Backup Exec 16 Best Practices

Last Published:
Product(s): Backup Exec (16.2, 16.1, 16.0)
  1. Backup Exec 16 Best Practices
    1.  
      Best practices for Backup Exec 16 software encryption
    2.  
      Best practices for Backup Exec 16 installation
    3.  
      Best practices for Backup Exec 16 tape management
    4.  
      Best practices for Backup Exec 16 disk-based storage
    5.  
      Best practices for Backup Exec 16 data lifecycle management (DLM)
    6.  
      Best practices for Backup Exec 16 catalogs
    7.  
      Best practices for Backup Exec 16 backups
    8.  
      Best practices for Backup Exec 16 backing up critical system components
    9.  
      Best practices for Backup Exec 16 Agent for Microsoft Exchange Server
    10.  
      Best practices for Backup Exec 16 Agent for Microsoft SQL Server
    11.  
      Best practices for Backup Exec 16 Agent for Linux
    12.  
      Best practices for Backup Exec 16 Agent for Microsoft SharePoint
    13.  
      Best practices for Backup Exec 16 Central Admin Server Option
    14.  
      Best practices for Backup Exec Agent for Oracle on Windows and Linux Servers
    15.  
      Best practices for Backup Exec 16 NDMP Option
    16.  
      Best practices for Backup Exec 16 reports
    17.  
      Best practices for Backup Exec 16 and LiveUpdate
    18.  
      Best practices for Backup Exec 16 Simplified Disaster Recovery
    19.  
      Best practices for Backup Exec 16 Agent for Enterprise Vault and the Backup Exec Migrator
    20.  
      Best practices for Backup Exec 16 Granular Recovery Technology
    21.  
      Best practices for Backup Exec 16 Remote Media Agent for Linux
    22.  
      Best practices for Backup Exec 16 Agent for Microsoft Hyper-V
    23.  
      Best practices for Backup Exec 16 Agent for VMware
    24.  
      Best practices for Backup Exec 16 Storage Provisioning Option
    25.  
      Best practices for using Backup Exec 16 with server clusters
    26.  
      Best practices for Backup Exec 16 Deduplication Option
    27.  
      Best practices for using Backup Exec 16 Deduplication Option with the Central Admin Server Option
    28.  
      Best practices for using hot-pluggable devices such as USB devices in a drive rotation strategy
    29.  
      Best practices for Backup Exec 16 database encryption keys
    30.  
      Best Practices for Using the Veritas Backup Exec Cloud Connector

Best practices for Backup Exec 16 software encryption

Best practices include tips and recommendations to help you use software encryption effectively with Backup Exec 16. For more information about software encryption, see the Backup Exec Administrator's Guide.

The following best practices can ensure smooth operations when you administer software encryption:

  • Create strong pass phrases by doing the following:

    • Use more than the minimum number of characters that are required.

    • Use a combination of upper- and lower-case letters, numbers, and special characters.

    • Avoid literary quotations in pass phrases.

    • Keep your pass phrases secure.

  • Run Backup Exec Services in FIPS mode and use 256-bit AES encryption to be FIPS-compliant.

    To enable FIPS compliance, select the Use FIPS 140-2 compliant software encryption option in the Network and Security settings.

  • Use software compression with encryption if the data must be compressed.

  • Avoid using hardware compression with software encryption.

  • If you do not use software encryption when you back up data to disk-based storage, use File System encryption to prevent unauthorized access.

  • Use the same encryption key for all of the templates in a synthetic backup policy.