You are here: Source protection > Protecting your source

Protecting your source

Use the following instructions to set up your source protection.

  1. Click Protect data from the left navigation pane.
  2. Identify the source server that you want to protect.

  3. Click Next to continue.
  4. Identify the repository server that will store the source data or the image of the entire source.

  5. Click Next to continue.
  6. Select what you want to protect on the source.

  7. By default, Double-Take RecoverNow selects all applicable source files based on your system state or selected data only choice. By default for system state protection, some files are included and excluded depending on if they can be used during a recovery. For example, the boot volume cannot be excluded because that is where the system state information is stored. If desired, you can exclude other files that you do not want to protect, but be careful when excluding data. Excluded volumes, folders, and/or files may compromise the integrity of your applications.

    Volumes, folders, and files that are marked with a checkmark are included. If there is no checkmark, the item is excluded. Expand and collapse the directory tree and click on an item to add or remove a checkmark.

    The Select all and Deselect all buttons allow you to quickly select or deselect all data on your server based on your system state or selected data only choice. These buttons will do not change what is selected for the system state, which is defined by Double-Take RecoverNow and cannot be modified.

     

  8. Once you have configured the data to protect, click Next to continue.
  9. Snapshots—A snapshot is an image of data taken at a single point in time. A snapshot strategy gives you additional recovery options. In addition to being able to recover from live data, you can recover to a single point in time using a snapshot. Snapshots allow you to view files and folders as they existed at points of time in the past, so you can, for example, recover from cases where corrupted source data was replicated to the target. Double-Take RecoverNow offers the option to take application-consistent snapshots. An application-consistent snapshot is a point-in-time when all transactions are complete and data is in a good state. Data related to incomplete transactions is flushed out to data files. Application-consistent snapshots enable a fast reliable recovery. If you do not select this option, the recovery is reliable but may take more time. For more information about snapshots, see the Snapshots section in the Double-Take Availability User's Guide.

The application consistency feature is not supported for SQL Server 2000.

 

If you enable application consistency on Small Business Server (SBS) 2003 with Exchange Server, you must turn on the Exchange writer for the Volume Shadow Copy Service. By default, the setup program for SBS 2003 turns off the Exchange Server 2003 writer to prevent possible conflicts with NTBackup. To turn on the Exchange writer, refer to the instructions in the Microsoft Knowledge Base article at http://support.microsoft.com/kb/838183.

 

  1. Continuous data protection provides access to data from any point in time. A continuous data protection strategy gives you the additional option to recover to any point within the continuous data protection window. TimeData records every change made to the source image. With every change recorded on the repository server, recovery can occur from any point in time.

  1. Once you have configured the point-in-time strategy, click Next to continue.
  2. Select a location on the repository server to store the location of the source's data or image. The location you specify for Path prefix will automatically have the source server name appended to it, in order to distinguish the data or image from other data or images.

  3. Specify if you want to delete orphan files. An orphan file is a file that exists in the repository server's copy of the data or source image, but it does not exist on the source. An orphan file can be created when a job is stopped and file is deleted on the source. Because of the stopped job, the delete operation does not get replicated to the repository server. Orphan files may also exist if files were manually copied into the repository server's copy of the data or source image.
  4. Click Next to continue.
  5. At the Protection Summary page, you can review the choices you have made and you can also configure optional settings. If you need to make any changes to the selections you made, click Back to return to the previous pages. If you want to configure the optional settings, click Configure.
  6. Once you have completed your configuration, click Finish to establish your source protection. The Monitor jobs page will automatically appear with the new job.

Related Topics