{"id":2941,"date":"2015-05-21T11:33:27","date_gmt":"2015-05-21T01:33:27","guid":{"rendered":"http:\/\/support.cybersecure.com\/?p=2941"},"modified":"2019-11-18T10:07:59","modified_gmt":"2019-11-18T00:07:59","slug":"best-practices-for-file-backups-standardadvanced-editions","status":"publish","type":"post","link":"http:\/\/support.cybersecure.com\/?p=2941","title":{"rendered":"Best practices for file backup agents"},"content":{"rendered":"<p><b>The advice provided here is for basic\/entry level environments. For larger\/more complex data sets, we recommend you contact us to discuss a tailored backup solution built from the ground-up to handle your storage and retention requirements.<\/b><\/p>\n<table>\n<tbody>\n<tr>\n<th>Item<\/th>\n<th>Recommendation<\/th>\n<\/tr>\n<tr>\n<td>OS volume<\/td>\n<td>The file backup agents are file data backup tools and are not designed to backup the operating system. Only capture data files. For operating system backup, contact CyberSecure for a solution designed to backup the entire OS.<\/td>\n<\/tr>\n<tr>\n<td>Don&#8217;t backup the root of volume or drive letter, eg selecting the top-level C:\\ or D:\\<\/td>\n<td>This will include hidden and system files that are stored in the root of a volume. Any files saved to this location in future will be added to the backup. Best to backup the specific folders you need<\/td>\n<\/tr>\n<tr>\n<td>Structured databases<\/td>\n<td><a title=\"Microsoft SQL Server backup setup &amp; best practices\" href=\"http:\/\/support.cybersecure.com\/?p=36\">SQL<\/a> or <a title=\"Microsoft Exchange backup setup &amp; best practices (advanced edition)\" href=\"http:\/\/support.cybersecure.com\/?p=1329\">Exchange<\/a> databases are structured data and require their own backup set. Use a separate specific backup set type to capture these. Exclude them from the file backup set to avoid duplicating data.<\/td>\n<\/tr>\n<tr>\n<td>Number of files in backup set<\/td>\n<td>For performance and reliability keep the number of files in each backup set ideally below 500,000 (and definitely below 1 million).<\/p>\n<p>If the restore process is interrupted it cannot resume, so having a larger backup set means a slower restore time if the transfer needs to resume.<\/p>\n<p>Restores cannot happen in parallel within the same backup set, so again it&#8217;s critical that each backup set is kept as small and agile as possible, with a restoration in mind.<\/td>\n<\/tr>\n<tr>\n<td>Large files<\/td>\n<td>\n<ol>\n<li>Put very large files into their own backup set (eg. PST files)<\/li>\n<li>Schedule sets with large files to run weekly<\/li>\n<li>Enable delta merging and set the &#8220;upload full file after number of previous deltas&#8221; to &#8220;Unlimited&#8221;<\/li>\n<li>Do not enable an advanced retention policy, this will turn off delta merging and cause major issues with quota sizes<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td>Backup set organisation<\/td>\n<td>Design the backup sets with restoration in mind: split data logically up into priorities, eg: for smaller sets: \u201cData (current)\u201d, \u201cData (archive)\u201d<br \/>\nFor larger sets, split by department, eg: \u201cAccounts (current)\u201d, \u201cAccounts (archive)\u201d.If data is really disorganized then local changes may be required first.<\/p>\n<p>We cannot stress enough how important it is to keep the backup sets as small as possible and organised with restoration in mind.<\/td>\n<\/tr>\n<tr>\n<td>Delta merging<\/td>\n<td>In general, leave delta merging switched off<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>The advice provided here is for basic\/entry level environments. For larger\/more complex data sets, we recommend you contact us to discuss a tailored backup solution built from the ground-up to handle your storage and retention requirements. Item Recommendation OS volume &hellip; <a href=\"http:\/\/support.cybersecure.com\/?p=2941\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[19,10],"tags":[],"_links":{"self":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts\/2941"}],"collection":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2941"}],"version-history":[{"count":28,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts\/2941\/revisions"}],"predecessor-version":[{"id":3784,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts\/2941\/revisions\/3784"}],"wp:attachment":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2941"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}