1 / 15

Disaster Recovery Planning

Disaster Recovery Planning. IT:Network:Applications 10-150-188. Disaster Recovery Planning. Preparation Documentation Security Recovery Backups Recovery Software. Preparation. Identify vulnerabilities Perimeter devices Security devices Remote access gateways Routers Remote offices

vidal
Télécharger la présentation

Disaster Recovery Planning

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Disaster Recovery Planning IT:Network:Applications 10-150-188

  2. Disaster Recovery Planning • Preparation • Documentation • Security • Recovery • Backups • Recovery Software

  3. Preparation • Identify vulnerabilities • Perimeter devices • Security devices • Remote access gateways • Routers • Remote offices • Etc. • Exposed services • Email • Web • Intranet • VPN • Remote Administration • Etc.

  4. Preparation • Identify mission critical services • Mission critical refers to any factor of a system (equipment, process, procedure, software, etc.) whose failure will result in the failure of business operations. That is, it is critical to the organization's 'mission'. • (http://en.wikipedia.org/wiki/Mission_Critical) • What can we do to prevent it? • What can we do to recover from it?

  5. Preparation • Physical measures • Fire Suppression • Security measures • Proximity badges • Biometrics • File System • Rights/Permissions • NTFS vsShare • Auditing • Authentication • Password strategies

  6. Documentation • Configuration • At a minimum • Step by step system procedures from building a server to creating a folder • Hardware (Bios settings) • What is required to get a system restored • OS • Version; License Numbers; Administrator Password; • IP Addr; Services Installed; Services Config • Helps to check configuration • Helps to rebuild if needed

  7. Security • Security Updates as soon as feasible • Service Packs • When your third party software blesses it • Some software packages can be 6 months behind • Driver Updates • Be sure to test • BIOS Updates • Be sure to test

  8. Recovery • “It isn’t if the hard drive will fail, it’s when will the hard drive fail.” • User “oops” or PEBKAC • Accident • Intentional • 95% of data loss comes from inside

  9. Backups • Full backup is always best • Incremental • Restore requires all good incremental from last Full • Differential • Restore requires last good differential and last full • Both handle a file based on the archive bit status

  10. Backups • Backup Media Rotation • Grandfather – Father – Son (GFS) • G: Monthly full; F: Weekly full; S: Daily • Others available: (e.g., Tower of Hanoi) • Think powers of 2 • setA every two days; setB every 4 days; setC every 8…

  11. Backups • Daily backups • Should keep the previous backup off-site • Rotate off-site daily • Quick and easy to restore • Full backup can be rotated every two weeks at a minimum. • FridayA is offsite until FridayB is run

  12. Backups • Weekly/Monthly • Kept as long as “needed” • Keep secured • Theft • Larger companies outsource backup storage • Off-site courier storage • Third party companies offering remote backup services (cloud-ish data backup) • Read Service Level Agreements (SLA) thoroughly • Prudent to have attorney review

  13. Backups • Windows Server 2008 R2 does not support tape devices • Backups are trending towards disk to disk backups • System imaging is gaining popularity • Can backup to file or to a remote system

  14. Recovery Software • Doesn’t need to be fancy • Microsoft Backup works • GUI is easy to use • Command line options— • Wbadmin.exe • Wbadmin.exe START RECOVERY –version:09/30/2010-18:30 –items:d:\common –itemtype:File –backupTarget:E: -recursive

  15. Recovery Software • You get what you pay for • Symantec Backup Exec • Backup Assist • Storagecraft • Arcserve

More Related