
available, but you must know which media to use and what needs to be restored,
for example, the exact file name.
The IDB also keeps information on how long the actual data on the media will not
be overwritten.
Data protection, catalog protection and logging level policies influence the availability
of data and access time to data during restore.
Enabling the browsing of files and quick restore
To restore files quickly, both information about backed up data in the catalog and
protected data on the media, must exist. Information in the catalog allows you to
browse, select, and start the restore of files using the Data Protector user interface
and allows Data Protector to quickly locate data on backup media.
Enabling the restore of files, but not browsing
Once catalog protection has expired and data protection is still valid, you cannot
browse files in the Data Protector user interface, but you can still restore data if you
know the file name and the media. The restore is slower as Data Protector does not
know where on the media the desired data is located. You can also import the media
back into the IDB, thus re-establishing the information about backed up data in the
catalog, and then start restoring.
Overwriting backed up files with new data
Once data protection has expired, data on the media is overwritten in one of the
subsequent backups. Before this happens, you can still restore the data from the
media.
TIP:
Set data protection to the amount of time that you must keep the data, for example, one
year.
Set the catalog protection to the amount of time you want to be able to browse, select,
and restore files quickly using the Data Protector user interface.
Concepts guide
101
Summary of Contents for B6960-96035
Page 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...
Page 20: ...20 ...
Page 22: ...Publication history 22 ...
Page 132: ...Planning your backup strategy 132 ...
Page 182: ...Media management and devices 182 ...
Page 186: ...Users and user groups 186 ...
Page 204: ...The Data Protector internal database 204 ...
Page 218: ...Figure 62 Direct SIP integration example Service management 218 ...
Page 242: ...Integration with database applications 242 ...
Page 264: ...Synthetic backup 264 ...
Page 274: ...Split mirror concepts 274 ...
Page 288: ...Snapshot concepts 288 ...
Page 344: ...Further information 344 ...
Page 402: ...Glossary 402 ...