DLO AdminGuide 8.0
DLO AdminGuide 8.0
Option 7.0
TM
Administrators Guide
For Windows
Disclaimer
The information contained in this publication is subject to change without notice. Symantec Corporation makes no
warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability
and fitness for a particular purpose. Symantec Corporation shall not be liable for errors contained herein or for
incidental or consequential damages in connection with the furnishing, performance, or use of this manual.
Legal Notice
Copyright 2012 Symantec Corporation. All rights reserved.
Symantec and the Symantec Logo, NetBackup, Veritas, and LiveUpdate are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (Third Party Programs). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement accompanying the Software
does not alter any rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for
more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and
decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without
prior written authorization of Symantec Corporation and its licensors, if any.
THEDOCUMENTATIONISPROVIDEDAS ISANDALLEXPRESSORIMPLIEDCONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE
HELD TO BELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL OR
CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT
NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212
and subject to restricted rights as defined in FAR Section 52.227-19 Commercial Computer Software - Restricted
Rights and DFARS 227.7202, Rights in Commercial Computer Software or Commercial Computer Software
Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely
in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
www.symantec.com
Third-Party Copyrights
Douglas C. Schmidt and his research group at Washington University and University of California, IrvineCopyright
citation.
ACE (TM) is copyrighted by Douglas C. Schmidt and his research group at Washington University and University of
California, Irvine,
Copyright (c) 1993-2002, all rights reserved.
Maarten Hoeben
ReportCtrl.h 2.0.1
Ronald L. Rivest
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the RSA Data Security, Inc. MD5
Message-Digest Algorithm in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as derived from the
RSA Data Security, Inc.MD5 Message-Digest Algorithm in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the
suitability of this software for any particular purpose. It is provided as is without express or implied warranty of any
kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Wei Dai
Compilation Copyright (c) 1995-2003 by Wei Dai. All rights reserved.
This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any
particular file in the package.
The following files are copyrighted by their respective original authors, and their use is subject to additional licenses
included in these files.mars.cpp - Copyright 1998 Brian Gladman.
All other files in this compilation are placed in the public domain by Wei Dai and other contributors.
I would like to thank the following authors for placing their works into the public domain:
Joan Daemen - 3way.cpp
Leonard Janke - cast.cpp, seal.cpp
Steve Reid - cast.cpp
Phil Karn - des.cpp
Michael Paul Johnson - diamond.cpp
Andrew M. Kuchling - md2.cpp, md4.cpp
Colin Plumb - md5.cpp, md5mac.cpp
Seal Woods - rc6.cpp
Chris Morgan - rijndael.cpp
Paulo Baretto - rijndael.cpp, skipjack.cpp,
square.cpp
Richard De Moliner - safer.cpp
Matthew Skala - twofish.cpp
Permission to use, copy, modify, and distribute this compilation for any purpose, including commercial applications, is
hereby granted without fee, subject to the following restrictions:
1. Any copy or modification of this compilation in any form, except in object code form as part of an application
software, must include the above copyright notice and this license.
2. Users of this software agree that any modification or extension they provide to Wei Dai will be considered public
domain and not copyrighted unless it includes an explicit copyright notice.
3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free,
and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE
SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED AS IS WITHOUT EXPRESS OR IMPLIED WARRANTY
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER
CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
4. Users will not use Wei Dai or any other contributor's name in any publicity or advertising, without prior written
consent in each case.
5. Export of this software from the United States may require a specific license from the United States Government. It is
the responsibility of any person or organization contemplating export to obtain such a license before exporting.
6. Certain parts of this software may be protected by patents. It is the users' responsibility to obtain the appropriate
licenses before using those parts.
If this compilation is used in object code form in an application software, acknowledgement of the author is not required
but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but
would also be appreciated.
Stac Electronics
Copyright (C) Stac Electronics 1993, including one or more U.S. patents No. 4701745, 5016009, 5126739 and 5146221
and other pending patents.
Birdstep Technology, Inc.
Copyright (c) 2001 Birdstep Technology Inc. All rights reserved.
Contents
Chapter 1
Chapter 2
6 Contents
Contents
Specifying Files and Folders to Exclude from Delta File Transfer ............................................................ 103
Excluding Files that are Always Open ........................................................................................................... 104
Using DLO Macros to Define Global Excludes .............................................................................................. 104
Symantec DLO Firewall Ports ................................................................................................................................. 105
Special Considerations for Installing Symantec DLO to Remote Computers ......................................... 105
Chapter 3
8 Contents
Chapter 4
Chapter 5
Contents
Chapter 6
Troubleshooting
10 Contents
Remote DLO Agent and Push Install Maintenance Server ................................................................................. 245
Chapter 7
Accessibility
Chapter
DLO Database
Create profiles for groups of users or computers. Profiles enable you to control the desktop users level
of interaction with the Desktop Agent, define the types of files that can be backed up, set the schedule
for backups, and configure additional settings for the Desktop Agent.
Create network user data folders. Network user data folders are locations on the network where data
from protected desktops is stored.
Create Automated User Assignments. Automated User Assignments determine the Storage Location
and profile to which users are assigned when they install the Desktop Agent.
Note: Automated User Assignments are not used if users are manually added to DLO.
Add users manually to DLO. Instead of using Automated User Assignments, you can manually add
users to DLO and assign a profile and Storage Location to them. This is particularly useful when
network shares already exist for user data storage. Users can be added individually or multiple users
can be added at the same time by importing them from a list.
View history log files, receive alerts, and restore files to a desktop from the Administration Console.
The Desktop Agent resides on the desktops and laptops that you want to protect. The desktop users level of
interaction with the Desktop Agent can vary depending on how the Administrator has configured the
profile assigned to the user. The Desktop Agent may run in the background, automatically protecting files.
Alternatively, desktop users with full access to the Desktop Agent interface can schedule backups, select
which types of files to back up, restore files, synchronize file versions between different computers, and
view the status of their backups.
Related Topics:
Configuring DLO on page 57
About DLO Profiles on page 58
About Backup Selections on page 71
About DLO Storage Locations on page 87
About Automated User Assignments on page 93
Figure 1-1
13
See Push Install Desktop Agent and Push Install DLO Maintenance Server on page 26 for additional
information.
Symantec LiveUpdate
Symantec LiveUpdate will be used to deliver selected security patches from DLO 7.0 to the DLO
Administration Server.
See Updating Symantec DLO with LiveUpdate on page 28 for additional information.
Cluster Support
DLO supports MSCS Clustering of DLO Administration Servers providing failover capability.
See About Desktop and Laptop Option and Clusters on page 160 for additional information.
Localization Support
DLO 7.0 provides Localization Support to 11 languages, The following are the supported languages:
English, Japanese, Korean, German, French, Spanish and Italian, Portuguese, Russian Russia, Chinese
Simplified, and Chinese Traditional.
Note: NBU DLO 6.1 MP5, MP5A, MP6, and MP7 did not have Localization Support.
See TRANSFORMS should be set to one of the mst files, according to the language used by the desktop
user: on page 25 for additional information.
15
Table 1-1
Pre-installation considerations
Item
Description
The DLO Administration Server and DLO Storage Locations must be in a Windows Domain
or Active Directory. Computers running the Desktop Agent can be outside a Windows
Domain or Active Directory, but they must authenticate with the domain or directory to
access the DLO Administration Server or Storage Locations.
Server loading
DLO can be treated as a network file server. The ideal server for DLO has a fast network
connection and a fast set of disks. The CPU is not as critical as these other factors for the
DLO file server.
The number of Desktop Agents that can successfully back up to one DLO installation
depends on many factors. Multi-client testing of DLO has found that when there are more
than 400 clients concurrently attached to a DLO server running Windows 2000 Advanced
Server, file operations may begin to fail when Paged Pool memory runs out. For this
reason, it is not recommended to configure DLO to run more than 400 concurrent backups
of this size with Windows 2000. This limitation was not observed when running DLO with
Windows 2003 or later.
Table 1-1
Item
Description
Authentication
17
Table 1-1
Item
Description
Database selection
By default DLO installs its own instance of SQL Express 2005. DLO can also be manually
configured to use an existing SQL Express 2005, SQL Server 2008, SQL Server 2005, or
MSDE 2000 instance.
Note: If you use an existing database instance, named pipes must be enabled. If DLO
installs its own SQL Express instance, named pipes will be enabled automatically.
The following are pros and cons for these server options:
SQL Express 2005
Pros
Free
Unless you back up more than 1000 Desktop Agents per DLO Administration Server,
SQL Express should be sufficient for most needs
Cons
The database is limited to a single processor, resulting in slower I/O to the database
under load
4 GB table size maximum for SQL Express, although DLO is unlikely to reach this
limit
SQL Server
Pros
Cons
Cost, however you do not need to purchase a SQL Server client license for each
Desktop Agent
MSDE
Pros
Free
Unless you back up more than 1000 Desktop Agents per DLO Administration Server,
MSDE should be sufficient for most needs
Cons
Time synchronization
2 GB table size maximum for MSDE, although DLO is unlikely to reach this limit
All computers running the DLO Administration Console or the Desktop Agent should be
set to a common time. This can be accomplished by configuring the Windows Time
Synchronization service on the network. See www.microsoft.com for additional
information.
Table 1-1
Item
Description
Firewalls
MDAC support for the DLO supports versions 2.7 and 2.8 of MDAC, however MDAC 2.8 is the default and is
DLO Administration
installed during the installation if it is not already installed. When MDAC 2.8 is installed, a
Console
restart may be required, and a computer administrator must complete the installation
process. If a non-administrator logs on first after the MDAC 2.8 installation, the process
generates a number of errors. To avoid these errors when MDAC 2.7 is already installed, or
if you do not want to install MDAC 2.8, you can force the use of MDAC 2.7 by modifying the
CmdLine value in the setup.ini file in the DLO installation set by adding
REQUIREDMDACVERSION=2.7.
Example:
CmdLine=REQUIREDMDACVERSION=2.7 /l*v %TEMP%\DLOConsoleInstall.log
MDAC support for the The Desktop Agent supports versions 2.7 and 2.8 of MDAC, however MDAC 2.8 is the
Desktop Agent
default and is installed during the Desktop Agent installation if it is not already installed.
When MDAC 2.8 is installed, a restart may be required, and a computer administrator
must complete the installation process. If a non-administrator logs on first after the
MDAC 2.8 installation, the process generates a number of errors. To avoid these errors
when MDAC 2.7 is already installed, you can force the use of MDAC 2.7 by modifying the
CmdLine value in the setup.ini file in the Desktop Agent installation set by adding
REQUIREDMDACVERSION=2.7.
Example:
CmdLine=/qf DEFAULTMEDIASERVER=SERVERNAME DLODBINSTANCENAME=DLO
LAUNCHCLIENT=1 REQUIREDMDACVERSION=2.7 /l*v
%TEMP%\DLOAgentInstall.log
19
Item
Description
Operating system
Internet browser
Processor
Pentium system
Memory
Disk space
Other hardware
CD-ROM drive
Mouse (recommended)
Note: Windows Domains and Active Directory are supported. Other authentication schemes, such as Novell
E-Directory and NIS+, are not supported.
For information about system requirements for the Desktop Agent, see System Requirements for the
Desktop Agent on page 195.
Click Next.
Read the license agreement, and if you accept the terms, select I accept the terms in the license
agreement.
Click Next.
Complete: Installs the DLO Administration Console, Administration Server and Maintenance
Server. This is the most common selection.Click Next.
Console: Installs only the DLO Administration Console. This selection is typically used to install
an additional console on a separate computer.
Maintenance Server: Installs only the DLO maintenance server. The maintenance server supports
delta file transmission and storage. For additional information, see Using Delta File Transfer on
page 82.
If you want to install to a different directory, click Change, select the new directory, and click OK.
Click Next.
Click Next.
21
Remote DB Install
11 Click Next.
12 Enter account credentials, which will be used to create DLO Storage Locations and network user data
folders. This should be a domain account that has local administrator rights on any computers where
backup data is to be stored.
13 Click Next.
14 Click Install to begin the installation.
15 When the installation is complete, click Finish.
Deployment
Method
Description
Send a hypertext link to the install files or include the install files
as an attachment.
Web page
Logon scripts
Microsoft Systems
Management Server
(SMS)
CD-ROM
Related Topics
Installing the Desktop Agent on page 196.
23
In the Desktop Agent setup directory, open the SETUP.INI file for editing.
Modify the value that begins CmdLine= /qf. The following options are available.
Desktop Agent
installation interface
Modify the /qf term to change the interface that the Desktop Agent user sees
during installation of the Desktop Agent.
/qf
The full user interface is displaced, and a cancel button is provided.
/qb
A basic progress dialog is displayed and the cancel button is enabled.
/qb!
A basic user interface displayed. There is no cancel button.
/qn
The installation will be silent installation.
Note: For a completely silent install, you must run the setup.exe /s after
modifying the SETUP.INI file.
Launch the Desktop Agent The LAUNCHCLIENT option specifies whether or not the Desktop Agent should be
launched immediately following installation.
To launch immediately, set LAUNCHCLIENT=1
To prevent immediate launch, set LAUNCHCLIENT=0
Specify the Required
MDAC Version
DLO uses MDAC 2.8 by default. Force the use of MDAC 2.7 by adding the following:
Suppress Reboot
REQUIREDMDACVERSION=2.7
REBOOT=ReallySuppress
Logging Options
Examples:
For a silent installation, edit CmdLine in the SETUP.INI file as follows:
Original:
CmdLine=/qf DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v
%TEMP%\DLOAgentInstall.log
Modified:
CmdLine=/qn DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v
%TEMP%\DLOAgentInstall.log
For an installation with a basic interface but no option to cancel the installation, edit CmdLine in the
SETUP.INI file as follows:
Original:
CmdLine=/qf DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v
%TEMP%\DLOAgentInstall.log
Modified:
CmdLine=/qb! DEFAULTMEDIASERVER=Desktop3 LAUNCHCLIENT=1 /l*v
%TEMP%\DLOAgentInstall.log
*.mst
*.cab
DLOBuildInfo.ini
*.msi
Run the msiexec command using, as a base, the value in setup.ini from the cmdline key:
/qf DEFAULTMEDIASERVER=<From setup.INI File>
DLODBINSTANCENAME=<FromSetup.INI File> LAUNCHCLIENT=1
REQUIREDMDACVERSION=2.8 TRANSFORMS=1033.mst /l*v
%TEMP%\DLOAgentInstall.log
The following are the default values.
DEFAULTMEDIASERVER
DLODBINSTANCENAME
LAUNCHCLIENT
REQUIREDMDACVERSION
2.8
25
TRANSFORMS
1033.mst
TRANSFORMS should be set to one of the mst files, according to the language used by the desktop user:
1031.mst = German
1033.mst = English
1034.mst = Spanish
1036.mst = French
1040.mst = Italian
1041.mst = Japanese
1042.mst = Korean
2052.mst = Chinese (PRC) (Simplified)
1028.mst = Chinese (Traditional)
1046.mst = Portuguese Brazilian
1049.mst = Russian (Russia)
The specification of the TRANSFORMS property is required, and will affect the installer user interface
and the start menu shortcuts. The DLO Agent is installed with support for all eleven languages,
regardless of the transform chosen.
MSI 3.1 is required on the target systems. The MSI 3.1 installer is included in the following file:
\\<servername>\DLOAgent\WindowsInstaller-KB893803-v2-x86.exe
Push Install Desktop Agent and Push Install DLO Maintenance Server
This section provides information about push install Desktop Agent and push install DLO Maintenance
Server.
Prerequisites
To push-install DLO Desktop Agent to a computer that runs Symantec Endpoint Protection (SEP) version
11.0 or later, you must configure SEP to share files and printers. The file and printer sharing feature is
turned off by default.
You can install the following options from the administrator server to the remote computers:
Note: You can either push-install multiple Desktop Agents or Maintenance Servers at a time, but you
cannot combine both the options.
Push Install Desktop Agent and Push Install DLO Maintenance Server
To push install Desktop Agent and push install DLO Maintenance Server on remote computers
1
On Tools, select Install Agents and maintenance services on remote computers and click Next.
On Install Agent/Maintenance Server to Remote Computers > Select Component to select any of the
following components:
Agent - To push-install the Desktop Agent from administration server to remote computers.
Maintenance - To push-install the DLO Maintenance Server from the administration server to
remote computers.
Click Add.
Name/IP Address: Enter the computer name or IP address of the remote computer.
Browse: Click Browse. In Select Computer, choose the required remote computer and click OK.
The Name/IP Address and Domain Name is updated. Also, Remote Computer Logon Credentials
is displayed with the selected computer name and domain name.
Click OK.
27
User Name: Enter the user name for an account that has administrator rights on the remote
computer.
Password: Enter the password for an account that has administrator rights on the remote
computer.
Domain Name: The domain name is displayed based on the domain name you have entered in
Manual Entry of Remote Computer Name.
Use this user name and password when attempting to connect to additional computers during
the installation: Select this option if you want to use the same user name and password during the
next installation. By default, this option is not selected.
Repeat steps 4 to 6 for every remote computer for which you want to push-install the options.
You can also import the list of IP addresses of remote computers. To import the list, do the following:
Select the specific .txt file that contains all the IP addresses of remote computers.
Note: To generate a .txt file that contains the list of DLO Agent machines, run the
DLOCommandu.exe -ListMachines command. For additional information, see -ListMachines
command on page 188.
Click Add List. The IP address or the computer name is displayed in the Computer panel.
Click the computer name or IP address and enter the details in these fields:
User Name: Enter the user name for an account that has the administrator rights on the
remote computer.
Password: Enter the password for an account that has the administrator rights on the remote
computer.
Domain Name: Enter the same domain name that you had entered in Manual Entry of
Remote Computer Name.
Click OK.
10 Click Install.
Based on the component (DLO Agent or DLO Maintenance) you have selected, the remote DLO Agent or
maintenance server is added.
11 Click Finish to exit the wizard.
To remove the remote DLO Agent or the maintenance server from the list
1
Click Remove.
A Confirmation Window stating that Do you want to Delete: <Component> is displayed.
Note: <Component> indicates that it can be either Remote DLO Agent or Maintenance Server,
depending on the component you want to delete.
Click Yes.
29
definition updates from an internal server rather than going to the Symantec LiveUpdate server over the
Internet.
Go to ftp://ftp.symantec.com/public/english_us_canada/liveupdate/luadmin.pdf.
Click Start to apply the updates, upgrades, and new versions of Symantec DLO
Click Cancel to decline the updates, upgrades, and new versions of Symantec DLO
Related Topics
Checking Data Integrity on page 30
-SetRecoveryPwd command on page 176
-EmergencyRestore command on page 176
From the Tools menu, select Wizards and then Data Integrity Scanner.
Click Next.
If you want to set advanced options, click Advanced Options. Select the appropriate options and click
OK.
Permanently remove previously
quarantined data
Select this check box to quarantine all files with outdated keys.
If this option is not checked, data is scanned without being
quarantined. After data is quarantined, the Desktop Agent
backs up a new version of the file with the correct encryption
key.
Verbose output
Click Start.
Click Next.
Click Finish.
Related Topics
Setting a Recovery Password on page 29
-SetRecoveryPwd command on page 176
-EmergencyRestore command on page 176
31
User name
Domain name
Password
Confirm password
allows additional users to use the DLO console without adding them to the administrators group on the
administration server.
DLO administrator accounts can be managed in one of two ways:
Limited Restore
The purpose of the limited restore feature is to prevent restoration of data to an alternate location by
unauthorized users. By default, DLO administrators cannot restore a desktop users files to an alternate
location, providing an additional level of data security. A DLO administrator can be granted full restore
privileges, which allows the administrator to restore data to an alternate location. When a DLO
administrator has limited restoration rights, there may be other administrative functions that they are not
able to perform.
33
Click Permissions.
Ensure that the Use domain groups to manage access to network user data folders option is not
selected.
Note: When the Use domain groups to manage access to network user data folders option is selected,
domain groups are listed on the Administrator Account Management dialog. When this box is not
selected, individual user accounts are once again listed. If you change from one type of account
management to another, the previous settings are retained for future use. For example, if you have a
list of individual DLO administrators and then change your configuration to use domain groups
instead, the list of individual accounts is saved and will once again be used if the Use domain groups to
manage access to network user data folders option is not selected.
Click OK.
Click Add to add a new DLO administrator account. Continue with step 6.
Click Edit to modify an existing DLO administrator account. Continue with step 6.
Click Remove to delete an existing DLO administrator account. Continue with step 7.
Description
Notes
Click OK twice.
administrative access is to use domain groups to specify who has rights to administer DLO. Two groups can
be specified. The first group is granted full restore privileges. The second group has limited restore
privileges as discussed in About Administrator Accounts on page 31.
Alternatively, DLO can be configured to use a list of accounts for permissions management. See Creating
and Configuring Individual Accounts to Manage DLO Permissions on page 32 for additional information.
To configure DLO to use domain groups for permissions management
1
On the DLO Administration Console Network menu, select Administrator Accounts to open the
Administrator Account Management dialog.
Click Permissions.
Select the Use domain groups to manage access to network user data folders option.
Note: When the Use domain groups to manage access to network user data folders option is selected,
domain groups are listed on the Administrator Account Management dialog. When this box is not
selected, individual user accounts are once again listed. If you change from one type of account
management to another, the previous settings are retained for future use. For example, if you have a
list of individual DLO administrators and then you change your configuration to use domain groups
instead, the list of individual accounts is saved and will once again be used if the Use domain groups to
manage access to network user data folders option is not selected.
Click OK twice.
35
You can change default settings for profiles, backup selections, and Global Settings.
Note: Changes to Global Settings take place immediately and apply globally to all Desktop Agents. Changes
to the default profile and backup selection settings apply only to new profiles and backup selections and do
not affect those that already exist.
In the Properties pane, under New Profile Defaults, click User Settings.
Set the profile user settings options as explained in Profile User Settings tab options on page 63.
Set the profile schedule options as explained in Profile Schedule tab options on page 66.
10 Set the profile options as explained in Additional Profile tab options on page 67.
Under New Backup Selection Defaults in the Properties pane, click Revisions and set backup selection
revision options as described in Backup Selection Revision Control tab options on page 77.
In the Properties pane under New Backup Selection Defaults, click Options.
Table 1-4
Item
Description
Disable
All Desktop Agents
Select this box to prevent all Desktop Agents from backing up.
Select this box to prevent the incremental backup of Lotus Notes files for
all users.
See Backing up Lotus Notes NSF Files Incrementally on page 214 for
additional information.
Reports
Generate reports in PDF
Select this option to display reports in PDF if the Adobe Acrobat Reader
is installed. If the reader is not installed, reports are displayed in HTML
format.
Other
Time to delay Desktop Agent startup
after user logs in
Select this option and enter the number of seconds to delay the start of
the Desktop Agent after the user logs in. The Desktop Agent start is only
delayed if this option is selected and the Desktop Agent is started from
the startup menu.
37
Table 1-4
Item
Description
Enter a percentage of available disk space. When there is less than this
percentage of disk space available on the desktop agent, a warning is
issued.
The default value is 5%.
Enter a percentage of the desktop user data folder storage limit. This is
the maximum amount of disk space that DLO can use to store backup
data on the desktop computer.
If the available percentage of allocated disk space drops below this level,
a warning is generated. The default value is 10%.
For example, if the desktop user data folder is limited to 30 MB and the
low quota warning threshold is set at 10%, a warning is generated when
less than 3MB are available on the desktop agent.
In the Properties pane under Global Settings, click Desktop Agent Intervals.
Set the Desktop Agent interval defaults. Table 1-5 describes the options.
Table 1-5
Option
Description
Enter the number of minutes DLO waits before it retries the backup of
previously busy file.
If the wait time is reduced, Desktop Agent computers spend more CPU
time and disk I/O trying to backup files if they are busy. If the time is set
higher, files are backed up less frequently. The recommended default is 5
minutes.
Table 1-5
Option
Description
Enter the number of minutes to wait before retrying the backup of a file
that previously failed to back up.
If the wait time is reduced, Desktop Agent computers spend more CPU
time and disk I/O trying to backup files that previously failed to back up.
If the time is set higher, files are backed up less frequently. The
recommended default is 60 minutes.
How long to retain backups of files that Enter the number of days to retain backups of files that have been
removed from backup selections.
have been removed from backup
selections
Increasing the retention time causes the files to be left on the server for
a longer time after they have been removed from the backup selection.
Setting a shorter retention time provides more space in the backup
folders, but reduces the time during which users can restore files that
have been removed from the backup selections. The recommended
default is 30 days.
Minimum time between history
updates
Minimum time between postings of the Enter the number of hours to wait between postings of the same alert.
same alert
When there is a recurring alert, it shows up only once during the
specified time interval. If the time is set too low, the alert log can fill up
with multiple postings of the same alert. The recommended default is 24
hours.
Minimum time between closing a job
log and starting a new one
Enter the number of minutes to wait between closing a job log and
starting a new one.
When the time between job logs is reduced, more job logs appear. The
recommended default is 30 minutes.
39
Table 1-5
Option
Description
Enter the number of minutes between checks for changes to Lotus Notes
files.
A lower time results in more CPU time and disk I/O is used to determine
if Lotus Notes files have changed. The recommended default is 30
seconds.
Enter the number of minutes during which the Desktop Agents will
randomly respond to restart requests.
When a large number of Desktop Agents are restarted, for example when
network user data folders are moved, the Desktop Agents are restarted
randomly over a specified period of time. This prevents the potential for
overloading DLO by starting a large number of Desktop Agents at the
same time.
The recommended default is 30 minutes.
In the Properties pane under Global Settings, click User Activity Settings.
Frequency
Interval
Once
Daily
Weekly
Monthly
Select a unique port number for the DLO database and then use svrnetcn.exe to set the new port
number.
On computers that run the DLO Administration Console from outside the firewall, create the following
registry key as a DWORD value if it does not exist and set the DBUseTCP flag to 1:
HKLM\Software\Symantec\Symantec DLO\AdminConsole\DBUseTCP
On computers that run the Desktop Agent from outside the firewall, create the following registry key as
a DWORD value if it does not exist and set the DBUseTCP flag to 1:
HKCU\Software\Symantec\Symantec DLO\Client\DBUseTCP or
HKLM\Software\Symantec\Symantec DLO\Client\DBUseTCP
Set the DBTcpPort on the computers modified in steps 2 and 3 to the port number you set in step 1.
41
Updating DLO
Updating DLO
Updates to DLO are periodically provided by Symantec as website downloads or on CD. Updates to the
Desktop Agent install set are included, although the Desktop Agent updates are not automatically installed.
Symantec LiveUpdate will be used to deliver selected security patches to the DLO Administration Server
and Desktop Agents.
Install the DLO Administration Console as directed in Installing the Symantec Desktop and Laptop
Option on page 20.
Start the DLO Administration Console and set a recovery password using the Recovery Password
Wizard, which automatically starts the first time DLO is opened after installation. For more
information on the Recovery Password Wizard, see Setting a Recovery Password on page 29.
If you are updating from DLO version 5.0, run the Data Integrity Scanner to detect DLO backup files
that are no longer being used, verify that all data is encrypted with the most recent user key, and ensure
that all data has the correct recovery key for emergency restoration. See Checking Data Integrity on
page 30 for additional information.
Update the Desktop Agent using the Install Agents and Maintenance Services on Remote Computers
option on the DLO Administration Console. See Push Install Desktop Agent and Push Install DLO
Maintenance Server on page 26 for additional information.
Note: Command line option does not work for Windows Vista and later. In this case, you can use either the
first or second option.
Updating DLO
From the command line on the DLO Administration Server, change to the DLO installation directory.
Default installation directory:
Example
Run DLOCommandu.exe with the update option to add the configuration file and make note of the ID
number returned when this command is run:
DLOCommandu -update -add -f DLOAgent\update_7.0\DLOAgentUpdate_NBU.ini
Note: If the configuration file has been moved or renamed, you will need to specify the full path and file
name in the command above.
Sample output:
ID=3
Name=7.0 Update
Updates Symantec DLO Desktop Agent to 7.0
Version=7.0
PromptUser=Yes
ExitAfterLaunch=No
Build=7.00.25a
srcPath=\\a2symms14907\DLOAgent\update_7.0
cmdName=AutomatedAgentUpgrade.exe
cmdArgs=
cmdPath=%DOWNLOADDIR%
Run DLOCommandu.exe with the publish command to make the update available to Desktop Agent
users.
DLOCommandu -update -publish -UI y -U UserName
DLOCommandu -update -publish -UI y -P ProfileName
The y indicates the ID number returned when the add command was run in step 3. Using an
asterisk in place of UserName or ProfileName will publish the update to all users.
When this command is executed, it will return a list of all users targeted for update. Users will be
updated the next time the Desktop Agent application is started.
43
Updating DLO
Note: For more information on the -update command and additional command options, see -Update
command on page 174.
Related Topics
DLO Command Line Interface Management Tools on page 164
From the Desktop Agent upgrade folder, open the DLOAgnetUpdate_NBU.ini file for editing.
Set PromptUser=0.
Run the upgrade using one of the methods described in Updating the Desktop Agent on page 41.
A DLO Client (Remove NBUP).VPK file that contains instructions and an executable to upgrade the
system to DLO Tasks bar and remove NBUP at the same time
A DLO Client (Leave NBUP).VPK file that contains instructions and an executable to upgrade the system
to DLO and leave NBUP installed but increment the version number so that it appears NBUP was
upgraded
Updating DLO
On the main menu, select Help > About Symantec Desktop and Laptop Option.
Click Change.
Option 2:
1
Click Change.
Contact Technical Support to receive the NBUP to Desktop Agent upgrade. The two files that you need
are DLOAgent_LeaveNBP.vpk and DLOAgent_RemoveNBP.vpk.
From the NBUP server, or any computer with the NBUP console installed, launch the appropriate file;
DLOAgent_LeaveNBP.vpk or DLOAgent_RemoveNBP.vpk. This will upload the upgrade package to
the NBUP server. Repeat this process for the other vpk file to make both the leave and remove NBUP
options available for selection in various profiles.
Copy the entire contents of the DLOAgent share on the DLO Administration Server into the DLOAgent
folder on the NBUP server.
45
Updating DLO
Open the profile properties and select the Upgrades tab. Select the appropriate upgrade (leave
NetBackup Professional or remove NetBackup Professional) and enable it by selecting the Enable this
upgrade check box. Select the other options you want for this upgrade.
Repeat the steps through step 6 for each NBUP Profile you want to upgrade to DLO.
Follow the standard procedure for upgrading NBUP (Check for upgrade now in the console or refresh
the client). See the NetBackup Professional Administrators Guide for additional information.
If the Desktop Agent installation is successful, the NBUP version number in the NBUP administration
console will change to 9.1.0.0 for computers that still have NetBackup Professional installed or 0.0.0.1
for computers on which NetBackup Professional was removed.
Before uninstalling the older version of DLO Database component on the database machine, ensure
that the correct version of the new utility DLODBRegcreateU.exe (available in x86/x64 version) is
executed. The DLODBRegcreateU.exe creates a registry key-value (string)
HKLM\Software\Symantec\Symantec DLO\DB\OldDLODBPath
Note: You must have administrator privileges to run the DLODBRegcreateU.exe utility.
Next, uninstall the existing DLO Administration Server and the DLO Database component.
Upgrade to Symantec DLO by using the Remote DLO Database Installation option, during installation.
Run the DLO 7.0 setup.exe on the BE-DLO installed machine to start the installation wizard.
Figure 1-2
2
Installation wizard
When the migration is complete, cleanup of BE-DLO will start. Click OK.
47
Figure 1-3
3
Figure 1-4
4
Cleanup message
Cleanup in progress
When the cleanup of BE-DLO is complete, launch the Symantec DLO Administration Console.
When the Symantec DLO Administration Server migration completes, check whether all the data that was
created before migration is retained after migration.
Figure 1-5
Option 2:
Using the remote desktop connection, access the remote machine where DLO Agent is installed. Run the
setup.exe that is within the DLO Agent folder.
C:\Program Files\Symantec\Symantec DLO\DLO Agent\setup.exe
Note: If BE-DLO Agent does not respond to the profile changes when it is not yet migrated to Symantec DLO
version of Agent, then update BE-DLO Agent to Symantec DLO Agent.
To migrate BE-DLO Agent to Symantec DLO Agent through the DLOcommandu.exe CLI options, run the
following commands in the same order:
Run DLOcommandu.exe -ChangeDB. See -ChangeDB command on page 168.
Run DLOcommandu.exe -Update -add. See -Update command on page 174.
Run DLOcommandu.ext -Update -publish. See -Update command on page 174.
49
Run the DLO 7.0 setup.exe on the BE-DLO installed machine to start the installation wizard.
When prompted to select the database, select the Remote DLO Database Installation option.
Enter the IP address or the host name of the machine where BE-DLO Database is installed.
Figure 1-6
Note: This machine should have been selected as the remote database (DB) even while installing BE.
Otherwise, this migration process will fail.
4
When the cleanup of BE-DLO completes, launch the Symantec DLO Administration Console.
When the Symantec DLO Administration Server migration completes, check whether all the data that was
created before migration is retained after migration.
Note: Ensure that you complete this process, otherwise Symantec DLO installation will fail, and the
following error message is displayed: Symantec DLO cannot be installed on the same machine as the
Backup Exec DLO Console is clustered.
2
During unclustering, ensure that you select the database to overwrite the data that was stored in the
original install path (default - C:\Program Files\Symantec\Backup Exec\Data) with the data
from the shared disk location (where DLO Database files are hosted.)
Note: Also, while unclustering BE-DLO by using the wizard, two pop-up dialogs appear:
To confirm if the data from the shared disk should be removed
To confirm if the data should be available to the local node
Click Yes in both the cases.
This will ensure that the database files are copied back to the original install path.
In case you do not select the database, then manually copy the BE_DLO.mdf and BE_DLO.ldf files
from the shared disk folder to the new location where Symantec DLO is being installed. C:\Program
Files\Symantec\Symantec DLO\Data.
When the installation completes, reconfigure the BE environment by running the Clusconfig.exe
provided by BE.
Configure the Symantec DLO cluster environment by running the DLOClusconfig.exe provided by
Symantec DLO. The executable file is located in C:\Program Files\Symantec\Symantec
DLO\DLOClusconfig.exe.
See Configuring DLO on a Microsoft Cluster Server on page 160 for additional information.
51
Chapter
Task pane
Selection pane
Navigation bar
Preview pane
Results pane
Status bar
Related Topics
Configuring DLO on page 57
About DLO Storage Locations on page 87
About DLO Profiles on page 58
About Automated User Assignments on page 93
Managing Desktop Agent Users on page 108
From the View menu, verify that Task pane is selected, or select it.
Create a profile
Run reports
Add users
52
Figure 2-2
54
Table 2-1 shows the information available in the System Summary view.
Table 2-1
Item
Description
With Errors: The last operation was completed, but errors were generated.
With Warnings: The last operation was completed, but warnings were
generated.
Cancelled: The job was cancelled or refreshed by the user during the job.
Note: Errors take precedent over warnings, so if there are both errors and
warnings, the last backup result will say With Errors.
Pending Jobs
Lists restore jobs requested by the DLO administrator that have not yet been
run.
Alert Summary
Active Alerts
Lists alerts that have not been cleared by the DLO administrators and have not
yet been removed by the alert grooming process.
Server Summary
Server Status
Server Load
Lists the number of desktops being protected by DLO and the total number of
installed Desktop Agent users. These numbers may not be the same if some
users are protecting multiple computers with DLO. Both online and offline users
are counted.
On the DLO Administration Console Network menu, click Connect to DLO Administration Server.
Server
User name
Type the user name for an account with administrator access to the
DLO Administration Server.
Password
Domain
Click OK.
Related Topics
About Administrator Accounts on page 31
Symantec recommends that the Storage Location should be located on a physical system and not in a
VMware environment. Having a Storage Location on VMware may lead to performance issues. Intensive
I/O activities like data migration or reporting may take a longer time than expected.
Ensure that your virtual environment meets all the hardware requirements and the recommendations that
VMware specifies. Hardware that VMware does not support may cause unknown issues.
56
For example, DLO may not function correctly if your virtual machine hardware does not support VMware.
See the VMware documentation for information on supported configuration.
Configuring DLO
For DLO to back up user data, you must set up these options in the following order:
Create a profile, which determines what files are backed up, when the files are backed up, and the level
of interaction the desktop user has with the Desktop Agent.
For additional information, see About DLO Profiles on page 58.
Determine where user data will be stored on the network. DLO requires an individual user data folder
on the network for each desktop user. If Storage Locations are used, they will automatically create
network user data folders for each new Desktop Agent user. If network data storage folders already
exist for each user, they can be added to DLO individually or many users can be imported at one time
using a list.
For additional information, see About DLO Storage Locations on page 87 and Managing Desktop
Agent Users on page 108.
Create an Automated User Assignment to automatically assign a Storage Location and profile to new
users, or configure new users manually.
For additional information, see About Automated User Assignments on page 93.
You can set up DLO by using the configuration wizard or by setting options manually. The DLO
configuration wizard provides a series of wizards that help you set up DLO in the correct order.
The configuration wizard appears when the DLO Administration Console is opened unless the Always show
this wizard at startup box is unchecked. The configuration wizard can also be accessed as described below.
To access the configuration wizard
1
On the Task pane under Getting Started, select DLO Configuration using wizard.
If you want the Configuration Wizard to display each time the DLO Administration Console is started,
select Always show this wizard at startup.
Related Topics
About DLO Profiles on page 58
About DLO Storage Locations on page 87
About Automated User Assignments on page 93
Managing Desktop Agent Users on page 108
Backup schedules
Logging options
You cannot modify settings for individual Desktop Agent users from the DLO Administration Console
unless an individual user is the only user assigned to a profile. However, you can grant permission to
Desktop Agent users to modify their own settings.
From the General tab in the New Profile dialog box, select the properties from the appropriate options.
Table 2-2 describes the fields.
Table 2-2
Item
Description
Profile Name
Type the name of the new profile that you want to create. The profile name cannot
contain any of the following characters: \@#$%^&*()=+|/{}[]
Description
Enable Profile
Clear this check box to disable the profile. Profiles are enabled by default.
58
Table 2-2
Item
Description
Limit network
user data folder
to (MB)
Limits the disk space available on the network to store DLO backup files and type the
amount of space you want to use for storage.
Enable desktop
user data folder
Because files are more quickly saved to the local computer than to the network, the
time a file is held open for backup is reduced.
Limit desktop
user data folder
to
If local revisions are not required, this option will prevent backup files from being
stored in the desktop user data folder. No revisions are saved in the desktop user
data folder even if backup selections specify that a certain number of revisions
should be stored locally.
Works well for desktop users with very limited disk space.
When the DLO administrator disables the desktop user data folder or the number of
revisions retained in this folder is set to zero, DLO will still create empty place
holders in the desktop user data folder. The place holders can be seen in the Desktop
User data folder, but contain no data. They indicate which files and folders have
been backed up and saved to the network user data folder.
A size (MB)
Select this option and enter a size in MB to limit the desktop user data folder to a specific
maximum size.
Note: While limiting available disk space for the desktop user data folder can prevent
overloading of the desktop hard drive, backups can fail to run if the desktop user data
folder space limit is reached.
From the Network Throttling for Backup tab, select the Static Throttling tab.
Note: These options are disabled if no agents with DLO versions prior to 6.1 MP3 are registered.
Select the appropriate options as described in Table 2-3.
Table 2-3
Item
Description
Limit bandwidth
(KB/sec)
Limiting the bandwidth for DLO data transfer is a means to manage the trade-off between
backup speed vs. the impact of backups on the local computer, network, and server. The
default limit is meant to be a conservative setting to minimize the impact of backups, but
many factors come into play, such as network speed, connection type, the amount of data
backed up and the total number of computers backing up to DLO.
If computer performance is not impacted, but DLO data transfer is slow, a higher
bandwidth setting may be more suitable. If computer performance is noticeably impacted
during backups, a lower value will reduce the impact of backups on computer
performance, but backups will take longer to complete.
Select Limit bandwidth (KB/sec) and enter a specific maximum bandwidth setting to
control the rate at which data is sent to the network user data folder.
Data transfer is only limited when data is written to the network user data folder, not
when it is written to the desktop user data folder. Data transfer is not limited during the
incremental backup of Outlook PST files or Lotus Notes NSF files.
Yield bandwidth to
other programs
Enables DLO to reduce data transfer over the network when other applications on the
desktop computer are transferring data. DLO automatically resumes normal data transfer
rates when other applications are not using this resource.
The yield bandwidth option monitors network traffic on the desktop computer. If DLO is
using more than 90% of the total current traffic, DLO is not throttled. When DLO traffic
drops below 90% of the total network traffic on the desktop, and total traffic is over 60%
of the maximum traffic seen on the connection, then DLO throttles itself to use only the
otherwise unused portion of the connection. For example, if there was 70% total usage,
DLO will throttle itself to 30% of maximum.
Note: Selecting this option can improve system performance when other
network-intensive applications are running at the same time. Data transfer is only limited
when data is written to the network user data folder, not when it is written to the desktop
user data folder.
From the Network Throttling for Backup tab, select the Dynamic Throttling tab. Select the appropriate
options for each of the three network bandwidth categories: Low bandwidth setting, Medium
bandwidth setting, and High bandwidth setting.
60
Item
Description
Bandwidth range
No network
throttling
Select this option to disable all network throttling for this category.
Select this option and then select a specific percent of available network bandwidth to
Limit network
bandwidth usage to control the rate at which data is sent to the network user data folder.
Yield bandwidth to
other programs
This option enables DLO to reduce data transfer over the network when other applications
on the desktop computer are transferring data. DLO resumes normal data transfer rates
when other applications are not using this resource.
Disable network
backup
From the Network Throttling for Restore tab, select the Dynamic Throttling tab.
Select the appropriate options for each of the three network bandwidth categories: Low bandwidth
setting, Medium bandwidth setting, and High bandwidth setting.
Table 2-5
Item
Description
Bandwidth range
No network
throttling
Select this option to disable all network throttling for this category.
Limit network
bandwidth usage
to
Select this option and then select a specific percent of available network bandwidth to
control the rate at which data is sent to the network user data folder.
Table 2-5
Item
Description
Select this option and enter a specific maximum bandwidth setting (in KB/sec) to control
the rate at which data is sent to the network user data folder.
Data transfer is only limited when data is written to the network user data folder, not when
it is written to the desktop user data folder. Data transfer is not limited during the
incremental backup of Outlook PST files or Lotus Notes NSF files.
This option enables DLO to reduce data transfer over the network when other applications
Yield bandwidth
to other programs on the desktop computer are transferring data. DLO resumes normal data transfer rates
when other applications are not using this resource.
From the Backup Selections tab, click the backup selections that you want to apply to users of this
profile.
You can add, modify, and delete backup selections for a profile from this dialog box. When a new
backup selection is created, it is available for selection in all profiles. Changes made to a backup
selection in one profile will impact all other profiles that use the backup selection. Similarly, when a
backup selection is deleted, the change impacts all profiles that use the backup selection. For more
information, see About Backup Selections on page 71.
62
Item
Description
Select one of the following options to determine the desktop users level of
interaction with the Desktop Agent:
Display the complete interface. Select this option to enable desktop users to
access all Desktop Agent options.
Display only the status. Select this option to enable desktop users to view the
status of backup jobs. With this option, desktop users cannot change settings
for the Desktop Agent or access any options other than the status.
Desktop users can right-click the system tray icon to open the status view or
exit the program.
Display only the system tray icon. Select this option to display the Desktop
Agent icon in the system tray in the lower right corner of the screen.
Desktop users can right-click the system tray icon to exit the program.
Do not display anything. Select this option to run the Desktop Agent in the
background. The desktop user cannot view the Desktop Agent.
Allow Users to
Select the options below to enable desktop users to configure the following
features of the Desktop Agent. These options are only available if Display the
complete interface was selected above.
Restore data
When selected, users in this profile can restore their backed up files.
For more information, see Restoring files using the Desktop Agent on page 231.
Enables users in this profile to create and modify backup selections. This option
does not allow users to modify backup selections made by the DLO administrator
in the profile.
Note: With this option selected, users can add a backup selection that will back up
a folder that is excluded from the profile backup selections. The only way to
prevent users in a profile from backing up a specific folder is to deselect this
option.
For more information, see About Backup Selections on page 71, Modifying
Backup Selections in the Standard View on page 205 or Modifying Backup
Selections in the Advanced View on page 211.
Enables users in this profile to modify backup selections created by the DLO
administrator for the profile. For more information, see About Backup
Selections on page 71 or Modifying Backup Selections in the Advanced View on
page 211.
Customize backup
selection revision policy
settings
Enables users in this profile to modify the revision policy settings. Users cannot
change these settings if this option is not selected. For more information, see
Backup Selection Revision Control Dialog Box on page 209.
Table 2-6
Item
Description
Enables users in this profile to turn encryption of backup files on or off. For more
information, see Backup Selection options on page 78.
Enables users in this profile to turn compression of backup files on or off. For
more information, see Backup Selection options on page 78.
Enables users in this profile to customize mail settings in the profile. For more
information, see Setting Customized Options on page 217.
Enables users in this profile to move the local user data folder to a new location.
For more information, see Moving the Desktop User Data Folder on page 219.
Synchronize files
Enables users in this profile to synchronize data across all of their computers that
run the Desktop Agent.
For more information, see Synchronizing Desktop User Data on page 222.
Customize local disk quota Enables users in this profile to limit the amount of disk space that can be used to
store backup files in the desktop user data folder.
For more information, see Setting Customized Options on page 217.
Modify backup schedule
Enables users in this profile to modify the schedule on which their files are backed
up.
For more information, see Changing Backup Job Schedule Options on page 215.
Customize connection
policies
Cancel scheduled or
manual jobs
Enables users in this profile to cancel both scheduled and manually initiated jobs.
Scheduled jobs will run again at the next scheduled time. Manual jobs must be
restarted manually.
Enables users in this profile to suspend jobs for a specified amount of time. For
more information, see Suspending or Cancelling a Job on page 228.
Enables users in this profile to disable the Desktop Agent from the tray icon. They
will also have the ability to re-enable the Desktop Agent once it has been disabled.
64
Table 2-6
Item
Description
Work Offline
Enables users in this profile to set the Desktop Agent to work offline. For more
information, see Changing your Connection Status on page 200.
Save encrypted passwords Select Save encrypted passwords used by DLO to allow users to automatically
used by DLO
authenticate to the media server or storage location in the event of an
authentication failure. This could happen, for example, when the desktop user
logs in using a local or cross-domain account. Keeping this option unchecked will
cause DLO to prompt the user to enter a password each time DLO authenticates to
a DLO resource while using an account which requires domain credentials in order
to authenticate to a DLO resource.
Suppress errors and
warnings
Check this option to prevent error and warning message boxes from being
displayed when a user is not interacting with the Desktop Agent.
Enter the time after which a user will automatically go back online after they have
manually placed the Desktop Agent in an offline state.
Enter the time after which a job will be resumed or the Desktop Agent enabled
after the user suspends a job or disables the Desktop Agent.
11 Click the Schedule tab and select the appropriate options. Table 2-7 describes the options
Table 2-7
Item
Description
Run backups
Whenever a file changes
According to a schedule
Select this option to enable desktop users to determine when to back up their
files.
Logout/Restart/Shutdown options
Do nothing
Select Do nothing from the drop-down menu to proceed with a logout, restart
or shutdown even when there are files that require backup.
Note: If a job is already running, a prompt asks if the user would like to logout,
restart or shutdown when the job is complete.
Select Prompt user to run job from the drop-down menu to have DLO ask if a
backup should be run before proceeding with the logout, restart or shutdown.
Note: If a job is already running, a prompt asks if the job should be cancelled in
order to continue with the logout, restart or shutdown.
Select Run job immediately from the drop-down menu to back up waiting files
without prompting before proceeding with a logout, restart or shutdown.
Note: If a job is already running, a prompt asks if the job should be cancelled in
order to continue with the logout, restart or shutdown.
12 If you selected Edit schedule in the previous step, select the appropriate options, and click OK.
Table 2-8 describes the options.
Table 2-8
Item
Description
Run once at
Select this option to run a single backup on the days you selected
at the time specified.
66
Table 2-8
Item
Description
Run every
From
If you selected Run every, select the beginning of the time interval
over which you want backups to begin.
Until
If you selected Run every, select the end of the time interval over
which you want backups to begin.
Note: This field specifies the end of the time period within which
backups will begin. If a backup is in progress at this time, it will
continue to run to completion.
Select this option to stagger start times for backup jobs. Rather
than starting all backup jobs at exactly the time indicated, DLO will
distribute the start times over the specified interval to better
distribute the demands on the server and network.
Item
Description
Logging options
Log groom messages
Table 2-9
Item
Description
Select this check box to create logs for all backup operations.
Select this check box to create logs for all operations that generate warnings.
Mail options
Enable incremental backups Select this check box to enable incremental backups of Microsoft Outlook Personal
of Outlook PST files
Folder (PST) files. Incremental backups must be enabled to allow PST files to be
backed up while they are open.
If this option is not checked, PST files that are configured in Outlook will be fully
backed up each time the PST file is saved, which generally occurs when Outlook is
closed.
When Outlook PST files are backed up incrementally, only one revision is
maintained regardless of the number of revisions set in the backup selection.
Note: Microsoft Outlook must be your default mail application for DLO to perform
incremental backups of PST files.
Note: Synchronized files cannot be backed up incrementally.
For more information, see Backing up Outlook PST Files Incrementally on
page 212.
Enable VSS Backups of
Outlook PST Files after
every 30 minutes
Select this check box to enable VSS backups of Microsoft Outlook Personal Folder
(PST) files.
Note: This feature is applicable to 6.1 MP5 or later versions of DLO Agent.
Enable incremental backups Select this check box to enable incremental backups of Lotus Notes e-mail files.
of Lotus Notes e-mail files
Additional configuration may be necessary. For more information, see Backing up
Lotus Notes NSF Files Incrementally on page 214.
When Lotus Notes NSF files are backed up incrementally, only one revision is
maintained regardless of the number of revisions set in the backup selection.
14 Click the Connection Policies tab to disable or limit backups for specific connection types. Click Add to
create a new connection policy.
Table 2-10 describes the options available to configure the policy.
Table 2-10
Item
Connection Type
Description
68
Table 2-10
Item
Description
Dialup
Select Dialup from the drop-down menu to limit or disable backups when using a
dialup connection.
IP address range
Select IP address range from the drop-down menu to limit or disable backups for a
specific IP address range.
Specify whether you want the connection policy to apply to computers that are or
are not in the IP address range you specify.
Select IPv6 or IPv4 and enter the IP address range for the connection policy.
Note: IPv6 addresses are only supported on Windows XP and later operating
systems and will not be enforced for Desktop Agents running on Windows 2000. An
additional connection policy using IPv4 addresses may be desired for Desktop
Agents on Windows 2000 computers.
Active Directory
Select Active Directory from the drop-down menu to limit or disable backups using
Active Directory. Select Configure to configure the Active Directory settings. See
Customizing Connection Policies on page 220 for details on configuring
connection policy settings for Active Directory.
Select Disable network backup to prevent users from backing up to the network
user data folder. Backups will continue to the desktop user data folder.
Select Disable network backup for files greater than to prevents users from
backing up files larger than a specified size based on the connection type. Enter a
files size in KB.
Select Limit network bandwidth usage to and enter a value in KB/sec to restrict the
usage of network bandwidth to the specified value.
Check the Enforce policy according to scheduled window to cause the connection
policy to apply only during the specified period of time.
Click Schedule to set the time during which the policy will be in affect. Schedules
can be set to run weekly or for a specific date range.
15 Click OK.
Related Topics
About Backup Selections on page 71
Monitoring Alerts on the DLO Administration Console on page 133
Modifying Desktop Agent Settings on page 215
Copying a Profile
When you create a new profile, we recommend that you begin with a copy of an existing profile with a
configuration similar to that required for the new profile. You can then modify the copy as required, to
meet the needs of a new group of desktop users.
To copy a profile
1
Click Copy.
Click OK.
Modifying a Profile
Profiles can be modified as required to meet the changing needs of user groups.
Note: Modifications to a profile will cause users of that profile to cancel jobs, load settings, restart backup
engines and scan their backup selection tree.
To modify a profile
1
Click OK.
Related Topics
Creating a New Profile on page 58
70
Set the number of revisions retained for each file in the backup selection, the frequency with which
they are saved, and instructions on how long to retain backup files
Configure the backup selection to transfer only the changed portions of files
Specify how long to retain backup files after the source files are deleted
Caution: Symantec strongly recommends that you consider disk space when choosing backup selections for
desktops and laptops. A large number of local copies may cause the Desktop Agent user's computer to run
out of disk space. For example, you may want to avoid selecting entire drives for backup or
synchronization.
Related Topics
Default Backup Selections on page 72
Removing Default Backup Selections from a Profile on page 72
Adding a Backup Selection on page 73
Defining General Backup Selection Properties on page 73
Including and Excluding Files or Folders from a Backup Selection on page 75
Revision Control on page 76
Setting Options for a Backup Selection on page 78
Using DLO Macros in Backup Selections on page 79
Modifying a Backup Selection on page 81
Deleting Backup Selections on page 82
Item
Description
My Documents
My Favorites
My Desktop
My Music
My Pictures
My Videos
Note: Backup selections assume applications are using default paths. If custom paths were used during
installation or modified thereafter, you will need to customize the backup selections to insure they work
properly. See Modifying a Backup Selection on page 81 for additional information.
72
Click OK.
In the Results pane, select the profile for which you want to add a backup selection.
Click the Backup Selections tab in the Profile Properties dialog box.
Click Add.
A dialog box explains that if you customize NTFS permissions or directory attributes such as
compression or encryption for backed up files or folders, these settings will not be backed up. You must
reapply these settings after restoring the files. If you use a password for a Microsoft Outlook PST file,
you must reset the password after restoring a PST file.
To set general backup selection properties including the name, description and folder to be backed
up, see Defining General Backup Selection Properties on page 73.
To include or exclude specific files from this backup selection, see Including and Excluding Files
or Folders from a Backup Selection on page 75.
To set revision control for this backup selection, see Setting Revision Control for a Backup
Selection on page 77.
To set Delta File Transfer, encryption and compression options for this backup selection, see
Setting Options for a Backup Selection on page 78.
Click OK twice.
Open the Backup Selection dialog box as described in one of the following procedures:
From the General tab in the Backup Selection dialog box, select the appropriate options. Table 2-12
describes the options.
Table 2-12
Item
Description
Name
Description
Type a clear description of the backup selection. This description may include, for
example, the folder selected, the group of users it was created for, or the purpose for
creating the backup selection.
Folder to back up
Type a folder name
Select this option to add a specific folder to the backup selection. Type the path to
the folder, including the folder name. For example, to add a folder named MyData
on drive C, type C:\MyData.
Note: See Using DLO Macros in Backup Selections on page 79 for information on
using macros to define the folders backed up by a backup selection.
Select this option to choose a pre-defined folder from the list provided.
Note: See Using DLO Macros in Backup Selections on page 79 for information on
the macros used to define the pre-defined folders.
Include subfolders
Click OK.
Select this option to also back up all subfolders in the specified directory. This
option is selected by default.
74
Related Topics
DLO Default Settings on page 34
Configuring Global Exclude Filters on page 97
To include or exclude files or folders from a backup selection
1
Open the Backup Selection dialog box as described in one of the following procedures:
From the Include/Exclude tab in the Backup Selection dialog box, select the appropriate options.
Include all file types: Select this option to include all the file types in this backup selection.
Include and exclude only the items listed below: Select this option to include or exclude only
specific files or file types. When this option is selected, a wildcard include is added to back up all
files not specifically excluded.
To add a filter to the Include/Exclude list, verify that you selected Include and exclude only the items
listed below in step 2, and click Add Include or Add Exclude.
If you selected Add Exclude, you will be notified that all previously backed up files matching this
exclude will be deleted from this backup selection. Click Yes to continue or No to cancel.
Table 2-13
Item
Description
Filter
Type the name of the file or the folder that you want to include or exclude. You
can use wildcards.
For example, type *.mp3 to either include or exclude all files with the file
extension .mp3, or type unimportant.txt to include or exclude all files in the
backup selection with this specific file name.
Click Extensions to select a predefined filter to either include or exclude all files
with a given file extension.
Table 2-13
Item
Description
Description
Apply to
Files and Folders to apply this filter to both files and folders
Click OK.
Revision Control
Revisions are versions of a file at a specific point in time. You configure revision settings when you create a
backup selection. When a file is changed and backed up, DLO stores a new revision. DLO will store and
maintain a specific number of revisions for all files in a backup selection. Because backup selections are
configured separately, the number of revisions retained in each backup selection can vary.
When the number of revisions is exceeded, DLO removes the oldest revision, maintaining only the specified
number of revisions in the Desktop and network user data folders.
You can limit the number of revisions retained in a given period of time. If you are working on a document
and backing it up frequently, all of your revisions could potentially be just a few minutes apart. By
specifying that you want to retain only two revisions every 24 hours, at least 120 minutes apart, you can
retain older revisions for a longer period of time. While some intermediate versions will not be retained, it
does support situations in which returning to an older revision is needed.
Another consideration in determining the number of revisions to retain is the amount of storage space
required to store the data. The amount of space required for backups can be estimated by multiplying the
number of revisions retained by the amount of data protected.
Example
Although compression can improve the space utilization, it varies significantly with file type and other
factors. Typical compression ratios are approximately 2:1, so in the previous example, the maximum disk
space usage might be reduced to approximately 15 MB.
File Grooming
The Desktop Agent grooms revisions based on backup selection settings and does this as new revisions are
created. The oldest revision is deleted when a new revision is created that exceeds the limit. See step 2 on
page 77 for revision control settings.
Maintenance grooming is the process of removing backups of deleted files. It occurs at most once every 24
hours. Maintenance grooming occurs during the first backup that runs after 24 hours have passed since the
last maintenance grooming.
76
Open the Backup Selection dialog box as described in one of the following procedures:
From the Revision Control tab in the Backup Selection dialog box, select the appropriate options for
both the Desktop and network user data folders.
Table 2-14 describes the options.
Table 2-14
Item
Description
Number of revisions
Desktop user data folder
Type the number of revisions to keep in the desktop user data folder for each file in
the backup selection.
Note: When Outlook PST files or Lotus Notes NSF files are backed up incrementally,
only one revision is maintained regardless of the number of revisions set in the
backup selection.
Limit to
Select this option to limit the number of revisions retained in a given amount of
time, and specify the following:
Within the last x hours: Select the time period during which you want to retain
the versions.
At least x minutes apart: Select the minimum amount of time that must elapse
between backups in this backup selection.
Note: The oldest revision is deleted when a new revision is created that exceeds one
of these limits.
Network user data folder
Select the number of revisions to keep in the network user data folder for each file
in the backup selection.
Table 2-14
Item
Description
Limit to
Select this option to limit the number of revisions retained in a given amount of
time, and specify the following:
Within the last x hours: Select the time period during which you want to retain
the versions.
At least x minutes apart: Select the minimum amount of time that must elapse
between backups in this backup selection.
Note: The oldest revision is deleted when a new revision is created that exceeds one
of these limits.
Revision Age
Discard all revisions in the
desktop user data folder
older than
Enter the number of days after which all revisions in the desktop user data folder
will be deleted.
Enter the number of days after which all revisions in the network user data folder
will be deleted.
Open the Backup Selection dialog box as described in one of the following procedures:
From the Options tab in the Backup Selection dialog box, select the appropriate options. Table 2-15
describes the options.
Table 2-15
Item
Description
Each time a file is backed up, only the part of the file that has changed is
transferred and stored in the network user data folder. In addition, Delta file
transfer uses compression. Enabling this option requires that you have
installed and configured a maintenance server. SeeAdding a New
Maintenance Server on page 84 for additional information.
78
Table 2-15
Item
Description
Compression
Each time a file is backed up, files in this backup selection will be compressed
for data transfer over the network and for storage in the Desktop and network
user data folders.
This affects files created after this feature is activated. Previously stored files
will not be compressed.
Delta File Transfer also uses compression.
Encryption
Select this option to encrypt files for transfer and to store files from this
backup selection in an encrypted format in the network user data folder.
This affects files transmitted and stored after this feature is activated.
Previously stored files will not be encrypted.
The Advanced Encryption Standard (AES) and a 128 bit key length are used. If
enabled, versions are stored unencrypted in the desktop user data folder, and
encrypted in the network user data folder. Transfer over the network is
encrypted.
When source files are deleted, delete the backed up files from the:
Indicate the number of days after which DLO will delete all file versions from
the desktop user data folder after the source file has been deleted from the
desktop.
Indicate the number of days after which DLO will delete all file versions from
the network user data folder after the source file has been deleted from the
desktop.
Folders backed up
%LOCALFIXEDDRIVES%
%MACHINENAME%
%CURRENTUSERNAME%
%CURRENTUSERPROFILE%
%CURRENTUSERMYDOCS%
%CURRENTUSERFAVORITES%
%CURRENTUSERPRINTHOOD%
%CURRENTUSERNETHOOD%
The Network Locations directory for the user who is logged on.
%CURRENTUSERDESKTOP%
%CURRENTUSERRECENT%
The Recent Files directory for the user who is logged on.
%PROGRAMFILES%
%LOCALAPPDATA%
80
The following additional pre-defined folder macros are available for selection in the backup selection
dialog box.
Table 2-17
Folder Name
Folders Backed Up
My Documents
%CURRENTUSERMYDOCS%
Desktop
%CURRENTUSERDESKTOP%
Favorites
%CURRENTUSERFAVORITES%
PrintHood
%CURRENTUSERPRINTHOOD%
NetHood
%CURRENTUSERNETHOOD%
Recent
%CURRENTUSERRECENT%
%LOCALFIXEDDRIVES%
Note: When you enter a path that uses a macro, a backslash is automatically added immediately following
the macro. For example, if you type %LOCALFIXEDDRIVES%\Documents, an extra backslash is added and
it appears as x:\\Documents in the Desktop Agent backup selection advanced view. It does not show at all
in the Desktop Agent backup selection Standard view. The correct way to type this macro is
%LOCALFIXEDDRIVES%Documents. This properly resolves to x:\Documents.
Select the backup selection you want to modify, and click Modify.
Note: The Type a folder name field in the General tab is grayed out in this view. If the path in this field
is longer than the display, hold the curser over the path for a moment to display the entire path.
7
Click OK to indicate that you read the message stating that modifying this backup selection will change
all profiles that are using this selection.
Click OK twice.
In the Results pane, click the profile that contains the backup selection you want to delete.
From the Backup Selections tab, select the backup selection you want to delete.
Click Delete.
Click Yes.
Related Topics
Backup Selection options on page 78
82
Working Offline
Delta File Transfer is only used to transfer and store backup files on in the network user data folder.
Backup files stored in the Desktop User Data Folder are not stored using deltas. If a Desktop Agent user is
working offline, the local revisions are stored in their entirety in the desktop user data folder. When the
user is once again working online, Delta File Transfer is used to transfer data to the network user data
folder.
From the DLO Console, on the DLO navigation bar, click Setup.
Click Add.
Click OK.
84
Note: For detailed information on delegating Active Directory administration, see the Microsoft website:
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirect
ory/actdid1.mspx
Both the Desktop Agent users account and the maintenance service's account must be in the same
forest
Desktop Agent user and computer accounts must be in mutually trusted domains
Confirm that the desktop user account is configured for delegation. See Confirming the Desktop
Users Account is Configured for Delegation on page 85.
Confirm that the server process account is trusted for delegation.Confirming the Server Process
Account is Trusted for Delegation on page 85.
On the Task bar, click the Start button, point to Programs and then Administrative Tools and click
Active Directory Users and Computers.
In the Account options list, verify that the Account is sensitive and cannot be delegated is not
selected.
Click OK.
On the Task bar, click the Start button, point to Programs and then Administrative Tools and click
Active Directory Users and Computers.
Right-click the computer on which the maintenance server runs and then click Properties.
Click OK.
From the DLO Console, on the DLO navigation bar, click Setup.
In the Maintenance Servers list, select the check box for the maintenance server you want to set as the
default.
Click OK.
Select the check box for the maintenance server you want to delete.
Click Delete.
Note: The entry for the default maintenance server cannot be deleted from the Administration Console.
Similarly, once you add a maintenance server from the Administration Console, you must install the
maintenance server software on the computer to begin maintenance processes.
86
Verify that the new maintenance server has been installed and configured.
Click Edit.
Click Reassign.
Description
Supported
SAN
Not Supported
X
FAT, FAT32 and NTFS partitions are supported as Storage
locations, although FAT and FAT32 are not recommended. NTFS is
the preferred file system for Storage Locations
NetWare 3.1x, 4.x, or E-Directory Storage Locations
Permissions
Everyone
Full control
88
Table 2-19
Drive Type
Permissions
Everyone
Special security
Allow Traverse Folder/Execute File
permissions or advanced Allow List Folder/Read Data
settings
Allow Read Attributes
Allow Read Extended Attributes
Allow Read Permissions
Everyone
Owner
Allow Read
network user data folder are on a FAT or FAT32 volume, you may see duplicate entries in the Restore and
Restore Search screens. If duplicates do appear, you can select either file to restore.
Once created, Storage Locations cannot be modified, but they can be deleted if there are no users or
Automated User Assignments assigned to them. You can move users to new Storage Locations. For more
information, see Moving Desktop Agent Users to a New Network User Data Folder on page 113.
Note: If you receive errors when creating Storage Locations, verify that the login account for the service
named MSSQL$DLO has sufficient rights to create directories and change permissions for the Storage
Locations. Use the Windows Service Control Panel to change the login account for the MSSQL$DLO
instance. You can avoid these problems if you specify a domain account when you install DLO.
In the Task pane, under Settings Tasks, click New Storage Location.
Item
Description
Computer name
Path
Type a name for the new Storage Location. The name cannot contain any
of the following characters: \@#$%^&*()=+|/{}[]
90
Table 2-20
Item
Description
Summary
Click OK.
Case 1
To create storage locations when the DLO administration service is a full administrator on the remote
system
1
Ensure that the account credentials used for DLO services have full administrator rights to the remote
storage location or NAS device.
Make sure that the volume desired to be used for DLO has been assigned a drive letter on the remote
storage location or NAS device.
Note: See hardware vendor documentation on share creation and naming.
Create a new Storage Location as directed in the DLO Administrator's Guide. Use the browse feature to
indicate the location on the computer where the Storage Location will be created. This will insure that
the path and the DLO service account are valid.
Case 2
The DLO administration service does not run as an administrator level user, but the DLO administration
groups have been assigned the appropriate permission levels on a pre-existing share.
Configure DLO to use existing domain groups to automatically manage access to network user data
folders as explained in About Administrator Accounts on page 31. Check the Automatically grant
DLO Administrators access to network user data folders checkbox and provide the required domain
groups. Provide two groups: a group for full-DLO administrators and a group for limited-DLO
administrators.
From the Administrator Account Management dialog, add the appropriate domain user accounts to the
account manager. If the user will have full administrator rights, check the Grant administrator full
restore privileges checkbox in the Add Administrator Account dialog. In addition to other users, be
sure to grant the DLO Administration Service full restore privileges.
Create a folder on the remote storage location using an administrator, or administrator equivalent user.
Share the new folder. Ensure that 'Everyone' has full-access to the share.
Modify the folder's security permissions such that the full-DLO administrator group has full-control of
the folder and that the limited-DLO administrator group has modify-control of the folder.
Using the DLO console, create a new Storage Location. Specify the machine name, drive and path, and
share name for the folder just created.
Note: Do not use the browse buttons at any point during the storage location creation as they will cause
the process to fail.
Storage Locations manually created when the DLO Admin Service does not have full administrator
rights to the server hosting the DLO Storage Location cannot be deleted from the DLO Administration
Console. Attempting to do so will result in an error. To manually remove the Storage Location:
a
Manually remove the Storage Location share and folder from the server.
92
In the Selection pane, expand the file servers list by clicking the + next to File Servers.
In the Selection pane, click the File Server on which the Storage Location resides.
In the Results pane, click the storage location you want to delete.
Click Yes.
Related Topics
Managing Desktop Agent Users on page 108
Modifying Automated User Assignments on page 96
Deleting Automated User Assignments on page 97
Figure 2-4
For information on modifying Automated User Assignment priorities, see Changing the Priority of
Automated User Assignments on page 96.
Or in the Settings pane, right-click Automated user assignment and select New User Assignment.
94
Item
Description
User Assignment
User assignment
name
Type a name for the Automated User Assignment. The Automated User
Assignment name cannot contain the following characters:
\@#$%^&*()=+|/{}[]
Domain
Select the domain to which this Automated User Assignment will apply.
Group
Select the group to which this Automated User Assignment will apply.
Configure
Click the Configure button to configure the User Assignment using Active
Directory. See step 5 below for information on configuring the Active Directory
settings.
Storage Location/Profile
Storage Location
Select a Storage Location to be assigned to the users in the selected domain and
group.
Profile
Select a profile to be assigned to the users in the selected domain and group.
If you chose to use Active Directory to configure the User Assignment in step 4, configure the Active
Directory settings as follows:
Table 2-22
Item
Description
Object
In LDAP Directory
Table 2-22
Item
Description
Attributes
Condition
Value
Click OK.
In the Results pane, select the Automated User Assignment you want to modify.
96
In the Results pane, select the Automated User Assignment for which you want to change the priority.
In the Task pane, under Settings Tasks, select Move priority up or Move priority down.
Click Yes.
Related Topics
About Automated User Assignments on page 93
New Automated User Assignment Dialog Box Options on page 95
Modifying Automated User Assignments on page 96
Changing the Priority of Automated User Assignments on page 96
Moving Desktop Agent Users to a New Network User Data Folder on page 113
Modifying Desktop Agent User Properties on page 111
The files you exclude are listed on the Include/Exclude tab in the advanced view on the Desktop Agent and
on the Include/Exclude tab for a profile's backup selection on the DLO Administration Console. Items
configured for the global exclude list are not available for selection on the selection list.
Caution: Adding a global exclude will cause all previous backups matching the global exclude to be deleted.
To configure global excludes, see the following procedures:
Specifying Files and Folders to Exclude from all Backups on page 99
Specifying E-mail to Exclude from all Backups on page 100
Specifying Files and Folders to Exclude from Compression on page 101
Specifying Files and Folders to Exclude from Encryption on page 102
Specifying Files and Folders to Exclude from Delta File Transfer on page 103
Using DLO Macros to Define Global Excludes on page 104
98
From the Tools menu in the DLO Administration Console, select Global Excludes.
Select the Files/Folders tab. Default Files/Folders global excludes are listed.
To exclude all files greater than a specific size, select the Exclude all files greater than check box and
enter a size in KB.
To exclude all files modified before a specified date, select the Exclude all files modified before check
box and enter a date.
To add a new Files/Folders global exclude, click Add and configure as described in the following table.
Table 2-23
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global exclude filter, click Edit and configure as described in the step 5 above.
To delete a global exclude filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude from all backup attachments greater than a specific size, select the Exclude all attachments
greater than check box and enter a size in KB. This feature does not apply to Lotus Notes e-mails.
To exclude from all backup messages received before a specified date, select the Exclude all messages
received before check box and enter a date.
To add a new e-mail global exclude, click Add and configure as follows.
Table 2-24
Item
Description
Type the name of the mail folder you would like to exclude from
backup.
Description
Click OK.
To edit a global e-mail filter, click the filter you want to change. Click Edit and configure as described in
table 2-24, Add Global E-mail Exclude Filter Dialog.
To delete a global e-mail filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
100
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude files or folders from compression, select the Compressed Files tab. Default compressed files
global excludes are listed.
To exclude all files greater than a specific size from compression, select the Exclude all files greater
than check box and enter a size in KB.
To add a new compressed file global exclude, click Add and configure as follows.
Table 2-25
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global exclude filter, click the filter you want to change. Click Edit and configure as described
in the Add Global Compression Exclude Filter Dialog table above.
To delete a global exclude filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude files or folders from encryption, select the Encrypted Files tab. Default encrypted files
global excludes are listed.
To exclude files greater than a specific size from encryption, check the Exclude all files greater than
check box and enter a size in KB.
To add a new encrypted file global exclude, click Add and configure as follows.
Table 2-26
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global encryption exclude filter, click the filter you want to change. Click Edit and configure as
described in table 2-26, Add Global Encryption Exclude Filter Dialog.
To delete a global encryption exclude filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
102
From the Tools menu in the DLO Administration Console, select Global Excludes.
To exclude files or folders from Delta File Transfer, select the Delta File Transfer tab. Default Delta File
Transfer global excludes are listed. File types excluded by default from Delta File Transfer are generally
file types that do not benefit from this technology.
Note: Files and Folders backed up using Delta File Transfer are also compressed with standard
compression. If a file is in a backup selection that uses Delta File Transfer, but is excluded from Delta
File Transfer using a global excludes filter, it is still compressed with standard compression unless it is
also excluded from standard compression using another global excludes filter.
To exclude files greater than a specific size from Delta File Transfer, select the Exclude all files greater
than check box and enter a size in KB.
To exclude files smaller than a specific size from Delta File Transfer, select the Exclude all files less
than check box and enter a size in KB.
To add a new Delta File Transfer global exclude, click Add and configure as follows.
Table 2-27
Item
Description
Filter
Description
Apply to
Click OK.
To edit a global Delta File Transfer exclude filter, click the filter you want to change. Click Edit and
configure as described in table 2-27, Add Global Delta File Transfer Exclude Filter Dialog.
To delete a global Delta File Transfer exclude filter, click the filter to be deleted and click Delete.
Click Yes to delete the filter or No to cancel.
Click OK.
Related Topics
Using Delta File Transfer on page 82
C:\Windows\System32\Config
registry hives and logs, including *.DAT.LOG, *.LOG and the files system, SECURITY, default, SAM, and
software
C:\Windows\System32\wbem
*.EVT
Related Topics
About Backup Selections on page 71
Configuring Global Exclude Filters on page 97
Macro
Folder
%TEMP%
%WINDIR%
104
Table 2-28
Macro
Folder
%WEBTEMP%
%RECYCLED%
Recycle bins
%SYSTEM%
Service or Process
Port
Port Type
135-139
TCP/UDP
445
TCP/UDP
SQL
1434
TCP/UDP
SymantecDLOAdminSvcu.exe
(DLO admin service)
TCP/UDP
Table 2-30
Item
Description
135 (RPC)
445 (TCP)
441 (RPC)
106
Chapter
Restoring Files and Folders from the DLO Administration Console on page 120
Backing up and Restoring the DLO File Server and Database on page 159
Related Topics
About Automated User Assignments on page 93
Create or locate a network share on the computer where backup files will be stored.
Right-click the share you created in step 1, and then select Properties.
Click Permissions.
Select the following permissions for user Everyone: Full Control, Change, Read
Click OK.
Click Advanced.
10 Verify that the Inherit from parent the permission entries that apply to child objects check box is not
selected.
11 Add Administrator and Everyone and give them full control permissions.
12 In this share, create a data folder for each user who will use this Storage Location, or verify that a data
folder already exists.
13 Right-click the data folder for a user.
14 Select Properties.
15 Select Security.
16 Verify that the Inherit from parent the permission entries that apply to child objects check box is not
selected.
17 Add Administrator and the user who will be assigned to the user data folder to the share permission
list.
18 Set full permission for Administrator and the user.
Item
Description
Enable User
Select this option to enable this user to use the Desktop Agent, or clear it
to prevent the user from using the Desktop Agent.
User
Profile
Select this option and type the path or browse to an existing network user
data folder where this desktop users backup files will be stored. This
must be an existing folder, and the security attributes must be set for the
folder according to your organizations needs. For example, determine
which users can access the folder.
Note: A Storage Location is not required when an existing network share
is used as the network user data folder.
Storage Location
110
JSmith,enterprise,Default,\\Server1\Userdata\jsmith
In the Task pane, under User Tasks, click Import users using wizard.
User Properties
Item
Description
Enable User
Select this option to enable this user to use the Desktop Agent, or clear it
to prevent the user from using the Desktop Agent.
User
Profile
This is the location where the users backup files are to be stored. It
cannot be modified. To move a user to a new location, see Moving
Desktop Agent Users to a New Network User Data Folder on page 113.
In the Selection pane, click Users. Users are listed in the results pane.
Clear the Enable user check box to prevent the desktop user from backing up data with the
Desktop Agent
Check the Enable user check box to allow the desktop user to back up data with the Desktop Agent
To delete the data stored in the user data folder, select the Delete data stored in the user data folder
option. When you select this option, backup data is deleted from the network user data folder, but not
from the desktop user data folder. When the Desktop Agent is uninstalled from the desktop computer,
an option is provided to delete the desktop user data folder.
112
In the Task pane, under User Tasks, click Move network user data folder.
Move User
Item
Description
User
Lists the domain and user name of the selected user or users.
From
Destination
Move the user data folder to Select this option to choose an existing Storage Location from the
drop-down list. A new network user data folder will be created in the new
an existing Storage
Storage Location for each user who is moved.
Location
Move the contents of the
user data folder to an
alternative location
Select this option to specify a new Storage Location. Type the path in the
box provided, or click Browse and navigate to the new location. A new
network user data folder will be created in the new Storage Location for
each user who is moved.
Restore the user data as described in Restoring Files and Folders from the DLO Administration
Console on page 120.
In step 8, select Stage this user data on an alternate computer for a new DLO installation. The data is
staged on the new computer.
When the owner of the staged data logs in to the new computer, DLO moves the staged data to the
same location it occupied on the original computer, completing the data migration process.
In the Selection pane, click Users to list users in the Results pane.
Right-click the computer for which you want to modify properties, and click Properties.
114
To modify the backup schedule for the computer, click the Schedule tab.
Item
Description
Select this option in the drop-down menu to use the scheduling options
specified in the profile.
Note: If this option is selected, additional settings on the Schedule tab
cannot be modified.
Use customized schedule Select this option in the drop-down menu to specify a customized
schedule that differs from the profile schedule.
Run jobs
Whenever a file changes
According to a schedule
Manually
Select this option to require that the DLO Administrator or desktop user
initiate backups manually.
Select this option to begin a backup after the desktop user logs on to the
computer.
Select this option to begin a backup when the desktop user logs off the
computer.
To modify computer options, click the Options tab and configure the computer options as described in
the following table.
Table 3-5
Item
Description
Select this option from the drop-down menu to use settings specified in
the profile.
Note: If this option is selected, additional settings on the Options tab
cannot be modified.
Table 3-5
Item
Description
Select this option from the drop-down menu to specify settings that differ
from the profile options.
Note: This option must be selected to enable access to additional settings
on the Options tab.
Limit disk space usage on Select this check box to limit disk space usage on the desktop computer.
my computer to
To limit the usage to a percent of drive space, select % and type the
maximum percentage of drive space to use.
To limit the usage to a specific size, select MB and type the maximum
number of MB to use on the local drive.
Type the minimum number of days to keep log files. Log files will not be
deleted until they are at least as old as specified.
Note: Log files will not be deleted until their combined size exceeds the
setting for the combined size of all log files, which is discussed below.
Type the maximum combined size of all log files to be retained before the
oldest log files are deleted.
Note: You may have more than the specified number of MB of log files
stored if none of the log files are as old as specified in the keep log files
for a minimum of (days) setting.
Logging options
Log groom messages
Log information
messages for backup
Select this check box to create logs for all backup operations.
Select this check box to create logs for all operations that generate
warnings.
Mail options
116
Table 3-5
Item
Description
Enable incremental
backups of Outlook PST
files
Enable incremental
backups of Lotus Notes
email files
Select this check box to enable incremental backups of Lotus Notes e-mail
files. Additional configuration may be necessary. See Backing up Lotus
Notes NSF Files Incrementally on page 214.
When Lotus Notes NSF files are backed up incrementally, only one
revision is maintained regardless of the number of revisions set in the
backup selection.
To view the computer backup folders, click the Backup Folders tab.
To modify the computer backup selections, click the Backup Selections tab.
See Adding a Backup Selection on page 73. Profile backup selections are not listed, and can only be
modified directly in the profile as described in Modifying a Backup Selection on page 81.
To view synchronized selections for a computer schedule, click the Synchronized Selections tab.
Synchronized selections can only be viewed from the Administration Console. They are configured on
the Desktop Agent as described in Synchronizing Desktop User Data on page 222.
10 To view and modify connection policies, click the Connection Policies tab.
Profile defined connection policies can only be modified in the profile. See Customizing Connection
Policies on page 220.
Right-click the selected computers and click Enable to enable the Desktop Agent to run on the selected
computers, or click Disable to prevent the Desktop Agent from running on the selected computers.
When asked if you want to delete each selected computer and all backup files, click Yes.
118
In the Results pane, select one or more computers on which to run an immediate backup.
In the Task pane, under Computer Tasks, click Run backup now.
From the File Server list, select a network resource for which you want to configure a blackout window.
Table 3-6
Item
Description
Enable Schedule
Occurs
Starts at
Ends at
Click OK.
Click Delete.
Click OK.
In the Computer pane, click the desktop from which the data to be restored originated.
In the Backup Folder pane tree view, select the folder containing the files you want to restore.
To restore the entire folder, check the folder in the Backup Folder pane.
To restore specific files, check the files in the File Version pane.
If multiple versions exist for a file, select the radio button for the file version you want to restore.
Note: When a desktop user deletes an original file, the backup files are retained until they are deleted
by the file grooming process. If an original file has been deleted, but backup files are still available, the
icon for the file in the restore view will have a small red x to indicate the deletion of the original file.
See File Grooming on page 205 for additional information.
In the Task pane, under Restore Tasks, click Restore files to open the Restore dialog.
120
Item
Description
Restore destination
Restore to original computer
Restore to an alternate
computer
Select this check box to restore the data with its original directory
structure intact. If you clear this option, all data (including the
data in subdirectories) is restored to a single folder in the path you
specify.
Table 3-7
Item
Description
Restore Options
If file already exists:
Select this option if you want to restore files even though the
original files have been deleted.
Click OK.
Note: If you customize NTFS permissions or directory attributes, such as compression or encryption for
files or folders, you must reapply these settings after restoration. If you use a password for your PST file,
you must reset the password after restoring your PST file.
10 In the Restore Summary dialog box, review the selected restore settings, and do one of the following:
In the Computer pane, click the desktop on which you would like to search for files to restore.
In the Task pane, under Restore Tasks, click Search for files to restore.
122
Item
Description
Search for file names with this text Type all or part of the name of the file or folder you want to
find. Wildcard entries are accepted, for example *proj.doc.
in the file name
Modified
Select this option to search for files that were modified during a
specific time frame, and then select the time frame.
Today
Between
Select this check box to select a file type from the list provided.
Click Search.
Click Restore.
Select the appropriate options as outlined in Restoring Files and Folders from the DLO
Administration Console on page 120.
Click OK.
Recovering Data for a Single User Without DLO Emergency Restore on page 125
This topic assumes that both the DLO Administration Server and File Server are periodically backed up to
another disk, tape, or other media. Also note that for many DLO installations the administration server and
file server are on the same computer.
124
For example, consider the case where a recovery password pwd1 is established when DLO is installed.
Each user's encryption-key is encrypted with the Recovery Password stored on the File Server. When the
File Server is backed up, the backup copies all use the Recovery Password pwd1. If the recovery password
is subsequently changed to pwd2, the user encryption-keys on the File Server will be changed to be
encrypted with the new Recovery Password. Subsequent backups of the File Server will use the Recovery
Password pwd2. Now there are backups of the File Server using both pwd1 and pwd2 as the Recovery
Password. When the Emergency Restore feature is used, the administrator will have to use the Recovery
Password that was in affect at the time the File Server was backed up.
Restore the user-data to its original location on the File Server or to any other temporary location.
Use the DLO Command Line Interface to restore the data to DLO.
dlocommandu -emergencyrestore <usersharepath> -w <RecoveryPassword> -ap
<destination-path>.
Take both the File Server and DLO Administration Server offline.
Back up both servers. Ensure that the backup includes the DLO configuration database and the all user
data. This backup will be used to restore DLO back to its current state once the data is recovered. If any
DLO data is not backed up it may be impossible to return to the current state.
Restore the user data to the File Server. If possible, restore just the data for the user being restored. If
unsure, the entire volume on the File Server can be restored, provided that precaution was taken in step
2 to ensure the entire volume was backed up.
Restore the configuration database to the DLO Administration Server. The default database path is
C:\Program Files\Symantec\Symantec DLO\Data.
Use the DLO Console to restore the user's data. Select Restore to an alternate computer and restore
the data to a temporary location.
Restore both the File Server and DLO Administration Server back to the most recent state.
Case 1
A non-system disk on the administration server fails or is otherwise corrupted.
The recovery procedure for Case 1 is as follows
1
Case 2
The administration server's system hard drive fails, or the servers computer needs to be replaced with a
new computer then the recovery procedure is as follows:
The recovery procedure for Case 2 is as follows
1
Setup the computer with the operating system software. Be sure to use the same computer name as the
failed DLO Administration Server.
Install DLO on the new administration server. Be sure to use the same version of DLO as was installed
on the failed server.
Restore the DLO database files, overwriting the database files created when DLO was installed. The
default database path is C:\Program Files\Symantec\Symantec DLO\Data.
126
If the File Server's system hard drive fails, or the file server computer needs to be replaced with a new
computer then the recovery procedure is as follows:
1
Setup the computer with the operating system software. Be sure to use the same computer name as the
failed File Server.
If the File Server had the DLO Maintenance Server installed, then install the DLO Maintenance Server
on the computer. Be sure to use the same version of DLO as was installed on the failed File Server.
Table 3-9
Item
Description
User
The user name of the user who is logged on to the desktop that generated the
message.
Computer
Profile
The name of the Profile to which the desktop user who is logged on to the desktop
belongs.
For more information on profiles, see About DLO Profiles on page 58
Backup Mode
128
Table 3-9
Item
Description
The Job History pane displays information as described in the following table.
Table 3-10
Item
Description
Start Time
End Time
Operation
Status
The current status of the job, such as active, completed, completed with
errors, completed with warnings, cancelled, or failed.
The number of files copied to the desktop user data folder during the job.
The total bytes of data copied to the desktop user data folder during the job.
The number of files copied to the network user data folder during the job.
The total bytes of data copied to the network user data folder during the job.
Errors
The number of errors, if any, that were generated during the job.
Click the desktop for which you want to view the history.
On the Task pane, under Job History View Filters, select one of the following options.
Table 3-11
Item
Description
Lists history logs for all jobs that have run on the selected desktop. These
may include backup, synchronization, restore, or move user jobs.
Table 3-11
Item
Description
Lists history logs only for backup jobs that have run on the selected
desktop.
Lists history logs only for restore jobs that have run on the selected
desktop.
To filter job history logs based on alerts received, select one or more of the following options.
Table 3-12
Item
Description
Lists history logs for all successful jobs on the selected desktop.
Lists history logs for all jobs that generated warnings on the selected
desktop.
Lists history logs for all jobs that generated errors on the selected desktop.
Lists history logs for all jobs that were cancelled on the selected desktop.
To set a time frame for filters to be displayed, select one of the following options.
Table 3-13
Item
Description
Lists history logs that have been generated in the last 24 hours, and that
meet all other filtering criteria.
Lists history logs that have been generated in the last 7 days, and that
meet all other filtering criteria.
Show all
Lists all history logs that also meet all other filtering criteria.
130
In the History pane, select the computer for which you want to view a history log.
In the Job History pane, click the log you want to view.
In the Task pane, under General Tasks, click View history log file to display the log file viewer with all
log messages for this job.
Log file viewer
To filter the results, select the appropriate options as described in the following table.
Table 3-14
Item
Description
Select this option to show all log entries in the log file viewer.
Select this option to search only those log entries in the current log file.
Table 3-14
Item
Description
With timestamp
Select this check box to search only those log entries within a specified
time period. The options include:
Within the last week: Show all log files created in the last week
Between dates: Show all log files created between the dates entered
Select this check box to show only logs of the indicated type. The available
selections will vary depending on the log file, but may include the
following:
Backup
Restore
Move User
Maintenance
Limit search to
Check this option to limit the log files displayed to one of the following
types of log entries:
Click Search.
Click Close.
132
In the task pane, under General Tasks, click Search log files to display the log file viewer.
Click Search.
Click Close.
You can set up DLO to notify recipients when alerts occur. See Configuring Alerts for Notification on
page 139 for additional information.
The following table describes the alert types.
Table 3-15
Alert Categories
Alert Type
Description
Informational
Notifies you that an expected action has occurred, such as the successful
completion of a backup or restore job.
Warning
Error
DLO Alerts
Name
Description
Errors
The volume containing the desktop user data folder is full. There
is insufficient free disk space to back up the current file. The file
will be copied directly to the network user data folder.
File name, directory name, Indicates either a storage system problem that requires attention,
or a file name denied by SRM software. If the latter, these files
or volume label syntax is
should be added to DLOs global exclude list. See Configuring
incorrect.
Global Exclude Filters on page 97 for additional information.
134
Table 3-16
Type
Name
Description
The volume containing the network user data folder is full. There
is insufficient free disk space to back up the current file.
Suspend backup and alert The backup job has been suspended because of a throttling
failure.
administrator on
throttling failure
Warnings
A backup job has
completed with warnings
A restore job was submitted, but an hour has passed and the
restore job is not complete.
A restore job was submitted, but 12 hours have passed and the
restore job is not complete.
A restore job was submitted, but 24 hours have passed and the
restore job is not complete.
Table 3-16
Type
Name
Description
No backups in 14 days
No backups in 28 days
No backups in 7 days
No matching automated
user assignment
Informational
A backup job has
completed
136
Configuring Alerts
To configure alerts
1
Select the alerts you want to receive, and clear the check boxes for the alerts you do not want to receive.
To send notification to recipients when the selected alerts are generated, do the following:
Note: Alerts must be configured for notification before selecting recipients. See Configuring Alerts for
Notification on page 139 and Configuring Recipients for Notification on page 143 for additional
information.
Select one or more alerts from the list. To select multiple alerts, click one item and press <Ctrl> or
<Shift> while clicking the other items
Click Recipients
Click OK
Click OK.
Select Active alerts to view active alerts, or Alert history to view alerts that have been cleared.
Note: Alerts that are older than a specified number of days are cleared and moved into alert history.
To filter alerts by type, select one or more options from Active Alerts View Filters or Alert History View
Filters in the task pane as described in the following table.
Table 3-17
Item
Description
Show errors
Show warnings
Show information
To view the properties of an alert, right-click the alert in the Active Alerts or Alert History list and
select properties.
If a log file is associated with the alert, a link is provided to the log file. Click this link to view the log
file.
138
If needed, filter the Alerts view as described in To view DLO alerts on page 138.
From the alert list, select one or more alerts that you want to clear.
SMTP
MAPI
Pagers
Printers
Net Send
Configure the methods you want to use to notify the recipient. Printer and Net Send notification
methods do not require pre-configuration
Configure recipients. Recipients are individuals, computer consoles, printers, or groups. They can be
configured to use one or more of the notification methods
SMTP email Notification. See Configuring SMTP Email for Notification on page 140
MAPI email Notification. See Configuring MAPI Email for Notification on page 141
VIM (Lotus Notes) email Notification. See Configuring VIM Email for Notification on page 142
Pager Notification. See Configuring a Pager for Alert Notification on page 142
Item
Description
Enable
Type the name of an SMTP mail server on which you have a valid user
account. DLO will not check the server name or the email address for
validity.
SMTP port
Defaults to a standard SMTP port. In most cases, the default should not
have to be changed.
Sender Name
Type the name of the user from whom the notification message will be
sent.
Type the email address of the user from whom the notification message
will be sent.
The email address should contain a name that identifies the user to the
mail server, followed by an at sign (@) and the host name and domain
name of the mail server. For example, john.smith@company.com.
Enable SMTP
Authentication
Sender password
Confirm password
Click OK.
Related Topics
Configuring Recipients for Notification on page 143
140
Item
Description
Enable
Type the name of the Exchange server. You must use an Exchange server
to which the DLO service account has access.
Type the mailbox from whom the notification message will be sent, for
example, John Smith. The name appears in the From field in the
message and does not require a full address.
Note: The DLO services must be running under a domain account that
has rights to the Exchange mailbox used for MAPI notification to save
the MAPI configuration settings.
Click OK.
Related Topics
Configuring Recipients for Notification on page 143
Item
Description
Enable
Mail password
Click OK.
Related Topics
Configuring Recipients for Notification on page 143
142
Table 3-21
Item
Description
Enable
Click OK.
Person: An individual that has a predefined method of notification such as SMTP, MAPI, or VIM email,
or a pager. You must configure the notification method before you can enable it for the recipient.
SNMP Trap: SNMP Traps are sent to a computer that is configured to receive them.
Group: A group of one or more recipients, including person recipients, Net Send recipients, and other
groups.
Related Topics
Configuring Alerts for Notification on page 139
Click New.
Click Person.
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Address
Test
Notify me a
maximum of x
times within x
minutes
Reset the
notification
limits after x
minutes
144
Table 3-22
Item
Description
Enable
Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule
Click OK.
Click New.
Click Person.
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Mailbox
Test
Table 3-23
Item
Description
Notify me a maximum of x
times within x minutes
Enable
Schedule
Click OK.
Click New.
Click Person.
Click OK.
In the Name field, type the name of the recipient that you want to configure.
146
Item
Description
Enable
Address
Test
Notify me a
maximum of x
times within x
minutes
Reset the
notification limits
after x minutes
Schedule
Click OK.
In the Name field, type the name of the recipient that you want to configure.
Item
Description
Enable
Select this check box to activate this notification method for the
recipient.
Carrier Phone
Type the area code and phone number to access the paging
service providers modem. The paging service number may be
different from the number you enter to manually send a page.
Country/region
name and code
Enter the country or region name and country code in which the
pager is located.
Pager Pin
Test
Reset the
notification limits
after x minutes
Select this check box to enter the number of minutes that must
be reached before the notification limits are reset. When the
time limit has been reached, the number of notifications sent is
reset to zero.
148
Table 3-25
Item
Description
Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule
Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see Scheduling
Notification for Recipients on page 154.
Click Advanced to configure advanced pager setup options and select the appropriate options as
described in the following table.
Table 3-26
Item
Description
Pager Configuration
Password
Message Length
Retries
Pager type
Numeric
Alpha-numeric
Modem
Configuration
Modem Baud Rate Select the speed of the modem. The speeds that appear are
limits set by the paging service; select the appropriate speed
regardless of the modem speed rating.
Click OK to save the settings in the Advanced Pager Information dialog box, and then click OK to save
the pager configuration settings.
Click New.
Click OK.
Item
Description
Name
Host
Port
Enter the SNMP port number. The default SNMP port is 162.
Notify me a maximum of x
times within x minutes
Type the total number of notifications sent to the recipient for all alerts
generated within the specified number of minutes. After the specified
number of notifications have been sent, additional notifications are not
sent until the specified minutes have been reached. The maximum
number of minutes that can be set is 1440, which is the number of
minutes in a day.
Select this check box to enter the number of minutes that must be
reached before the notification limits are reset. When the time limit has
been reached, the number of notifications sent is reset to zero.
Enable
Select this check box to activate the option and configure the length of
time the recipient is available for notification.
Schedule
Select the days and times when notifications can be sent to the recipient.
For more information, see Scheduling Notification for Recipients on
page 154.
Click OK.
150
Click Close.
Click OK.
Item
Description
Name
Type the name of the recipient for whom you are configuring the
notification.
Type the name of the computer or user to whom you are sending the
notification. You should enter a computer rather than a user because the
Net Send message will fail if the user is logged off the network.
Note: If the target computer has Internet pop-up advertisement blocking
software installed, the Net Send notification message will not display.
All Computers
Select All Computers to send the notification to all the computers in the
network.
Test
Notify me a maximum of x
times within x minutes
Type the total number of notifications sent to the recipient for all alerts
generated within the specified number of minutes. After the specified
number of notifications have been sent, additional notifications are not
sent until the specified minutes have been reached. The maximum
number of minutes that can be set is 1440, which is the number of
minutes in a day.
Table 3-28
Item
Description
Select this check box to enter the number of minutes that must be
reached before the notification limits are reset. When the time limit has
been reached, the number of notifications sent is reset to zero.
Select this check box to activate the option and configure the length of
time the recipient is available for notification.
Schedule
Select the days and times when notifications can be sent to the recipient.
For more information, see Scheduling Notification for Recipients on
page 154.
Click OK.
Click OK.
Item
Description
Name
Type the recipient for whom you are configuring the notification. You
cannot use a fax printer device to receive the notification.
Target Printer
Select the name of the printer to which the notification message will be
sent.
Test
152
Table 3-29
Item
Description
Notify me a maximum of x
times within x minutes
Type the total number of notifications sent to the recipient for all alerts
generated within the specified number of minutes. After the specified
number of notifications have been sent, additional notifications are not
sent until the specified minutes have been reached. The maximum
number of minutes that can be set is 1440, which is the number of
minutes in a day.
Select this check box to enter the number of minutes that must be
reached before the notification limits are reset. When the time limit has
been reached, the number of notifications sent is reset to zero.
Select this check box to activate the option and configure the length of
time the recipient is available for notification.
Schedule
Select the days and times when notifications can be sent to the recipient.
For more information, see Scheduling Notification for Recipients on
page 154.
Click OK.
In the Group Name field, type the name of the group for whom you are configuring the notification.
Table 3-30
Item
Description
Select recipients from the All Recipients list, and then click Add to move
them to the Group Members list.
Select recipients from the Group Members list, and then click Remove to
move them to the All Recipients list.
Click OK.
The new group can be added to other groups.
On the Recipient Properties dialog box, under the Limit when notifications can be sent group box,
click Enable to activate the option.
Note: To access the Recipient Properties dialog box, click Recipients from the Tools menu. Click New to
create a new recipient or select an existing recipient and then click Properties.
2
Click Schedule.
Scheduling Notification
Item
Description
Clear the Include work days check box to exclude Monday through Friday from
8 A.M. to 6 P.M.
Include weeknights
Clear the Include weeknights check box to exclude Monday through Friday
from 6 P.M. to 8 A.M.
Include weekends
Clear the Include weekends check box to exclude Saturday and Sunday, 24
hours a day.
Note: You can select any combination of Include work days, Include weeknights, or Include weekends,
or click any single hour of the chart to select or clear that hour.
4
Click OK.
154
Click Properties.
Click OK.
Pager Configuration. Click Enable to activate or clear the notification method, and then select a
modem from the Configured Modems list
Click OK.
Removing Recipients
You can delete recipients that do not want to receive notification messages; however, the recipient is
permanently removed upon deletion. If you want to keep the recipient, but do not want the recipient to
receive notifications, clear the Enable check box in the recipient properties.
To remove a recipient
1
Select the recipient you want to delete, and then click Remove.
Click OK.
You can start the job after configuring the new recipients or edit recipient properties or select other
options from the Properties pane.
DLO Reports
DLO provides a variety of reports that show detailed information about your DLO operations. These reports
can be viewed from the DLO Console or generated and saved using the new report command (see -Report
command on page 179).
When you generate a report, you can specify filter parameters for the data that you want to include in the
report. The filters that are enabled are specific to each report.
You can use the DLO global settings to set the default report format. The default formats are only used by
the reports viewed from the console. See Changing Default Global Settings on page 35 for more
information.
If the default report format is set as PDF and Adobe Acrobat is installed on the system, reports are
displayed in Adobe Portable Document Format (PDF). If Adobe Acrobat is not detected, the reports are
displayed in HTML format.
All report formats can be saved and printed.
To view the list of available reports
DLO Reports
Report Name
Description
Active Alerts
Alert History
A list of alerts that have been sent by all computers in the past, sorted
by computer name.
A list of alerts that have been sent by all computers in the past, sorted
by Desktop Agent user name.
Failed Backups
A chronological list of computers that have a failed status for the last
backup.
156
Table 3-32
Report Name
Description
A list of computers that have a failed status for the last backup, sorted
by computer name.
Note: Only the last backup result is stored in the DLO database, so it is
only possible to report the last backup result for each desktop
computer and not a complete history of failed jobs.
A list of computers that have a failed status for the last backup, sorted
by Desktop Agent user name.
Note: Only the last backup result is stored in the DLO database, so it is
only possible to report the last backup result for each desktop
computer and not a complete history of failed jobs.
A chronological list of the last backup status for all Desktop Agent
computers.
A list of the last backup status for all Desktop Agent computers, sorted
by computer name.
A list of the last backup status for all Desktop Agent computers, sorted
by Desktop Agent user name.
This report shows the storage consumption used (in MB) per user on
the Network User Data folder.
No Backups
This report shows the machines that have not been backed up in the
past X days.
The value for days is specified using the days filter. Only those
machines whose last completed backup time is greater than X days are
displayed.
If no days filter is specified, all the cancelled and failed backup jobs are
displayed.
This report shows the status of all clients associated with a storage
location. The report provides the total number of backup successes,
warnings, cancellations, and errors for the associated clients.
Related Topics
Changing Default Global Settings on page 35
Viewing Report Properties on page 158
Running a Report on page 158
Running a Report
When you run a report, you can specify filtering criteria to determine which items will be included in the
report. After the report is generated, only the items that match the entered criteria appear in the report. If
no criteria are entered, all available entries are included in the report.
To run a report
1
In the Task pane, under Reports Tasks, click Run report now.
Select the appropriate filters for the data you want to include in the report from the following available
filters. Some of these filters are disabled depending on the report selected.
Table 3-33
Report Filters
Item
Description
Computer
Select this filter to create a report for a specific computer, and then enter
a desktop computer name.
User
Select this filter to create a report for a specific desktop user, and then
enter the users name.
Profile
Select this filter to create a report for a specific profile, and then enter a
profile name.
Days
Select this filter to create a report for a specific number of days, and then
enter the number of days.
Click OK to run the report. The report can be printed or saved before it is closed.
On the Reports pane, select the report for which you want to view properties.
158
Report Properties
Item
Description
Title
Description
Category
Alerts
Failed Jobs
Author
Subject
The version of the product for which the report was created.
Keywords
File name
The file name of the report template. Report templates are specified in
Report Definition Language (RDL) and are structured XML schemas that
specify the report definition.
File size
Creation Date
Click OK.
Two-node clusters are supported with DLO on Microsoft Windows Server 2003 Enterprise, Windows
Server 2008, and Windows Server 2008 R2 Enterprise.
DLO clusters can be installed on Windows Server 2003, 2008, and 2008 R2 majority node
configurations. However, there must be a shared disk in the configuration for DLO to share the database
files between the nodes.
The controlling node and designated failover nodes must be online when installing Admin DLO server
into the cluster.
During installation, a unique IP address and a unique network name for the Admin DLO server virtual
server is required.
During installation of DLO on the cluster node, the node that runs the installation must own the shared
disk.
Use the domain admin account for DLO services on all nodes in the cluster. If nodes in a cluster use DLO
and have different accounts, change the services to use the domain admin account.
Go to Start > Programs > Symantec > Symantec DLO > DLOCluster Configuration Utility.
In Symantec Cluster Configuration Wizard, click Next to create and configure a new Symantec DLO
cluster group.
160
In Type a unique name for the Symantec DLO cluster group, or use default - enter the required
name or use Symantec DLO (default name).
In Select a network adaptor card for this node, or use the default - select the public option.
Note: The private option is selected for using clusters internally.
In Change Location of Application Data, select a new location for Symantec DLO's application
data and click Next. The changed location is displayed on the Cluster Group Information window.
Click Next.
In Enter a name for the Symantec DLO virtual server or use the default - enter the required server
name or use DLOVRS (default name).
In Type the IP Address of the Symantec DLO virtual server - enter the virtual IP address.
In Type the subnet mask of the Symantec DLO virtual server - enter the subnet mask.
Click Next.
In Add or Remove Nodes, click Add to add the Nodes to the Symantec DLO cluster group.
Click Next.
10 In Summary, the summary of changes that are made to the cluster configuration are displayed.
11 Click Finish to exit from the wizard.
Unclustering DLO
To uncluster Symantec DLO:
1
Go to Start > Programs > Symantec > Symantec DLO > DLOCluster Configuration Utility.
In Add or Remove Nodes, select the nodes that must be removed from the cluster and click Remove.
The selected nodes are moved to Nodes not in the Symantec DLO cluster group.
Click Next. A warning message stating You have chosen to remove all nodes. Do you wish to remove the
data off the shared drive? is displayed.
Click Yes. A warning message stating Do you wish to make the data from the shared drive available for
use by this local node after removal of the cluster group? is displayed.
Click Yes.
In Ready to Configure the Cluster click Configure to apply the settings to the cluster configuration.
After the cluster is removed successfully, the Summary screen is displayed.
In Summary, the summary of changes that are made to the cluster configuration are displayed.
162
Chapter
Option
Description
C <computer>
N <user>
W <password>
-DB <dbname>
-DBInst <instance>
Specifies the name of the database data file on the remote server. The default
value is DLO.mdf
Specifies the name of the database log file on the remote server. The default
value is DLO_log.mdf
Commands in Detail
See the following topics for detailed information on available commands:
-AssignSL command
The AssignSL command is used to assign a new Storage Location to existing users when the existing
Storage Location is no longer available. The new Storage Location must be managed by the same DLO
Administration Server.
Caution: If the existing Storage Location is accessible, use the Move User command to move users to a
new Storage Location. See Moving Desktop Agent Users to a New Network User Data Folder on
page 113 for additional information.
Desktop Agent users can be assigned to new Storage Locations based on User account name, profile
name, profile ID, Storage Location, Storage Location ID, and File server.
The Desktop Agent that is being moved will be disabled until the administration server is notified that
the move is complete.
Note: This command does not move the users data. To assign a new Storage Location to existing users
and move the associated data, use the -MigrateDomain command on page 180.
Syntax:
DLOCommandu AssignSL NI [A | F | P | PI | S | SI | U]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
166
Command options
Table 4-2
AssignSL Options
Option
Description
NI <new SLID>
The -NI option is used to specify the name of the new storage location.
F <file server>
P <profile name>
PI <profile id>
S <SL name>
SI <SL id>
Assigns a new storage location to users with the given storage location ID.
U <user>
Examples:
DLOCommandu AssignSL NI DLO_SL02 A
DLOCommandu AssignSL NI DLO_SL03 U mmouse
-EnableUser command
The -EnableUser command is used to enable or disable a user. Users can be enabled or disabled by
All, file server (all storage locations), profile name, profile ID, storage location name, storage location
ID or username.
Use this command if you want to force the desktop computer to refresh from the DLO Administration
Server.
Syntax:
DLOCommandu -EnableUser [E | D] [A | F | P | PI | S | SI | U]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
Command options
Table 4-3
Option
Description
F <file server>
Enables or disables users with storage locations on the named file server.
P <profile name>
PI <profile id>
S <SL name>
SI <SL id>
U <user>
Enables or disables only the user with the specified user name.
Examples:
DLOCommandu EnableUser E A
DLOCommandu EnableUser D U mmouse
-ChangeDB command
This command is used to change the existing database to another DLO database.
Syntax:
DLOCommandu ChangeDB DBServer <DB Server Name> -DBInstance <DB Instance Name> -DBName
<DLO Database Name> -DBDataFile <DLO data file name> -DBLogFile <DLO log file>
168
Command options
Option
Description
DBServer
DBInstance
DBName
DBDataFile
DBLogFile
-ChangeServer command
The -ChangeServer command is used to reassign users to another DLO Administration Server.
Each desktop user must back up to a network user data folder that is managed by the same
administration server to which the user is assigned. If a matching automated user assignment is
available on the new DLO Administration Server, the user is automatically assigned a profile and
storage location. If a matching automated user assignment is not available, the user can be manually
configured.
When a Desktop Agent user is reassigned from one administration server to another, the users
current profile settings and existing backup files are not moved. They remain on the original file
server.
Syntax:
DLOCommandu ChangeServer M <DLO Administration Server> [ A | F <file server> | P
<profile name> | PI <profile id> | S <SL name> | SI <SL id> | SP <SL path> | U
<user> ]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
Command options
Table 4-4
Option
Description
F <file server>
M <DLO Administration
Server>
P <profile name>
PI <profile id>
S <SL name>
SI <SL id>
SP <SL path>
U <user>
Examples:
DLOCommandu ChangeServer M sunshine P Desktop*
DLOCommandu ChangeServer M sunshine SP \\moonlight\EngDept
DLOCommandu ChangeServer M sunshine SP \\moonlight\EngDept\EnterpriseMNoel
-KeyTest command
The -KeyTest command scans network user data to identify encrypted data that cannot be restored
with the current encryption key.
Syntax:
DLOCommandu KeyTest
Command options
The following options can be used independently or in combination.
Table 4-5
Option
Description
-f
The -f option forces a full scan for all users even if the data has already
been validated.
170
Table 4-5
Option
Description
-quar
-purge
Examples:
Check for unrestorable data that has not
previously been validated, or that was backed up
by an old version of the Desktop Agent:
DLOCommandu keytest
-ListProfile command
The -ListProfile command is used to list profiles of Desktop Agent users.
Syntax:
DLOCommandu ListProfile [A | P]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
Command options
Table 4-6
Option
Description
P <profile name>
Examples:
DLOCommandu ListProfile A
DLOCommandu ListProfile P <yourprofile>
-ListSL command
The -ListSL command is used to list the DLO storage locations.
Syntax:
DLOCommandu listsl [A | F | S]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
Command options
Table 4-7
Option
Description
F <file server>
S <SL name>
Examples:
DLOCommandu listsl A
DLOCommandu listsl F yourserver
DLOCommandu listsl S yourSL
-ListUser command
The -ListUser command is used to list by All, file server, profile name, profile ID, storage location
name, storage location ID, or user name.
Syntax:
DLOCommandu listuser [A | F | P | PI | S | SI | U]
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
172
Command options
Table 4-8
Option
Description
F <file server>
Lists settings for users with storage locations on the named file server
P <profile name>
PI <profile id>
S <SL name>
SI <SL id>
U <user>
Examples:
DLOCommandu
DLOCommandu
DLOCommandu
DLOCommandu
listuser
listuser
listuser
listuser
A
P yourprofile
U mmouse
U m*
-LogFile command
The -LogFile command allows administrators to change the path or name of the LogFile. And, since
every command overwrites the LogFile, to track all events (logs), you must change the path\name of
the next LogFile to retain older versions.
The default path is the \Logs folder under the installed path:
C:\Program Files\Symantec\Symantec DLO\Logs
If DLO was upgraded from a previous version, the original directory structure is used. The default path
for the \Logs folder in previous releases was:
C:\Program Files\VERITAS\NetBackup DLO\Logs
Syntax:
LogFile <path\file>
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
Command options
Table 4-9
Option
Description
<path>
<file>
Examples:
DLOCommandu logfile test.log
DLOCommandu logfile c:\test.log
-Update command
The -Update command is used to list, add, remove, and publish Desktop Agent updates. See Updating
DLO on page 41 for detailed information on updating the Desktop Agent software.
Syntax:
DLOCommandu update [list | add | remove | publish]
Subcommands:
The following subcommands allow you to list, add, remove or publish updates. See Command options on
page 175 for a description of the available options for each command.
Table 4-10
Sub Command
Description
174
Command options
Table 4-11
Option
Description
Updates all
F <file name>
U <user name>
P <profile name>
PI <profile id>
Designates to un-publish
UI <update id>
Note: Wildcard matches (*) are permitted in profile, Storage Location and user names.
Quotation marks are required around names if the name contains a space or colon.
Examples:
-EmergencyRestore command
The -Emergency Restore command uses the DLO administrators recovery password to restore user
data that would otherwise be unavailable if the DLO database is damaged or corrupted. The recovery
password must be known to execute this command. The data will be restored to the specified location
in the original data structure, but it will no longer be encrypted. See Setting a Recovery Password on
page 29 for more information.
Syntax:
DLOCommandu EmergencyRestore <usersharepath> -W <recovery password> -AP
<destination path>
Command options
Table 4-12
Option
Description
<usersharepath>
-W <recovery password>
-SetRecoveryPwd command
The -SetRecoveryPwd command is used to change the recovery password, which enables you to
retrieve encrypted data that would otherwise be lost if the DLO database is damaged or corrupted. The
-SetRecoveryPwd command now updates the password for existing users as well as new users.
Once set, this recovery password can only be changed using the DLO command line interface tools.
See Setting a Recovery Password on page 29 for more information.
Syntax:
DLOCommandu SetRecoveryPwd <password>
176
-NotifyClients command
The -NotifyClients command forces the Desktop Agents to refresh the profile settings immediately, or
the next time the Desktop Agent connects if it is offline.
Syntax:
DLOCommandu notifyclients
-InactiveAccounts command
The -InactiveAccounts command is used to list and delete accounts that have not been used in a
specified number of days.
computer name
computer ID
domain\user name
userID
-RenameDomain command
The -RenameDomain command is used after a Windows NT domain has been renamed. Running the
-RenameDomain command changes each Desktop Agent users record to reflect the new domain name and
changes the path for the network user data folder. It also notifies each Desktop Agent of the change.
Syntax:
DLOCommandu RenameDomain <OldDomainName> <NewDomainName>
-RenameMS command
The -RenameMS command is used when an administration server has been renamed. Running the
-RenameMS command updates the installation share, storage location paths and network user data folder
paths. It also notifies each Desktop Agent of the change.
Syntax:
DLOCommandu RenameMS <OldServerName> <NewServerName>
-LimitAdminTo command
The -LimitAdminTo command limits administration of DLO to the specified group or user.
Syntax:
DLOCommandu LimitAdminTo -NAU <domain\NewAdminName>
DLOCommandu LimitAdminTo -NAU <domain\NewAdminGroup>
Command options
Table 4-13
Option
Description
-NAU
-DAU
-L
The -L option lists all of the current DLO administrators and groups.
-IOProfile command
The -IOProfile command enables a profile to be exported from one DLO Administration Server, and
then imported to another administration server. An option is also provided to import global settings.
Note: When a profile is imported, it does not initially have any users assigned to it, so there is no immediate
impact. When global settings are imported, they immediately apply to all Desktop Agent users assigned to
the server.
To export a profile:
DLOCommandu C <master server name> -IOProfile -DBF <export file name> -E
<profile name>
This exports the requested named profile (-E) from the specified server (-C) into the named file (-DBF).
It is not necessary to specify the master server name with the -C option if the profile is on the same
server where the command is run.
178
To import a profile:
DLOCommandu C < server name> -IOProfile -DBF <export file name>
This imports the profile in the given file (-DBF) into the named server (-C.)
To import the console settings for DLO administrator account management in addition to the profile,
use the IPRCS option as follows:
DLOCommandu C < server name> -IOProfile -DBF <export file name> -IPRGCS
To import the global settings in addition to the profile, use the IPRGS option as follows:
DLOCommandu C < server name> -IOProfile -DBF <export file name> -IPRGS
-Report command
This command generates and saves one of the predefined DLO reports. To generate a report you must
specify the name of the .rdl file associated with the report.
For a list of all available reports and their corresponding .rdl file names, use the -ListReport command on
page 180 or use the file name available when selecting Reports > report_name > Properties from the DLO
Console UI.
Any filter criteria and the output path where the report is stored are optional.
The report format is also optional. By default the report is generated and saved in PDF. The default report
format in the DLO global settings is not used by this command.
Syntax:
DLOCommandu -Report -RDL <RDL File Name> [-O <Output Path>] [-FC <Computer
Name>] [-FU <User Name>] [-FD <Days>] [-T <PDF | HTML | XML | XLS>]
Command options
Table 4-14
Option
Description
The name of the .rdl file associated with the required report. Report
templates are specified in Report Definition Language (RDL).
An RDL file name is required.
-O <Output Path>
Examples:
DLOCommandU -Report -RDL DLOactiveevents_en.rdl -FD 3 -FC MyDesktop -O C:\DLOReports -T PDF
This sample command generates a report of the Active Alerts for the machine named MyDesktop in
the past 3 days and stores the report in C:\DLOReports folder.
For unique report identification, generated reports have a name which is the .rdl file name
appended by a time stamp. The time stamp includes year, day, month, hours and minutes.
In this example, if the command is executed at 10.28 AM on 25 July 2007, it generates the report file in
the folder C:\DLOReports, with the name as DLOactiveevents_en_200725071028.pdf.
-ListReport command
This command lists all of the reports available in DLO and the names of the corresponding RDL files.
The command does not accept any options.
Use this command to determine the RDL file name used as input to the -Report command on
page 179.
Syntax:
DLOCommandu -ListReport
-MigrateDomain command
This command is used to migrate a user from an old domain to a new domain in trust.
Syntax:
DLOCommandu -MigrateDomain -OD <OldDomainName> -ND <NewDomainName> -U <UserName>
180
Command options
Table 4-15
Option
Description
-OD
-ND
-U
-ChangeProfile command
This command is used to change the profile assigned to the user(s). Here multiple users can be assigned
with the same profile.
Syntax:
DLOCommandu -ChangeProfile -NP|-NPI [-A|-F|-P|-PI|-S |-SI|-U]
Note: Wildcard '*' match is permitted in profile, storage location and user names.
Quotations around name are required if name contains a space or colon
Command options
Table 4-16
Options
Descriptions
-NPI <new SL path> Fully qualified UNC path to new network user data folder
-A
-F <file server>
-P <profile name>
-S <SL name>
-U <user>
Examples:
-MigrateUserSL command
This command migrates an existing DLO user's NUDF from one storage location to another location. Users
are moved to the new storage location along with their data. A storage location should be a CIFS-based
network user data folder. A CIFS-based network user data folder can be present on a Windows server and
on certified NAS devices that support CIFS.
Users are disabled during a migration until the client computer is notified that the migration is complete.
On successful migration, the DLO client automatically restarts, the user is enabled and their profile is
updated to point to the new storage location. Users data is not deleted from the old storage location. This
deletion of data needs to be done manually.
The command also monitors and reports on the progress of the migration (the Migration status report).
The command logs the operation updates and progress in a log file and also displays the progress in a
command window.
The following user status is used to show users NUDF migration to a new storage location.
Data Migration in
progress
This message shows the status of the user when the usersNUDF
migration to a new storage location is in progress.
In case the migration process is specifically interrupted, the user
status remains as Data Migration in Progress.
See What happens if the migration process fails or is interrupted? on page 183. On successful migration the user is enabled
and their profile is updated to point to the new storage location.
Users data is not deleted from the old storage location. This deletion of data needs to be done manually.
Desktop Agent users can be migrated to new network storage locations based on the following filter
options:
Profile name
Profile ID
Storage location
Storage location ID
A new network storage location (the -NI or -NP options) and one of the eight filter options for the user must
be specified.
Syntax:
DLOCommandu -MigrateUserSL [-NI <new SL id>|-NP <new SL path>] [-A|-F <file server>|-P
<profile name>|-PI <profile id>|-S <SL name>|-SI <SL id>|-U <user>|-UF <text file path>]
182
Note: Wildcard '*' match is permitted in profile, Storage Location, and user names.
Quotations around name are required if name contains a space or colon.
To get a list of all s use the -ListSL command.
Command options
Table 4-17
Options
Descriptions
-A
All users
-F <file server>
-P <profile name>
-S <SL name>
-U <user>
Examples:
The following examples show you how to use the command options:
DLOCommandu -MigrateUserSL -NI DLO_SL02 -A
DLOCommandu -MigrateUserSL -NI DLO_SL03 -U SUS\mmouse
Case 1
Migration process fails due to issues such as data size mismatch on the source and destination
administration servers.
If the migration process fails due to issues like network outage, the partially migrated files are deleted from
the new storage location. Any new backups are stored in the original storage location. All the data needs to
be recopied again.
The migration procedure must be followed again to migrate the NUDF to another storage location.
Case 2
Migration process is specifically interrupted.
If you interrupt the migration process with a kill command or a system shutdown, the user status appears
as Data Migration in Progress. The status of the computer user is also disabled. The partially migrated files
remain on the new storage location.
In this case, this user and the respective computers must be enabled using the DLO Administration
Console. The partially migrated files should also be removed from the new storage location.
The migration procedure must be followed again to migrate the NUDF to another storage location.
-MigrateUser command
This command migrates single or multiple users from one Administration Server to another
Administration Server. The users data can now be accessed from the destination Administration server.
All user-specific settings such as customized backup selection and policies are migrated along with the
user.
The command also monitors and reports on the progress of the migration (the User Migration Status
Report). The command logs the operation updates and progress in a log file.
The user that is migrated is disabled until the client computer is notified that the migration is complete.
Upon successful migration, the DLO client automatically restarts and connects to the new Administration
Server.
The following status messages for the user have been added with respect to user migration:
User Migrated
User Migration in
progress
184
Administrative
Rights
DLO Versions
Shared Clients
The user that is migrated must not share the client computer
with any other user.
Storage Locations
Profile
-MigrateUser command
Migrating Users across Administration Servers
Review the previous section before starting the migration process:
To migrate users across Administration Servers
1
On the destination administration server, configure the same storage location that is present on the
source administration server. The name of this storage location must be exactly the same as the storage
location on source administration servers. For example, the storage location name on the source
administration server is storage1. The destination server must also contain a storage location with the
name storage1.
On the destination administration server, create the same profile for the user. The profile can be
migrated to the destination server with the -IOProfile command. The profile name must be exactly
the same on both the source and the destination servers. For more information about using the
-IOProfile command, see -IOProfile command on page 178.
3
Wildcard '*' match is permitted in profile, Storage Location, and user names.
Quotations around name are required if name contains a space or colon.
To get a list of all s use the -ListSL command.Command options
Migrate User Command Options
Options
Descriptions
-M <media server>
-A
-F <file server>
-P <profile name>
-S <SL name>
-U <user>
-UF <text file path> Migrate users listed in the given text file.
Descriptions
-DBInstance <DB
instance>
Default: DLO
-DBName <DB
name>
Default: DLO
-DBDataFile <DB
data file>
Default: DLO.mdf
Default: DLO_log.mdf
186
Case 1
Migration process fails due to issues such as network outage.
In a multiple-user migration process, only one user is migrated at a time.
A rollback operation occurs if the migration process fails due to the following issues:
Network outage
Migrated users are not affected. These users are successfully migrated to the destination
administration server. The status for these users appears on the source administration server as User
Migrated.
Users that are not migrated still exist on the source administration server. See the migration procedure
in the preceding sections to migrate these users to the new administration server.
Users that were in the process of migration are affected. A rollback operation follows and the particular
user on the source administration server rolls back to its previous status (Enabled/Disabled). Also, the
user profile points only to the source administration server.
The migration procedure must be followed again to migrate this user to the new administration server.
Case 2
Migration process is specifically interrupted:
In a multiple-user migration process, only one user is migrated at a time.
If the migration process is specifically interrupted say by issuing a kill command or system shutdown, the
following takes place:
Migrated users are not affected. These users are successfully migrated to the destination
administration server.
Users that were not migrated still exist on the source administration server. See the migration
procedure to migrate these users to the new administration server.
Users in the process of migration are affected. The status for this particular user appears on the source
administration server as User Migration in Progress. The computers and the users of those computers are
also disabled. The user and the respective computers for that user must be enabled on the source
administration server by using the DLO Administration Console. Then, migrate the user with the migration
procedure.
-ListMachines command
This command lists all the DLO Agent machines that are connected to the DLO Administration Console.
Syntax:
DLOCommandu -ListMachines |-v | -v <product version>
If you do not specify any parameters, by default, all machines connected to the current DLO Administration
console is displayed at the command prompt.
To store the list in a file, provide a file name when you run the command.
DLOCommandu -ListMachines <file path>
Example
Optional parameters
Options
Descriptions
-V
-V <product version>
188
Note: The default DLO Administration Console installation directory for Symantec DLO version 7.0 and
later is
C:\Program Files\Symantec\Symantec DLO.
If Symantec DLO was upgraded from a previous version, the original installation directory is used. The
default installation directory for previous releases was C:\Program Files\Symantec\NetBackup
DLO.
Server
-server <computername>
Use this command to specify the computer on which DLO command-line functions will take affect. You
must have sufficient privileges on the specified computer to perform functions remotely.
Example
Verbose
-verbose
Use this command to turn on verbose mode and display additional detail when DLO command-line
operations are performed.
Example
Check database
-check
This command performs a consistency check of the DLO database. If there are any consistency errors, you
should run the Repair Database command. See Repair database on page 190.
Backup database
-backup -dir <backup directory>
This command allows you to back up the DLO database to a specified directory.
Example
IDR
This command copies and recovers DLO Intelligent Disaster Recovery (IDR) MSDE database files.
-setupidr
Makes a copy of the MSDE database files.
Example
DLODBUtils -setupidr
-idr
Restores the MSDE database files saved with the -setupidr command. The computer must be restarted
following the execution of this command to make the changes effective.
Example
DLODBUtils -idr
Restore database
-restore -databasefile
This command restores the database from a specific backup file.
Example
Routine Maintenance
The following commands are used to perform routine maintenance. The options outlined in Command
Line Options on page 189 may be used with these commands.
Compact database
-compact
Compresses the database by removing a databases unused space.
Example
DLODBUtils -compact
Rebuild index
-rebuildindex
Rebuilds the index for the DLO database.
Example
DLODBUtils -rebuildindex
Repair database
-repair
Repairs the DLO database
Example
Groom alerts
-groomalerts days
DLODBUtils -repair
190
DLODBUtils -groomalerts 5
Database Management
Attach database
The attach command makes the DLO database available to the database engine.
Note: Exclusive database access is required to run the -attach command. Stop the DLO Administration
Service before running this command and then restart the services after running the command.
-attach -datafile <database file name> -logfile <database log file name>
Example
Detach database
Note: Exclusive database access is required to run the -detach command. Stop the DLO Administration
Service before running this command and then restart the services after running the command.
Use this command to detach the database.
Example
DLODBUtils -detach
License Management
These command-line tools enable license management from the command line.
List licenses
-list
Lists current DLO licenses.
Example
DLOLicenseCLI.exe -list
Add licenses
-add <license key>
Adds the specified license key.
Example
Delete licenses
-delete <license key>
Deletes the specified license key.
Example
Syntax
DLOLoggingu -E <DLO component Executable name> [Options [-L | -LS]]
Note: In a distributed DLO environment, the DLO Logging command-line tool will be deployed in each
machine where individual DLO component is installed.
Table 4-18
Options
-E
DLOLoggingu options
Descriptions
This option is used to specify the DLO components executable name for which
logging is to be enabled.
Example To enable logging for DLO console component, specify
DLOConsoleu.exe as parameter for the -E option.
DLOLoggingu -E DLOConsoleu.exe
-L
Note: It is mandatory to specify the DLO components executable name. Else, the
command execution will not proceed.
This option is used to specify the logging level with which the logging should be
enabled. Specify one of the following parameters along with the -L option.
Verbose (V): In this level, all Errors, Warnings, Traces and Function Entry/Exit
traces are printed.
Common (C): In this level, only Errors, Traces and Warnings are printed to the
log file.
Disable (D): In this level, all warnings and errors are printed to log files. This
value is set as default if no logging is specified in the command line.
If you do not specify any parameter for this option, then by default logging level is
set to Disable, that is D.
Example: DLOLoggingu -E DLOConsoleu.exe
192
Note: After you run the DLOloggingu command, for the new changes to take effect, ensure that you
restart or relaunch the DLO console, DLO client and the DLO services for which logging is enabled.
Example
To enable verbose logging for DLO Administration service, run the following command:
DLOLoggingu E DLOAdminsvcu.exe L V LS 20
After executing this command, restart the DLO administration service for the new changes to take
effect.
Chapter
Your profile determines the level of interaction between you and the Desktop Agent. The administrator
may also configure the Desktop Agent to run without a user interface, with a fully functional user interface,
or somewhere in between.
Data Protection: Selected files on the desktop are automatically copied to user data folders on the
desktops local drive and on the network. The Desktop Agent can be configured so that no user
interaction is required. Files are protected automatically when the desktop is online or offline.
Data Availability: A user can access data from multiple desktops in multiple locations if they are using
the same login credentials on each desktop. Users can also restore previous file revisions, even when
the desktop is offline, if they are saving at least one file revision in the desktop user data folder.
Synchronization: A user that accesses multiple computers with the same login credentials can
configure folders to be synchronized on each of the computers. When a synchronized file is changed on
one computer, the updated file is copied to the network user data folder and also to the desktop user
data folder on all other computers that are configured for synchronization.
Item
Description
Operating System
Processor
Pentium system
Memory
Internet Browser
Disk Space
Table 5-1
Item
Description
Other Hardware
From the desktop on which you want to install the Desktop Agent, browse to the network server where
the installation files for the Desktop Agent are stored. The default location is \\<DLO
Administration Server name>\DLOAgent. If you are unsure of the location, contact the
administrator.
Read the license agreement, and then click I accept the terms in the license agreement.
Click Next.
To change the location on the desktops local drive where the Desktop Agent will be installed, click
Change and enter the alternate location, then click OK.
To install the Desktop Agent in the default location, continue with step 7.
The default installation location is C:\Program Files\Symantec\Symantec DLO\DLO.
Click Next.
Click Install.
196
You can only use a set of domain credentials with one local account. If you use more than one local
account on a desktop or laptop computer, you should either disable DLO for other accounts or have
unique domain credentials for each account. See To log on with alternate credentials or to disable
accounts on page 198 for additional information.
Example
Multiple users of the same desktop computer can all use DLO, but must provide unique credentials for
the desktop computer and unique domain credentials for connection with the Desktop Agent.
DLO does not support the Fast User Switching feature of Windows XP.
When you are logged on to the desktop computer with an account that is not recognized by the Desktop
Agent, the Alternate Credential dialog box will appear.
198
Alternate Credentials
Item
Description
Select this option to enable the Desktop Agent to run when you are using
the account under which you are currently logged on.
User name
Enter the user name for an account that is authorized for Desktop Agent
operation.
Password
Enter the password for the account to be used for Desktop Agent
operation.
Domain
Type the domain for the account to be used for Desktop Agent operation.
Save my password
Select this option to have DLO save and use this password in the future to
automatically authenticate to the media server or storage location in the
event of an authentication failure.
Note: This option will only appear if the DLO administrator has enabled
this option. On newly-deployed Desktop Agents, this option will not show
until the second time the Desktop Agent connects to the media server.
Select this option to prevent the Desktop Agent from running when you
are using the account under which you are currently logged on.
Click OK.
If you want to reset any information dialogs suppressed by the Dont show me this message again
check box, click Reset dialogs.
If you want to clear any passwords and account information that the Desktop Agent has stored, click
Reset accounts.
Click OK.
Files are not transferred to the network user data folder. Pending files remain in the pending files list
with a status of Pending network
Job logs are not copied up to the network user data folder
Click the connection status on the lower right corner of the Desktop Agent.
Note: The DLO Administrator sets a maximum time after which the Desktop Agent will automatically be
returned to the online mode, assuming a network connection is available.
From the Windows system tray, right-click the Desktop Agent icon.
Click Disable. This option will be grayed out if you do not have permission to take this action.
From the Windows system tray, right-click the Desktop Agent icon.
Click Enable. This option will be grayed out if you do not have permission to take this action.
200
Display the complete interface: Enables desktop users to access all Desktop Agent options
Display only the status: Enables desktop users to view the status of backup jobs, but they cannot change
Desktop Agent settings or access options other than status. Desktop users can right-click the system
tray icon to open the status view or exit the program
Display only the system tray icon: The desktop user sees only the Desktop Agent icon in the system tray
in the lower right corner of the screen. Desktop users can right-click the system tray icon to exit the
program
Do not display anything: The Desktop Agent runs in the background. The desktop user cannot view the
Desktop Agent
Figure 5-1
Views menu
Tools Menu
Tasks menu
Task bar
Menu bar
Status bar
Connection Status
202
Item
Description
Menu bar
The menu bar appears across the top of the screen. To display a menu, click the
menu name. Some menu items are not available until an item is selected from
the console screen.
Tasks bar
The Tasks bar appears on the left side of the Desktop Agent Console. To hide the
Tasks bar, from the View menu, select Tasks bar. Actions are initiated from the
Tasks bar, and these actions vary with the selected view.
Views menu
The Views menu appears in the Tasks bar and enables you to navigate to the
following views:
Status
Provides job status, lists pending jobs, and summarizes recent backup activity.
See Viewing the Desktop Agent Status on page 226 for additional information.
Backup
Selections
Enables you to define what data is protected by the Desktop Agent. See Using
the Desktop Agent to Back up Your Data on page 204 for additional
information.
Synchronized
Selections
Enables you to configure the Desktop Agent to maintain a users selected files
and folders on multiple computers so that the most recent backed up version is
always available to the user. See Synchronizing Desktop User Data on
page 222 for additional information.
Restore
Enables the user to restore backed up data and search for backed up files. See
Restoring files using the Desktop Agent on page 231 for additional
information.
History
Tasks menu
Actions are initiated from the tasks menu. These actions vary with the selected
view.
Tools menu
Options
Reset dialogs that have been suppressed by the Dont show me this
message again check box
Clear passwords and account information that the Desktop Agent has
stored. See Resetting Dialog Boxes and Account Information on page 199
for additional information
Note: To ensure that you have the latest status and settings at any time while using the Desktop Agent,
from the Tasks menu, click Refresh.
Managing Revisions
Revisions are versions of a file at a specific point in time. When a file is changed and backed up, DLO stores
a new revision. DLO stores and maintains a specific number of revisions for all files in a backup selection.
Because each backup selection is configured separately, the number of revisions retained can vary for
different backup selections.
When the number of revisions is exceeded, DLO removes the oldest revision, maintaining only the specified
number of revisions in the desktop and network user data folders.
You can limit the number of revisions DLO retains in a given period of time. If you are working on a
document and backing it up frequently, all of your revisions could potentially be just a few minutes apart.
204
By specifying that you want to retain only 2 revisions every 24 hours, at least 120 minutes apart, you can
retain older revisions for a longer period of time. While some intermediate versions will not be retained, it
does support situations in which returning to an older revision is needed.
Another consideration in determining the number of revisions to retain is the amount of storage space
required to store the data. The amount of space required for backups can be estimated by multiplying the
number of revisions retained by the amount of data protected.
Example
Although compression can improve the space utilization, it varies significantly with file type and other
factors.
File Grooming
The Desktop Agent grooms revisions based on backup selection settings and does this as new revisions are
created. The oldest revision is deleted when a new revision is created that exceeds the limit.
Maintenance grooming is the grooming off of deleted files. It occurs at most once every 24 hours.
Maintenance grooming occurs during the first backup that runs after 24 hours have passed since the last
maintenance grooming.
Note: Profile backup selections are those that were specified by the DLO administrator in your profile. You
cannot modify profile backup selections in the Standard view. You can only modify the backup selections
that you create on the Desktop Agent. Profile backup selections are displayed in the Standard view with
gray check boxes. They can be modified in the Advanced view if the administrator has granted you
sufficient rights. See Modifying Backup Selections in the Advanced View on page 211 for additional
information.
When you create new backup selections in the standard view, the default backup selection settings are
used. When you add new sub folders and files to the backup selection using the standard view, these new
backup selections will have the same settings as the main folders.
Figure 5-2
Standard view
In the Desktop Agent Backup Selection Standard view, files and folders are represented in a tree view
where users can select or deselect files and folders for backup. When the check box next to a file or folder is
grayed out, the selection was defined by the administrator and can only be changed if the administrator has
granted this right in the profile definition. When a red 'X' appears in the check box next to a file or folder,
this item has been globally excluded from all backups by the administrator and cannot be selected.
To modify backup selections in the backup selections standard view
1
Under Views in the Desktop Agent Tasks Bar, click Backup Selections.
206
Note: To return to the last saved settings at any time, click Undo changes.
4
Click Save changes to save the new settings or Undo changes to return to the last saved settings.
After clicking Save, previously backed-up selections that were not selected are treated like deleted
backup selections and will no longer be backed up. The backup files for this selection will be deleted
after the number of days specified in the backup selection settings. The source files for the deleted
backup selection will not be deleted by the Desktop Agent.
Selected folders that were not previously selected are added to the backup selections for this desktop.
Under Views in the Desktop Agent Tasks bar, click Backup Selections.
Click Add.
From the General tab in the Backup Selection dialog box, select the appropriate options as described in
the following table.
Table 5-4
Item
Description
Name
Description
Folder to back up
Type a folder name
Select this option to add a specific folder to the backup selection. Type the
path to the folder, including the folder name. For example, to add a folder
named MyData on drive C, type C:\MyData.
Note: Once a backup selection is created, the folder cannot be modified.
Select a pre-defined
folder
Select this option to choose a pre-defined folder from the list provided.
Select this option to also back up all sub folders in the specified directory.
This option is selected by default.
From the Include/Exclude tab, select the appropriate options as described in the following table.
Table 5-5
Item
Description
Select this option to include all file types in this backup selection.
Select this option to include or exclude only specific files or file types.
To add a filter to the Include/Exclude list, verify that you selected Include and exclude only the items
listed below in step 5, and click Add Include or Add Exclude.
If you selected Add Exclude, you will be notified that all previously backed up files matching this
exclude will be deleted from this backup selection. Click Yes to continue or No to cancel.
Item
Description
Filter
Type the name of the file or the folder, or a wildcard description of the file
or folder that you want to include or exclude from backup selections.
For example, type *.mp3 to either include or exclude all files with the file
extension .mp3 in this Backup selection, or type unimportant.txt to
include or exclude all files in the backup selection with this specific file
name.
Click Extensions to select a predefined filter to either include or exclude all
files with a given file extension.
Description
Apply to
Files and Folders to apply this filter to both files and folders
Click OK.
10 From the Revision Control tab, select the appropriate options for both the Desktop and network user
data folders as described in the following table.
208
Item
Description
Number of Revisions
desktop user data folder
Type the number of revisions to keep in the desktop user data folder for each
file in the backup selection.
Note: When Outlook PST files are backed up incrementally, only one revision
is maintained regardless of the number of revisions set in the backup
selection.
Limit to
Check this option to limit the number of revisions retained in a given amount
of time, and specify the following:
Within the last x hours: Select the time period during which you want to
retain the versions.
At least x minutes apart: Select the minimum amount of time that must
elapse between backups in this backup selection.
Note: The oldest revision is deleted when a new revision is created that
exceeds one of these limits.
Select the number of revisions to keep in the network user data folder for each
file in the backup selection.
Limit to
Check this option to limit the number of revisions retained in a given amount
of time, and specify the following:
Within the last x hours: Select the time period during which you want to
retain the versions.
At least x minutes apart: Select the minimum amount of time that must
elapse between backups in this backup selection.
Note: The oldest revision is deleted when a new revision is created that
exceeds one of these limits.
Revision Age
Enter the number of days after which all revisions in the desktop user data
Discard all revisions in the
desktop user data folder older folder will be deleted.
than
Note: The latest revision will not be discarded.
Enter the number of days after which all revisions in the network user data
Discard all revisions in the
network user data folder older folder will be deleted.
than
Note: The latest revision will not be discarded.
11 From the Options tab, select the appropriate options as described in the following table.
Table 5-8
Item
Description
If you choose Delta File Transfer, each time a file is backed up, only the part of
the file that has changed is transferred and stored in the network user data
folder. In addition, Delta file transfer uses compression. Enabling this option
requires that the DLO administrator has installed and configured a
maintenance server.
Compression
When you select compression, each time a file is backed up, files in this backup
selection will be compressed for data transfer over the network and for storage
in the Desktop and network user data folders.
This affects files created after this feature is activated. Previously stored files
will not be compressed.
Delta File Transfer also uses compression.
Encryption
Check this option to encrypt files for transfer and to store files from this
backup selection in an encrypted format in the network user data folder.
This affects files transmitted and stored after this feature is activated.
Previously stored files will not be encrypted.
The AES (Advanced Encryption Standard) and a 128 bit key length are used. If
enabled, versions are stored without encryption in the desktop user data folder,
and encrypted in the network user data folder. Transfer over the network is
encrypted.
When source files are deleted, delete the backed up files from the
desktop user data folder
after
Indicate the number of days after which DLO will delete all file versions from
the desktop user data folder after the source file has been deleted from the
desktop. The default setting is 60 days.
Indicate the number of days after which DLO will delete all file versions from
the network user data folder after the source file has been deleted from the
desktop. The default setting is 60 days.
210
Under Views in the Desktop Agent Tasks bar, click Backup Selections.
Select the backup selection you want to change, and then click Modify.
Profile backup selections are those set by the DLO administrator. If the backup selection is a profile
backup selection, and if the user has been granted sufficient rights, it can be modified by selecting Use
custom selection in the drop-down menu. Once this option is selected, your backup selection will no
longer be updated when the administrator updates the profile backup selection.
You can return to the profile backup selection settings at any time by selecting Use Profile selection in
the drop-down menu. Once you select this option, your profile will be updated if the DLO administrator
modifies the profile backup selection.
Modify the backup selection properties as needed. For detailed information on backup selection
settings, review the instructions for setting up a backup selection beginning with step 4 on page 207.
Click OK.
Under Views in the Desktop Agent Tasks Bar, click Backup Selections.
Click Remove.
Click Yes to verify that you want to delete this backup selection, or click No to cancel.
Some of the DLO options are not used, even if they are enabled. These options include Delta File
Transfer, Compression, and Encryption.
DLO relies on Microsoft's Messaging Application Programming Interface (MAPI) code to perform the
actual backup of PST files. Using MAPI does not allow the use of these DLO options during an
incremental backup.
This is a limitation of the way the incremental backups are performed and is normal behavior for
backups of Outlook *.pst files . This limitation only applies to incremental backups and does not
apply to non-incremental PST backups.
When Outlook PST files are backed up incrementally, only one revision is maintained regardless of the
number of revisions set in the backup selection.
When you restore Microsoft Outlook PST files, the restored PST file will differ from the original PST file
as explained in Restoring Microsoft Outlook Personal Folder Files on page 234.
When a DLO profile is configured to limit the bandwidth usage during data transfer to the network user
data folder, bandwidth is not limited during the incremental transfer of PST files.
Related topics
Setting Customized Options on page 217
212
Note: If you do not intend to use Outlook as your default mail application, you can disable the warning
message about incremental backups in the Desktop Agent selecting Settings in the Views menu and
deselecting enable incremental backups of Outlook PST files in the Options tab.
An application such as DLO or Microsoft Outlook detaches from the PST, such as when Outlook is
closed
DLO startup
When the PST is closed DLO does one of the following. If the PST is being handled incrementally by MAPI
(see section on incremental PST) DLO determines if the PST has been backed up in its entirety. If it has
already been backed up then the entry is simply removed from the Desktop Agent pending queue because
DLO knows the PST is in sync. If the PST is not being handled incrementally, the PST will be backed up in
its entirety at this time.
Related topics
Restoring Microsoft Outlook Personal Folder Files on page 234
File Name
Location
Description
BOOKMARK.NSF
Notes\Data directory
NAMES.NSF
Notes\Data directory
A_<name>.NSF
When a file is backed up incrementally, there is no progress indicator in the Desktop Agent Status view,
and only one revision is retained.
Note: When a DLO profile is configured to limit the bandwidth usage during data transfer to the network
user data folder, bandwidth is not limited during the incremental transfer of Lotus Notes NSF files.
Lotus Notes must already be installed before the Desktop Agent is installed. If Lotus Notes is installed after
the Desktop Agent, you must run the Desktop Agent installer again to repair the installation. Additionally,
if Lotus Notes is open during the Desktop Agent installation, Lotus Notes must be restarted.
Lotus Notes email files can only be backed up incrementally with DLO if the e-mails have been archived.
Once emails are archived, the resulting archive file can be backed up incrementally. See the Lotus Notes
documentation for information on archiving e-mails.
To configure the Desktop Agent for incremental backup of Lotus Notes files
1
Verify that Lotus Notes was installed before the Desktop Agent was installed, or that the Desktop Agent
installer was run again after Lotus Notes was installed to repair the installation.
Verify that the Lotus Notes NSF files to be backed up have been selected in the appropriate backup
selection. See Using the Desktop Agent to Back up Your Data on page 204 for additional information
on backup selections.
Check Enable message level incremental backups of Lotus Notes email files.
Click OK.
214
The DOS-window cannot be closed without manually exiting the DLO process. If you configure the current
user for Lotus Notes, the errors are no longer generated at login for that user.
Logging level
Bandwidth usage
The Desktop Agent will continue to use settings specified in the profile until you specifically elect to use
customized schedules or options as described in Changing Backup Job Schedule Options on page 215 and
Setting Customized Options on page 217.
You can change Desktop Agent settings and backup selections when you are working offline. The settings
will be stored until you are once again working online, at which time they are automatically transferred. If
the administrator has also made changes that conflict with the changes made on the Desktop Agent, the
changes made by the administrator will be used.
Note: Changing settings on one Desktop Agent causes settings to be loaded on other Desktop Agents that
use the same authentication. This will cancel and restart any running jobs.
In the Symantec DLO Desktop Agent window, under Tools, click Options.
Select the appropriate options as described in the following table and then click OK.
Table 5-10
Item
Description
Select Use Profile schedule from the drop-down menu to use the scheduling
options specified in the profile.
Note: If this option is selected, additional settings on the Schedule tab cannot
be modified.
Select Use custom schedule from the drop-down menu to specify a customized
schedule that differs from the profile schedule.
Run jobs:
Whenever a file changes
According to a schedule
Select this option to back up files according to a schedule. The default is to run
a backup at 11:00 P.M. every Monday, Tuesday, Wednesday, Thursday, and
Friday.
Click Modify... to change this default.
Manually
Logout/Restart/Shutdown options
Do nothing
Select Do nothing from the drop-down menu to proceed with a logout, restart
or shutdown even when there are files that require backup.
Note: If a job is already running, a prompt asks if the user would like to logout,
restart or shutdown when the job is complete.
Select Prompt user to run job from the drop-down menu to have DLO ask if a
backup should be run before proceeding with the logout, restart or shutdown.
Note: If a job is already running, a prompt asks if the job should be cancelled in
order to continue with the logout, restart or shutdown.
216
Table 5-10
Item
Description
Select Run job immediately from the drop-down menu to back up waiting files
without prompting before proceeding with a logout, restart or shutdown.
Note: If a job is already running, a prompt asks if the job should be cancelled in
order to continue with the logout, restart or shutdown.
Select Run job as scheduled from the drop-down menu to proceed with a
logout, restart or shutdown and back up files according to the schedule.
Note: If a job is already running, a prompt asks if the job should be cancelled in
order to continue with the logout, restart or shutdown.
Select Run job at next login from the drop-down menu to proceed with a
logout, restart or shutdown without prompting, and run a job the at the next
login.
Note: If a job is already running, a prompt asks if the job should be cancelled in
order to continue with the logout, restart or shutdown.
Select the appropriate options as described in the following table and then click OK.
Table 5-11
Item
Description
Select Use Profile options from the drop-down menu to use the scheduling
options specified in the profile.
Note: If this option is selected, additional settings on the Schedule tab cannot be
modified.
Table 5-11
Item
Description
Use customized options Select Use customized options from the drop-down menu to specify a
customized schedule that differs from the profile schedule.
Note: This option must be selected to enable access to additional settings on the
Options tab.
Select Limit disk space usage on my computer to, to limit the amount of space
used on the computer to store backup files.
%
Select % to enter a percentage of the hard disk space that can be used to store
backup files.
MB
Select MB to enter the maximum number of megabytes of disk space that can be
used to store backup files.
Specify the minimum number of days to keep log files. Log files will not be
deleted until they are at least as old as specified.
Note: Log grooming occurs each time a log is created. Log files will not be deleted
until the minimum age has been reached and, when the combined size of all log
files, is also reached.
After minimum number of Enter the maximum combined size of all log files to be retained before the oldest
days, delete oldest log files log files are deleted.
when combined size
Note: You may have more than the specified number of MB of log files stored if
exceeds
none of the log files are as old as specified in the Keep log files for a minimum of
(days) setting.
Logging options
Log groom messages
Log information messages Select Log information messages for backup to create logs for all backup
for backup
operations.
Log warning messages
Select Log warning messages to create logs for all operations that generate
warnings.
218
Table 5-11
Item
Description
Click Move.
Figure 5-3
Settings
In the Browse for folder dialog box, choose a new location for the desktop user data folder.
Click OK.
Click OK.
220
all backups to the network user data folder. The second policy will be used because it is more restrictive to
limit all backups than just backups of large files.
To customize connection policies
1
Under Tools in the Desktop Agent Tasks bar, click Settings, and then click the Connection Policies tab.
Select the appropriate options as described in the following table and then click OK .
Table 5-12
Item
Description
Connection Type
Dialup
Select Dialup from the drop-down menu to limit or disable backups when using
a dialup connection.
IP address range
Select IP address range from the drop-down menu to limit or disable backups
for a specific IP address range.
Specify whether you want the connection policy to apply to computers that are
or are not in the IP address range you specify.
Select IPv6 or IPv4 and enter the IP address range for the connection policy.
Note: IPv6 addresses are only supported on Windows XP and later operating
systems and will not be enforced for Desktop Agents running on Windows
2000. An additional connection policy using IPv4 addresses may be desired for
Desktop Agents on Windows 2000 computers.
Active Directory
Select Active Directory from the drop-down menu to limit or disable backups
using Active Directory. Select Configure to configure the Active Directory
settings. See step 3 on page 222 for details on configuring connection policy
settings for Active Directory.
Select Disable network backup for files greater than to prevent users from
backing up files larger than a specified size based on the connection type. Enter
a file size in KB.
Limit network bandwidth Select this option and enter a value in KB/sec to restrict the usage of network
bandwidth to the specified value.
usage to
Enforce policy according
to scheduled window
If you selected Active Directory in step 2 above, configure the Active Directory settings as described in
the following table and click OK.
Table 5-13
Item
Description
Object
Select the Active Directory Object you want to use to configure the
connection policy. You can select either Computer or User.
In LDAP Directory
Select this option to apply the connection policy to all objects in this
directory.
Select this option to apply the connection policy only to those objects
in the directory that match the specified criteria.
Attributes
Condition
Value
222
By synchronizing backed-up data, you can work on a file on any of your desktops with the assurance that
you are working on the most recent version.
The Synchronized Selections view displays folders backed up on your other desktops that are available for
synchronization. Select any of these folders that you want to synchronize with the current desktop
computer.
Figure 5-4
Note: If you customize NTFS permissions or folder attributes for compression or encryption, you must
reapply these settings after restoration or synchronization.
Makes synchronized files available to the other computers with which the desktop is synchronized
Downloads synchronized files that were changed on another computer and uploaded since the last DLO
job ran
Retains all conflicting versions of files. You can then choose which version to use
When you back up files, you can set various filters, such as which types of files to include, exclude,
compress or encrypt. When you synchronize files between computers, the filters are combined. For
example, if one of the synchronized files is compressed and encrypted, all synchronized files will be
compressed and encrypted automatically. If the original backup selection backed up only .jpg files, the
synchronized file set will include only.jpg files.
If the settings for a synchronized folder are changed after the folder is synchronized, and the folder is later
unsynchronized, the folder will revert to the original backup selection settings. For example, if the original
backup selection backed up only .jpg files and the folder is later synchronized and set to back up all files,
if the folder is then unsynchronized, it will once again backup only.jpg files.
If the number of files backed up on different computers varies, DLO synchronizes the largest number of
files. For example, if you back up three files on computer A and back up five files on computer B, DLO
synchronizes five files.
Synchronized selections are subject to limitation by global excludes in the same manner as backup
selections. See Configuring Global Exclude Filters on page 97 for additional information.
You can manage synchronization using the following options:
Advanced view: Enables you to modify settings for each synchronization set
Note: To use the synchronization feature, all synchronized computers must be running the same version of
the Desktop Agent and the clocks on all of the users computers must be synchronized.
Under Views in the Desktop Agent Tasks bar, click Synchronized Selections.
224
When the Choose Local Folder dialog box appears, type or browse to the location where the
synchronized files are to be stored.
Click OK.
Click Save changes to save the selections or Undo changes to return to the last saved settings.
Under Views in the Desktop Agent Tasks bar, click Synchronized Selections.
Click Modify.
The General tab in the Synchronized Folder dialog box identifies the location where synchronized files
from this selection will be stored, and also lists other computers synchronizing with the selected
folder.
Configure the synchronization folder settings as described for backup selection configuration,
beginning with step 5 on page 208.
Click OK.
Under Views in the Desktop Agent Tasks bar, click Synchronized Selections.
Click Remove.
When prompted, if you want to delete the backup selection, click Yes to continue or No to cancel.
Click the Conflicts have been found link to open the Resolve Conflicts wizard.
Click Finish.
Description
Status
Displays the current state of Desktop Agent jobs, displays when backups will run,
and summarizes the results of the last backup.
Details
This link is located just below the status summary if a backup selection has been
made for a FAT drive. It provides scheduling details based on current Desktop Agent
settings.
Show/Hide Pending Files Hides or displays pending files. This selection toggles between Hide pending files
and Show pending files when you click the link.
Usage Summary
Network Usage
Displays the total amount of data stored in the network user data folder for this
computer.
226
Description
Local Usage
Displays the total amount of data stored in the desktop user data folder on this
computer.
Details
This link is located just below the status summary and provides detailed
information on folder usage for user data. For additional information, see Viewing
Usage Details on page 228.
Figure 5-5
Under Tasks in the Desktop Agent Tasks bar, click Run job.
All pending jobs will be run, such as backup, synchronization or restore jobs.
Options
Continuous
Manual
Scheduled
Total disk space currently used on the network and desktop computer to store your backup data
Quotas, or maximum allowed storage space which can be used to store your data on the network and
desktop computers
The disk space available on the network and desktop computer for storing your data
228
Note: The link to usage details is only available when the Desktop Agent is idle. It will not be shown when a
job is running.
Under Usage Summary in the Status pane, click Details to open the Usage Details dialog.
Review the usage information and take the appropriate actions as described in the following table.
Table 5-15
Usage Details
Item
Description
Usage
Local
Summarizes disk space usage on the desktop computer for storing your
data. The following information is provided:
Using: The total disk space on the desktop computer currently being
utilized to store your backup data.
Quota: The maximum amount of disk space you can use to store your
backup data on the desktop computer. The quota limit is set by the
administrator in the profile, but can be modified from the Desktop Agent
Settings view if you have been given rights to modify settings. For
additional information, see Modifying Desktop Agent Settings on
page 215.
Available: The amount of free disk space available on the desktop
computer for storing your data without exceeding a quota. If there is no
quota, the Desktop Agent will reserve a small amount of disk space so the
drive will not fill completely with backup data.
Network
Summarizes disk space usage on the network for storing your data. The
following information is provided:
Using: The total disk space on the network currently being utilized to
store your backup data.
Quota: The maximum amount of disk space you can use to store your
backup data on the network.
Available: The amount of free disk space available on the network for
storing backup data for the current user without exceeding a quota.
Synchronized Files
Table 5-15
Item
Description
Select this option to immediately and permanently delete all files that are
marked as deleted in your Network and desktop user data folders. The
periodic maintenance cycle will otherwise delete these files after the
amount of time specified in your assigned profile.
Clicking this button will open the Remove Deleted Files dialog. Choose
from the following options:
Remove only the deleted files that currently meet the backup
selection deleted files criteria
Select the Remove files from the network user data folder check box to
additionally groom deleted files from the network user data folder.
Additional information
Click here to view last job Click here to open the Log File Viewer. For additional information on the
log file viewer, see Monitoring Job History in the Desktop Agent on
log
page 235.
230
Restore view
If you customize NTFS permissions or directory attributes, such as compression or encryption for files or
folders, you must reapply these settings after restoration.
If you disconnect from the network while the Desktop Agent is running, you may encounter a slow
response when browsing the Restore view. From the Tasks menu, select Refresh to fix this problem.
Note: DLO can overwrite a file which is in use by staging the file to be restored when the computer
restarts. Using this feature requires administrative rights on the Desktop Agent computer.
Alternatively, the file can be restored by first closing the application which is using the file, or by
restoring the file to an alternate location.
To restore data
1
Item
Description
All revisions
Latest revision
Only the latest file revision will be displayed and available as a restore selection.
Revisions modified on
or after
If selected, enter a date and time after which revisions will be displayed and
available as restore selections, then click OK.
Click Restore.
Select the appropriate options as described in the following table and then click OK.
Table 5-17
Item
Description
Select this option to restore files and folders to their original location.
Redirect the restore to an Select this option to restore files and folders to an alternate folder on the same
computer.
alternate folder on this
computer
232
Table 5-17
Item
Description
Preserve folder structure Select this option to restore the data with its original directory structure. If you
clear this option, all data (including the data in subdirectories) is restored to the
path you specify.
Options
If file already exists
Do not overwrite
Prompt
Overwrite
Select this option if you want to restore files even though the source file has
been deleted.
Preserve security
attributes on restored
files
Click Search for files to restore under Tasks in the Desktop Agent Tasks bar to open the Search dialog
box.
Select the appropriate options as described in the following table and then click OK.
Table 5-18
Item
Description
Search for file names with this text Type all or part of the file name or folder you want to find.
in the file name
Modified
Select this option to search for files that were modified during a
specific time frame. Then specify the time frame.
Today
Select this option to search for files modified on the current calendar
day.
Select this option to search for files modified in the last calendar
week.
Table 5-18
Item
Description
Between
Select this check box to select a file type from the list provided.
Any rule that points to a folder inside a PST file will no longer work. You must edit the rule to point to
the correct folder
Restored PST files will have Inbox, Outbox, and Sent Items folders, even if the original files did not have
them
If you use a password for your PST file, you must reset the password after restoring your PST file
Related topics
Backing up Outlook PST Files Incrementally on page 212
234
Item
Description
Started
Ended
Status
The total number of files transferred to the desktop user data folder
during the listed job.
The total number of bytes of data transferred to the desktop user data
folder during the listed job.
The total number of files transferred to the network user data folder
during the listed job.
This information is only available for the backup history, not the restore
history.
The total number of bytes of data transferred to the network user data
folder during the listed job.
This information is only available for the backup history, not the restore
history.
Errors
Figure 5-7
History view
To view backup logs, select the Backup tab, or to view restore logs, select the Restore tab.
Select the appropriate History view filter option from the Show drop-down menu:
236
All logs with errors: History logs for all jobs that generated errors are displayed.
Logs filtered by date: All logs generated after a specified date and time are displayed. Enter the
date and time after which logs are to be displayed in the Filter by date dialog box and click OK.
Click the job history entry for which you want to view the history log.
Click the Search link, which is located under the History pane, to open the Log File Viewer.
Item
Description
Select this option to show all log entries in the log file viewer.
Select this option to search only those log entries in the current log file.
With timestamp of
Select the With Timestamp of check box to search only those log entries
within a specified time period. The options include:
Today: Show only log files that were created today.
Within the last week: Show all log files created in the last week.
Between dates: Show all log files created between the dates entered.
Select the Of the following type check box to show only logs of the indicated
type. You may select one of the following types:
Backup
Restore
Move User
Maintenance
Error
Warning
Table 5-20
Item
Description
With Filenames containing Select the With Filename like check box and enter a filename, or file type.
Wildcard entries are supported.
Example: *gold.doc
Note: When using wild cards, you must use the * wildcard. For example,
*.tmp will return all results with the .tmp extension while .tmp will return
only files explicitly named .tmp.
Filter
Informational entries only
Select Error and warning entries only to display both error and warning
entries.
Click Search.
To view detailed information for a log file entry, expand the tree view for the entry by clicking the +
check box.
238
Chapter
Troubleshooting
This chapter contains the following topics:
WinCVS
When DLO runs concurrently with WinCVS, permission denied errors are sometimes generated when
checking out source. This can be avoided by excluding any directories named cvs using global excludes or
backup selection excludes.
241 Troubleshooting
Troubleshooting the DLO Administration Console
A desktop user ran the Desktop Agent and received an error indicating Unable to configure the Desktop Agent. No settings
found for the current user and no automatic user assignments match. What does this indicate?
This message means that DLO could not find the user or an Automated User Assignment that matched the user's domain
and group.
Users are added to DLO either by an Automated User Assignment or by manually adding them.
In the first case, you use an Automated User Assignment that matches the users domain and group. The Automated User
Assignment assigns a profile and Storage Location to the Desktop Agent and adds the user to DLO. Check that you have
created Automated User Assignments that match the domain and group to which the user belongs who is running the
Desktop Agent.
Troubleshooting
Troubleshooting the DLO Administration Console
You can also create an Automated User Assignment that covers all domains and all groups. This method catches any
users who might not match a more specific Automated User Assignment. Such a catchall Automated User Assignment
would typically be set to the lowest priority.
The other option is to manually add users to DLO. This process requires that you assign a profile and either a Storage
Location or user data folder to the new user.
Before running the Desktop Agent, be sure that the user has a matching Automated User Assignment, or is added
manually.
Related topics
About Automated User Assignments on page 93
When do I need a network user data folder, and when do I need a Storage Location?
Every Desktop Agent user must have a network user data folder, which is used to store backup data. Storage Locations are
locations on the network where network user data folders are automatically created and maintained. They are not
required if existing network shares are used to store user data.
If you want DLO to automatically create network user data folders, use a Storage Location. When new users are added to a
Storage Location, network user data folders are automatically created for them within the Storage Location.
Alternatively, if you would like to use existing network shares as network user data folders, or if you want to create
network user data folders manually, then do not use Storage Locations.
Related topics
Configuring DLO on page 57
I'm trying to create a Storage Location on a remote file server, and I am receiving an error indicating the MSDE Database
Instance for the Desktop Laptop Option needs to have access to the remote file server. What do I need to do?
To create Storage Locations on a remote file server, you must use an account that has administrative rights on the remote
file server. For details about creating the Storage Location, see Changing DLO Service Credentials on page 31.
I manually added a new user and assigned the user to an existing Storage Location. I don't see a new user data folder for
the new user in this Storage Location. Isn't it supposed to create one?
User data folders are created only after the Desktop Agent is both installed on the desktop and run by the new user.
How do I prevent a user from backing up data?
On the Navigation bar, click Setup. In the Settings pane, click Users.
Select OK.
242
243 Troubleshooting
Troubleshooting the DLO Administration Console
In a backup selection, I selected to encrypt or compress my user's data. However, data that has already been backed up is
not encrypted or compressed. Why is this?
DLO does not retroactively apply changes to encryption and compression settings to user data that is already backed up.
Any data backed up after these settings have changed will use the new settings.
I would like to prevent files of specific types from being backed up. How can I set up DLO to always exclude files like *.mp3
or *.gho?
On the Tools menu, select Global Excludes. In this dialog box, you can add specific file types that will be excluded in all
backup selections for all profiles.
Backups do not seem to be running for all users, or specific files are not being backed up.
If backup jobs are not running for a group of users, check the profile for these users to verify that backups are scheduled.
If specific files are not being backed up, review the backup selections in the profile to verify that the files are selected for
backup.
I just tried to restore a file, but it doesnt appear to have been restored.
When restoring existing files to their original location, verify that you have selected Prompt or Overwrite in the Restore
dialog box to replace the file. If you select Do not overwrite, the file will not be restored.
In a profile, I configured backup selections to encrypt files. Now I need to recover files for a user. Do I need an encryption
key to restore this data?
As an Administrator running the DLO Administration Console, you can redirect a restore of encrypted user data to an
alternate computer or location, and it will be decrypted during the restore.
I would like to restore data to a user's computer, but that user is out of the office. Do I have to wait until that user returns
to the office before I can start the restore?
DLO can queue restore jobs to desktops. If the user is offline now, you can queue a restore job through the Restore view in
the DLO Administration Console.
Another option is to restore the data to an alternate location, such as the administration computer or a network drive.
The History view in the DLO Administration Console doesnt show the most recent backup for all users.
The DLO Administration Console is automatically updated when a job runs, but not more than once per hour.
Troubleshooting
Troubleshooting the Desktop Agent
Can I install the Desktop Agent on Windows Servers or DLO Administration Servers?
Because the Desktop Agent is designed to protect user data rather than critical server data, it cannot be installed on
Windows Servers or DLO Administration Servers.
I am receiving the following error while authenticating through the Desktop Agent to the DLO Administration Server:
Failed to Initialize database. 0x800A0E7D
You attempted to connect to the DLO Administration Server with an account that is not in the same domain, or a trusted
domain, as the administration server. For DLO to function properly, the DLO Administration Server must be in a Windows
Domain.
I have a desktop and a laptop computer protected by the Desktop Agent. Why can't I move my laptop to a new Storage
Location?
When a user has multiple computers running the Desktop Agent, all backup data is stored in the same network user data
folder. If you want to move your data to a new Storage Location, you must move the entire network user data folder for all
of your computers to that new location.
I am trying to synchronize files between my desktop and laptop computers, but I cannot see my other computer in the
Synchronization View in the Desktop Agent.
To synchronize data between two computers, the same user account must be used when running the Desktop Agent on
each computer. For example, the user Domain\MyUser must have backed up data on Computer A and Computer B in
order for synchronization to take place between these two computers.
If you are sure you have backed up data while running the Desktop Agent under the same user account on both of your
computers, select Refresh in the Desktop Agent's Synchronization View to make the synchronization selections
available. If this is not successful, Exit from the File menu and restart the Desktop Agent application.
244
245 Troubleshooting
Remote DLO Agent and Push Install Maintenance Server
Any data backed up by a backup selection are eligible for synchronization. These backup selections may be defined by the
DLO Administrator in the profile or in a backup selection created with the Desktop Agent.
I would like to share my synchronized data with my co-workers. How can I do this?
The Desktop Laptop Option does not provide functionality for sharing files between users. Synchronization is designed to
share files between a single user's computers.
The Administration services are down error is displayed after the launching the console with Remote DB.
You must ensure that Symantec DLO SQL services and SQL browser services on remote database are started. If the
error still persists, then start the Symantec DLO administration services.
Chapter
Accessibility
Symantec products meet federal accessibility requirements for software as defined in Section 508 of the
Rehabilitation Act:
http://www.access-board.gov/508.htm
Keyboard shortcuts are available for all graphical user interface (GUI) operations and menu items.
Symantec products are compatible with operating system accessibility settings as well as a variety of
assisting technologies. All manuals also are provided as accessible PDF files, and the online help is
provided as HTML displayed in a compliant viewer.
The following topics explain the accessibility features and compliance in DLO:
247 Accessibility
General Keyboard Navigation within the GUI
The TAB key moves the focus to the next active area, field, or control, following a preset sequence.
SHIFT+TAB moves the focus in the reverse direction through the sequence
CTRL+TAB exits any Console area that you internally navigate with the TAB key
UP and DOWN ARROW keys move focus up and down the items of a list
The ALT key in combination with the underlined mnemonic letter for a field or command button shifts
the focus to that field or button
Either ENTER or the SPACEBAR activates your selection. For example, after pressing the TAB key to
select Next in a wizard panel, press the SPACEBAR to display the next screen
The TAB key moves focus between controls within the dialog box along a preset sequence
Controls displaying a mnemonic (an underlined letter) can be selected regardless of focus by typing ALT
and the underlined letter
A dark border indicates the default command button. Press ENTER at any time to choose the button
with a dark border
SPACEBAR changes the state of a check box that has focus. Typing a mnemonic (if one is available) will
move the focus to the check box and change its state
Arrow keys move focus within radio buttons, list boxes, sliders, groups of option controls, or groups of
page tabs
Items that cannot be changed are not visited by the TAB key sequence. Options that are unavailable are
grayed-out and can neither be selected nor given focus
While the controls described here are typically found in dialog boxes, they also can occur in other contexts.
The same navigation standards will apply.
Accessibility
General Keyboard Navigation within the GUI
Keyboard input
Result
CTRL+PAGE
DOWN or
CTRL+TAB
CTRL+ PAGE UP
RIGHT ARROR or
LEFT ARROW
When the focus is on a tab selector, chooses the next or previous tab in the current row
and displays the page.
List Boxes
List boxes display a column of available choices. Different types of list boxes are available with additional
navigation conventions:
Drop-down list boxes by default show only the selected item. A small button to the right of the control
shows a downward-pointing arrow. Select the arrow to display more items from the list box. If there are
more choices than can fit in the preset list box area, a slider appears along the side of the list box. Show
or hide the list using ALT+DOWN ARROW, ALT+UP ARROW, or F4. The TAB key selects an item.
Extended selection list boxes support selecting single items, blocks of items, or combinations of the
two. After selecting an item, hold down CTRL+navigation keys to select or clear additional items or
blocks of items.
248
249 Accessibility
General Keyboard Navigation within the GUI
Keyboard Shortcuts
All menu items can be selected by using accelerator or mnemonic keyboard shortcuts. An accelerator is a
key combination that provides shortcut access to a GUI function. A mnemonic (sometimes referred to as a
hot key) is a single-key equivalent (used in combination with the ALT key) for selecting GUI components
such as menu items. The mnemonic hot key letter is underlined in the GUI.
Routine functions such as opening, saving, and printing files can be performed using the standard
Microsoft keyboard shortcuts. Other menu items are unique to DLO.
The following table lists the shortcut keys in the Desktop Laptop Option Administration Console.
Table 7-2
Keyboard Shortcuts Unique to Backup Exec Desktop and Laptop Option Administration Console
Accelerator
Mnemonic
Result
ALT
The File menu expands. From the File menu, you can create new
profiles and Storage Locations, and add users.
ALT
The Edit menu expands. From the Edit menu, you can restore files,
search for files to restore, manage alerts, and delete items.
ALT
The View menu expands. From the View menu, you can change the
information that displays on the screen.
ALT
The Network menu expands. Use the Network menu to work with
administrator accounts, connect to the DLO Administration Servers
on the network, or to reconnect to a local DLO Administration Server.
ALT
The Tools menu expands. Use the Tools menu to set global excludes,
access all DLO wizards, and manage service credentials.
ALT
The Window menu expands. Use the Window menu to move to a new
window or view.
ALT
The following table lists the shortcut keys in the Desktop and Laptop Option Desktop Agent:
Table 7-3
Accelerator
Mnemonic
Result
ALT
The File menu expands. From the File menu, you can minimize or
exit the Desktop Agent.
ALT
The View menu expands. From the View menu, you can change the
information that displays on the screen.
ALT
The Tasks menu expands. Use the Tasks menu to run a job or refresh
the view.
Accessibility
General Keyboard Navigation within the GUI
Table 7-3
Accelerator
Mnemonic
Result
ALT
The Tools menu expands. Use the Tools menu to reset dialog boxes
and accounts.
ALT
The Help menu expands. Use the Help menu to access the online
help for the Desktop Agent.
Select secondary menu items by opening the main menu and using the UP or DOWN ARROW key until the
required item is highlighted. Press the RIGHT ARROW key to open a submenu, and ENTER to select your
choice.
Keyboard shortcuts are not case-sensitive. Mnemonic keystrokes may be pressed either sequentially or
simultaneously. All menu items have mnemonics, but not all menu items have accelerators.
On the Start menu, select Settings, and then select Control Panel.
Note: You can also set accessibility options through the Accessibility Wizard. On the Start menu, select
Programs, and then select Accessories. Select Accessibility, and then select Accessibility Wizard.
Though all graphics in Symantec documentation can be read by screen readers, setting your screen reader
to ignore graphics may improve performance.
250
251 Accessibility
General Keyboard Navigation within the GUI
Glossary
Administrator
The user that configures DLO using the Symantec DLO Administration Console. This user must have administrative
rights to operate the console.
Authentication
The process of validating a users credentials.
Automated user assignments
Rules that assign profiles and Storage Locations to a specified group of desktop users. Settings are applied the first time a
user runs the Desktop Agent.
Compression
A method of reducing data to expedite transmission time or storage volume.
DLO Administration Console
The administrators interface with the Desktop and Laptop Option.
DLO backup selection
The files and folders on a desktop or laptop that are selected for backup by the DLO Administrator or desktop user.
DLO Database
The location where policy settings and status information are stored.
DLO file server
The computer that hosts DLO Storage Locations.
Delta file transfer
Delta File Transfer is a compression process that allows only the changed portion of a file to be transferred once the
complete original file is backed up. Delta File Transfer reduces bandwidth use and disk storage requirements.
Desktop Agent install share
The network share where the Desktop Agent install files are located. This folder is set up on the DLO Administration
Server when DLO is installed, and facilitates the installation of the Desktop Agent on desktops.
Desktop Agent
The DLO software that runs on desktop and laptop computers.
Desktop Agent console
The user interface for the Desktop Agent software.
Encryption
A process used to ensure data security of files and folders on disk and during data transfer.
Open file handling
The process by which files currently in use can be backed up.
Optimization
253 Glossary
The process of reducing network traffic and file storage through technologies such as compression.
Profile
DLO settings configured by the administrator and that apply to users or groups of users.
Revision
A version of a file at a specific point in time.
Storage location
A shared location on the network in which network user data folders and backup files are stored.
Synchronization
The process that maintains the most recent version of selected files and folders belonging to the same user on multiple
desktops. Synchronization is available for files and folders that are backed up by DLO.
Task
An accessible program function that varies with the view selected in the DLO Administration Console or Desktop Agent
console.
User
The person who operates the desktop or laptop computer on which the Desktop Agent is run.
User data folder
The folder in which user backup data is stored. There is a user data folder on each desktop that is protected by the
Desktop Agent, and one user data folder on the network for each Desktop Agent user.
User name
The user name used for Windows authentication.
View
The main navigational interface in the DLO Administration Console.
Index
A
accessibility
dialog boxes 247
keyboard navigation 247
keyboard shortcuts 249
settings 250
Active Directory
for Automated User Assignments 95
for connection policies 222
add users in DLO, CSV file to 111
administration console
Desktop Agent Console 201
administrator accounts
creating 31
alert history, defined 137
alert notification, printers 152, 153
alerts
defined for DLO 134
deleting in DLO 138
displaying in DLO 137
grooming 133
managing in DLO 138
monitoring in DLO 133
notification methods 139
Automated User Assignment 93
creating 93
deleting 97
modifying 96
priority, changing 96
properties, viewing 97
using Active Directory 95
B
back up on log on/off option in DLO 115
backing up
desktop data 204
Outlook PST files 213
Storage Locations in DLO 159
Backup Selection dialog box 207
backup selections
adding 73
macros in 79
blackout window, setting 119
C
command line interface
-assignSL 166
-changeserver 169
-emergencyrestore 176
-enableuser 167
-keytest 170
-listprofile 171
-listsl 172
-listuser 172
-logfile 173
remote server options 164
-setrecoverypwd 176
syntax 164
-update 174
command line tools 188
database commands 189
license management 191
maintenance commands 190
compression
delta file transfer 78, 82, 210
DLO backup selections, setting 78, 210
configuration wizard for DLO 57
Configure Alerts dialog box 137
connection based policies
configuring 68, 220
using Active Directory 222
D
database 17
default settings
changing 34
delegation
maintenance server 84
deleting
Automated User Assignment 97
DLO desktop computer 118
255 Index
revisions in DLO 79
Storage Location in DLO 92
user entry from DLO 112
delta file transfer 78, 82, 210
Desktop 111
Desktop Agent
see also Desktop and Laptop Option (DLO)
advanced view option 207
backing up data 204
Backup Selection dialog box 207
backup selections
compression, setting 210
modifying 205
overview 204
console 201
customizing installation 23
Desktop User Data Folder, moving 219
filter options, History view 236
glossary 252
History view 235
include/exclude 208
install 23
install set default location 196
log files, overview 235
menu bar, described 203
overview 194
Reset accounts option 199
reset dialogs option 199
Restore dialog box 232
restoring files 231
revision control tab 208
revisions, deleting automatically 210
schedule, customized 115, 216
scheduling backup jobs 215
standard view option 205
Status view 226
storage limits for user data 217
synchronization
create new sets 224
delete synchronized folder 225
Synchronized Selections view 222
tasks bar, described 203
views menu, described 203
Desktop Agent Users, managing 108
Desktop and Laptop Option (DLO)
see also Desktop Agent
access, disabling/enabling 111
adding user 110
administrators, creating 31
alerts
categories, defined 134
Configure Alerts dialog box 137
deleting 138
displaying 137
managing 138
monitoring 133
Automated User Assignment
creating 94
deleting 97
modifying 96
priority, changing 96
properties, viewing 97
backup selection
adding 71
deleting 82
modifying 81
Computer History pane 128
Configuration Wizard 57
configuring 57
deleting entry from DLO database 118
encryption, setting for backup selection 78,
210
filter options, History view 129
History view 128
import multiple users in CSV file 111
include/exclude 75, 208
Job History pane 129
Move priority down option 96
Move priority up option 96
Profile
creating 58
edit schedule 66
log on/off option 115
logging options 67, 115
Schedule tab 115
properties, changing user 111
removing user 112
reset dialogs and accounts 199
restoring 120
revisions
defined 76
deleting automatically 79
setting number to keep in DLO 77, 209
Search history log file option 133
Storage Location
backing up and restoring 159
deleting 92
moving users 113
Index
summary status 55
User Data Folder 87
User Properties dialog box 111
View history log file option 131
viewing users 114
dialog box, Move User 113
DLO Administration Console, restoring from 120
DLO Administration Server, connecting to 56
L
Lotus Notes
back up nsf files 214
M
E
e-mail
configuring MAPI notification 141
configuring SMTP notification 140
configuring VIM notification 142
encryption 122, 223, 243
encryption, backup selections, in DLO 78, 210
F
file to add users in DLO, CSV 111
filters
History view filters, setting in Desktop Agent
236
History view filters, setting in DLO 129
G
global excludes
adding 97, 99, 100, 101, 102
deleting 97, 99, 100, 101, 102
macros 104
glossary of terms 252
grooming
alerts 133
files 76
groups, configuring recipients 153
I
include/exclude
Desktop Agent backup selections 208
DLO backup selections 75
install
Desktop Agent
options 23
installation
silent 23
J
job history
History view filters, setting in DLO 129
N
Net Send, configuring recipients 151
network user data folder, creating 109
notification, recipients 143
notifications
configuring MAPI e-mail 141
configuring pager 142
configuring SMTP e-mail 140
configuring VIM e-mail 142
methods defined 139
modifying recipient properties 155
nsf files
backing up 214
O
Outlook PST files, backing up 213
P
pager
configuring recipients 147
notification method 142
printer, configuring recipients 152
priority options in DLO, Move 96
priority, Automated User Assignment, changing 96
Profile 58
back up on log on/off option 115
creating 58
edit schedule 66
logging options 67, 115
profile
256
257 Index
copy 70
properties, user, changing in DLO 111
PST files, backing up 213
Push 26
R
recipients
configuring groups 153
configuring MAPI e-mail 145
configuring Net Send 151
configuring pager 147, 152
configuring SMTP 144
configuring SNMP Trap 150
configuring VIM e-mail 146
defined 143
recovery password, setting 29
reports 156
running 158
viewing 156
reset accounts option, in Desktop Agent 199
reset dialogs option, in Desktop Agent 199
Restore dialog box
Desktop Agent 232
restoring
files, using Desktop Agent 231
files, using DLO Administration Console 120
revisions
defined 76
deleting automatically in Desktop Agent 210
deleting automatically in DLO 79
number to keep, setting in Desktop Agent 208
number to keep, setting in DLO 77, 209
Revision Control tab, Desktop Agent 208
Revision Control tab, DLO 77
S
scheduling
backup jobs in Desktop Agent 215
backup jobs in DLO 115
search
log file history 133
selections
Desktop Agent, backup 204
DLO, backup 71
service credentials, managing 31
silent install 23
SMTP
e-mail notification method 140
SNMP Trap
configuring e-mail recipients 144
configuring recipients 150
notifications 150
SQL Server 17
storage limits for user data
Desktop Agent 217
Storage Location 87
backing up and restoring 159
deleting 92
synchronization
create new sets 224
delete synchronized folder 225
overview 222
Synchronized Selections view, in Desktop Agent
222
U
up on log on/off option in DLO, back 115
updating, DLO 41
User Data Folder, defined 87
User Properties dialog box 111
Users
properties, changing in DLO 111
removing from DLO 112
viewing in DLO 114
users
access, disabling/enabling in DLO 111
adding in DLO 110
Desktop Agent access via Profile 194
import in CSV file in DLO 111
managing 108
V
viewing
Automated User Assignment properties 97
users in DLO 114
VIM
configuring recipients 146
e-mail notification method 142
W
wizard for DLO, configuration 57