See Also ..................................................................................................................................... 36
Recovery Goals for Disk-Based Protection ................................................................................... 37
Synchronization and Recovery Points for Files ......................................................................... 37
Retention Range for Files .......................................................................................................... 37
Synchronization and Recovery Points for Application Data ....................................................... 38
Exception for Some SQL Server Databases .......................................................................... 38
Comparing Synchronization and Express Full Backup ........................................................... 38
Retention Range for Application Data ........................................................................................ 39
See Also ..................................................................................................................................... 39
Recovery Goals for Tape-Based Protection .................................................................................. 39
Short-Term Protection on Tape .................................................................................................. 39
Long-Term Protection on Tape .................................................................................................. 40
See Also ..................................................................................................................................... 40
Planning Protection Configurations ............................................................................................... 40
In This Section ............................................................................................................................ 40
See Also ..................................................................................................................................... 41
Selecting Protection Group Members ........................................................................................... 41
Guidelines for Protection Groups ............................................................................................... 41
Special Considerations for Protecting Data on Workstations .................................................... 42
Special Considerations for Protecting Data Over a WAN .......................................................... 42
How Important Is the Protection Group Membership Decision? ................................................ 43
See Also ..................................................................................................................................... 43
Selecting a Data Protection Method .............................................................................................. 43
See Also ..................................................................................................................................... 44
Defining Recovery Goals ............................................................................................................... 44
See Also ..................................................................................................................................... 45
Recovery Goal Options for Each Protection Method ..................................................................... 45
See Also ..................................................................................................................................... 47
Recovery Point Schedules for Long-Term Protection ................................................................... 47
See Also ..................................................................................................................................... 48
Scheduling Options for Long-Term Protection .............................................................................. 48
See Also ..................................................................................................................................... 49
Customizing Recovery Goals for Long-Term Protection ............................................................... 50
See Also ..................................................................................................................................... 50
Allocating Space for Protection Groups ........................................................................................ 50
See Also ..................................................................................................................................... 53
Specifying Tape and Library Details .............................................................................................. 53