Data Protector user groups

75

Data Protector user rights

75

Visibility of backed up data

76

Data encryption

76

How Data Protector AES 256-bit encryption works

76

How Data Protector drive-based encryption works

77

Restore from encrypted backups

78

What is backup ownership?

78

Clustering

79

Cluster concepts

79

Cluster support

82

Example cluster environments

83

Cell Manager installed outside a cluster

83

Cell Manager installed outside a cluster, devices connected to the cluster

 

nodes

85

Cell Manager installed in a cluster, devices connected to the cluster

 

nodes

87

Full and incremental backups

91

Full backups

92

Synthetic backup

92

Incremental backups

92

Conventional incremental backup

93

Enhanced incremental backup

93

Types of incremental backups

93

Considering restore

96

Keeping backed up data and information about the data

99

Data protection

99

Catalog protection

100

Logging level

100

Browsing files for restore

100

Enabling the browsing of files and quick restore

101

Enabling the restore of files, but not browsing

101

Overwriting backed up files with new data

101

Exporting media from a cell

102

Backing up data

102

Creating a backup specification

103

Selecting backup objects

103

Backup sessions

105

Object mirrors

105

Media sets

105

Backup types and scheduled backups

105

Scheduling, backup configurations, and sessions

106

Scheduling tips and tricks

106

Concepts guide

5

Page 5
Image 5
HP B6960-96035 manual Types of incremental backups