Backup Exec 25 Best Practices
- Backup Exec Best Practices
- Best practices for Backup Exec software encryption
- Best practices for Backup Exec installation
- Best practices for Backup Exec tape management
- Best practices for Backup Exec disk-based storage
- Best practices for Backup Exec data lifecycle management (DLM)
- Best practices for Backup Exec catalogs
- Best practices for Backup Exec backups
- Best practices for Backup Exec backing up critical system components
- Best practices for Backup Exec Agent for Microsoft Exchange Server
- Best practices for Backup Exec Agent for Microsoft SQL Server
- Best practices for Backup Exec Agent for Linux
- Best practices for Backup Exec Agent for Microsoft SharePoint
- Best practices for Backup Exec Central Admin Server Option
- Best practices for Backup Exec Agent for Oracle on Windows and Linux Servers
- Best practices for Backup Exec NDMP Option
- Best practices for Backup Exec reports
- Best practices for Backup Exec and Veritas Update
- Best practices for Backup Exec Simplified Disaster Recovery
- Best practices for Backup Exec Agent for Enterprise Vault and the Backup Exec Migrator
- Best practices for Backup Exec Granular Recovery Technology
- Best practices for Backup Exec Remote Media Agent for Linux
- Best practices for Backup Exec Agent for Microsoft Hyper-V
- Best practices for Backup Exec Agent for VMware
- Best practices for Backup Exec Deduplication Option
- Best practices for using Backup Exec Deduplication Option with the Central Admin Server Option
- Best practices for using hot-pluggable devices such as USB devices in a drive rotation strategy
- Best practices for Backup Exec database encryption keys
- Best Practices for Using the Backup Exec Cloud Connector
Best practices for Backup Exec software encryption
Best practices include tips and recommendations to help you use software encryption effectively with Backup Exec. For more information about software encryption, see the Backup Exec Administrator's Guide.
The following best practices can ensure smooth operations when you administer software encryption:
Create strong pass phrases by doing the following:
Use more than the minimum number of characters that are required.
Use a combination of upper- and lower-case letters, numbers, and special characters.
Avoid literary quotations in pass phrases.
Keep your pass phrases secure.
For 256-bit AES PBKDF2 (enhanced password-based Key Derivation Function algorithm), the pass phrase must contain at least one upper case, one lower case, one number, and one special character.
Run Backup Exec Services in FIPS mode and use 256-bit AES encryption to be FIPS-compliant.
To enable FIPS compliance, select the option in the Network and Security settings.
Use software compression with encryption if the data must be compressed.
Avoid using hardware compression with software encryption.
If you do not use software encryption when you back up data to disk-based storage, use File System encryption to prevent unauthorized access.
Use the same encryption key for all of the templates in a synthetic backup policy.