Backup Exec 20.1 Best Practices

Last Published:
Product(s): Backup Exec (20.1)
  1. Backup Exec Best Practices
    1.  
      Best practices for Backup Exec software encryption
    2.  
      Best practices for Backup Exec installation
    3.  
      Best practices for Backup Exec tape management
    4.  
      Best practices for Backup Exec disk-based storage
    5.  
      Best practices for Backup Exec data lifecycle management (DLM)
    6.  
      Best practices for Backup Exec catalogs
    7.  
      Best practices for Backup Exec backups
    8.  
      Best practices for Backup Exec backing up critical system components
    9.  
      Best practices for Backup Exec Agent for Microsoft Exchange Server
    10.  
      Best practices for Backup Exec Agent for Microsoft SQL Server
    11.  
      Best practices for Backup Exec Agent for Linux
    12.  
      Best practices for Backup Exec Agent for Microsoft SharePoint
    13.  
      Best practices for Backup Exec Central Admin Server Option
    14.  
      Best practices for Backup Exec Agent for Oracle on Windows and Linux Servers
    15.  
      Best practices for Backup Exec NDMP Option
    16.  
      Best practices for Backup Exec reports
    17.  
      Best practices for Backup Exec and Veritas Update
    18.  
      Best practices for Backup Exec Simplified Disaster Recovery
    19.  
      Best practices for Backup Exec Agent for Enterprise Vault and the Backup Exec Migrator
    20.  
      Best practices for Backup Exec Granular Recovery Technology
    21.  
      Best practices for Backup Exec Remote Media Agent for Linux
    22.  
      Best practices for Backup Exec Agent for Microsoft Hyper-V
    23.  
      Best practices for Backup Exec Agent for VMware
    24.  
      Best practices for using Backup Exec with server clusters
    25.  
      Best practices for Backup Exec Deduplication Option
    26.  
      Best practices for using Backup Exec Deduplication Option with the Central Admin Server Option
    27.  
      Best practices for using hot-pluggable devices such as USB devices in a drive rotation strategy
    28.  
      Best practices for Backup Exec database encryption keys
    29.  
      Best Practices for Using the Veritas Backup Exec Cloud Connector

Best practices for Backup Exec software encryption

Best practices include tips and recommendations to help you use software encryption effectively with Backup Exec. For more information about software encryption, see the Backup Exec Administrator's Guide.

The following best practices can ensure smooth operations when you administer software encryption:

  • Create strong pass phrases by doing the following:

    • Use more than the minimum number of characters that are required.

    • Use a combination of upper- and lower-case letters, numbers, and special characters.

    • Avoid literary quotations in pass phrases.

    • Keep your pass phrases secure.

  • Run Backup Exec Services in FIPS mode and use 256-bit AES encryption to be FIPS-compliant.

    To enable FIPS compliance, select the Use FIPS 140-2 compliant software encryption option in the Network and Security settings.

  • Use software compression with encryption if the data must be compressed.

  • Avoid using hardware compression with software encryption.

  • If you do not use software encryption when you back up data to disk-based storage, use File System encryption to prevent unauthorized access.

  • Use the same encryption key for all of the templates in a synthetic backup policy.