{"id":3072,"date":"2015-09-18T09:27:12","date_gmt":"2015-09-17T23:27:12","guid":{"rendered":"http:\/\/support.cybersecure.com\/?p=3072"},"modified":"2022-09-14T15:57:13","modified_gmt":"2022-09-14T05:57:13","slug":"how-to-perform-a-shadowprotect-bare-metal-restore","status":"publish","type":"post","link":"http:\/\/support.cybersecure.com\/?p=3072","title":{"rendered":"How to Perform a ShadowProtect Bare Metal Restore"},"content":{"rendered":"<h2>Prerequisites<\/h2>\n<ol>\n<li>Location of the ShadowProtect backup chain, accessible by either local volume OR UNC network share, if the backups are stored on a network share, ensure you have the following:\n<ol>\n<li>Network share path<\/li>\n<li>Network share domain\\username<\/li>\n<li>Network share password<\/li>\n<\/ol>\n<\/li>\n<li>The backup encryption password &#8211; this is extremely important since <strong>without the backup encryption password the data cannot be decrypted<\/strong><\/li>\n<li>A destination machine to restore the backups &#8211; either physical or virtual<\/li>\n<li><a href=\"http:\/\/support.cybersecure.com\/?p=3121\" target=\"_blank\" rel=\"noopener\">Information about the backed up volumes<\/a>. We strongly recommend matching the original <strong>physical disk, partition and volume\u00a0structures<\/strong>\u00a0exactly. There will be less things to go wrong if these all match what was running on the source machine.\n<ol>\n<li>Physical disk size(s)<\/li>\n<li>Physical disk type(s): GPT \/ MBR<\/li>\n<li>Partition sizes<\/li>\n<li>Volume\u00a0sizes (eg: C:\\, D:\\)<\/li>\n<\/ol>\n<\/li>\n<li>ShadowProtect recovery ISO (supplied by CyberSecure)<\/li>\n<\/ol>\n<h2>Considerations<\/h2>\n<ol>\n<li>Which backup snapshot to restore?<\/li>\n<li>If possible the destination physical disk and logical partition structure should match the backup source, this will make the restore process simpler and therefore less error-prone.<\/li>\n<li>Will the destination be a physical or virtual machine? Physical machines are more likely to have issues booting due to device drivers. Make sure you know your RAID\/HBA controller chipset and have a copy of the controller device drivers ready for loading into the recovery environment.<\/li>\n<li>If destination is Hyper-V virtual machine, then:\n<ol>\n<li>MBR disks to Gen 1 Hyper-V and;<\/li>\n<li>GPT to Gen 2 Hyper-V<\/li>\n<\/ol>\n<\/li>\n<li>If the volume(s)\u00a0you are restoring to are\u00a0smaller than the original follow <a href=\"https:\/\/www.storagecraft.com\/support\/kb\/article\/152\">this guide<\/a>, however <strong>we do not recommend trying to restore to smaller volumes<\/strong>\u00a0as it adds complexity to the process.<\/li>\n<\/ol>\n<h2>Bare Metal Restore<\/h2>\n<ol>\n<li>Boot off recovery environment media<\/li>\n<li>Start network support<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/001.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3140\" title=\"001\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/001-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Set correct time zone<\/li>\n<li>If prompted Initialize the disk (choose MBR or GPT according to your configuration)<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/003.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3142\" title=\"003\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/003-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Accept generated disk signature and click &#8220;OK&#8221;<\/li>\n<li><strong>If you are restoring backup images from a network share (ie. NAS)<\/strong>\u00a0now <a href=\"http:\/\/support.cybersecure.com\/?p=3604\">map the network drive in the ShadowProtect recovery environment<\/a><\/li>\n<li>If backups are stored on a network location you may need to manually <a href=\"http:\/\/support.cybersecure.com\/?p=3620\">set a static IP address<\/a><\/li>\n<li>Click &#8220;Restore Wizard&#8221; &gt; &#8220;Next&#8221;<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/004.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3146\" title=\"004\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/004-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Select a normal restore (the default)<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/shadowprotect_re_restoretype.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3615\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/shadowprotect_re_restoretype-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Browse to and <a href=\"http:\/\/support.cybersecure.com\/?p=3178\" target=\"_blank\" rel=\"noopener\">select the image file you wish to restore from<\/a><br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/009.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3147\" title=\"009\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/009-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Enter your encryption password and click &#8220;OK&#8221;<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/010.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3149\" title=\"010\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/010-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Information on the current image will be displayed. Proceed by clicking &#8220;Next&#8221;<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/012.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3165\" title=\"012\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/012-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Change which point in time to restore from or click &#8220;Next&#8221; to continue<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/013.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3166\" title=\"013\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/013-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>First restore the boot volume. Right click &#8220;Unallocated space&#8221; and select &#8220;Create exact primary partition at the beginning of free space&#8221;<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol1.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3185\" title=\"sysvol1\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol1-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Volume will be created. Tick the new volume and click &#8220;Next&#8221;<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol2.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3186\" title=\"sysvol2\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol2-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Tick &#8220;Finalize the volume at the end of this restore&#8221; and click &#8220;Next&#8221;<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol3.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3187\" title=\"sysvol3\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol3-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li>Select options as below<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol4.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3188\" title=\"sysvol4\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol4-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<ol>\n<li>Set partition active: TICK<\/li>\n<li>Restore MBR: TICK\n<ol>\n<li>RESTORE MBR from the image file: SELECTED<\/li>\n<li>Restore disk signature: TICK<\/li>\n<\/ol>\n<\/li>\n<li>Restore Disk Hidden Track: TICK<\/li>\n<\/ol>\n<\/li>\n<li>Click &#8220;Finish&#8221; to begin restore<br \/>\n<a href=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol5.png\"><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-3189\" title=\"sysvol5\" src=\"http:\/\/support.cybersecure.com\/wp-content\/uploads\/2015\/09\/sysvol5-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/li>\n<li><a href=\"http:\/\/support.cybersecure.com\/?p=3191\" target=\"_blank\" rel=\"noopener\">Additional partitions<\/a> can be restored if necessary, these can be added immediately and will be queued up automatically<\/li>\n<li>If necessary you can create partitions manually. Under the &#8220;Disk Map&#8221; tab <a href=\"http:\/\/support.cybersecure.com\/?p=3153\" target=\"_blank\" rel=\"noopener\">create partitions<\/a> to match the source (each partition must be greater than or equal to original partition in size)<\/li>\n<li>If you have restored\u00a0to a virtual machine, <strong>we strongly advise taking a snapshot\/checkpoint once the restoration is completed<\/strong>. This will allow a base from which to revert back to in case of boot issues into the operating system.<\/li>\n<li>Once the system has booted correctly, delete the checkpoint to avoid running out of free space on your hypervisors storage.<\/li>\n<\/ol>\n<h2>Booting the operating system<\/h2>\n<ol>\n<li>If the operating system fails to boot\u00a0then contact CyberSecure support.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Prerequisites Location of the ShadowProtect backup chain, accessible by either local volume OR UNC network share, if the backups are stored on a network share, ensure you have the following: Network share path Network share domain\\username Network share password The &hellip; <a href=\"http:\/\/support.cybersecure.com\/?p=3072\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[158],"tags":[],"_links":{"self":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts\/3072"}],"collection":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3072"}],"version-history":[{"count":53,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts\/3072\/revisions"}],"predecessor-version":[{"id":4159,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=\/wp\/v2\/posts\/3072\/revisions\/4159"}],"wp:attachment":[{"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3072"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/support.cybersecure.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}