryption in IIS, follow the procedure for enabling Secure Sockets Layer (SSL). For precise instructions, see the following topics in Internet Information Services section of Windows Help. Enabling Encryption Using Certificate Wizards Obtaining and Installing Server Certificates Configuring SSL Recovery Solution Reference Guide 264 ODBC Configuration During server setup, Recovery Solution configures Open Database Connectivity (ODBC) so that Recovery Solution can access its SQL Server databases. If you are having problems with Recovery Solution, you can verify that the configuration information is correct and update it yourself if necessary. To set up the ODBC connection to the database 1. From the Windows Start menu, click Settings > Control Panel. 2. Open the ODBC applet. The actual name of the applet varies depending on the version of Windows you are running. In Windows XP and Windows 2000, it can be found in the Control Panel Administrative Tools subfolder. 3. Click the System DSN tab. 4. Select AeXRSDatabaseDSN in the list and then click the Configure button. If you do not see this entry, you can add it as follows. 5. Click Add. Click SQL Server from the list and then click Finish. A wizard appears, walking you through the process of creating or modifying a data source to SQL Server. Set the values indicated below, and leave the defaults for any settings not mentioned here. In the Name field, type AeXRSDatabaseDSN. In the Server field, type the name of the server, then click Next. Under How should SQL Server verify the authenticity of the login ID?, choose With SQL Server authentication using a login ID and password entered by the user. Make sure the checkbox labeled Connect to SQL Server to obtain default settings for the additional configuration options is checked, then enter the SQL user name for Recovery Solution (the default name is AeXRSDatabaseUser) and its password, and click Next. Click Change the default database to, then select the database for Recovery Solution (AeXRSDatabase) from the list. Note Check this box even if AeXRSDatabase already appears in the list. Click Next. Click Finish. A confirmation screen appears next. Click the Test Data Source button to verify that the ODBC connection is working properly. You should then see a test results screen similar to the following. 6. Click OK in all open dialog boxes to complete the ODBC configuration. Recovery Solution Reference Guide 265 DCOM Configuration For secure communications among the server, consoles, and protected computers, Recovery Solution uses the Microsoft Distributed Component Object Model (DCOM), which consists of a set of system files installed on each computer. DCOM is a common operating system component that provides both flexibility and added security for many applications that run on a network. Windows 2000/XP contains DCOM as part of the basic operating system. On Windows 9x computers, Recovery Agent automatically installs the latest version of DCOM if necessary. All Recovery Solution Setup programs configure DCOM as needed to run Recovery Solution. Caution In rare cases, the DCOM configuration might be changed so that Recovery Solution no longer works properly. This may happen when another, third-party, setup program has reinstalled or reconfigured DCOM improperly. To set up DCOM on a protected computer 1. From the Windows Start menu, click Run. 2. Type DCOMCNFG.EXE, then click OK. 3. If the protected computer is running Windows XP, then do the following. In the Console Tree, browse to Console Root/Component Services/ Computers/My Computer, and select it in the list. From the Action menu or the context menu, click Properties. 4. Click the Default Properties tab. 5. Make sure the following default values are set. Enable Distributed COM on this computer is checked. The Default Authentication Level setting is Connect. The Default Impersonation Level setting is Impersonate. This setting allows the server to use each protected computer’s network account to perform actions on behalf of the protected computer. It prevents a protected computer from potentially using the network credentials of the server itself to perform operations that it would not be able to perform on its own. 6. Do one of the following. z Windows 98 (Second Edition) Computers z Click the Default Security tab. Check the box labeled Enable remote connection. Click OK. Windows 2000/XP Computers If the protected computer is running Windows XP, click OK to close the main DCOM properties dialog box, then in the Console Tree, expand My Computer/ DCOM Config. Scroll down the list until you see Altiris Recovery Solution Agent, and select that item. Recovery Solution Reference Guide 266 Do one of the following. z In Windows XP, from the Action menu or the context menu, click Properties. In Windows 2000, click the Properties button. Click the Security tab. Click the option to specify custom access permissions, then click the Edit button. Make sure that following users appear in the list, and are allowed access. INTERACTIVE SYSTEM Note If you prefer, you can choose to use default permissions and then make the security changes described below in the main DCOM properties. However, we strongly recommend that you use custom permissions for the objects, since you might not want all COM objects to have the rights you will assign to Recovery Solution. z Configure the launch permissions to be the same as the access permissions you configured above. z Click OK to close all open windows. To set up DCOM on the server 1. From the Windows Start menu, click Run. 2. Type DCOMCNFG.EXE, then click OK. 3. Scroll down the list until you see Altiris Recovery Solution RemoteService, and select that item. Recovery Solution Console uses this object to communicate with the server. 4. Click the Properties button, then click the Security tab. 5. Click Use custom access permissions, then click the Edit button. Make sure that following users and groups appear here. The local AeXRS_Managers group (or the name of your administrator group for Recovery Solution) INTERACTIVE SYSTEM Note If you prefer, you can choose to use default permissions and then make the security changes described below on the main tabs of the Distributed COM Configuration Properties window. However, we strongly recommend that you use custom permissions for the objects, since you might not want all COM objects to have the rights you will assign to Recovery Solution. 6. Click Use custom launch permissions, then click the Edit button and add the same users as you added for the access permissions in the previous step. 7. Click OK until you get back to the main Distributed COM Configuration Properties window. 8. In the DCOM Applications list, scroll down until you see Altiris Recovery Solution Server, and select that item. Recovery Solution Reference Guide 267 Recovery Agent running on protected computers uses this object to communicate with the server. 9. Click the Properties button, then click the Security tab. 10. Click Use custom access permissions, then click the Edit button. Make sure that following users and groups appear here. INTERACTIVE SYSTEM The local AeXRS_Managers group (or the name of your administrator group for Recovery Solution) The local AeXRS_Users group (or the name of your user group for Recovery Solution) Click Use custom launch permissions, then click the Edit button. Make sure that following users appear here. INTERACTIVE SYSTEM Caution Do not add XUSR_RepNDM or the AeXRS_Users local group to the Launch Permissions list. If you do, you will effectively lose control over when Recovery Solution is running. The reason is that this account is used automatically by all Recovery Agent installations. If it has launch permissions, then even if the service is stopped on the server, it will restart automatically as soon as a protected computer attempts to interact with the server. 11. Click OK until you get back to the main Distributed COM Configuration Properties window. 12. In the main Distributed COM Configuration Properties dialog box, click the Default Properties tab. 13. Make sure the following default values are set. Enable Distributed COM on this computer is checked. The Default Authentication Level setting is Connect. The Default Impersonation Level setting is Impersonate. This setting allows the server to use each protected computer’s network account to perform actions on behalf of the protected computer. It prevents a protected computer from potentially using the network credentials of the server itself to perform operations that it would not be able to perform on its own. 14. Click OK. Default DCOM security settings on the server The following tables display the full default DCOM security settings which must be configured on the Recovery Server: Recovery Solution Reference Guide 268 Abbreviations and acronyms Launch and activation permissions: LAct - Local Activation LL - Local Launch RAct - Remote Activation RL - Remote Launch Access permissions: LAcc - Local Access RAcc - Remote Access def - default lim - limit Default COM Security Permissions on the Recovery Server Group or user names LAct LL RAct RL LAct LL RAct RL LAcc RAcc LAcc RAcc def def def def lim lim lim lim def def lim lim INTERACTIVE X X X X SYSTEM X X X X Administrators X X X X X X X X X X X X X X X IUSR_... (Internet Guest Account) X X X X IWAM_... (Launch IIS Process Account) X X X X Distributed COM Users X X X X Everyone X X SELF ANONYMOUS LOGON X X X X AHMS {67B86D82-9B78-11D3-B597-00A0C91D0917} Group or user names LAct LL RAct RL LAcc RAcc INTERACTIVE X X X X X X SYSTEM X X X X X X AeXRS_Users X X Recovery Solution Reference Guide X 269 Altiris Recovery Solution Server (RSS) {864A9B22-6B68-11D1-9640-00C04FCD3EB0} Group or user names LAct LL RAct RL LAcc RAcc INTERACTIVE X X X X X X SYSTEM X X X X X X XUSR_RepNDM X X AeXRS_Users X X X X AeXRS_Managers X X X X Altiris Recovery Solution RemoteService (RmtSvc) {B438E666-9BE0-11D1-B83B-00A0C9843F26} Group or user names LAct LL RAct RL LAcc RAcc INTERACTIVE X X X X X X SYSTEM X X X X X X XUSR_RepNDM X X X X X X RPC Dynamic Port Allocation DCOM uses Remote Procedure Call (RPC) dynamic port allocation to randomly select port numbers above 1024 by default. You can control which port range RPC dynamically allocates for incoming communication and then configure your firewall to confine incoming external communication to that port range, port 135 (the RPC Endpoint Mapper port) and ports 43189 - 43190. To control RPC dynamic port allocation on the Recovery Server 1. From the Windows Start menu, click Run. 2. Type DCOMCNFG.EXE, then click OK. 3. In the Console Tree, browse to Console Root/Component Services/ Computers/My Computer, and select it in the list. 4. From the Action menu or the context menu, click Properties. 5. On the Default Protocols tab, select Connection-oriented TCP/IP in the DCOM Protocols list and click Properties button. 6. In the Properties for COM Internet Services dialog box click Add button. 7. In the Port range text box add a port range (ex. 55000-55199), then click OK. 8. Leave the Port range assignment and the Default dynamic port allocation options set to Internet range. 9. Click OK to close all dialogs and restart the server computer. Recovery Solution Reference Guide 270 On the client computer (optional) 1. From the Windows Start menu, click Run. 2. Type DCOMCNFG.EXE, then click OK. 3. In the Console Tree, browse to Console Root/Component Services/ Computers/My Computer, and select it in the list. 4. From the Action menu or the context menu, click Properties. 5. On the Default Protocols tab move Connection-oriented TCP/IP to the top of the list. 6. Restart the computer. Firewall Configuration To use Recovery Solution Server behind a firewall, a defined set of ports must be open to enable communication between the clients and the server. The following table lists these ports. Protocol Port Direction TCP and UDP 135 (DCOM) Both TCP 80 (HTTP) Both TCP 443 (HTTPS) Both TCP 43189 Inbound (to client) UDP 43190 Inbound (to server) TCP >1024 (DCOM) Both When using DCOM for communication, you must open the port range (>1024) used for Remote Procedure Call (RPC) dynamic port allocation. For more information, see RPC Dynamic Port Allocation on page 270. Notes You must open port 80 in case you are using HTTP for communication between clients and Recovery Server. You must open port 443 in case you are using HTTPS for communication between clients and Recovery Server. You must open ports 135, 1024 and above in case you are using DCOM for communication between clients and Recovery Server. You do not have to open port 43189 inbound to client if you enable the Allow Recovery Agent to initiate scheduled snapshot option in the Agent Settings. For details, see Configure Snapshot Settings on page 78. By default, when the Recovery Solution Agent service starts on protected computers running Windows XP or Windows 2003 Server, it will add port 43189 to the Windows Firewall Exceptions list. This functionality is controlled through the Enable Altiris Recovery Agent to modify Windows Firewall settings checkbox. For details, see Configure Miscellaneous Settings on page 94. Recovery Solution Reference Guide 271 Web-Based File Recovery Configuration Web-based file recovery is automatically configured during installation of the server, if all of the configuration requirements are met. If they are not, you can configure Web-based file recovery manually after the server is installed. To configure Web-based file recovery manually 1. If the Web-based file recovery program files are not stored on a drive formatted with the Windows NT file system (NTFS), then do one of the following. Move the WBFR folder to an NTFS drive on the server. Convert the drive where the Web-based file recovery program files are stored to an NTFS drive. You can do this using the Windows CONVERT.EXE command-line program. Caution Conversion to NTFS is an irreversible action. After converting a drive to NTFS, you cannot go back to the FAT file system without destroying the data on the drive. 2. On the server, open a command prompt and enter the following command. REGSVR32.EXE “Web-based file recovery folder\WFEngine.dll” Replace Web-based file recovery folder with the full path to the Web-based file recovery program files (by default, this is C:\Program Files\Altiris\Notification Server\Client Recovery Server\WBFR), but a different folder might have been specified during installation of the server. 3. Open the Internet Service Manager program. Note In Windows 2000, the default Start menu shortcut is Start > Programs > Administrative Tools > Internet Services Manager. 4. Create a new virtual directory for the Web-based file recovery folder as follows. In the Console Tree, select the Default Web Site item for the server. From the Action menu or the context menu, click New, then click Virtual Directory. Step through the wizard until you are prompted to specify an alias for the virtual directory, then specify one. The alias is the folder name that users will access when restoring files. To keep the configuration simple and consistent with the documentation, we recommend that you specify the default alias WBFR. After you have specified an alias, click Next. Specify the full path to the folder containing the Web-based file recovery program files, then click Next. Accept the default access permissions, which should include Read and Script access, but nothing else. Click the Next and Finish buttons as necessary to complete the wizard. 5. Configure the virtual directory as follows. Recovery Solution Reference Guide 272 In the Console Tree, select the virtual directory. From the Action menu or the context menu, click Properties. Do one of the following. If the server is running Windows 2000, then on the Virtual Directory tab, change the Application Protection option to Low (IIS Process). Click the Documents tab. Make sure that the checkbox labeled Enable Default Document is checked, and that Default.asp appears as one of the default file names in the list. If it does not, add it using the Add button. Configure access to the virtual directory as follows. 6. Click the Directory Security tab. Under Anonymous access and authentication control, click the Edit button. Clear the Anonymous access checkbox. You may also clear the box labeled Basic authentication (password is sent in clear text). Check the box labeled Integrated Windows authentication (Windows 2000). Click OK in all open dialog boxes until you return to the main Internet Service Manager window. Configure Windows security for the Web-based file recovery program files as follows. In the Web-based file recovery program files folder, open the properties for the following items, click the Security tab, and make sure that the Everyone group has Full Access rights to them. All files in the “Image” subfolder. The “Image” folder. All “*.class” files. “FileDownload.asp” “GetFiles.asp” “GetFolders.asp” “Global.asa” “LogOff.asp” “ServerUtils.asp” “Styles.css” When you have finished, click OK to close the Properties dialog box. z If the server is running Windows 2000, then for all files in both the main Web-based file recovery folder and the Images subfolder, click Properties/Security and clear the checkbox labeled Allow inheritable permissions from parent to propagate to this object, then click OK. z Open the properties for the main Web-based file recovery program files folder, WBFR. z Click the Security tab. Recovery Solution Reference Guide 273 z If the server is running Windows 2000, clear the checkbox labeled Allow inheritable permissions from parent to propagate to this object. z Give the user group for Recovery Solution (by default AeXRS_Users) the Read access permission to the folder. z You can remove any other access rights to the folder, although you might want to give yourself and/or other administrators full access. (Even if you do not, you can add the permissions later if the need arises.) z When you have finished configuring the security permissions, click OK to close the Properties dialog box. Configuring Web-Based File Recovery to run on Windows Server 2003 1. On the Windows Server 2003 computer, open the Computer Management window by clicking Start > Programs > Administrative Tools > Computer Management. 2. Expand the Services and Applications > Internet Information Services item. 3. Right-click Application Pool > New > Application Pool... 4. Name the new application pool with a WBFR specific name. Example: “WBFR”. 5. Click OK. 6. Right-click the new application pool and click Properties. 7. Click the Identity tab. 8. Select Local System. 9. Click OK and then click Yes on the warning shown. 10. Open properties of the Default Web Site > WBFR. 11. Under the WBFR Properties page, change the application pool for the WBFR virtual directory to the newly created application pool. 12. Click OK to save the changes. Job Schedule Worksheet The purpose of this worksheet is to help you schedule various activities that need to run on the server. Since multiple activities running at the same time could slow down Recovery Solution, you might want to divide processing time among the various jobs to allow them to run more efficiently. You can print this topic and fill in schedules as you create them. Some schedules are set by default when you install, but you can change them. The defaults are shown in the Recovery Solution Reference Guide 274 table below. The table also provides a sample schedule that you might wish to use as a guide.admin Supplemental Table Activity Default Schedule Manual Snapshots & Recoveries Actual Schedule Sample Typically Occur Daily Monday - Friday 8:00 A.M. to 5:00 P.M. Scheduled Snapshots Server Space Management Report Table Updates Daily Daily Monday - Friday Monday - Friday 7:00 A.M. to 7:00 A.M. to 7:00 P.M. 7:00 P.M. Weekly Daily Friday Monday - Friday 6:00 P.M. 5:00 A.M. to to 11:59 P.M. 7:00 A.M. None Daily 7:00 A.M. to 8:00 A.M. Back Up the Server to Tape None Weekly Saturday 8:00 A.M. Master Database Backup Weekly Weekly Sunday Sunday 12:00 A.M. 12:00 A.M. (Microsoft SQL Server default) Database Backup Deletion Weekly Weekly Sunday Sunday 5:00 P.M. 5:00 P.M. None Occasional Sunday after 5:00 P.M. Recovery Solution Reference Guide 275 Supplemental Table (Continued) Activity Default Schedule Actual Schedule Integrity Check Weekly Weekly Sunday Sunday 1:00 A.M. to 1:00 A.M. to 1:00 P.M. 11:59 P.M. Idle Time Sample Sunday after 5:00 P.M. Local Maintenance Job The Local Recovery Maintenance job starts regularly at 1 a.m. every Saturday by default, or before the snapshot if there is not enough free space on the Altiris Local Recovery partition. In the latter case the job will try to deallocate the amount of space that is required in order to perform at least two snapshots, meaning that more revisions of the files can be deleted than during a regular maintenance job. The Maintenance Job is automatically scheduled using the Windows Scheduled Tasks service and its task can be found in Windows Control Panel > Scheduled Tasks list. By default, the task is set to wake the computer to run the job (the computer will be shut down after completion). You can control the power management options on the Settings tab of the scheduled tasks’s Properties. The job consists of two phases and performs the following tasks: z z Integrity check checks the Altiris partition checks the database’s integrity checks the BLOB files for consistency cleans up the corruptions in the database and BLOB files (if a BLOB cannot be repaired it will be deleted) optimizes the database for better performance Storage Space Management job deletes files which were selected by the user for deletion (the files in the golden image and the files marked as locked will be never deleted) deletes the files added to the Exclude list by the user deletes the revisions of the files according to the Storage Space Management rules defragments the BLOB files residing on the BootWorks partition Technical Information This section contains miscellaneous technical information about Recovery Solution. Protected Computer IP Address Updates (page 277) How Recovery Works (page 277) Recovery Solution Reference Guide 276 Recovery Disk Space Needed (page 278) Protected Computer IP Address Updates Successful communications between the cluster and each protected computer require the use of the protected computer’s IP address. The cluster keeps a record of each protected computer’s IP address in the database. In the event that a protected computer’s IP address changes, the new information must be sent to the cluster to ensure that Recovery Solution continues working properly on that protected computer. z If the IP address change requires the protected computer to be restarted, then the update does not occur until the computer is restarted. z If the IP address change does not require the protected computer to be restarted, then the IP address update happens automatically the next time any of the following events occurs. Approximately 5–10 minutes passes. Periodic updates are sent automatically. Recovery Agent is restarted. This normally occurs only when the computer is restarted, but it is also possible to restart Recovery Agent by stopping and starting the Control Panel service Altiris Recovery Solution Agent. A Dial-Up Networking connection on the protected computer is started or disconnected. Snapshot on idle runs. How Recovery Works Restoring a file from the cluster is as simple as dragging and dropping the file to its destination. When a user restores a file, Recovery Solution does the following. 1. Determines if the copy of the file being recovered is different from the copy that already exists on the user’s computer. If a user recovers an entire folder. Example: it is possible that some of the files it contains have not changed and do not need to be transferred from the server. 2. If the file needs to be copied, determines if the file was originally obtained from that user’s computer, or if the snapshot just contains a placeholder with information about where an identical file is stored. Remember that Recovery Solution includes each file in a snapshot only once. If a placeholder was used during the snapshot, Recovery Solution locates the actual file. 3. Decompresses the file and copies it to the protected computer. During this process, Recovery Solution reconstructs the file if more than one version was included in a snapshot. Since the file was copied in its entirety only for the baseline snapshot, restoring a later version means assembling the pieces of the file that were copied during the baseline and during subsequent snapshots. The file is constructed as the pieces are downloaded. Recovery Solution Reference Guide 277 Files are reconstructed quickly, so there is usually little time difference between Recovery Solution restore and a simple file copy. Recovery Solution does all of these things automatically. If a user restores an entire folder or a drive, Recovery Solution performs these actions for each restored file. The result is that the user gets complete copies of restored files as they were at the time of a snapshot. You can also use either rollback or Full System Recovery to return the files on the computer to their state at a selected point in time. This can be useful to reverse unwanted changes to the operating system and other important files. Users can also perform rollbacks themselves. Specific files can also be restored from Full System Recovery CD-ROMs if the protected computer is bootable. This can be useful if a remote user is not on the local network and needs to restore files quickly. A Full System Recovery CD-ROM can be passwordprotected, in which case an Recovery Solution user name and password are required to access the files on the CD-ROM. For more information on password-protection and access to CD-ROM data, see Full System Recovery Disk Creation on page 134. How the Temporary Operating System Is Created Every time a protected computer starts, a system file installed with Recovery Solution monitors which files are accessed during the startup process. This is the File Access Logger, or FAL, and it creates a log that contains the list of startup files. A corresponding FAL Stopper, which appears as a service under Windows 2000/XP, stops the FAL as soon as Windows has finished starting up. When a Full System Snapshot is performed, the FAL log is sent to the server and stored along with the protected files. When you create Full System Recovery disks, Recovery Solution also creates a temporary operating system from this list of startup files and stores a compressed copy of this operating system in a CD-ROM image. When compressed, a small temporary operating system image uses about 20 MB of disk space, but depending on the protected computer’s configuration it is possible to have a much larger image. For a Windows 2000 computer, you will typically need about 100 MB. Recovery Disk Space Needed In general, to recover a file a protected computer must have at least the size of the recovered file in free disk space. However, this rule might not suffice in all situations. Redundant Block Elimination, which minimizes the amount of disk space needed to store multiple versions of protected files, also requires a little extra disk space on the protected computer for recovering files. If there is not enough free disk space, the user encounters an error when attempting to recover the file. The actual calculations for the amount of disk space needed are somewhat involved, but if you have an idea about how big the earlier versions of a file have been, you can at least determine the maximum amount of space that would be needed to recover the file. To calculate the maximum amount of recovery disk space required 1. Determine the largest size that the file has been since it was first protected. If multiple files are being recovered as one job, determine the largest size that any one of the recovered files has been since it was first protected. Recovery Solution Reference Guide 278 Since files increase in size more frequently than they decrease, in many cases the size of the version being recovered is an adequate estimate of the largest file size. Example: Suppose 3 files are being recovered, with file sizes 200 KB, 250 KB, and 100 KB. If the 250 KB file has always been the largest file, and it was once 400 KB at the time of a snapshot, then use 400 KB as an estimate of the largest file size. 2. Add the sizes of any remaining files being recovered. Example: To 400 KB, add the sizes of the other two files (200 KB and 100 KB). The total amount of disk space needed to recover the files is 700 KB. Command Line Utilities z AeXRSEnc Utility (page 279) z AeXMigrt.com Utility (page 282) Local Recovery has a number of utilities, which you can use to work on Altiris partition. The following utilities are described: z BWINST Utility (page 288) z RECREATE Utility (page 289) AeXRSEnc Utility AeXRSEnc.exe utility lets administrator encrypt and decrypt the policy.cfg file that contains Recovery Agent settings on client computers. The utility is especially useful in case Recovery Solution is installed without Notification Server. In this case administrator can modify Recovery Agent setup package to contain custom agent settings. The recovery.xml file is an ASCII file that controls where the Recovery Agent stores its settings and accessibility to which tabs in the agent UI is controlled via password. This file is encrypted using Microsoft's implementation of RC2 algorithm with 40bit encryption key. This algorithm is widely used in a number of commercial software packages, including Lotus Notes, Microsoft Windows, Internet Explorer and Netscape Communication's Navigator and Communicator (refer to the RSA Data Security, Inc. web site at http://www.rsasecurity.com for more details on this algorithm). To replace the policy.cfg file in AgentSetup.exe package you can use the ASPack utility found in install path\Altiris\Recovery Solution\Console\Tools folder on the computer where Recovery Solution is installed. To download the AeXRSEnc utility 1. In the Altiris Console, click the Tasks tab. 2. In the left pane, select Tasks > Incident Resolution > Recovery Solution > Agent Settings Decryption/Encryption Utility. AeXRSEnc utility usage To encrypt the recovery.xml file outputting the encrypted recovery.cfg file in the current working directory, run: AeXRSEnc.exe -e|-encrypt To decrypt the recovery.cfg outputting the decrypted recovery.xml file in the current working directory, run: Recovery Solution Reference Guide 279 AeXRSEnc.exe -d|-decrypt For help, run: AeXRSEnc.exe -h|-help Policy XML File Description The client settings stored in .XML files (policy.cfg and usercfg.xml) are installed with Recovery Agent. These .XML files can be found in the Recovery Agent’s Config folder. The policy.cfg file is encrypted and contains all Recovery Agent settings; the usrcfg.xml is stored in plain text and contains custom user settings (the file is empty by default). To encrypt or decrypt the policy.cfg file you must use the AeXRSEnc.exe utility. The policy.cfg reflects the settings from the Altiris Console; the non-encrypted usrcfg.xml contains custom user settings, which will override the settings defined in Console in case the permissions are set to allow it. The usrcfg.xml has the same XML structure that the policy.cfg has, except the inherit and permission attributes and some other sub-categories, which can not be modified through the Recovery Agent Options, such as <UserRight>, <HealthAlerts>, <SpaceUsage> etc. The policy.cfg must contain all the settings (none of them can be deleted from policy.cfg), but the usrcfg.xml file can be empty. All Recovery Solution settings are grouped together under different categories. On the top level, all Recovery Agent settings are divided into three categories that reside inside the <AgentSettings> root XML tag: <AgentSettings> <RemoteSettings> ... </RemoteSettings> <LocalSettings> … </LocalSettings> <CommonSettings> … </CommonSettings> </AgentSettings> The <RemoteSettings> category contains server-based Recovery Agent settings. The <LocalSettings> category contains Local Recovery Agent settings and the <CommonSettings> category contains common settings for both Recovery Agent modes (server-based and local). Inside the top three categories, the settings are grouped by sub-categories, such as: z <SnapshotSettings> - Snapshot and Snapshot Schedule settings z <SnapshotExcludes> - Snapshot excludes z <RollbackExcludes> - Rollback excludes z <SpaceManagement> - Space Management settings Recovery Solution Reference Guide 280 z <SpaceUsage> - Storage quota settings (server-based mode only) z <HealthAlerts> - Health Alerts settings (server-based mode only) z <BandwidthThrottling> - Bandwidth Throttling settings (server-based mode only) z <MiscSettings> - Miscellaneous settings z <ConnectionManagement> - Connection Management settings (server-based mode only) z <UserRights> - User rights z <RemoteAccessSettings> - Remote Access settings (server-based mode only) z <TransportSettings> - Transport settings (server-based mode only) z <HiddenTransportSettings> - Transport settings that depend on cluster network settings (server-based mode only) z <StorageManagement> - Storage settings (local mode) z <F11RecoverySettings> - F11 Recovery settings (local mode) The sub-categories contain two attributes (that exist only in policy.cfg file and absent in usrcfg.xml): permission and inherit. The permission attribute controls the settings behavior. The inherit attribute is not used by Recovery Agent, it was reserved for the Altiris Console usage only. The permission attribute can have one of the three values: z ReadOnly - the settings for this sub-category are taken from policy.cfg and cannot be modified by user from the Recovery Agent Options. z Edit - the settings for this sub-category could be overridden by user settings modified from the Recovery Agent Options. The overridden settings are stored in usrcfg.xml. In case of Edit permission, the settings for current sub-category will be first looked up in usrcfg.xml and if they are absent then the settings will be taken from policy.cfg. z Append - this attribute is used only for Snapshot and Rollback excludes. In case of the Append permission, the settings (list of excludes) are taken from policy.cfg and usrcfg.xml. Caution We do not recommend manual modification of policy.cfg or usrcfg.xml files, because any misprint can cause the Recovery Agent to become totally unusable. The best practice is to modify the settings from the Altiris Console. Here is the example of how to modify the Hide client UI settings using the policy file: z Get the AeXRSEnc.exe utility and copy it to the Recovery Agent Config subfolder. Then run it using the following command line: AeXRSEnc.exe -d This will decrypt the policy.cfg file to policy.xml. z Find the HideClientUI tag that reflects the Hide client UI settings in the Altiris Console and modify this setting (set to enabled attribute to True) z Check that XML file format is correct and readable by opening it using the Microsoft Internet Explorer. z If XML file is correct, then delete policy.cfg file and run the following command line to encrypt policy.xml file to policy.cfg: Recovery Solution Reference Guide 281 AeXRSEnc.exe -e z To force the Recovery Agent rereading policy.cfg file and to apply the modified setting, run the following command in the Recovery Agent folder: AeXCmd.exe /ApplySettings Here is the example how to modify the scheduled snapshot starts time: z Decrypt the policy.cfg file using the AeXRSEnc.exe utility (like in previous example). z Locate the <StartTime> tag inside the <SnapshotSettings> sub-category in policy.xml file. z Modify the time inside the <StartTime> tag (please use the same time format). z Check the policy.xml file and encrypt and apply it like in the previous example. The following figure shows sample policy.xml file settings. Note that to hide all Recovery Agent user interface elements, the enabled attribute of the <HideClientUI> tag must be True, and the following <CommonSettings> must be False: z <ShowStatusIcon> z <ShowAgentDesktopIcon> z <ShowAgentDesktopIcon> z <ShowAgentOptionsInStartMenu> z <ShowWelcomeScreen> AeXMigrt.com Utility The purpose of the AexMigrt.com utility installed with Recovery Solution into the folder install path\Altiris\Recovery Solution\Console\Tools on Notification Server computer is to let administrators automate retrieval of files from the Recovery Server for a client or a set of clients. This section contains the following topics: z Overview (page 282) z Command-line parameters (page 285) (with usage examples) z Input XML files (page 287) (with usage examples) Overview The AeXMigrt.com utility runs on a computer where Recovery Agent installed and configured to connect to the Recovery Server to restore files from. Utility accesses the Recovery Server using the Recovery Agent, so the Recovery Agent must be fully functional (not disabled) on the computer. Note We recommend disabling scheduled snapshots and snapshots on events for the client, otherwise these snapshots can affect the utility workflow. The utility can run on Microsoft Windows 2000 and later platforms. It does not support Windows 98. The utility uses command-line parameters , the list of protected computers and the search mask supplied at run time to perform the following operations: Recovery Solution Reference Guide 282 z Authenticate on the Recovery Server to obtain the list of files for specified protected computers. z Create a list of files that must be restored. z Initiate restore operation using the Recovery Agent. Note The utility is command-line based and exposes no UI. Use cases Administrator wants to locate and restore a particular file (including all revisions) from selected computers backing up to the Recovery Solution Server. The utility automatically creates folders for each computer where the file exists during the restore. When multiple revisions of the file exist then the incremental ID is added to the name of the file revision (myfile001.txt, myfile002.txt etc.). The destination folder can be a local drive or a network share. Restore The utility lets the user restore files or folders by their name, name mask or location. Also, it is possible to restore files from a particular date range. There is no UI available for the search pattern configuration — all options must be provided using the commandline parameters or in an XML file. To search for files, the utility enumerates files that were backed up from a particular client to the Recovery Server and applies the specified mask to locate the required files. The search engine creates the list of files that fall under specific criteria specified by the user and will be restored. Note Specifying a more precise search mask will significantly decrease the search time. The utility performs an automated restore for files specified by the supplied mask and that were backed up from the specified computers to the Recovery Server. The utility accepts the file or folder name masks and the list of computers as input parameters, searches for these files on the Recovery Server and submits the restore job for the found items. The utility waits for the submitted job to complete complete and logs the resulting event into the activity log. The restore itself is performed by the Recovery Agent, using the list of found files. The utility creates the restore specification and submits the restore jobs to the Recovery Server. Depending on the number of files found, the utility submits either one or more restore jobs. In case of multiple jobs, utility submits them one by one, waiting for each job to complete. Destination folder for a restore operation must be provided using the command-line or the default one will be used. The default subfolder “aex_restored” is created in the location from where the utility has been launched. Restored file naming If you restore only latest revisions, the files will have exactly the same name they were backed up under on the Recovery Server. If you restore all revisions, the restored files that have multiple revisions will be renamed using following pattern: original_file_name(revision_numer).original_extension Recovery Solution Reference Guide 283 So if the file "mymail.pst" has 10 revisions and "restore all revisions" parameter was specified, the restored folder will contain files: Mymail(001).pst Mymail(002).pst ... Mymail(010).pst All file creation and modification dates will be restored correctly for corresponding versions, and it is up to the user to find the required one. Authentication The utility accesses the Recovery Server under a logged-on user account or an account specified in the command-line parameters or the specified XML file. If the utility fails to access the Recovery Server using the specified credentials, it will log the corresponding entry into the log file. The utility accepts accounts from the AexRSUsers or AeXRSManagers groups. For an account from the AexRSUsers group, only files from protected computers that belong to the particular user can be restored. For accounts from the AeXRSManagers group, the files from all protected computers can be restored. Destination folder structure The restored files will be placed in the destination folder as follows: <destination folder>\<computer name>\<disk name>\<path to file>. So, if the destination folder is C:\Tmp and original file is D:\Program Files\PST\mypst.pst on machine XRG200 then the resulting restored file path will be: C:\Tmp\XRG200\D\Program Files\PST\mypst.pst Activity and error logging During execution, the utility creates the activity log file that contains the description and details of performed operations. The default log file name is "ade.log" and it will be created in the same folder where utility resides by default. The log file path can be changed by providing the special command-line parameter. The log file will contain following information: z Utility executions start time z Name of the currently logged user z Name of the Recovery user selected to authenticate on Recovery server z List of machines that are available for search z Destination folder z List of found files z Any information about errors that occur during execution Any internal utility errors that occur the execution will be logged to the activity log file. Any errors that occur during the restore job execution and the status of restore operation for found files will be logged into the Windows application log as usual. Recovery Solution Reference Guide 284 Command-line parameters The restore operation can be started by specifying the mandatory "/R" parameter. All other parameters are optional. The following table lists the parameters recognized the by utility. Parameter Description /R Perfrom restore /M:<computer_name> Specifies the particular client machine name or name mask to search files for. If not specified, utility will search files on all machines that can be accessed by user specified in logon dialog. /File:”<file_name>” Specifies the file name or file name mask to search for. More than one mask can be specified. Optional, if no masks (file or folder) specified, all files will be restored. /Folder:”<folder_name>” Specifies the folder or folder mask to search for. More than one mask can be specified. Optional, if no masks (file or folder) specified, all files will be restored. /All Specifies that all revisions of found file must be restored. Optional, if not specified latest revisions of file(s) will be restored. Valid only for restore operation. /FromDate:"MM/DD/YY” Specifies an optional time based filter. Only file revisions that are newer than specified date will be restored. The utility will accept only one mask of this type but it can be used with "/ToDate". Valid only for restore operation. /ToDate:"MM/DD/YY” Specifies an optional time based filter. Only file revisions that are older than specified date will be restored. The utility will accept only one mask of this type but it can be used with "/FromDate". Valid only for restore operation. /XML:<full_path_to_xml> Specifies a full path to XML file with parameters for restore/deletion operation. If specified, the utility will obtain search masks and other parameters from XML file. NB! Parameters provided from command line will override parameters from XML file, except search masks and client machines that will be used as additional to one specified in XML. See Input XML files (page 287). Recovery Solution Reference Guide 285 Parameter Description /Dest:<destination_folder> Valid for restore operation, specifies a folder to restore found files into. Optional, if not specified, utility will restore found files into its current location subfolder aex_restored. The destination can be local, UNC path, or a mapped network location. /S Stops execution of previously started restore operation. /Login Login name (DOMAIN\User) to authenticate on Recovery Server. Optional, if not specified, utility will try to authorize under currently logged user. /Pass Password to authenticate on Recovery Server. Optional, if not specified (but / Login was specified), empty password will be used. Ignored if "/Login" was not specified. /L:<log_file_path> Full path to log file that will be generated by utility. Optional, if not specified, utility will generate log file in folder where it resides. /? Displays a dialog with utility usage scenarios. Usage examples The following table gives some examples on how the restore operation can be configured from the command line. Sample task Command Search all clients and restore all found PST files AexMigrt.com /R /File:"*.pst" Search all clients and restore all found Word and Excel documents AexMigrt.com /R /File:"*.doc" / File:"*.xls" Search client XRG200 for folder C:\Documents and restore its content. AexMigrt.com /R / Folder:"C:\Documents" / M"XRG200" Search all clients and restore all found PST files into c:\tmp folder using ALTIRIS\Britney account with password "oops". AexMigrt.com /R /File:"*.pst" / Login:"ALTIRIS\Britney" / Pass:oops /Dest:"C:\tmp" Search all clients and restore all revisions of found PST files that were included in snapshots performed between 10/11/ 2006 and 10/12/2006. AexMigrt.com /R /File:"*.pst" / All /FromDate:"10/11/2006" / ToDate:"10/12/2006" Cancel restore. AexMigrt.com /S Recovery Solution Reference Guide 286 Input XML files The most convenient way to perform a restore is using an XML file passed to the utility through the command line. While the XML file can contain all parameters required to perform the restore, these parameters can be overridden or extended by using the corresponding command-line parameters. Note File masks provided in an XML file should not contain reserved symbols for XML syntax. For example, you cannot use symbols “<“, “>”, “(“, “)” and other. If you need to use a file or folder mask with these symbols, use the command-line parameters instead of XML file. Sample XML file 1 The following sample XML file (adeu.xml provided with the utility) configures the utility to restore latest revisions of two files and all folders on disk C: that start with "Photo" on computers PC1, PC2, PC3. The Recovery Server will be accessed under "ALTIRIS\Britney" user account with password "oops". All activity logging will be performed into "C:\britney.log" file. <?xml version="1.0" encoding="utf-8"?> <Operations> <Operation type="restore" Dest="c:\Tmp" Login="ALTIRIS\Britney" Pass="oops" LogFile="C:\britney.log" FromDate="10/11/2006" ToDate="20/11/2006"> <Machines> <Machine Name="PC1"/> <Machine Name="PC2"/> <Machine Name="PC3"/> </Machines> <SearchItems> <Item type="File" Name="party.img"/> <Item type="File" Name="mail.pst"/> <Item type="Folder" Name="C:\photo*"/> </SearchItems> </Operation> </Operations> Sample XML file 2 The following sample XML file configures the utility to restore all revisions of two files "party.img" and "mail.pst" and all revisions of files in all folders on disk C: that starts with "Photo" that were modified between 10/11/2006 and 10/12/2006. This operation will be performed for all computers to which currently logged user has access. The Recovery Server will be accessed under currently logged-on user account. All activity logging will be performed into "C:\britney.log" file. Recovery Solution Reference Guide 287 <?xml version="1.0" encoding="utf-8"?> <Operations> <Operation type="restore" Dest="c:\Tmp" LogFile="C:\britney.log" Versions="all" FromDate="10/11/2006" ToDate="10/12/2006"> <Machines> </Machines> <SearchItems> <Item type="File" Name="party.img"/> <Item type="File" Name="mail.pst"/> <Item type="Folder" Name="C:\photo*"/> </SearchItems> </Operation> </Operations> Overriding XML values with command-line parameters It is possible to override parameters specified in XML file by providing corresponding parameters from command line: The following sentence executes the restore operation for the XML file specified above using "D:\restoredstuff" folder as destination. AexMigrt.com /XML:"adeu.xml" /Dest:"D:\restoredstuff" The following sentence executes the restore operation for XML file specified above using "D:\restoredstuff" folder as destination and adds one more computer to search for in PhotoVault: AexMigrt.com /XML:"adeu.xml" /Dest:"D:\restoredstuff" / M:PhotoVault BWINST Utility Bwinst is a utility that is useful for removing an Altiris Partition in case the Altiris Partition remains after the software has been uninstalled. It is also useful for clearing out the marked bad sectors if the Altiris Partition is gone, but the bad sector marks remain. The Bwinst utility can be obtained from the Altiris Console > Tasks tab > Incident Resolution > Recovery Solution > Altiris Partition Removing Utility. BWINST utility usage Boot to DOS and run bwinst -rs -u -rs : operate on the Recovery Altiris Partition -u : uninstall the partition Recovery Solution Reference Guide 288 -d<HDD number> : remove partitions from additional HDDs (-d1 (default) means removing Altiris Partition from HDD0, -d2 from HDD1 etc.) RECREATE Utility Recreate is a collection of files that can be used to restore a system from RSDATA, when the disk with the original RSMAIN partition fails. Recreate will format a new disk, destroying any data thereon, and install a new RSMAIN Altiris Partition on that disk. This disk can then be used to access the RSDATA partition, and the data it holds. Recreate utility is usually needed if a user cannot boot from the hard drive on which Altiris partition was created. Otherwise, the user can simply boot from the disk drive containing the Altiris Partition instead. The Recreate utility is available per request from the Altiris Technical Support. RECREATE utility usage Boot to DOS and change directory (cd) to the recreate directory. Run partmake.bat Note If there is more than a single disk on the system, Recreate will prompt the user for the correct disk. After Recreate runs, restart the machine from the new RSMAIN disk. It will then boot to the Recovery partition and restore the user's data. Stopping and Starting the Recovery Solution Server Service At times, you may need to stop the server service to perform basic maintenance. You can stop the server, temporarily preventing users from running snapshots or restoring data. Before you stop the server, let your users know that the server will be unavailable for snapshot and restore operations. If you disable the server while users are running snapshots, the users will receive error messages stating their computers are unable to connect to the server. To stop or restart the server service 1. From the Windows Start menu, open the Control Panel, then open the Services applet. 2. Highlight Altiris Recovery Solution Server service and click Stop or Start. 3. Highlight Altiris Recovery Server Host Manager (ping service) and click Stop or Start. Recovery Solution Reference Guide 289 Note Altiris Recovery Solution Server service depends on the Altiris Recovery Server Host Manager (ping service). Stopping the Altiris Recovery Server Host Manager (ping service) also stops the Altiris Recovery Solution Server service. If you stop the Altiris Recovery Solution Server service by itself, the Altiris Recovery Server Host Manager will automatically restart the server service on start-up. Recovery Solution Infrastructure Backup and Restore This topic describes the steps that need to be done in order to obtain a complete backup of Recovery Solution infrastructure. z Recovery Solution Infrastructure (page 290) z Backup (page 291) z Restore (page 294) Recovery Solution Infrastructure A Recovery Solution cluster may have one or several Recovery Solution Servers, which can be installed remotely. A cluster's Recovery Solution Database can be also located on a remote SQL server. One Notification Server can manage many Recovery Solution clusters. The Notification Server Database stores the following Recovery Solution data: list of Recovery Solution clusters, Recovery Solution agent and Recovery Solution cluster settings. Through Recovery Solution data file mirroring, there can be several copies of data files, these copies are synchronized between themselves either synchronously or asynchronously (by means of an Recovery Solution Server job). You can have an optional load balancer device that can be "attached" to the cluster. It is used to distribute client requests among the cluster's servers. As a result, the Recovery Solution infrastructure can be now heavily distributed: z The SQL Server computer with Notification Server Database. z A Windows Server computer with Notification Server and Recovery Solution. z Each Recovery Solution cluster can have its own SQL Server computer with Recovery Solution Database. z Any number of Recovery Solution Server computers. Every such computer has its own local Windows group for Recovery Solution users; it also has ODBC DSN string for communication with the Recovery Solution Database computer. See also: Recovery Solution Architecture (page 19). Recovery Solution Reference Guide 290 Backup Generally, to get a complete snapshot of an Recovery Solution 6.2 SP2 installation, you must back up the following pieces of information: z On computer with SQL Server that hosts the Notification Server Database: The Notification Server Database. Either the complete database must be backed up, or only Recovery Solution-related data (see Notification Server Database Backup on page 291). "Linked Server" entries to SQL Server computers with Recovery Solution databases. SQL Server Enterprise Manager allows doing this easily via rightclick on "Linked Servers" node in the Enterprise Manager console, and selecting "Export List..." menu item. Note This step is only needed if the Notification Server database is located on a different SQL server rather than Recovery Solution database. z On computers with SQL Servers that host Recovery Solution databases (for all Recovery Solution clusters): The Recovery Solution Database (see Recovery Solution Database Backup on page 292). AeXRSDatabaseUser login account This account can be seen under Security\Logins node in the Enterprise Manager console. Right click provides "Export List..." menu item. z For every Recovery Solution cluster, Recovery Solution data files must be backed up as well (see Data Files Backup on page 293). z For clusters that use load balancers, load balancer configuration must be backed up. Since this information is balancer-dependent, there is no step-by-step instruction for backup procedure. Please refer to the specific load balancer's documentation. Notification Server Database Backup If Notification Server is only used to host the Recovery Solution installation, you can back up the complete Notification Server Database. The Notification Server Database can be backed up using approaches described in Recovery Solution Database Backup on page 292 except that you will specify the Notification Server Database. Note that if the SQL Backup Agent is not used, then the SQL Server service that hosts the Notification Server Database must be stopped, which will make the Notification Server non-operable for the duration of Notification Server Database backup. But if there are several solutions installed, it's not feasible to back up the complete Notification Server Database, as in case of disaster the whole database will have to be restored, possibly overriding other solution's settings. For this scenario, a set of SQL scripts was developed. These scripts are available for download from http:// www.solutionsam.com/imports/6_2/recovery. z Backup_All_RS_Clusters.sql - creates a backup database named RS_Backup_DB, then backs up all RS clusters-related data into that database. z Restore_All_RS_Clusters.sql - restores information about all RS clusters from the RS_Backup_DB. Recovery Solution Reference Guide 291 z Backup_Single_RS_Cluster.sql - backs up information about a single cluster. z Restore_Single_RS_Cluster.sql - restores information about a single cluster. z Create_RS_Backup_DB.sql - creates an empty RS_Backup_DB. Should be called before Backup_Single_RS_Cluster.sql in cases when there is no backup database. Caution These scripts do not backup RS Agent Settings and RS Agent Rollout policies. So changes to these settings will be lost after restore. Notes Every script has a comment in the beginning, describing its usage. Before running Backup_Single_RS_Cluster.sql and Restore_Single_RS_Cluster.sql scripts, you must specify proper cluster GUID. To get the Recovery Solution cluster GUID, open Properties for the Recovery Solution cluster you want to back up in the Altiris Console. Recovery Solution Database Backup For every Recovery Solution cluster, its Recovery Solution Database must be backed up. It is strongly recommended that you back up the database to removable storage on a regular basis. For that, you can use use the SQL Server database backup functionality built-in the Microsoft SQL Server software. Important Whichever method you use, back up the database files first and then the protected data (BLOB) files. Also, because Recovery Solution uses the domain user accounts database, the domain controller computer must be also backed up. The following instructions help you backup the Recovery Solution database. For additional information on backup and restore of Microsoft SQL Server databases, see Microsoft SQL Server documentation. To backup the database 1. Stop the Recovery Solution Server service (see Stopping and Starting the Recovery Solution Server Service on page 289). 2. If the server is running Microsoft SQL Server: a. Open SQL Enterprise Manager. Note For Microsoft SQL 2005, Microsoft SQL Server Management Studio shoud be used. b. In the Console Tree (usually on the left side), expand SQL Server Group, the name of the server, and then Databases. c. Select the database for Recovery Solution. By default, it is named AeXRSDatabase. d. Recovery Solution Reference Guide In the Details Pane, under Backup, click backup database. 292 e. Under Backup, click Database - complete. f. Under Destination, click Add. g. In the Click Backup Destination dialog box, click File name. h. Specify the full path and file name. You can use the ... button to locate a path. The path is where the database backup will go. The file name is the file that you will have your backup software back up. 3. i. Click OK. j. Click Overwrite existing media. k. Click OK to start the backup. l. Have your backup software back up the file you created. If the server is running MSDE: a. Open an MS-DOS style command prompt. b. Change to the BINN subfolder of the folder containing the MSDE program files. You can use a command such as the following. CD /D "D:\MSSQL7\BINN" c. Enter the following command. OSQL.EXE -U sa -P -n -Q "BACKUP DATABASE AeXCRDatabase TO DISK = 'e:\AeXCRDatabase.dat'" AeXRSDatabase is the default name of the database. If your installation of Recovery Solution uses a different database name, make the appropriate changes in the above command. The path and file name specified at the end can be modified to any appropriate location. This command could be scheduled through Windows Task Scheduler or the AT command-line program. Database backups can also be scheduled using a SQL script. For details, see the Microsoft knowledge base article Q241397, which is available on the Microsoft Web site (http://www.microsoft.com). 4. Use your backup software to back up the protected data (BLOB) files. See Data Files Backup (page 293). Data Files Backup For every Recovery Solution cluster, its data files must be backed up. After the synchronization job is complete, only one copy of the data files (from any group) should be backed up. All servers in the clusters must be stopped or disabled during this process, to ensure data integrity. Backing Up With Software That Includes a SQL Backup Agent Follow these steps if your backup software includes a SQL backup agent. You might also need to refer to the instructions for your backup software. 1. Back up the database files for Recovery Solution. By default, these are the following. Recovery Solution Reference Guide 293 2. The main data file is AeXRSDatabase_Data.MDF, in a folder named AeXRSDatabase. You might have additional data files. Typically the next name would be AeXRSDatabase_Data.NDF. The log file is AeXRSDatabase_Log.LDF, in a folder named AeXRSLog. Back up the protected data (BLOB) files. Load Balancer Configuration Backup and Restore Note This step is only needed if your Recovery Solution Cluster is uses load balancer. Since in Recovery Solution 6.2 SP2 the load balancer device configuration (such as adding the nodes) must be performed manually, backup and restore must also be performed manually. What exactly should be backed up and restored is balancerdependent, generally information about nodes and about protocols/ports should be preserved and restored. Note that any changes to the restored configuration, such as balancer address, must be reflected in the Recovery Solution cluster settings UI in the Altiris Console. Restore If only the Recovery Solution Database or the data files got corrupted, there is no need to restore the Notification Server Database. In such cases skip the "Notification Server Database Restore" section. Similarly, if only the Notification Server Database got corrupted, there is no need to restore the Recovery Solution databases or data files of Recovery Solution clusters. Note, however, that if the Notification Server Database is restored from an old backup, then the restored database will not contain information about recently created Recovery Solution clusters and their settings. The Recovery Solution can be restored using either of the two approaches: If whole Notification Server database is restored In this case Notification Server and Recovery Solution databases should be simply restored using SQL server tools (see Notification Server Database Restore on page 295), data files should be restored to original location and Recovery Solution Server should be installed if original installation was corrupted. If Recovery Solution Database was created on different SQL server than Notification Server database, then saved ODBC DSN string should be restored as well. If only Recovery Solution specific information is restored using SQL scripts 1. Recovery Solution should be installed again if its installation was corrupted. 2. Should be executed either Restore_All_RS_Clusters.sql or Restore_Single_RS_Cluster.sql scripts (see Notification Server Database Backup on page 291) depending on whether you want to restore all Recovery Solution Clusters or just one. Note that in case of using Restore_Single_RS_Cluster.sql script admin should specify correct RS Cluster GUID in the script. Recovery Solution Reference Guide 294 3. Recovery Solution SQL database should be restored using SQL Server tools. For information, see Recovery Solution Database Restore (page 295). 4. Recovery Solution data files should be restored from backup to original location. See Data Files Restore (page 295). 5. Recovery Solution Server should be installed to the same machine where it was originally installed. 6. If Recovery Solution Database created on different SQL server than Notification Server database, then saved ODBC DSN string should be restored as well. 7. You should also restore the AexRSDatabaseUser account backed up at step AeXRSDatabaseUser login account (page 291) if it is missing. Notification Server Database Restore If the whole Notification Server Database was backed up, it can be restored using approach described in Recovery Solution Database Restore on page 295. Simply substitute the Notification Server Database name instead of Recovery Solution Database name. If either of backup SQL scripts was used, then the appropriate restore script should be used to restore either all or a specific Recovery Solution cluster. Data Files Restore If data files mirroring is utilized in Recovery Solution 6.2 SP2 installation, then it's only needed to restore the files to the main storage group. Other groups will be synchronized, either (for synchronous groups) automatically on the background or (for asynchronous groups) during the next synchronization job. We recommend that you back up the data files along with the Recovery Solution Database, and also restore these two pieces of information together. Recovery Solution Database Restore This section describes how to restore the database from a backup. For instructions on creating a backup, see Recovery Solution Database Backup on page 292. The following instructions help you restore the Recovery Solution database. For additional information on backup and restore of Microsoft SQL Server databases, see Microsoft SQL Server documentation. To restore the database 1. Install the Recovery Solution Server. 2. Stop the Recovery Solution Server service (see Stopping and Starting the Recovery Solution Server Service on page 289). 3. If the server is running Microsoft SQL Server: a. Open SQL Enterprise Manager. b. In the Console Tree (usually on the left side), expand SQL Server Group, the name of the server, and then Databases. c. Select the database for Recovery Solution. By default, it is named AeXRSDatabase. Recovery Solution Reference Guide 295 4. d. In the Details Pane, under Backup, click Restore database. e. For Restore, click From device, then click Select Devices. f. For Restore from, click Disk, then click Add. g. Specify the file name of the backed up database, then click OK. h. Click OK again to return to the Restore database screen. i. Click the Options tab. j. Click Force restore over existing database. k. Click OK. If the server is running MSDE: a. Open an MS-DOS style command prompt. b. Change to the BINN subfolder of the folder containing the MSDE program files. You can use a command such as the following. CD /D "D:\MSSQL7\BINN" c. Enter the following commands. OSQL.EXE -U sa -P -n -Q "DROP DATABASE AeXRSDatabase" OSQL.EXE -U sa -P -n -Q "RESTORE DATABASE AeXRSDatabase FROM DISK = 'e:\AeXRSDatabase.dat'" AeXRSDatabase is the default name of the database. If your installation of Recovery Solution uses a different database name, make the appropriate changes in the above commands. The path and file name specified at the end should point to the existing database backup file. 5. Once the database restoration is complete, restore the BLOB files back to their original location. 6. Use Windows Control Panel to restart the Altiris Recovery Solution Server service. Recovery Solution Reference Guide 296 Appendix A Hard Disk Support Altiris Partition creation in local mode is supported only for a specific set of SCSI/SATA and RAID adapters. All IDE controllers are supported for Local Recovery. Server-based Full System Recovery of RAIDs is supported only for a specific set of RAID adapters. See below for more information. Notes The full list of supported adapters can also be found in the following file: C:\Program Files\Altiris\Recovery Solution Agent\SCSIConfig.ini. The latest information may be also provided in the Altiris Recovery Solution Release Notes. For information on enabling 48-bit Logical Block Addressing (LBA) support for ATAPI disk drives in Windows 2000 and Windows XP, see Microsoft Knowledge Base articles Q305098 and Q303013 available on the Microsoft Web site (http://www.microsoft.com). Recovery Solution Reference Guide 297 SCSI/SATA controllers supported for Local Recovery ACARD ATP850UF ATP860R Adaptec ATP865 ATP860A ATP865 AHA-2930C AIC-7855 AIC-7896 AHA-2940/2940W AIC-7860 AIC-7896/7 AHA-2940U/2940UW AIC-7861 AIC-7899 AHA-2944 AIC-7870 AIC-7899A AHA-2944UW AIC-7880 AIC-7899D AHA-3940/3940W AIC-7880p AIC-7901 AHA-3940Uxx AIC-7883U AIC-7901 AHA-3944/3944W AIC-7888 AIC-7902 AHA-3944U/ 3944UWD AIC-788x AIC-7902B AIC-7890 ASC-29320 AIC-7890/1 ASC-29320A AIC-7890AB ASC-29320ALP AIC-7892 ASC-29320LP AIC-7892A ASC-39320 AIC-7892B ASC-39320 AIC-7892D ASC-39320A AIC-7895 ASC-39320D AHA-3985 AHA-4944UW AHA-4944W/4944UW AIC-7515 AIC-7560 AIC-7810C AIC-7821 AIC-7850P American Megatrends MegaRAID 428 MegaRAID 434 Compaq CISS CISSB HPFC-5166A Dell PowerEdge 2 /Si PowerEdge 3/Di PowerEdge 3/Si DEC 21554 HP HPFC-5200B Intel 31244 82371SB 82801CAM 6300ESB 82372FB/82468GX 82801DB/DBL 6300ESB 82443MX 82801DBM 6300ESB 82451NX 82801E 80960RP 82801AA 82801EB 82371AB/EB/MB 82801AB 82801EB/ER 82371FB 82801BA 82801ER 82371FB 82801BAM 82371MX 82801CA Recovery Solution Reference Guide 298 LSI Logic LSI53C1020/1030 LSI53C1035 LSIFC919 LSI53C1030ZC LSI53C1510 LSIFC929 LSI53C1035 LSIFC909 PDC 20277 PDC20268 PDC20319 PDC 20622 PDC20268R PDC20371 PDC20246 PDC20269 PDC20375 PDC20262 PDC20271 PDC20376 PDC20263 PDC20275 PDC20378 PDC20265R PDC20276 PDC20267 PDC20318 QLogic ISP 2300 QLA2100 QLA2200 Silicon Image Sil 0680 Sil 3114 Sil 3512 Promise Technology Sil 3112 Silicon Integrated Systems SiS180 Vitesse VSC7174 Caution RAID arrays must be configured on the supported RAID adapters prior to running any tasks. RAID controllers supported for Local Recovery HP SmartArray 641 SmartArray 5i Dell IBM NetRAID-2M CERC SATA 6ch PERC 4e/Si PERC 4/Di RAID PERC 4/DC RAID PERC 3/Di PERC 3/DC ServeRAID 3L RAID RAID controllers supported for server-based Full System Recovery HP SmartArray 641 SmartArray 5i Dell CERC SATA 6ch PERC 4e/Si PERC 4/Di RAID PERC 4/DC NVIDIA SATA 4 Silicon Image 3112A Recovery Solution Reference Guide 299 Index A of event log contents 204 access problems with 212 accounts for users 257 administration options 169 administrator 163 administrator settings 163 Administrator’s Guide 16 AeXRSEnc utility 279 Altiris Helpdesk 16 Altiris Monitor Solution 16 Altiris PC Transplant Solution integration with 152 overview 131 problems with 216 requirements for 132, 133 running 143 setup for 133 dial-up networking 175 disks for recovery 134 Distributed Component Object Model see DCOM 17 Distributed Component Object Model (DCOM) 255, 266 documentation 16 domain account 57 Domain Name System 176 DOS drivers and recovery 253 drive configuration changes 94, 95 full system recovery 17, 189 full system snapshot 158 command line 152 G groups for users 257 H Altiris Recovery Partition 17, 63, 64, 171 check for errors 171 manage 170 E hard disks formatting during Full System Recovery 144 encrypted files files and encryption 253 hard drives replacement of 213 B encryption 171 help 16 errors during Setup 206 hiding progress indicator 94, 94, 94, 95, 95, 95, 95 bandwidth 90 bandwidth throttling 90, 165 baseline snapshot 17 C CD-ROMs for recovery 134, 136 clearing the event log 204 clusters 14 command line and snapshots 147 configuration of DCOM 255, 266 of Full System Recovery 133 of IIS 261 of ODBC 265 connection troubleshooting 211 Event Details 198 event log clearing 204 configuration of 261 configuring 204 saving to file 204 event log file 194 event messages viewing 202 Event Viewer 197 searching 197 using 193 exclamation mark icon on protected computer 66 excluding files 183 excluding files from snapshots 81 F D files data defining for rollback 80, 91 migrating 129, 146 migrating using PC Transplant Pro 131 recovering 131 excluding from snapshots 81 protected 159 restoring 160 I installation 26 and new hard drives 213 errors 41 of Web-based file recovery 272 prerequisites 26 problems with 208 Recovery Agent 51 Recovery Agent Setup Wizard 54 Internet Information Server (IIS) 261 IP address of protected computers 277 L last snapshot 164 license 44 limits of recovery 132 of Recovery Solution 253 load balancing 14 local mode 14 files types restoring 180 Local Recovery 15 database errors installing 206 filters for rollback data 80, 91 log file 194 DCOM 17, 171, 255, 266 formatting hard disks during Full System Recovery 144 logs 170 DCOMCNFG.EXE 267 deletion Recovery Solution Reference Guide Local Recovery Pro 15 logon problems 212 Full System Recovery creating disks for 134 300 M manual snapshots 147 Microsoft Internet Information Server (IIS) 261 Microsoft Office 158 Microsoft Outlook 176 Microsoft SQL Server and ODBC 265 Microsoft Windows and recovery 137, 278 preferences Recovery Agent 173 prerequisites 26 problems with Agent installation 208 with Full System Recovery 216 with rollback 224 with Setup 206 with snapshots 213 product overview 13 Migrate utility 130 progress indicator hiding 94, 94, 94, 95, 95, 95, 95 migration using PC Transplant Pro 131 properties of file exclusion 82, 87 mirrored Blob files 14 protected computer 18 mixed mode 14 protected files 159 N protocols for DCOM communications 255 network and bandwidth 90 network configuration restoring 212 network protocols for DCOM communications 255 network settings 161 O Open Database Connectivity (ODBC) 265 operating systems temporary copies of 137, 278 options administration 169 for file exclusion 82, 87 for Full System Recovery 133 for recovery 134 performance 166 Recovery Agent 157, 157, 162 remote access 175 restore 165 options dialog box tabs 162 using 162 overview of Recovery Solution 13 overwriting logged events 204 P partial snapshot 18 running 159 Patch Management Solution 15 PC Transplant Solution 16 performance of recovery 255 of snapshots 254, 254 performance of 255 performance options 166 Recovery Solution Reference Guide R Real-Time System Manager 16 recovery 255 about 137, 277 and disk space 278 and DOS drivers 136, 253 creating disks for 134 over the Web 192, 272 problems with 216 requirements for 278 to a new computer 129, 146 Recovery Agent 18 existing account 57 Full System Recovery 174 installation 51 Installation Policies 48, 68 installation using Setup Wizard 54 installing 60 options 157 preferences 173 register 56 settings encryption utility 279 Recovery Agent options changing 162 viewing 157 Recovery Solution logs 170 Versions 160 Recovery Solution Server 58 Recycle Bin 253 Redundant Block Elimination (RBE) 278 Release Notes 16 remote access options 175 remote procedure call (RPC) RPC 255 removal of logged events 204 of Recovery Solution 44 requirements 26 restore command line 152 restore options 165 restore session 18 restoring file types 180 files 160 restoring files (see recovery) 277 restoring network settings 212 rollback 165 files 187 of network settings 212 problems with 224 rollbacks 18, 187 RSACmd.exe utility 152 S scheduled snapshots conditions 199 on idle 199 view schedule for 158 schedules for server jobs 274 for snapshots 212 worksheets for 274 SCSI drives and Full System Recovery 136 server limiting connections to 90 server-based mode 14 settings updates in database 277 setup for Full System Recovery 133 of Web-based file recovery 272 silent snapshots 94, 94, 94, 95, 95, 95, 95 snapshot command line 147 schedule 158 snapshot conditions 168 snapshot session 18 snapshot types 167 snapshots and recovery 131 displayed 159 excluding files from 81 from applications 147 performance of 254 problems with 213 scheduled 199 scheduling 199 silent 94, 94, 94, 95, 95, 95, 95 speed of 254 Software Delivery 15 Solution Center 35 301 SQL Server and ODBC 265 storage locations 180 T temporary operating systems 137, 278 throttling bandwidth 90, 165 troubleshooting 227 Agent installation 208 Full System Recovery 216 logon problems 211, 212 rollback 224 Setup 206 U uninstalling Recovery Solution 44 user accounts and groups 257 V version information 205 Virtual Private Network see VPN 19 VPN 19, 175 W Wake on LAN 81 Web-based file recovery 192, 272 Windows and recovery 137, 278 Windows Explorer perform snapshots through 158 wizards for web-based setup 53 worksheet job schedule 274 Recovery Solution Reference Guide 302