About advanced options for creating recovery points

  • Modified Date:
  • Article ID:000056037


About advanced options for creating recovery points

When you define or schedule a backup job, you can set the advanced options for the recovery points.

The following table describes the advanced options that are available for recovery points.

Table: Advanced options



Divide into smaller files to simplify archiving

You can split a recovery point into two or more smaller files. This feature is useful if you create or export a recovery point that you want to copy to removable media later for safekeeping. The recovery point is split into smaller, more manageable files. You can then copy the files onto separate, removable media, such as a DVD or CD.

If Backup Exec System Recovery creates an .sv2i file in addition to the .v2i files, you need to save the .sv2i file on the same media as the first .v2i file.

If you create a recovery point of volumes with thousands of files on a computer that has low memory, by splitting the recovery point into smaller segments, it may help speed the process.

If a recovery point is divided into multiple files, the file names for subsequent files are appended with _S01, _S02, and so forth. For example, if the default file name were Dev-RBrough_C_Drive.v2i, the second file name would be Dev-RBrough_C_Drive_S01.v2i, and so on.

Disable SmartSector Copying

SmartSector technology speeds up the copying process by copying only hard disk sectors with data. However, in some cases, it may be desirable to copy all sectors in their original layout, whether or not they contain data.

If you want to copy both used and unused hard disk sectors, select Disable SmartSector Copying.

When you select this option, it increases the process time, and usually results in a larger recovery point file size.

Ignore bad sectors during copy

Select this option to create a recovery point even if there are bad sectors on the hard drive. Although most drives do not have bad sectors, the potential for problems increases during the lifetime of the hard drive.

Perform full VSS backup

For VSS-aware applications, such as Microsoft Exchange Server 2003 or Microsoft SQL, when you select this option it does two things. It performs a full backup on the VSS storage. After the backup , it sends a request for VSS to review its own transaction log. VSS determines what transactions are already committed to the database and then truncates those transactions. Among other things, truncated transaction logs help keep the file size manageable and limits the amount of hard drive space that the file uses.

If you do not select this option, back ups still occur on the VSS storage. However, VSS does not automatically truncate the transaction logs following a backup.

Enable password protection

Check this option to set a password on the recovery point that is created.

Passwords can only use standard characters, not extended characters, or symbols. (Use characters with an ASCII value of 128 or lower.)

Store the password in a secure place. When you access or restore a password-encrypted recovery point, the product prompts you for the case-sensitive password. If you do not enter the correct password or you forget the password, you cannot open the recovery point.

Veritas has no method for opening encrypted recovery points.

User's type this password before they can restore a backup. They must also type the password to delete recovery points within a recovery point set, or convert recovery points to virtual disks.

For greatest security, recovery point passwords should adhere to the following general rules:

  • Do not use consecutive repeating characters (for example, BBB or 88).

  • Do not use common words you would find in a dictionary.

  • Use at least one number.

  • Use both upper- and lower-case alpha characters.

  • Use at least one special character like ({}[],.<>;:'"?/|\`~!@#$%^&*()_-+=).

  • Change the password of an existing encrypted recovery point file after a set period of time. You can do that using the Archive Recovery Point File feature in the Recovery Point Browser. See the Backup Exec System Recovery product documentation for more information about the Recovery Point Browser.

Enable AES encryption

You can enhance the security of your data by using AES (Advanced Encryption Standard) to encrypt recovery points you create or archive. This encryption level is especially useful if you store recovery points on a network share. It provides a high level of security protection against unauthorized access and use.

You must enter the correct password before you can access or restore an encrypted recovery point. You must also enter the correct password when you delete recovery points within a recovery point set or convert a recovery point to a virtual disk. Besides bit strength, the makeup of the password can improve the security of your data.

Encryption strengths are available for the following levels:

  • Standard (password length is 8 characters or longer)

  • Medium (password length is 16 characters or longer)

  • High (password length is 32 characters or longer)

While higher strengths require longer passwords, the result is greater security for your data.

You can view the encryption strength of a recovery point at any time. View the properties of a selected backup on the Backup Jobs tab on the Manage page.

Terms of use for this information are found in Legal Notices.



Did this article answer your question or resolve your issue?


Did this article save you the trouble of contacting technical support?


How can we make this article more helpful?

Email Address (Optional)