Dell PowerVault DP600 User Manual

Page 5

Advertising
background image

See Also ..................................................................................................................................... 36

Recovery Goals for Disk-Based Protection ................................................................................... 37

Synchronization and Recovery Points for Files ......................................................................... 37

Retention Range for Files .......................................................................................................... 37

Synchronization and Recovery Points for Application Data ....................................................... 38

Exception for Some SQL Server Databases .......................................................................... 38

Comparing Synchronization and Express Full Backup ........................................................... 38

Retention Range for Application Data ........................................................................................ 39

See Also ..................................................................................................................................... 39

Recovery Goals for Tape-Based Protection .................................................................................. 39

Short-Term Protection on Tape .................................................................................................. 39

Long-Term Protection on Tape .................................................................................................. 40

See Also ..................................................................................................................................... 40

Planning Protection Configurations ............................................................................................... 40

In This Section ............................................................................................................................ 40

See Also ..................................................................................................................................... 41

Selecting Protection Group Members ........................................................................................... 41

Guidelines for Protection Groups ............................................................................................... 41

Special Considerations for Protecting Data on Workstations .................................................... 42

Special Considerations for Protecting Data Over a WAN .......................................................... 42

How Important Is the Protection Group Membership Decision? ................................................ 43

See Also ..................................................................................................................................... 43

Selecting a Data Protection Method .............................................................................................. 43

See Also ..................................................................................................................................... 44

Defining Recovery Goals ............................................................................................................... 44

See Also ..................................................................................................................................... 45

Recovery Goal Options for Each Protection Method ..................................................................... 45

See Also ..................................................................................................................................... 47

Recovery Point Schedules for Long-Term Protection ................................................................... 47

See Also ..................................................................................................................................... 48

Scheduling Options for Long-Term Protection .............................................................................. 48

See Also ..................................................................................................................................... 49

Customizing Recovery Goals for Long-Term Protection ............................................................... 50

See Also ..................................................................................................................................... 50

Allocating Space for Protection Groups ........................................................................................ 50

See Also ..................................................................................................................................... 53

Specifying Tape and Library Details .............................................................................................. 53

Advertising