Commvault Backup And Recovery 1. CVTSP11.20-M3-Commvault ...

31
COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY. COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY. Commvault Backup And Recovery 1. CVTSP11.20-M3-Commvault Backup & Recovery 1.1 Commvault® Backup & Recovery Notes: Welcome to the third module in the Commvault Technical Sales Professional Accreditation. In this module, we will provide an overview of the key technologies and functionalities included in Commvault® Backup & Recovery.

Transcript of Commvault Backup And Recovery 1. CVTSP11.20-M3-Commvault ...

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

Commvault Backup And Recovery

1. CVTSP11.20-M3-Commvault Backup & Recovery

1.1 Commvault® Backup & Recovery

Notes:

Welcome to the third module in the Commvault Technical Sales Professional Accreditation. In this module, we will provide an overview of the key technologies and functionalities included in Commvault® Backup & Recovery.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.2 Learning objectives

Notes:

The information in this module will help you describe the key data protection technologies and functions provided by Commvault® Backup & Recovery. You will also learn how to convey the technical value proposition in your sales campaigns and describe the differentiating factors that sets Commvault software apart from alternative solutions in the market.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.3 Commvault® Backup & Recovery

Notes:

Commvault Backup & Recovery, ensures data availability for all workloads across cloud and on-prem environments, delivering: • Simple, comprehensive backup and archiving from a single extensible platform

and user interface • Trusted recovery including rapid, granular recovery of data and applications • Scalable cost-optimized cloud data mobility via automatic scaling and tiering of

cloud usage • Resilient ransomware protection and end-to-end data security with encryption • Flexible data reuse with copy data management

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.4 Data Protection options

Notes:

Commvault® Backup & Recovery can be purchased as a standalone package. It is also included as part of the Complete Data Protection bundle, which is a combination of Commvault Backup & Recovery and Commvault Disaster Recovery products, bringing with it all the functionality of the two products combined in a comprehensive backup and disaster recovery solution. Please note there is a separate training module covering the Commvault Disaster Recovery product.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.5 Importance of application and OS awareness

Notes:

Customer environments are often distributed across multiple locations, including on-premise data centers , the edge, public cloud, multiple clouds, or any number of combinations in-between. There is also the wide variety of traditional operating systems and applications to contend with, and the rapidly developing enterprise IT methodology of application containerization, which utilize micro-services and distributed applications. Every operating system and application has certain nuances and methodologies to ensure that the data resident on the hosts is protected properly and can be efficiently recovered in a usable state. Discrepancies between versions of applications can also introduce challenges for the protection of these applications. For example, ensuring that applications are in a consistent state at the time of protection, and that the various components of an application such as logs and data are synchronized properly at the time of protection is not always a simple process. The expertise on how to effectively protect data across the diversity presented by today’s IT environments does not come overnight. Commvault® software has evolved over more than two decades, to accommodate the protection needs our customers demand for all major operating systems and applications in the market. For a complete list of supported virtualization and cloud vendors, operating systems, and applications, please visit documentation.commvault.com.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.6 Commvault Command Center™

Notes:

The Commvault Command Center is an easy-to-use, web-based user interface for the administration of Commvault® Backup & Recovery. The majority of backup & recovery features are configured and managed from the “Protect” tab. When you log in to the Command Center for the first time, you will complete the Core Setup wizard. The wizard helps you add disk, or cloud storage, which is where data is stored when backed up, and also enable deduplication. After you have completed the core setup, the Guided Setup page appears, where you can perform backup and recovery of file servers, virtual machines, laptop and desktop computers, applications (including Office 365), and databases.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.7 Protect: Virtualization

Notes:

Commvault® Backup & Recovery provides a scalable, policy-based Virtualization solution that streamlines the processes of backing up virtual machines, restoring virtual machine data, and monitoring protection operations. Commvault® Backup & Recovery provides backup to, recovery from, and data mobility between on-prem and the cloud, and within the cloud. Commvault is able to better scale cloud usage on-demand, minimizing costs, and also optimize cloud vs on-prem location of data and workloads through policy-driven rules including automatic tiering. The Commvault Command Center lets you get started quickly, by performing a simple configuration of virtual machine hypervisors, storage, and VM groups in just a few minutes, then run backups immediately. Here you can also initiate backups and restores, get information about virtual machine protection, and manage jobs, schedules, alerts, events, and users. Agentless data protection and recovery operations is supported for the following hypervisors… VMware vCenter and VCloud director, Microsoft Hyper-V, Microsoft Azure Stack, Nutanix Acropolis, OpenStack, Oracle VM, Red Hat virtualization, and Red Hat Openshift. Commvault® also provides agentless data protection and recovery operations of virtual machines hosted inside Public clouds, including, Amazon, Microsoft Azure, Google, Oracle, and Alibaba. Users can restore full Virtual machines, Virtual machine files, and guest files, through the Commvault Command Center, and it’s as simple as a restoring a regular file. Additionally, by leveraging Commvault’s broad hypervisor support,

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

users can perform VM conversion for DR and migration purposes, by performing a full VM restore and converting the source virtual machine to be used with a different hypervisor or public cloud instance. Animate * at this point (Supported hypervisor configurations only) The Live Recovery feature enables virtual machines to be recovered and powered on from a backup without waiting for a full restore of the VM. This feature can be used to recover a VM that has failed and needs to be placed back in production quickly, or to validate that a backup can be used in a disaster recovery scenario. Live Mount enables you to run a virtual machine directly from a stored backup for that VM. Again, you can use this feature for backup validation or to access data from the virtual machine directly instead of restoring guest files. Finally, with the addition of Commvault® Disaster Recovery, you can configure Virtual Machine Replication to one or more secondary sites, including public clouds. Animate * at this point (Requires Commvault® Disaster Recovery + Supported hypervisor configurations only)

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.8 Protect: Virtualization Snapshots

Notes:

By combining the power of the Commvault® virtualization data protection solution with Commvault IntelliSnap® functionality, very large virtual environments can be protected in a highly efficient manner. By snapping a data store within a virtual environment for a protection copy, then conducting any processing on the snapshot as opposed to the live production volume, overhead on the virtual machines can be minimized. Virtual Server Protection with IntelliSnap® functionality is supported for VMware, Hyper-V and Nutanix Acropolis environments as well as both AWS, Microsoft Azure, and Azure Stack.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.9 Protect: Kubernetes

Notes:

With Kubernetes protection data is protected for on-premises and cloud deployed systems. The goal is the same as it is with virtualization protection where application consistency and storage consistency is maintained for systems. Given that most container based systems are designed to be stateless additional protection is needed to protect the metadata and configuration information as well as persistent volume data. Backups protect deployments, manifest files, kubeconfig files, secrets, configurations maps, as well as persistent volumes and persistent volume claims. Restores can be performed back into the original container or to a new cluster, access, node, application name or new storage class. Out-of-place restores can be used to migrate applications from on-premise cluster to cloud clusters, cloud to cloud, and managed cluster to a cloud cluster.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.10 Protect: File servers

Notes:

File system backups provide the fundamental data protection strategy for any environment. File Servers are accessed under the “Protect” tab, in the Commvault Command Center. Please note that File server backups are supported for all major operating systems within Commvault® Backup & Recovery and include inherent file system capabilities based on the operating system being protected. Let’s take a closer look at some of the key features of the Windows File System Agent. In the event of a serious system outage, such as hardware failure, or software corruption, the Windows File System Agent provides recovery of files from any specified recovery point. The system state is backed up and restored as part of Windows File System Agent backup and restore as it contains many components and services that are critical to the recovery of the Windows operating system. The Virtualize Me feature provides the ability to convert any protected server into a virtual machine quickly and reliably, Some additional features include IntelliSnap® that lets you utilize snapshot functionality across a wide variety of hardware storage platforms to provide the lowest possible RPOs, and rapid recovery.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

Restores can be in place, out of place to any other machine in the environments, or as mentioned you can even restore a full backup of a physical machine to a new virtual machine. The flexibility to recover clients should not be undersold, this can be extremely useful for migration to cloud or if a customer is ever hit by a ransomware attack or other disaster, they will very likely need to call upon these capabilities.

1.11 Protect: NAS

Notes:

Backup of Network Attached Storage (NAS) is still one of the most common requests you will hear from customers today and is a powerful differentiator for Commvault®. As NAS data sets continue to expand, the need for both backup and restore performance is more critical than ever. NAS devices are dedicated file servers that do not normally allow hosting of applications such as backup software. For NAS devices, Commvault Backup & Recovery supports both NDMP backups and Network share backups of CIFS and NFS. Commvault also supports hardware based Snapshot integration using our IntelliSnap® feature for both backup methods. IntelliSnap further enhances the Commvault NAS protection solution, providing the lowest RPOs and RTOs, and reducing impact on production resources. Having multiple protection methods for NAS available, which are easily configured from the Commvault Command Center™, provides customers with the flexibility to deploy the optimum configuration based on the individual requirements of each NAS deployment.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.12 Free up space on expensive primary storage with File Archiving

Notes:

The file archiving solution is included with Commvault Backup & Recovery and is part of the single extensible platform. It allows for primary files on supported production file systems to be replaced with small stub files that act as pointers to the original content. This allows for larger and or infrequently used files to be relocated and stored efficiently, freeing up space on more expensive primary storage. An important differentiator for Commvault is that most competitor archiving solutions do just that…archiving. They also require a separate backup product to protect the archive. With Commvault, archive data is treated like any other, through a policy driven approach and managed through a single unified console that lets customers choose how long they retain that data, the number of copies to retain, where those copies are stored, and what media they are stored on. First from guided setup in Command Center, click the Archiving tile here you create an archiving plan and set two archiving rules both of which need to be met for files to be archived the first is the file timestamp, this defines the last time the file was either modified or accessed, the second is the size of the file. In this example all files larger than 1MB that have not been modified within the last three months will be archived. Next, we add our file server to be archived, this can be a new or existing Windows, Unix, or NAS server, here we are adding an existing windows server with the path of C:\Archive We can now see the menu option for Archiving under Protect, where we can manage our archiving file servers. Once the archiving job is complete we can see the files that met the rules have been replaced with stubs, this is indicated by the stub icon on the files and the reduced size on disk for the folder. Double clicking the file will trigger a restore and automatically open the file as before making it seamless to the end users.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.13 Protect: Office 365

Notes:

Commvault® Backup and Recovery provides Office 365 Protection, which allows you to backup and restore data from Exchange Online, OneDrive for Business, Teams, and SharePoint Online. The Exchange Online Solution provides complete flexibility, enabling you to utilize an on-premises or hosted server environment, or both, using Commvault Command Center™. You can also back up data to the cloud or to local storage. The Exchange online solution provides an Express configuration option that automatically creates an Exchange Online service account for the Azure app, syncs the app with Azure, and authorizes the Azure app. You can perform restores of an individual mailbox item (such as folders, messages, and calendar appointments) or an entire mailbox. Metadata is captured in the Index, enabling users to perform data retrieval quickly and previews of messages are available for compliance searches and end-user searches. The Microsoft OneDrive for Business Data Protection solution lets you backup and restore files, file versions, folders, and OneDrive for Business accounts to cloud, local storage, and secondary storage devices. The Office 365 with SharePoint Server Agent lets you backup and restore SharePoint sites on Microsoft Office 365. This includes the ability to protect and recover documents, libraries, lists and list items, sites and sub sites, pages - and much more. Finally, you can use the Commvault® software to protect data in Microsoft Teams. This data includes the Office 365 Group mailbox and the SharePoint team site that are automatically created when you create a Microsoft Team. Please note that Metallic, Commvault’s SaaS offering, also provides Office 365 protection.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.14 Protect: Applications

Notes:

Commvault® Backup & Recovery includes the ability to protect all major enterprise applications. The Command Center™ provides a simple web-based user interface for administration tasks, providing streamlined backup and recovery for applications including Microsoft Exchange, SharePoint, ,Active Directory, and Oracle EBS. As well as G Suite (Google Mail and Google Drive) and cloud Apps including Salesforce, Amazon SQL, and Azure SQL. Commvault® Backup & Recovery also includes support for many other mainstream applications available in the market today. Each Commvault Server Agent supports several specific features and integration points, depending on the Application being protected. We cannot cover all the details of every agent in this training, but to call out one of the most popular, Microsoft Exchange. The Exchange Database application provides complete protection of Exchange, it allows organizations to protect information stores, public folder stores, and transaction logs in both standalone and DAG environments. You can also recover messages from an Exchange database backup. Depending on the backup method being utilized, message level recovery can, in most cases, be performed even without restoring the entire exchange database offline first. Finally, The Exchange Mailbox application incorporates archiving and cleanup operations. You can archive mailbox messages to secondary storage. Administrators and end users can easily and quickly retrieve archived messages.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.15 Protect: Databases

Notes:

Commvault Backup & Recovery provides support for the vast-majority of database vendors and big data solutions available in the market today. Each Commvault® Server Agent supports specific features and integration points, depending on the database type being protected. Again, we cannot cover details of every agent in this course, but to call out two of the most common: The Microsoft SQL Server protection solution provides, a complete Backup and Recovery solution for Microsoft SQL server databases. When you add a SQL instance or database, you associate a server plan with the instance or database. The Commvault software automatically performs the backup operations by using the schedule and backup operation types that are associated with the plan. You can restore a SQL database from the most recent backup or from a specified date and time. Restores can be performed in-place, out-of-place, or directly to disk. You can also perform point-in-time restores of a specific database by selecting an available Recovery Point.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.16 Protect: Databases

Notes:

Next up, Oracle. Commvault® Backup & Recovery offers complete protection of the entire Oracle database, and provides the automatic discovery of Oracle instances with granular backup and recovery of specific data files, tables and logs. There is minimal impact to database operations, and Commvault® provide simplified and automated creation of RMAN scripts. And of course, by implementing Commvault software for their Oracle environments, organizations gain the benefits that are shared across Commvault software protected environments, including source side and target-based deduplication, policy-based management, IntelliSnap® support, sharing and consolidation of infrastructure, and efficient job management and reporting capabilities.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.17 Protect: Endpoint

Notes:

Commvault Backup & Recovery includes a comprehensive endpoint protection solution, designed to provide organizations the assured protection of the remote data assets in their organization. With Commvault® software, the protection of laptops and desktops in an environment adheres to common organizational policies, improves governance, and allows organizations to be aware of the data that is resident on edge devices, as well as search across that data. It can also secure mobile devices with encryption, secure erase, geo-location and remote wipe functions. The endpoint protection solution also provides end-users with the flexibility, convenience and ease of use they have grown to expect with regards to accessing their own data. By eliminating complexity and providing end-users the capability to access their data any time, anywhere, and on any device, it accommodates both organizational needs, as well as end-user requirements for access and collaboration. Please note that Metallic, Commvault’s SaaS offering, also provides an Endpoint protection product. For more information please refer to the Metallic module, which is included as part of this accreditation.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.18 Protect: Endpoint

Notes:

Endpoint Backup offers the following key features: Quick & Automated Backups Seamless backups using automatic schedules based on network connectivity. Improved Resource Utilization Deduplication technology, coupled with intelligent backup scheduling dramatically improves the ability to protect distributed data with optimized disk resources. Network Optimized Backups Backups over any network - LAN, WAN or VPN with dynamic bandwidth throttling. Anytime, Anywhere Access Instant self-service access to data using any web browser or the mobile Commvault® app Integrated Security Features Full encryption at all stages and secured network access (HTTPS) used together for data security. Automated Customization Based on Business Rules Ability to configure additional settings such as encryption, retention policies, and content indexing before performing the backups Please note that compliance search and data governance features require the addition of one or more products from the Activate portfolio, more details are provided in later training modules.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.19 Endpoint: Data loss prevention

Notes:

Data Loss Prevention (or DLP) is a file-level security solution that prevents unauthorized access to data on laptop clients. DLP includes the following features that can be used to secure sensitive data on laptops before and after a device goes missing: Periodic Document Encryption allows files or folders to be locked according to settings configured by an administrator. If a laptop is ever lost or stolen, the device can be marked lost or stolen to require the correct user-defined passkey to be entered before locked files can be opened and read. This prevents unauthorized users from accessing data in locked files. Additionally, the Secure Erase feature allows the administrator to configure certain files to be erased from a laptop when the laptop is missing or goes offline for more than a set number of days.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.20 Endpoint: Privacy

Notes:

Another useful feature for you to be aware of is the Privacy for Owners feature that makes the data itself secure by design. This is especially important for certain data regulations and compliance laws, such as GDPR in Europe for example. he client Privacy feature is designed to prevent users and administrators who are not client owners from viewing or downloading the data on the client. The Privacy feature must be enabled by an administrator before the user can turn it on in the Web Console. http://documentation.commvault.com/commvault/v11/article?p=4486_1.htm

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.21 Reports and Monitoring

Notes:

Many reports are available by default with the Commvault® installation and you can view them in the Command Center™ and the Web Console. Additional Reports are available for Download from The Commvault Store. You can use reports to monitor the performance of your environment with information about backup and restore operations, user operations, and disaster recovery statistics. Reports expose data that indicate errors and failures so that you can react quickly to solve problems. Reports can be shared with other users in the organization based on their security role or exported for offline use. Various pre-defined Dashboards display a preview of the most critical information gathered from all the Commvault components in your organization, such as SLA percentage, capacity usage, and backup strikes. You can view more detailed information, by clicking on the information displayed in the dashboard. For example, if you click on the “Disk Library” widget under Storage, then the Disk Library Utilization report will open automatically. Similarly, you can also drill-down and apply filters within the reports themselves to gain further insight through various collected statistics and views. Regardless of the Commvault data protection solution deployed, You can also monitor activity in the Command Center by viewing alerts , creating alert definitions, viewing reports, events, and viewing and controlling jobs.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.22 Multi-Tenant Environment

Notes:

Commvault® lets customers or service providers configure their environments for Multi-tenancy. It is simple to get started with a multi-tenancy configuration, just click “Create a company” from the Quick tasks links on the Guided Setup page in Command Center™. In a multi-tenant environment, an MSP administrator can mirror real-world organizations by setting up logically separate companies within a single instance of the Commvault® software. For each company, the MSP administrator can assign separate Service Level Agreements (SLAs) so that the agreed upon level of data protection is offered to each tenant. Defining a tenant, known as a Company, creates a single security object from which Commvault can derive tenant users and user groups, in addition it allows the system to track security through role-based access and record tenant specific metadata and customization choices. Please note that Commvault provides an official pricing model for service providers. Partners should contact their local Commvault account representative or the Partner Success Desk through the Commvault Partner Portal for more information.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.23 Snapshots: IntelliSnap®

Notes:

We already touched on IntelliSnap® briefly in early slides but to give you a better understanding, IntelliSnap is a software functionality built into the Commvault® suite that controls and manages snapshot functionality across a wide variety of hardware storage platforms, allowing users to integrate and utilize snapshots as an effective tool in a comprehensive data and information management solution IntelliSnap integrates with a wide variety of hardware storage arrays, and leverages the APIs for the arrays in order to manage and control the snapshot process. By combining Commvault's deep experience with application and data protection with the power of hardware snapshots, customers are able to leverage snapshots in a much more effective manner. Some of the key benefits derived when leveraging IntelliSnap functionality include centralized configuration and reporting of all aspects of data protection across an environment, the capability to use a single policy for the entire lifecycle of a data set, and the elimination of scripting and simplification of snapshot operations through a single console.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.24 IntelliSnap® technology: scope of coverage

Notes:

As depicted here, IntelliSnap® supports a wide variety of hardware platforms and applications in the market. For the latest supported devices, as well as for detail on operating system and application support, please visit the Commvault® documentation website at documentation.commvault.com.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.25 Snapshots: IntelliSnap® technology

Notes:

Initial IntelliSnap® operations are performed after communicating with the Server agent to be protected, such as a file-system, application or virtual machine. The resource is automatically paused via its native tools or APIs, a process known as quiescing. Quiescing ensures consistency and recoverability. IntelliSnap® then leverages the Commvault® media agent to interface with the storage array to control the snapshot process and perform the required indexing operations. Configuration and Scheduling are configured within the same console as traditional backup; which allows you to easily configure both snapshot and backup copies within the same plan. The media agent may be configured to mount a particular snapshot for further processing options. The data within the snapshot is catalogued, indexed, and backed up to what ever storage target or targets, have been designated in the plan. Commvault provides the flexibility for administrators to control the snapshot creation and retention to meet both low RPO requirements and long term recovery points, without exceeding the thresholds of their storage array. The entire process is orchestrated via a single console, without the need for third party applications or scripting. Commvault also provides IntelliSnap snapshot replication functionality, with certain supported hardware array vendors. As the depth of IntelliSnap integration varies across array vendors it is always recommended to check the latest supported platforms on the Commvault documentation Website at documentation.Commvault.com

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.26 Commvault Ransomware protection

Notes:

As mentioned in the Architecture Overview module, Commvault® provides a number of Ransomware protection features. Ransomware is a type of malicious software that infects a computer. It typically takes the computers files hostage, using advanced encryption. It spreads quickly, infecting all the files on a computer, it then demands a ransom…….. pay the ransom and it promises to unencrypt your files so that you can access them again. Of course paying the ransom does not guarantee you will get your files back! What makes Ransomware even more of a serious threat to organisations is its persistent and contagious nature. It can spread quickly, infecting other systems on the network and as seen in recent cases that made the news, even cripple critical systems, such as Active Directory for example. Commvault can help protect organisations from ransomware attacks in three ways. First, to stop ransomware infecting backups, the last line of defence, Commvault software can protect the backup storage from ransomware attacks by write protecting locally-attached and network-based mount paths from all processes except the Commvault processes themselves. Commvault also supports tape media and cloud storage for data. Tape media has inherent protection against Ransomware by its sequential write limits. Cloud storage requires encrypted key access that can prevent Ransomware from infecting backup data stored in the cloud. If your environment

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

is infected with ransomware, you can use the point-in-time recovery options that Commvault software provides to quickly and easily restore your backed-up data to its pre-infected state. Second, Commvault software can detect the presence of ransomware on your client computers using two different checks. The first check uses the honeypot method, in which a file with a known signature is monitored for change. The second ransomware check detects anomalies in your file handling patterns. For example, an abnormal number of files being modified, renamed, created, or deleted. Third, Because software vendors focus their ransomware protection updates on the most recent version of their software, legacy systems might not get ransomware updates. Commvault software provides backup protection of legacy systems and also provides users with access to the data, directly from backup media. Also, users can selectively restore the data to alternate platforms or updated platforms, including virtual machines. For an organization to protect their valuable data from ransomware, there are important steps that should be taken, such as keeping software up to date and using anti-virus software. But the most important step one can take is to use the full power of Commvault software to protect, monitor, and recover data when threatened by ransomware. Storage of the CommServe DR backup data on cloud.commvault.com is a free service to all customers. We recommend that you store a copy of data on tape or on cloud storage. Tape and cloud storage store offline data, and offline data is not easily accessible to ransomware software.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.27 https://metallic.io

Notes:

Please note that Metallic™ also offers several of the solutions and features described during this module, delivered through a flexible SaaS platform. This includes, Metallic Core Backup & Recovery, which covers VMs to file servers, and SQL databases. Metallic Office 365 Backup & Recovery, which protects Exchange Online, OneDrive, SharePoint Online, and Teams. and Metallic Endpoint Backup & Recovery. For more information please refer to the Metallic module, which is included as part of this accreditation, and Metallic.io.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.28 Wrap-up

Notes:

In this module, we discussed the key features and functionality provided by Commvault® Backup & Recovery. This included Commvault® software’s Protection offerings, covering the broadest range of virtualization technologies, operating systems, applications, and databases - all managed through the easy-to-use Command Center™ interface. You also learned about: Commvault’s capabilities for multitenancy, reporting and monitoring, and IntelliSnap® functionality, which allows organizations to leverage hardware-based snapshots as a tool in an overall data management solution. We hope that this module has provided you a core understanding of these areas, and the capability to express some of the key technologies that set Commvault software apart.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

COMMVAULT CONFIDENTIAL AND PROPRIETARY. INTERNAL AND PARTNER UNDER NDA USE ONLY.

1.32 Thank you