How to configure remote backup policies
- Creation and editing of the Backup Policies are available on the dashboard only for accounts with level Company Admin and higher.
- Backup Policies are assigned to the devices. Only the policies created on the Company level can be assigned to the devices under the Company. Policies from parent entities (Partners, Distributors) are not accessible from a child Company.
- Backup Policies always override backup set settings set up locally on OBRM. So, when a backup policy is assigned to the device, it is impossible to configure backup set from PC client manually. Indicator in Backup Progress that OBRM uses the backup policy:
The list of backup policies
The list of all available backup policies can be reached by selecting Backup Policies from pulldown dashboard Menu
Initially, two default backup policies created for every Company Admin:
- All Folders. Documents and images.
- All Folders. Documents.Images.Music.Videos.
The customer can edit these policies and customize both of them for the Company needs. To create a new policy the customer should click on Add New Policy button at the top right corner.
The backup setting screen will appear
The policy settings structure
The settings have 4 sections:
- Global settings;
- Scanner settings;
- Scheduler settings;
- Backup set settings (by default its hidden use Show/Hide advanced options to make it visible).
The Global settings section applied to both Scanner settings and Scheduler settings sections. But Scanner settings and Backup set settings are not intersected and work separately (explanation provided below)
1. Global settings
As already stated, these settings are applied to both Scanner and Backup set settings. All of them are clear, and the only one should be noticed: nothing will be deleted from the local computer by remote backup policy.
2. Scanner settings
Policy Name this field will determine the remote backup policy name when you save it.
Files Scanner mode selects what folders will be scanned during the 1st stage of the backup.
If you select Scan all folders, the backup job will start under the account, determined in the field Scheduler settings:
- Backup automatically without user intervention needs to be checked always if you want to schedule the backup job.
- If Backup even when Windows user is not logged on option is checked, it is necessary to enter the details of the Windows user, under which credentials the files will be accessed for reading. In case there are no read permissions, OBRM will impersonate an access to NT AUTHORITY\SYSTEM account and try to back them up.
If you select Just scan user personal folders you must enter the details of the user, which personal folders be scanned and backed up.
See the KBA for additional details: In Dashboard Backup policies if the option is not checked "Backup even when Windows user is not logged on," will the backup run under any user? Or is it a specific user?
Files types selects the types (extensions) of the files to backup.
In the **Custom** box, you may add the specific extensions (separated by either comma or dot or space or semicolon) of the files that not included in your choice lists (Documents, Images, Music, Video), but you need them to backup.
3. Backup set settings
As stated, this section is independent of the **Scanner settings** section and determines what additional folders and files should be included/excluded from the backup policy. But the access rights to the additional files and folders determined by the permissions of the user, specified in the **Scheduler settings** section: if no user specified, an access to the files and folders will be provided under the device local System account (NT AUTHORITY\SYSTEM).
Included folders - the set of paths to the device local folders, as the specified user can see them. The specified folder with all its subfolders and all the files inside will be backed up.
Included files - the set of specified files (full path with a full file name with extension) to backup.
Excluded folders and Excluded files - the lists of the exclusions to the specified in Included folders field.
Important: `OST` files are never backed up, even if they included directly. *[AES]: Advanced Encryption Standard *[AESs]: Advanced Encryption Standards *[API]: application programming interface *[APIs]: application programming interfaces *[AWS]: Amazon Web Services *[AWSs]: Amazon Web Servicess *[BMR]: BareMetal Restore *[BMRs]: BareMetal Restores *[CAB]: Cloud Application Backup *[CABs]: Cloud Application Backups *[CB]: Cloud Backup *[CBs]: Cloud Backups *[CBT]: Changed Block Tracking *[CBTs]: Changed Block Trackings *[CFA]: cloud failover appliance *[CFAs]: cloud failover appliances *[CIFS]: Common Internet File System *[CIFSs]: Common Internet File Systems *[DC]: data center *[DCs]: data centers *[DDFS]: deduplication file system *[DDFSs]: deduplication file systems *[DDFS-AR]: DDFS-assisted replication *[DDFS-ARs]: DDFS-assisted replications *[DPS]: Data Protection Server *[DPSs]: Data Protection Servers *[DR]: disaster recovery *[DRs]: disaster recoverys *[DRaaS]: Disaster Recovery as a Service *[DRaaSs]: Disaster Recovery as a Services *[GCP]: Google Cloud Platform *[GCPs]: Google Cloud Platforms *[ICAB]: Infrascale Cloud Application Backup *[ICABs]: Infrascale Cloud Application Backups *[ICB]: Infrascale Cloud Backup *[ICBs]: Infrascale Cloud Backups *[ICMP]: Internet Control Message Protocol *[ICMPs]: Internet Control Message Protocols *[IDR]: Infrascale Disaster Recovery *[IDRs]: Infrascale Disaster Recoverys *[IPMI]: Intelligent Platform Management Interface *[IPMIs]: Intelligent Platform Management Interfaces *[JVM]: Java virtual machine *[JVMs]: Java virtual machines *[LVM]: logical volume management *[LVMs]: logical volume managements *[MFA]: multi-factor authentication *[MFAs]: multi-factor authentications *[MSP]: managed services provider *[MSPs]: managed services providers *[N/A]: Not applicable *[N/As]: Not applicables *[NAS]: network-attached storage *[NASs]: network-attached storages *[NAT]: network address translation *[NATs]: network address translations *[NFS]: Network File System *[NFSs]: Network File Systems *[NIC]: network interface controller *[NICs]: network interface controllers *[NTP]: Network Time Protocol *[NTPs]: Network Time Protocols *[NTPD]: Network Time Protocol Daemon *[NTPDs]: Network Time Protocol Daemons *[OBRM]: Online Backup and Recovery Manager *[OBRMs]: Online Backup and Recovery Managers *[PBKDF2]: Password-Based Key Derivation Function 2 *[PBKDF2s]: Password-Based Key Derivation Function 2s *[POSIX]: Portable Operating System Interface for Unix *[POSIXs]: Portable Operating System Interface for Unixs *[RAID]: Redundant Array of Independent Disks *[RAIDs]: Redundant Array of Independent Diskss *[RCT]: resilient change tracking *[RCTs]: resilient change trackings *[ROM]: read-only memory *[ROMs]: read-only memorys *[SDK]: software development kit *[SDKs]: software development kits *[SMB]: Server Message Block *[SMBs]: Server Message Blocks *[SMTP]: Simple Mail Transfer Protocol *[SMTPs]: Simple Mail Transfer Protocols *[SNMP]: Simple Network Management Protocol *[SNMPs]: Simple Network Management Protocols *[UCAR]: unique content addressable repository *[UCARs]: unique content addressable repositorys *[UDP]: User Datagram Protocol *[UDPs]: User Datagram Protocols *[UEFI]: Unified Extensible Firmware Interface *[UEFIs]: Unified Extensible Firmware Interfaces *[UNC]: Universal Naming Convention *[UNCs]: Universal Naming Conventions *[vCFA]: virtual cloud failover appliance *[vCFAs]: virtual cloud failover appliances *[VM]: virtual machine *[VMs]: virtual machines *[VNC]: Virtual Network Computing *[VNCs]: Virtual Network Computings *[vNIC]: virtual network interface controller *[vNICs]: virtual network interface controllers *[VPN]: virtual private network *[VPNs]: virtual private networks *[VSS]: Volume Shadow Copy Service *[VSSs]: Volume Shadow Copy Services