Best practices for Backup Exec 2014 Agent for Microsoft Exchange Server
|Article:HOWTO74428|||||Created: 2012-03-07|||||Updated: 2014-07-15|||||Article URL http://www.symantec.com/docs/HOWTO74428|
Best practices include tips and recommendations to help you use the Exchange Agent effectively. For more information about the Exchange Agent, see the Backup Exec 2014 Administrator's Guide.
For best practices on preparing the Exchange Server for backup, do the following on the Exchange Server:
Circular logging must be disabled if you want to do the following:
Put transaction log files on a separate physical disk from the database. If the disk that contains the database is damaged, the transaction logs are available as a recovery resource.
Set the retention period for deleted items and mailboxes to a length of time that is appropriate for the available disk space. The longer the retention period, the more disk space is required. However, some retention period can prevent you from having to restore a mailbox or database. If possible, configure the Exchange server so that items are not deleted until a full backup is performed.
Make Write Cache unavailable on the SCSI controller. Data corruption can occur if the computer fails before the operation is written to disk.
Monitor the Application, Security, and System logs for any relevant events that may affect Exchange Server functionality.
Allow sufficient disk space for maintenance and recovery procedures. Refer to your Microsoft documentation for details.
Document the Exchange server configuration in detail.
Avoid making the Exchange server a domain controller. You can more easily restore Exchange if you don't have to restore the Active Directory first.
Install the Exchange Server into a domain that has at least two domain controllers. With two domain controllers in a domain, databases on a failed domain controller can be updated with replication.
You must have local administrator rights on each node of a database availability group (DAG) and on the Microsoft Exchange mailbox server to back up and restore Microsoft Exchange database files.
For Exchange 2010/2013, use a Database Availability Group (DAG) with at least one passive database copy for each database to protect against data loss. If you can make more than one passive copy, the second passive copy should use a log replay delay of 24 hours.
The Exchange Management Tools for Microsoft Exchange Server must be installed on the Backup Exec server. The management tools on the Backup Exec server must be the same version or later as the management tools that are on the Exchange Server.
Divide user mailboxes between two or more Exchange databases. Dividing the user mailboxes prevents all of the users from sending or receiving emails if one of the databases is corrupted.
Keep moderate-sized Exchange databases; if databases are large, backup times may increase.
The following best practices are for backing up Exchange Information Store data:
When you run full backups, enable the option for Granular Recovery Technology (GRT). The GRT option lets you restore individual mail messages and folders from a database backup without the need for a separate mailbox backup.
For information on best practices for Backup Exec Granular Recovery Technology (GRT) with an Exchange Information Store backup, refer to the Granular Recovery Technology Best Practices. Exchange 2007/2010 does not support individual mailbox backup.
Symantec recommends that you do not send an incremental GRT-enabled Exchange backup to a deduplication disk storage device. The transaction logs contain primarily unique data that does not deduplicate well. For best results, create a backup definition that runs a full backup of Exchange to a deduplication disk storage device, and then runs an incremental backup to a disk storage device.
Change your default staging location if you run GRT-enabled backup jobs. The default location is used for recovery as well as staging GRT-enabled restore jobs. You should change the location to a volume that is not your system volume for faster performance.
You should have less than 75,000 transaction log files for GRT-enabled backups. If you have more than 75,000 transaction log files, it may increase the amount of time that it takes to complete the backup job.
Ensure that the scheduled maintenance for the Information Store does not run at the same time as the database backup. If you run these operations at the same time, it can cause issues with the Exchange Server databases.
Run Exchange backup jobs separately from other backup jobs.
Back up the Active Directory on a regular basis.
Run a regular backup for System State and Shadow Copy Components, if applicable. These selections back up the Internet Information Service (IIS) metabase and the Windows registry.
Run a backup after you make any changes to system settings or application settings.
When you run offline backups, back up all of the files that make up the storage group, including any .Edb and .Stm files, and all transaction log files.
For Exchange 2010/2013 DAGs that have three or more copies of the database, the consistency check can be disabled.
The following best practices are for recovering data for all versions of Exchange Information Store:
Be aware of the effect of the Restore all transaction logs; do not delete existing transaction logs option. After an operation runs with this option enabled, transactions in existing transaction logs are applied when you start or mount the Information Store database. If those transactions include any deletions that occurred after the backup ran, those deletions are also applied. As a result, the very data that you intend to recover may be deleted. In this situation, enable the Purge existing data and restore only the databases and transaction logs from the backup sets option. This option discards the Exchange data that was generated after the backup. Alternatively, you can use a second recovery server. You can also use the Recovery Storage Group feature in Exchange 2007 or Exchange 2010/2013 recovery database to perform the restore.
If you must use the Microsoft Eseutil utility to repair the database, ensure that the recovery server has sufficient disk space. You may need as much as 125% of the actual size of the Information Store database. You can also specify another disk or volume as a temporary location on which to run the Eseutil utility. Refer to your Microsoft documentation for details.
The following best practices are for restoring data for Exchange Server 2007 or later:
Ensure that you specify a valid temporary location on the Exchange server for log and patch files. The temporary location must have enough space to accommodate the transaction logs that you want to recover.
Read the Restore.env file if issues occur when you mount a database after a restore operation. Information in this file can help you troubleshoot issues. To read the file, run the Eseutil utility with the /cm switch. Refer to your Microsoft documentation for details.
Select the Commit after restore completes option when you configure a restore job so that the database can be mounted. Run the Eseutil utility with the /cc switch to perform a manual hard recovery. Refer to your Microsoft documentation for details.
Ensure the following if you restore to an Exchange server other than the source server:
The recovery server is in a different Active Directory forest than the source server.
The recovery server has the same Organization and Administrative Group names as the source server.
The storage groups and databases already exist on the recovery server, and have the same names as the original storage groups or databases.
The following are best practices to plan for disaster recovery of an Exchange Server:
Perform tests periodically to ensure that disaster recovery and data recovery scenarios produce the expected results.
Become familiar with the Microsoft documentation for Exchange database management, disaster plans, and recovery.
Document the Exchange Server configuration in detail. Document any subsequent changes. Note all hotfixes and service packs that are applied.
Article URL http://www.symantec.com/docs/HOWTO74428