SymantecDLO 7.5 BestPractices
SymantecDLO 7.5 BestPractices
SymantecDLO 7.5 BestPractices
Best Practices
Disclaimer
The information contained in this publication is subject to change without notice. Symantec Corporation
makes no warranty of any kind with regard to this manual, including, but not limited to, the implied
warranties of merchantability and fitness for a particular purpose. Symantec Corporation shall not be
liable for errors contained herein or for incidental or consequential damages in connection with the
furnishing, performance, or use of this manual.
Legal Notice
Copyright 2013 Symantec Corporation. All rights reserved.
Symantec, Backup Exec, NetBackup, the Symantec Logo, and Desktop and Laptop Option are
trademarks or registered trademarks of Symantec Software Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners.
Revision History
Version Number
Description
Date
0.6
7 November 2013
0.5
June 2013
0.4
2 February 2013
0.3
7 January 2013
0.2
18 December 2012
0.1
10 October 2011
iii
Contents
Introduction ......................................................................................................................................... 5
2.3
2.4
2.5
8.1
8.2
8.3
Backup Strategies....................................................................................................................................... 14
8.4
10
10.2
11
iv
11.2
1 Introduction
The Symantec Desktop and Laptop Option (DLO) is an easy to use tool, which provides automated file
protection for desktops and laptops (collectively referred to as end-points).
This Best Practices Guide summarizes Symantecs recommendations for planning and deploying
Symantec DLO. For detailed information on using DLO, refer to the Symantec Desktop and Laptop
Administrators Guide.
To take full advantage of all the benefits that the application can bring to your organization, Symantec
recommends that you perform the following tasks before implementing DLO:
1. Determine the end-point backup requirements.
2. Determine the most effective hardware configuration and storage requirements based on the size
of your enterprise, the current network environment, IT resources, and backup requirements as
well as the needs of the end users.
3. Create Profiles to meet the different needs of particular user subgroups. For example, mobile
users who back up their laptop computers through dial up connections usually have different
needs than their colleagues on LAN-connected workstations.
4. Roll out the Desktop Agents gradually. A gradual rollout normalizes the impact of the first backup
over a greater period, while providing an opportunity to identify and resolve any issues that arise.
DLO uses a policy-based configuration mechanism called a Profile to manage backups for groups of
similar users. Desktop and Laptop users are assigned to a Profile in which the DLO administrator grants
or restricts user rights to control data protection for an end-point. DLO provides default Profiles that can
be customized to meet the needs of various user groups.
The best practices provided in the following sections will ensure smooth operations when using Symantec
DLO:
Profile Setup
2.1
This topology is applicable when all or most of the end-points and DLO Servers can be co-located interms of high speed connectivity between them, preferably in a LAN.
In this topology, a single DLO Administration Server will handle all the end-points in the site with all other
servers including the file servers in one place. This topology is easy to administer.
2.3
One DLO Administration Server will be able to handle a maximum of 16000 users. If there is a
requirement to support more than the supported number of users, then the users should be grouped into
logical sites handled by independent DLO Administration Servers.
2.4
This topology is applicable when relatively smaller numbers of users are spread across multiple sites.
This topology can be classified into two categories based on the network connectivity speed between the
centrally located servers and the sites.
1. Category 1: All sites are connected to the central office by high-speed connectivity that matches
or exceeds the speed of a LAN.
2. Category 2: One or more sites are connected to the central office by low-speed connectivity
links.
In the first category, all DLO servers including the storage can be kept safely and managed at the central
site. The only concern with this setup would be the amount of traffic that goes through WAN.
In the second category, all DLO servers can be kept in the central office, except for the storage. Since
there is going to be a lot of IO involved during the backup process, it is advised to keep the storage local
to each site. Since the storage is kept in each site, the Dedupe Storage Location(s) configured to a site
specific Dedupe Storage Pool should also be configured in each site. Only site level deduplication can be
achieved using this configuration, because of the site specific Dedupe Storage Pool.
Note: Sites connected to central office with high speed links could be configured similar to the first option.
2.5
This topology is applicable when the users are spread across multiple sites, with each site having
relatively more number of users.
In this case, each independent site can be configured in the same manner as Single Site with Single
Administration Server.
Centralized
Cons
May require traffic over WANs for agent updates,
loading and saving configuration settings,
periodic Agent status updates, and alert data
Global Deduplication
Distributed
No Global Deduplication
<=1000
<=4000
<=8000
CPU
RAM
8 GB
12 GB
16 GB
<=1000
<=4000
<=8000
CPU
RAM
4 GB
4 GB
4 GB
10
<=1000
<=4000
<=8000
CPU
RAM
8 GB
8 GB
12 GB
<=1000
<=4000
<=8000
CPU
RAM
8 GB
8 GB
12 GB
Note: File server(s) configuration and count should be decided based on the number of users, amount of
storage space required, and the concurrent access supported. For more information, refer to the section
Choosing File Server on page 12.
Free
Cons
The number of concurrent connections to the database is
limited, resulting in slower I/O to the database under
load.
Maximum database size supported is 10 GB and is
sufficient only for 8 TB of deduped backups.
Cannot take advantage of the given hardware resources
and scale.
SQL Server
Non Express
11
6 Storage Sizing
You can calculate the storage sizing requirements for Dedupe Storage Location, NUDF, Dedupe
database, and the total data that these components can back up.
Please use the spreadsheet SymantecDLO_7.5_Storage_Estimation_Tool.xlsx that is available along
with this document to calculate the storage sizing requirements.
8.1
12
Profile Configuration
How can users be grouped to take advantage of common characteristics? For example, users
working with vital technical or regulatory information that is constantly changing may require more
frequent backups than users who do not work with critical data.
What type of data do you want to protect? Will it be specific file type such as .doc or .pdf, specific
folders, or a combination of both?
How frequently do you want to back up user data? Will backups be scheduled or will they be
performed as files change?
The answers to the questions above will guide decisions regarding hardware and network configuration
as well as determining how Profiles will be designed to customize backups. The most successful large
deployments of DLO use a pilot process to determine backup requirements.
8.2
Profile Setup
DLO uses Profiles to configure the settings of a group of similar desktop users. The DLO administrator
can customize the backup environment of the Profiles. The DLO administrator can assign desktop users
to Profiles automatically based on their domain and group, or can assign individual desktop users to
Profiles.
Modifications to a Profile or a backup selection will enable users of that Profile or backup selection
to cancel jobs, load settings, restart backup engines, and scan their backup selection tree.
The Profile should be configured to only back up user documents and not the entire machine.
To minimize network bandwidth issues, define the Backup and Restore Throttling settings.
DLO uses backup selections in each Profile to specify which folders will be backed up. Include and
exclude filters are added to further categorize which files and subfolders within the specified folder
will be backed up.
The following are the two types of excludes:
Global Excludes are specified by the administrator in the DLO Administration Console and apply
to every backup selection. Files and folders specified in a Global Exclude are never backed up.
Backup Selection Excludes applies only to the specific Backup Selection in which they are
created.
Excludes always take precedence over includes. For example, if you have a backup selection for
the C:\Data directory, but exclude the C:\Data\junk folder in the same backup selection,
nothing will be backed up in the C:\Data\junk folder, even if some files match a specified
include.
13
Note: Regardless of CPU Power, 300 - 400 clients are the maximum that should be backed up to a
server at one time. DLO performance is directly related to the speed of the network and disk attached to
the media servers.
8.3
Backup Strategies
Two options are available for Includes and Excludes in each Backup Selection: the include-only strategy
and everything-but strategy.
Include-only strategy (recommended)
When you select the Include and exclude only the items listed below option in the backup selection, you
create a custom list of file types that will be included or excluded. If no includes are specified when the
backup selection is created, a * include is added, and all files that are not specifically excluded are
backed up. If a specific include is later specified, the default * selection is removed, and only those files
or folders specifically included are backed up.
For example, if you create a backup selection for C:\Data and select the Include and exclude only the
items listed below option, but you do not provide any specific includes, all files not specifically excluded
by the backup selection or Global Excludes will be backed up. If you later add an include, such as
*.doc, then only the *.doc files will be backed up.
Use this option in the following scenarios:
You want to tailor the scope of backups to meet specific organizational needs
You need to specifically target the backup scope to reduce the amount of data backed up
Users may store data in nonstandard locations or outside the selected backup area. This option may be
considered when the data is adequately protected by the defined backup scope.
Everything-but strategy
When you select the Include all file types option in the backup selection, all files in the selected folder
are backed up unless the file type is specifically excluded in the global exclude list.
Use this option in the following scenarios:
You want to protect all data, even if it increases costs and storage requirements.
14
The broad scope of backups may require significant storage space. To determine what files to exclude,
look at the pending files during backup, or evaluate what is taking up space in the network and desktop
user data folders, which can help refine the excludes. For determining when to back up, Symantec
recommends you use a continuous backup schedule. This keeps your files protected as they change and
provides the maximum level of protection. This schedule also reduces the load on your network and
media server by spreading out backups throughout the workday. However, if you choose to use a
scheduled backup mode, make sure to consider the amount of changed data that will be sent to your
backup destinations simultaneously. Creating several Profiles with staggered scheduled backup times will
help reduce the load on your media server.
8.4
Symantec recommends you use a continuous backup schedule. This ensures your files are protected as
they change and provides the maximum level of protection. This schedule also reduces load on your
network and Administration servers by spreading out backups throughout the workday.
However, if you choose to use a scheduled backup mode, be sure to consider the amount of changed
data that will be sent to your Backup Destinations at or near the same time. Creating several Profiles with
staggered scheduled backup times will help reduce load on your administration server.
15
Applies to
Files
Files
Files
Folders
Files
Files
Files
Description
Push Install
A push install is available for Symantec DLO using the Symantec DLO
installer. This option is not available for NetBackup DLO.
Logon scripts
Use this automated system to distribute the Desktop Agent install set to
the desktop computers, which then initiate the installation. For more
information about SMS, refer to your Microsoft documentation.
Note: Desktop Agent users are assigned to a specific server during the Desktop Agent installation. If
DLO is deployed using multiple Administration Servers, then install the Desktop Agents using the Install
set from the appropriate server.
16
Result
Silent installation
Note: For a completely silent install, run the setup.exe /s after modifying the
SETUP.INI file.
/qb!
Examples:
For a silent installation, edit CmdLine in the SETUP.INI file as follows:
Original:
17
11 Client Use
Depending on what is being backed up especially large PST files, initial client backup can be time
consuming and CPU intensive. If possible, this should be done when the end user is not using their
machine. Memory consumption is entirely dependent on backup set selection and can vary significantly. It
is usually highest at the beginning of a backup during scanning and tapers off during backup file transfer.
DLO runs as a normal priority thread and DLO does not significantly impact performance of other
applications.
The DLO client interface should only be opened when you need to restore files or modify your selections.
When using synchronization, client clocks should be accurate and should be synchronized and the
regional settings should reflect their correct locale.
For best PST message handling performance, Outlook should be set up so that email is delivered first to
the server and not directly to a local PST file. If mail is delivered directly to your PST file, all mails
received need to be backed up by DLO. This process can impact users when they first log on and run
Outlook, and all new mails are delivered to the PST file.
18
Create a storage location on the file server to store DLO backup files.
d. Create one or more automated user assignments to automatically assign desktop users to
a Profile and storage location when they install DLO.
4. Make any required customization to the Profiles.
5. Install the Desktop Agent on desktop computers.
When the DLO Administration Console is launched for the first time, the Recovery Password Wizard
appears. You must set a recovery password using this wizard or DLO will not run. The recovery password
enables you to retrieve encrypted data that would otherwise be lost if the DLO database is damaged or
corrupted. Once set, this recovery password can only be changed using the DLO command-line interface
tools.
19