Direct Library Access, 179 dirty drive detection, 164 disaster, 128

Disaster Recovery

Phase 3, 129 disaster recovery, 129 Disaster Recovery

concepts, 128 overview, 128 Phase 1, 129 Phase 0, 129 Phase 2, 129

disaster recovery alternative methods, 131

disaster recovery alternative , 131

Disk Agent concurrency, 329 disk performance, 72

Disk Agent concurrency, 157, 311 Disk Agents, 42

disk backup, 253 benefits, 254 disk based devices overview, 253

disk discovery (definition), 225

disk discovery vs. standard backup, 225 disk fragmentation, 72

disk image backups, 71, 72

disk image vs. filesystem backups, 71 disk performance, 72

cache memory, 72 compression, 72

disk image backups, 72 disk staging, 118 disk-based devices

comparison, 255 do not log any details

Catalog Database, 100 document

conventions, 31

related documentation, 23

documentation HP website, 23 providing feedback, 34

Drive Servers, 42 drives, 177

connecting to multiple systems, 165 floating, 181

static, 180

duplicating backed up data, 112

E

e-mail,207

EMC Symmetrix, 266 encoding, 76 encryption, 76

drive-based,76, 77 encryption key, 76

Key Management Server, 76 software-based,76

encryption key

Key Management Server, 76 end-user user group, 185 enhanced incremental backup, 93 enterprise environment, 45 enterprise reporting, 47 environment

enterprise, 45 Manager-of-Managers,45 mixed, 66

network, 39 UNIX, 64 Windows, 65

examples

backup scenarios, 297 media pool usage, 140 reporting and notification, 212 scheduling policies, 108 using data provided by Data Protector, 214

vaulting usage, 152

examples of media usage policies, 148

410