Veritas - DLO - 9.8 - Quick Reference Guide For DLO Installation and Configuration
Veritas - DLO - 9.8 - Quick Reference Guide For DLO Installation and Configuration
Veritas - DLO - 9.8 - Quick Reference Guide For DLO Installation and Configuration
2-Sep-22
Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.
The software described in this document is furnished under a license agreement and may be used only in accordance with
the terms of the agreement.
Legal Notice
Copyright (c) 2022 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered
trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of
their respective owners.
This Veritas product may contain third party software for which Veritas is required to provide attribution to the third party
(“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The
License Agreement accompanying the Software does not alter any rights or obligations you may have under those open
source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe
File accompanying this Veritas product for more information on the Third Party Programs.
This Veritas product may contain open source and other third party materials that are subject to a separate license. Please
see the applicable Third Party Notice at
https://www.veritas.com/about/legal/license-agreements/.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and
decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior
written authorization of Veritas Technologies LLC and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION
CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212
and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights"
and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this
Agreement.
Introduction ........................................................................................................................................... 4
What’s New in DLO 9.8 ..................................................................................................................................... 4
DLO Components System Requirements............................................................................................. 5
DLO Server Setup System Requirements ............................................................................................ 7
Downloading Veritas DLO ..................................................................................................................... 7
Prerequisites for Installing Veritas DLO ............................................................................................... 8
Installing Veritas DLO ......................................................................................................................... 15
Configuring Veritas DLO ..................................................................................................................... 20
Steps to Configure DLO Server Setup ........................................................................................................... 21
Step 1 - Add the Dedupe Server to the DLO Administration Server................................................. 21
Step 2 - Add DLO Storage Locations.............................................................................................. 21
Step 3 - Add DLO Extended Storage Locations .............................................................................. 24
Step 4 - Create and configure a Profile........................................................................................... 25
Step 5 - Configure Users to the created profile ............................................................................... 25
Steps to Configure Backup Over Internet (BOI) ............................................................................................. 27
Step 1 - Register a Public IP for the DLO Edge Server ................................................................... 27
Step 2 - Map the SSL certificate to the Registered Public IP ........................................................... 27
Step 3 - Map the DLO Edge Server and IO Server to the DLO Storage Location ............................ 28
Step 4 - Test Connectivity to the DLO Edge Server ........................................................................ 28
Step 5 - Enable the BOI option in a Profile ..................................................................................... 29
Deploying the Desktop Agent......................................................................................................................... 30
Pull Install the Desktop Agent from the Client machines ................................................................. 30
Pull Install the Desktop Agent from Web Restore page ................................................................... 30
Push Deployment of the Desktop Agent ......................................................................................... 30
Backup and Restore Verification ........................................................................................................ 32
Configuring a Backup Job ................................................................................................................................. 32
Backup Verification ........................................................................................................................................... 32
Interpretation of the Backup Status Report ..................................................................................... 34
Restore Verification .......................................................................................................................................... 35
DLO Documents Reference Links....................................................................................................... 36
3
Introduction
Veritas™ Desktop and Laptop Option is a user centric backup solution that provides flexible
implementation and centralized administration for backup and recovery of Windows and Mac desktops
and laptops in the organization. This highly scalable solution with distributable components is suitable for
environments of any scale, be it single-site, multi-site, or having remote offices, allowing you to protect
even the most recent files with your users.
Built-in features include source side deduplication with content aware deduplication of Outlook PST and
NSF files, automatic network selection for non-intrusive backup experience which enables switching
between the offline, online and backup over internet modes, self-restore capabilities offered through
agent, web browser and a mobile application, rollback capabilities for ransomware protection and
detailed auto reporting.
This Quick Reference document intends to provide the basic steps in setting up a DLO environment so as
to facilitate a smooth product evaluation process. If an administrator is implementing the product for a
Production environment, please refer to the latest version of the DLO Administrator’s Guide and Best
Practices document available here, to understand the various implementation possibilities through DLO.
DLO now provides the administrators with the ability to Identify and Auto delete Users from Console
who are disabled in the Active Directory, and ensures that the storage space is freed up.
Now, in DLO 9.8, the Auto configuration feature is extended for all the reports. Find the list of newly
supported reports below:
Now, in DLO 9.8, for administrator restores and staging on an alternate computer, an email notification
is sent alerting the user that the restore has been initiated.
VxUpdate Enhancement
DLO now automatically notifies administrators when a patch or component update is available.
DLO now alerts the administrator, whenever the SSL certificate is about to expire or expired.
DLO now supports pushing Wildcard Certificate for Backup Over Internet (BOI) mode.
DLO Server components can be installed as a Standalone setup in the same machine or can be installed
as a Distributed setup, across different server machines as well. Within the scope of this document, the
5
Standalone setup configuration will be discussed, where all these components reside on the same
hardware.
Installation of DLO and its components on a VMware ESXi and Hyper-V servers is supported. The
administrator can install all DLO Server components on Microsoft Azure and Amazon Web Services (AWS)
cloud.
Contents
The hardware configuration for a Standalone setup for both non-BOI and BOI modes are as follows.
Administration Server, Maintenance Administration Server, Maintenance Server,
Server, Database, Dedupe Server Database, Dedupe Server, Edge Server, IO
Users (Excludes Edge Server and IO Server) Server
CPU RAM CPU RAM
64 Bit Quad Core Xeon, or 64 Bit Quad Core Xeon, or
<=1000 8 GB 12 GB
compatible compatible
The latest software configuration is preferred for the DLO Server setup as follows.
OS Version Platform
Windows 2019 Server (Standard, Data Center) x64
Windows 2016 Server (Standard, Data Center) x64
Windows 2012 R2 Server – with Update 2919355 (Standard, Data Center) x64
For more information on the supported Operating Systems, refer the Veritas DLO 9.8 Software
Compatibility List document available here.
Veritas_Desktop_and_Laptop_Option_Y.Y_xxxxxx_64-bit.zip,
Where, Y.Y is the product version number and xxxxxx is the build number
7
Prerequisites for Installing Veritas DLO
The prerequisites for installing and managing a DLO setup are detailed here. Please ensure these
prerequisites are taken care before the actual installation begins, to ensure that there are no problems
during the installation process.
Item Description
Domains and The DLO Administration Server, DLO Database Server, DLO Dedupe Server, DLO
Active Directory Edge Server, DLO IO Server and DLO Storage Locations must be in a Windows
Domain or Active Directory. Computers running the Desktop Agent can be
outside a Windows Domain or Active Directory, but they must authenticate
with the domain or directory to access the DLO Administration Server or
Storage Locations.
User privileges for Following are the accounts required for installing and managing DLO
installing and Components:
managing DLO Domain User or Domain Administrator account for:
Veritas DLO Administration Server: This user should have local
administrator privilege on DLO Administration Server machine, Storage
Server and SQL Server. This user should have read and write access to
the registry on the DLO Administration Server machine.
Mindtree Storesmart Dedupe Server service: This user should have local
administrator privilege on the DLO Administration Server machine. This
account should be the same as DLO Administration Server service
account.
SQL Server (instance): This user should have local administrator
privilege on DLO Administration Server, SQL Server machine and
Storage Server.
SQL Server Browser: This user should have local administrator privilege
on the SQL Server machine.
Veritas DLO Web Server Service: This user should have local
administrator privilege on DLO Administration Server machine. This
account should be the same as DLO Administration Server service
account.
Local System Account for:
Veritas DLO Edge Server Service
Veritas DLO Maintenance Server
For more information on the supported versions, refer the Veritas DLO 9.8
Software Compatibility List document available here.
9
For existing remote SQL server instance, the named pipes and TCP/IP
must be enabled on the computer where the SQL server is installed.
Once the named pipes and TCP/IP are enabled, restart the SQL server
and SQL server browser services. Ensure that the computer browser
services are running.
Ensure that the SQL service is running under domain administrator
credentials and provide the same user account credential that was
used to install the SQL server, else there can be database connectivity
issues.
Details:
The DLO and Dedupe databases will be stored on a remote SQL server
instance. Provide the IP address or host name of the computer where
SQL is installed.
Firewalls DLO is designed to work in firewall environments. The DLO Desktop Agents can
be installed on endpoints that are connected either over the corporate network
or in the Backup Over Internet (BOI) mode using the private internet
connection. The details of the port configuration for the DLO Server
components and DLO Clients in a firewall environment are defined for the
following three deployment scenarios:
Non BOI Deployment: For organizations having endpoints that are
always within the organization premises and are connected over the
corporate network.
Exclusive BOI Deployment: For organizations having endpoints that are
always outside the corporate network and connect only using internet
connection.
Occasional BOI Deployment: For organizations having endpoints that
are occasionally outside the organization premises, during which they
connect using internet connection, but are otherwise within the
organization premises connecting over the corporate network. For
more information, refer to the section Port Configuration for DLO
Components.
Certificates This is required for the Backup Over Internet (BOI) capability. In order to
configure the BOI capability, an SSL certificate procured from a Trusted CA is a
pre-requisite. This certificate is required for the Desktop Agents to communicate
with the DLO Edge Server over a public URL. However, for product evaluation
scenarios, an inbuilt self-signed certificate is provided in the DLO Installer
package for validating the BOI capability.
Note 1: It is recommended to use an SSL certificate procured from a Trusted CA
when deploying in production.
Note 2: With the Veritas DLO 9.3 release, the administrator can configure
multiple Edge Servers ensuring an optimized backup flow for the geographically
distributed remote office users connected over the internet. For a multiple Edge
Server DLO setup, ensure to procure unique certificates from a Trusted CA and
the same should be provided while configuring the new Edge Server in the DLO
Administration Console.
Remote Install For remote installation of the DLO Maintenance Server and DLO Desktop
Considerations Agents:
Contents
To push-install to a computer, you must enable certain items on the
destination computer’s Windows Firewall Exceptions list. You must
enable the following items:
o File and Printer Sharing
o Windows Management Instrumentation (WMI)
o Remote Service Management
o Remote Registry Service
For more information, refer to the Microsoft Windows documentation
https://docs.microsoft.com/en-us/windows/
To push-install to a computer that runs Symantec Endpoint Protection
(SEP) version 11.0 or later, you must configure SEP to share files and
printers. The file and printer-sharing feature is turned off by default.
Other The latest service pack should be installed to be able to install the
Considerations DLO components.
Note: The DLO 9.3.2 version onwards provides support for Transport
Layer Security (TLS) 1.2. OS KB articles and SQL related
prerequisites required to support TLS 1.2, should be updated
manually. TechNote created for this, is also available from the First
screen of installer.
WMI service should be running on all machines where the DLO Server
components are installed.
.NET 4.0 or above versions should be installed.
http://www.microsoft.com/en-in/download/details.aspx?id=17718
Note 1: On Windows 2012/ 2012 R2 /2016 Server, it is not mandatory
to install .NET 4.0 since .NET 4.5 is installed by default in Windows
2012/2012 R2 Server and .NET 4.6 is installed by default in Windows
2016 Server.
11
Port Configuration for DLO Server Components
Port Non BOI Exclusive BOI Occasional BOI
Process Port
Type Deployment Deployment Deployment
Source (Outbound): Source (Outbound): Source (Outbound):
DLO DLO Administration Console DLO Administration Console DLO Administration Console
Administration 3999 TCP/UDP
Service Destination (Inbound): Destination (Inbound): Destination (Inbound):
DLO Administration Server DLO Administration Server DLO Administration Server
Destination (Inbound):
Storage Location
Dedupe Storage Location Destination (Inbound): Destination (Inbound):
SQL Server Storage Location Storage Location
Dedupe Storage Location Dedupe Storage Location
SQL Server SQL Server
File Sharing/ 135-139,
TCP/UDP
Browsing 445
Contents
Source (Outbound):
Source (Outbound):
DLO Administration Console
DLO Administration Console
IO Server Port 7080 HTTP NA
Destination (Inbound):
Destination (Inbound):
DLO IO Server
DLO IO Server
Source (Outbound): Source (Outbound):
DLO Edge Server DLO Edge Server
IO Server Port 7009 AJP NA
Destination (Inbound): Destination (Inbound):
DLO IO Server DLO IO Server
135, 1037, Source (Outbound): Source (Outbound):
Additional 441,1125 DLO Administration Server DLO Administration Server
Ports Dynamic DLO Administration Console DLO Administration Console
TCP NA
for Push Ports
Installation (49152 – Destination (Inbound): Destination (Inbound):
65535) DLO Clients DLO Clients
Note: The configuration specified for Storage location will be applicable to Extended Storage Locations
as well.
13
Port Configuration for DLO Clients
Port Non BOI Exclusive BOI Occasional BOI
Process Port
Type Deployment Deployment Deployment
Source (Outbound): Source (Outbound):
DLO Clients DLO Clients
Edge Server Web Restore Machine Web Restore Machine
443 HTTPS NA
Port
Destination (Inbound): Destination (Inbound):
DLO Edge Server DLO Edge Server
Source (Outbound): Source (Outbound):
DLO Clients DLO Clients
File Sharing/ 135-139,
TCP/UDP NA
Browsing 445 Destination (Inbound): Destination (Inbound):
Storage Location Storage Location
Dedupe Storage Location Dedupe Storage Location
Source (Outbound): Source (Outbound):
DLO Clients DLO Clients
Dedupe Port 8443 HTTPS
Destination (Inbound): NA Destination (Inbound):
DLO Dedupe Server DLO Dedupe Server
Source (Outbound): Source (Outbound):
DLO Clients DLO Clients
Dedupe Port 8080 HTTP
Destination (Inbound): NA Destination (Inbound):
DLO Dedupe Server DLO Dedupe Server
Source (Outbound): Source (Outbound):
DLO Clients DLO Clients
SQL Server
1434 UDP NA
Browser
Destination (Inbound): Destination (Inbound):
SQL Server SQL Server
Source (Outbound): Source (Outbound):
1433
DLO Clients DLO Clients
or
SQL Server TCP NA
dynamic
Destination (Inbound): Destination (Inbound):
port
SQL Server SQL Server
Note: The configuration specified for Storage location will be applicable to Extended Storage Locations
as well.
Contents
2. View DLO Pre-Requisites and click Yes on the DLO prerequisite dialog.
3. Read the license agreement, and if the administrator accept the terms, select I accept the terms
in the license agreement.
15
4. Click Next.
5. Select the components that the administrator wants to install on the computer.
DLO Administration Console: Installs the DLO Administration Console.
DLO Administration Server: Installs the DLO Administration Server.
DLO Maintenance Server: Installs the DLO Maintenance Server.
DLO Database Service: Installs the DLO database and Dedupe database.
Dedupe Server: Installs the Dedupe Server.
Edge Server: Installs the Edge Server.
IO Server: Installs the IO Server.
Note: The administrator can select and install each component on a separate computer, except
the DLO Database Service. The DLO Database Service alone cannot be selected for installation; it
can be installed along with the DLO Administration Server service.
Contents
Note: Customized ports are applicable only for Edge, IO, and Dedupe components which are
installed on the computer and also please ensure that you should provide ports that are not
currently being used by any other application.
17
12. Select one of the following options for the DLO database.
Note: When you use an existing local or remote database instance, TCP/IP and named pipes
must be enabled. Refer the link https://msdn.microsoft.com/en-us/library/ms191294.aspx.
19
17. Click Finish once installation is completed.
Once the DLO Server components are installed and on the first launch of the DLO Administration Console,
the Recovery Password wizard appears. The administrator needs to set the recovery password.
The recovery password enables the administrator to retrieve the backed up data, in case of emergency
scenarios where the data can be restored using a point in time database and the storage location,
without the need for the DLO Administration Service to be up and running. For detailed information on
setting Recovery Password, refer to the section Setting Recovery Password in the Veritas Desktop and
Laptop Option Administrator’s Guide available here.
On the first launch of the DLO Administrations Console, the ‘Desktop and Laptop Option Configuration
Wizard’ flow automatically pops up. Close the pop up window and proceed with the below steps. Within
the scope of this document, the manual configuration of DLO will be discussed.
For DLO to start functioning, follow the below steps in the same order:
The details for each of the configuration steps are covered below:
21
In the Settings pane, right-click Storage Locations and select New Storage Location.
In the Task pane, under Settings Tasks, click New Storage Location.
4. Click OK.
Contents
23
Step 3 - Add DLO Extended Storage Locations
Storage Extension feature lets administrators extend the existing storage location without interrupting
the backup process. The Storage Location can be extended before or after the network backup of a
Windows or Mac agent user stops in case the storage location or dedupe storage location reaches the
maximum disk space available.
Create a profile, which determines what files are backed up (Backup Selection), when files are backed up
(Schedule), and the level of interaction the desktop user has with the Desktop Agent (User Settings).
25
Step 5a -Create Automated User Assignment
Create an Automated User Assignment (AUA) to automatically assign a Storage Location and Profile to
new users. Once the administrator selects the Domain and a Group in the domain, selected Storage
locations and Profile get assigned to all the users in that Group.
This section provides the administrator with the details to configure the BOI capability.
As mentioned in the prerequisites section, an SSL certificate procured from a Trusted CA is required for
configuring the BOI setup. However, for product evaluation scenarios, an inbuilt self-signed certificate is
provided in the DLO Installer package for validating the BOI capability. Within the scope of this document,
the BOI configuration using the inbuilt self-signed certificate will be discussed.
Note: This section does not include the details for configuring BOI for a DLO setup where multiple Edge
Servers are configured. For more details on configuring BOI in a multiple Edge Server setup, refer the BOI
Setup and Configuration Guide available here.
For configuring BOI, the below steps need to performed in addition to the Steps to Configure DLO Server
Setup.
Note: Once the administrator registers the public IP for the DLO Edge Server, the DLO Edge Server needs
to be deployed. Below are listed few options on how the DLO Edge Server can be deployed:
27
o where the Certificate Name is for the DLO Edge Server. (Issued to:
dlo.veritas.com)
Step 3 - Map the DLO Edge Server and IO Server to the DLO Storage Location
The DLO Edge Server and IO Server can be mapped to the DLO Storage location either while creating a
new storage location or by updating properties of an existing Storage location as below
https://<Public_Edge_Server_IP>
Contents
Step 5 - Enable the BOI option in a Profile
The BOI option can be enabled either in an existing profile or while creating a new profile as follows
29
Deploying the Desktop Agent
Once the DLO Server is configured, proceed to deploy the DLO Agents on to the endpoints that need to
be protected. The Desktop Agent can be deployed through a Pull or Push installation, the details of which
are as follows.
For client machines that are connected to the corporate network, as part of Non BOI or Occasional BOI
deployments, the Desktop Agent package can be obtained from the Server installation directory and
installed on the client machines individually as detailed below:
1. Access this path \\<DLO ServerName\IP>\DLOAgent from the client machine where the Desktop
Agent needs to be installed.
2. Copy the DLO Agent folder to the client machine.
3. Initiate the Desktop Agent installation.
For client machines that are outside the corporate network and connected using internet connection, as
part of Exclusive BOI or Occasional BOI deployments, the Desktop Agent package can be obtained from
the Web Restore page and installed on the client machines individually as detailed below:
1. Login to Web Restore using the DLO Edge Server URL https://<Public_Edge_Server_IP> from the
client machine where the Desktop Agent needs to be installed.
2. The DLO Agent option in the left pane provides the option to download the DLO Desktop Agent
package.
3. Download these files and initiate the Desktop Agent installation.
For client machines that are connected to the corporate network, as part of Non BOI or Occasional BOI
deployments, the Desktop Agent can be installed directly for individual or multiple client machines
through the push installation as detailed below:
Note: For push installation of the Desktop Agent on a client machine, ensure that the relevant ports are
configured as detailed in the Additional Ports for Push Installation. For client machines with Windows 8
or later version, ensure that the remote registry services are enabled and running.
For deploying the Desktop Agents onto the Mac endpoints, refer to the DLO Mac Getting Started Guide
available here.
31
Backup and Restore Verification
Once the DLO Agents are deployed on the client machines, the administrator can configure the backup
jobs to ensure the endpoints are protected.
Backup Verification
Once the backup job is run, the administrator can verify the endpoint backup status from the Backup
Status Report.
Some of the key fields from this report are also displayed in the History and Restore tabs of the DLO
Administration Console.
33
Interpretation of the Backup Status Report
Time when Agent was Last Active – This column displays DLO Agent’s last active time when the
Desktop Agent was able to communicate to the server. The DLO agent in a computer interacts
with the DLO server every 15 minutes to update the status of that computer and that’s when the
report gets updated as well. As long as there is network connectivity between the agent and the
server, this communication continues and this latest time of interaction is what is displayed here.
Time of Last Successful 100% Backup – This column displays the last time when the Desktop Agent
backed up user’s data completely. In simpler terms, this is the time stamp when the machine had
achieved a 100% Backed up status (all files in the Backup selection backed up). In case of this
column being blank for a computer, it could be interpreted as the first backup, as the computer
has not been backed up completely even once.
Files in Backup Selections– This column displays the Total number of files that are available in the
Backup Selections. In case some file extensions were excluded from the backup selection using
the filters, these files are not included in the count.
Size of Backup Selections (GB) - This column displays the Total Size of files that are available in the
Backup Selections. . In case some file extensions were excluded from the backup selection using
the filters, these files are not included for this size calculation.
Backup Completion (% Based on Source Size) – This column displays the Percentage of Backups
completed. This completion percentage is in terms of the Size of the files in the Backup Selection.
For example, 4 Files, namely – A, B, C and D are in backup selection with sizes 1, 1, 2 and 6 GBs
respectively. When A, B and C files have been backed up, the Backup completion shows 40%.
Files pending for backup – This column displays the total count of files in the Backup Selection
that are still not backed up. In the above example, file D is still not backed up and hence the count
1 is displayed.
Estimated time for backup completion - This column displays the amount of time required for the
remaining backups to complete. These estimates are calculated based on the time taken for
backups taken in that machine in the past 7 days. It is displayed in Hours: Minutes format. This
column was added with the DLO 8.0 SP4 version and will not feature for the DLO 8.0 SP3 version.
Average time available for backup – This column displays the average time that the Desktop Agent
is available for a backup in a day. It is calculated based on the average availability of the agent in
the past 7 days. It is displayed in Hours: Minutes per Day. Based on this information and the
estimated time for backup completion, in the previous column, the Administrator can calculate
the Time for Backup completion in Days.
DLO 100% Backup Completion Report - DLO now provides a complete list of all users/computers
in the environment who have successfully completed the backup 100% at least once.
Note: Backup Summary fields like Backup Completion may reflect value ‘0' for some computers in
the Backup Status report, History tab and Restore tab. Fields like Backup Completion are not
Contents
supported for computers with Windows desktop agent versions prior to DLO 8.0 SP3 and Mac
agent versions prior to DLO 9.1. To resolve this issue, the agents need to be upgraded to the
latest supported version.
Restore Verification
Traverse to the required folder, select the files right click and select Restore to Original
Computer, below dialog appears.
Note: When trying to evaluate restore of an entire machine, ensure that you are selecting a
machine that has achieved 100% Backup Completion.
35
Select Redirect the restore to an alternate folder and specify an alternate folder path.
Note: With this option, it is easier to validate the Restore size and Count of files restored.
Click on OK to initiate and track the restore progress on the Client machine.
To validate the integrity of the Restore data, compare the File count and File size of the
Restored folder with the ‘Backup Status’ report columns like - Files in Backup Selections and Size
of Backup Selections (GB).