User Guide
User Guide
User Guide
Version 9.5.1 released March 2023
Due to continued product dev elopment this information may change without notice. The information and
intellectual property contained herein is confidential between Cristie Software Ltd. and the client and
remains the exclusiv e property of Cristie Software Ltd. If you find any problems in the documentation, please
report them to us in writing. Cristie Software Ltd. does not warrant that this document is error-free.
No part of this publication may be reproduced, stored in a retriev al system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording or otherwise without the prior written
permission of Cristie Software Ltd.
IBM Tivoli Storage Manager (TSM), AIX and TIVOLI are tradem arks of the IBM Corporation.
IBM Spectrum Protect is a tradem ark of the IBM Corporation.
IBM Virtual I/O Server (VIOS) is a tradem ark of the IBM Corporation.
NetWorker and Avam ar are tradem arks of the Dell EMC Corporation.
vSphere, vCenter and vCloud are tradem arks of VMware Inc.
Hyper-V is a tradem ark of Microsoft Corporation.
Azure is a tradem ark of Microsoft Corporation.
Am azon Web Services (AWS) and Am azon Elastic Com pute Cloud (EC2) are tradem arks of Am azon.
com , Inc.
Cohesity DataProtect is a tradem ark of Cohesity Inc.
Rubrik is a tradem ark of Rubrik Inc.
CloneManager® is a registered tradem ark of Cristie Software Ltd.
PC-BaX, UBax, Cristie P4VM (Protect for VMs), Cristie Storage Manager (CSM), SDB, ABMR (Bare Machine
Recov ery for EMC Av amar), NBMR (Bare Machine Recov ery for EMC NetW orker), TBMR (Bare Machine
Recov ery for Spectrum Protect/TSM), CBMR (Cristie Bare Machine Recov ery), CoBMR (Bare Machine
Recov ery for Cohesity DataProtect), RBMR (Bare Machine Recov ery for Rubrik) and CRISP (Cristie Recov ery
ISO Producer) are all trademarks of Cristie Software Ltd..
Contents
1 Document conventions 8
2 Introduction 9
5.5 Windows
...................................................................................................................................
Registry 162
5.5.1 Structure.........................................................................................................................................................
of the Registry 163
5.5.2 How is it backed
.........................................................................................................................................................
up? 163
5.5.3 Restoring......................................................................................................................................................... 163
5.6 Scheduler
...................................................................................................................................
Overview 164
5.6.1 Operating the Scheduler
......................................................................................................................................................... 164
5.6.2 Creating a New Scheduled Job
......................................................................................................................................................... 165
Program..................................................................................................................................................
Title 166
Program .................................................................................................................................................. 166
..................................................................................................................................................
Set Date and Time 167
..................................................................................................................................................
Scheduler Options 167
5.6.3 .........................................................................................................................................................
Scheduled Task Wizard 168
Task .................................................................................................................................................. 169
Schedule .................................................................................................................................................. 170
Finished .................................................................................................................................................. 171
5.6.4 Managing .........................................................................................................................................................
Scheduler Jobs 171
5.6.5 .........................................................................................................................................................
System Dependent Information 172
5.6.6 .........................................................................................................................................................
Using Batch Files 173
5.7 Backup
...................................................................................................................................
Catalogue 173
5.7.1 Viewing the .........................................................................................................................................................
Catalogue Contents 174
5.7.2 Information .........................................................................................................................................................
Stored about the Backup 174
Media Header.................................................................................................................................................. 175
Dataset..................................................................................................................................................
Header 176
5.7.3 .........................................................................................................................................................
Browse Backup Catalogue 176
5.7.4 Modifying.........................................................................................................................................................
the Level of Catalogue Information 177
5.7.5 Creating .........................................................................................................................................................
a New Catalogue Volume 178
5.7.6 Deleting,.........................................................................................................................................................
Searching and Restoring 178
5.7.7 .........................................................................................................................................................
Backup Location Search 179
5.7.8 .........................................................................................................................................................
Select Backup Location To Use 180
5.7.9 ......................................................................................................................................................... 181
Options (Restore/Compare/Verify)
5.8 Backup
...................................................................................................................................
Strategy 182
5.8.1 Example Routines
......................................................................................................................................................... 183
5.9 Running
...................................................................................................................................
CBMR from the Command-line 184
5.9.1 PC-BaX Command.........................................................................................................................................................
Line Options 185
5.9.2 CBMRwin.exe .........................................................................................................................................................
Command Line Options 186
5.9.3 CBMRCfg.exe .........................................................................................................................................................
Command Line Options 186
5.9.4 CBMR Configuration
.........................................................................................................................................................
Files 187
.................................................................................................................................................. 187
PCBAX.INI
CBM.INI .................................................................................................................................................. 187
.................................................................................................................................................. 187
USERSHAR.INI
.................................................................................................................................................. 187
USERINFO.INI
.................................................................................................................................................. 187
DTEXC.INI
.................................................................................................................................................. 187
KEYREPOSITORY.INI
5.10 Media
...................................................................................................................................
Utilities 187
5.10.1 Media Management
......................................................................................................................................................... 188
5.10.2 Read Header ......................................................................................................................................................... 189
5.10.3 Retension......................................................................................................................................................... 189
5.10.4 Unload ......................................................................................................................................................... 189
5.10.5 Create New .........................................................................................................................................................
Header 189
5.10.6 New Media .........................................................................................................................................................
Header 189
5.10.7 Security Erase......................................................................................................................................................... 190
5.10.8 Initialise ......................................................................................................................................................... 190
5.10.9 Library Control
.........................................................................................................................................................
Panel 190
6 Support 193
6.1 Online
...................................................................................................................................
Help 193
6.2 Technical
...................................................................................................................................
Support 193
7 Appendicies 195
7.1 Storage
...................................................................................................................................
Pool support 195
7.2 BIOS
...................................................................................................................................
to EFI Boot Conversion 197
1 Document conventions
The following typographical conventions are used throughout this guide:
User Guide
Introduction 9
2 Introduction
CBMR provides complete data protection, as well as the ability to recover critical servers
from scratch within minutes. CBMR can be used as a standalone backup product and
provides an ideal solution for server migration.
CBMR backs up the operating system and hard disk configuration of critical servers,
enabling rapid recovery of data to an identical state following damage to or failure of
the physical hardware, or a corruption of the operating system.
Please refer to the supplied Readme document for a list of supported Windows OS's.
CBMR also provides the ability to clone to a new machine from an existing backup. The
cloning option allows the hostname and/or the IP address to be changed during the
recovery.
CBMR is available as a single edition suitable for all platform types. You must have one of
the supported Windows™ Operating Systems correctly installed prior to proceeding with
the installation of CBMR.
To minimise the impact of a system failure, you need to have a restore strategy in place.
CBMR allows you to recover Windows Workstations and Servers without first having to re-
install the operating system or backup software. This reduces the recovery time
significantly. All you need is disaster recovery media from which to boot your computer
and a disaster recovery backup of the original Windows system.
Finally, a full backup of the system can be restored using the backup features of CBMR or
any other preferred third party Backup/Restore software.
IMPORTANT: Refer to the installed Readme file for any limitations and last minute
updates.
If you wish to use CBMR in standard backup/recovery mode please refer to section CBMR
in More Detail.
CBMR can protect a system against disaster all the time, if set up and configured
correctly. The following sections explain this procedure.
Note: When using a CBMR backup to recover a Windows Domain Controller the
recovered system will boot twice.
3.1 Preparation
To use CBMR in a production environment for DR purposes, you must follow the procedure
in the order listed below:
2. Prepare the WinPE5 or WinPE10 DR USB flash drive drive or ISO/CD-ROM (refer to the
Cristie Recovery ISO Producer User Guide)
Install and run the Cristie Recovery ISO Producer (CRISP) tool on a suitable system to
create the CBMR WinPE5 or WinPE10 based DR environment in either USB flash drive or
ISO form. The ISO may then be burnt to CD or DVD physical media if required. This only
needs to be done once.
3. Machine Configuration
Save the Machine Configuration parameters. These are saved automatically each
time a DR backup is started. No further User action is required.
Perform regular Disaster Recovery backups as required. This can be scheduled daily,
monthly, weekends only etc. using the CBMR scheduler interface to the Windows
Scheduler.
Add any extra standard data backups as required
You will then be ready to Restore the system from the Disaster Recovery Backup in
conjunction with the DR media when required.
Note if using IBM Spectrum Protect, check the IBM Spectrum Protect BA Client version
in use on your server. Also refer to Create a IBM Spectrum Protect Client Node.
1. Boot into the DR environment on the machine to be restored from the CBMR WinPE5 or
User Guide
Using CBMR for Disaster Recovery 11
CRISP should be run in conjunction with the supplied CRISP WinPE5 or WinPE10 Fileset for
CBMR 9.5. The fileset will be installed automatically alongside the CRISP on the same host
or technician machine.
A full discussion of how to install and run CRISP is contained in the separate CRISP User
Guide. Note that the CRISP does not need to be installed on the system to be backed up;
any suitable machine will do.
Output from the CRISP tool is a bootable WinPE5 or WinPE10 USB flash drive or ISO file. The
latter can then be burnt to physical media (CD or DVD) or mounted directly in a VM
environment.
Once created the recovery environment is booted on the target system which then drives
the restore process.
Note: Please refer to the Readme document for the latest client support details.
If you are not using IBM Spectrum Protect, please skip this step.
To use the IBM Spectrum Protect module, you must enable CBMR to backup to the IBM
Spectrum Protect by creating a dedicated node via the IBM Spectrum Protect Admin
client.
In addition, you must consider your password policy. If you specify a Password Expiration
period, you will have to set the password in CBMR every time the password expires.
Note: automatic password generation for the client nodes is supported in CBMR 5 and
later.
If it is required to hold more than one version of the DR backup in the same filespace,
then the node must be setup correctly to support this.
You must have a Management Class (MC), which contains a Backup Copy Group (BCG)
and an Archive Copy Group (ACG).Your node needs to be registered to use the MC.
In this example, there can be two versions of an object. The Versions Data Deleted
attribute specifies the maximum number of different backup versions (1 in this case)
retained for files and directories that you erased from your file system. This parameter is
ignored as long as the file or directory remains in your file system.
The expiration date for the remaining versions is based on the retain extra versions and
retain only version parameters. In the example, if there is more than one version and one
is deleted, the deleted one will be kept for 30 days. The only remaining copy of the object
will be retained for 60 days (that is AFTER you make it inactive).
Note: if several versions of a DR backup are maintained in IBM Spectrum Protect, the
WinPE5 or WinPE10 recovery environment will allow you to choose a specific version to
restore.
User Guide
Using CBMR for Disaster Recovery 13
1. Copy the IBM Spectrum Protect SSL/TLS certificate to a local folder on the host
system.
2. Run a command shell on the host system.
3. Change directory to the folder C:\Program Files\Tivoli\TSM\baclient (assuming the
default install location was used for the IBM Spectrum Protect client).
4. Run the following command:
This is because the Disaster Recovery environment contains a CBMR client version later
8.1.2 or later that enforces SSL communication. This will prevent older IBM Spectrum
Protect clients from accessing the node.
You can set this by updating the node with the command:
Select Next> and the CBMR Configuration - Select Volumes to Format dialogue will help
you to select the disks and partitions which should be formatted during a recovery:
User Guide
Using CBMR for Disaster Recovery 15
The Windows boot and system partitions will be selected by default and you cannot
exclude them. All other volumes and partitions can be selected or de-selected by clicking
on the selection box which toggles the current selection.
Check that all your selections are correct. If you need to modify any of these settings,
choose the <Back button and modify your selection.
Finally, click Finish to save the settings. When a DR backup is run, the configuration
information will be stored to a folder CBMRCFG on the Windows drive. This folder will be
automatically included with the backup. This folder should never be removed manually,
nor its attributes or contents changed.
Click on the Run or Schedule Disaster Recovery Backup option in the CBMR main
window:
At least one Backup location must exist in order to proceed through the wizard. If none
have been previously configured, you will see a message that indicates this.
This will open the CBMR - New Backup Location Wizard welcome dialogue.
User Guide
Using CBMR for Disaster Recovery 17
Select Next> to continue and the CBMR - New File Location Wizard is displayed:
Click Create to create the specified File Location. This is confirmed thus:
Click Next> and the CBMR Backup - Select Volumes To Backup dialogue is displayed:
The dialogue shows all the available hard disk drives (including any partitions mounted
on folders). You can select all or a sub-set as required. Whatever you choose, the
Windows folder, the IBM Spectrum Protect installation folder (if installed), the Registry,
"Documents and Settings" folder and CBMR folder will always get backed up.
Select Next> to open the CBMR Backup - Compression and Encryption Options dialogue:
User Guide
Using CBMR for Disaster Recovery 19
Select <Use Default> to accept the default compression method. Alternatives are
available via the drop-down menu.
If you wish to encrypt the DR backup, select the Encrypt backup tick-box.
Use either the system default key or enter a new passphrase or key. Click OK.
Select Next> to display the CBMR Backup - Select Backup Options dialogue:
The Automatically verify the backup check box will be checked by default, which will
force an integrity check of the backup after completion. This is independent of the
program default settings.
Note: this can be turned off to reduce the overall backup time by clearing the check
box. However, this is not recommended.
Select Run the backup now if you wish to run the DR backup immediately on pressing the
Next> button.
Select Schedule it for later if you wish to schedule it either using the CBMR or Windows
Scheduler, depending on the default settings.
Select Generate scripts only if you wish to prepare a script (disrec.scp) for scheduling the
DR backup. No actual backup will be performed in this case.
User Guide
Using CBMR for Disaster Recovery 21
Note: it is not possible to run a DR backup until the DR configuration has been setup
and saved at least once.
Note: before storing your Disaster Recovery Disk (and the DR Backup tape if used), it is
important to check that the Disaster Recovery works and the Backup Location is
accessible. You only need to test that you can connect to the backup data. The
description below is a summary of the process which is described in more detail in the
section Restoring Your System.
The WinPE5 or WinPE10 based recovery environment is booted on the target system. This
could be the original or a dissimilar system.
1. Install and run the Cristie Recovery ISO Producer (CRISP) tool on a suitable host
system to create the CBMR WinPE5 or WinPE10 based recovery environment (USB disk
or CD/DVD). This only needs to be done once.
2. Boot the CBMR WinPE5 or WinPE10 recovery environment on the target system.
3. Run a restore sequence from the recovery environment on the target system using
the CBMR backup.
4. When the restore operation is complete and, before booting the system, you may
change the hostname and IP address as required. If the target system uses different
hardware from the source system inject additional drivers into the system using the
hardware wizard tool. This tool will detect any new devices in the target system and
prompt for the drivers.
5. Boot the recovered system.
Note: it should be kept in mind that Microsoft Windows is a complex operating system
which has its own hardware dependencies and limitations.
Over a period of time, our dissimilar hardware support has evolved and with the latest
release, a new Plug-and-Play manager is incorporated which will prompt for the correct
driver for the new hardware. With a little knowledge of drivers for motherboard resources,
it is also possible to change any aspect of Windows by using the Manual Driver Install
option. The rest of the document will explain the steps used in CBMR to recover a
Windows system to a different machine.
The WinPE5 or WinPE10 DR environment is now created by the Customer using the Cristie
Recovery ISO Producer (CRISP) tool. This tool has the ability to allow Customers to add
their own drivers for both WinPE5 or WinPE10 and DHW support. Therefore the Customer is
no longer dependent upon the default set of dissimilar hardware drivers provided by
Cristie Software Ltd..
One or more new hard disks are added or removed from the system
One or more hard disk is replaced with a bigger or smaller capacity disk
Network adapters are changed
Mass Storage Controllers like SCSI/SAS/SATA/RAID/NVME are changed
User Guide
Using CBMR for Disaster Recovery 23
One or more new hard disks are added or removed from the system
if more disks are added, they need to be partitioned and formatted manually using
Windows disk management tools
One or more hard disk is replaced with a bigger or smaller capacity disk
The disks may be scaled up or down in proportion to the original disk layout
It is the Customer's responsibility to locate the correct drivers for the dissimilar system.
The DHW will also allow 64-bit drivers to be 'injected' into a recovering 64-bit system.
Ensure you have the correct drivers for the target system (i.e. 64-bit).
Note: Drivers for recovering to VMware and Hyper-V are supplied on the recovery USB
flash drive or DVD/CD.
During the boot process, WinPE5 or WinPE10 drivers for your Plug and Play devices will be
loaded - in particular the Mass Storage devices and Network Adapters. When the WinPE5
or WinPE10 system has booted, it is possible to remove the physical USB flash drive or CD/
DVD (if used) if you wish.
Note: the DR Console will automatically reboot 72 hours after starting. This is an
operating limitation of the MIcrosoft Windows WinPE5 or WinPE10 environment.
When this sequence completes, the CBMR Recovery Environment will be shown.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 25
Prior to beginning the restore operation you may configure the network and/or the
network routing as necessary. Click the
icons to do this.
You may configure the format of the displayed date/time and the keyboard layout, by
pressing the locale icon. Note this icon will be shown according to the locale of
the host system used to create the ISO/USB flash drive using the CRISP utility so it may not
match the version shown here. So if, for example, the ISO/USB flash drive was built on a
By default the standard display uses a keyboard layout to match the default locale as
discussed above. However, this may be changed to one of the listed alternatives. Note
that this does not change the display language which is always English.
Select Date, Time and Time Zone to configure the time zone for the recovery.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 27
Note: the Additional Clocks and Internet Time tabs are operational. In fact it is
possible to synchronise the system time with an NTP time server if required.
Finally if your recovery environment does not provide keyboard support (perhaps a driver
issue) use the on-screen keyboard which can be displayed by clicking . This then
shows a clickable keyboard at the bottom of the screen. The keyboard layout displayed
will correspond to the currently selected locale.
Press Next> to proceed to the first step of the sequence. Press Cancel to abort the
recovery sequence at this point.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 29
For example, use the option to first map a network share location and
then Browse to select a folder on the share.
If you do NOT want to automatically save the the logfiles please check the tick-box to
skip this step.
You will still have the opportunity at the end of the restore process to save the logfiles
if you wish.
Press Next> to proceed to the first step of the sequence. Press Cancel to abort the
recovery sequence at this point.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 31
Note Point-in-time (PIT) restore mode is not supported for File type DR restores.
If the IBM Spectrum Protect server hosting your backup uses an SSL/TLS certificate (such as
version 8.1.2 or later), you may then select a certificate to use from the next dialogue
page:
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 33
Click Check this box to use a Certificate file and then either enter the certificate file path
direct or use Browse to navigate to a network share containing the certificate. Before
using browse, first use Network Setup to assign a network drive (if required).
Note: If you specify a certificate it must be accessible during the recovery sequence
using the path specified.
Click Next > to continue. Provide the details for the IBM Spectrum Protect server and
Node used to contain the backup:
Selecting the Point-in-time (PIT) restore mode will allow the system to be recovered from
the most recent backup before the specified date and time. This means the version of any
file restored will be earlier than the specified date and time. Selecting the down-arrow in
the calendar control will bring up a calendar:
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 35
This can be used to scroll the months/years backwards and forwards as necessary.
Note: a future date will result in the latest backup being recovered.
If PIT mode is not selected then, by default, the latest filespace versions will be restored.
At this point the client backup on the specified server will be accessed and the machine
configuration extracted.
Selecting the Point-in-time (PIT) restore mode will allow the system to be recovered from
the most recent backup before the specified date and time. This means the version of any
file restored will be earlier than the specified date and time. Selecting the down-arrow in
the calendar control will bring up a calendar:
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 37
This can be used to scroll the months/years backwards and forwards as necessary.
Note: a future date will result in the latest backup being recovered.
If PIT mode is not selected then, by default, the latest backup will be restored.
Select Next> to continue. At this point the FTP backup on the specified server will be
accessed and the machine configuration extracted.
If the backup was encrypted and no Key Repository file has been entered, then a prompt
will appear for the encryption key or passphrase to be manually specified. For example:
It is not possible to recover the configuration files from an encrypted backup without
the key or passphrase.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 39
Note: Storage Pool recovery only works with the WinPE5 version of the CBMR DR
environment. Do not use the WinPE10 version for Storage Pool recovery.
The pool configuration requires you to map the original pool/virtual disk configuration to
the physical disk layout detected on the target. This may have more or fewer disks than
the original so this re-mapping needs to be done manually.
a list of the original configured pools with their corresponding capacity and the free
space at the time of the backup.
a list of the original virtual disks defined for a selected pool together with the
corresponding virtual disk layout, provisioning, capacity, size in use and volume
letter.
a list of the original physical disks and the proposed physical disks discovered on
the target system for the selected virtual disk.
To assign physical disks to a virtual disk right-click the virtual disk to display the Virtual Disk
Layout dialogue.
This is a recovery of a Windows 2019 server with 2 Storage Pools, named Pool-A and Pool-
B. Pool-A is currently selected which is showing the Virtual Disk that was in the Storage
Pool on the source system. The screenshot below shows the Physical Disks that the Virtual
Disk was built from on the source system. There were 2 of them and they were all SATA
(shown as Bus Type SATA).
Note that the Proposed Physical Disks has a count of zero, i.e. there are no target
Physical Disks selected yet to recreate this Virtual Disk from, where Stored = Source system
and Proposed = Target system.
In the example above the 2 target physical disks that makeup the original virtual disk are
selected. Note the proposed disk count is now non-zero.
Repeat this process for all the remaining virtual disks in each pool. This results in a
configuration similar to this:
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 41
Note: There are some constraints on this configuration. For example, it is not
recommended to have fewer or more physical disks mapped to your target virtual
disk compared with the original source configuration.
Now click Next > to continue or < Back to return to the previous dialogue.
At this point the Storage Pools and virtual disks will be created.
Note: if no target disks are assigned during the Storage Pool step then recovery will
still proceed but no Storage Pools will be restored.
Recovery now runs as normal with no further Storage Pool configuration required.
There are certain constraints with this release of Storage Pool support.
Storage Pools and virtual disks are recognized by CBMR WinPE5, so if you boot a
target system that has them, then WinPE5 will see them and mask out the “real”
disks resulting in only the virtual disks being shown.
The use of NVMe type disks when using VMWare WorkStation is not recommended
when using Storage Pools.
Physical disks used in Storage Pools should have minimum size of at least 8 GB.
Only the CBMR WinPE5 DR environment is supported for recoveries of Storage Pools.
During the Volume Layout phase you can right-click on target disks and swap them
etc, but you can’t swap a Storage Pool virtual disk with a real disk or vice-versa.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 43
For a system with Storage Pools the Volume Layout will resemble this example:
The left-hand panel of the dialogue shows the original disk layout and partitions. The right-
hand panel shows how the recovered disks will be partitioned after the recovery.
A white tick box next to a disk signifies that the disk and its underlying partitions will
be left intact. Placed next to a partition/volume means that the corresponding partition/
volume WILL NOT be partitioned.
A white exclamation mark placed next to a disk means it WILL be partitioned during
recovery. Placed next to a partition or volume means that the corresponding partition/
volume WILL be partitioned.
A black/white exclamation mark placed next to a disk means at least one partition/
volume WILL be partitioned.
A white box indicates that the disk will be completely ignored during the recovery.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 45
When the recovery is to the original system, the contents of both panels will look similar if
the number of disks is the same. Possibly the disk sizes will be different.
When performing a recovery to a dissimilar system, the disk mapping can be much more
complex. Some of the criteria used to judge the disk mapping are:
disk geometry
disk capacity
if currently formatted, the disk signature
You may right-click on any disk shown in the right-hand panel to select whether the disk
will be partitioned or not.
Any attempt to incorrectly turn off formatting will result in this error:
You may also right-click on a partition to allow you to selectively modify the partition
parameters.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 47
If you attempt to either not format or delete a Windows system partition, an error such as
this will be displayed:
At this stage, nothing has happened to the disks. Press Next> to continue with the
recovery.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 49
You may change the IP address for each NIC interface independently. NICs that are
currently connected to a network are tagged with (Operational).
Note: The Use DHCP tick-box shown on the left side of the dialogue indicates whether
DHCP was used on the source system. If its ticked it indicates DHCP was used on the
source. If unticked a static IP address was used.
If you wish to retain the current hostname and IP addresses leave the fields at their default
values and select Next> to continue to the next section.
Note: When you click on the "Next >" the button will change to "Finish", when you click
on "Finish" the restore will start. If dissimilar hardware is detected, then when you click
on "Next>" the Dissimilar Hardware dialogue will be displayed instead. Click "Finish"
on that dialogue to start the restore.
When recovering to a system with a different MAC address (generally during a dissimilar
DR), the default IP address settings default to DHCP and not the original IP.
The Next > button will change to Finish. Click this when ready to continue.
Specify the default path or paths to be searched for the missing driver files. The paths may
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 51
Ensure the specified path or paths contain the correct 64-bit drivers for the dissimilar
machine. At the end of the DR sequence, the specified paths will be searched for the
missing drivers and automatically injected into the recovered system.
By default, it is only necessary to inject drivers for mass storage devices and, in some some
cases, network devices. The 'Load all types of drivers' tick box will force the DR to look for
all drivers in addition to mass storage and network devices. For example, this could
include graphics cards, USB and chipset devices, but these are rarely required and not
recommended.
Note that if drivers are not found for the new boot disk then, although WinPE5 or WinPE10
will be able to recover the files to the disk, there is a good chance that it will not boot
correctly.
The recovery is divided into different phases: a SystemState restore, which is then followed
by the recovery of each volume dataset selected:
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 53
This process may take some time if the backups are large. You may select the Abort
button to terminate the file recovery process, but this may leave the disk or partition in an
unpredictable state, which may render it unusable.
If any errors occur during the recovery, an error message will be shown in the dialogue
window. Refer to the logs post recovery to establish the cause of any error.
run a sanity check to determine if all the expected boot files are present on the
boot volume
run a dissimilar hardware check to determine if new drivers are required for new
boot devices
Finally, press Close to return to the Recovery Environment main menu. At this point, you
may want to view the recovery logs and perhaps copy the logs to a local device or
remote share before selecting to reboot. If you have configured the logfile save path
from the first step the logfiles will be automatically saved anyway.
Note: recovery logs are also saved to the recovered system to the CBMR installation
sub-folder 'Temp' (e.g. "C:\Program Files\Cristie\CBMR\Temp").
The above example shows a recovery from an original system with 8 physical disks, to a
target system with only one disk. The target disk is also much smaller than the original
system disk.
In this scenario, CBMR will select as many disks to recover as possible (in this case only one
disk - the boot disk). In addition, it will scale the partitions down in proportion to their
original size and occupancy. This can be complicated by having, say, mirrored dynamic
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 55
volumes when the mirror will need to be broken - if only one disk exists on the target (or it
has been tagged as not to modify).
Note 1: the Volume Layout dialogue will only show disks in the left hand panel that can
be removed.
Note 2: during a recovery to a system with larger disks, the partition sizes will remain
the same as the original by default. However, in this case, it is possible to increase
partition size manually during the recovery by right-clicking on the partition icon and
selecting Modify.
4.3 Tools
There are a number of tools that can assist with the recovery process. They are all
collected under this command button:
Load a driver
Dissimilar Hardware Wizard
Start VNC
Set trace levels
Advanced options
Copy key repository
Start iSCSI initiator
Browse for answer file
Copy Logfiles
Load a driver allows a new mass storage or NIC driver to be injected into the running
booted WinPE5 or WinPE10 DR environment. This would be used, for example, to support
a mass-storage (disk) device not currently supported out-of-box. This should be done prior
to starting the DR sequence.
The Dissimilar Hardware Wizard will allow drivers to be injected into the recovered system
when the target hardware has different devices from the original (eg. RAID controllers).
Normally, this will be done automatically as part of the DR sequence and will not need to
be run manually.
Start VNC will run a VNC server within the WinPE5 or WinPE10 environment, allowing
external VNC clients to remotely connect during the DR session. The start process will
provide you with the current IP address of the WinPE5 or WinPE10 environment, which
you will need to specify in the VNC client.
Note: the VNC connection is also password protected. The VNC feature is intended for
diagnosing DR problems under the guidance of Cristie Support, who will provide the
password upon request.
Set trace levels allows the DR log file trace to be increased or decreased as required:
It is recommended that the trace levels are only changed when advised to do so by
Cristie Support staff. This is because they could have a severe impact upon the
performance of the backup restore process.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 57
Start iSCSI initiator - please contact Cristie Support if you wish to use this feature.
Browse for answer file allows an automated DR answer file to be selected which then
triggers an immediate automated DR sequence.
Copy Logfiles allows all the current logfiles created as part of the recovery process to be
zipped up and copied to a network share or local device (such as a USB flash drive).
Note: it is only necessary to load the drivers for the hard disk, NIC and, rarely, the HAL.
Drivers for the hard disks and NIC can be determined by Plug-and-Play (PnP) and may
be readily identified. However, changes required in the CPU model via a change in
HAL cannot yet be determined by PnP - these need to be loaded manually.
If you wish to scan for just Mass Storage and Network devices (the minimum required to
boot a dissimilar system), select Next> to continue to the next step of the Wizard. This is
the recommended option. Under the guidance of Cristie Support, you may be asked to
scan for all devices. In this case, tick the 'Scan for all devices' box before selecting Next>.
The window appears empty to start with. The set of drivers located on the recovery CD is
the default choice, but in practice they should not be used. Instead, change the driver
search path to where you have actually located your drivers (for example, to a network
share or another CD) with the Change command button.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 59
In the example above, the driver search path is changed to the VMware drivers on the
WinPE boot CD. Begin the PnP driver detection by clicking Start.
The process checks the devices that it can detect and when it finds one that does not
have a driver loaded, it will offer to install it. The example below shows an LSI SCSI device
being detected:
If you are satisfied that the found driver path is correct, click on Install and the driver will
be installed. The device scan will continue and may find, for example, other mass storage
or network devices. Follow the steps above to install.
Drivers are usually .sys files. The .inf files define which driver files need to be loaded for a
given device. You may need to confirm the location of the driver files for each device, or
possibly find the path where they are stored. When you have the correct path, click on
OK and the Wizard will look for more.
Once all of the drivers of the detected devices have been processed, the Wizard will
indicate that the installation has finished. Click on Finish to proceed.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 61
Manual Installation
Typically, you would only manually install a driver for a CPU/HAL change. Select 'Manually
Install Drivers' from the option menu:
Select Browse... to locate the driver or HAL file you need by browsing to the appropriate
folder that holds the .inf file. If you need to load the driver from another machine, then
you can browse to a share on that machine and then to the appropriate folder.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 63
The Wizard allows you to select drivers that are grouped by manufacturer. Select the
actual driver that you wish to install and click Next>.
After you confirm the selection, the Wizard determines which files need to be installed.
You are given the opportunity to change the location from which they are loaded if
required..
When the drivers have been installed, the Wizard allows you to go back to install another
device driver or Finish the process.
For example, if the DR environment does not show any disks to be recovered, you can
inject a new mass storage device driver for the device and retry the DR Wizard.
You will be prompted for the location of the driver INF file. Use the Configure Network
button to map a network share if necessary:
The INF file and other associated driver files (such as the .SYS file) can be located on a CD,
USB device or a network share. The following confirmation dialogue is displayed if the
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 65
Use the Cristie Network Configurator utility to setup a network share first. All the files are
compressed into a single ZIP file so that they can be easily sent to Cristie Support when
required.
Note: the logs are automatically written back to the recovered system after a
successful recovery. They are saved to the CBMR installation sub-folder 'Temp'.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 67
The resulting display offers numerous NIC properties that can be changed. This property list
is dependent upon the NIC - ie. not all properties will be available for all NICs.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 69
To change the NIC speed or duplex setting, select the corresponding Property from the
dialogue and then select the required value from the Value drop down box as shown
below:
Again, note that the speed/duplex settings available are NIC dependent. Auto
Negotiation is generally the NIC default setting. Other NIC properties may be changed as
required.
If the NIC is currently connected to the network then the Status will be shown as
Operational. Otherwise the NIC is considered to be Non-Operational.
First ensure the desired network adapter is selected from the drop down list. If a static IP
address is to be applied, select the 'Use the following IP address' button. This will
automatically deselect the default DHCP option and allow the static IP parameters to be
defined.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 71
Set the new IP address, subnet mask and gateway IP address. The More button will allow
the system to have more than one static IP address. Click on Apply to confirm the settings
for the selected adapter.
This feature will also allow the DHCP lease to be released or renewed, as required.
Select the drive letter that you wish to allocate from the Drive drop-down box and type in
the share name that you wish to associate with it. Also specify the network credentials to
be used to access the share.
Note: The network path may be specified either by hostname, IPv4 or IPv6 address.
Press Map Drive to confirm the share operation. If successful, the share will be added to
the Unmap a network drive drop down list.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 73
The mapped drive is removed from the list to confirm the operation.
Select the 'Use the following DNS Server address' radio button and enter the new DNS IP
server address. If required, select the More button to add several DNS IP addresses. Press
Apply to activate the new address.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 75
Enter the new Computer Hostname and press Set to confirm the change.
You may then add a new route, delete or edit an existing route.
To add a new route, click Add a route. A data entry dialogue is displayed. To add a route
identify the new route network, the route netmask, gateway and route metric. Click Save
to add the new route or Cancel to cancel the creation of the new route.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 77
To delete an existing route, highlight the desired route in the displayed list and click Delete
a route. A confirmation dialogue is displayed. To delete click Yes to confirm or No to
cancel the delete operation.
To edit an existing route, highlight the desired route from the displayed list and click Edit a
route. A data entry dialogue is displayed. Only the network gateway and metric can be
changed however. Click Save to make the changes or Cancel to abandon the changes.
You may then add a new route, delete or edit an existing route.
To add a new route, click Add a route. A data entry dialogue is displayed. To add a route
identify the new route network, subnet prefix length, gateway and route metric. Click
Save to add the new route or Cancel to cancel the creation of the new route.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 79
To delete an existing route, highlight the desired route in the displayed list and click Delete
a route. A confirmation dialogue is displayed. To delete click Yes to confirm or No to
cancel the delete operation.
To edit an existing route, highlight the desired route from the displayed list and click Edit a
route. A data entry dialogue is displayed. Only the network gateway and metric can be
changed however. Click Save to make the changes or Cancel to abandon the changes.
4.6.3 Diagnostics
Click the diagnostics tab if not already selected. First select the required interface from
the drop-down list.
Enter either the hostname or IPv4/IPv6 IP address of the network target. Click tracert to
examine the route to the selected target.
User Guide
WinPE5 or WinPE10 based CBMR Recovery Environment 81
Click ping to check connectivity to the selected host. Click OK to exit the dialogue.
User Guide
CBMR in More Detail 83
A Wizard is defined for each of the main tasks, such as setting up the system recovery
information, creating or running a backup, managing backup locations, maintaining a
catalogue of backups and defining the default options.
Selecting this option allows the system configuration to be created. Note that this is
always stored with the Disaster Recovery backup itself.
For detailed instructions, please see the The Create Configuration Wizard chapter.
User Guide
CBMR in More Detail 85
For more information, please see the Creating a Disaster Recovery Backup chapter.
To view existing log files select View Log Files from the main CBMR menu:
If you request a log file to be created, the file is automatically saved and can be viewed
using this option.
Note: there will be no log files present unless you have previously run a Backup,
Restore, Compare or Verify which requests one to be created.
Cristie's Support personnel may ask for a CBMR version log to help in diagnosing problems
with your CBMR installation. This is a text file containing a list of components and their
corresponding version numbers. To do this, select Log Details from the main Help\About
CBMR menu option.
A file called version.log is created and can be viewed using the View Log Files option as before.
See also the Show Log Report chapter in this document.
User Guide
CBMR in More Detail 87
All saved scripts are created by this tool. A backup selection script defines the files and
folders that will be backed up, along with various options such as the Backup Location
on which the backup will be stored, the detail that will be saved in the backup
catalogue, and the amount of information that will be stored in the backup catalogue.
Essentially, a backup selection script defines the What and the How of a backup.
CBMR is supplied with a pre-defined script called system.scp. This script will backup all the
files on Drive C: to the default backup location.
You can modify the system.scp script to suit your backup job, or you can use the options
in 'Create New Backup Selections' to create your own scripts.
The CBMR Tools option presents the Backup Now, Restore, Compare, Verify, Backup
Catalogues and Backup Selections functions. These are the main tasks that you will
perform when maintaining your backup routines.
From here you can control existing scheduled jobs (Hold, Release, Run, Delete, Modify) or
create new ones.
The Scheduler is a simple way of maintaining your Backup regime. Once you have
created the backup selection scripts (what needs to be backed up and how) and
created schedules for them, the scheduler will simply carry on and do the work without
further intervention.
If Backup Scripts define the What and the How of a backup, then Schedules define the
When.
CBMR supports the Microsoft Windows Task Scheduler service for running scheduled jobs.
The Microsoft Windows Task Scheduler service allows very flexible schedules to be
configured.
Each time a backup is performed, a new Volume can be created in the Backup
Catalogue. A Backup Catalogue entry holds a list of the files and folders backed up. This
catalogue can be browsed and queried, allowing you to find the location of backed up
data without having to load tapes (if relevant).
The Backup Catalogue tool displays existing backups. You can view the catalogue
entries, search for individual entries, create new ones or delete existing entries.
User Guide
CBMR in More Detail 89
For more detailed information, see the Backup Catalogue section of this document.
A Backup Location reprsents any physical device you use to backup your data. For
example, a tape streamer, an autochanger or tape library, a Virtual Tape Device (VTD),
an FTP server, an IBM Spectrum Protect server or a Cristie Storage Manager device.
The Backup Location Configuration option holds details of all the Backup Locations
currently configured within CBMR. Locations can be deleted, queried, backed up to and
restored from using the Backup Location Tool. At least one Backup Location must be
configured within CBMR.
Backup, Restore, Compare, Verify and Media Utilities will all automatically use the default
backup location unless otherwise directed.
This takes you directly to the Default Settings property sheet. Default settings relating to
backup are used by all backups unless you specify otherwise in the individual backup
location script's properties.
The Directory Tree pane displays the directory structure of the selected resource, be it your
computer's drives and folders when selecting items to be backed up, or the datasets and
folders in a volume in the Backup Catalogue or tape within a Backup Location when
selecting data to be restored, compared or verified.
The File List pane displays the files stored in the highlighted location in the Directory Tree
pane.
To select (tag) or deselect (untag) an item in either the tree or list pane, click on the
square box next to the item's icon. Items can also be tagged and untagged by
highlighting them and selecting Tag/Untag from the Item menu or the context menu.
If you know that you are going to tag most of the drive or dataset contents except for
one or two directories or files from within, then tag the drive or dataset first and untag
the directory or files as required. If on the other hand you want to exclude more than you
include, then start with the drive or dataset untagged and tag the directories and/or files
individually from this window.
When an item in the file list pane is highlighted, the list can be sorted in a number of ways
using the Sort menu. The file list can also be sorted by clicking on the list's column headers.
+ A plus sign in the tree pane indicates that the tree item can be expanded. Expand it by
User Guide
CBMR in More Detail 91
- A minus sign in the tree pane indicates that the tree item has been expanded to its
lower level. It can be contracted by clicking on the minus sign.
The status of an item is indicated by the square box next to it. Items can be tagged or
untagged by clicking on this box. Listed below are the various symbols the status box can
show.
All tagged.
Nothing tagged.
Item that cannot be directly tagged, though you may open it and tag or untag its
contents.
At least one item is tagged for backup; it does NOT mean that every item
underneath is tagged.
When the software is successfully installed, CBMR is available from the Programs menu in
the Start popup. The example below shows CBMR about to be started:
A shortcut to CBMR is also created on the desktop during installation .CBMR may
also be started by clicking on this shortcut.
All the information is contained in property pages. Each page is dedicated to a different
section of the configuration, making it easy to locate a particular area if you need to
make changes.
The default program settings, once defined, will generally remain unchanged. If you want
to apply different rules for a particular job, then you can modify the settings from within
the Backup Selection script and these will apply only to the current script.
User Guide
CBMR in More Detail 93
Backup Properties
This page allows you to set the default actions which will apply during a backup. The
defaults can be over-ridden in the properties for individual backup selection scripts.
Media Options
The media options control the way that data is written to the media.
User Guide
CBMR in More Detail 95
Overwrite - If overwrite is selected the backup will start at the beginning of the media
overwriting any existing data
Overwrite media with the same label, append otherwise - Selects overwrite only if the
media label matches with the requested media, otherwise the data will be appended to
the media
Overwrite media with the same label, fail otherwise - Selects overwrite only if the media
label matches with the requested media, otherwise the operation fails and no data will
be written to the media
Append, overwrite if not appendable - Selects append, but if the media is blank or the
media contains a non CBMR data set and therefore cannot be appended, the media is
overwritten
Append to media with the same label, fail otherwise - Selects append only if the media
label matches with the requested media, otherwise the operation fails and no data will
be written to the media
When selecting the Backup Open Files option, CBMR will use Microsoft VSS if installed and
running, while backing up open files. If VSS is not installed or the option is not selected,
then the option to Automatically retry the open file, Skip the open file or Ask the user
what to do can be selected from the list box. If VSS is in use, then a further option is
available to enable multiple-drive monitoring.
Compression Type
Software Data compression will be performed by the CBMR software before the data is
written to the Backup Location
Hardware compression (if available, otherwise none) This option will attempt to make
the Backup Location perform the data compression. If compression is not available on
the hardware, the data will remain uncompressed
A slider control is provided to set the software backup compression level. It can be set
from level 1 (least compression) up to level 9 (best compression), level 6 being the
default. Note that minimum (least) compression provides maximum backup
performance. Also note that increasing the compression level will extend the backup
time. This setting only applies when the Software Compression type is selected for a
backup
Check Integrity alone After finishing the backup, the media will be scanned from the
beginning to end, ensuring it is readable
Byte By Byte comparison After finishing the backup, each file on the media will be
compared against its disk counterpart and the differences reported
This option, if ticked will provide rapid access to files during a restore operation. (Not all
drives support this option)
Select this option (ticked) if you want the security information (access control data)
associated with directories and files as well as the data included in the backup. If the
option is not ticked then only the data is included.
The user who is logged on must have the appropriate 'Right' to request security
information to be backed up. Please check with your System Administrator that your user
account has been included in the Backup Operators group.
If this option is enabled then all the security details (access control data) are included in
the backup as well as the data.
By default all mounted drives (ie. partitions) will be included in the backup. Deselect this
option so that mounted drives are excluded from the backup by default.
User Guide
CBMR in More Detail 97
Restore Properties
This page allows you to set the default actions which will apply during a Restore job. The
defaults can be over-ridden when performing individual restores.
Existing Files
If any files being restored already exist on disk, then you can direct CBMR to respond in
one of the following ways:
Later Files
If any files being restored are found to be later versions than those already existing on disk
then you can direct CBMR to respond in one of the following ways:
If any read only files being restored already exist on disk then you can direct CBMR to
Skip any read only file it encounters which already exists on disk.
Ask whether it should overwrite or skip the file.
Overwrite the file on disk with the file from the backup.
If this option is selected CBMR will restore the Access Control List information associated
with directory files included in the restore. If the option is not ticked then only the data is
restored.
If this option is selected any mounted drives (partitions) will be restored as well.
Note: you must be logged on the computer as a user account with the appropriate
rights to restore security data.
User Guide
CBMR in More Detail 99
If you need a location which does not appear in the list, then you need configure it using
Create New Backup Location in the Backup Locations folder.
Note: if necessary, you can assign a different Backup Location from within the Backup
Selections script to be used for a particular job. This does not affect the default.
Restore, Compare and Verify jobs can be run on a non-default location by selecting
another backup location in the Backup Location dialogue and selecting Restore /
Compare / Verify... from its context menu.
Full - Media and Dataset headers, Directories plus File information. (This level of detail will
use a significant amount of disk space)
Mode - Overwrite/Append
If Overwrite is set, then each time the log file is created it overwrites the existing one
If Append is set, then each log file is appended to the previous one
A Full logfile contains a list of all files, errors (if any) and statistics
A Partial log file contains sub-directories, errors (if any) and statistics
A Brief log file contains errors (if any) and statistics
If None is selected, then no log file is created
If this option is ticked, an additional log file is created which lists errors only. Similar to the
other log files, it takes the name of the current operation but with an extension of .err eg.
backup.err
User Guide
CBMR in More Detail 101
Errors will still be written to the Full, Partial or Brief log file if you have requested one of
these.
Performance Page
CBMR has control over some performance related parameters, like the number and size
of read/write buffers. The basic unit of data which can be read or written to the tape,
called a block, is determined by CBMR, depending on the Backup Location device and
media type in use. Most recent tape drive manufacturers recommend bigger block sizes
for better performance. As a result, in CBMR version 4 the following configurable
parameters were introduced.
It is possible to set individual block sizes for each Backup Location used by CBMR. This
could be done using the Backup Locations dialogue:
The minimum buffer size can be set using the Default Settings property sheet, Performance
page. This only sets the minimum buffer size. It is guaranteed that a buffer size over this
limit will be used. The buffer size should be in multiples of the tape block size in use. Since
it is possible to set block sizes individually for locations, CBMR will calculate the next
integral multiple block size over this limit.
Number of Buffers
At least one buffer is required for any read/write operation. Increasing the number of
buffers will increase the performance of the locations with high latency. This depends on
the system configuration, location in use and the load on the system at the time of the
backup. It is recommended to test with different values on a test backup.
User Guide
CBMR in More Detail 103
Exclude Files
Allows selected groups of files or folders to be excluded from all backups.
The upper section allows files and folders to be excluded from a backup using the
wildcard characters * or ?. The wildcard characters are accepted for drive and filename,
but not for the path. For example, *:\*.avi will exclude all files with the extension AVI from
a backup.
The lower section allows specific named files to be excluded from a backup. Note all files
with the specified name regardless, on which drive or in which folder they reside, will be
excluded from the backup. Wildcards are not accepted in this case.
Encryption Properties
This property page allows a default passphrase to be setup for encrypted backups.
The passphrase is used internally by CBMR to generate an Encryption Key. The resulting
Encryption Key then becomes the default value for all subsequent encrypted backups for
all Users of CBMR on the system (unless overridden in a backup script). If this default is
changed it is important to notify all other users that it has been changed.
If Show Clear Text is selected then the passphrase is shown in plain view, otherwise it is
shown as asterisks as it is typed in.
The passphrase should be secure (eg. a long sentence or password). Note the passphrase
is case sensitive.
Two encryption algorithms are available - Blowfish 256-bit and AES 256-bit. Blowfish is
generally faster to encrypt than AES. However, enabling encryption significantly slows
down the backup.
User Guide
CBMR in More Detail 105
During the disaster recovery process, the system will prompt for confirmation to perform
some actions. If you would like the Disaster Recovery module to confirm these prompts
for you, check this box.
There may be a requirement to run custom commands before or after a disaster recovery
restore operation. These commands should be entered into a windows '.cmd' file which
can be linked to using these settings.
If the final, post-recovery, restore should not be automatically run, select this option. The
final restore can be manually run using the DR scripts.
Enable logging
This option configures the disaster recovery restore process to log status messages.
CBMR must have at least one location configured in order to operate and backup data.
Configured locations are listed in the Backup Locations option selected from the
Configuration toolbar:
All the configured backup locations in CBMR are listed in the Backup Locations
configuration. This is a one stop solution to create, modify and delete Backup Locations.
User Guide
CBMR in More Detail 107
The Sort top bar menu allows you to arrange the backup locations in alphabetic
sequence (Sort by Name) or in date created sequence (Sort by Category).
Note: if the Details view is displayed, you can also sort the entries by clicking the
relevant column heading.
If you let the CBMR Wizard search automatically, the New Backup Location Wizard will list
the location devices that are directly attached to the system but are yet to be
configured.
It displays the Inquiry string of each location - which is read from the device firmware and
also the category of the backup location.
SCSI tape
Media Handler/Robotics (needs additional library support module from Cristie)
File Device
IBM Spectrum Protect (client must be pre-installed)
Select an entry and press the Configure button (or double click the entry) to add this
Backup Location to CBMR's known locations list. You will then be provided with the
appropriate configuration dialogue.
User Guide
CBMR in More Detail 109
The various screen fields and their purpose are listed below.
SCSI Tape
IDE Tape
Robotics/Media Handler
File Device (VTD)
IIBM Spectrum Protect Module (if installed)
Cascaded Device
Adapter The name of the Adapter or SCSI Port. On Windows XP,
Vista, Server 2003 and Server 2008 it will give you the
name of the SCSI miniport driver with a running serial
number
SCSI ID The SCSI ID or Drive number of the device
SCSI LUN The SCSI Lun of the device - it will be 0 for IDE devices
Note: ensure you do not place the VTD file on a local disk that will destroyed during a
DR operation.
You can setup a Cascaded Backup Location using the Cascaded Backup Location Setup
dialogue.
The order of the backup locations in the chain is important as the first location in the list
will be accessed first.
You can double click on any location to remove it from the list and add it to the other
list.
You can drag and drop using the mouse to re-arrange the locations in the Locations list.
User Guide
CBMR in More Detail 111
SCSI Tape
IDE Tape
File Device
Pressing OK will save the location and Cancel will discard the changes you have made.
Pressing Help will display this topic.
Note: though CBMR does not prevent you from cascading dissimilar backup location
devices, for example, a DAT drive to an AIT drive, the backup operation will fail while
trying to access the next backup location.
The various screen fields and their purpose are listed below:
Pressing OK will save the Backup Location details. Pressing Help will invoke this topic.
User Guide
CBMR in More Detail 113
Once a Robotics device is configured successfully, you have to create a Library Backup
Location, which will use this Robotics device, during backup and other media
operations. Refer to Library Backup Location Setup for further details.
Each library device consists of any number of available slots. Slots may not be shared
between libraries, but drive devices can. For instance, if you have a library with a single
drive and 20 slots, you could use the first 10 slots for Manufacturing backup and the next
10 slots for Marketing backup.
In this case, you will create one backup location with the name 'Manufacturing' with slots
0 through 9 selected, and another with the name 'Marketing' with slots 10 through 19
selected.
With a single device shared between two libraries, you cannot perform the
'Manufacturing' and 'Marketing' backups simultaneously. If you have two 2 drives
available, each library could have its own drive, and they can be backed up in parallel.
The slots of a library device need not be contiguous. You can have slots 0, 2, 4, 5 etc. in a
device configuration. In this case, the backup will continue from Slot 0 to 2 etc.
Note: you MUST have media in all the selected slots of a library device in order to use
it.
You will specify the Elements or Slots, which will be used interchangeably in CBMR, in this
dialogue.
You have to enter a friendly and unique name to the Library configuration. Single click on
the box next to the slot to include that slot with this library configuration.
It is possible to select or deselect multiple slots quickly by using the Ctrl and Shift keys while
highlighting the rows. A single click on any box will then select or deselect the whole
selection.
You must select at least one slot for each library.
The screen fields are as follows:
User Guide
CBMR in More Detail 115
Use by: Barcode When 'Use by Barcode' is selected, the Media is shown
ordered by Barcode. The Barcode order can be
changed by dragging and dropping the Barcodes into
the required positions
Tape Slots Gives you a list of all available Tape Slots within the
library. It also displays whether a media is present in the
slot, the barcode of the media, if your device supports
one
Pressing OK will save the Backup Location and Cancel will discard the changes you have
made. Pressing Help will display this topic.
This simple system consists of a workstation connected to a local tape library. The library
consists of two SCSI drives and a robotic media handler
This simple system consists of four workstations connected to a server. The server is
connected to a local 10-slot tape library.
You could either back the workstations up to the server (as in the simple network
example) and then back the server up to the tape library (as in the isolated tape library
example)
In this case you could either:
create a single library backup location for the tape library and then back the server
up to it
create separate library backup locations for each workstation and the server in the
tape library, and then back the appropriate areas of the server to the specified
library backup location
The various values which you can set using this dialogue are listed below:
Here is where you specify the communication method to be used to access the IBM
Spectrum Protect server. The displayed options correspond to the currently supported
options by the IBM Spectrum Protect server. The possible value combinations are listed
below:
User Guide
CBMR in More Detail 117
TCPIP:
Server Address The host name of the IBM Spectrum Protect server or the
IP address in dotted decimal form
Port The TCP port at which the IBM Spectrum Protect server is
listening for client requests
IPXSPX:
Node Address Enter the IPX/SPX node address for the IBM Spectrum
Protect server
Network Enter the IPX/SPX network address for the IBM Spectrum
Address Protect server
Socket Enter the socket number for the IBM Spectrum Protect
server
NETBIOS:
NetBIOS Server Enter the NetBIOS server name for the IIBM Spectrum
Name Protect server
NetBIOS Client Enter the IBM Spectrum Protect client name
Name
LAN Adapter Enter the LAN adapter number
Number
NAMEDPIPE:
Here is where you will specify the name of the client node which will be used by CBMR.
The node might have a password associated with it. You will also enter the name of the
filespace to use. The filespace name must start with a '/'. If you haven't specified a '/' it
will be added automatically.
If only single version DR backups are going to be used, the client node should be created
before using IBM Spectrum Protect Administrator utilities and it must have the Backup
Delete Allowed and Archive Delete Allowed set to Yes.
If backup versions are going to be used, the Node Policy domain used must be
Node Name Enter the node name, which must have been created
prior to invoking this dialogue
Node Password Enter the node password, if any. Leave it blank for no
password
Filespace Name Enter the name of the filespace, which should start
with /. If this doesn't exist before, it will be registered
Once a IBM Spectrum Protect backup location is successfully created, try to create a new
header using the media utilities. If it succeeds, congratulations and your location is ready
to go. If it fails, the appropriate message will tell you what is wrong.
To set up a IBM Spectrum Protect Node to allow multiple versions of the a DR backup to
be stored, follow the following steps:
define a Management Class (MC), which contains a Backup Copy Group (BCG)
and an Archive Copy Group (ACG)
register your node to use the MC
In this example, there can be two versions of an object. If there is more than one version
and you've deleted one of them, then the deleted one will be kept for 30 days, the only
remaining copy of the object will be retained for 60 days (AFTER you make it inactive).
These parameters should be set according to your preferred use of IBM Spectrum Protect.
If your IBM Spectrum Protect server is version 8.1.2 or later you will need to configure the
Secure Sockets Layer (SSL) or Transport Layer Security (TLS) certificate to enable network
connections. This should be done using the IBM Spectrum Protect dsmcert program in a
command window (this is not part of CBMR).
User Guide
CBMR in More Detail 119
The various parameters which you can set using this dialogue are listed below:
Name The friendly name of the backup location.
Any valid character sequence up to 79
characters is acceptable.
FTP Server Name FTP server IP address or DNS hostname.
Port Port 21 for FTP or 990 for FTPS. Note: port 22
for SFTP is not supported.
Target folder on The target folder is relative to the User's
FTP server home directory and should not be an
absolute path.
User Name User's FTP server username.
Password The corresponding FTP server password.
Once an FTP backup location is successfully created, try to create a new header using the
media utilities. If it succeeds, congratulations and your location is ready to go. If it fails,
the appropriate message will tell you what is wrong.
The new default will be reflected in the Backup Location page of the Default Settings
dialogue.
Note: individual backup selection scripts can be configured to use the default backup
location. By changing the default location, individual scripts will use the new location
without the need to edit individual scripts.
Highlight the location to be deleted in the Backup Locations dialogue, and press
the <Delete> key on your keyboard. Alternately you can use the Delete menu option
from the Backup Location menu.
You will be prompted to confirm the delete operation. It is possible to delete
multiple locations by selecting several locations using the <Shift> and <Ctrl> keys
while making the selection.
CBMR provides a number of features that should enable you to set up the system in the
way that best suits you.
Adding jobs to the Scheduler list is an easy way of automating DR backup. The CBMR
Scheduler offers a comprehensive time/date setup and the choice of running with
Backup Selection scripts or for even greater flexibility, command files.
User Guide
CBMR in More Detail 121
You can simplify the appearance of CBMR by hiding some of the options, for example,
Backup Locations and Default Settings in the Configuration drop-down menu. The pcbax.
ini file can be edited to remove any of the main window objects. The list of variables in
the pcbax.ini file controls what appears on the CBMR launch panel. All the variable
names are relevant to their function, so it is easy to decide which you need to change if
required.
To hide an object, set the appropriate 'Showxxx' value to zero. For example, to hide the
Backup Locations object, set:
ShowBackupLocations = 0
to minimise the effect of lost data be it due to human error or machine error
maintain an archive copy
One of the main tasks in creating a backup is ensuring that there is an up-to-date copy of
all data. This does not mean backing up every file every time. Although a complete and
full backup is necessary, in between times a selective backup is enough to ensure that all
data is secure up to the last backup.
Create some Backup Selection scripts to cover the routine jobs such as a full weekly
backup, a daily incremental backup and so on.
Pick the appropriate Backup Selection script and set the Backup in motion.
You can also set up the Scheduler to run the jobs automatically at the set times.
Once you have established some backup routines and know what you need to backup
and when, it is a good idea to create a range of scripts covering all the routine backup
jobs.
CBMR is supplied with a pre-defined script called 'Backup all files on system [Boot] drive'.
From the main Backup Schedules drop-down menu you can change the View (icons, list
or details display) and Sort by name/date. Also, from the Jobs menu you can perform all
the routine tasks such as Modify an existing schedule, Run a selected schedule, Delete a
schedule, create a new schedule (Create New) and access the Default Settings.
If the Details view is displayed, you can also sort the entries in Description, File Name or
Date/Time sequence by clicking in the appropriate column heading.
Any one of these methods will invoke the Backup wizard. This will take you through the
steps required to create the new Backup Selection script.
This wizard will guide you through the process of creating the rules governing a backup.
The Selection script produced can be run immediately or saved for future use and a
schedule can be set up to run the saved script automatically.
User Guide
CBMR in More Detail 123
Data To Backup
First select the data to backup.
Common Settings
Gives the option to use the Default Backup Location or any other connected Backup
Location.
The media label is a unique identifier for the media loaded in your Backup Location.
Ideally the label should reflect the contents of the media. If you need to Restore data,
especially in an emergency, headers such as 'Volume 1' and 'Volume 2', without any other
description, do not mean anything and will cause a lot of frustration.
The data description field allows you to add more specific details, which may be useful in
identifying the contents of the tape. It may not be you who is accessing it, perhaps
several months from now.
User Guide
CBMR in More Detail 125
This page is displayed after the most common backup options have been set. If more
advanced options need to be set, then choose the Advanced Settings option and this
dialogue will be presented again at the end. The options in the next topics are displayed
only if this setting is selected.
In order to save the backup script, a file name and description must be given. The name
must not be more than eight characters and is use to create a script file. The description
will be used to identify the script in the Backup Scripts Tool, so it make sense to make this
meaningful.
It is not necessary to save the backup script if you only want to run it immediately.
If the option to create a schedule is selected, then the schedule dialogues will be
presented after the script file has been saved. If CBMR has been configured to use the
Microsoft Task Scheduler, then the Task Scheduler Wizard will be presented, otherwise the
CBMR Task Scheduler property sheet will be presented. In either case, the options required
to run the newly-created script file will already be filled in.
Backup Location
This page allows you to set various options relating to the way the backup is stored on
the destination Backup Location.
Verify Method
<Use Default> - use the default verifiy method set in Default Settings
Verify After Backup - checks the validity of the recorded media
None - does not perform any checks
Check Integrity Alone - after finishing the backup, the media will be scanned from
the beginning to end, ensuring it is readable
Byte By Byte Comparison - after finishing the backup, each file on the media will be
compared against its disk counterpart and the differences reported
Unload Media
If the Backup Location supports automatic ejection of the media, then this option will
ensure that the media is unloaded at the end of the backup cycle.
User Guide
CBMR in More Detail 127
Compression
Allows the compression method to be selected for the backup. Options are:
Encryption
Enables encryption for the backup. An entry will then be made in the Key Repository file
for the backup. Options are:
Use new passphrase - select this option and enter a new passphrase for the backup.
The resulting passphrase will generate a new Key for the backup. The Key (not the
passphrase) is saved in the Key Repository file. To restore the backup the entered
passphrase or the Key Repository file must be accessible
Use the default Encryption Key or passphrase - instead of specifying a new
passphrase, use the currently defined default value for the backup. An entry for the
default Key will already be in the Key Repository file. To restore the backup, the
default passphrase or the Key Repository file must be accessible
Use dynamically generated Key - a new key will be generated randomly (no
passphrase is used here) just before the backup is started. The random key is then
saved to the Key Repository file. To restore the backup, the Key Repository file must
be accessible
File Access
Allows you to specify whether to use Microsoft VSS to back up open files and what action
to take when open files are encountered and VSS is not being used. If you are using VSS,
then Multiple Drive Monitoring can also be selected.
This option, if selected, will provide rapid access to files during a restore operation. (Not
all drives support this option.)
User Guide
CBMR in More Detail 129
This page allows you to set options regarding the information that is stored in the backup
log file and that stored in the Backup Catalogue.
On this page, you will select the data to be backed up and the most common options.
Specify what you want to include in the backup in the Data To Backup window. It can be
a straightforward backup of all files in the selected drive(s) (servers/workstations on the
network) or a more selective backup where you have de-selected certain directories/files
and/or set restrictions on files.
The Data To Backup displays two separate items under the Desktop icon:
Local Computer
The Local Computer contains the logical drives available for backup.
Note: System State is listed as a separate entity. To include the complete System State
contents in the backup, click the System State box.
Network
The Network contains the available Network Providers (types of network) on your system:
User Guide
CBMR in More Detail 131
The Incremental selection will backup all files that have changed or are new since the last
Normal or Incremental backup. The backup will reset the archive bit
Media Options
The media options control the way that data is written to the media.
Overwrite - If overwrite is selected the backup will start at the beginning of the media
overwriting any existing data
Overwrite media with the same label, append otherwise - Selects overwrite only if the
media label matches with the requested media, otherwise the data will be appended to
the media
Overwrite media with the same label, fail otherwise - Selects overwrite only if the media
label matches with the requested media, otherwise the operation fails and no data will
be written to the media
Append, overwrite if not appendable - Selects append, but if the media is blank or the
media contains a non CBMR data set and therefore cannot be appended, the media is
overwritten
Append to media with the same label, fail otherwise - Selects append only if the media
label matches with the requested media, otherwise the operation fails and no data will
be written to the media
Include Subfolders
When this option is ticked, selecting an item in the tree view will also select everything
below that item in the tree.
Filter
The Filter option will display the File Restriction Settings dialogue which allows you to be
very precise about what is included/excluded in the backup.
Estimate
The Estimate option displays a window containing an estimate of the size of the backup
you have defined (the number of files and the size in Bytes). This could be useful if you
need to know in advance how much capacity you require for this backup or estimate
how long the job will take to run.
See also the Configure Backup Properties page for additional details.
System State
The Data to Backup page displays the logical drives available for backup on the local
computer.
The System State, which includes the Registry, Boot Files and Com+ Registration database,
is listed as a separate directory to make it easy to ensure that the complete contents can
be included in the backup
If you wanted to run a one-off backup without saving the Backup Selection script, you
can make your selections on this screen and press the Backup button. The display is a
hierarchical structure in the same style as the Windows Explorer window.
The Network contains the available Network Providers, typically Microsoft Windows
Network, NetWare or Compatible Network and User Defined Shares.
Click on Microsoft Windows Network '+' box to display all the available domains.
click on the clear box attached to a server to select all shares on that server or
click on a server '+' box to list the shares and proceed to select individual shares by
clicking the clear box attached to the relevant share.
Note1: once an entity has been selected, even if it is only one file, the grey box
attached to the network provider, the Network label and the Desktop will be ticked.
User Guide
CBMR in More Detail 133
Note2: when Windows is started it creates administrative shares for each local drive.
They are identified by a dollar sign - for example C$, D$. Only members of the
Administrators, Backup Operators or Server Operators Group can backup these
shares.
Click on NetWare or Compatible Network '+' box to display all the available fileservers.
Note: once an entity has been selected, even if it is only one file, the grey box
attached to the network provider, the Network label and the Desktop will be ticked.
Select the User Defined Shares '+' box to display all available shares.
You can Modify any item in the list and Add or Delete entries via the File Selection
dialogue.
The File Selection dialogue allows you to change the restrictions of the selected file or
modify an existing specification. CBMR will accept wildcard * and ? definitions. For
example:
Statement Result
\*.* All files in the Root directory
You can also apply date restrictions (ignore files Before/After), Include sub directories or
Modified files only.
Some shares residing on other platforms such as LanManager or LANserver will not be
included in the network hierarchy.
Click on a domain '+' box to display all the available servers. Then, either click on the
clear check box attached to a server to select all shares on that server or
click on a server '+' box to list the shares and proceed to select individual shares by
clicking the clear box attached to the relevant share.
Note: once an entity has been selected, even if it is only one file, the grey box
attached to the network provider, the Network label and the Desktop will be ticked.
CBMR supports Windows supported networks such as the Novell NetWare network
operating system. Expanding the NetWare Network displays a list of file servers attached
to that network.
Click on the clear check box attached to a server to backup all volumes on that server
or
Expand the server to list the shares and proceed to select individual shares by clicking the
User Guide
CBMR in More Detail 135
Note: once an entity has been selected, even if it is only one file, the grey box
attached to the network provider, the Network label and the Desktop will be ticked.
The 'User Defined Shares' provider is used to list shares on other platforms such as LANserver
or LanManager. Although these shares may be accessed, they are not automatically
available for selection. They must be added manually.
User defined shares are specified in a separate file called usershar.ini located in
the \pcbax directory. Below is an example entry:
Syntax
[main]
\\DEV\dev_files
\\DEV\documents
Logon Failure
CBMR automatically tries to create any connection required to access a resource. The user
account (name and password) can be specified either as a default account or a different
account for an individual resource.
You must provide a user name and password which has permission to access this
account.
Any connection made via this route is used for this access only and will not be saved
when the program exits.
A tick in both both boxes (Ignore Files Before/After) will restrict the backup to files within
the dates specified. Any restrictions you have set can be applied to the entire backup or
only to selections made from this point onwards.
This window allows you to define restrictions which will apply to all selected drives on this
backup. You can restrict the selection by:
Including/Excluding Sub Directories
when the Sub Directories box is ticked, all sub directories will be included in the
backup
Including/Excluding Modified Files
when the Modified Files Only box is ticked, then only those files which have a modified
flag set will be backed up
Excluding Files According to Date
User Guide
CBMR in More Detail 137
select the Ignore Files Before or Ignore Files After options. Using either of these options,
you can exclude files before or after a specified date
Including Files According to Date
if you want to restrict the backup to files within a particular date range, then set dates for
both 'Ignore Files Before' and 'Ignore Files After'
applying these restrictions to all selections in current Backup Selection script (current and
future) or
only applying them to selections tagged from this point onwards
To display existing Backup Selection scripts, click on the Backup Selection button on the
toolbar or select Backup Selections from the Tools top menu.
There is a pre-defined script supplied with CBMR called 'Backup all files on system [Boot]
drive' (filename - system.scp). When you run this script, the system identifies which drive
the Operating System was booted from and backs up all the files on that drive. This
means that should there be a need to recover the system, you have a copy of all your
system files.
Open the Backup Selections tool. Double-click on the script that you want to change or
highlight it (single click) and select Modify from the Script top bar menu.
Select Save from the top bar menu and press OK to close the script window.
If you decide not to save the changes you have just made, select the Cancel button.
The backup selection script editor is where you select the data to be backed up and set
other properties relating to the backup. On the main screen, you can select (tag) the
data to be backed up. There are also buttons to begin the backup immediately,
estimate the size of the backup and set further properties including the file name used to
store the backup selection script.
The Backup menu provides options to alter the backup's Properties, set Restrictions on
whether the tagged data is included in the backup (for example based on the age of a
tagged file), estimate the Size of the tagged data, run the Backup immediately, Save the
script and Close the Backup Selection script editor.
The Item menu (which is also available as a context menu) allows you to view the
Dataset details for a drive, Tag or Untag an item and view a Selection List for a drive. In
the Enterprise version of CBMR, this menu also enables you to set usernames and
passwords for attaching to network drives.
The Sort menu is available when at least one item is highlighted in the file list view. It
enables the file list to be sorted in a variety of ways. The file list can also be sorted by
clicking on the list's column headers.
User Guide
CBMR in More Detail 139
Initially the options will be set to <Use Default>, which means whatever is set in Default
Settings property pages will be used for this job. If necessary you can make some
adjustments to suit the current job. Any changes made here only apply to the current
backup selection script and do not alter the Default Settings properties.
For descriptions of most of the fields please refer to the Backup page of the Default
Settings section in this document for a brief description of the fields. The remaining fields
are:
Backup Location - gives the option to use the Default Location or any other
connected Location (storage device)
Unload Media After Backup - if the Backup Location supports automatic ejection of
the media, then this option will ensure that the media is unloaded at the end of the
backup cycle
Run cleaning cycle before backup - if the Backup Location is a library or
autochanger that supports a cleaning media, this option ensures that a cleaning cyle
is completed before the backup commences
Backup mounted drives - include any mounted drives (partitions) during the backup
Initially, compression options will be set to <Use Default>, which means whatever is set in
Encryption Default Settings property pages will be used for this job. If necessary, you can
make some adjustments to suit the current job.
Encryption will be enabled/disabled as defined when the script was first created.
However, this can be changed using as required.
Note: any changes made here only apply to the current backup selection script and
do not alter the Default Settings properties.
For descriptions of these fields, please refer to the Backup page of the Default Settings
section in this document for a brief description of the fields.
Script Name
The Filename and Description entries are optional.
The description entry is what appears in the Backup Selections scripts folder, so it makes
sense to provide a meaningful description.
The file name is used by the system. The name should comply with the short filename 8.3
convention.
However, if you do not intend to save this script then a name and description are
irrelevant.
Name is a unique identifier for the media loaded in your Backup Location. Ideally the
name should reflect the contents of the media. If you need to Restore data, especially in
an emergency, headers such as 'Volume 1' and 'Volume 2', without any other description,
User Guide
CBMR in More Detail 141
Comments field allows you to add more specific details which may be useful in identifying
the contents of the tape. It may not be you who is accessing it, perhaps several months
from now.
Please take note of the implications of supplying a Password. A password will make your
data more secure because a Restore operation recognises the password protection and
will not proceed until the correct password is entered.
See also the Displaying Media Headers for Backup section in this document.
Highlight the Backup Selection script you want to remove (single mouse click on the
relevant script).
Select Delete from the Backup Selection Scripts top bar menu and press the Delete key.
Double-click on the script to view/modify it and then press the Backup button or
From the CBMR tool, select Backup Using Existing Script from the Tool top bar menu. This
will open the Backup Selections tool. Double-clicking on a script will then run it. Once the
script has finished, the Backup Selections tool will also close.
When editing a Backup Selection script, the Estimate button (which also available from
the Tool top bar menu) will estimate the size of the backup you have defined: the
number of files and the size in Bytes). This could be useful if you need to know in advance
how much capacity you require for this backup or estimate how long the job will take to
run.
The Backup Status window displays a running report on how the backup is progressing.
The information is divided into three headings:
You can password protect a dataset. This provides increased security of data BUT make
sure you can remember the password. You will be prompted for the password at any
future access. There is no bypass procedure and if the password is lost or forgotten, the
data will be inaccessible.
When you do a Restore, Compare or Verify, CBMR displays the first dataset. Any remaining
ones are listed when you select Next or All.
Note: a password is a useful security measure, but you should be aware of the
implications. If a backup is password protected, then the password will be requested
before the data can be accessed. If you forget the password, there is no bypass
procedure and the data will be lost.
User Guide
CBMR in More Detail 143
There is a Backup Catalogue page in the Default Settings properties. From here you can
specify just how much information you want to store or indeed if you want the backup
added to the catalogue.
There are four levels of information (Brief, Partial, Full, None). There is a trade-off of space
versus level of information. There is no typical setting; which level you use depends on
your own requirements. You can change the level at any time if you change your mind
about how much information you need to keep.
You can either change the default setting or modify a particular Backup Selection script
which will then apply from the next backup or you can modify the Catalogue
information level from within the Backup Catalogue window:
You can request a log file to be created during a Backup, Restore, Compare, Verify and
by the Scheduler. The files are named according to the operation (Backup.log, Restore.
log and so on) and stored in the CBMR directory. If a Backup.log, Restore.log etc. already
exists, then logging information is appended to the relevant file for each subsequent
operation.
The file can grow rapidly. If you need to retain the information, save it to a new name. (
Save as... is available from the File menu (in Notepad) when you View the logfile.) If not,
delete it and a new file will be created next time the operation is carried out.
The View top bar menu allows you to control the log files display window. The files can be
displayed as large/small icons, as a list or as a detailed listing which includes date, time
and size details.
The Sort top bar menu allows you to sort the files in alphabetic sequence (Sort by Name),
in date (Sort by Date) or in size sequence (Sort by Size).
Note: in the Details view you can click in the relevant column heading to sort the
display in the Name, Size or Date/Time sequence.
The Sort top bar menu options sorts the files in alphabetic sequence (Sort by Name), in
date (Sort by Date) or in size sequence (Sort by Size).
Note: if the Details view is displayed, you can also sort the entries in Name, Date, Time
or Size sequence by clicking in the relevant column heading.
Default Settings
Log Files are controlled from the Default Settings. Select the Default settings... option from
the Logfile top bar menu. This takes you directly to the log file property page. You can
request:
The default log file settings can be overridden by changing the Logfile Settings from within
a Backup Selection script's Backup Options page.
User Guide
CBMR in More Detail 145
To view a Log File, highlight the relevant logfile in the Log Files window and select View
Logfile from the Logfile top bar menu or
double click on the required logfile.
The logfile will be opened using the Windows Notepad application. If you require a
printed copy of the file, select the Print File... option from the File menu (in Notepad).
To delete a logfile,open the Logfiles tool and highlight the relevant logfile (single mouse
click). Then select Delete from the Logfile top bar menu. You are then prompted to
confirm the Delete action.
1. The first part is identified by a single entry named [Main] and contains the currently
defined default key. A default key is created at random when CBMR first creates the
Key Repository file.
2. The second part stores the currently available User defined keys. These keys are
created during the definition of a backup script, so this section is a placeholder for
the key. They are identified by entries like [REF.ScriptName] where ScriptName is the
user defined name of the script.
3. The final section contains a history of keys used for all encrypted backups made
since CBMR was installed. This includes both disaster recovery and non disaster
recovery backups. They are identified by entries of the form [VOL.MediaID] where
MediaID is a unique reference created when the backup is made and stored in the
volume header of the backup media.
The file is normally created in the CBMR installation folder by default, but may be re-
directed to another location via an entry KeyRepository = <New directory> in the section
[File Locations] of the cbm.ini file (itself located in the CBMR installation folder). In this
way the file could be located on a network share or a local USB disk for example.
One of the major benefits of this file is that during a backup restore operation, there is no
need for a user to remember what key or passphrase was used for a particular backup. If
a non-DR backup is being restored, the Key Repository file will normally be directly
available on the local system (unless relocated offline) and there is no need to prompt for
the passphrase or key. If restoring a DR backup, then the Key Repository file can be
supplied via a network share or a USB key for example. If the file is not available or no
matching backup entry is found, only then will CBMR need to prompt for the passphrase
or key.
Note: This file is retained even if CBMR is uninstalled. If you still have encrypted
backups this file will still be needed to decrypt those backups in the future if you ever
required to restore them. If you are confident that you do not require those backups or
they are not encrypted, then it is safe to manually delete this file after uninstall.
Note: passphrases are case sensitive. They should be made secure, eg a long
sentence or a long password. The minimum length is one character.
The default encryption key can be overridden at any time by selecting the Encryption tab
on the Default Settings menu option:
User Guide
CBMR in More Detail 147
This value will then be used for all subsequent encrypted backups where the default Key is
selected. If this default is changed, it is important to notify all other users that it has been
changed.
When restoring an encrypted backup, CBMR will use the following sequence to obtain the
correct encryption key:
The Key Repository file is searched to find a matching entry for the MediaID
(obtained from the media Volume header of the backup). If a matching entry is
found, the key is extracted and the backup restored with no user interaction
Note: if the key specified in the matching entry is found to be incorrect, processing
continues at the next step
If no matching entry is found for MediaID or an incorrect key is found, then a check
is made using the current default key. If the key is correct, the backup is restored
with no user interaction
If the default key is also incorrect, then the user is prompted for the passphrase or
key:
Enter the key or un-tick the Use Clear Key tick-box and enter the passphrase instead
During an encrypted DR backup restore, the user will be prompted for the location of the
Key Repository file, since it will not necessarily be located on the local system.
The Backup Status window keeps you informed about how the backup is progressing.
You will get a format warning message if the loaded tape has been recorded in a
different format from CBMR. You are prompted to overwrite the tape via a Yes/No?
prompt.
Select 'No' and the backup is aborted; select 'Yes' and the tape will be treated as a new
piece of media (a new media header is created and existing data overwritten).
Note: there is an Estimate Backup Size option in the Selections top bar menu which will
detail the size of the backup you have defined. This could be useful if you need to
know in advance how much capacity you require for this backup.
User Guide
CBMR in More Detail 149
This displays:
Execute Details - volume dataset name being recovered and the Backup Location
name
Media Details - shows the header information: Volume, Dataset and Drive
Current File - details of the file currently being written to the backup
Progress - a running count of files backed up, bytes done, time taken and backup rate
When the job is complete, a statistics window is displayed which gives you an immediate
report on the job.
The Detach button only appears on the Backup Status screen if the job has
been initiated from the scheduler. Pressing the Detach button causes the job to run as a
background process with no user console interaction.
If you want to attach to a job which is running in detached mode: run CBMR, open the
CBMR Backup Schedules tool, select the 'running job' and select Attach from the Jobs
top bar menu (or double click the 'running' job) to open the Backup Status window.
However, CBMR begins to process the first command it receives, which is Start, before it
receives and can process the Abort command. As as a result, the header details are
written before the operation stops. If the backup selections script requests overwrite
rather than append, then existing data will be overwritten.
Verify and/or Compare should be run after every backup to make sure that the tape is in
good condition, the read/write heads are clean and the data has been reliably
recorded.
Verify checks that the data can be read back from tape, it will not check the data for
accuracy.
Compare checks for data accuracy. The program performs a byte by byte comparison of
the backed up data on the tape with the source data on disk. For this reason it will take
User Guide
CBMR in More Detail 151
You are recommended to run both programs when you use CBMR for the first time, to
ensure that the software and the Backup Location storage devices are working correctly.
Verify
It is good sense to verify your data after a backup to ensure that it can be restored. Verify
checks the data for readability; it does not guarantee its accuracy. Verify should be run
after every backup to make sure that the tape is in good condition and the read/write
heads are clean.
1. When you first use CBMR to do a backup, to ensure that the software and the
Backup Locations are all working correctly
2. Periodically to ensure the continued accuracy of your backups
Compare
Compare is different from Verify in that it performs a byte by byte comparison of the
backed up data on the tape with the source data. For this reason, it will take
considerably longer to complete.
You are recommended to run Compare:
1. When you first use CBMR to do a backup, to ensure that the software and the
Backup Locations are all working correctly
2. Periodically to ensure the continued accuracy of your backups
5.3.8.1 Programs
The Restore, Verify and Compare programs can be run from the CBMR Tools drop-down
menu (click the Restore, Verify or Compare icon) or from the Locations top bar menu in
the Configuration Backup Locations option:
If running from the drop-down Tools menu, the first step is to choose whether to access
the data via the Backup Catalogue or directly via the Backup Location.
If you are checking the backup immediately after it has completed, then you will
probably access the data via the Backup Location. If you want to check an earlier
backup and you are not sure where the data is located, then using the Backup
Catalogue is the quickest option.
5.3.8.2 Dialogue
The Compare and Verify programs each present a similar screen display. The window
opens with the top level tape icon and first dataset displayed. The other screen features
are described below:
The Scan options are used to scan the tape and display each dataset in turn. Each time
you click on the Next button, the next dataset on the tape is displayed until no more
datasets are found. Alternatively, you can display the complete structure in one step by
selecting All.
You can confirm the tape that is loaded by checking the Media Header details. Highlight
the top level (root) tape icon and select the Show Details... button. Similarly, pressing the
Show Details... button when a dataset is selected will display the Dataset Header details.
You can also display Header details by double clicking on the root icon (Media Header) or
individual datasets (Dataset Header). Tag or untag files and directories as required.
To begin a Restore, Verify or Compare operation, click the appropriate button at the top
of the window.
CBMR displays a progress report and will warn you if any problems occur. The window title
reflects which program is running (Restore, Compare Status or Verify Status).
A Statistics window is displayed when the job is completed. This information is written to
the relevant log file (restore.log, compare.log or verify.log) if one has been requested.
User Guide
CBMR in More Detail 153
When a backup job is completed, a Statistics window is displayed which gives you an
immediate report on how many files have been backed up, skipped, errors encountered
(if any) and so on.
These statistics will be written to the relevant log file (provided a log file has been
requested in the Default Settings). For example, backup.log for a Backup job, restore.log
for a Restore job).
Also it is good sense to run restores periodically to check that data is being correctly
restored without errors. It is possible for hardware errors to occur which are not
immediately obvious but which may corrupt the data.
Restoring data means that files are written from the backup media to the disk.
The Restore Wizard can be run by selecting Restore from the Tools menu. This will
guide you through the restore process.
The media in a specific Backup Location can be browsed by highlighting it in the
Backup Locations Tool and selecting Restore / Compare / Verify. Data can then be
selected and restored
A Backup Catalogue Volume can be browsed by highlighting it in the Backup
Catalogue Tool and selecting Open from the top menu bar
This wizard is displayed when you select Restore, Compare or Verify from the Tools menu.
The options are the same in all three cases, but the action performed at the end of the
wizard differs. You have an opportunity on the final page to cancel or change the action
requested.
On this page, you choose whether to use the Backup Catalogue or the media currently in
User Guide
CBMR in More Detail 155
the default Backup Location to select the data to restore, compare or verify.
If the backup is encrypted and you choose 'I want to select the data to Restore directly
from the media in the default backup location' and then press Next>, you may see the
following dialogue:
This will only be displayed if a Key entry for the backup is not found in the Key Repository
file. In this case, enter the required passphrase or Key to recover the backup.
This screen will only appear if you have opted to use the Backup Catalogue to select the
data. Here, you select the Backup Catalogue volume that lists the data you wish to
restore, compare or verify.
This screen allows you to actually select the data you wish to restore, compare or verify. If
you are selecting your data directly from the media in the default Backup Location rather
than from the Backup Catalogue, then browsing the data can involve delays as the
media is read.
This screen will only appear if you have used the Restore directly from a Backup Location
to select the data to restore, compare or verify. Here you select the Backup Location on
which the required media is loaded.
User Guide
CBMR in More Detail 157
This page allows you to set various options regarding the data to restore. The options set
here are only applicable to restore operations and have no effect on compare or verify
operations.
Select the Restore Security Information option if you want to restore the security
information associated with the directory. If the option is not ticked, then only the data is
included.
Note: you must be logged on the computer as a user account with the appropriate
rights to restore security data.
Select the Restore the Registry option if you want to restore the Registry files. You must
reboot your system after restoring the registry files.
This page allows you to set the amount of logging information saved and the file it is
saved in.
5.4.1.7 Finished
This page is displayed once all the restore, compare or verify options have been set. You
have the option on this page to change your original decision on which action should be
performed. Pressing Finish will initiate the chosen action.
User Guide
CBMR in More Detail 159
Use the Backup Catalogue options to view the catalogue information and make your
selection.
Before the operation takes place, CBMR checks the Backup Location and the Media
Header selected from the Catalogue against the connected location and the loaded
media. If either items conflict, then an error message is displayed and you are prompted
to correct the situation.
For further details, please refer to the section on Restoring Registry Files.
The Backup Location browse screen will appear when you select Restore/Compare/Verify
on a Backup Location. You are able to select data to process directly from the media in
the specified location.
Note: operations available on this screen can take some time as the media will need
to be read.
Buttons are provided to begin a restore, compare or verify operation, and also to read
the next dataset and all datasets on the media.
The Locations menu provides options to set Restrictions on whether the selected data is
actually restored, compared or verified, to change Backup Location Default Settings and
to Close the location.
The Item menu (which is also available as a context menu) provides options to Tag or
Untag the selected item, view the Dataset Header for the selected dataset, view a
Selection List of the items selected from the current dataset, Redirect an item to a
different location from where it was originally backed up, view a Redirection List, and
view the Media Header for the media in the Backup Location.
The Sort menu is available when at least one item is highlighted in the file list view. It
enables the file list to be sorted in a variety of ways. The file list can also be sorted by
clicking on the list's column headers.
For reference, see also the Media Header and Dataset Header for Backup Catalogues
chapters in this document.
The title of this window depends on which program you have selected: Restore, Compare or Verify.
However, you are not bound by that selection and if you change your mind, for example you decide
to compare the data before you restore it, then you can run the Compare program from this window.
You can accept the default settings or you can specify different rules which will only apply to the
current job.
Note: any changes made here will not change the values defined in the Default
Settings property sheet.
Restore Options
User Guide
CBMR in More Detail 161
Existing Files - if any files being restored already exist on disk then you can direct CBMR to
respond in one of the following ways:
- Skip any file it encounters which already exists
- Ask whether it should overwrite or skip the file
- Overwrite the existing file with the file from the backup
Later Files - if any files being restored are found to be later versions than those already existing
on disk, then you can direct CBMR to respond in one of the following ways:
- Sk ip any file it encounters which are later versions
- Ask whether it should overwrite or skip the file
- Overwrite the file on disk with the later version from the backup
Read Only Files - if any read only files are being restored already exist on disk, then you can
direct CBMR to respond in one of the following ways:
- Sk ip any read file it encounters which already exists on disk
- Ask whether it should overwrite or skip the file
- Overwrite the file on disk with the file from the backup
Logfile Settings
Log files are a useful source of information and will list any error messages. Log file information can
be important if problems have occurred. The following options are available:
Name
- the default will be the log file of the selected operation (restore.log, compare.log or verify.log). If
you have decided to run a different program from the one selected in the Tools menu, for example
Compare instead of Restore, then you will have to overtype the default entry with the log file name
relevant to the operation
Mode - Overwrite/Append
- if Overwrite is set, then each time the log file is created it overwrites the existing one
- if Append is set, then each log file is appended to the previous one
Info Level - Full/Partial/Brief/None
- a Full logfile contains a list of all files, errors (if any) and statistics
- a Partial log file contains sub-directories, errors (if any) and statistics
- a Brief log file contains errors (if any) and statistics
- if None is selected, then no log file is created
Restore Registry
Select this option if you want to restore the Registry files. You must reboot your system after
restoring the registry files.
If you want to view which directories have been redirected and their destinations, then
select the Redirection List... option from the Item top bar menu.
You can direct other files (Add), change the destination (Modify) or remove an entry (
Delete).
Once you have instructed Restore what to restore and where to restore it to, press the
Restore button.
It is possible to compare restored files. Please note that if they have been redirected to a
different location from their source, then the path you enter for the compare must exactly
match the redirected path.
Once you have instructed Restore what to restore and where, press the Restore button.
It is very important that you make regular backups of the registry and understand how to
restore it should a disaster occur.
Important notes:
1. To backup or restore the registry you must be logged on to the system as a user with
Administrator Rights
User Guide
CBMR in More Detail 163
2. After restoring the registry, there are some files in the \pcbax\temp directory on the
system drive which will be locked and cannot be deleted. However, after the system is
rebooted the registry replacement takes effect and these files can be deleted. It is now
safe to delete all the files in the \pcbax\temp directory
3. If you do not specify the Restore Registry option, then none of the active registry files
will be restored and a 'File is locked' warning will be issued for each file. Enabling the
Restore Registry option informs CBMR to replace the existing registry files and causes it
to perform special processing on these files
4. A full backup of the system drive will also contain the registry files (assuming the user
had sufficient Rights for this). The important point here is that if you wish to restore an
entire system drive but do not want the registry to be restored, then this is possible by
tagging all files but not selecting the Restore Registry option. Likewise, if you do want
all files and the registry restored, tag all files and select the Restore Registry option -
there is no need to restore the registry dataset separately
5. The dataset containing the registry files is a standard dataset containing ordinary file
images. The registry is not backed up as any special data type. This is done to facilitate
disaster recovery operations and also to allow advanced users to be able to restore
individual user profiles
User Profiles
User profiles are automatically mapped to the registry when a user logs on to the system.
At this point, the file(s) that hold the user profile information are locked and become
unavailable for normal file backup. Active user profiles can only be accessed using the
registry API functions.
If this resource is selected, a separate dataset will be created containing all of the files
that comprise the registry. In addition, all user profiles are backed up into this dataset -
this includes both active and inactive profiles.
5.5.3 Restoring
Restoring the registry needs to be given careful consideration because any changes that
have been made since the registry was backed up will be lost. For example, any
application installed since the backup will no longer be known to the system.
If it is necessary to restore a registry, for example due to a registry corruption, the following
steps should be taken:
1. Tag all files in the registry dataset containing the most recent copy of the registry
2. Ensure that the Restore Registry option is checked in the Restore Options dialogue
(Restore Options button in the Restore window)
3. Start the Restore
4. When the restore has completed, the system MUST be rebooted to enable the
registry change to take effect
The reason for having a Restore Registry option that must be used in addition to selecting
the data, is to force a separate and specific request to restore the registry. This prevents
an accidental restore which is an irreversible process that may have severe
consequences.
The CBMR Scheduled Jobs tool does not require any complex command statements; the
property pages provide an easy to use interface enabling you to create new jobs and
add them to the jobs list, update jobs or remove out-of-date jobs.
CBMR uses the standard Task Scheduler service provided with Windows.
This provides flexible schedules to be set up (for instance 'every 10 minutes from 09:00 for 1
hour every Mon, Wed of every 2 weeks'). You can easily maintain a daily, weekly and
monthly backup routine by creating a job for each backup and adding it to the schedule
list.
You can use the same Backup Selection script or command file for several jobs, but each
must have different time/date parameters. CBMR will not allow two jobs of the same
specification to be created.
For additional information, please also see the System Dependent section for Schedulers in
this document.
The CBMR Scheduler tool allows you to manage scheduled jobs. Jobs are serviced by the
Windows Task Scheduler service.
The top bar Jobs menu contains all the scheduler related tasks such as creating a job,
modifying an existing job, putting a job on hold and attaching to a scheduled job.
User Guide
CBMR in More Detail 165
Similar to other windows, you can Sort the job list and change the View (large/small
icons, a list or details). The Details view allows you to monitor the state of jobs. It shows
you the most information about a job (status, run time and the Days/Date).
The icon representation will identify the status of a job. For example, a scheduled job will
have a plain clock icon, a running job will have a tick superimposed on the clock and a
job requiring user intervention will have a warning symbol superimposed.
The Schedule dialogue contains all the fields required to define a job to be scheduled to
run at a particular time. This window may contain an existing schedule with all the fields
defined, or if you have selected the <Create New Job> icon (or the Create New option in
the Jobs menu/context menu), the fields will be blank.
The Schedule dialogue contains a property sheet with three pages. The first page details
the job that will be run, the second page details the times that the job will be run and
the third page details various advanced settings, such as how long the job will be
allowed to run.
Then double click on the 'Create New Job' icon in the Scheduler tool or New Job from
the Jobs top bar menu.
<Create New>
The New Task wizard will be displayed. Enter the required details on each page of the
wizard. The new job will be added to the schedule list.
Enter a descriptive name for the job. This name will appear in the job list. Also specify the
name of a Backup Selection and the credentials to run the backup job.
5.6.2.2 Program
You can choose to run a job with a Backup Selection script file or a command file. CBMR
works quite happily with both, so it is a matter of what best suits your way of working.
Type the full path and script name or command file name.
If you are not sure what to enter in this field, use the Find... button to select a script or to
locate and specify a command file.
There are some benefits in using a command file. For example, you could include several
scripts which would run one after the other (as opposed to using the script file option
User Guide
CBMR in More Detail 167
Weekdays
Monday to Friday are ticked in the list
All days
Sunday through to Saturday is ticked
Weekly basis
a job can run on a weekly basis. For example, to run a job every Thursday, tick the
Thursday box, set the time option and set the Repeat option (box ticked).
Monthly basis
a job can be run on a monthly basis. For example, you could select Monday and Monthly
plus the Time setting and set the Repeat option (box ticked). This means that the job
would run on the first Monday of the month at the time set. (In actual fact the program
runs on the first Monday it encounters. So, if your machine was switched off over the first
two weeks of the month, the job would then run on the first Monday encountered after
you switch it back on.)
Defined date
a job can be set to run on a particular date. When the Date box is ticked press the Set...
button to display the calendar. Select the date you require, the current date is the
default. The arrows at the top of the calendar allow you to change Month and Year.
> changes the month forward >> changes the year forward
< changes the month backward << changes the year backward
If the Repeat box is checked when a Date is set, the date automatically increments to the
next day after the job has run.
The Time is set by selecting the up/down arrows next to the Hour and Minute boxes.
If the Repeat option is not checked for a particular job, then the job will disappear from
the scheduled jobs list after it has run.
Run Detached
You can run a job as a background process while you continue to work in other
applications. When the Run detached button is ticked, the job will run as a detached
process.
CBMR uses the Microsoft Windows Task Scheduler service to schedule unattended
backups. The Windows Task Scheduler service allows very flexible schedules to be created.
Creating a new schedule from the Scheduled Tasks tool or from the Backup Selection
Script Wizard will start the Scheduled Task Wizard.
The Scheduled Task Wizard will create a schedule within the Windows Task Scheduler
service to run a CBMR backup selections script or a command file. Note that this is entirely
independent of the CBMR Scheduler service.
User Guide
CBMR in More Detail 169
5.6.3.1 Task
The task page allows you to enter details of the command that will be executed.
The job title must be a unique string to identify the job. This will be used to create the job
file in Windows Task Scheduler.
The command can be an existing CBMR Backup Selection script, selected from the drop-
down list, or a command file with parameters. Note that if the Backup Selection Script
Wizard has started this Wizard automatically, the command fields will already be filled in
and cannot be changed. The actual command that will be run is displayed for
information purposes.
The Account Information defines the login details under which the command will be run.
The following two pages in the Wizard are provided by the Microsoft Windows Task
Scheduler service and provide help through tooltips. They allow you to specify dates,
times and frequencies at which the job will be run, and various restrictions concerning
power management and how long the task is allowed to execute.
5.6.3.2 Schedule
User Guide
CBMR in More Detail 171
5.6.3.3 Finished
The final page in the wizard summarises the command and the times at which it will be
run.
If you want to check on the progress of a scheduled job which is running, selecting the
Attach option from the Jobs top bar menu (or double clicking on the tape icon) will
open the Backup Status window.
Pressing the Detach button in the status window returns you to the Scheduler jobs
window.
You may need to hold back a routine backup, for example, people are working late and
you don't want the backup to run until everyone has finished with the system.
To put a job on hold:
The job(s) will not run until released. The icon representation will change to identify the
status of the job.
If a detailed view of the Scheduled Jobs tool is displayed (View / Details), you will see the
job status (Held, Waiting or Running).
To change an existing Scheduler job, click on the Configuration Backup Schedules drop-
down menu option.
Then open the job details by double clicking the relevant job or select Open from the
Jobs top bar menu.
You can then make the appropriate changes to the job details. Press OK to confirm your
changes.
Deleting a Job
To delete a scheduled job, select your chosen job from the scheduled jobs list.
Then select Delete Selected from the Jobs top bar menu. You are prompted to confirm
the delete action.
If you need to run an ad hoc job or test a job you have set up, then select the Run option
and the job will run straight away. This will not affect any time/date parameters that you
have already defined. If you have set the job to run nightly at 10 o'clock, it will still do so.
In order to release a Held job, select the job(s) that are on hold. Select Release\Selected
from the Jobs top bar menu. You can also apply 'Release' to all jobs by selecting
Release\All.
If you display the detailed view of the Scheduled Jobs tool (View\Details), you will be
able to view the status of each job in your queue (Held, Waiting or Running).
CBMR can schedule jobs to run with no user interaction. These jobs are configured to be
executed by a special type of program known as a service. The main reason for this is to
allow scheduled backups to run even when a user is not logged on to the system.
Windows services are a special class of program that are installed and controlled by the
Windows Service Manager. The Service Manager can be accessed from the control panel
allowing services to be started, stopped and also have their properties modified.
One of the most important points to remember is that services should not, and in most
User Guide
CBMR in More Detail 173
Microsoft Windows provides its own scheduling service, called the Windows Task
Scheduler. CBMR jobs can be configured to run under the control of the Windows Task
Scheduler. They require a Job Name option (/ts:JobName) where JobName is the name
of the Windows Task Scheduler job. Again, the CBMR program will automatically add this
parameter when scheduling a script.
The Windows Scheduled Task Service allows very flexible schedules to be created.
When running a batch file it is important to remember that if you want to attach to a
running job to interact with it or view the status, you will need to specify the /d option as
one of the parameters on the CBMR command line. You must specify the /ts:task.job
option where task.job should be replaced with the name of the Windows Task Scheduler
job.
For example, to run a Backup Selection script called weekly.scp the following batch file
could be used:
Note: if you do not specify the /d option (and, if using the Windows Task Scheduler, /ts:
option), or if you run a program other than pcbax.exe then you will not be able to
attach to the job to view the status. The scheduler will run the program and will
indicate that the program is waiting, running etc. from the job folder but attempting to
attach to the job will result in an error indicating that CBMR was unable to attach to the
job.
backup media, and you have instant access to the contents of the selected
volume
Using the Backup Catalogue enables you to view any volume (Volume top bar menu)
without having to connect a Backup Location or load the media. This can be a
considerable time saver if you are searching for a directory or files and you are not sure on
which volume they are stored (Search top bar menu), especially if you take into account
a large organisation where there may be a large number of volumes retained.
The View top bar menu provides different display options: Large/Small icons, a List or a
Detailed view. The Details View provides some extra information about the volume. It
details the volume name, the date/time created, the tape format type (currently SDB)
and an ID (this is a number assigned internally to the volume).
The Sort top bar menu allows you to arrange the catalogue entries in alphabetic
sequence (Sort by Name) or in date sequence (Sort by Date).
Note: in the Details view you can also click in the relevant column heading to sort the
entries in Name, Date or Time sequence.
The New option allows you to create a catalogue entry. For example, you may have
some backup volumes for which no catalogue entry was created at the time of the
backup. The Backup Catalogue appears on the main CBMR Tools menu option.
At this point you have not committed to a particular volume or Backup Location, you are
merely viewing the entries in the catalogue listing. Similar to other displays e.g. Backup
Location scripts, the view can be as an Icon or a detailed listing (View top bar menu). The
detail includes Volume name, date and time the backup was created and the format.
The Details display can be sorted by Name, Date and Time.
Each drive backed-up within a volume is known as a dataset. Details about the drive are
stored as a Dataset Header. Access to a dataset may be locked by a password.
The Media and Dataset headers can be viewed through the Backup Catalogue. The
amount of information about the files and directories stored within a dataset is defined
when the backup is made.
User Guide
CBMR in More Detail 175
Note: the Media Header is information written at the beginning of the media, eg.
Name, Date and Time created, whether the data is password protected. This
information may be useful at a much later date if you are trying to locate a backup.
Select the Media Header... option from the top bar Backup Catalogue Volume menu.
The Media Information window shows all the available information for the selected
volume:
Even if your volume is unnamed you will get other details, such as the date and time
created, which may give you a clue as to which volume you need. However, it is
recommended that all backups are given a meaningful name which provides an
indication to the contents.
Name User-defined
Comments User-defined
Media ID Set by system
Media Format
Time created Set by system
QFA Quick file access. Defined by user at backup.
Dependent on media
Write protected Defined by media
Datasets Number of datasets within volume
Bytes used Size of backup in bytes
Please also see the Media Header Overview section for additional details.
Note: Quick File Access (QFA) is a facility on some tape drives which enables rapid
access to files during Restore. The tape is divided into two areas: a catalogue area
and a data area. The catalogue area at the start of the volume stores directory
information which points to the data area where the actual data is stored. During
Restore the program locates the file entry in the catalogue and goes straight to the
correct point in the data section.
During backup, the directory catalogue is written first - therefore in a situation where a
backup extends over multiple tapes the first tape (containing the directory catalog) must
be used to start a Restore.
Name User-defined
Comments User-defined
Time created Set by system
Barcode (From barcode label on media)
Resource
Compression Defined by user at backup
Software version CBMR software version used to create it
Size Size of backup in bytes
Catalogue Info Set by user at backup
level
Backup Location Backup Location holding the backup datasets
User Guide
CBMR in More Detail 177
The Backup Catalogue browse window is shown when you open a Backup Catalogue
volume to select data to be restored, compared or verified. Buttons are provided to
begin a restore, compare or verify operation.
It is at this stage that the level of information which you defined at the Backup stage
becomes evident (Full, Partial, Brief or None). For example, if you specified 'Full' then
media and dataset headers, directory and file information will be available; if you
specified 'Partial' there will only be media and dataset headers and directory details. So, if
you select a dataset and get the message 'This dataset entry does not contain directory
information' it means that you have specified 'Brief' and only the Media and Dataset
headers are available.
If a password was entered when a dataset was created, you will be prompted to enter it
when you open the dataset. You must supply the correct password, you cannot over-ride
this prompt.
The Volume menu provides options to view the Media Header for the volume being
browsed, change the Info Level stored within the volume (this may require the media to
be queried), set Restrictions on whether the selected data is actually restored, compared
or verified, begin a Restore / Compare / Verify operation and Close the volume.
The Item menu (which is also available as a context menu) provides options to Tag or
Untag the selected item, view the Dataset Header for the selected dataset, view a
Selection List of the items selected from the current dataset, Redirect an item to a
different location from where it was originally backed up, view a Redirection List, and
view the Media Header for the current volume.
The Sort menu is available when at least one item is highlighted in the file list view. It
enables the file list to be sorted in a variety of ways. The file list can also be sorted by
clicking on the list's column headers.
The Current Info Level: tells you the information level of the selected volume (The 'Current
Info Level:' will be 'None' if you are creating a new entry).
If you want to down-grade the level of information, for example from 'Full Information' to
'Headers and Directories' or 'Headers Only', then just click on the required option. You
are given the opportunity to cancel the action.
However, if you are up-grading the information level, then you need the media loaded so
that the relevant information can be read from the media and written to the catalogue
entry. You will be prompted to select a Backup Location to use. When you select the
Backup Location storage device to use for this operation, CBMR checks the location,
compares the Media Header with the selected header in the catalogue entry and, if
correct, proceeds with the upgrade. You will be prompted to connect the correct
location or insert correct volume if either does not agree with your selection.
You can choose to store any one of three levels of information. The current level will be
'None' if this is a new volume or, if you are modifying a Catalogue entry, the existing level
will be quoted (which of course could also be 'None' if that is what is defined in the
backup selections script).
Headers Only
Volume and Dataset headers. This is a minimal level of information and takes up little
space
Full Information
All of the above, plus File information. This will be significantly larger than Brief or Partial
entries
Select the Delete Selected Volumes option from the top bar Backup Catalogue Volume
menu. You are given the opportunity to cancel the action or to continue. This is only
deleting a catalogue entry and has no bearing on the actual data.
Select the Backup Catalogue top bar Search option to display the search menu. You
have the option of searching All Volumes or Selected Volumes. You can make a multiple
selection by pressing the shift key while clicking on the each line in turn.
You must provide some parameters to direct the search; how specific you are refines or
widens the search field.
User Guide
CBMR in More Detail 179
If you do not supply a full path, then all occurrences of the search object will be listed in
time order with the most recent at the top of the list.
You can search for an individual file but obviously you must have the 'Full' level of
information on this volume, otherwise there will be no file details to search.
If you want to locate an individual file, you must enter the full file name, wildcards ( E.g.
*. doc, pcbax.* ) are not accepted.
You can initiate a Restore, Compare or Verify operation from the Backup Catalogue
Volume window by selecting Restore / Compare / Verify from the Volume top bar menu
or by pressing the appropriate button.
You can also select Restore, Compare or Verify from the CBMR Tools menu which will start
the Restore/Compare/Verify Wizard. This will give you the option of using the Backup
Catalogue or the Backup Location to select the data you are interested in.
You can search for an individual file but obviously you must have the 'Full' level of
information on this volume, otherwise there will be no file details to search. Wildcards ( E.
g. *. doc, pcbax.* ) are accepted.
If you do not supply a full path, then all occurrences of the search object will be listed in
time order, with the most recent at the top of the list.
This window displays information about the selected entry resulting from a search
operation. Details about the volume, the dataset and the specific entry are shown. This
information is a useful checking option before you actually restore the data.
This window displays the results of the Search operation. Select View Information from the
Options menu to display detailed information about the selected volume. When you
have found the data you want to restore, you can set the Restore program in action
For example, if you are upgrading the catalogue information level, then you need the
original data loaded so that the relevant information can be read from the media and
written to the catalogue entry. You are prompted to select :
Both the original Backup Location and the default location will be identified below the
relevant buttons. CBMR now checks the location, compares the media header with the
selected header in the catalogue entry and if correct proceeds with the upgrade. You will
be prompted to connect the correct location or insert the correct volume if either does
not agree with your selection.
If you want to use a location which is not listed, then you need to open the Backup
Location menu option and define its properties. See the chapter on Creating a New
Catalogue Volume for further details. The new location will be included in the list.
User Guide
CBMR in More Detail 181
The title of this window depends on which program you have selected: Restore, Compare or Verify.
However, you are not bound by that selection and if you change your mind, for example you decide
to compare the data before you restore it, then you can run the Compare program from this window.
You can accept the default settings or you can specify different rules which will only apply to the
current job.
Note: any changes made here will not change the values defined in the Default
Settings property sheet.
Restore Options
Existing Files - if any files being restored already exist on disk then you can direct CBMR to
respond in one of the following ways:
- Skip any file it encounters which already exists
- Ask whether it should overwrite or skip the file
- Overwrite the existing file with the file from the backup
Later Files - if any files being restored are found to be later versions than those already existing
on disk, then you can direct CBMR to respond in one of the following ways:
- Sk ip any file it encounters which are later versions
Read Only Files - if any read only files are being restored already exist on disk, then you can
direct CBMR to respond in one of the following ways:
- Sk ip any read file it encounters which already exists on disk
- Ask whether it should overwrite or skip the file
- Overwrite the file on disk with the file from the backup
Logfile Settings
Log files are a useful source of information and will list any error messages. Log file information can
be important if problems have occurred. The following options are available:
Name
- the default will be the log file of the selected operation (restore.log, compare.log or verify.log). If
you have decided to run a different program from the one selected in the Tools menu, for example
Compare instead of Restore, then you will have to overtype the default entry with the log file name
relevant to the operation
Mode - Overwrite/Append
- if Overwrite is set, then each time the log file is created it overwrites the existing one
- if Append is set, then each log file is appended to the previous one
Info Level - Full/Partial/Brief/None
- a Full logfile contains a list of all files, errors (if any) and statistics
- a Partial log file contains sub-directories, errors (if any) and statistics
- a Brief log file contains errors (if any) and statistics
- if None is selected, then no log file is created
Restore Registry
Select this option if you want to restore the Registry files. You must reboot your system after
restoring the registry files.
User Guide
CBMR in More Detail 183
failure, power failure (even minimal) or theft of equipment. If you consider the effect of
losing a complete weeks data, or even a day or two, then you can appreciate the
importance of backing up your data. Also, most companies are legally required to keep
data for a period of years and therefore an efficient archive and retrieval procedure
releases expensive hard disk space for working data.
The backup routine you employ depends on several factors: how often does the data
change, how valuable is the data (time and money invested in it), how much time can
be allotted to carrying out the backup. Remember that the scheduling option in CBMR
provides for unattended backups. There are several established backup strategies and
you can use the one which suits your working practices best or use one as a basis for
developing your own pattern.
Points to Consider:
Identify the backup needs of your company and create a suitable backup regime
Once established maintain the routine (Make use of the CBMR automated routines)
Identify the backups with meaningful titles so that you can restore your files quickly
and with the appropriate version of the data
Follow the maintenance procedures for your tapes and drive (tape storage, drive
head cleaning etc)
Store tapes in a secure location and maintain copies off-site in case of theft, fire or
flood damage
There are three typical Backup routines described here, but ultimately you need to
instigate a routine which best suits your company requirements.
For specialist advice on backup strategies and how best to secure your data, please
contact Cristie Software Limited.
On the first working day of the week, a complete backup of all files is carried out. On
subsequent days of the working week, newly-created files and modified files are backed
up.
This procedure is followed for three weeks. On the fourth week, the first weeks tapes are
re-used, then the second weeks and so on, in a continual cycle.
Reasonably small computer systems would allow the one full backup and four partial
backups to be stored on one volume, therefore only requiring three volumes.
This backup regime allows you to recover data from up to twelve weeks ago. This pattern
is more suitable for larger systems, systems where there are frequent file changes, or
systems which require a longer data history.
Again, depending on the amount of date to be backed up, this method can use as little
as ten volumes.
This is a comprehensive Backup cycle which will provide three years of data. A time span
of this nature must be considered where legal requirement calls for data to be kept for a
number of years, for example accounts information.
You now have substantial coverage should you need to recover data. There is data for
each individual day plus weekly and monthly and annual backups.
User Guide
CBMR in More Detail 185
Usage:
pcbax <script> <mode>[options] ....<script> (omit the .scp extension) is any Backup
Selection script contained in the \pcbax\scripts directory
pcbax /ds:n [options] .... restores all files in dataset n where n is the number of the
dataset. The first dataset is 0 and is the default if a number is not supplied. For example:
pcbax /ds:2 restores the files in the third dataset. This provides a quick way to restore all
the files within a dataset without needing to specify a Backup Selection script.
pcbax /cl:<media name> ....checks that the correct media is loaded in the Backup
Location.
pcbax /cw ........checks if the media is write protected.
pcbax [<script>] /cmh .....creates a new header.
pcbax /sms .......shows media status.
pcbax /smh .......shows media header
pcbax [<script>] /scan .......scan media into library
<Modes> are:
/b Backup
/r Restore
/c Compare
/v Verify
[options] are:
/sd: <device> Where device is the name of the Backup Location storage device you wish
to use to override the default location OR the location specified in the Backup Selections
script.
/ver:<date> The backup version as of <date> to use where <date> should be in the form
"DD/MM/YYYY-HH:MM:SS".
/h[s][q] Disables screen output except [s] - always show stats and [q] always show
questions. If questions arise and /h is in effect, a USER ABORT is assumed.
/s shows statistics during backup in place of file names.
/p:<media password> This password overrides any script specified password.
/unload Unloads media at end of operation.
/registry Replaces registry files if found during restore.
/erase Performs a security erase on the media.
/retension Performs a retension operation on the supported location/media.
/initialise Performs a partition operation on the supported location/media.
/ts:<ScheduleName> identifies the Windows Scheduler task. If CBMR is being run from the
Windows Scheduler, as opposed to the CBMRScheduler Service, then this parameter is
required to enable the CBMR graphical user interface to communicate with the
scheduled job while it is running. <ScheduleName> must be replaced with the exact
name of the Windows Scheduler job (including the .job extension).
/epass:<encryption passphrase> Specifies the encryption passphrase
/ekey:<encryption clear key> Specifies the encryption key
At the prompt, type: CBMRwin /? for a list of commands and description of usage.
At the prompt, type: CBMRcfg.exe /? for a list of commands and description of usage.
Usage:
CBMRCFG.EXE [options]
Options are:
User Guide
CBMR in More Detail 187
5.9.4.1 PCBAX.INI
This file contains the name of the default Backup Manager to connect to (currently this
can only be the local one). Also in this file are options to select the preferred user level (0
or 1) and options to disable any of the objects in the main container window.
5.9.4.2 CBM.INI
This file contains the default settings for the Backup Manager. These settings are
maintained by the CBMRWin.exe program. The settings in this file are used by the
CBMRWin.exe and pcbax.exe programs for Backup/Restore/Compare/Compare and
Verify operations.
5.9.4.3 USERSHAR.INI
This is an editable text file and is used to define user defined shares.
5.9.4.4 USERINFO.INI
This is an encrypted file containing user names and passwords.
5.9.4.5 DTEXC.INI
This is an editable text file which may be used to exclude any desktop resource by name.
5.9.4.6 KEYREPOSITORY.INI
This is a text file which contains encryption key information.Please do not edit!
Not all options are applicable to every Backup Location type - a message will be
displayed if you select an option which is not relevant to the connected location.
Select the Backup Locations option from the Configuration drop down menu option in
the CBMR main menu. Right-click on the Backup Location and select Media Utilities...
The utilities in this window allow you to carry out maintenance tasks on the media. The
utilities are divided into Non-Destructive and Destructive functions.
- The non-destructive functions do not have any affect on the data stored on the media
- The destructive functions will destroy any data currently stored on the media
The connected location is identified in the top left hand corner of the window.
Read Header CBMR scans the media and displays the header
information
Retension Removes any slackness in the tape by fast forwarding to
the end and rewinding back to the beginning
Unload Causes the media to be ejected when the backup is
complete. Only applies to 'soft load' locations
Destructive Functions
Create New Currently creates a new media header for the volume
Header currently loaded in the location. All existing data will be
lost
Security Erase Completely and irrevocably erase all data from the
tape
Initialise Initialise prompts for a new media header and, as far as
the software is concerned, this is now a new piece of
media.
User Guide
CBMR in More Detail 189
5.10.3 Retension
If it is new - this will ensure that any loose particles left from the manufacturing process
are dislodged
If it is left in storage for a period of time - when a tape is not used for a long time there is
the possibility of print-through, which means that the magnetic orientation of particles on
one layer of tape affect those on the adjacent layer. This can cause data corruption.
5.10.4 Unload
This option will eject the media from all 'soft load' Backup
Locations such as DAT drives.
This option will allow you to create a new media header for the
media currently loaded in the Backup Location. You can use this option to remove or
change a password protected backup.
You have the opportunity to Cancel this operation if you change your mind.
5.10.8 Initialise
This option only applies to DAT tapes. You will be advised of this
if you try to run it on other media types. When you initialise media, you are prompted to
enter a media header name and as far as the software is concerned this is now a new,
blank piece of media.
You can use the Initialise utility to re-use old media where the stored data is no longer
required.
This can be invoked by selecting the Media Utilities menu option for a Media Handler
device.
User Guide
CBMR in More Detail 191
The presence of a tape icon in the drive status indicates that there is a media in that
location.
The Media Handler/Robotics device must have been configured earlier, i.e. SCSI devices
are associated with its drives.
Importing Media
To import media to an empty slot or an empty drive, click an IO port slot using the left
mouse button and drag it to the desired drive, holding the left mouse button. The valid
locations which can accept a media will be highlighted automatically. Once you have
highlighted the desired drive or slot, release the left mouse button.
If there is already a media in the IO port it will be moved to the specified drive or slot. If
there is no media in the IO port, it will be extended and wait for a media to be placed.
The default timeout is 20 seconds. Once a media is placed, it will be moved to the
specified location. An inventory will be performed.
Exporting Media
Media from drives and slots can be exported by dragging them and dropping in one of
the IO ports. The IO port will be extended and wait for about 20 seconds. After that the IO
port will be retracted and an inventory will be done.
Inventory
User Guide
Support 193
6 Support
Click on the Help drop-down menu and select Support Details to display the contact
numbers for Cristie Software should you have any enquiries or need help with your CBMR
package.
The Support window lists the Technical Support contact telephone numbers for
Cristie Software Ltd.
If you have any queries or problems concerning your Cristie Bare Machine Recovery
product, please contact Cristie Technical Support. To assist us in helping with your enquiry,
make sure you have the following information available for the person dealing with your
call:
Knowledgebase kb.cristie.com
Forum forum.cristie.com
Email [email protected]
Web www.cristie.com
Support Hours
*Severity 1 issues are defined as: a production server failure, cannot perform recovery or
actual loss of data occurring.
**For details on dates of UK Bank Holidays, please see www.cristie.com/support/
Cristie Software Ltd. are continually expanding their product range in line with the latest
technologies. Please contact the Cristie Sales Office for the latest product range.
User Guide
Appendicies 195
7 Appendicies
However, it is important you keep a note of your Storage Pool disk configuration since this
will need to be manually re-configured during the recovery process. The Storage Pool
names, physical and virtual disks will be saved, but not the disk mapping. For example,
this is a typical Storage Pool configuration dialogue:
Note: nothing special needs to be done during the backup process as long as all the
virtual disks in the pools are backed up.
Storage Pools created on iSCSI disks and restored to the same disks will need to be
manually attached using the iSCSI initiator tool in the recovery environment before
beginning the recovery sequence.
Similarly Storage Pools created on USB disks and restored to the same disks must be
connected to the target host before booting the recovery environment.
Note: For a local USB disk to become part of a Storage Pool, it must be set to 'Not
Removable' in the Windows settings Device properties. Otherwise it will not be offered
as a candidate disk when setting up the pool.
If recovering a system with Storage Pools to a hypervisor or cloud, any source machine
iSCSI or USB disks can be emulated with virtual disks on the target.
Note: Only the WinPE5 DR environment supports the recovery of storage pools at the
moment.
User Guide
Appendicies 197
Note: This EFI BIOS conversion feature is only supported on compatible target
environments such as physical machines, VMware Workstation™ and VMware
vSphere™.
Prior to booting the new EFI clone target manual intervention will be required to
configure a new boot option. An example of this obtained from a VMware Workstation™
clone target is shown below. Other virtual environments will be similar.
User Guide
Appendicies 199
User Guide
Appendicies 201
This feature supports clone source systems with a split boot configuration (i.e. Boot and
System partitions on different disks or different Boot/System partitions on the same disk).
The split boot configuration will be replicated on the clone target subject to the GPT
conversion mentioned above.
This feature also supports source systems configured with a Windows dynamic boot
volume (e.g. a dynamic mirror).
It is also possible to clone an EFI based source system to a target configured with a
legacy BIOS. In this case any GPT based boot disks will be converted to legacy MBR disks
and the EFI partition removed.
8 Glossary of Terms
Adapter definition
An adapter is required to provide a connection between the computer and the device. This may be
the parallel adapter which normally connects the printer to the computer, in which case the printer is
attached to the back of the drive. Alternatively, the drive may be connected to an adapter card or
ASPI
Archive bit
The archive bit is automatically set by the operating system whenever a file is created or modified. If
the 'Reset Archive Bit' option is enabled then the flag is cleared when the file is backed up. It will be
set again by the operating system when the file is next modified.
ASPI
ASPI (Advanced SCSI Programming Interface) is a standard SCSI software interface linking
host adapters to SCSI device drivers. ASPI allows multiple devices to be connected to the
one host adapter. This keeps costs down and frees up internal slots.
CBMR
The Cristie Bare Machine Recovery product. Enables a disaster recovery of a system from a
special minimal backup in conjunction with a DR configuration file held within the
backup itself.
Compression
Almost all data exhibits redundancy in the form of repetition. Redundancy of this sort
when transferring data is purely wasteful. Data compression is a means of reducing this
waste.
Data compression allows the drive to store more data on the same length of tape. In
ideal conditions the ratio can be as much as 2:1 or higher.
Data compression also aids performance in that it allows the drive to match the
performance of higher transfer rate systems more closely.
Data compression can be performed in 2 ways.
Hardware compression is performed by the backup hardware. This takes the load off the
PC but still requires the whole uncompressed data to be transferred over the interface to
the backup location.
Software compression is performed by the PC before sending the data to the backup
location. This puts extra overhead on the PC in order to compress the data, but it
provides less data be transferred over the interface to the backup location.
Dataset header
Each drive backed up is contained in its own dataset on the backup media. The dataset
header is information written at the beginning of the backup.
Driver
A device driver is a program which allows a device to communicate with the operating
system. Each device must have the correct driver installed to allow the device to
operate.
User Guide
Glossary of Terms 203
Domains
In the Windows a domain is a collection of computers which share a common domain
database and security policy. The domain name is a unique name by which the domain
is known to the network.
DR (Disaster Recovery)
A reference to Disaster Recovery. Also considered to be an abbreviation for the Cristie
Disaster Recovery software.
Media header
Information written at the beginning of the media. E.g. Name, Date and Time created,
whether the data is password protected. This information may be useful at a much later
date if you are trying to locate a backup.
PC-BaX
The Backup and Recovery Software from Cristie, which forms the backup/restore engine
of CBMR.
QFA
Quick File Access (QFA) is a facility on some tape drives which enables rapid access to files
during Restore. The tape is divided into two areas: a catalogue area and a data area.
The catalogue area at the start of the volume stores directory information which points to
the data area where the actual data is stored. During Restore the program locates the
file entry in the catalog and goes straight to the correct point in the data section.
During backup, the directory catalogue is written first. Therefore in a situation where a
backup extends over multiple tapes, the first tape (containing the directory catalogue)
must be used to start a Restore.
SCSI ID
Each SCSI device on the chain must have a unique address which the system uses to
communicate with that device. The address is represented by the SCSI ID number. The
SCSI ID also determines priority when two or more devices attempt to use the bus at the
same time.