How to Perform a Backup Restore
Overview
Performing a backup restore for Endpoint Protector is essential for maintaining data security and system integrity, especially when using the eDiscovery module. This article outlines the steps and considerations for a successful backup and restore process.
Instructions
Backup Process
- On the Endpoint Protector Server, navigate to System Maintenance > System Backup v2 > System Backup Information.
- Click Create to access System Backup Information.
- Provide a name and a brief description for the backup.
- Click Save to initiate the backup process.
- When prompted, securely store the System Backup Key displayed in the pop-up window. This key is required for importing and restoring the backup.
- Confirm that you have saved the System Backup Key by selecting Yes, I saved the System Backup Key.
- The system backup (excluding logs) will be created and listed in the List of System Backups. You can view, download, or delete the backup as needed.
Restore Process
NOTE: Before restoring, use the Audit Log Backup feature because logs will not be retained. Download any previous system backups, as only the backup you import and restore will remain.
- On the Endpoint Protector Server, navigate to System Maintenance > System Backup v2 > System Backup Information.
- Click Import and Restore (Migrate).
- From Import, choose File... and select the System Backup v2 file saved during the backup process.
- Enter the System Backup Key in the provided field.
- Click Import to begin the restore process.
- Monitor the status in the List of System Backups. The status will display as "Generating" in red letters for the backup in progress.
- When prompted, log back into the Endpoint Protector Console.
- If necessary, use the Audit Log Backup feature to restore logs.
- For eDiscovery module users: After restoring the backup, use the re-read rights and settings for all computers feature (Dashboard > System Status > System Functionality). This ensures accurate correlation between previously discovered items and actions (such as Encrypt, Decrypt, Delete, etc.) that can be performed on these files.
By following these steps, you can successfully perform a backup and restore for Endpoint Protector, ensuring data accuracy and integrity throughout the process.