Serving Minnesota, North Dakota, Idaho, California, Michigan and New Jersey Client Resources Help Desk


How do we control and monitor Protect?
At installation the Protect administrator console software is installed on as many or as few workstations as required and will require a valid logon, ensuring no unauthorized access. The Customer Administrator Console acts as your interface with Protect and enables the configuration of all backups and restores.

Is software installed on any other machines?
The Protect backup software is totally agentless, requiring no additional software to be installed on any machines to enable backup, be it Novell NetWare, Windows Microsoft® 2000, 2003, SQL or Exchange.

If Protect is agentless, how does it access our data?
From the administration console when a new backup set is created you must provide a username and password to connect to a server or workstation. Protect fully integrates with 2000, 2003 domains, Trusts and Novell® NDS trees.

Do we need to create a user for Protect on all our servers?
No, but a dedicated user is recommended and it should be set for no password expiry for obvious reasons. In a domain, or NDS environment, a user on each machine isn't necessary as one central user can be created with access to all the resources that require backing up.

What access permissions does this user require?
This user is responsible for backing up and restoring all the data on your network, it is essential that access permissions are of administrative equivalence. Protect can only backup data that this user can access. A less privileged user may be restricted, causing data to be missed.

How is the DS-Client connected to our network?
The DS-Client is ‘multihomed’, i.e. it has one network connection to your network and one connection to Corporate Technologies' network. This flexible approach allows Corporate Technologies to integrate fully with your current IP/IPX configurations.

Who installs the Protect service?
Corporate Technologies will install the DS-Client unit and the administrator console software at your site and provide the necessary training. The initial set up charge includes between 1 and 3 days set up support, depending on the service contracted for. If the installation is particularly complex or remote sites are involved, additional days on site support are available at a daily rate.

How is the first backup done, given that there will be a lot of data?
For large data volumes, the initial backup may be done to a portable unit, backing up at LAN speeds to a large array of disks. When the full backup of your data is complete, the disks are transported back to Corporate Technologies' Data Center. Future backups, which are purely incremental, will be transmitted via the leased line connection and synchronised with your initial backup data at the Data Center.

Setup of Initial Backup Sets and Schedules

Who does this?
As part of the installation training, Corporate Technologies will ensure that all your main servers are sensibly configured to ensure their optimum backup.

Who is authorized to use the administration software console?
Corporate Technologies will set up users with access to create and maintain backup sets and schedules. Only people with a user ID on the DS-Client will be able to administer its functions.

Can users administer backups for their own machines?
Multiple user accounts can be created for use on the DS-Client and access permissions can be set per backup set. These permissions can be any combination of Backup, Restore, Delete or Modify, so a particular user could be given access to backup and restore only their own machine.

What frequency of backup can be set?
The backups can be configured as often as every hour or as infrequently as once a year. More advanced schedule options include the last working day of the month or even one off backups on a particular date.

What level of granularity is possible in setting up the backup, i.e. file level/individual database?
A backup set can include a whole server, share/volume, directory or even a single file. The backup set could even include just a registry, should you desire.

Can one machine be prioritized over another?
There are literally hundreds of different priority levels that can be assigned, ensuring maximum flexibility when organizing your backup schedules.

Can multiple machines be backed up simultaneously?
Any number of machines can be backed up simultaneously. However, as network bandwidth is a major factor, Corporate Technologies would recommend 4 at once in a LAN environment. This could be increased in a WAN environment to take advantage of many slow external connections.

Can the software be set to stop backing up after a certain time has elapsed?
Yes, the software is designed to fit specific backup windows. Protect can be told what time to stop at, for example at 8:00am when employees are starting to arrive, or maybe by 5:00am if there is an important batch process to run.

Data Processing & DS-Client

Is data held on the DS-Client or does it pass straight through?
The DS-Client acts as a gateway only, passing data through after it has been compressed and encrypted, using delta blocking, common file elimination and a digital signature. A database showing information on what has been backed up is held on the DS-Client, but no actual data files are retained.

Is the Database on the DS-Client backed up?
Yes, by default the DS-Client backs it's own database up at 6:00am every morning, although this time can be changed if desired.

What happens if too much data is passed to the DS-Client?
The DS-Client only requests data as it can process it and will not pull more data across the network than can be processed.

What is common file elimination?
Common file elimination is one of the sophisticated ways that the DS-Client reduces the raw data from your network servers to a size that can be transmitted over the leased line. It ensures that the same data is never transmitted offsite more than twice, thereby saving the bandwidth to transmit only new, unique data. It achieves this simple elimination by generating a Checksum of each file as it is backed up and comparing it against the known details of all previous files. If the Checksum matches a previously backed up file, it must be a duplicate and only a shortcut need be transmitted up the line.

Due to the way this technique is applied, it does not matter if the files are on different servers, or even have different filenames - the DS-Client will still only transmit two copies.

What happens if a server stops or crashes during backup or if the backup is interrupted for some other reason?
If the backup is stopped, for whatever reason, it will simply continue onto the next backup in its schedule. It will not revisit the failed backup set until the next time it is set to run, e.g. the following night, at which point it will pick up where it left off. If however the problem has been rectified, and backup window allows, the backup can be restarted manually, immediately. Corporate Technologies has a dedicated team who monitor the progress of backup events 24 hours a day. If a problem occurs, it will be escalated through the appropriate channels.

Does the DS-Client hold a connection open to a server all the time?
No, the DS-Client will only connect to your servers during the specified backup schedule, therefore will not use valuable connection licence at other times.

How many versions of my backed up files are held off site?
By default, 7 versions of each backup are held. Unlike a tape backup, where the routine is to rotate tapes in a cycle, Protect will only backup a new version of a file when it has changed, guaranteeing that the customer is not wasting space backing up exactly the same version more than once. For example, if a file only changes once a month, we will have 7 months worth of that file. The number of versions stored can be configured on an individual backup set basis. Each backup set can be configured down to include just one file if desired, giving you the ability to maximise the efficiency of the storage.

What platforms are supported?

Protect has full agentless support for a range of network platforms.

  • NetWare 3 facilities include the ability to backup the bindery, where NetWare 4 and 5 include support for NDS.
  • Windows 2000, 2003 is fully supported. Basic workstations and servers can have the registry backed up, where more advanced environments will take advantage of being able to backup MS SQL and Exchange, without the need to stop the service or install an agent. Protect provides full support to backup workstations operating Windows 95/98 and its registry.

Can the software backup Permissions on files?
Yes, for Windows 2000, 2003 on NTFS volumes Protect can backup both Permissions and Streams. The Permissions and Extended NetWare Attributes can be backed up for NetWare. This is a configurable option in both NetWare and 2000, 2003 environments.

If the software is agentless, how is MS SQL and Exchange backed up?
Microsoft® developed SQL and Exchange with the backup requirement in mind. Both products can respond to API calls requesting the services to dump their data, whilst online, to an external destination. In Protect's case the product simply asks the specified MS SQL or Exchange server to stream the data to the DS-Client where it is delta blocked and transmitted offsite. This process is a totally supported Microsoft function and guarantees compatibility with your existing MS systems. This adhesion to Microsoft standards does however prevent us from restoring individual Exchange mailboxes as this is not a function Microsoft have ever supported.

Can Protect run pre and post commands on servers?
Yes, even though Protect is an agentless solution, it is still capable of running commands on remote servers, be it NetWare or NT. For example, shutting down a database or application running on a server to back it up correctly and restart afterwards, or perhaps interact with some overnight batch processing.

How does Protect handle open files?
Open files are an issue in most backup environments. If a file is open exclusively on a workstation, it is the server's responsibility to stop anyone else, including a backup package, accessing that file.

To help counteract these issues Protect has a range of options which attempt to handle open files. These options, combined with use of the Pre and Post commands, should enable the backup of almost any file. More complex environments such as Oracle or Sybase can usually be configured to dump their data into a normal file which will be delta blocked and backed up as normal.

Compression, Encryption and Security

How and to what standard is the data encrypted?
The small files and delta blocks of data are first compressed and then encrypted with DES, using a 56bit key, which is set by the customer during the installation of the DS-Client. This key is unknown to Corporate Technologies and the data remains encrypted at all times, even when stored offsite. The backup data is only unencrypted by the DS-Client at your site when it has retrieved the encrypted data from Corporate Technologies' Data Center for a restore.

What do you mean by compression? What happens?
Compression can be likened to letting the air out of a balloon. Although the air has gone, the structure still exists and it can be re-inflated easily. The advantage is that it takes less room. Files, especially databases, are often full of empty space, which can be removed to make the file smaller for transit, whilst making it very easy to recreate.

Is there added compression on already compressed files (e.g. zip files)?
Zip files and other compressed files are already efficiently compressed. Protect cannot improve on the compression, but the file will only be transmitted once. If the file should change, then delta blocking will be used to ensure only the changed portions of the file are retransmitted.

What is delta blocking? How does it work?
Delta blocking is an advanced logic that divides all files into 4K blocks. When the file is detected to have changed, the Checksum of each 4K block is compared against the last known Checksum for the same block of the same file (stored in the database on the DS-Client). Any blocks that are different are pulled out to be re-transmitted. These delta blocks will also be compressed and encrypted before transmission.

Transmission Off-Site

How quickly will the data be transmitted over the leased line?
A 2Mb leased line will backup at approximately 200K/sec, however, this data is compressed bringing the effective backup speed to nearer 400K/sec. In real terms, this equates to a transfer rate of approximately 20Gb per day of compressed data (40Gb per day uncompressed). At this stage the data has also been delta blocked and 'common file eliminated' to ensure that only new data is backed up.

Is the leased line connection secure?
The Protect service utilizes private leased line connections and all backup data is compressed and encrypted as described above, prior to transmission offsite. Additionally, all network traffic across the private leased line is triple 56bit DBS encrypted. This is infinitely more secure than many current backup policies, e.g. 3rd party couriers taking the tapes offsite, onsite storage where tapes are left in cupboards overnight or backup data being sent offsite via the public Internet.

Do we need to install a firewall?
No, Corporate Technologies has a firewall installed in the DS-Client unit. There is also a corresponding firewall at Corporate Technologies' Data Center in order to protect the private leased line connection between Corporate Technologies and you.

What happens if the leased line breaks?
As part of the Protect solution, Corporate Technologies will install an ISDN line in addition to the leased line. In the event of a line failure, this secondary route will allow Corporate Technologies to immediately diagnose and escalate the problem. Should a prolonged failure occur, we could deliver the back end system to site to allow backup and restore to continue.

Does all of our data get transferred every day?
Only new and unique data will get backed up. Duplicate or unchanged files will not be transmitted.

At what point is the data deemed to be backed up and offsite?
The data is backed up in real time, so when the administration console indicates that the backup is complete - it is also an indication that the backup data offsite.

Offline Storage at Corporate Technologies

What format is the data held in, i.e. on disk or tape?
The data is held on disk for rapid access times and is additionally backed up to automated tape libraries.

Is it secure and separate from other customers’ data?
All customers have separate system units at the Data Centres. Authentication is performed between the relevant DS-Client and system unit each time they connect to re-verify the authenticity of the DS-Client. Additionally, the backup data is held encrypted, using the customers' unique keys, so anyone else would be unable to read it.

Restoring Data

At what point is the data available for restore?
The data is available for restore immediately after it has been backed up and is held offsite.

Can an individual file or registry be restored?
Yes, you can restore an individual file or registry and also specify which version you want to restore.

Can Protect perform bare-metal restores?
Assuming that the machine in question has had a full backup of all files and registry and the data is being restored to a machine of similar hardware, then a full disaster recovery of that machine is very simple.

After installing the operating system, there is no need to apply service packs, configure domain security or install additional software to the new machine, as all this information will be included in the restore.

Can you restore a whole backup set to a point in time, e.g. last Monday?
Yes, Protect will display all the files that were backed up on any given day. Providing the backed up files have not been deleted by an administrator or overwritten by more recent versions, then it is possible to restore from any given date.

How quickly will data restore over the leased line?
A 2Mb leased line will restore at approximately 200K / sec, however, this data is compressed, bringing the effective restore speed to nearer 400K / sec. Additionally, as all the data is held offsite on disk, the access time for the data is virtually nil. A traditional tape restore scenario may take at least half an hour to locate, insert and catalogue the tape.

What if the leased line is congested with backup data?
The leased line is bi-directional, i.e. there is 2Mb each way. The restore data is transmitted down the line, whilst backup data transmits up the line. There will be very little, if any, conflict between the two. Typically backups occur 'out of office hours' while restores are required during the working day, however it is possible to perform both restores and backups simultaneously if desired.

What happens if the file or group of files to be restored is too large, i.e. it will take too long to transfer back to the DS-Client?
A threshold point will have been agreed, whereby the time taken for a specified amount of data to be restored down the wire, will take longer than it would for Corporate Technologies to remove it from the Data Centre and transport the disks manually to your site.

If this threshold is reached, Corporate Technologies will ship the data direct to your site and restore at LAN speeds. This threshold depends on the amount of data to transmit and the bandwidth of line installed.

Can data be restored to a different machine on our network?
Yes, the restore data can be redirected as desired. You are able to browse the network and provide connection credentials for the redirected restore, just as you do for creating the initial backup set.

Disaster Recovery

Can we prioritize which data is restored in the event of a disaster?
Yes, you can select easily which files/directories/servers you wish to restore. There is no need to restore non-essential data until a later time if desired.

What happens if the DS-Client and/or the whole site is lost?
Corporate Technologies can interact closely with your disaster recovery plan, providing a portable unit of disks, holding your data and a new DS-Client to any required site in the UK. This site may even be the site of your disaster recovery company. This combination of portable unit and new DS-Client can enable LAN speed restores to reconstruct servers and workstations

Can we perform a test re-build of the DS-Client and data restore?
Yes, this is possible, however it would be deducted from your number of free disaster recoveries remaining in that period.