Showing posts with label Symantec. Show all posts
Showing posts with label Symantec. Show all posts

09 December 2013

Backup Exec Backup-to-Disk Best Practices

Requirements for creating a backup-to-disk folder:

Backup-to-disk folder can be created in any of the following locations: 
  • NTFS partitions (local or remote) and External USB Hard Drives.
    • The backup-to-disk folder must exist on an NTFS partition for backup jobs in which the Granular Recovery Technology(GRT) option is selected. This option is available for Microsoft Exchange databases and storage groups, Microsoft Active Directory, Microsoft Hyper-V machines, VMware Virtual Machines, and Microsoft SharePoint content database and Team database.
  • Distributed File System (DFS) shares. 
  • FAT/FAT32 partitions(local or remote). 
  • Veritas Volume Manager partitions. 
  • RAID drives with any configuration. 
  • NFS volumes.
  • Network Attached Storage (NAS) devices.
    • If a NAS device is emulating a Windows operating system, contact the NAS manufacturer for assistance before creating backup-to-disk folders on the NAS device. Symantec does not certify NAS devices. If the operating system is a proprietary operating system and not a true Windows operating system, Symantec cannot properly troubleshoot the device.

Recommendations for the "Backup to Disk" feature:

Minimizing Fragmentation:
  • Avoid hosting multiple backup-to-disk folders on the same volume.
  • Minimize the number of concurrent backup operations. Allow only one operation for maximum control.
  • Maintain at least 30 percent free space, and avoid allowing the disk to become completely full.
  • Avoid hosting other applications on the same volume.
  • To prevent fragmentation a regular defragment operation should be performed on all backup-to-disk volumes.
  • Maintain 10% or less total volume fragmentation.
  • Perform a CHKDSK on the volume.
Performance:
  • Do not allocate the maximum size of the backup-to-disk files when performing a GRT enabled backup.
  • All backup-to-disk locations should be excluded from antivirus/antispyware scans.
  • Destination drives that are setup with RAID 5 can show degraded performance. RAID 10 has been shown to significantly improve overall performance. In some cases, RAID 10 offers faster data reads and writes than RAID 5 because it does not need to manage parity.
  • Use high RPM drives in all backup-to-disk volumes for best performance.
  • Maximize the available memory. The amount of available memory will impact backup speed. Insufficient memory, improper page file settings, and a lack of available free hard disk space will cause excessive paging and slow performance.
  • Do not use Microsoft Windows compression or encryption on the volumes hosting the backup-to-disk folder.
  • Experiment with the options for buffered reads and buffered writes. Enabling these options may increase backup performance depending on the underlying disk structure implemented.

Guidelines:
  • All Backup to Disk jobs should be overwrite operations.
  • Calculate disk space requirements before assigning a disk space threshold.
  • Create a separate backup-to-disk folder specifically for all GRT enabled backup jobs. Note: Backup Exec 2012 enforces one disk storage device per Windows volume, as such this will need multiple volumes
  • Erase media from the Backup Exec console do not use Windows Explorer to delete Backup Exec data, unless it has already been properly removed from the application. For more information on deleting media properly please review the related articles section.
  • The size of Backup to disk files should not be set larger than 4GB.  This is the default size for backup-to-disk files in all current Backup Exec releases.  The larger the file size the more data is exposed when that file is corrupted.
  • USB/eSATA drives are not removable media, and should not be used as such.
   
Note:- For more information please refer to the Administrator’s guide and/or Hardware Compatibility List(HCL) pertaining to the Backup Exec version being used.

References:
http://www.symantec.com/business/support/index?page=content&id=TECH164267

27 September 2013

Symantec Endpoint Protection Manager Logs Are Huge

Recently a server's OS drive filled up very quickly before I realised that I had not turned on log truncation in Symantec Endpoint Protection Manager (SEPM). As soon as I performed a truncation and set SEPM to do it every four hours, all was well with the server.

To do this complete the following:

  1. Log in to the SEP Manager.
  2. Click Admin and select Servers.
  3. Select the localhost under Servers.
  4. Under Tasks, Select Edit Database Properties.
  5. In the General tab under Database Maintenance Tasks.
  6. Select the checkboxes next to Truncate the database transaction logs and Rebuild Indexes.
  7. Click OK to apply the changes.



References:
http://www.symantec.com/connect/forums/symantec-endpoint-protection-db-log-problem

12 February 2013

Symantec Endpoint Protection Has Detected Pending Changes

When installing Symantec Endpoint Protection, sometimes you will see an error message that "Symantec Endpoint Protection has detected that there are pending system changes that require a restart", but a restart does not fix the issue.

In that case, do the following:
Delete the registry key: "PendingFileRenameOperations" in "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager".

References:
http://www.symantec.com/connect/forums/win7-issue-symantec-endpoint-protection-has-detected-there-are-pending-system-changes-require

08 January 2013

Symantec Endpoint Protection Manager 11 - Unable to Communicate with Reporting Component

  • If you are on a 32-bit OS, skip the next step.
  • If you are on a 64-bit OS, first go to 32-bit ODBC Control Panel. To do this do the following:
Go to %systemroot%\Windows\SysWoW64 folder (Example - Click Start -> Run -> C:\Windows\Syswow64 and click on OK)
Locate Odbcad32.exe & double click on the file
Click on System DSN Tab
You will find the "SymantecEndpointDSN" listed in the window.
Now click on the CONFIGURE button and proceed with the configuration of the DSN for the Symantec Endpoint Protection Manager 
  • Open ODBC (using instructions above if on a 64-bit OS), then do the following:
Select Configure on the SymantecEndpointSecurityDSN 
Under the LOGIN tab set it to Supply User ID and password and type:
User ID: dba
Password: Login password to the SEPM 
Under the DATABASE tab configure these options:
Server Name: Name of Server
Database Name: sem5 (if you are using the embedded database) 
Under the NETWORK tab configure these options:
Check TCP/IP and enter: "host=IPAddressofServer" without the quotes. 
Now test connection. You should receive Connection Successful.

References:

Symantec Endpoint Protection Manager Database Will Not Start

If Symantec Endpoint Protection Manager v11 embedded database does not start, try the following:

The below article describes how to recreate the embedded database's log file:
http://www.symantec.com/docs/TECH169664
A SEP11 version of the steps is:
Go to "C:\Program Files\Symantec\Symantec Endpoint Protection Manager\db\" and rename sem5.log to sem5.log.old
Click Start, click on Run and Type "CMD" then click OK
In the Command Prompt type: "CD C:\Program Files\Symantec\Symantec Endpoint Protection Manager\ASA\win32\" and press Enter this will change directories to the folder containing dbsrv9.exe.
To force the recreation of sem5.log. Type: "dbsrv9 -f "C:\Program Files\Symantec\Symantec Endpoint Protection Manager\db\sem5.db" and press Enter
Click Start, click on Run and Type "services.msc" then click OK and start the Symantec Embedded Database Service
Start the Symantec Endpoint Protection Manager service.
Don't forget to adjust the paths if your SEPM is on a 64bit OS


References:
http://www.symantec.com/connect/forums/embedded-database-will-not-start