The purpose of this check list is to help you organize your infrastructure details in order to build a comprehensive data protection solution. You should also be ready to explain your current challenges you would like to address with the new solution, as well as new capabilities you desire.
Items to be considered for backup
- VM Protection & Cloud Operations
- Filesystem & Application Protection
- Endpoint data protection
- Legal Search and eDiscovery
List each site containing data to be managed, enter name of site, the number of TBs that will be managed (i.e. protected, archived, or snap shot) and whether you want to protect that data to storage locally versus a remote site.
|Location||# of TBs||Data Protected To|
Virtual Machine Protection
- Current hypervisors – Vmware, Hyper-V or Citrix?
- What is the number of active CPU sockets on the hypervisors hosting VMs to be protected?
- Do you require rapid-array based snapshot protection of virtual machines, the ability for VM owners to perform their own self-service restores, the ability to backup to cloud disk targets, or the ability to recover VM’s to cloud infrastructures?
- How many TBs of VMs will be protected using backups to disk or tape copies?
- Will this solution involve advanced cloud operations features such as provisioning, archiving, and replication?
Filesystem & Application Protection
- How many physical or virtual servers will be protected using a filesystem agent installed on the system?
- Windows Servers
- Other – Linux Unix OSX, etc
- If OS level clustering is being used, how many cluster groups will be protected using the cluster agent? How many NAS clients will be protected via the NDMP protocol? (Include both physical and vfilers)
- Will the solution include snapshot management for filesystem or application agents?
- How many terabytes of server data…
- Will be protected using only streaming backup copies?
- Will be protected by an application agent?
How many application agents will be utilized to protect both physical and virtual machines? Note that in order to use an application agent, servers must also have a filesystem agent.
EndPoint Data Protection
Per User Questions
- How many users will have their laptops and desktops protected?
- How many users will use the file synchronization feature? This cannot exceed the number of users with protected computers.
- How many users may have their data searched against using the Compliance Search/eDiscovery features? This cannot exceed the number of users with protected computers
- Is the Case Manager feature required for endpoint data? This assists in collecting data related to a specific person or case for future compliance search.
Per Endpoint Questions
- How many Windows laptops and desktops will you protect?
- How many OSX or Linux laptops and desktops will you protect?
- How many Windows clients will you be archiving filesystem data?
- How many Linux clients will you be archiving filesystem data?
- How many Unix clients will you be archiving filesystem data?
- How many NAS clients will you be archiving filesystem data?
- How many mailboxes will be archived for purposes such as space reduction, journal mailbox collection, or PST archiving?
- How many mailboxes may be searched against for Compliance purposes? This cannot exceed the number of mailboxes archived.
- How many terabytes of filesystem data exists on servers that will be protected or archived?
Protect your business by building the right data protection infrastructure
IT resiliency and security is more vital than ever as businesses undertake digital transformation. Unfortunately, a perfect storm of mobile devices, social media, e-commerce, hybrid clouds, and the “always-on” business environment has made this challenge complex. In this best practices guide, discover how you can minimize disruption from IT security threats — and confidently keep your business up and running.
If you have questions about this check list or building the right backup and recovery solution, please feel free to reach out to our team of data protection specialist.