Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module 15 Managing Windows Server® 2008 Backup and Restore.

Similar presentations


Presentation on theme: "Module 15 Managing Windows Server® 2008 Backup and Restore."— Presentation transcript:

1 Module 15 Managing Windows Server® 2008 Backup and Restore

2 Module Overview Planning Backups with Windows Server 2008 Planning Backup Policy on Windows Server 2008 Planning a Server Restore Policy Planning an EFS Restore Policy Troubleshooting Windows Server 2008 Startup

3 Lesson 1: Planning Backups with Windows Server 2008 Process for Planning Backup in Windows Server 2008 Creating the Data Retention Plan Backing Up Encrypted Files and Virtual Machines

4 Process for Planning Backup in Windows Server 2008 List the data to back up: Consider backup size Consider time taken to back up or restore List the data to back up: Consider backup size Consider time taken to back up or restore Create a backup schedule Choose a backup type Choose the backup medium: How long will backups be kept? Where will backups be stored? Choose the backup medium: How long will backups be kept? Where will backups be stored?

5 Creating the Data Retention Plan How long must you keep data? Legal requirements Media lifetime How long must you keep data? Legal requirements Media lifetime Where is the data stored? What is the cost of data storage? What software tools can assist data retention?

6 Backing Up Encrypted Files and Virtual Machines Back up encrypted files: Back up encrypted data Recover encrypted files Recover lost encryption keys Back up virtual machines: Select a virtualization backup strategy:  Snapshots  Manually back up.vhd and.vmc files  Run backup in a virtual machine

7 Storage and Security Considerations ConsiderationDetails Backup storage security Store in secure location Available to authorized personnel only Restore operators Who can restore data from backup? Who can access backup media? Consider using ACLs or encryption to restrict access Confidential data Plan for backing up encrypted data Different authorized personnel from other backups IT staff leaving procedure Remove access to backup and restore Rescind physical and system access

8 Lesson: Planning a Server Restore Policy Considerations for a Server Restore Impact of a Server Restore Improving the Backup Plan Change Management Considerations Restore Logs Restore Options Security Analysis Updating Backup Policy

9 Considerations for a Server Restore Considerations for a server restore: Total server failure File restore Impact on operations Impact on service-level agreements Number of users affected Total server failure File restore Impact on operations Impact on service-level agreements Number of users affected

10 Change Management Considerations Data owners Emergency changes Impact of data restore User restore capabilities Data owners Emergency changes Impact of data restore User restore capabilities

11 Security Analysis Granting the right to restore files:  Restrict the right to restore files  Backup Operators group  Administrators Post-restore tasks: Authorized user access Unauthorized user access Granting the right to restore files:  Restrict the right to restore files  Backup Operators group  Administrators Post-restore tasks: Authorized user access Unauthorized user access

12 Lesson: Planning an EFS Restore Policy Considerations When Restoring EFS Data Requirements for EFS Recovery Preparing to Recover EFS Files Managing the Recovery Agent Recovering EFS Files

13 Considerations When Restoring EFS Data Data restore Original keys Key security Data recovery agents Data restore Original keys Key security Data recovery agents

14 Requirements for EFS Recovery Key recovery:  Active Directory  Backup  Data recovery agents Key recovery:  Active Directory  Backup  Data recovery agents Group Policy Smart cards Private key lifetime Group Policy Smart cards Private key lifetime

15 Preparing to Recover EFS Files

16 Managing the Recovery Agent Store DRA key offline Export and delete private key Give additional users access Data recovery agent policy Store DRA key offline Export and delete private key Give additional users access Data recovery agent policy

17 Recovering EFS Files Import DRA key Open EFS encrypted files Import DRA key Open EFS encrypted files Data Recovery Best Practices:  Deploy PKI  Use more than one DRA per domain  Store private keys for DRAs on separate medium Data Recovery Best Practices:  Deploy PKI  Use more than one DRA per domain  Store private keys for DRAs on separate medium

18 Lesson: Troubleshooting Windows Server 2008 Startup Reviewing Startup Processes Being Prepared for Startup Failures Troubleshooting Startup Before the Windows Logo Appears Troubleshooting Startup After the Windows Logo Appears Troubleshooting Startup Problems After Logon Recovering from Hardware Problems

19 Reviewing Startup Processes Windows Server 2008 startup sequence: Power on self test (POST) 1 1 Boot loader 3 3 Initial startup 2 2 Detect and configure hardware 4 4 Logon 6 6 Load kernel 5 5 Plug and Play device detection 7 7

20 If failure does occur, recover operating system or full server using a Windows Setup disc and a backup created with Windows Server Backup Windows Setup disc enables you to access the System Recovery Options page in the Windows Recovery Environment (WinRE) If failure does occur, recover operating system or full server using a Windows Setup disc and a backup created with Windows Server Backup Windows Setup disc enables you to access the System Recovery Options page in the Windows Recovery Environment (WinRE) Being Prepared for Startup Failures Use Windows Server Backup to create and schedule backups Preventative measures: Protect the operating system with current Windows Updates and antivirus signatures Follow vendor recommendations for hardware maintenance Familiarize yourself with advanced boot options (F8 on startup): Safe Mode Last Known Good Configuration Boot Logging Protect the operating system with current Windows Updates and antivirus signatures Follow vendor recommendations for hardware maintenance Familiarize yourself with advanced boot options (F8 on startup): Safe Mode Last Known Good Configuration Boot Logging

21 If startup fails before Windows Server 2008 logo appears on screen: Troubleshooting Startup Before the Windows Logo Appears Edit boot configuration with BCEdit Does product logo appear? Product logo appears Does product logo appear? Use Startup Repair to Repair boot sector and MBR Replace startup files Does product logo appear? Troubleshoot as hardware problem No Yes No Yes No

22 If startup fails after Windows Server 2008 logo appears on screen: Troubleshooting Startup After the Windows Logo Appears Start with Last Known Good Configuration Does LKGC resolve the problem? Enable boot logging and start in Normal mode, then restart in Safe Mode Does computer start in Safe Mode? Review Event Viewer and boot log to isolate problem Does system start in Normal mode? Use Device Manager to fix driver System starts successfully Did you identify a failing driver? Use System Configuration Utility to disable failing services Start Windows Recovery Environment Analyze boot log to isolate problem Disable problematic drivers No Yes No Yes No

23 Recovering from Hardware Problems Hardware related troubleshooting can involve: Checking your hardware Reviewing the hardware configuration in Windows Simplifying your hardware configuration Resolving shutdown issues Diagnosing disk related problems


Download ppt "Module 15 Managing Windows Server® 2008 Backup and Restore."

Similar presentations


Ads by Google