Consistent and relevant backup ........................................................................... 34
Creating a consistent and relevant backup ..................................................... 35
Encrypted backups ...................................................................................... 35
Updating and editing the system recovery data (SRD) ............................................ 36
Updating using the SRD update wizard ......................................................... 37
Updating using omnisrdupdate ..................................................................... 37
Updating using a post-exec script .................................................................. 39
Editing the SRD file ..................................................................................... 39
3 Disaster recovery for Windows .......................................... 41
Assisted Manual Disaster Recovery of a Windows system ....................................... 41
Overview ................................................................................................... 41
Requirements .............................................................................................. 42
Limitation ................................................................................................... 42
Preparation ................................................................................................ 42
Recovery .................................................................................................... 48
Disk Delivery Disaster Recovery of a Windows client ............................................. 50
Overview ................................................................................................... 51
Requirements .............................................................................................. 52
Limitations .................................................................................................. 52
Preparation ................................................................................................ 52
Recovery .................................................................................................... 53
Enhanced Automated Disaster Recovery of a Windows system ................................ 54
Overview ................................................................................................... 55
Requirements .............................................................................................. 56
Limitations .................................................................................................. 59
Preparation ................................................................................................ 59
The DR ISO image file ........................................................................... 60
The kb.cfg file ...................................................................................... 62
Preparing the encryption keys ................................................................ 62
The Phase 1 Startup file (P1S) ................................................................ 63
Preparing DR ISO image ....................................................................... 64
Recovery .................................................................................................... 65
One Button Disaster Recovery of a Windows system ............................................... 70
Overview ................................................................................................... 71
Requirements .............................................................................................. 72
Limitations .................................................................................................. 74
Preparation ................................................................................................ 74
OBDR backup ...................................................................................... 75
The kb.cfg file ...................................................................................... 78
Preparing the encryption keys ................................................................ 79
Recovery .................................................................................................... 79
4