Veritas™ System Recovery 21 User's Guide
- Introducing Veritas System Recovery
- Installing Veritas System Recovery
- Installing Veritas System Recovery
- Ensuring the recovery of your computer
- Creating a new Veritas System Recovery Disk
- Creation Options
- Storage and Network Drivers Options
- Customizing an existing Veritas System Recovery Disk
- About restoring a computer from a remote location by using LightsOut Restore
- Creating a new Veritas System Recovery Disk
- Getting Started
- Setting up default general backup options
- File types and file extension
- Best practices for backing up your data
- Backing up entire drives
- Backing up files and folders
- Running and managing backup jobs
- Running an existing backup job immediately
- Backing up remote computers from your computer
- Monitoring the status of your backups
- About monitoring backups
- Monitoring the backup status of remote computers using Veritas System Recovery Monitor
- Adding a remote computer to the Computer List
- Exploring the contents of a recovery point
- Managing backup destinations
- About managing file and folder backup data
- Managing virtual conversions
- Managing cloud storage
- Direct to cloud
- About creation of Amazon Machine Image (AMI) in Amazon from Veritas System Recovery backups
- About S3-Compatible Cloud Storage
- About Veritas System Recovery supporting Veritas Access
- Recovering files, folders, or entire drives
- Recovering a computer
- Booting a computer by using the Veritas System Recovery Disk
- About using the networking tools in Veritas System Recovery Disk
- Copying a hard drive
- Using the Veritas System Recovery Granular Restore Option
- Best practices when you create recovery points for use with the Granular Restore Option
- Appendix A. Backing up databases using Veritas System Recovery
- Appendix B. Backing up Active Directory
- Appendix C. Backing up Microsoft virtual environments
- Appendix D. Using Veritas System Recovery 21 and Windows Server Core
About exploring recovery points
You can use Veritas System Recovery to explore files in a recovery point. You mount the recovery point and assign it a drive letter so that it is visible from Windows Explorer.
You can perform the following tasks on the assigned drive:
Run ScanDisk (or CHKDSK).
Perform a virus check.
Copy folders or files to an alternate location.
View disk information about the drive, such as used space and free space.
Run programs existing within a mounted recovery point.
Within a mounted recovery point, programs that you run cannot rely on any registry values. The programs also cannot rely on COM interfaces, Dynamic Link Libraries (DLLs), or other similar dependencies.
You can set up a mounted drive as a shared drive. Users on a network can connect to the shared drive and restore files and folders from the recovery point.
You can mount one or more recovery points at a time. The drives remain mounted until you unmount them or you restart the computer. Mounted drives do not take up extra hard-disk space.
You do not need to mount a drive to restore the files or folders from within a recovery point.
All security on the NTFS volumes remains intact when they are mounted.
See Exploring a recovery point through Windows Explorer.