Veritas™ System Recovery 21 User's Guide
- Introducing Veritas System Recovery
- Installing Veritas System Recovery
- Installing Veritas System Recovery
- Ensuring the recovery of your computer
- Creating a new Veritas System Recovery Disk
- Creation Options
- Storage and Network Drivers Options
- Customizing an existing Veritas System Recovery Disk
- About restoring a computer from a remote location by using LightsOut Restore
- Creating a new Veritas System Recovery Disk
- Getting Started
- Setting up default general backup options
- File types and file extension
- Best practices for backing up your data
- Backing up entire drives
- Backing up files and folders
- Running and managing backup jobs
- Running an existing backup job immediately
- Backing up remote computers from your computer
- Monitoring the status of your backups
- About monitoring backups
- Monitoring the backup status of remote computers using Veritas System Recovery Monitor
- Adding a remote computer to the Computer List
- Exploring the contents of a recovery point
- Managing backup destinations
- About managing file and folder backup data
- Managing virtual conversions
- Managing cloud storage
- Direct to cloud
- About creation of Amazon Machine Image (AMI) in Amazon from Veritas System Recovery backups
- About S3-Compatible Cloud Storage
- About Veritas System Recovery supporting Veritas Access
- Recovering files, folders, or entire drives
- Recovering a computer
- Booting a computer by using the Veritas System Recovery Disk
- About using the networking tools in Veritas System Recovery Disk
- Copying a hard drive
- Using the Veritas System Recovery Granular Restore Option
- Best practices when you create recovery points for use with the Granular Restore Option
- Appendix A. Backing up databases using Veritas System Recovery
- Appendix B. Backing up Active Directory
- Appendix C. Backing up Microsoft virtual environments
- Appendix D. Using Veritas System Recovery 21 and Windows Server Core
Recovery point encryption
You can enhance the data security by using the Advanced Encryption Standard (AES) option to encrypt recovery points that you create or archive. You should use encryption if you store recovery points on a network and want to protect them from unauthorized access and use.
You can also encrypt recovery points that were created with earlier versions of Veritas LiveState Recovery or Veritas System Recovery. However, encrypting those files makes them readable with the current product only.
You can view the encryption strength of a recovery point at any time by viewing the properties of the file from the Recovery Point Browser.
Encryption strengths are available in 128-bit, 192-bit, or 256-bit. While higher bit strengths require longer passwords, the result is greater security for your data.
The following table explains the bit strength and required password length.
Table: Password length
Bit strength | Password length |
---|---|
8 characters or longer | |
16 characters or longer | |
32 characters or longer |
You must provide the correct password before you can access or restore an encrypted recovery point.
Warning:
Veritas Technical Support cannot open an encrypted recovery point. Store the password in a secure place. Passwords are case-sensitive. When you access or restore a recovery point that is password encrypted, Veritas System Recovery prompts you for the case-sensitive password. If you do not type the correct password or you forget the password, you cannot open the recovery point.
Besides bit strength, the format of the password can improve the security of your data.
For better security, passwords should use the following general rules:
Do not use consecutive repeating characters (for example, BBB or 88).
Do not use common words you would find in a dictionary.
Use at least one number.
Use both uppercase and lowercase alpha characters.
Use at least one special character such as {}()[],.<>;:'"?/|\'~!@#$%^&*()_-+=.
Change the password after a set period of time.
More Information