Skip to main content

EZ-Backup Articles

back
Show titles with any search term.
  • Backup and Restore

    • This page describes the special handling required to back up encrypted volumes, which are "containers" that hold encrypted files and folders. Another method is Whole-Disk Encryption...
    • Virtual machines, regardless of the underlying technology (VMWare ESX; VMWare Fusion; Microsoft Hyper-V; Oracle VM Virtual Box; Parallels, to name the more common technologies in use at Cornell)...
    • In an effort to reduce EZ-Backup storage charges, some users choose to back up only the folders that contain user documents. This method has serious repercussions in situations such as hard drive...
    • In an effort to reduce EZ-Backup storage charges, some users choose to back up only the folders that contain user documents. This method has serious repercussions in situations such as hard drive...
    • Elsewhere we describe how to create rules to include files and how to create rules to exclude files. This article describes four ways to check that the include/exclude rules will do what...
    • Start up the TSM Backup Client (Start - (All) Programs - Tivoli Storage Manager - Backup Archive GUI). Click Restore. Click the plus sign next to File Level to expand the...
    • EZ-Backup team personnel are not responsible for the management or implementation of network ACL changes on the Cornell node routers. Requests to modify such ACLs for access to EZ-Backup...
    • In order to configure your TSM client for Macintosh to prompt before starting a backup, add the following processing option to the dsm.sys file: PRESChedulecmd "/Library/Scripts/EZ-Backup/...
    • In order to configure your Macintosh to sleep upon completion of a backup, add the following processing option to the dsm.sys file: POSTNSChedulecmd "/Library/Scripts/EZ-Backup/osawrap.sh...
    • This process assumes that the TSM client software was installed using the documentation and installer provided by the EZ-Backup Service. Start the TSM GUI client. (...
    • This article describes the process of backing up encrypted files. There is a separate article describing backing up CyberAngel and TrueCrypt encrypted volumes. This does not...
    • It is possible to include certain files and exclude others from backup using include/exclude rules. This article covers excluding files. We have a similar article on how to include files for...
    • If you are using Microsoft Outlook as your mail client, and you are storing mail on your system, (which means your messages are stored in .pst files on your system, you need to be aware that the...
    • It is possible to include certain files and exclude others from backup using include/exclude rules. This article covers including files. We have a similar article on how to exclude ...
    • The instructions on this page are based on the following IBM documentation: TSM client for Windows v6.4 TSM client for Windows v7.1 The following assumes that the...
    • The documentation that is installed with TSM GUI client has an excellent section that features a step-by-step procedure for restoring files and/or folders from backup. To view this section of the...
    • Use this procedure to verify that the Client Acceptor Daemon is operating properly. Verify that the CAD process is running. Macintosh: Using the Activity Monitor, viewing...