DLOAdminGuide en 7 6
DLOAdminGuide en 7 6
Option 7.6
TM
Administrators Guide
Disclaimer
The information contained in this publication is subject to change without notice. Symantec Corporation makes no
warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability
and fitness for a particular purpose. Symantec Corporation shall not be liable for errors contained herein or for
incidental or consequential damages in connection with the furnishing, performance, or use of this manual.
Legal Notice
Copyright 2014 Symantec Corporation. All rights reserved.
Symantec and the Symantec Logo, NetBackup, Veritas, and LiveUpdate are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (Third Party Programs). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement accompanying the Software
does not alter any rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for
more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and
decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without
prior written authorization of Symantec Corporation and its licensors, if any.
THEDOCUMENTATIONISPROVIDEDAS ISANDALLEXPRESSORIMPLIEDCONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE
HELD TO BELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL OR
CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT
NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212
and subject to restricted rights as defined in FAR Section 52.227-19 Commercial Computer Software - Restricted
Rights and DFARS 227.7202, Rights in Commercial Computer Software or Commercial Computer Software
Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely
in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
www.symantec.com
Third-Party Copyrights
Douglas C. Schmidt and his research group at Washington University and University of California, IrvineCopyright
citation.
ACE (TM) is copyrighted by Douglas C. Schmidt and his research group at Washington University and University of
California, Irvine,
Copyright (c) 1993-2002, all rights reserved.
Maarten Hoeben
ReportCtrl.h 2.0.1
Ronald L. Rivest
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the RSA Data Security, Inc. MD5
Message-Digest Algorithm in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as derived from the
RSA Data Security, Inc.MD5 Message-Digest Algorithm in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the
suitability of this software for any particular purpose. It is provided as is without express or implied warranty of any
kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Wei Dai
Compilation Copyright (c) 1995-2003 by Wei Dai. All rights reserved.
This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any
particular file in the package.
The following files are copyrighted by their respective original authors, and their use is subject to additional licenses
included in these files.mars.cpp - Copyright 1998 Brian Gladman.
All other files in this compilation are placed in the public domain by Wei Dai and other contributors.
I would like to thank the following authors for placing their works into the public domain:
Joan Daemen - 3way.cpp
Leonard Janke - cast.cpp, seal.cpp
Steve Reid - cast.cpp
Phil Karn - des.cpp
Michael Paul Johnson - diamond.cpp
Andrew M. Kuchling - md2.cpp, md4.cpp
Colin Plumb - md5.cpp, md5mac.cpp
Seal Woods - rc6.cpp
Chris Morgan - rijndael.cpp
Paulo Baretto - rijndael.cpp, skipjack.cpp,
square.cpp
Richard De Moliner - safer.cpp
Matthew Skala - twofish.cpp
Permission to use, copy, modify, and distribute this compilation for any purpose, including commercial applications, is
hereby granted without fee, subject to the following restrictions:
1. Any copy or modification of this compilation in any form, except in object code form as part of an application
software, must include the above copyright notice and this license.
2. Users of this software agree that any modification or extension they provide to Wei Dai will be considered public
domain and not copyrighted unless it includes an explicit copyright notice.
3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free,
and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE
SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED AS IS WITHOUT EXPRESS OR IMPLIED WARRANTY
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER
CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
4. Users will not use Wei Dai or any other contributor's name in any publicity or advertising, without prior written
consent in each case.
5. Export of this software from the United States may require a specific license from the United States Government. It is
the responsibility of any person or organization contemplating export to obtain such a license before exporting.
6. Certain parts of this software may be protected by patents. It is the users' responsibility to obtain the appropriate
licenses before using those parts.
If this compilation is used in object code form in an application software, acknowledgement of the author is not required
but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but
would also be appreciated.
Stac Electronics
Copyright (C) Stac Electronics 1993, including one or more U.S. patents No. 4701745, 5016009, 5126739 and 5146221
and other pending patents.
Birdstep Technology, Inc.
Copyright (c) 2001 Birdstep Technology Inc. All rights reserved.
Contents
Chapter 1
6 Contents
Chapter 2
Contents
Chapter 3
8 Contents
Contents
Chapter 4
10 Contents
Chapter 5
Chapter 6
Troubleshooting
Contents
Chapter 7
Accessibility
11
12 Contents
Chapter
DLO Components
DLO contains the following components:
14
DLO Database
Create profiles for groups of users or computers. Profiles enable you to control
the desktop users level of interaction with the Desktop Agent, define the types
of files that can be backed up, set the schedule for backups, and configure
additional settings for the Desktop Agent.
Create network user data folders. Network user data folders are locations on the
network where data from desktops is stored.
Create Automated User Assignments that determine the DLO Storage Location
and profile to which users are assigned when they install the Desktop Agent.
Note: Automated User Assignments are not used if users are manually added to
DLO.
Add users manually to DLO. Instead of using Automated User Assignments, you
can manually add users to DLO and assign a profile and storage location to them.
This is particularly useful when network shares already exist for storing user
data. Users can be added individually or multiple users can be added at the same
time by importing the user names from a list.
View history log files, receive alerts, and restore files to a desktop from the
Administration Console.
DLO Database: DLO database contains details related to the deployment of DLO
components. For example, where the database is installed (on a remote or host
computer), where the maintenance server exists, and so on.
Dedupe Database: Dedupe database is the data store used by Dedupe Server for
persisting the Dedupe related configuration and the Global Hash Table.
The Dedupe database is always installed on the same server as the DLO database
in all the supported configurations of DLO.
15
16
Multi-level Administrators
The administrator can create multiple sub administrators and grant or deny some
privileges. For more information, see Create and Configure Individual Accounts to
Manage DLO Permissions on page 34.
CPU Priority
The CPU priority can be set to control the performance of the Desktop Agent so that
backup jobs are performed without interrupting other applications.
17
18
New Reports
The following new reports are available in this version of DLO.
Storage Statistics: This report shows the storage savings after deduplication in a
specified interval of time.
Garbage Collection History: This report provides information about when the
garbage collection process was run and the amount of disk space reclaimed in a
specified interval of time.
Last Successful Backup Time: This report shows the last successful backup time
and the number of files pending for network and local backup after the recent
successful backup.
Table 1-1
Pre-installation considerations
Item
Description
Database Selection
19
20
Time Synchronization All computers running the DLO Administration Console or the
Desktop Agent should be set to a common time. This can be
accomplished by configuring the Windows Time Synchronization
service on the network. See www.microsoft.com for more
information.
Firewalls
Description
Processor
Xeon compatible
Memory
Disk space
Description
Processor
Xeon compatible
Memory
21
22
Disk space
Description
Operating system
CPU
Processor
Xeon compatible
Memory
Required: 4 GB RAM
Recommended: 8 GB or more for better performance
Disk space
Description
Operating system
CPU
Processor
Xeon compatible
Memory
Required: 4 GB RAM
Recommended: 8 GB or more for better performance
Disk space
Click Next.
Read the license agreement, and if you accept the terms, select I accept the
terms in the license agreement.
Click Next.
DLO Database Service: Installs the DLO database and Dedupe database.
Note: You can select and install each component on a separate computer, except
the DLO Database Service.
6
To install DLO in a different directory, click Change, select the new directory, and
click OK.
Click Next.
Click Next.
23
24
11 Click Next.
12 Enter the account credentials, which will be used to create DLO Storage
Locations. For more information about user accounts and privileges, see User
privileges for installing and managing DLO on page 19.
13 Click Next.
14 Click Install to begin the installation.
Copy the SqlExpress folder available within the DLO 7.6 install package to your
local machine.
Navigate to the path where SQL utility has been copied on the local machine and
run the DLOInstallSQLServerU.exe utility depending on the server machine
bitness.
Example:
DLOInstallSQLServerU_x64 I SQL UN narmada\administrator
Once the SQL server instance name and the user name is provided, there will be
a prompt for the password.
25
26
The Instance name and the credentials provided in the command will be taken
during SQL Server Installation.
Related Topics
-SetRecoveryPwd command on page 273
-EmergencyRestore command on page 273
Deployment
Method
Description
Send a hypertext link to the install files or include the install files as
an attachment.
Web page
Logon scripts
System Center
Configuration
Manager (SCCM)
CD-ROM
27
28
In the Desktop Agent setup directory, open the SETUP.INI file for editing.
Modify the value that begins CmdLine= /qf. The following options are
available.
Desktop Agent
installation interface
Modify the /qf term to change the interface that the Desktop
Agent user sees during installation of the Desktop Agent.
/qf
The full user interface is displayed, and a cancel button
is provided.
/qb
A basic progress dialog is displayed and the cancel
button is enabled.
/qb!
A basic user interface displayed. There is no cancel
button.
/qn
The installation will be silent installation.
Note: For a completely silent install, you must run the
setup.exe /s after modifying the SETUP.INI file.
Suppress Reboot
Logging Options
Examples:
For a silent installation, edit CmdLine in the SETUP.INI file as follows:
Original:
CmdLine=/qf DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1
/l*v %TEMP%\DLOAgentInstall.log
Modified:
CmdLine=/qn DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1
/l*v %TEMP%\DLOAgentInstall.log
For an installation with a basic interface but no option to cancel the installation, edit
CmdLine in the SETUP.INI file as follows:
Original:
CmdLine=/qf DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1
/l*v %TEMP%\DLOAgentInstall.log
Modified:
CmdLine=/qb! DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1
/l*v %TEMP%\DLOAgentInstall.log
*.mst
*.cab
DLOBuildInfo.ini
*.msi
Run the msiexec command using, as a base, the value in setup.ini from the
cmdline key:
29
30
DLODBINSTANCENAME
LAUNCHCLIENT
TRANSFORMS
1033.mst
TRANSFORMS should be set to one of the mst files, according to the language
used by the desktop user:
1031.mst = German
1033.mst = English
1034.mst = Spanish
1036.mst = French
1040.mst = Italian
1041.mst = Japanese
1042.mst = Korean
2052.mst = Chinese (PRC) (Simplified)
1028.mst = Chinese (Traditional)
1046.mst = Portuguese Brazilian
1049.mst = Russian (Russia)
The specification of the TRANSFORMS property is required, and will affect the
installer user interface and the start menu shortcuts. The DLO Agent is installed
with support for all eleven languages, regardless of the transform chosen.
MSI 4.5 is required on the target systems. The MSI 4.5 (KB942288-v4) installer is
included in the following file:
\\<servername>\DLOAgent\WindowsInstaller.exe
Push Install Desktop Agent and Push Install DLO Maintenance Server
You can install either the Desktop Agent or the Maintenance Server on a remote
computer using the push install feature.
Prerequisites
To push-install DLO Desktop Agent to a computer that runs Symantec Endpoint
Protection (SEP) version 11.0 or later, you must configure SEP to share files and
printers. The file and printer sharing feature is turned off by default.
From the DLO Administration Console, you can install the following on remote
computers:
Note: You can either push-install multiple Desktop Agents or Maintenance Servers
at a time, but you cannot combine both the options.
Click Add.
31
32
Click OK.
User Name: Enter the user name for an account that has administrator
rights on the remote computer.
Password: Enter the password for an account that has administrator rights
on the remote computer.
Domain Name: The domain name is displayed based on the domain name
you have entered in Manual Entry of Remote Computer Name.
Repeat steps 4 to 6 if you want to install the components on some more remote
computers.
You can also import the list of IP addresses of remote computers. To import the
list, do the following:
Select the specific .txt file that contains all the IP addresses of remote
computers.
Note: To generate a .txt file that contains the list of Desktop Agent machines,
run the DLOCommandu.exe -ListMachines command. For more information,
see -ListMachines command on page 288.
Click Add List. The IP address or the computer name is displayed in the
Computer panel.
Click the computer name or IP address and enter the details in these fields:
User Name: Enter the user name for an account that has the
administrator rights on the remote computer.
Domain Name: Enter the same domain name that you had entered in
Manual Entry of Remote Computer Name.
Click OK.
10 Click Install.
Based on the component (Desktop Agent or Maintenance Server) you have
selected, the remote Desktop Agent or Maintenance Server is added.
11 To exit the wizard, click Finish.
To remove the remote Desktop Agent or Maintenance Server from the list
1
Click Remove.
A Confirmation Window is displayed with the message: Do you want to Delete:
<Component>.
Note: <Component> refers to either Remote Desktop Agent or Maintenance
Server, depending on the component you want to delete.
Click Yes.
The component is deleted from the list.
33
34
On the DLO navigation bar, select the Network menu, and select Administrator
Accounts.
To add a new DLO administrator account. click Add. Continue with step 3.
Note: The main administrator account cannot be edited or removed. The Edit
and Remove buttons are disabled for this account.
3
Description
Notes
Edit Permissions
Add/Modify Profile
Add/Modify Users
Click OK twice.
On the DLO navigation bar, select the Network menu, and select Administrator
Accounts.
The Administrator Account Management window appears.
Click Permissions.
Select the Use domain groups to manage access to network user data folders
check box.
Note: When the Use domain groups to manage access to network user data
folders option is selected, domain groups are listed on the Administrator
Account Management dialog. When this option is not selected, individual user
accounts are once again listed. If you change from one type of account
management to another, the previous settings are retained for future use. For
example, if you have a list of individual DLO administrators and then you
change your configuration to use domain groups instead, the list of individual
accounts is saved and will once again be used if the Use domain groups to
manage access to network user data folders option is not selected.
Click OK twice.
35
36
In the Properties pane, under New Profile Defaults, click User Settings.
Set the profile user settings options as explained in Profile User Settings
options on page 79.
Set the profile schedule options as explained in Profile User Settings options
on page 79.
Under New Backup Selection Defaults in the Properties pane, click Revisions
and set backup selection revision options as described in Backup Selection
Revision Control tab options on page 105.
In the Properties pane under New Backup Selection Defaults, click Options.
Table 1-3
Description
Disable
All Desktop Agents
Alerts to users
Reports
37
38
Description
Other
Time to auto-refresh Administration
Console
Description
Low
Normal
High
Storage Threshold
Desktop Agent low disk error threshold Enter a value. Desktop Agent stops writing to the
desktop user data folder when the available disk
space drops below this level, and an error message
is displayed.
The default value is 3 %
Desktop Agent low disk warning
threshold
39
40
Description
In the Properties pane under Global Settings, click Desktop Agent Intervals.
Set the Desktop Agent interval defaults. Table 1-4 describes the options.
Table 1-4
Option
Description
Option
Description
41
42
Option
Description
In the Properties pane under Global Settings, click User Activity Settings.
Select a unique port number for the DLO database and then use svrnetcn.exe
to set the new port number.
On computers that run the DLO Administration Console from outside the
firewall, create the following registry key as a DWORD value if it does not exist
and set the DBUseTCP flag to 1:
HKLM\Software\Symantec\Symantec DLO\AdminConsole\DBUseTCP
On computers that run the Desktop Agent from outside the firewall, create the
following registry key as a DWORD value if it does not exist and set the
DBUseTCP flag to 1:
HKCU\Software\Symantec\Symantec DLO\Client\DBUseTCP or
HKLM\Software\Symantec\Symantec DLO\Client\DBUseTCP
Set the DBTcpPort on the computers modified in steps 2 and 3 to the port
number you set in step 1.
43
44
BackupExec-DLO 2010 R3
For any existing customers with previous release of DLO (NetBackup DLO or
BackupExec DLO) apart from the versions mentioned above, it will be a stepped
upgrade support. That is, customers should first upgrade the existing version of DLO
to Symantec DLO 7.0, and then upgrade to Symantec DLO 7.6.
In this method, the downtime is less than half compared to the Space mode.
The disk space required during upgrade is twice compared to the Space mode, as
the old data is preserved until upgrade is successfully completed.
2. Space Mode
The disk space required during upgrade is half compared to the Time mode.
During upgrade, if optimized disk space usage is desired, then select the Space
mode.
In Time mode, there is no downtime during the pre-install stage. The backups
performed during this stage are captured as delta backups.
45
46
The delta backups identified (only in Time mode) during the pre-install stage is
converted to new schema format.
For both Time and Space mode, there will be complete downtime during this
stage.
Failure handling
Time Mode: In case of any failures during pre-install stage, the administrator should
run the tool again and the upgrade utility automatically takes corrective action.
In case of any failures during post-install stage, run this command:
DLODBUpgradeU.exe -Cleanup
Space Mode: Manually complete these tasks in case of any failure during pre or
post-install stages:
1
Navigate to the DLO install path and run this command to upgrade the database:
DLODBUpgradeU.exe -upgrade <mode> [SQL Server Name]
[DLODBInstance] [DedupeDBInstance]
<mode> = TIME or SPACE
Click Next.
Read the license agreement, and if you accept the terms, select I accept the
terms in the license agreement.
Click Next.
47
48
Update the Desktop Agent using the Install Agents and Maintenance Services on
Remote Computers option on the DLO Administration Console. See Procedure
to Push Install Desktop Agent and DLO Maintenance Server on page 31 for
more information.
Note: Command line option does not work for Windows Vista and later. In this case,
you can use either the first or second option.
From the command line on the DLO Administration Server, change to the DLO
installation directory.
Default installation directory:
Run DLOCommandu.exe with the update option to add the configuration file and
make note of the ID number returned when this command is run:
DLOCommandu -update -add -f
DLOAgent\update_7.6\DLOAgentUpdate_NBU.ini
Example
Note: If the configuration file has been moved or renamed, you will need to
specify the full path and file name in the command above.
Sample output:
ID=3
Name=7.6 Update
Updates Symantec DLO Desktop Agent to 7.6
Version=7.6
PromptUser=Yes
ExitAfterLaunch=No
Build=7.60.25a
srcPath=\\a2symms14907\DLOAgent\update_7.6
cmdName=AutomatedAgentUpgrade.exe
cmdArgs=
cmdPath=%DOWNLOADDIR%
4
Related Topics
DLO Command Line Interface Management Tools on page 261
Set PromptUser=0.
49
50
Run the upgrade using one of the methods described in Updating the Desktop
Agent on page 48.
Before uninstalling the older version of DLO Database component, ensure that
the correct version of the new utility DLODBRegcreateU.exe (available in
x86/x64 version) is executed. The DLODBRegcreateU.exe creates a registry
key-value (string) HKLM\Software\Symantec\Symantec
DLO\DB\OldDLODBPath
Note: You must have administrator privileges to run the
DLODBRegcreateU.exe utility.
Next, uninstall the existing DLO Administration Server and the DLO Database
component.
Upgrade to Symantec DLO by using the Remote SQL Server Instance option,
during installation.
Note: If you have installed BE-DLO 2010 R3 or Symantec DLO 7.0 with remote
database setup, then while migrating or upgrading to Symantec DLO 7.6, select the
Remote SQL Server Instance option.
On the main menu, click Help > About Symantec Desktop and Laptop Option.
Click Change.
Option 2:
1
Click Change.
Option 3:
Use the command-line utility to add or change the license key.
1
From the command line on the DLO Administration Server, change to the DLO
installation directory.
Default installation directory:
Example
Option
Description
-list
-add
-delete
51
52
Note: While doing migration, make sure that the SQL service is running under
domain admin credentials, else the database connection fails.
While doing migration, you can select BE SQL database instance (XYZ) or a
pre-existing SQL database instance. After migration you will not be able to launch
DLO from the BE console.
We recommend that you DO NOT select the Remote SQL Server Instance option, to
avoid loss of data.
To migrate from BE-DLO to Symantec DLO
1
Run the DLO 7.6 setup.exe on the BE-DLO installed computer to start the
installation wizard.
When the migration is complete, cleanup of BE-DLO will start. Click OK.
Note: If BE-DLO Agent does not respond to the profile changes when it is not yet
migrated to Symantec DLO version of Agent, then update BE-DLO Agent to Symantec
DLO Agent.
To migrate BE-DLO Agent to Symantec DLO Agent through the DLOcommandu.exe
CLI options, run the following commands in the same order:
Run DLOcommandu.exe -ChangeDB. See -ChangeDB command on page 265.
Run DLOcommandu.exe -Update -add. See -Update command on page 270.
Run DLOcommandu.ext -Update -publish. See -Update command on
page 270.
Run the DLO 7.6 setup.exe on the BE-DLO installed computer to start the
installation wizard.
When prompted to select the database, select the Remote SQL Server Instance
option.
Enter the IP address or the host name of the computer where BE-DLO database is
installed.
Note: This computer should have been selected as the remote database (DB) even
while installing BE. Otherwise, the migration process will fail.
53
54
Note: Ensure that you complete this process, otherwise Symantec DLO
installation will fail, and the following error message is displayed: Symantec
DLO cannot be installed on the same machine as the Backup Exec DLO Console is
clustered.
2
During unclustering, ensure that you select the database to overwrite the data
that was stored in the original install path (default - C:\Program
Files\Symantec\Backup Exec\Data) with the data from the shared disk
location (where DLO Database files are hosted.)
Note: Also, while unclustering BE-DLO by using the wizard, two pop-up dialogs
appear:
To confirm if the data from the shared disk should be removed
To confirm if the data should be available to the local node
Click Yes in both the cases.
This will ensure that the database files are copied back to the original install
path.
In case you do not select the database, then manually copy the BE_DLO.mdf
and BE_DLO.ldf files from the shared disk folder to the new location where
Symantec DLO is being installed. C:\Program Files\Symantec\Symantec
DLO\Data.
Chapter
56
Task pane
Selection pane
Navigation bar
Preview pane
Results pane
Status bar
Create a Profile
Run Reports
Add Users
57
58
Figure 2-2
59
60
Table 2-1 shows the information available in the System Summary view.
Table 2-1
Item
Description
Pending Jobs
Alert Summary
Active Alerts
Server Summary
Server Status
Server Load
Configuring DLO
For DLO to back up user data, you must set up these options in the following order:
1
Add a Dedupe Server, configure the Dedupe Storage Pools and Dedupe Storage
Locations. For more information, see Adding Dedupe Server on page 62.
Create a profile, which determines what files are backed up, when the files are
backed up, and the level of interaction the desktop user has with the Desktop
Agent. For more information, see About DLO Profiles on page 72.
Create DLO Storage Locations where user data will be stored on the network. An
individual user data folder on the network is required for each desktop user. For
more information, see About Automated User Assignments on page 116 and
Managing Desktop Agent Users on page 135.
On the Task pane under Getting Started, select DLO Configuration using wizard.
If you want the Configuration Wizard to display each time the DLO
Administration Console is started, select Always show this wizard at startup
check box.
Add the Dedupe Server to the DLO Administration Server using the DLO Admin
Console. For more information, see Adding Dedupe Server on page 62.
Create Dedupe Storage Pools. For more information, see Adding Dedupe Storage
Pool on page 63.
Create Dedupe Storage Locations. For more information, see Adding a Dedupe
Storage Location on page 64.
61
62
Create a Dedupe Enabled Profile. For more information, see Creating a New
Profile on page 72.
Assign the Dedupe Enabled Profile and DLO Storage Location to the user.
In the Settings pane, right-click Dedupe Server, and select New Dedupe Server
or New Dedupe Server using Wizard.
OR
In the Task pane, under Setting Tasks, click New Dedupe Server or New Dedupe
Server using Wizard
The Add Dedupe Server window appears.
Description
Name
Description
Field
Description
HTTP Port
Enter the HTTP port number of the Dedupe Server host. This
port will be used by the DLO components to connect to the
Dedupe Server. Default value is 8080.
HTTPS Port
Click OK.
Note: After adding Dedupe Server, you can verify the status of the Dedupe Server.
Type the following URLs in your browser.
http://<dedupeserver_ip_or_hostname>:8080
https://<dedupeserver_ip_or_hostname>:8443
If the Dedupe Server is active, then the following message is displayed: Dedupe
Server Status: (20159) Active.
If there is no response from Dedupe Server, then it indicates that the Dedupe Server
is not initialized, and one of the reasons could be that the database connection is
down.
In the Add Dedupe Storage Pool window, enter the Name and Description for the
Dedupe Storage Pool.
Note: The name of the Dedupe Storage Pool is just a logical name used to
identify the group of Dedupe Storage Locations.
63
64
Click Add.
The Dedupe Storage Pool is created, and a confirmation message appears.
Click Add.
In the Add Dedupe Storage Location dialog, enter the following details:
Field
Description
Name
Enter a name for the Dedupe Storage Location. Ensure that the
name does not contain any special characters, including blank
space.
Field
Description
Description
Encryption Type
Enable Compression
Path
Enter the path of the existing shared folder or click Browse and
locate the required folder. Make sure that the user creating the
Dedupe Storage Location has full control to the folder and
subfolders of this shared folder.
To set the permissions:
1
Click Create.
Note: This path should not be the same as the NUDF folder path
of the DLO Storage Location. For more information, see About
Dedupe Storage Locations on page 89.
User Name
Enter the name of the domain user who has read-write (RW)
access to the shared folder. This user name has to be a nonadministrator account. Type the name in this format:
DomainName\UserName
Password
Click Add.
A confirmation message appears, indicating that the Dedupe Storage Location is
created successfully.
Note: After configuring the Dedupe Server, creating Dedupe Storage Pools and
Dedupe Storage Locations, you can create new DLO Storage Locations and assign
these Dedupe Storage Locations. For existing DLO Storage Locations, you should
first assign the specific Dedupe Storage Locations and then enable Dedupe for that
profile. For more information, see Creating DLO Storage Locations on page 93.
65
66
Click OK.
To set the maintenance schedule, enter the time in the Timeout field.
Click Start.
On the Dedupe Storage Pool tab, select the specific row from the list and click
Modify.
Click Modify.
The properties of the Dedupe Storage Pool are updated.
onwards, the statistics is calculated every hour but updated only when the Agent is
idle.
To view the Dedupe Storage Pool statistics
1
Click Statistics to view the details such as total data size, storage space used on
the disk, and the deduplication savings.
To set the maintenance schedule, enter the time in the Timeout field.
Click Start.
On the Dedupe Storage Location tab, select the specific row from the list.
Click Modify.
In the Modify Dedupe Storage Location dialog, change the required values.
10 Click Modify.
The properties of the Dedupe Storage Location are updated.
Changing Credentials
You should change the credentials when the password used to create the Dedupe
Storage Location has been changed, or when the user account has expired.
67
68
To set the maintenance schedule, enter the time in the Timeout field.
Click Start.
To set the maintenance schedule, enter the time in the Timeout field.
Click Start.
On the Dedupe Storage Location tab, select the specific row from the list.
Click Delete.
Click Yes.
The Dedupe Server is deleted from the DLO configuration.
69
70
To set the maintenance schedule, enter the time in the Timeout field.
Click Start.
Enable HTTP communication with server for faster backup: Select this check box
if required, and click Save.
In the Add Admin Users window, enter the user name in this format: domain
name\user name.
10 Click Add.
A confirmation message appears, indicating that the operation is successful.
In some cases, the following message appears: Dedupe Server is busy with other
maintenance task. Do you want to force start the maintenance window?
Click Yes to force start the maintenance window.
Syntax
Schedule the Maintenance Window
DdAdminCU.exe -ScheduleMaintenance |-SCM <Server Name> <HTTPS
PortNumber> <Maintenance Timeout Value> [-i]
Stop Maintenance Window
DdAdminCU.exe -StopMaintenance |-STM <Server Name> <HTTPS
PortNumber> [-i]
Check the status of Maintenance Window
DdAdminCU.exe -IsMaintenanceActive |-IMA <Server Name> |<HTTPS
PortNumber> [-i]
Add Admin Users
DdAdminCU.exe -AddUser |-AU <Server Name> |<HTTPS PortNumber>
<DomainName\UserName>[-i]
Command Options
Option
Description
-ScheduleMaintenance |-SCM
<Server Name>
-IsMaintenanceActive|-IMA
-AddUser
-i
71
72
Backup schedules
Logging options
Dedupe backup
The following profile settings are not supported for Mac computers:
Dedupe backup
Backup of Outlook and Lotus Notes files, including incremental and VSS backup
of such files, MAPI and non-MAPI files
Throttling feature
Connection policies
The administrator cannot modify settings for individual Desktop Agent users from
the DLO Administration Console unless an individual user is the only user assigned
to a profile. However, the administrator can grant permission to Desktop Agent
users to modify their own settings.
In the Tasks pane, under Settings Tasks, click New profile, or New profile
using wizard.
b
3
In the Settings pane, right-click Profile and select New Profile or New
profile using wizard.
On the General tab in the New Profile dialog box, select the appropriate options.
Table 2-2 describes the fields.
Table 2-2 General Profile properties
Item
Description
Profile Name
Type the name of the new profile that you want to create. The profile
name cannot contain any of the following characters:
\@#$%^&*()=+|/{}[]
Description
Enable Profile
Profiles are enabled by default. To disable the profile, clear this check
box.
Enable Dedupe
VIP Profile
Select this check box to create a VIP profile. This feature restricts the
administrator from viewing and restoring data backed up by users
(such as CEO, executives, directors, officers) belonging to the VIP
profile.
Note: The administrator should create a new profile and enable this
option. Enabling this option will ignore Global Excludes for
compressed files, encrypted files, and delta file transfers.
Restoring VIP user data
73
74
Description
Storage Limits
Limit network
user data folder
to (MB)
Limits the disk space available on the network to store DLO backup
files and type the amount of space you want to use for storage.
Enable desktop
user data folder
Because files are more quickly saved to the local computer than to
the network, the time a file is held open for backup is reduced.
If local revisions are not required, this option will prevent backup
files from being stored in the desktop user data folder. No
revisions are saved in the desktop user data folder even if backup
selections specify that a certain number of revisions should be
stored locally.
Works well for desktop users with very limited disk space.
Description
Limit desktop
user data folder
to
A size (MB)
Select this option and enter a size in MB to limit the desktop user data
folder to a specific maximum size.
Note: While limiting available disk space for the desktop user data
folder can prevent overloading of the desktop hard drive, backups can
fail to run if the desktop user data folder space limit is reached.
My Default
Desktop User
Data Folder Path
The default desktop user data folder path is the users local application
data path. To override this location for newly deployed Agents, select
the Override default desktop user data folder path check box, and
type the new path.
75
76
Item
Description
Yield bandwidth to
other programs
Enables DLO to reduce data transfer over the network when other
applications on the desktop computer are transferring data. DLO
automatically resumes normal data transfer rates when other
applications are not using this resource.
The yield bandwidth option monitors network traffic on the
desktop computer. If DLO is using more than 90% of the total
current traffic, DLO is not throttled. When DLO traffic drops below
90% of the total network traffic on the desktop, and total traffic is
over 60% of the maximum traffic seen on the connection, then
DLO throttles itself to use only the otherwise unused portion of the
connection. For example, if there was 70% total usage, DLO will
throttle itself to 30% of maximum.
Note: Selecting this option can improve system performance when
other network-intensive applications are running at the same
time. Data transfer is only limited when data is written to the
network user data folder, not when it is written to the desktop user
data folder.
Select the appropriate options for each of the three network bandwidth
categories: Low bandwidth setting, Medium bandwidth setting, and High
bandwidth setting.
Table 2-4
Item
Description
Bandwidth range
No network
throttling
Select this option to disable all network throttling for this category.
Yield bandwidth to
other programs
This option enables DLO to reduce data transfer over the network
when other applications on the desktop computer are transferring
data. DLO resumes normal data transfer rates when other
applications are not using this resource.
Disable network
backup
Alert administrator
if available
bandwidth falls
below specified
value
This check box is enabled when you select the Limit network
bandwidth usage to option. Enter a value (in KB/sec) so that when
the bandwidth falls below this value, an alert is sent to the
administrator.
Suspend backup
and alert
administrator on
throttling failure
This check box is enabled when you select the Limit network
bandwidth usage to option or the Limit network bandwidth
statically option.
Select this check box to suspend the backup and alert the
administrator on throttling failure.
77
78
On the Restore Throttling tab, select the appropriate options for each of the
three network bandwidth categories: Low bandwidth setting, Medium
bandwidth setting, and High bandwidth setting.
Table 2-5
Item
Description
Bandwidth range
No network
throttling
Select this option to disable all network throttling for this category.
Limit network
bandwidth usage
to
This option enables DLO to reduce data transfer over the network
Yield bandwidth
to other programs when other applications on the desktop computer are transferring
data. DLO resumes normal data transfer rates when other
applications are not using this resource.
From the Backup Selections tab, select the backup selections that you want to
apply to users of this profile.
You can add, modify, and delete backup selections for a profile from this dialog
box. When a new backup selection is created, it is available for selection in all
profiles. Changes made to a backup selection in one profile will impact all other
profiles that use the backup selection. Similarly, when a backup selection is
deleted, the change impacts all profiles that use the backup selection. For more
information, see About Backup Selections on page 98.
Item
Description
Display only the system tray icon: Select this option to display
the Desktop Agent icon in the system tray in the lower right
corner of the screen.
Desktop users can right-click the system tray icon to exit the
program.
Allow Users to
Restore data
Add user-defined
backup selections
79
80
Table 2-6
Item
Description
Customize backup
selection revision
policy settings
Change backup
selection encryption
settings
Change backup
selection compression
settings
Change backup
Enables users in this profile to choose delta file transfer of backup
selection delta settings files. For more information, see Backup Selection options on
page 107.
View network user data Enables users to view the network user data folder path.
folder path
Remove deleted files
Customize profile
logging settings
Customize profile
e-mail settings
Enables users in this profile to move the local user data folder to a
new location. For more information, see Moving the Desktop User
Data Folder on page 233.
Synchronize files
Table 2-6
Item
Description
Enables users in this profile to limit the amount of disk space that
can be used to store backup files in the desktop user data folder.
For more information, see Setting Customized Options on
page 231.
Modify backup
schedule
Customize connection
policies
Cancel scheduled or
manual jobs
Suspend jobs
Enables users in this profile to disable the Desktop Agent from the
tray icon. They will also have the ability to re-enable the Desktop
Agent once it has been disabled.
Work Offline
Save encrypted
passwords used by DLO
When user goes offline, Enter the time after which a user will automatically go back online
automatically go back
after the user has manually placed the Desktop Agent in an offline
online after
state.
81
82
Table 2-6
Item
Description
Enter the time after which a job will be resumed or the Desktop
Agent enabled after the user suspends a job or disables the
Desktop Agent.
10 On the Schedule tab, select the appropriate options. Table 2-7 describes the
options.
Table 2-7
Item
Run backups
Whenever a file
changes
According to a
schedule
When initiated by
the user
Table 2-8
Item
Description
Logout/Restart/Shutdown options
Note: This option is not applicable for Mac.
Do nothing
Run as scheduled
83
84
11 If you selected Edit schedule in the previous step, select the appropriate options,
and click OK. Table 2-9 describes the options.
Table 2-9
Item
Description
Run once at
Run every
From
Until
If you selected Run every, select the end of the time interval
over which you want backups to begin.
Note: This field specifies the end of the time period within
which backups will begin. If a backup is in progress at this
time, it will continue to run to completion.
Item
Description
Logging options
Log groom messages
Select this check box to create logs for all backup operations.
Select this check box to create logs for all operations that
generate warnings.
Mail options
85
86
Table 2-10
Item
Description
Enable incremental backups Select this check box to enable incremental backups of Lotus
of Lotus Notes e-mail files
Notes e-mail files. Additional configuration may be
necessary. For more information, see Backing up Lotus
Notes NSF Files Incrementally on page 222.
When Lotus Notes NSF files are backed up incrementally,
only one revision is maintained regardless of the number of
revisions set in the backup selection.
13 Click the Connection Policies tab to disable or limit backups for specific
connection types. Click Add to create a new connection policy.
Table 2-11 describes the options available to configure the policy.
Table 2-11
Item
Connection Type
Table 2-11
Item
Description
Dialup
IP address range
Active Directory
14 Click OK.
87
88
Copying a Profile
When you create a new profile, we recommend that you begin with a copy of an
existing profile with a configuration similar to that required for the new profile. You
can then modify the copy as required, to meet the needs of a new group of desktop
users.
To copy a profile
1
Click Copy.
Click OK.
Modifying a Profile
Profiles can be modified as required to meet the changing needs of user groups.
Note: Modifications to a profile will cause users of that profile to cancel jobs, load
settings, restart backup engines and scan their backup selection tree.
To modify a profile
1
To enable Dedupe, on the General tab, select the Enable Dedupe check box.
Note: If any of the users associated with this profile uses a DLO Storage Location
without Dedupe Storage Location, then the Dedupe option cannot be enabled for
those users.
Click OK.
The same network share should not be assigned to more than one Dedupe
Storage Location.
89
90
Only the administrator and users with Dedupe Storage Location Access
Credential account should have access to the network share location used as a
Dedupe Storage Location.
The Dedupe Storage Location Access Credential account should not have
administrator rights.
The Dedupe Storage Location path should not be the same as the NUDF folder
path.
After the Dedupe Storage Location is associated with a DLO Storage Location,
and a deduped backup is performed, in case the Dedupe Storage Location should
be moved, then make sure to use the -MigrateUserSL command.
The Dedupe Storage Location user should have the Allow log on locally policy
set in the domain controller group policy object. To set this policy, do the
following:
After logging on locally with domain admin account, run gpmc.msc (Group
Policy Management).
Click Edit.
Run gpupdate and wait for the confirmation: user policy update has completed
succesfully (default gpupdate without switches should only apply the changes).
can be specified as network user data folders when users are manually added to DLO.
If existing network shares are used as network user data folders, Storage Locations
are not used.
DLO supports the use of hidden shares (for example; Share$) as Storage Locations
on NTFS volumes or as network user data folders for FAT32 volumes, but they
cannot be created with the DLO Administration Console. They must be created and
configured manually. See Using Hidden Shares as Storage Locations on page 91 for
more information.
Supported
SAN
Not
Supported
91
92
The following table provides information about the permission settings for hidden
shares.
Table 2-13
User or Group
Permissions
Everyone
Full control
Everyone
Special security
Allow Traverse Folder/Execute File
permissions or advanced
Allow List Folder/Read Data
settings
Allow Read Attributes
Allow Read Extended Attributes
Allow Read Permissions
Everyone
Owner
Allow Read
In the Settings pane, right-click Storage Locations and select New Storage
Location or New Storage Location using Wizard.
In the Task pane, under Settings Tasks, click New Storage Location or New
storage location using wizard.
Item
Description
Computer name
93
94
Table 2-14
Item
Description
Path
Table 2-14
Item
Description
Summary
Click OK.
WIN-7M4BNAMEMDL,C:\sl1,0
In the Settings pane, right-click Storage Locations and select Import Storage
Locations.
Click Browse and select the text or CSV file that contains the storage location
details.
Click OK.
The storage locations are imported and a confirmation message is displayed.
95
96
Case 1
To create storage locations when the DLO administration service is a full
administrator on the remote system
1
Ensure that the account credentials used for DLO services have full
administrator rights to the remote storage location or NAS device.
Make sure that the volume to be used for DLO has been assigned a drive letter on
the remote storage location or NAS device.
Note: See hardware vendor documentation on share creation and naming.
Create a new DLO Storage Location as explained in the section Creating DLO
Storage Locations on page 93. Use the Browse feature to select a location on the
computer where the DLO Storage Location should be created.
Case 2
The DLO administration service does not run as an administrator level user, but the
DLO administration groups have been assigned the appropriate permission levels on
a pre-existing share.
To configure storage locations using non-administrator case
1
Share the new folder. Ensure that 'Everyone' has full-access to the share.
Modify the folder's security permissions such that the full-DLO administrator
group has full-control of the folder and that the limited-DLO administrator
group has modify-control of the folder.
Using the DLO Administration Console, create a new DLO Storage Location.
Specify the machine name, drive and path, and share name for the folder just
created.
Note: Do not click the Browse buttons at any point while creating the DLO
Storage Location because using the Browse feature will cause the process to fail.
Manually remove the DLO Storage Location share and folder from the
server.
Delete the DLO Storage Location from the DLO Administration Console.
In the Selection pane, to expand the file servers list, click the + icon next to File
Servers.
97
98
In the Selection pane, click the File Server on which the DLO Storage Location
resides.
In the Results pane, right-click the DLO Storage Location name and click Delete
OR
In the Task pane, under General Tasks, click Delete.
Click Yes.
Set the number of revisions retained for each file in the backup selection, the
frequency with which they are saved, and instructions on how long to retain
backup files
Configure the backup selection to transfer only the changed portions of files
Specify how long to retain backup files after the source files are deleted
Caution: Symantec strongly recommends that you consider disk space when
choosing backup selections for desktops and laptops. A large number of local copies
may cause the Desktop Agent user's computer to run out of disk space. For example,
you may want to avoid selecting entire drives for backup or synchronization.
Item
Description
My Documents
My Favorites
My Desktop
My Music
My Pictures
My Videos
99
100
Note: Backup selections assume applications are using default paths. If custom paths
were used during installation or modified thereafter, you will need to customize the
backup selections to ensure they work properly. See Modifying a Backup Selection
on page 110 for more information.
Click OK.
In the Results pane, select the profile for which you want to add a backup
selection.
Click the Backup Selections tab in the Profile Properties dialog box.
Click Add.
A dialog box explains that if you customize NTFS permissions or directory
attributes such as compression or encryption for backed up files or folders,
these settings will not be backed up. You must reapply these settings after
restoring the files. If you use a password for a Microsoft Outlook PST file, you
must reset the password after restoring a PST file.
To set revision control for this backup selection, see Setting Revision
Control for a Backup Selection on page 104.
To set Delta File Transfer, encryption and compression options for this
backup selection, see Setting Options for a Backup Selection on page 106.
Click OK twice.
Open the Backup Selection dialog box as described in one of the following
procedures:
From the General tab in the Backup Selection dialog box, select the appropriate
options. Table 2-16 describes the options.
Table 2-16
Item
Description
Name
Description
101
102
Table 2-16
Item
Description
Folder to back up
Type a folder name
Include subfolders
Click OK.
Open the Backup Selection dialog box as described in one of the following
procedures:
From the Include/Exclude tab in the Backup Selection dialog box, select the
appropriate options.
Include all file types: Select this option to include all the file types in this
backup selection.
Include and exclude only the items listed below: Select this option to
include or exclude only specific files or file types. When this option is
selected, a wildcard include is added to back up all files not specifically
excluded.
To add a filter to the Include/Exclude list, verify that you selected Include and
exclude only the items listed below in step 2, and click Add Include or Add
Exclude.
If you selected Add Exclude, you will be notified that all previously backed up
files matching this exclude will be deleted from this backup selection. Click Yes
to continue or No to cancel.
Table 2-17
Item
Description
Filter
Type the name of the file or the folder that you want to
include or exclude. You can use wildcards.
For example, type *.mp3 to either include or exclude
all files with the file extension .mp3, or type
unimportant.txt to include or exclude all files in
the backup selection with this specific file name.
Click Extensions to select a predefined filter to either
include or exclude all files with a given file extension.
Description
Apply to
Click OK.
Revision Control
Revisions are versions of a file at a specific point in time. You configure revision
settings when you create a backup selection. When a file is changed and backed up,
DLO stores a new revision. DLO will store and maintain a specific number of
revisions for all files in a backup selection. Because backup selections are configured
separately, the number of revisions retained in each backup selection can vary.
103
104
When the number of revisions is exceeded, DLO removes the oldest revision,
maintaining only the specified number of revisions in the Desktop and network user
data folders.
You can limit the number of revisions retained in a given period of time. If you are
working on a document and backing it up frequently, all of your revisions could
potentially be just a few minutes apart. By specifying that you want to retain only
two revisions every 24 hours, at least 120 minutes apart, you can retain older
revisions for a longer period of time. While some intermediate versions will not be
retained, it does support situations in which returning to an older revision is needed.
Another consideration in determining the number of revisions to retain is the
amount of storage space required to store the data. The amount of space required for
backups can be estimated by multiplying the number of revisions retained by the
amount of data protected.
Example
Although compression can improve the space utilization, it varies significantly with
file type and other factors. Typical compression ratios are approximately 2:1, so in
the previous example, the maximum disk space usage might be reduced to
approximately 15 MB.
File Grooming
The Desktop Agent grooms revisions based on backup selection settings and does
this as new revisions are created. The oldest revision is deleted when a new revision
is created that exceeds the limit. See step 2 on page 105 for revision control settings.
Maintenance grooming is the process of removing backups of deleted files. It occurs
at most once every 24 hours. Maintenance grooming occurs during the first backup
that runs after 24 hours have passed since the last maintenance grooming.
Open the Backup Selection dialog box as described in one of the following
procedures:
From the Revision Control tab in the Backup Selection dialog box, select the
appropriate options for both the Desktop and network user data folders.
Table 2-18 describes the options.
Table 2-18
Item
Description
Number of revisions
Desktop user data folder
Limit to
Limit to
105
106
Table 2-18
Item
Description
Revision Age
Discard all revisions in the
desktop user data folder
older than
Open the Backup Selection dialog box as described in one of the following
procedures:
From the Options tab in the Backup Selection dialog box, select the appropriate
options. Table 2-19 describes the options.
Note: For Dedupe enabled profile, Delta File Transfer option is selected by default,
and is applicable only for non-PST files. For PST files, Delta File Transfer parameters
are forcibly applied whether the option is selected or not selected.
Dedupe + delta enabled (default settings): First revision undergoes deduplication.
Delta transfer is applied from second revision onwards.
Dedupe + delta disabled: Every revision undergoes deduplication and hence one
copy is retained in the Dedupe Storage Location for each revision.
Table 2-19
Item
Description
Each time a file is backed up, only the part of the file
that has changed is transferred and stored in the
network user data folder. In addition, delta file
transfer uses compression. Enabling this option
requires that you have installed and configured a
maintenance server. SeeAdding a New Maintenance
Server on page 113 for more information.
Compression
Encryption
107
108
Table 2-19
Item
Description
When source files are deleted, delete the backed up files from the:
Desktop user data folder after
Folders backed up
%LOCALFIXEDDRIVES%
%MACHINENAME%
%CURRENTUSERNAME%
%CURRENTUSERPROFILE%
Table 2-20
Folders backed up
%CURRENTUSERMYDOCS%
%CURRENTUSERFAVORITES%
%CURRENTUSERPRINTHOOD%
%CURRENTUSERNETHOOD%
%CURRENTUSERDESKTOP%
%CURRENTUSERRECENT%
%PROGRAMFILES%
%LOCALAPPDATA%
The following additional pre-defined folder macros are available for selection in the
backup selection dialog box.
Table 2-21
Folders Backed Up
My Documents
%CURRENTUSERMYDOCS%
Desktop
%CURRENTUSERDESKTOP%
Favorites
%CURRENTUSERFAVORITES%
PrintHood
%CURRENTUSERPRINTHOOD%
NetHood
%CURRENTUSERNETHOOD%
109
110
Table 2-21
Folders Backed Up
Recent
%CURRENTUSERRECENT%
%LOCALFIXEDDRIVES%
Note: When you enter a path that uses a macro, a backslash is automatically added
immediately following the macro. For example, if you type
%LOCALFIXEDDRIVES%\Documents, an extra backslash is added and it appears as
x:\\Documents in the Desktop Agent backup selection advanced view. It does not
show at all in the Desktop Agent backup selection Standard view. The correct way to
type this macro is %LOCALFIXEDDRIVES%Documents. This properly resolves to
x:\Documents.
Select the backup selection you want to modify, and click Modify.
Note: The Type a folder name field in the General tab is grayed out in this view.
If the path in this field is longer than the display, hold the curser over the path
for a moment to display the entire path.
Click OK to indicate that you read the message stating that modifying this
backup selection will change all profiles that are using this selection.
Click OK twice.
Working Offline
Delta File Transfer is only used to transfer and store backup files on in the network
user data folder. Backup files stored in the Desktop User Data Folder are not stored
using deltas. If a Desktop Agent user is working offline, the local revisions are stored
in their entirety in the desktop user data folder. When the user is once again working
online, Delta File Transfer is used to transfer data to the network user data folder.
111
112
must not be blocked at any point between the DLO Client and the maintenance
server.
The rolloff operation for delta revisions can require significant bandwidth. For this
reason, the maintenance server should be installed on the computer that is hosting
the Storage Location.
However, there are situations where the maintenance server cannot be installed on
the same computer as the Storage Location server. For example, the maintenance
server cannot be installed on a NAS device. In this case, the maintenance server
should be installed on a computer with a high bandwidth connection to the Storage
Location.
A maintenance server can manage one or more Storage Locations. A maintenance
server will always manage the Storage Locations located on same computer as the
maintenance server. The maintenance server can be configured to manage
additional Storage Locations hosts, that is, File Servers, from the DLO Admin
console. The maintenance server uses delegation to access remote Storage Locations.
See Configuring a Maintenance Server for Delegation on page 113 for more
information.
In the Results pane, click the profile that contains the backup selection you want
to delete.
From the Backup Selections tab, select the backup selection you want to delete.
Click Delete.
Click Yes.
Related Topics
Backup Selection options on page 107
From the DLO Console, on the DLO navigation bar, click Setup.
Click Add.
Click OK.
113
114
desktop users running the Desktop Agent. This configuration is managed using the
Active Directory.
Note: For detailed information on delegating Active Directory administration, see
the Microsoft website:
http://technet.microsoft.com/en-us/library/cc773318(v=ws.10).aspx
To configure a maintenance server for delegation
1
Both the Desktop Agent users account and the maintenance service's
account must be in the same domain.
Confirm that the desktop user account is configured for delegation. See
Confirming the Desktop Users Account is Configured for Delegation on
page 114.
On the Task bar, click Start> Programs > Administrative Tools> Active Directory
Users and Computers.
In the Account options list, verify that the Account is sensitive and cannot be
delegated is not selected.
Click OK.
On the Task bar, click Start > Programs > Administrative Tools > Active
Directory Users and Computers.
Right-click the computer on which the maintenance server runs and then click
Properties.
Click OK.
From the DLO Administration Console, on the DLO navigation bar, click Setup.
In the Maintenance Servers list, select the check box for the maintenance server
you want to set as the default.
Click OK.
Select the check box for the maintenance server you want to delete.
115
116
Click Delete.
Note: The entry for the default maintenance server cannot be deleted from the
Administration Console.
Similarly, once you add a maintenance server from the DLO Administration Console,
you must install the maintenance server software on the computer to begin
maintenance processes.
Verify that the new maintenance server has been installed and configured.
Select the maintenance server that is currently managing the file server.
Click Edit.
Click Reassign.
Automated User Assignments are assigned to desktop users based either on their
domain and group, or using Active Directory settings. Because users may match the
criteria for more than one Automated User Assignment, the Automated User
Assignments are prioritized. When the Desktop Agent is run for the first time, the
Desktop Agent users domain and group credentials are checked against those of the
Automated User Assignment starting with the highest priority assignment. When a
match is made, the share and profile specified in that Automated User Assignment
are assigned to the new user.
Modifying Automated User Assignments does not affect users who have already
been configured. Only new users configured with the Automated User Assignment
will use the new settings.
Figure 2-4
117
118
Select one of the following options to create a new automated user assignment:
a
In the Tasks pane, under Settings Tasks, click New user assignment, or New
user assignment using wizard.
Or in the Settings pane, right-click Automated User Assignment and select New
User Assignment.
The New Automated User Assignment window appears.
Item
Description
User Assignment
User assignment
name
Domain
Group
Configure
Table 2-22
Item
Description
Storage Location/Profile
Storage Location
Profile
6
Table 2-23
If you chose to use Active Directory to configure the User Assignment in step 5,
configure the Active Directory settings as follows:
Description
Object
In LDAP Directory
Attributes
Condition
Value
119
120
Click OK.
In the Results pane, select the Automated User Assignment you want to modify.
In the Results pane, select the Automated User Assignment for which you want
to change the priority.
In the Task pane, under Settings Tasks, select Move priority up or Move priority
down.
Click Yes.
121
122
From the Tools menu in the DLO Administration Console, select Global Excludes.
Select the Files/Folders tab. Default Files/Folders global excludes are listed.
To exclude all files greater than a specific size, select the Exclude all files greater
than check box and enter a size in KB.
To exclude all files modified before a specified date, select the Exclude all files
modified before check box and enter a date.
To add a new Files/Folders global exclude, click Add and configure as described in
the following table.
Table 2-24
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global exclude filter, click Edit and configure as described in the step 5.
To delete a global exclude filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude from all backup attachments greater than a specific size, select the
Exclude all attachments greater than check box and enter a size in KB. This
feature does not apply to Lotus Notes e-mails.
To exclude from all backup messages received before a specified date, select the
Exclude all messages received before check box and enter a date.
To add a new e-mail global exclude, click Add and configure as follows.
Table 2-25
Item
Description
Description
Click OK.
123
124
To edit a global e-mail filter, click the filter you want to change. Click Edit and
configure as described in table 2-24, Add Global E-mail Exclude Filter Dialog.
To delete a global e-mail filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude files or folders from compression, select the Compressed Files tab.
Default compressed files global excludes are listed.
To exclude all files greater than a specific size from compression, select the
Exclude all files greater than check box and enter a size in KB.
To add a new compressed file global exclude, click Add and configure as follows.
Table 2-26
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global exclude filter, click the filter you want to change. Click Edit and
configure as described in the Add Global Compression Exclude Filter Dialog
table above.
To delete a global exclude filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude files or folders from encryption, select the Encrypted Files tab.
Default encrypted files global excludes are listed.
To exclude files greater than a specific size from encryption, check the Exclude
all files greater than check box and enter a size in KB.
To add a new encrypted file global exclude, click Add and configure as follows.
Table 2-27
Item
Description
Filter
Description
Apply to
125
126
Click OK.
To edit a global encryption exclude filter, click the filter you want to change.
Click Edit and configure as described in table 2-26, Add Global Encryption
Exclude Filter Dialog.
To delete a global encryption exclude filter, click the filter to be deleted and click
Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude files or folders from Delta File Transfer, select the Delta File Transfer
tab. Default Delta File Transfer global excludes are listed. File types excluded by
default from Delta File Transfer are generally file types that do not benefit from
this technology.
Note: Files and Folders backed up using Delta File Transfer are also compressed
with standard compression. If a file is in a backup selection that uses Delta File
Transfer, but is excluded from Delta File Transfer using a global excludes filter,
it is still compressed with standard compression unless it is also excluded from
standard compression using another global excludes filter.
To exclude files greater than a specific size from Delta File Transfer, select the
Exclude all files greater than check box and enter a size in KB.
To exclude files smaller than a specific size from Delta File Transfer, select the
Exclude all files less than check box and enter a size in KB.
To add a new Delta File Transfer global exclude, click Add and configure as
follows.
Table 2-28
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global Delta File Transfer exclude filter, click the filter you want to
change. Click Edit and configure as described in table 2-27, Add Global Delta
File Transfer Exclude Filter Dialog.
To delete a global Delta File Transfer exclude filter, click the filter to be deleted
and click Delete.
To delete the filter, click Yes, and to cancel, click No.
Click OK.
C:\Windows\System32\Config
registry hives and logs, including *.DAT.LOG, *.LOG and the files system,
SECURITY, default, SAM, and software
127
128
C:\Windows\System32\wbem
*.EVT
*.NCB
*.ACCDB
*.DATA
*.DB
Note: Open file backup feature does not support synchronized backup selections.
Macro
Folder
%TEMP%
%WINDIR%
%WEBTEMP%
%RECYCLED%
Recycle bins
%SYSTEM%
On the DLO Administration Console main menu, click Network, and select
Connect to DLO Administration Server.
Server
User name
Type the user name for an account with administrator access to the
DLO Administration Server.
Password
Domain
Click OK.
Service or Process
Port
Port Type
135-139
TCP/UDP
445
TCP/UDP
SQL
1434
TCP/UDP
SymantecDLOAdminSvcu.exe (DLO
admin service)
TCP/UDP
129
130
Service or Process
Port
Port Type
Additional ports
135
TCP
1037
441
1125
3527
6101
6103
6106
The default or any other port
number specified during
installation
8443
HTTPS
8080
HTTP
UDP
For Windows XP and Windows 2003 server machines, since Windows Management
Instrumentation is not listed under Firewall settings, follow this procedure to enable
firewall exception:
Run gpedit.msc.
The Local Group Policy Editor window opens.
In the right pane, double-click Administrative Templates > Network > Network
Connections > Windows Firewall.
The default instance of the SQL Server Database Engine listens on TCP port 1433.
Named instances of the Database Engine are configured for dynamic ports. That is,
an available port is selected when the SQL Server service is started. While
connecting to a named instance through a firewall, configure the Database Engine to
listen on a specific port, so that the appropriate port can be opened in the firewall.
How to configure the SQL Server to listen on a specific TCP port
To configure the SQL Server, refer to the instructions provided at
http://msdn.microsoft.com/en-us/library/ms177440(v=sql.105).aspx
How to find the port number for a particular named instance of SQL Server
1
Click Start > Programs > Microsoft SQL Server > Configuration Tools > SQL
Server Configuration Manager.
Expand SQL Server Network Configuration and select Protocols for <instance
name>.
You can also find the port number using the registry entry:
HKLM\Software\Microsoft\Microsoft SQL Server\<name of the
instance>\MSSQLServer\SuperSocketNetLib\TCP
131
132
Item
Description
135 (RPC)
1037
441 (RPC)
To deploy the Dedupe Server on IPv6 network, the attribute value of the protocol for
different connector elements must be modified in the server.xml file.
The server.xml file is located at this path:
C:\Program Files\Symantec\Symantec DLO\Dedupe
\Tomcat\conf\server.xml
In the server.xml file, replace all occurrences of
"org.apache.coyote.http11.Http11NioProtocol" with
org.apache.coyote.http11.Http11Protocol.
After you modify the values, restart the Dedupe Server.
133
134
Chapter
Restoring Files and Folders from the DLO Administration Console on page 150
Backup and Recovery of DLO Servers and User Data on page 154
136
Manually Creating New Network User Data Folders and Setting Security
Attributes
If network shares already exist for desktop user backups, they can be added to DLO
as network user data folders, or new shares can be created and added to DLO for this
purpose. To create or use an existing network share as a network user data folder,
the folder must have the appropriate security attributes.
To manually create network user data folders and set security attributes
1
Create or locate a network share on the computer where backup files will be
stored.
Right-click the share you created in step 1, and then select Properties.
Click Permissions.
Select the following permissions for user Everyone: Full Control, Change, Read.
Click OK.
Click Advanced.
10 Verify that the Inherit from parent the permission entries that apply to child
objects check box is not selected.
11 Add Administrator and Everyone and give them full control permissions.
12 In this share, create a data folder for each user who will use this DLO Storage
Location, or verify that a data folder already exists.
13 Right-click the data folder for a user.
14 Select Properties.
15 Select Security.
16 Verify that the Inherit from parent the permission entries that apply to child
objects check box is not selected.
17 Add Administrator and the user who will be assigned to the user data folder to
the share permission list.
18 Set full permission for Administrator and the user.
User name
Domain name
Password
Confirm password
From the Tools menu, select Wizards and then Data Integrity Scanner.
Click Next.
137
138
If you want to set advanced options, click Advanced Options. Select the
appropriate options and click OK.
Permanently remove
previously quarantined
data
Quarantine data
encrypted with outdated
keys
Select this check box to quarantine all files with outdated keys.
If this option is not selected, data is scanned without being
quarantined. After data is quarantined, the Desktop Agent
backs up a new version of the file with the correct
encryption-key.
Verbose output
Click Start.
Click Next.
Click Finish.
Table 3-1
Item
Description
Enable User
Select this option to enable this user to use the Desktop Agent,
or clear it to prevent the user from using the Desktop Agent.
User
Profile
Storage Location
JSmith,enterprise,Default,\\Server1\Userdata\jsmit
h
139
140
In the Task pane, under User Tasks, click Import users using wizard.
Description
Enable User
User
Profile
In the Selection pane, click Users. Users are listed in the results pane.
Clear the Enable user check box to prevent the desktop user from backing
up data with the Desktop Agent
Select the Enable user check box to allow the desktop user to back up data
with the Desktop Agent
To delete the data stored in the user data folder, select the Delete data stored in
the user data folder option. When you select this option, backup data is deleted
from the network user data folder, but not from the desktop user data folder.
When the Desktop Agent is uninstalled from the desktop computer, an option is
provided to delete the desktop user data folder.
141
142
For more information on using existing directories on the network as network user
data folders, see Manually Creating New Network User Data Folders and Setting
Security Attributes on page 136
When the network user data folder is moved to a UNC location (for example,
\\myserver\userdata\username) rather than an existing DLO Storage Location,
permissions on the new location need to be modified. The local administrator group
and the owner of the files must have read and change permissions for the network
user data folder, and the Everyone group should be removed.
After the data is successfully moved, manually delete the residual data in the old
DLO Storage Location, but do not delete the data in the Dedupe Storage Location
because some users may be referring to the old deduped data.
Subsequent backups will be stored in the new location for each user.
Note: For migrating NSF files, make sure that Lotus Notes client is installed on the
computer where DLO Administration Console exists.
To move one or more Desktop Agent users to a new network user data folder
Note: When the transfer is complete, each affected Desktop Agent will shut down
and then automatically restart within a 30 minute window.
1
In the Task pane, under User Tasks, click Move network user data folder.
Table 3-3
Move User
Item
Description
User
Lists the domain and user name of the selected user or users.
From
Destination
Move the user data folder to Select this option to choose an existing Storage Location from
an existing Storage
the drop-down list. A new network user data folder will be
Location
created in the new Storage Location for each user who is
moved.
Table 3-3
Item
Description
Restore the user data as described in Restoring Files and Folders from the DLO
Administration Console on page 150.
In step 8, select Stage this user data on an alternate computer for a new DLO
installation. The data is staged on the new computer.
When the owner of the staged data logs in to the new computer, DLO moves the
staged data to the same location it occupied on the original computer,
completing the data migration process.
In the Selection pane, click Users to list users in the Results pane.
143
144
Right-click the computer for which you want to modify properties, and click
Properties.
To modify the backup schedule for the computer, click the Schedule tab.
Table 3-4
Item
Description
Use customized schedule Select this option from the drop-down list to specify a
customized schedule that differs from the profile schedule.
Run jobs
Whenever a file changes
According to a schedule
Manually
Table 3-4
Item
Description
Select this option to begin a backup after the desktop user logs
on to the computer.
Select this option to begin a backup when the desktop user logs
off the computer.
To modify computer options, click the Options tab and configure the computer
options as described in the following table.
Table 3-5
Item
Description
Limit disk space usage on Select this check box to limit disk space usage on the desktop
computer.
my computer to
To limit the usage to a percent of drive space, select % and type
the maximum percentage of drive space to use.
To limit the usage to a specific size, select MB and type the
maximum number of MB to use on the local drive.
Type the minimum number of days to keep log files. Log files
will not be deleted until they are at least as old as specified.
Note: Log files will not be deleted until their combined size
exceeds the setting for the combined size of all log files, which
is discussed below.
145
146
Table 3-5
Item
Description
Logging options
Log groom messages
Log information
messages for backup
Select this check box to create logs for all backup operations.
Select this check box to create logs for all operations that
generate warnings.
Mail options
Enable message level
incremental backups of
Outlook PST files
Table 3-5
Item
Description
Enable incremental
backups of Lotus Notes
email files
To view the computer backup folders, click the Backup Folders tab.
To modify the computer backup selections, click the Backup Selections tab.
See Adding a Backup Selection on page 100. Profile backup selections are not
listed, and can only be modified directly in the profile as described in Modifying
a Backup Selection on page 110.
10 To view and modify connection policies, click the Connection Policies tab.
Profile defined connection policies can only be modified in the profile. See
Customizing Connection Policies on page 234.
Right-click the selected computers and click Enable to enable the Desktop Agent
to run on the selected computers, or click Disable to prevent the Desktop Agent
from running on the selected computers.
147
148
When asked if you want to delete each selected computer and all backup files,
click Yes.
In the Results pane, select one or more computers on which to run an immediate
backup.
In the Task pane, under Computer Tasks, click Run backup now.
From the File Server list, select a network resource for which you want to
configure a blackout window.
Table 3-6
Item
Description
Enable Schedule
Occurs
Starts at
Ends at
Click OK.
Click Delete.
Click OK.
149
150
In the Computer pane, click the desktop from which the data to be restored
originated.
In the Backup Folder pane tree view, select the folder containing the files you
want to restore.
To restore the entire folder, check the folder in the Backup Folder pane.
To restore specific files, check the files in the File Version pane.
If multiple versions exist for a file, select the radio button for the file version you
want to restore.
Note: When a desktop user deletes an original file, the backup files are retained
until they are deleted by the file grooming process. If an original file has been
deleted, but backup files are still available, the icon for the file in the restore
view will have a small red x to indicate the deletion of the original file. See File
Grooming on page 212 for more information.
In the Task pane, under Restore Tasks, click Restore files to open the Restore
dialog.
Table 3-7
Item
Description
Restore destination
Restore to original computer
Restore to an alternate
computer
151
152
Table 3-7
Item
Description
Restore Options
If file already exists:
Click OK.
In the Computer pane, click the desktop on which you would like to search for
files to restore.
In the Task pane, under Restore Tasks, click Search for files to restore.
Table 3-8
Item
Description
Modified
Today
Between
Select this check box to choose a file type from the list
provided.
Click Search.
Click Restore.
153
154
Select the appropriate options as outlined in Restoring Files and Folders from
the DLO Administration Console on page 150.
Click OK.
This topic assumes that both the DLO Administration Server and File Server are
periodically backed up to another disk, tape, or other media. Also note that for many
DLO installations the Administration Server and File Server are on the same
computer.
to decrypt the user's encryption-key. The encryption-key is then used to decrypt the
user's data. If a recovery password has not been set, then the Emergency Restore
feature cannot be used to restore encrypted user data.
155
156
Restore the user data to its original location on the File Server or to any other
temporary location.
Take both the File Server and DLO Administration Server offline.
Back up both servers. Ensure that the backup includes the DLO configuration
database and the all user data. This backup will be used to restore DLO back to its
current state once the data is recovered. If any DLO data is not backed up it may
be impossible to return to the current state.
Restore the user data to the File Server. If possible, restore just the data for the
user being restored. If unsure, the entire volume on the File Server can be
restored, only if sufficient precaution was taken in step 2 to ensure the entire
volume was backed up.
Use the DLO Console to restore the user's data. Select Restore to an alternate
computer and restore the data to a temporary location.
Restore both the File Server and DLO Administration Server back to the most recent
state.
Case 1
A non-system disk on the administration server fails or is otherwise corrupted.
Recovery procedure for Case 1
1
Case 2
The administration server's system hard drive fails, or the servers computer needs
to be replaced with a new computer.
Recovery procedure for Case 2
1
Set up the computer with the operating system software. Be sure to use the same
computer name as the failed DLO Administration Server.
Install DLO on the new administration server. Be sure to use the same version of
DLO as was installed on the failed server.
Restore the DLO database files, overwriting the database files created when DLO
was installed. The default database path is C:\Program
Files\Symantec\Symantec DLO\Data.
If the File Server's system hard drive fails, or the file server computer needs to be
replaced with a new computer then the recovery procedure is as follows:
157
158
Set up the computer with the operating system software. Be sure to use the same
computer name as the failed File Server.
If the File Server had the DLO Maintenance Server installed, then install the DLO
Maintenance Server on the computer. Be sure to use the same version of DLO as
was installed on the failed File Server.
Hence, the backup and restore of these components should be performed together at
a single logical point in time (PIT).
PIT across all the components requires the data writes to be stopped on all the
components. The data writes can be stopped by disconnecting the individual
components from the network or the Dedupe Server can be switched to maintenance
mode by scheduling a Maintenance Window from the DLO Administration Console.
Backup
Schedule a Maintenance Window with sufficient time out for backing up all
components. If backup time cannot be estimated in advance, then a time out of
9999 minutes can be specified.
Back up all the components and tag them together for easy identification of the
same Point in Time for all the components.
Restore
In case of a disaster, data of all the components should be restored to a suitable
logical PIT backup.
To restore the data, follow these steps:
1
We recommend that you follow this procedure for backup and restore operations,
and thus prevent data loss or any issue related to data integrity.
Server 1: DLO Administration Server, DLO Admin Console and DLO Maintenance
Server
159
160
The following table contains various disaster recovery scenarios where data can be
restored successfully.
Table 3-9
Scenario
Result
Remarks
Table 3-9
Scenario
Result
Remarks
161
162
Table 3-9
Scenario
Result
Remarks
the Desktop Agent and provides the summary of information as described in the
following table.
Table 3-10 Computer History pane
Item
Description
User
Computer
Profile
The name of the profile that is assigned to the user who is logged
on to the desktop.
For more information on profiles, see About DLO Profiles on
page 72
Backup Mode
The Job History pane displays information as described in the following table.
Table 3-11 Job History pane
Item
Description
Start Time
End Time
Operation
163
164
Description
Status
The total bytes of data copied to the desktop user data folder
during the job.
The total bytes of data copied to the network user data folder
during the job.
Errors
Click the desktop for which you want to view the history.
On the Task pane, under Job History View Filters, select one of the following
options.
Description
Lists history logs for all jobs that have run on the selected
desktop. These may include backup, synchronization,
restore, or move user jobs.
Lists history logs only for backup jobs that have run on the
selected desktop.
Lists history logs only for restore jobs that have run on the
selected desktop.
To filter job history logs based on alerts received, select one or more of the
following options.
Description
Lists history logs for all jobs that generated warnings on the
selected desktop.
Lists history logs for all jobs that generated errors on the
selected desktop.
Lists history logs for all jobs that were cancelled on the
selected desktop.
To set a time frame for filters to be displayed, select one of the following options.
Description
Lists history logs that have been generated in the last 7 days,
and that meet all other filtering criteria.
Show all
Lists all history logs that also meet all other filtering
criteria.
In the History pane, select the computer for which you want to view a history log.
In the Job History pane, click the log you want to view.
In the Task pane, under General Tasks, click View history log file to display the
log file viewer with all log messages for this job.
165
166
To filter the results, select the appropriate options as described in the following
table.
Description
Select this option to show all log entries in the log file viewer.
Select this option to search only those log entries in the current log
file.
With timestamp
Select this check box to search only those log entries within a
specified time period. The options include:
Within the last week: Show all log files created in the last
week
Between dates: Show all log files created between the dates
entered
Description
Select this check box to show only logs of the indicated type. The
available selections will vary depending on the log file, but may
include the following:
Backup
Restore
Move User
Maintenance
Dedupe
Select this check box to enter a file name, or file type. Wildcard
entries are supported.
Example: *gold.doc
Note: When using wildcards you must use the * wildcard. For
example, *.tmp will return all results with the .tmp extension while
.tmp will return only files explicitly named .tmp.
Limit search to
Select this check box to limit the log files displayed to one of the
following types of log entries:
Click Search.
Click Close.
167
168
In the Task pane, under General Tasks, click Search log files to display the log
file viewer.
Click Search.
Click Close.
Active alerts display the alerts that are active in the system and need a response
from the operator.
Alert history displays alerts that have been responded to or alerts that have been
automatically cleared from the system.
In addition, the status bar at the bottom of the screen displays an alert icon for the
most severe type of alert in the Active alerts list. Therefore, if the current or most
recent alert is not the most severe, the icon in the status bar will not match the icon
for the most recent alert in the alert list.
The Desktop Agent filters the alerts to minimize the load on DLO. By default, alerts
are limited to one of each type in 24 hours. For example, you will see only one Local
Out of Disk Condition alert in a 24-hour period from a desktop running the Desktop
Agent.
Note: Backup/Restore complete alerts cannot be filtered. If you enable these alerts,
they are generated each time a backup or restore job completes.
Active alerts that are older than a specified number of days are cleared and moved
into the alert history. The alerts in the history will be deleted if they have been
cleared for more than a specified number of days.
If an alert is manually cleared, it is moved into the alert history. Deleting an alert
manually removes it permanently.
You can set up DLO to notify recipients when alerts occur. See Configuring Alerts
for Notification on page 174 for more information.
The following table describes the alert types.
Table 3-16 Alert Categories
Alert Type
Description
Informational
Warning
Error
Name
Description
Errors
File name, directory name, Indicates either a storage system problem that
requires attention, or a file name denied by SRM
or volume label syntax is
software. If the latter, these files should be added to
incorrect.
DLOs global exclude list. See Configuring Global
Exclude Filters on page 121 for more information.
169
170
Name
Description
Suspend backup and alert The backup job has been suspended because of a
throttling failure.
administrator on
throttling failure
Throttling failed during
backup
Warnings
A backup job has
completed with warnings
Name
Description
No backups in 14 days
No backups in 28 days
No backups in 7 days
No matching automated
user assignment
Informational
A backup job has
completed
Dedupe synchronization
has started
Dedupe synchronization
has stopped
Configuring Alerts
To configure alerts
1
171
172
Select the alerts you want to receive, and clear the check boxes for the alerts you
do not want to receive.
To send notification to recipients when the selected alerts are generated, do the
following:
Note: Alerts must be configured for notification before selecting recipients. See
Configuring Alerts for Notification on page 174 and Configuring Recipients
for Notification on page 177 for more information.
Select one or more alerts from the list. To select multiple alerts, click one
item and press <Ctrl> or <Shift> while clicking the other items.
Click Recipients.
Click OK.
Click OK.
Select Active alerts to view active alerts, or Alert history to view alerts that have
been cleared.
Note: Alerts that are older than a specified number of days are cleared and
moved into alert history.
To filter alerts by type, select one or more options from Active Alerts View
Filters or Alert History View Filters in the task pane as described in the following
table.
Table 3-18
Item
Description
Show errors
Show warnings
Show information
To view the properties of an alert, right-click the alert in the Active Alerts or
Alert History list and select properties.
If a log file is associated with the alert, a link is provided to the log file. Click this
link to view the log file.
If needed, filter the Alerts view as described in To view DLO alerts on page 173.
173
174
From the alert list, select one or more alerts that you want to clear.
SMTP
Pagers
Printers
Net Send
Configure the methods you want to use to notify the recipient. Printer and Net
Send notification methods do not require pre-configuration.
Item
Description
Enable
Table 3-19
Item
Description
SMTP port
Sender Name
Enable SMTP
Authentication
Sender password
Confirm password
Click OK.
175
176
Item
Description
Enable
Click OK.
Item
Description
Enable
Mail password
Table 3-21
Item
Description
Click OK.
Table 3-22
Item
Description
Enable
Click OK.
SNMP Trap: SNMP Traps are sent to a computer that is configured to receive
them.
177
178
Group: A group of one or more recipients, including person recipients, Net Send
recipients, and other groups.
Right-click the user name or select all users and right-click to see the menu
options.
Removing Recipients
You can delete recipients that do not want to receive notification messages; however,
the recipient is permanently removed upon deletion. If you want to retain the
recipient, but do not want the recipient to receive notifications, clear the Enable
check box in the recipient properties.
To remove a recipient
1
Select the recipient you want to delete, and then click Remove.
Click OK.
You can start the job after configuring the new recipients or edit recipient properties
or select other options from the Properties pane.
week the recipient is available to receive the notification messages. After the
recipient is configured, you can modify the schedule by editing the recipient
notification properties.
See Configuring Recipients for Notification on page 177 for more information on
the recipient configuration.
To configure the notification schedule for recipients
1
On the Recipient Properties dialog, under the Limit when notifications can be
sent group box, click Enable to activate the option.
Note: To access the Recipient Properties dialog box, click Tools > Recipients.
Click New to create a new recipient or select an existing recipient and then click
Properties.
Click Schedule.
Scheduling Notification
Item
Description
Include weeknights
Include weekends
Note: You can select any combination of Include work days, Include weeknights,
or Include weekends, or click any single hour of the chart to select or clear that
hour.
4
Click OK.
179
180
Click Properties.
Click OK.
Click OK.
Click New.
Click Person.
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Select the check box to activate this notification method for the
recipient.
Address
Test
Notify me a
maximum of x
times within y
minutes
Reset the
notification
limits after x
minutes
Select this check box to enter the number of minutes that must be
reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Enable
Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule
Select the days and times when notifications can be sent to the
recipient. For more information, see Scheduling Notification for
Recipients on page 178.
Click OK.
Click New.
181
182
Click Person.
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Mailbox
Test
Notify me a maximum of x
times within y minutes
Enable
Schedule
Click OK.
Click New.
Click Person.
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Address
Test
Notify me a
maximum of x
times within y
minutes
Reset the
notification limits
after x minutes
183
184
Table 3-26
Item
Description
Enable
Schedule
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Select this check box to activate this notification method for the
recipient.
Carrier Phone
Type the area code and phone number to access the paging
service providers modem. The paging service number may be
different from the number you enter to manually send a page.
Country/region
name and code
Enter the country or region name and country code in which the
pager is located.
Pager Pin
Table 3-27
Item
Description
Advanced
Test
Reset the
notification limits
after x minutes
Select this check box to enter the number of minutes that must
be reached before the notification limits are reset. When the
time limit has been reached, the number of notifications sent is
reset to zero.
Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule
Select the days and times when notifications can be sent to the
recipient. For more information, see Scheduling Notification
for Recipients on page 178.
Click Advanced to configure advanced pager setup options and select the
appropriate options as described in the following table.
Table 3-28
Item
Description
Pager Configuration
Password
Message Length
185
186
Table 3-28
Item
Description
Retries
Type the number of times you want the paging service provider
to retry the page. The number is determined by the paging
service provider.
Pager type
Numeric
Select this option if you are configuring a pager that accepts only
numbers.
Alpha-numeric
Modem
Configuration
Modem Baud Rate Select the speed of the modem. The speed that appears is the
limit set by the paging service; select the appropriate speed
regardless of the modem speed rating.
Click OK to save the settings in the Advanced Pager Information dialog box, and
then click OK to save the pager configuration settings.
Click New.
Click OK.
Item
Description
Name
Host
Table 3-29
Item
Description
Port
Notify me a maximum
of x times within y
minutes
Schedule
Click OK.
Click Close.
187
188
Click OK.
Item
Description
Name
All Computers
Test
Notify me a maximum of x
times within y minutes
Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule
Click OK.
Click OK.
Item
Description
Name
Type the name of the recipient. You cannot use a fax printer
device to receive the notification.
Target Printer
Test
Notify me a maximum of x
times within y minutes
Select this check box to activate the option and configure the
length of time the recipient is available for notification.
189
190
Table 3-31
Item
Description
Schedule
Click OK.
In the Group Name field, type the name of the group for whom you are
configuring the notification.
Table 3-32
Item
Description
Click OK.
DLO Reports
DLO provides a variety of reports that show detailed information about your DLO
operations. These reports can be viewed from the DLO Console or generated and
saved using the new report command (see -Report command on page 277).
When you generate a report, you can specify filter parameters for the data that you
want to include in the report. The filters that are enabled are specific to each report.
You can use the DLO global settings to set the default report format. The default
formats are only used by the reports viewed from the DLO Console. See Changing
Default Global Settings on page 37 for more information.
If the default report format is set as Adobe Portable Document Format (PDF) and
Adobe Acrobat is installed on the system, reports are displayed in PDF. If Adobe
Acrobat is not detected, the reports are displayed in HTML format.
All report formats can be saved and printed.
To view the list of available reports
DLO Reports
Report Name
Description
Active Alerts
Alert History
Failed Backups
191
192
Table 3-33
Report Name
Description
No Backups
Percentage Backup
Storage Statistics
Table 3-33
Report Name
Description
Running a Report
When you run a report, you can specify filtering criteria to determine which items
will be included in the report. After the report is generated, only the items that
match the entered criteria appear in the report. If no criteria are entered, all
available entries are included in the report.
To run a report
1
In the Task pane, under Reports Tasks, click Run report now.
Select the appropriate filters for the data you want to include in the report from
the following available filters. Some of these filters are disabled depending on
the report selected.
Table 3-34
Report Filters
Item
Description
Computer
User
Profile
Days
Click OK to run the report. The report can be printed or saved before it is closed.
193
194
On the Reports pane, select the report for which you want to view properties.
Report Properties
Item
Description
Title
Description
Category
Alerts
Failed Jobs
Author
Subject
Keywords
File Name
File Size
Creation Date
Click OK.
clustered server, several servers (nodes) are linked in a network. The Microsoft
Cluster Service (MSCS) allows every node to access the shared disks only when it
becomes active. If a node is unavailable, cluster resources migrate to an available
node (failover). The shared disks and the virtual server are kept available. During
failover, you experience only a short interruption in service.
DLO Administration service, DLO Database service, Dedupe Server service, and
Dedupe Database service are supported in the cluster environment.
Two-node clusters are supported with DLO on Microsoft Windows Server 2003,
2008, 2008 R2, and 2012.
DLO clusters can be configured on Microsoft Windows Server 2003, 2008, 2008
R2, and 2012 majority node configurations. However, there must be a shared disk
in the configuration for DLO to share the database files between the nodes.
The controlling node and designated failover nodes must be online when
installing Admin DLO server into the cluster.
A unique IP address and a unique network name are required for configuring
DLO service on a MSCS cluster.
While configuring DLO service on a MSCS cluster, it is mandatory that the user
executing the DLO Cluster configuration utility from the active node must be the
owner of the shared disk and the active node.
Use the domain admin account for DLO services on all nodes in the cluster. If
nodes in a cluster use DLO and have different accounts, change the services to
use the domain admin account.
While clustering the machine using domain user account, which is part of
domain admin group, provide additional rights/privileges to this user account on
the Computer container in Domain Controller for performing cluster
operations. The user account should have the following privileges:
195
196
http://blogs.technet.com/b/askcore/archive/2010/06/02/rights-needed-for-use
r-account-to-create-a-cluster-name-object-cno-on-windows-server-2008-r2-fail
over-cluster.aspx
Go to Start > Programs > Symantec > Symantec DLO > DLOCluster
Configuration Utility.
In Type a unique name for the Symantec DLO cluster group, or use default
- enter the required name or use Symantec DLO (default name).
In Select a network adaptor card for this node, or use the default - select
the public option.
Note: The private option is selected for using clusters internally.
Note: Ensure that you select the shared disk drive only.
The changed location is displayed in the Cluster Group Information
window.
5
Click Next.
In Enter a name for the Symantec DLO virtual server or use the default enter the required server name or use DLOVRS (default name).
In Type the IP Address of the Symantec DLO virtual server - enter the
virtual IP address of the virtual server.
In Type the subnet mask of the Symantec DLO virtual server - enter the
subnet mask of the virtual server.
Click Next.
In Add or Remove Nodes, click Add to add the nodes to the Symantec DLO
cluster group.
Click Next.
10 In Summary, the summary of changes that are made to the cluster configuration
are displayed.
11 To exit the wizard, click Finish.
Unclustering DLO
Pre-requisites for Unclustering DLO
Before unclustering DLO, ensure that you complete the following tasks:
1
Create a new DLO Storage Location on the local disk and assign the Dedupe
Storage Location that was created on the local disk to this DLO Storage Location.
Move the network user data folder from the virtual server to the newly created
DLO Storage Location on the local disk.
Run the -ChangeDB command to change the existing database on the shared
disk to a database on the local disk.
DLOCommandu.exe ChangeDB DBServer <DB Server Name>
-DBInstance <DB Instance Name> -DBName <DLO Database Name>
-DBDataFile <DLO data file name> -DBLogFile <DLO log file>
For more information about the command, see -ChangeDB command on
page 265.
Run the -ChangeServer command to change the existing media server on the
shared disk to a media server on the local disk.
DLOCommandu.exe -ChangeServer -M <Media server name> A
For more information about the command, see -ChangeServer command on
page 266.
Go to Start > Programs > Symantec > Symantec DLO > DLOCluster
Configuration Utility.
197
198
In Add or Remove Nodes, select the nodes that must be removed from the
cluster and click Remove.
The selected nodes are moved to Nodes not in the Symantec DLO cluster group.
Click Next. A warning message stating You have chosen to remove all nodes. Do
you wish to remove the data off the shared drive? is displayed.
Click Yes. A warning message is displayed: Do you wish to make the data from the
shared drive available for use by this local node after removal of the cluster
group?
Click Yes.
In Ready to Configure the Cluster, click Configure to apply the settings to the
cluster configuration.
After the cluster is removed successfully, the Summary screen displays the
summary of changes that are made to the cluster configuration.
Note: After unclustering DLO, ensure that you change the Dedupe Servers host
name to the local host name. For more information about editing the Dedupe Server
details, see Modifying Dedupe Server on page 66.
From the DLO 7.6 installer package, extract the binaries (DLOClusconfig.exe
and DLOCluster.dll) from the clusterpatch.zip file.
Replace the DLO 7.0 cluster binaries with the extracted binaries, only on the
machine where DLO will be unclustered.
The binary files are located at this path:
C:\Program Files\Symantec\Symantec DLO\DLOClusconfig.exe.
and
C:\Program Files\Symantec\Symantec DLO\DLOCluster.dll.
To uncluster the existing DLO on the server, follow the procedure explained in
the section, Unclustering DLO on page 197.
To re-configure DLO 7.6 on the Microsoft cluster server, follow the procedure
explained in the section Configuring DLO on a Microsoft Cluster Server on
page 196.
199
200
Chapter
202
files between multiple desktops, configure backup selections, set schedules, view
history and perform other tasks.
The administrator may also configure the Desktop Agent to run without a user
interface, run with a fully functional user interface, or somewhere in between.
Data Protection: Selected files on the desktop are automatically copied to user
data folders on the desktops local drive and on the network. The Desktop Agent
can be configured so that no user interaction is required. Files are protected
automatically when the desktop is online or offline.
Data Availability: Users can access data from multiple desktops in multiple
locations if they are using the same login credentials on each desktop. When the
desktop is offline, users can restore previous file revisions if they have saved at
least one file revision in the desktop user data folder.
Synchronization: A user that accesses multiple computers with the same login
credentials can configure folders to be synchronized on each of the computers.
When a synchronized file is changed on one computer, the updated file is copied
to the network user data folder and also to the desktop user data folder on all
other computers that are configured for synchronization.
Item
Description
Operating System
CPU
Processor
Table 4-1
Item
Description
Memory
Required: 1 GB RAM
Recommended: 2 GB (or more for better performance).
Disk Space
The DLO administrator or the desktop user can install the Desktop Agent. For more
information about user rights and privileges, see User privileges for installing and
managing DLO on page 19. The logged on user will only have access to DLO backup
files associated with the logged on account.
All computers running the Desktop Agent should be set to a common time. This can
be accomplished by configuring the Windows Time Synchronization service on the
network. See www.microsoft.com for more information.
Note: You must have administrator rights to the desktop where the Desktop Agent
needs to be installed. If you need to restart the desktop during installation, you must
use the same administrator login credentials so that the installation completes
successfully.
To install the Desktop Agent
1
From the desktop on which you want to install the Desktop Agent, browse to the
network server where the installation files for the Desktop Agent are stored. The
default location is \\<DLO Administration Server name>\DLOAgent. If
you are not sure of the location, contact the administrator.
Read the license agreement, and then click I accept the terms in the license
agreement.
Click Next.
To change the location on the desktops local drive where the Desktop Agent
will be installed, click Change and enter the alternate location, then click
OK.
To install the Desktop Agent in the default location, continue with step 7.
The default installation location is C:\Program
Files\Symantec\Symantec DLO\DLO.
203
204
Click Next.
Click Install.
You can use only one set of domain credentials with one local account. If you use
more than one local account on a desktop computer or laptop, you should either
disable DLO for other accounts or have unique domain credentials for each
account. For more information, see To log on with alternate credentials or to
disable accounts on page 206.
Example
Multiple users of the same desktop computer can all use DLO, but must provide
unique credentials for the desktop computer and unique domain credentials for
the Desktop Agent.
When the Desktop Agent is installed on a computer that is not in a domain, and
when you launch the Desktop Agent for the first time, you are prompted to enter
the user name, password, and domain. Provide the administrator credentials
that was used to install the DLO Administration Server.
205
206
When you are logged on to the desktop computer with an account that is not
recognized by the Desktop Agent, the Alternate Credential dialog box appears.
Alternate Credentials
Item
Description
User name
Enter the user name for the account that will be used for
Desktop Agent operation.
Password
Enter the password for the account that will be used for
Desktop Agent operation.
Domain
Type the domain for the account that will be used for
Desktop Agent operation.
Save my password
Click OK.
If you want to reset any information dialogs suppressed by the Dont show me
this message again check box, click Reset dialogs.
If you want to clear any passwords and account information that the Desktop
Agent has stored, click Reset accounts.
Click OK.
Files are not transferred to the network user data folder. Pending files remain in
the pending files list with a status as Pending network.
Job logs are not copied to the network user data folder.
Click the connection status on the lower right corner of the Desktop Agent.
Note: The DLO Administrator sets a maximum time after which the Desktop Agent
automatically returns to the online mode, assuming a network connection is
available.
From the Windows system tray, right-click the Desktop Agent icon.
Click Disable.
This option will be grayed out if you do not have permission to take this action.
207
208
From the Windows system tray, right-click the Desktop Agent icon.
Click Enable.
This option will be grayed out if you do not have permission to take this action.
Display the complete interface: Enables desktop users to access all Desktop
Agent options.
Display only the status: Enables desktop users to view the status of backup jobs,
but they cannot change Desktop Agent settings or access options other than
status. Desktop users can right-click the system tray icon to open the status view
or exit the program.
Display only the system tray icon: The desktop user sees only the Desktop
Agent icon in the system tray in the lower right corner of the screen. Desktop
users can right-click the system tray icon to exit the program.
Do not display anything: The Desktop Agent runs in the background. The
desktop user cannot view the Desktop Agent.
209
210
Figure 4-1
Views menu
Tools menu
Task menu
Task bar
Menu bar
Status bar
Connection Status
Description
Menu bar
The menu bar appears across the top of the screen. To display a menu,
click the menu name. Some menu items are not available until an item is
selected from the console screen.
Tasks bar
The Tasks bar appears on the left side of the Desktop Agent Console. To
hide the Tasks bar, from the View menu, select Tasks bar. Actions are
initiated from the Tasks bar, and these actions vary with the selected
view.
Views menu
The Views menu appears in the Tasks bar and enables you to navigate to
the following views:
Status
Provides job status, lists pending jobs, and summarizes recent backup
activity. See Restoring Files Using the Desktop Agent on page 237 for
more information.
Backup
Selections
Enables you to define what data is protected by the Desktop Agent. See
Managing the Desktop Agent on page 208 for more information.
Synchronized
Selections
Restore
Enables the user to restore backed up data and search for backed up files.
See Restoring Files Using the Desktop Agent on page 237 for more
information.
History
Tasks menu
Actions are initiated from the tasks menu. These actions vary with the
selected view.
Reset dialogs that have been suppressed by the Dont show me this
message again check box.
Note: To ensure that you have the latest status and settings at any time while using
the Desktop Agent, click Tasks > Refresh.
211
212
Managing Revisions
Revisions are versions of a file at a specific point in time. When a file is changed and
backed up, DLO stores a new revision. DLO stores and maintains a specific number of
revisions for all files in a backup selection. Because each backup selection is
configured separately, the number of revisions retained can vary for different
backup selections.
When the number of revisions exceed the limit, DLO removes the oldest revision,
maintaining only the specified number of revisions in the desktop and network user
data folders.
You can limit the number of revisions DLO retains in a given period of time. If you
are working on a document and backing it up frequently, all your revisions could
potentially be just a few minutes apart. By specifying that you want to retain only 2
revisions every 24 hours, at least 120 minutes apart, you can retain older revisions
for a longer period of time. While some intermediate versions will not be retained, it
does support situations when you want to access the older revision.
The amount of space required for backups can be estimated by multiplying the
number of revisions retained by the amount of data protected.
Example
Although compression can improve the space utilization, it varies significantly with
file type and other factors.
File Grooming
The Desktop Agent grooms revisions based on backup selection settings and
performs this task as new revisions are created. The oldest revision is deleted when a
new revision is created that exceeds the limit.
Maintenance grooming is the process for grooming deleted files. It occurs at most
once every 24 hours. Maintenance grooming occurs during the first backup that runs
after 24 hours have passed since the last maintenance grooming.
Note: Profile backup selections are the settings configured for your profile by the DLO
administrator. Profile backup selections are displayed in the Standard view with
gray check boxes.
You cannot modify profile backup selections in the Standard view. You can only
modify the backup selections that you create on the Desktop Agent. They can be
modified in the Advanced view if the administrator has granted you sufficient rights.
See Modifying Backup Selections in the Advanced View on page 219 for more
information.
When you create new backup selections in the Standard view, the default backup
selection settings are used. When you add new sub folders and files to the backup
selection using the Standard view, these new backup selections will have the same
settings as the main folders.
Figure 4-2
Standard view
In the Standard view, files and folders are represented in a tree view where users can
select files and folders for backup. When the check box next to a file or folder is
grayed out, it indicates that the selection was defined by the administrator and can
only be changed if the administrator has granted this right in the profile definition.
When a red 'X' appears in the check box next to a file or folder, this item has been
globally excluded from all backups by the administrator and cannot be selected.
To modify backup selections in the backup selections standard view
1
213
214
Note: To return to the last saved settings at any time, click Undo changes.
4
Click Save changes to save the new settings or Undo changes to return to the last
saved settings.
After clicking Save, previously backed-up selections that were not selected are
considered as deleted backup selections and will no longer be backed up. The
backup files for this selection will be deleted after the number of days specified
in the backup selection settings. The source files for the deleted backup
selection will not be deleted by the Desktop Agent.
Selected folders that were not previously selected are added to the backup
selections for this desktop.
Click Add.
From the General tab in the Backup Selection dialog box, select the appropriate
options.
Table 4-4
Item
Description
Name
Description
Folder to back up
Table 4-4
Item
Description
Select a pre-defined
folder
Item
Description
To add a filter to the Include/Exclude list, verify that you selected Include and
exclude only the items listed below in step 5, and click Add Include or Add
Exclude.
If you selected Add Exclude, you will be notified that all previously backed up
files matching this exclude will be deleted from this backup selection. Click Yes
to continue or No to cancel.
215
216
Item
Description
Filter
Description
Apply to
Click OK.
10 From the Revision Control tab, select the appropriate options for both the
desktop and network user data folders.
Table 4-7
Item
Description
Number of Revisions
Desktop user data folder
Table 4-7
Item
Description
Limit to
Limit to
Revision Age
Enter the number of days after which all revisions in
Discard all revisions in the
desktop user data folder older the desktop user data folder will be deleted.
than
Note: The latest revision will not be discarded.
Enter the number of days after which all revisions in
Discard all revisions in the
network user data folder older the network user data folder will be deleted.
than
Note: The latest revision will not be discarded.
217
218
Item
Description
Compression
Encryption
Select this option to encrypt files for transfer and for storage
in an encrypted format in the network user data folder.
Encryption is applicable to only those files that are created
after this option is activated. Previously stored files will not
be encrypted.
The Advanced Encryption Standard (AES) and a 256-bit key
length are used. If enabled, versions are stored without
encryption in the desktop user data folder, and encrypted in
the network user data folder. Transfer over the network is
encrypted.
When source files are deleted, delete the backed up files from the:
Desktop user data
folder after
Indicate the number of days after which DLO will delete all
file versions from the desktop user data folder after the
source file has been deleted from the desktop. The default
setting is 60 days.
Indicate the number of days after which DLO will delete all
file versions from the network user data folder after the
source file has been deleted from the desktop. The default
setting is 60 days.
Select the backup selection you want to change, and then click Modify.
Profile backup selections are those set by the DLO administrator. If the backup
selection is a profile backup selection, and if the user has been granted sufficient
rights, it can be modified by selecting Use custom selection from the drop-down
list. Once this option is selected, your backup selection will no longer be updated
when the administrator updates the profile backup selection.
You can return to the profile backup selection settings at any time by selecting
Use Profile selection from the drop-down list. Once you select this option, your
profile will be updated if the DLO administrator modifies the profile backup
selection.
Click OK.
219
220
Click Remove.
Click Yes to verify that you want to delete this backup selection, or click No to
cancel.
Some of the DLO options are not used even if they are enabled. These options
include Delta File Transfer, Compression, and Encryption.
DLO relies on Microsoft's Messaging Application Programming Interface (MAPI)
code to perform the actual backup of PST files. Using MAPI prevents the use of
these DLO options during an incremental backup.
This is a limitation of the way incremental backups are performed and is a
normal behavior for backups of Outlook *.pst files. This limitation applies only
to incremental backups.
When Outlook PST files are backed up incrementally, only one revision is
maintained irrespective of the number of revisions set in the backup selection.
The restored Outlook PST file will differ from the original PST file as explained
in Restoring Microsoft Outlook Personal Folder Files on page 240.
Even though a DLO profile is configured to limit the bandwidth usage during
data transfer to the network user data folder, this setting is not applicable for
incremental transfer of PST files.
Note: If you do not intend to use Outlook as your default mail application, you can
disable the warning message about incremental backups in the Desktop Agent.
On the Views menu, select Settings.
Click the Options tab and clear the Enable incremental backups of Outlook PST files
check box.
An application such as DLO or Microsoft Outlook detaches from the PST (when
Outlook is closed)
DLO startup
221
222
If the PST has already been backed up, then the entry is removed from the
Desktop Agent pending queue because DLO knows the PST is in sync. If the PST
is not being handled incrementally, the PST will be backed up in its entirety at
this time.
Location
Description
BOOKMARK.NSF
Notes\Data directory
NAMES.NSF
Notes\Data directory
A_<name>.NSF
To configure the Desktop Agent for incremental backup of Lotus Notes files
1
Verify that Lotus Notes was installed before the Desktop Agent was installed, or
that the Desktop Agent installer was run again after Lotus Notes was installed to
repair the installation.
Verify that the Lotus Notes NSF files to be backed up have been selected in the
appropriate backup selection. See Managing the Desktop Agent on page 208
for more information on backup selections.
Check Enable message level incremental backups of Lotus Notes email files.
Click OK.
The DOS-window cannot be closed without manually exiting the DLO process. If you
configure the current user for Lotus Notes, the errors are no longer generated at
login for that user.
223
224
Description
Status
Details
Show/Hide Pending Files Hides or displays pending files. This selection toggles
between Hide pending files and Show pending files when
you click the link.
Usage Summary
Network Usage
Local Usage
Details
Figure 4-3
225
226
Under Tasks in the Desktop Agent Tasks bar, click Run job.
All pending jobs will be run, such as backup, synchronization or restore jobs.
Options
Continuous
Manual
Scheduled
Total disk space currently used on the network and desktop computer to store
your backup data
Quotas, or maximum allowed storage space which can be used to store your data
on the network and desktop computers
The disk space available on the network and desktop computer for storing your
data
Note: The link to usage details is only available when the Desktop Agent is idle. It will
not be shown when a job is running.
To view usage details and groom files
1
Under Usage Summary in the Status pane, click Details to open the Usage
Details dialog.
Review the usage information and take the appropriate actions as described in
the following table.
Table 4-11
Item
Usage Details
Description
Usage
Local
227
228
Table 4-11
Item
Description
Network
Synchronized Files
Additional information
View last job log
Click the button to open the Log File Viewer. For more
information on the log file viewer, see Monitoring Job
History in the Desktop Agent on page 246.
Logging level
Bandwidth usage
The Desktop Agent will continue to use settings specified in the profile until you
specifically choose to use customized schedules or options as described in Changing
Backup Job Schedule Options on page 229 and Setting Customized Options on
page 231.
You can change Desktop Agent settings and backup selections when you are working
offline. The settings will be stored and when you are working online again, they are
automatically transferred. If the administrator has also made changes that conflict
with the changes made on the Desktop Agent, then the changes made by the
administrator will be used.
Note: Changing settings on one Desktop Agent causes settings to be loaded on other
Desktop Agents that use the same authentication. This will cancel and restart any
running jobs.
229
230
Select the appropriate options as described in the following table and then click
OK.
Table 4-12
Item
Description
Run jobs:
Whenever a file changes
According to a schedule
Manually
Logout/Restart/Shutdown options
Do nothing
Table 4-12
Item
Description
231
232
Select the appropriate options as described in the following table and then click
OK.
Table 4-13
Item
Description
After minimum number of Enter the maximum combined size of all log files to be
days, delete oldest log
retained before the oldest log files are deleted.
files when combined size
Note: You may have more than the specified number of
exceeds
MB of log files stored if none of the log files are as old as
specified in the Keep log files for a minimum of (days)
setting.
Logging options
Log groom messages
Table 4-13
Item
Description
Log information messages Select this option to create logs for all backup
for backup
operations.
Log warning messages
Click Move.
Figure 4-4
Settings
233
234
In the Browse for folder dialog box, choose a new location for the desktop user
data folder.
Click OK.
Click OK.
One connection policy that matches a specific user or computer disables backups to
the network user data folder of all files over 500 KB. A second connection policy that
also matches the computer or user disables all backups to the network user data
folder. The second policy will be used because it is more restrictive to limit all
backups than just backups of large files.
To customize connection policies
1
Under Tools in the Desktop Agent Tasks bar, click Settings, and then click the
Connection Policies tab.
Select the appropriate options as described in the following table and then click
OK .
Table 4-14
Item
Description
Connection Type
Dialup
IP address range
Active Directory
235
236
Table 4-14
Item
Description
Limit network bandwidth Select this option and enter a value in KB/sec to restrict
the usage of network bandwidth to the specified value.
usage to
Enforce policy according
to scheduled window
3
Table 4-15
If you selected Active Directory in step 2 above, configure the Active Directory
settings as described in the following table and click OK.
Description
Object
In LDAP Directory
Attributes
Condition
Value
Restore view
237
238
Item
Description
All revisions
Latest revision
Revisions modified on
or after
Click Restore.
Select the appropriate options as described in the following table and then click
OK.
Table 4-17
Item
Description
Redirect the restore to an Select this option to restore files and folders to an
alternate folder on the same computer.
alternate folder on this
computer
Preserve folder structure Select this option to restore the data with its original
directory structure. If you clear this option, all data
(including the data in subdirectories) is restored to the
path you specify.
Options
If file already exists
Do not overwrite
Prompt
Overwrite
Preserve security
attributes on restored
files
Under Tasks in the Desktop Agent Tasks bar, click Search for files to restore to
open the Search dialog.
239
240
3
Table 4-18
Select the appropriate options as described in the following table and then click
OK.
Description
Search for file names with this text Type all or part of the file name or folder you want
to find.
in the file name
Modified
Today
Between
Any rule that points to a folder inside a PST file will no longer work. You must
edit the rule to point to the correct folder.
Restored PST files will have Inbox, Outbox, and Sent Items folders, even if the
original files did not have them.
If you use a password for your PST file, you must reset the password after
restoring your PST file.
Note: Make sure that the appropriate 32-bit or 64-bit Outlook or Lotus Notes client is
installed on the computer where you want to restore the PST or NSF files.
241
242
have multiple desktops, your network user data folder contains copies of backed up
files from each desktop. When a folder is synchronized using the Desktop Agent,
only one copy of the folder and its contents are included in the network user data
folder. When the file is changed on one desktop, it is stored in the desktop user data
folder on that computer, and then uploaded to the network user data folder the next
time a DLO job is run. It is then available for download to another synchronized
desktop computer the next time that computer runs a job.
After a folder is synchronized, the Desktop Agent checks the network user data
folder each time the desktop is connected to the network and a job is run. If new file
versions are available in any of the synchronized folders, the Desktop Agent
downloads the new version to the user data folder on the desktop. If you change a file
on your current desktop and change the same file on one of your other backed up
computers without synchronizing the files, a conflict will occur and you will be
prompted to select a particular file revision to use.
The Synchronized Selections view displays folders backed up on your other desktops
that are available for synchronization. Select any of these folders that you want to
synchronize with the current desktop computer.
Figure 4-6
Makes synchronized files available to other computers with which the desktop is
synchronized.
243
244
Retains all conflicting versions of files. You can then choose which version to
use.
When you back up files, you can set various filters, such as types of files to include,
exclude, compress, or encrypt. When you synchronize files between computers, the
filters are combined. For example, if one of the synchronized files is compressed and
encrypted, all synchronized files will be compressed and encrypted automatically. If
the original backup selection backed up only .jpg files, the synchronized file set will
include only .jpg files.
If the settings for a synchronized folder are changed after the folder is synchronized,
and the folder is later unsynchronized, the folder will revert to the original backup
selection settings. For example, if the original backup selection backed up only .jpg
files and the folder is later synchronized and set to back up all files, if the folder is
then unsynchronized, it will once again back up only.jpg files.
If the number of files backed up on different computers varies, DLO synchronizes the
largest number of files. For example, if you back up three files on computer A and
back up five files on computer B, DLO synchronizes five files.
Synchronized selections are subject to limitation by global excludes in the same
manner as backup selections. See Configuring Global Exclude Filters on page 121
for more information.
You can manage synchronization using the following options:
Advanced view: Enables you to modify settings for each synchronization set.
Under Views in the Desktop Agent Tasks bar, click Synchronized Selections.
Note: A desktop must have the same owner and must be backed up with the
Desktop Agent to appear in the Synchronized Selections view. Only backed up
folders are available for synchronization.
3
When the Choose Local Folder dialog box appears, type or browse to the location
where the synchronized files must be stored.
Click OK.
Click Save changes to save the selections or Undo changes to return to the last
saved settings.
Under Views in the Desktop Agent Tasks bar, click Synchronized Selections.
Click Modify.
The General tab in the Synchronized Folder dialog box identifies the location
where synchronized files from this selection will be stored, and also lists other
computers synchronizing with the selected folder.
Click OK.
Under Views in the Desktop Agent Tasks bar, click Synchronized Selections.
Click Remove.
When prompted, if you want to delete the backup selection, click Yes to continue
or No to cancel.
245
246
Click the Conflicts have been found link to open the Resolve Conflicts wizard.
Click Finish.
Item
Description
Started
Ended
Status
Table 4-19
Item
Description
Errors
Figure 4-7
History view
247
248
To view backup logs, select the Backup tab, or to view restore logs, select the
Restore tab.
Select the appropriate History view filter option from the Show drop-down list:
All logs with errors: History logs for all jobs that generated errors are
displayed.
Logs filtered by date: All logs generated after a specified date and time are
displayed. Enter the date and time after which logs are to be displayed in the
Filter by date dialog box and click OK.
Click the job history entry for which you want to view the history log.
In the History pane, click the Search link to open the Log File Viewer.
Item
Description
Select this option to show all log entries in the log file
viewer.
With timestamp of
249
250
Table 4-20
Item
Description
Backup
Restore
Move User
Maintenance
Error
Warning
With Filenames containing Select this check box and enter a filename, or file type.
Wildcard entries are supported.
Example: *gold.doc
Note: When using wild cards, you must use the *
wildcard. For example, *.tmp will return all results with
the .tmp extension while .tmp will return only files
explicitly named .tmp.
Filter
Informational entries only
Click Search.
To view detailed information for a log file entry, expand the tree view for the
entry and click the + icon.
Scenario
Solution
251
252
Table 4-21
Scenario
Solution
Description
Processor
Intel
Memory
2 GB RAM or more
Disk space
Prerequisites
Complete the following tasks before installing the Desktop Agent on a Mac machine.
1
The DLO administrator must ensure that the TCP/IP protocol is enabled for the
DB instance, and the port number is set.
253
254
Irrespective of the firewall state in the DB server (ON or OFF), the administrator
must enter the DB port in SQL Server Configuration Manager > SQL Server
Network Configuration > Protocols for <Instance name> > TCP/IP Protocol
Settings > TCP Port.
If the firewall is ON in the DB server, then this port should also be included in the
firewall exception list.
Also, restart the DLO DB service after providing the TCP port number.
If there is a customized TCP Port, then do the following on DLO Mac Agent once
it is installed:
a
Change the String value of the key DBPort from 1433 to the new value.
From the desktop on which you want to install the Desktop Agent, go to the
desktop menu options, select Finder.
In the Server Address field, type the network address of DLO Server using one of
the following formats.
smb://IPaddress/
smb://DNSname/
Click Connect.
Note: You can also type the server address along with the share name.
smb://IPaddress/DLOMacAgent.
From the list of shared folders, open DLOMacAgent folder, copy the setup.ini and
the installer package for Mac to your local machine.
Copy the installer package for Mac to the same location where you copied the
setup.ini file.
10 Click Agree.
11 The default installation path for Mac is: /Applications. To install the Desktop
Agent in an alternate location, click the Change Install Location button, and do
one of the following:
a
Select Install for all users to install Desktop Agent in the default location,
OR
Select Install on a specific disk to install in any other disk other than the
default startup disk. This option is useful when you want to install the
Desktop Agent on any additional hard disks or hard drive partitions that
exist on the local Mac machine.
12 Click Continue.
13 Click Install.
14 Once the installation is completed, click Close.
Navigate to the location where you installed the Desktop Agent and double-click
the application SymantecDLO.
When you launch the Desktop Agent for the first time, a dialog is displayed.
Type the password. The User Name field displays the name of the user who has
logged in.
To save the user credentials to the login keychain, select the check box Save
encrypted passwords used by DLO and click OK.
In case you clear this check box, then you need to enter the user credentials
every time you launch the Desktop Agent.
Click the Desktop Agent tray app icon and from the tray app menu, click Open
Desktop Agent.
The Desktop Agent is launched and relevant status of the Agent is displayed in
the Status menu.
255
256
Item
Description
My Documents
My Desktop
My Music
My Movies
My Pictures
Display the complete interface: Enables desktop users to access all Desktop
Agent options.
Display only the status: Enables desktop users to view the status of backup jobs,
but they cannot change Desktop Agent settings or access options other than
status. Desktop users can right-click the icon to open the status view or exit the
program.
Display only the icon: The desktop user sees only the Desktop Agent icon in the
top-right corner of the screen. Desktop users can right-click the icon to exit the
program.
Do not display anything: The application icon is displayed but the options are
not listed.
Follow the procedure from step 4 on page 214 until step 12.
257
258
Select the folder that you want to modify and click Modify or double-click the
folder.
Click Remove.
Click Yes to verify that you want to delete this backup selection, or click No to
cancel.
To revert a synchronized folder to the normal backup mode, clear the check box
next to the synchronized folder in the right pane.
259
260
Chapter
Option
Description
C <computer>
N <user>
262
Table 5-1
Option
Description
W <password>
-DB <dbname>
-DBInst <instance>
You can use the -logfile parameter along with the specific command to capture
the results in a log file.
The default path is the \Logs folder within the installed path:
C:\Program Files\Symantec\Symantec DLO\Logs
Example
DLOcommandu -AssignSL LogFile <path\filename>
Commands in Detail
See the following topics for detailed information on available commands:
-AssignSL command
The AssignSL command is used to assign a new DLO Storage Location to existing
users when the existing DLO Storage Location is no longer available. The new DLO
Storage Location must be managed by the same DLO Administration Server.
Caution: If the existing DLO Storage Location is accessible, use the -MoveUser
command to move users to a new DLO Storage Location. See Moving Desktop Agent
Users to a New Network User Data Folder on page 141 for more information.
Desktop Agent users can be assigned to new DLO Storage Locations based on the
user account name, profile name, profile ID, DLO Storage Location, DLO Storage
Location ID, and f ile server.
The Desktop Agent that is being moved will be disabled until the Administration
Server is notified that the move is complete.
Note: This command does not move the users data. To assign a new DLO Storage
Location to existing users and move the associated data, use the -MigrateUserSL
command on page 280.
263
264
Syntax:
DLOCommandu AssignSL NI [A | F | P | PI | S | SI |
U]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Command options
Table 5-2
AssignSL Options
Option
Description
NI <new SLID>
The -NI option is used to specify the name of the new Storage
Location.
F <file server>
P <profile name>
PI <profile ID>
S <SL name>
SI <SL ID>
U <user>
Examples:
DLOCommandu AssignSL NI DLO_SL02 A
DLOCommandu AssignSL NI DLO_SL03 U mmouse
-EnableUser command
The -EnableUser command is used to enable or disable a user.
Use this command if you want to force the desktop computer to refresh from the
DLO Administration Server.
Syntax:
DLOCommandu -EnableUser [E | D] [A | F | P | PI | S |
SI | U]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Command options
Table 5-3
Option
Description
F <file server>
P <profile name>
PI <profile ID>
S <SL name>
SI <SL ID>
U <user>
Examples:
DLOCommandu EnableUser E A
DLOCommandu EnableUser D U mmouse
-ChangeDB command
The -ChangeDB command is used to change the existing database to another DLO or
Dedupe database.
265
266
Syntax:
DLOCommandu ChangeDB DBServer <DB server name> -RemoteDB
-DBInstance <DB instance name> -DBName <DLO database name>
-DBDataFile <DLO data file name> -DBLogFile <DLO log file>
Command options
Table 5-4
Option
Description
DBServer
-RemoteDB
DBInstance
DBName
DBDataFile
DBLogFile
-ChangeServer command
The -ChangeServer command is used to reassign users to another DLO
Administration Server.
Each desktop user must back up data to a network user data folder that is managed
by the same Administration Server to which the user is assigned. If a matching
automated user assignment is available on the new DLO Administration Server, the
user is automatically assigned a profile and Storage Location. If a matching
automated user assignment is not available, the user can be manually configured.
When a Desktop Agent user is reassigned from one Administration Server to
another, the users current profile settings and existing backup files are not moved.
They remain on the original file server.
Syntax:
DLOCommandu ChangeServer M <DLO Administration Server> [ A | F
<file server> | P <profile name> | PI <profile id> | S <SL name>
| SI <SL id> | SP <SL path> | U <user> ]
Note: Wildcard matches (*) are permitted in profile, Storage Location, and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Command options
Table 5-5
Option
Description
F <file server>
M <DLO Administration
Server>
P <profile name>
PI <profile ID>
S <SL name>
SI <SL ID>
SP <SL path>
U <user>
Examples:
DLOCommandu ChangeServer M sunshine P Desktop*
DLOCommandu ChangeServer M sunshine SP
\\moonlight\EngDept
DLOCommandu ChangeServer M sunshine SP
\\moonlight\EngDept\EnterpriseMNoel
-KeyTest command
The -KeyTest command scans network user data to identify encrypted data that
cannot be restored with the current encryption-key.
Syntax:
DLOCommandu KeyTest
267
268
Command options
The following options can be used independently or in combination.
Table 5-6
Option
Description
-f
Forces a full scan for all users even if the data has already been
validated.
-quar
-purge
Examples:
Check for unrestorable data that has not
previously been validated, or that was
backed up by an old version of the Desktop
Agent:
DLOCommandu keytest
Scan all data, even if it has been previously DLOCommandu keytest -f -quar
validated, to identify unrestorable data.
Quarantine unrestorable data.
-ListProfile command
The -ListProfile command is used to list profiles of Desktop Agent users.
Syntax:
DLOCommandu ListProfile [A | P ]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Command options
Table 5-7
Option
Description
P <profile name>
Examples:
DLOCommandu ListProfile A
DLOCommandu ListProfile P <yourprofile>
-ListSL command
The -ListSL command is used to list the DLO storage locations.
Syntax:
DLOCommandu listsl [A | F | S ]
Note: Wildcard matches (*) are permitted in profile, Storage Location, and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Command options
Table 5-8
Option
Description
F <file server>
S <SL name>
Examples:
DLOCommandu listsl A
DLOCommandu listsl F yourserver
DLOCommandu listsl S yourSL
269
270
-ListUser command
The -ListUser command is used to list by All, file server, profile name, profile ID,
DLO Storage Location name, DLO Storage Location ID, or user name.
Syntax:
DLOCommandu listuser [A | F | P | PI | S | SI | U]
Note: Wildcard matches (*) are permitted in profile, Storage Location, and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Command options
Table 5-9
Option
Description
F <file server>
P <profile name>
PI <profile ID>
S <SL name>
SI <SL ID>
U <user>
Examples:
DLOCommandu
DLOCommandu
DLOCommandu
DLOCommandu
listuser
listuser
listuser
listuser
A
P yourprofile
U mmouse
U m*
-Update command
The -Update command is used to list, add, remove, and publish Desktop Agent
updates.
Syntax:
DLOCommandu update [list | add | remove | publish]
Subcommands:
The following subcommands allow you to list, add, remove, or publish updates. See
Command options on page 272 for a description of the available options for each
command.
Table 5-10 Update Sub commands
Sub Command
Description
271
272
Command options
Table 5-11 Update Command and Sub-Command Options
Option
Description
Updates all
F <file name>
U <user name>
P <profile name>
PI <profile ID>
Designates to un-publish
UI <update ID>
Note: Wildcard matches (*) are permitted in profile, DLO Storage Location and user
names.
Quotation marks are required around names if the name contains a space or
colon.
Examples:
-EmergencyRestore command
The -Emergency Restore command uses the DLO administrators recovery
password to restore user data that would otherwise be unavailable if the DLO
database is damaged or corrupted. You must know the recovery password to execute
this command. The data will be restored to the specified location in the original data
structure, but it will no longer be encrypted. See Setting a Recovery Password on
page 26 for more information.
In case of VIP users, type the VIP password to restore the data.
Syntax:
DLOCommandu EmergencyRestore <usersharepath> -W <recovery
password> -AP <destination path>
Command options
Table 5-12 EmergencyRestore Command Options
Option
Description
<usersharepath>
-W <recovery password>
-SetRecoveryPwd command
The -SetRecoveryPwd command is used to change the recovery password, which
enables you to retrieve encrypted data that would otherwise be lost if the DLO
database is damaged or corrupted. The -SetRecoveryPwd command now updates
the password for existing users as well as new users.
273
274
Once set, this recovery password can only be changed using the DLO command line
interface tools.
See Setting a Recovery Password on page 26 for more information.
Syntax:
DLOCommandu SetRecoveryPwd <password>
-NotifyClients command
The -NotifyClients command forces the Desktop Agents to refresh the profile
settings immediately, or the next time the Desktop Agent connects if it is offline.
Syntax:
DLOCommandu notifyclients
-InactiveAccounts command
The -InactiveAccounts command is used to list and delete accounts that have
not been used in a specified number of days.
computer name
computer ID
domain\user name
user ID
-RenameDomain command
The -RenameDomain command is used after a Windows NT domain has been
renamed. Running the -RenameDomain command changes each Desktop Agent
users record to reflect the new domain name and changes the path for the network
user data folder. It also notifies each Desktop Agent of the change.
Syntax:
DLOCommandu RenameDomain -OD <Old Domain Name> -ND <New
Domain Name>
-RenameMS command
The -RenameMS command is used when an Administration Server has been
renamed. Running the -RenameMS command updates the installation share, DLO
Storage Location paths and network user data folder paths. It also notifies each
Desktop Agent of the change.
Syntax:
DLOCommandu RenameMS -OM <Old Media Server Name> -NM <New
Media Server Name>
-LimitAdminTo command
The -LimitAdminTo command limits administration of DLO to the specified group
or user.
Syntax:
DLOCommandu LimitAdminTo -NAU <domain\NewAdminName>
DLOCommandu LimitAdminTo -NAU <domain\NewAdminGroup>
275
276
Command options
Table 5-13 -LimitAdminTo Command Option
Option
Description
-NAU
-DAU
-L
-IOProfile command
The -IOProfile command enables a profile to be exported from one
Administration Server, and then imported to another Administration Server. An
option is also provided to import global settings.
Note: When a profile is imported, it does not initially have any users assigned to it, so
there is no immediate impact. When global settings are imported, they immediately
apply to all Desktop Agent users assigned to the server.
To export a profile:
DLOCommandu C <master server name> -IOProfile -DBF <export
file name> -E <profile name>
This exports the requested named profile (-E) from the specified server (-C) into
the named file (-DBF). It is not necessary to specify the master server name with
the -C option if the profile is on the same server where the command is run.
To import a profile:
DLOCommandu C < server name> -IOProfile -DBF <export file
name>
This imports the profile in the given file (-DBF) into the named server (-C.)
To import the global settings in addition to the profile, use the import profile to
replace global settings (IPRGS) option as follows:
-Report command
The -Report command generates and saves one of the predefined DLO reports. To
generate a report you must specify the name of the .rdl file associated with the
report.
For a list of all available reports and their corresponding .rdl file names, use the
-ListReport command on page 278 or use the file name available when selecting
Reports < report_name > Properties from the DLO Administration Console.
Any filter criteria and the output path where the report is stored are optional.
The report format is also optional. By default the report is generated and saved in
HTML format. The default report format in the DLO global settings is not used by
this command.
Syntax:
DLOCommandu -Report -RDL <RDL File Name> [-O <Output Path>]
[-FC <Computer Name>] [-FU <User Name>] [-FD <Days>] [-T
<PDF | HTML | XML | XLS>]
277
278
Command options
Table 5-14 -Report Command Option
Option
Description
-O <Output Path>
Examples:
DLOCommandU -Report -RDL DLOactiveevents_en.rdl -FD 3 -FC MyDesktop -O
C:\DLOReports -T PDF
This sample command generates a report of the Active Alerts in the past 3 days, for
the machine named MyDesktop and stores the report in C:\DLOReports folder.
For unique report identification, generated reports have a name which is the .rdl
file name appended by a time stamp. The time stamp includes year, day, month,
hours and minutes.
In this example, if the command is executed at 10.28 AM on 25 March 2013, it
generates the report file in the folder C:\DLOReports, with the name as
DLOactiveevents_en_201325031028.pdf.
-ListReport command
This command lists all of the reports available in DLO and the names of the
corresponding RDL files. The command does not accept any options.
Use this command to determine the name of the RDL file used as input to the
-Report command on page 277.
Syntax:
DLOCommandu -ListReport
-ReportInfoGen command
This command collects the most recent information for the following reports:
Note: When you want view the most recent information, then run this command
before generating the specific report.
Syntax:
DLOCommandU.exe -ReportInfoGen DBServer <DB Server Name> -DBInstance <
DB Instance Name>
-MigrateDomain command
This command is used to migrate a user from an old domain to a new domain in
trust.
Syntax:
DLOCommandu -MigrateDomain -OD <OldDomainName> -ND <NewDomainName> -U
<UserName> *
Command options
Table 5-15 -MigrateDomain Command Option
Option
Description
-OD
-ND
-U
-ChangeProfile command
This command is used to change the profile assigned to the user(s). Multiple users
can be assigned with the same profile.
Syntax:
DLOCommandu -ChangeProfile -NP|-NPI [-A|-F|-P|-PI|-S |-SI|-U]|-UF
279
280
Note: Wildcard '*' match is permitted in profile, Storage Location, and user names.
Quotations around name are required if name contains a space or colon.
Command options
Table 5-16
Options
Descriptions
-NPI <new SL path> Fully qualified UNC path to new network user data folder
-A
-F <file server>
-P <profile name>
-S <SL name>
-U <user>
-UF <text file name> Migrate user listed in the given text file.
Note: While running the above command, the text file should be
placed in the path C:\Program Files\Symantec\Symantec
DLO.
Examples:
DLOCommandu -ChangeProfile -NP newprof -A
-MigrateUserSL command
This command migrates an existing DLO user's network user data folder (NUDF)
from one storage location to another location. Users are moved to the new storage
location along with their data. A storage location should be a CIFS-based network
user data folder that can exist on a Windows server and on certified NAS devices that
support CIFS.
Users are disabled during a migration until the client computer is notified that the
migration is complete. On successful migration, the DLO Agent automatically
restarts, the user is enabled and the user profile is updated to point to the new
storage location. Users data is not deleted from the old storage location. This data
should be deleted manually.
The command also monitors and reports on the progress of the migration (the
Migration Status report). The command logs the operation details in a log file and
also displays the progress in a command window.
The status message Data Migration in Progress indicates that the users NUDF
migration to a new storage location is in progress. In case the migration process is
specifically interrupted, the user status remains as Data Migration in Progress.
See What happens if the migration process fails or is interrupted? on page 282.
Note: Outlook (if MAPI PST files are migrated) or Lotus Notes should be installed on
the server machine where this command will be executed.
Migrating Desktop Agent Users
Desktop Agent users can be migrated to new network storage locations based on the
following filter options:
Profile name
Profile ID
Storage location
Storage location ID
A new network storage location (the -NI or -NP options) and one of the eight filter
options for the user must be specified.
Note: Data migration will not happen when the user is being migrated between
Dedupe Storage Locations associated with the same Dedupe Storage Pool.
Syntax:
DLOCommandu -MigrateUserSL [-NI <new SL id>|-NP <new SL path>] [-A|-F
<file server>|-P <profile name>|-PI <profile id>|-S <SL name>|-SI <SL
id>|-U <user>|-UF <text file path>]
Note: Wildcard '*' match is permitted in profile, storage location, and user names.
Quotations around name are required if name contains a space or colon.
To get a list of all storage locations use the -ListSL command.
281
282
Command options
Table 5-17
Options
Descriptions
-A
All users
-F <file server>
-P <profile name>
-S <SL name>
-U <user>
Examples:
DLOCommandu -MigrateUserSL -NI DLO_SL02 -A
DLOCommandu -MigrateUserSL -NI DLO_SL03 -U SUS\mmouse
Case 1
Migration process fails due to issues such as data size mismatch on the source
and destination administration servers.
If the migration process fails due to issues such as network outage, the partially
migrated files are deleted from the new storage location. Any new backups are stored
in the original storage location. All the data needs to be copied again.
The migration procedure must be followed again to migrate the NUDF to another
storage location.
Case 2
Migration process is specifically interrupted.
If you interrupt the migration process with a kill command or a system shutdown,
the user status appears as Data Migration in Progress. The status of the computer
user is also disabled. The partially migrated files remain on the new storage location.
In this case, this user and the respective computers must be enabled through the
DLO Administration Console. The partially migrated files should also be removed
from the new storage location.
The migration process must be started again to migrate the NUDF to another storage
location.
-MigrateUser command
This command migrates single or multiple users from one Administration Server to
another Administration Server. The users data can now be accessed from the
destination Administration server. All user-specific settings such as customized
backup selection and policies are migrated along with the user.
The command also monitors and reports on the progress of the migration (the User
Migration Status Report). The command logs the operation updates and progress in a
log file.
The user that is migrated is disabled until the client computer is notified that the
migration is complete. Upon successful migration, the DLO Agent automatically
restarts and connects to the new Administration Server.
The following are the status messages for user migration:
User Migrated
User Migration in
Progress
283
284
Administrative
Rights
DLO Versions
Shared Clients
The user that is migrated must not share the client computer
with any other user.
Storage Locations
Profile
Dedupe Server
Dedupe Storage Pools On the destination administration server, configure the same
Dedupe Storage Pool that is present on the source administration
server.
The name of the Dedupe Storage Pools on the destination
administration server must be the same as the Dedupe Storage
Pools on the source administration server.
Dedupe Storage
Locations
On the destination administration server, create the same profile for the user.
The profile can be migrated to the destination server with the -IOProfile
command. The profile name must be the same on both the source and
destination servers. For more information, see -IOProfile command on
page 276.
285
286
Command options
Migrate User Command Options
Options
Descriptions
-M <media server>
-A
-F <file server>
-P <profile name>
-S <SL name>
-U <user>
-UF <text file path> Migrate users listed in the given text file.
Descriptions
-DBInstance <DB
instance>
Default: DLO
-DBName <DB
name>
Default: DLO
-DBDataFile <DB
data file>
Default: DLO.mdf
Default: DLO_log.mdf
Case 1
Migration process fails due to issues such as network outage.
In a multiple-user migration process, only one user is migrated at a time.
A rollback operation occurs if the migration process fails due to the following issues:
Network outage
Migrated users are not affected. These users are successfully migrated to the
destination administration server. The status for these users appears on the
source administration server as User Migrated.
Users that are not migrated still exist on the source administration server. See
the migration procedure in the preceding sections to migrate these users to the
new administration server.
Users that were in the process of migration are affected. A rollback operation
follows and the particular user on the source administration server rolls back to
its previous status (Enabled/Disabled). Also, the user profile points only to the
source administration server.
The migration process must be started again to migrate this user to the new
administration server.
Case 2
Migration process is specifically interrupted:
In a multiple-user migration process, only one user is migrated at a time.
If the migration process is specifically interrupted by issuing a kill command or
system shutdown, then:
287
288
Migrated users are not affected. These users are successfully migrated to the
destination administration server.
Users that were not migrated still exist on the source administration server. See
Migrating Users across Administration Servers on page 285 to migrate these
users to the new administration server.
Users in the process of migration are affected. The status for this particular user
appears on the source administration server as User Migration in Progress. The
computers and users of these computers are also disabled. The user and the
respective computers for that user must be enabled on the source administration
server through the DLO Administration Console. Then, migrate the user.
-ListMachines command
This command lists all the DLO Agent machines that are connected to the DLO
Administration Console.
Syntax:
DLOCommandu -ListMachines |-v | -v <product version>
If you do not specify any parameters, by default, all machines connected to the
current DLO Administration Console is displayed at the command prompt.
To store the list in a file, provide a file name when you run the command.
DLOCommandu -ListMachines <file path>
Example
Optional parameters
Options
Descriptions
-V
-V <product version>
-DeletePendingUser command
This command deletes only those users that are in the DeletePending state. This
command does not delete the users NUDF data.
Syntax
DLOCommandu -DeletePendingUSer [-U]
Note: Wildcard * match can be used with user name. Quotations around the user
name are required if the name contains a space or colon.
Example
Optional parameters
Option
Description
-U
-RemoteExecute Command
This command enables the administrator to collect logs from the Desktop Agent
machine remotely.
The logs will be available in the user network share path under <users network
share path>/.dlo/.remoteexecute directory.
Syntax:
DLOCommandU.exe -RemoteExecute -LGT [-IL |-AL |-DEDL |-OSL | -WT | -A |
-F | -P | -PI | -S | -SI | -U]
DLOCommandU.exe -RemoteExecute -LGT [-EV |-DV |-A | -F | -P | -PI | -S |
-SI | -U]
Example
DLOCommandU.exe -RemoteExecute -LGT -EV -U user1
Description
Installer Logs
-AL
Application Logs
-OSL
-DEDL
Dedupe Logs
-EV
289
290
-DV
-WT
-A
-F
-P
-PI
-S
-SI
-U
Server
-server <computername>
Use this command to specify the computer on which DLO command-line operations
will take effect. You must have sufficient privileges on the specified computer to
perform these operations remotely.
Example
Verbose
-verbose
Use this command to turn on verbose mode and display additional detail when DLO
command-line operations are performed.
Example
Check database
-check
This command performs a consistency check of the DLO database. If there are any
consistency errors, you should run the Repair database command. See Repair
database on page 292.
Backup database
-backup -dir <backup directory>
This command allows you to back up the DLO database to a specified directory.
Example
IDR
This command copies and recovers DLO Intelligent Disaster Recovery (IDR) MSDE
database files.
-setupidr
Makes a copy of the MSDE database files.
Example
DLODBUtils -setupidr
-idr
Restores the MSDE database files saved with the -setupidr command. The
computer must be restarted after executing this command so that the changes
take effect.
Example
DLODBUtils -idr
Restore database
-restore -databasefile
This command restores the DLO database from a specific backup file.
Example
291
292
Routine Maintenance
Use the following commands to perform routine maintenance. The options outlined
in Command Line Options on page 290 may be used with these commands.
Compact database
-compact
Compresses the DLO database by removing the unused space in the databases.
Example
DLODBUtils -compact
Rebuild index
-rebuildindex
Rebuilds the index for the DLO database.
Example
DLODBUtils -rebuildindex
Repair database
-repair
Repairs the DLO database.
Example
DLODBUtils -repair
Groom alerts
-groomalerts days
Removes alerts older than a specified number of days.
Example
DLODBUtils -groomalerts 5
Database Management
Note: Exclusive database access is required to run the -attach or -detach
command. Stop the DLO Administration Service and Mindtree Storesmart Dedupe
Server services before running these commands and then restart the services after
running the commands.
Attach database
This command makes the DLO database available to the database engine.
-attach -datafile <database file name> -logfile <database log
file name>
Example
Detach database
Use this command to detach the DLO database.
Example
DLODBUtils -detach
License Management
These command-line tools enable license management from the command line.
List licenses
-list
Lists current DLO licenses.
Example
DLOLicenseCLI.exe -list
Add licenses
-add <license key>
Adds the specified license key.
Example
Delete licenses
-delete <license key>
Deletes the specified license key.
Example
Syntax
DLOLoggingu -E <DLO component Executable name> [Options [-L |
-LS]]
Note: In a distributed DLO environment, the DLO Logging command-line tool will be
deployed in each machine where individual DLO component is installed.
293
294
Table 5-18
Options
-E
DLOLoggingu options
Descriptions
This option is used to specify the DLO components executable name for which
logging is to be enabled.
Example: To enable logging for DLO console component, specify
DLOConsoleu.exe as parameter for the -E option.
DLOLoggingu -E DLOConsoleu.exe
It is mandatory to specify the DLO components executable name. Else, the
command execution will not proceed.
-L
This option is used to specify the logging level with which the logging should
be enabled. Specify one of the following parameters along with the -L option.
Verbose (V): In this level, all Errors, Warnings, Traces and Function
Entry/Exit traces are printed.
Common (C): In this level, only Errors, Traces and Warnings are printed to
the log file.
Disable (D): In this level, all warnings and errors are printed to log files.
This value is set as default if no logging is specified in the command line.
If you do not specify any parameter for this option, then by default logging
level is set to Disable, that is D.
Example: DLOLoggingu -E DLOConsoleu.exe
-LS
Note: After you run the DLOloggingu command, for the new changes to take effect,
ensure that you restart or relaunch the DLO console, DLO client, and the DLO
services for which logging is enabled.
Example
To enable verbose logging for DLO Administration service, run the following
command:
DLOLoggingu E DLOAdminsvcu.exe L V LS 20
After executing this command, restart the DLO administration service for the new
changes to take effect.
Note: The tool also depends on DLODBUtils.exe to collect the DB backup, and
DLOCommandu.exe to collect information about users, profiles, and computers.
Therefore, check whether the machine on which DLO is installed is 32-bit or 64-bit,
and then run the appropriate version of the tool on that machine.
To gather the logs
1
DLO Database
Dedupe Logs
Enter the path of the directory or click Browse to select the output directory
where the gathered logs should be saved.
In the Additional files to gather field, enter the file names or click Browse to
select the additional files to be gathered.
Once the process is completed, a file is created in the selected output directory in the
following format: IncidentNumber_MachineName_CurrentTime.cab
295
296
Troubleshooting
When you are using Windows 2003 server, the operating system logs of installed
applications that will be stored in the installed_apps.txt file is empty.
Solution
In Windows 2003 server, you must install the WMI Windows Installer Provider.
1
In the Management and Monitoring Tools dialog box, select WMI Windows
Installer Provider.
Click OK.
Click Next.
Note: If GC job is already running for a file, then the CancelGC command will take
effect after this GC job is completed for this file. The GC per file would complete
within 10 minutes.
297
298
Chapter
Troubleshooting
This section contains the following topics:
WinCVS
When DLO runs concurrently with WinCVS, permission denied errors are sometimes
generated when checking out source. This error can be avoided by excluding any
directories named cvs using global excludes or backup selection excludes.
300
Troubleshooting
Troubleshooting the DLO Administration Console
SQL Server and SQL Server Browser Services are running with Domain user/Administrator
account.
TCP/IP is enabled.
Run the following osql commands to check if the DLO and Dedupe Databases are upgraded
and attached. The version should be 4.x.
Port 8443 and 8080 are not used by any other application or service.
Firewall is off and the ports 8080, 8443 are added to the exception list.
Context.xml has the appropriate values for DB server, server name and instance name. For
more information, see Configuring Dedupe to Use a Specific Port for Database Access on
page 44.
SQL Server and SQL Server Browser Services are running with Domain user/Administrator
account.
Run the osql command to check if the DLO and Dedupe Databases are attached:
osql E S .\Instance_Name d Master Q select name from
sysdatabasesNamed pipe is enabled. where name in ('DLO','Dedupedb')
I modified an Automated User Assignment, but the change isnt reflected for existing Desktop
Agent users.
Automated User Assignments are only used once to assign a profile and Storage Location to a
new Desktop Agent user. An Automated User Assignment can be modified to change the profile
and Storage Location settings, but these changes will only apply to new users. Users that have
Troubleshooting
Troubleshooting the DLO Administration Console
already been configured will not be affected by subsequent changes in the Automated User
Assignment.
This also applies to existing users who install the Desktop Agent on another desktop. The new
installation will use the existing user settings and will store data in the users existing user data
folder. Automated User Assignment changes will not affect an existing user, even if the Desktop
Agent installation is on a new computer.
Settings for an existing desktop user can be changed by modifying the profile to which the user
is assigned, or by reassigning that user to a new profile or Storage Location.
A desktop user ran the Desktop Agent and received an error indicating Unable to configure the
Desktop Agent. No settings found for the current user and no automatic user assignments
match. What does this indicate?
This message means that DLO could not find the user or an Automated User Assignment that
matched the user's domain and group.
Users are added to DLO either by an Automated User Assignment or by manually adding them.
In the first case, you use an Automated User Assignment that matches the users domain and
group. The Automated User Assignment assigns a profile and Storage Location to the Desktop
Agent and adds the user to DLO. Check that you have created Automated User Assignments that
match the domain and group to which the user belongs who is running the Desktop Agent.
You can also create an Automated User Assignment that covers all domains and all groups. This
method identifies any users who might not match a more specific Automated User Assignment.
Such an identifying Automated User Assignment would typically be set to the lowest priority.
The other option is to manually add users to DLO. This process requires that you assign a profile
and assign either a Storage Location or a user data folder to the new user.
Before running the Desktop Agent, make sure that the user has a matching Automated User
Assignment, or is added manually.
Related topics
About Automated User Assignments on page 116
When do I need a network user data folder, and when do I need a Storage Location?
Every Desktop Agent user must have a network user data folder, which is used to store backup
data on the network. Storage Locations are locations on the network where network user data
folders are automatically created and maintained. They are not required if existing network
shares are used to store user data.
If you want DLO to automatically create network user data folders, use a Storage Location.
When new users are added to a Storage Location, network user data folders are automatically
created for them within the Storage Location.
Alternatively, if you would like to use existing network shares as network user data folders, or if
you want to create network user data folders manually, then do not use Storage Locations.
Related topics
Configuring DLO on page 61
301
302
Troubleshooting
Troubleshooting the DLO Administration Console
I'm trying to create a Storage Location on a remote file server, and I am receiving an error
indicating the MSDE Database Instance for the Desktop and Laptop Option needs to have access
to the remote file server. What do I need to do?
To create Storage Locations on a remote file server, you must use an account that has
administrative rights on the remote file server. For details about creating the Storage Location,
see Managing Administrator Accounts on page 33.
I manually added a new user and assigned the user to an existing Storage Location. I don't see a
new user data folder for the new user in this Storage Location. Isn't it supposed to create one?
User data folders are created only after the Desktop Agent is both installed on the desktop and
run by the new user.
How do I prevent a user from backing up data?
1
On the Navigation bar, click Setup. In the Settings pane, click Users.
Select OK.
The user's status will display as Disabled.
In a backup selection, I selected to encrypt or compress my user's data. However, data that has
already been backed up is not encrypted or compressed. Why is this?
DLO does not retroactively apply changes to encryption and compression settings to user data
that is already backed up. Any data backed up after these settings have changed will use the new
settings.
I would like to prevent files of specific types from being backed up. How can I set up DLO to
always exclude files like *.mp3 or *.gho?
On the Tools menu, select Global Excludes. In this dialog box, you can add specific file types that
will be excluded in all backup selections for all profiles.
Backups do not seem to be running for all users, or specific files are not being backed up.
If backup jobs are not running for a group of users, check the profile for these users to verify
that backups are scheduled.
If specific files are not being backed up, review the backup selections in the profile to verify that
the files are selected for backup.
I just tried to restore a file, but it doesnt appear to have been restored.
When restoring existing files to their original location, verify that you have selected Prompt or
Overwrite in the Restore dialog box to replace the file. If you select Do not overwrite, the file
will not be restored.
Troubleshooting
Troubleshooting the DLO Administration Console
In a profile, I configured backup selections to encrypt files. Now I need to recover files for a user.
Do I need an encryption-key to restore this data?
As an Administrator running the DLO Administration Console, you can redirect a restore of
encrypted user data to an alternate computer or location, and it will be decrypted during the
restore.
I would like to restore data to a user's computer, but that user is out of the office. Do I have to
wait until that user returns to the office before I can start the restore?
DLO can queue restore jobs to desktops. If the user is offline now, you can queue a restore job
through the Restore view in the DLO Administration Console.
Another option is to restore the data to an alternate location, such as the administration
computer or a network drive.
The History view in the DLO Administration Console does not show the most recent backup for all
users.
The DLO Administration Console is automatically updated when a job runs, but not more than
once per hour.
I am not able to run either the -emergencyrestore, -migrateuser, or the -migrateuserSL
command.
The error occurs because these commands should be run with a user account that has
administrator privileges.
If the user account does not have administrator privileges, then open the command prompt by
selecting the Run as Administrator option, and then run the specific command.
When I am clustering DLO Admin Service using domain user account, which is part of Domain
Admin group, the following error message is displayed: This software will not run on a machine
that is not part of cluster.
To resolve this issue, make sure that all the required rights/privileges are provided to this user
account or group. Also this user account should be local administrator on all computers that are
part of MSCS cluster or failover clustering.
For more information on configuring a user account for failover cluster, refer to the link:
http://technet.microsoft.com/en-us/library/cc731002%28WS.10%29.aspx
When a BE 2012 or BE 2012 R2 product co-exists on the machine where DLO 7.6 is installed, and
when I try to launch the report from the DLO 7.6 Administration Console, an .rdl error occurs and
the report does not launch.
To resolve this issue, the DLORegKeySettingForReportU.exe must be run, which is now
available with DLO 7.6.
In a standalone setup, do the following:
Navigate to the product install path (example: C:\Program
Files\Symantec\Symantec DLO) and run the DLORegKeySettingForReportU.exe.
This tool resolves the .rdl error and you can launch the reports.
In a distributed environment setup, do the following:
303
304
Troubleshooting
Troubleshooting the DLO Administration Console
On the DLO server machine, navigate to the path where DLO Administration service is installed
(example: C:\Program Files\Symantec\Symantec DLO), and run the
DLORegKeySettingForReportU.exe. This tool resolves the .rdl error and you can launch
the reports.
Emergency Restore, restore from Admin Console, or restore from Agent fails and the following
error message is displayed: Invalid codec specified.
This error occurs if NSF files are being restored and Lotus Notes client is not installed on the
server or Agent machine where the files are restored.
To resolve this issue, install Lotus Notes client on the server or Agent machine and continue
with restore.
Migration of deduped data fails.
This error occurs if NSF files are being migrated and Lotus Notes client is not installed on the
server machine where the files are migrated.
To resolve this issue, install Lotus Notes client on the server machine and continue with data
migration.
Although as a sub administrator I have the permission to add/modify Dedupe Server, I am not
able to create a Dedupe Storage Location because the Create (+) button is greyed out.
The sub administrator should have local administrative rights on the server machine. Also, use
the Run as administrator option while launching the DLO administration console.
While I am migrating users between VIP and non VIP profiles, I get the following error message:
Profile migration failed.
One of the reasons may be because some user is accessing the network share folder that
contains the user data. Before migrating the users, ensure that this folder is not accessed by
anyone.
Negative values are displayed in the Storage Statistics Report.
The report displays negative values in the following scenarios:
When the cumulative size of the source files is less than the cumulative size of the deduped
data.
This negative value is corrected once the garbage collection process is run.
Troubleshooting
Troubleshooting the Desktop Agent
305
306
Troubleshooting
Troubleshooting the Desktop Agent
Any data backed up by a backup selection are eligible for synchronization. These backup
selections may be defined by the DLO Administrator in the profile or in a backup selection
created with the Desktop Agent.
I would like to share my synchronized data with my co-workers. How can I do this?
DLO does not provide functionality for sharing files between users. Synchronization is designed
to share files between a single user's computers.
DLO backup of Outlook PST files is slow during Copying local phase of the backup job.
When DLO performs a backup of an Outlook PST file, DLO copies the snapshot of the PST to the
Local User Data Folder (LUDF), and then it copies the file to the Network User Data Folder
(NUDF). During the first stage, the Status column in the Desktop Agent window displays the
status as Copying local (x%). Sometimes, this Copying local phase can be very slow.
To find out if DLO is introducing a sleep mechanism, enable DLO Agent logging and capture the
slow backup job in the log.
Cause:
The Copying local phase can be slow due to one of the following reasons:
The PST file is very large. The snapshot still occurs on the entire PST file, even if it is only
doing a Message level incremental.
The local AntiVirus application may be slowing down the process. Try disabling AntiVirus
and observe the performance of the next backup job.
DLO may be doing disk throttling. DLO monitors the LogicalDisk Performance Counter
called Current Disk Queue Length. If the queue length exceeds 2 (default value of
2), DLO introduces a sleep mechanism during the Copying local phase of the backup jobs.
This is to prevent DLO from consuming disk cycles that other applications might need.
Once a slow backup has been captured, locate the newly created DLOClient.log file:
The DLOClient.log will be located here:
On Windows 7: C:\Users\<UserName>\AppData\Local\Symantec\DLO\.settings
On XP: C: \Documents and Settings \<UserName> \Local Settings
\Application Data\Symantec\DLO\.settings
Example:
In the log file, look for lines such as:
diskthrottle.cpp(228) Read queue: 8.73956, sleeping for 2000ms
diskthrottle.cpp(228) Read queue: 4.50836, sleeping for 1254ms
diskthrottle.cpp(228) Read queue: 11.5639, sleeping for 2000ms
diskthrottle.cpp(228) Read queue: 3.54665, sleeping for 773ms
diskthrottle.cpp(228) Read queue: 2.85208, sleeping for 426ms
Troubleshooting
Troubleshooting the Desktop Agent
In the above example, it can be observed that DLO is introducing a sleep mechanism to prevent
over-throttling of the physical disk.
The average of the sum of the queue length above is 6.625. Rounding up = 7.
If logs suggest the performance delays are associated with disk throttling (as seen above) and
you have determined that it is alright for DLO to consume additional disk resources, these
registry adjustments will increase the threshold at which DLO engages disk throttling:
Note: DLO will divide the specified registry value by 10, so take the observed average queue
length and multiply by 10 to determine the value that you must implement in the registry.
1
Open regedit
Navigate to HKLM\Software\Symantec\DLO\3.0\Client.
Navigate to HKCU\Software\Symantec\DLO\3.0\Client.
Restart the Desktop Agent (do not just minimize and maximize it).
Note: The value of 70 was obtained by calculating the average read queue length during a slow
backup event and multiplying by 10. The value of 70 may not necessarily apply to all desktop
environments. Follow the logging example as explained above, to determine the average queue
length experienced on the problematic host, and apply the observed adjusted average to the
DiskQueueLimit registry key.
When I upgrade the Desktop Agent from 7.0 to 7.6 by using a different user account (instead of
the administrator account that was used to log on to the machine and install Desktop Agent 7.0
version), and when I try to access the existing desktop user data folder, the Desktop Agent goes
to disabled state with the following error: Access denied. Failed to create recovery key.
The error occurs because the user account may not have the privileges to access the existing
desktop user data folder.
To resolve this issue, follow these steps:
1
Click Apply.
The recovery key is created.
Before unclustering DLO from a cluster setup, the network user data folder (NUDF), DLO
database, and media server are moved from the virtual server disk to a local disk on the Desktop
Agent. After this process, when I launch the Desktop Agent, the following error message is
displayed: Failed to load configuration settings.
This error occurs because the DLO Administration server is down, and the notification has not
been updated in the Desktop Agent machine.
307
308
Troubleshooting
Troubleshooting the Desktop Agent
Note: This error may also occur for desktops and laptop users in a non-clustered setup.
To resolve this issue, manually update the registry keys of the NUDF, media server, and
database in the Desktop Agent machine.
1
Navigate to HKEY_LOCAL_MACHINE\Software\Symantec\DLO\Client.
Double-click the DefaultMediaServer, and change the name of the media server from
virtual server name to the host name of media server.
Navigate to HKEY_LOCAL_MACHINE\Software\Symantec\DLO\Client\UserShare
Double-click the user name and change the path of the network user data folder.
Navigate to HKEY_LOCAL_MACHINE\Software\Symantec\DLO\DB
Double-click the DBServer, and change the name of the database server from virtual
server to host name of DB server.
Note: Complete step 7 only when standalone DLO components are clustered. In case a
remote DB setup was used for clustering DLO, then step 7 is not required.
When I install Desktop Agent on a BitLocker enabled drive and later if I lock the drive and try to
launch the Agent, the following error message is displayed: Access denied.
To resolve this issue, unlock the drive and then launch the Agent.
Similarly, for NUDF and LUDF, ensure that you unlock the drive and then access the data.
After upgrading to DLO Agent SP1 version on a Windows XP 64-bit machine, I am unable to
launch the Desktop Agent, as the following error message is displayed: InitInstance()caught
unknown exception.
This error occurs because Microsoft XML Core Services (MSXML 6.0) is not available in Windows
XP 64-bit SP2.
1
Install the msxml6_x64.msi file and then launch the Desktop Agent.
I am unable to launch the Desktop Agent, as the following message is displayed: Unable to
configure a Desktop Agent. No settings found for the current user and no automatic user
assignments match.
This error occurs because the AUA settings are not configured in the DLO Administration
server, or the user is not part of the configured AUA settings.
Troubleshooting
Troubleshooting the Desktop Agent
To resolve this issue, configure the AUA settings or manually add this user account in the
server, and launch the Desktop Agent again.
The following error message is displayed: Authentication Failed. Do you want to try again?
This error message is displayed when you enter an invalid password in the credential prompt.
Click OK to enter the password again, or click Cancel to launch the Desktop Agent again.
How do I view the files that are backed up locally (or) where is DUDF located?
DUDF path is actually hidden.
Does DLO MAC Agent trigger backups for Apple Mail and Microsoft Outlook 2011 for Mac?
Yes, Desktop Agent triggers backups for Apple Mail and Microsoft Outlook 2011 for Mac, only if
you have added the path of the Mail directory as part of the profile (or) custom backup selection.
Example:
To back up Apple Mail, enter the path as /Users/<User Name>/Library/Mail in the backup
selection
To back up Microsoft Outlook 2011 for Mac, enter the path as /Users/<User
Name>/Documents/Microsoft User Data/Office 2011 Identities
DLO Mac Agent crashes. How do I resolve this issue?
1
Send the crash log along with the scenario that caused the DLO Mac Agent crash.
The Administration services are down error is displayed after launching the console with
Remote DB.
309
310
Troubleshooting
Troubleshooting the Dedupe Server
You must ensure that Symantec DLO SQL services and SQL browser services on remote
database are started. If the error still persists, then start the Symantec DLO administration
services.
Change the Dedupe Server services user account to match the SQL service account.
To grant administrator rights to the user account that was used for SQL service, run the
following command.
Example
sqlcmd.exe -E -l 60 -S <SERVERNAME>\SQlEXPRESS -d DedupeDB -Q "EXEC
sp_addsrvrolemember 'testdomain\DBAdmin1', 'sysadmin'"
To update the dedupedb user_info table with the DLO administrator account, run the
following command:
Troubleshooting
Troubleshooting the Dedupe Server
Install the SQL Server and SQL instance using the same administrator account.
Add the domain user account (<domain>\<user name>) to local admin group.
Change the SQL Server, SQL Agent and SQL Browser services credentials to the
domain user account.
Set the SQL administrator role to the domain user by running the following command:
sqlcmd.exe -E -S <SERVERNAME>\<INSTANCENAME> -Q "EXEC
sp_addsrvrolemember 'testdomain\DBAdmin1','sysadmin'"
Example
sqlcmd.exe -E -S MachineName\SQLEXPRESS -Q "EXEC
sp_addsrvrolemember 'testdomain\DBAdmin1','sysadmin'"
Log off from the machine and log on with the domain user account.
Upgrade to DLO 7.6 by providing the domain user account in the SQL Service Account
and DLO Administrator Account screens.
The Dedupe database and all other components work properly.
In a remote DB scenario, the DLO server and DLO database machines are running with two
different login credentials. When I upgrade this remote DB setup from DLO 7.0 to DLO 7.6, I am
not able to configure the Dedupe Server and the following error message is displayed: Failed to
authenticate server. Do you want to retry?
To resolve this issue, manually add the user name to the UserInfo table in the Dedupe
database.
311
312
Troubleshooting
Troubleshooting the Dedupe Server
To add the domain user name to the DedupeDB user_info table, run the
following command:
sqlcmd.exe -E -S .\<INSTANECENAME> -d DedupeDB -Q "insert into
user_info values (5,'<DOMAINNAME\USERNAME>',NULL,1)"
After installing the DLO components, how do I verify the status of the Dedupe Server?
Type one of the following URLs in your browser.
http://<dedupeserver_ip_or_hostname>:8080
or
https://<dedupeserver_ip_or_hostname>:8443
Response
Remark
StoreSmart Dedupe Server Status: (20159) Dedupe Server is up and running after
Active
installation.
StoreSmart Dedupe Server Status: (20157) Dedupe Server is up and running and
Garbage Collection In Progress
GarbageCollection is in progress.
StoreSmart Dedupe Server Status: (20158) Dedupe Server is up and running and
Under Maintenance
MaintenanceWindow is active.
No response
If there is no response from the Dedupe Server, then it indicates that the Dedupe Server is not
initialized, and one of the reasons could be that the database connection is down. This issue will
be logged in the dedupeserver.log file located at this path: C:\Program
Files\Symantec\Symantec DLO\DedupeServer\Tomcat\logs.
I want to modify a Dedupe Storage Location but it is disabled in the DLO Administration Console.
You can modify the Dedupe Storage Location only when the Maintenance Window is scheduled.
For more information about scheduling the Maintenance Window see Dedupe Server
Maintenance on page 69.
When I try to initialize the Desktop Agent in offline mode I get an error 23522: Dedupe Engine is
failed to initialize in offline mode.
This error may occur if the metadata files are deleted from the local machine and the Desktop
Agent is initialized in offline mode. This issue is resolved when the Agent goes online.
After setting the schedule and confirming the force start of the Dedupe Server maintenance, the
following message appears: This operation may take several minutes. Please wait.
How long does it take to force start the maintenance window?
Troubleshooting
Troubleshooting the Dedupe Server
If a maintenance task that has already started completes within 15 minutes, then the
maintenance task is scheduled, else this schedule fails. Set the maintenance window schedule
again.
313
314
Troubleshooting
Troubleshooting the Dedupe Server
Chapter
Accessibility
Symantec products meet federal accessibility requirements for software as defined
in Section 508 of the Rehabilitation Act:
http://www.access-board.gov/508.htm
Keyboard shortcuts are available for all graphical user interface (GUI) operations
and menu items. Symantec products are compatible with operating system
accessibility settings as well as a variety of assisting technologies. All manuals are
provided as accessible PDF files, and the online help is provided as HTML displayed
in a compliant viewer.
The following topics explain the accessibility features and compliance in DLO:
316
Accessibility
General Keyboard Navigation within the GUI
The TAB key moves the focus to the next active area, field, or control, following a
preset sequence. SHIFT+TAB moves the focus in the reverse direction through
the sequence
CTRL+TAB exits any Console area that you internally navigate with the TAB key
UP and DOWN ARROW keys move focus up and down the items of a list
The ALT key in combination with the underlined mnemonic letter for a field or
command button shifts the focus to that field or button
Either ENTER or the SPACEBAR activates your selection. For example, after
pressing the TAB key to select Next in a wizard panel, press the SPACEBAR to
display the next screen
The TAB key moves focus between controls within the dialog box along a preset
sequence.
A dark border indicates the default command button. Press ENTER at any time to
choose the button with a dark border.
SPACEBAR changes the state of a check box that has focus. Typing a mnemonic
(if one is available) will move the focus to the check box and change its state.
Arrow keys move focus within radio buttons, list boxes, sliders, groups of option
controls, or groups of page tabs.
Items that cannot be changed are not visited by the TAB key sequence. Options
that are unavailable are grayed-out and can neither be selected nor given focus.
Accessibility
General Keyboard Navigation within the GUI
While the controls described here are typically found in dialog boxes, they can also
occur in other contexts. The same navigation standards will apply.
Result
CTRL+PAGE
DOWN or
CTRL+TAB
CTRL+ PAGE UP
RIGHT ARROR or
LEFT ARROW
When the focus is on a tab selector, chooses the next or previous tab in
the current row and displays the page.
List Boxes
List boxes display a column of available choices. Different types of list boxes are
available with additional navigation conventions:
Drop-down list boxes by default show only the selected item. A small button to
the right of the control shows a downward-pointing arrow. Select the arrow to
display more items from the list box. If there are more choices than can fit in the
preset list box area, a slider appears along the side of the list box. Show or hide
the list using ALT+DOWN ARROW, ALT+UP ARROW, or F4. The TAB key selects
an item.
Extended selection list boxes support selecting single items, blocks of items, or
combinations of the two. After selecting an item, hold down CTRL+navigation
keys to select or clear additional items or blocks of items.
317
318
Accessibility
General Keyboard Navigation within the GUI
Keyboard Shortcuts
All menu items can be selected by using accelerator or mnemonic keyboard
shortcuts. An accelerator is a key combination that provides shortcut access to a GUI
function. A mnemonic (sometimes referred to as a hot key) is a single-key
equivalent (used in combination with the ALT key) for selecting GUI components
such as menu items. The mnemonic hot key letter is underlined in the GUI.
Routine functions such as opening, saving, and printing files can be performed using
the standard Microsoft keyboard shortcuts. Other menu items are unique to DLO.
The following table lists the shortcut keys in the Desktop Laptop Option
Administration Console.
Table 7-2
Accelerator
Mnemonic
Result
ALT
The File menu expands. From the File menu, you can create
new profiles, Storage Locations, and add users.
ALT
The Edit menu expands. From the Edit menu, you can restore
files, search for files to restore, manage alerts, and delete
items.
ALT
The View menu expands. From the View menu, you can
change the information that displays on the screen.
ALT
ALT
The Tools menu expands. Use the Tools menu to set global
excludes, access all DLO wizards, and manage service
credentials.
ALT
ALT
The following table lists the shortcut keys in the Desktop Agent:
Table 7-3
Accelerator
Mnemonic
Result
ALT
The File menu expands. From the File menu, you can
minimize or exit the Desktop Agent.
Accessibility
General Keyboard Navigation within the GUI
Table 7-3
Accelerator
Mnemonic
Result
ALT
The View menu expands. From the View menu, you can
change the information that displays on the screen.
ALT
The Tasks menu expands. Use the Tasks menu to run a job or
refresh the view.
ALT
The Tools menu expands. Use the Tools menu to reset dialog
boxes and accounts.
ALT
The Help menu expands. Use the Help menu to access the
online help for the Desktop Agent.
Select secondary menu items by opening the main menu and using the UP or DOWN
ARROW key until the required item is highlighted. Press the RIGHT ARROW key to
open a submenu, and ENTER to select your choice.
Keyboard shortcuts are not case-sensitive. Mnemonic keystrokes may be pressed
either sequentially or simultaneously. All menu items have mnemonics, but not all
menu items have accelerators.
On the Start menu, select Settings, and then select Control Panel.
Note: You can also set accessibility options through the Accessibility Wizard. On the
Start menu, select Programs, and then select Accessories. Select Accessibility, and
then select Accessibility Wizard.
Though all graphics in Symantec documentation can be read by screen readers,
setting your screen reader to ignore graphics may improve performance.
319
320
Accessibility
General Keyboard Navigation within the GUI
Glossary
Administrator
The user that configures DLO using the Symantec DLO Administration Console. This user must
have administrative rights to operate the console.
Authentication
The process of validating a users credentials.
Automated User Assignments
Rules that assign profiles and Storage Locations to a specified group of desktop users. Settings
are applied the first time a user runs the Desktop Agent.
Compression
A method of reducing data to expedite transmission time or storage volume.
Chunk
Uniquely identified data block.
Chunk Retrieval Information (CRI)
Location of data in the Dedupe Storage Location where it was written during backup. CRI is used
to read back the data during restore.
Chunk Signature
Hash value of the data block.
Dedupe Storage Location
A shared storage location on the network where data is stored.
Dedupe Storage Pool
Groups of Dedupe Storage Locations across which deduplication is performed.
DLO Administration Console
The administrators interface with the Desktop and Laptop Option.
DLO Backup Selection
The files and folders on a desktop or laptop that are selected for backup by the DLO
Administrator or desktop user.
DLO Database
The location where policy settings and status information are stored.
DLO File Server
The computer that hosts DLO Storage Locations.
Dedupe Database
Data store used by Dedupe Server for storing the configuration and Global Hash Table.
Delta File Transfer
Delta File Transfer is a compression process that allows only the changed portion of a file to be
transferred once the complete original file is backed up. Delta File Transfer reduces bandwidth
use and disk storage requirements.
Desktop Agent Install Share
322
Glossary
The network share where the Desktop Agent install files are located. This folder is set up on the DLO
Administration Server when DLO is installed, and facilitates the installation of the Desktop Agent on
desktops.
Desktop Agent
The DLO software that runs on desktop and laptop computers.
Desktop Agent Console
The user interface for the Desktop Agent software.
Encryption
A process used to ensure data security of files and folders on disk and during data transfer.
Global Hash Table
Table that maps data signature to CRI for the data that is stored in the Dedupe Storage Locations.
Open File Handling
The process by which files currently in use can be backed up.
Optimization
The process of reducing network traffic and file storage through technologies such as compression.
Profile
DLO settings configured by the administrator and that apply to users or groups of users.
Revision
A version of a file at a specific point in time.
Storage Location
A shared location on the network in which network user data folders and backup files are stored.
Synchronization
The process that maintains the most recent version of selected files and folders belonging to the same
user on multiple desktops. Synchronization is available for files and folders that are backed up by DLO.
Task
An accessible program function that varies with the view selected in the DLO Administration Console or
Desktop Agent console.
User
The person who operates the desktop or laptop computer on which the Desktop Agent is run.
User Data Folder
The folder in which user backup data is stored. There is a user data folder on each desktop that is
protected by the Desktop Agent, and one user data folder on the network for each Desktop Agent user.
User Name
The user name used for Windows authentication.
View
The main navigational interface in the DLO Administration Console.
Index
A
accessibility
dialog boxes 316
keyboard navigation 316
keyboard shortcuts 318
settings 319
Active Directory
for Automated User Assignments 119
for connection policies 236
add a dedupe storage location 64
Adding Dedupe Server 62
alert history, defined 171
alert notification, printers 189
alerts
defined for DLO 169
displaying in DLO 171
managing in DLO 173
notification methods 174
Automated User Assignment 116
deleting 121
modifying 120
priority, changing 120
properties, viewing 120
using Active Directory 119
Automated User Assignments 116
B
backing up
Outlook PST files 221
backup selections
adding 100
macros in 108
blackout window, setting 148
C
-ChangeDB 265
Changing Credentials 67
command line interface
-emergencyrestore 273
-keytest 267
-listprofile 268
-listsl 269
-listuser 270
remote server options 261
-setrecoverypwd 273
-update 270
Command Line Options 290
command line tools
database commands 291
license management 293
maintenance commands 292
compression
delta file transfer 106, 111
DLO backup selections, setting 106
configuration wizard 61
Configure Alerts dialog box 171
Configure DLO Using the Configuration Wizard 61
Configuring Dedupe Server 61
connection based policies
configuring 86, 234
using Active Directory 236
create a new profile 72
Creating Automated User Assignments 118
customize NTFS permissions 152, 243
D
Database Management 292
Dedupe Storage Pool 63
Dedupe Storage Pool statistics 67
deleting
Automated User Assignment 121
revisions in DLO 108
Storage Location in DLO 97
deleting DLO alerts 173
Deleting the Maintenance Server 115
delta file transfer 106, 111
Desktop 140
Desktop Agent
see also Desktop and Laptop Option (DLO)
advanced view option 214
backup selections
324 Index
modifying 212
overview 208
Desktop User Data Folder, moving 233
glossary 321
History view 246
include/exclude 215
log files, overview 246
menu bar, described 211
overview 201
Restore dialog box 238
restoring files 237
revision control tab 216
schedule, customized 230
scheduling backup jobs 229
standard view option 212
Status view 224
storage limits for user data 232
synchronization
create new sets 243
delete synchronized folder 245
tasks bar, described 211
views menu, described 211
Desktop Agent Console 209
Desktop Agent for Mac 253
Desktop Agent Users, managing 135
Desktop and Laptop Option (DLO)
see also Desktop Agent
access, disabling/enabling 140
adding user 138
alerts
categories, defined 169
Configure Alerts dialog box 171
displaying 171
managing 173
Automated User Assignment
deleting 121
modifying 120
priority, changing 120
properties, viewing 120
backup selection
adding 98
deleting 112
modifying 110
Computer History pane 163
encryption, setting for backup selection 106
filter options, History view 164
History view 162
include/exclude 102, 215
Job History pane 163
E
e-mail
configuring MAPI notification 175
configuring SMTP notification 174
configuring VIM notification 176
Enable Dedupe 73
Enable Dedupe check box 88
-EnableUser command 264
encryption 302
Encryption Type 65
encryption, backup selections, in DLO 106
F
File Grooming on Mac 258
file restore 150
filters
History view filters, setting in DLO 164
full restore privileges 35
G
Garbage Collection Utility 296
global excludes
adding 121, 122, 123, 124, 125
deleting 121, 122, 123, 124, 125
macros 128
glossary of terms 321
Index
grooming
files 104
I
include/exclude
Desktop Agent backup selections 215
DLO backup selections 102
installation
silent 28
J
job history
History view filters, setting in DLO 164
viewing in Desktop Agent 246
job monitor, DLO jobs, viewing 162
L
License Management 293
limited restore privileges 35
Logging Command Line Interface Tool 293
Logging options 85
Lotus Notes
back up nsf files 222
M
macros, global excludes 128
maintenance mode 69
MAPI, configuring recipients 181
-MigrateUser 283
-MigrateUserSL 280
Migrating a Standalone BE-DLO 51
Migrating BE-DLO Agent in Cluster Environment to
Symantec DLO 54
Migrating BE-DLO Agent to Symantec DLO 52
Migrating BE-DLO in a Cluster Environment to
Symantec DLO 53
Migrating Users across Administration Servers 285
Migration Status Report 282
modify a dedupe storage location 67
Modifying a Dedupe Storage Pool 66
monitoring alerts 168
Move priority options in DLO 120
mport multiple users in CSV file 139
N
network user data folder, creating 136
notifications
configuring pager 177
O
Outlook PST files, backing up 221
P
printer, configuring recipients 189
priority options in DLO, Move 120
priority, Automated User Assignment, changing
120
Profile
edit schedule 84
profile
copy 88
profile options 145
profile schedule 144
Profiles 72
PST files, backing up 221
Push 30
R
recipients
configuring groups 190
configuring MAPI e-mail 181
configuring Net Send 187
configuring pager 184
configuring SNMP Trap 186
configuring VIM e-mail 183
recovery password, setting 26
reports 190
running 193
Resetting Dialog Boxes and Account Information
206
Restore dialog box
Desktop Agent 238
restoring
files, using Desktop Agent 237
revisions
defined 103
deleting automatically in DLO 108
number to keep, setting in Desktop Agent 216
number to keep, setting in DLO 104, 216
Revision Control tab, Desktop Agent 216
Revision Control tab, DLO 104
Routine Maintenance 292
325
326 Index
S
Schedule Maintenance Window 70
scheduling
backup jobs in Desktop Agent 229
search
log file history 167
selections
Desktop Agent, backup 208
DLO, backup 98
service credentials, managing 137
set the maintenance schedule 69
silent install 28
SMTP mail for a person recipient 180
storage limits for user data
Desktop Agent 232
Storage Location
deleting 97
synchronization
create new sets 243
delete synchronized folder 245
synchronize data on Mac 259
Synchronizing data 241
T
Troubleshooting the Dedupe Server 310
U
Unclustering DLO 197
Upgrading DLO on a Microsoft Cluster Server 198
Users
removing from DLO 141
viewing in DLO 143
users
access, disabling/enabling in DLO 140
adding in DLO 138
Desktop Agent access via Profile 201
managing 135
V
view history logs 248
viewing
Automated User Assignment properties 120
users in DLO 143