How Backup Exec Retrieve works

The following table describes a typical use-case scenario for installing, configuring, and using Backup Exec Retrieve. It includes information for both the administrator and the end user .

End users log on with their domain credentials. The system restricts their access so that they can only retrieve the files to which they originally had access. For example, if a file server is protected, users likely only have access to the files that are located inside shared folders. Backup Exec Retrieve also allows Exchange email retrieval. In such cases, mailbox permissions and mailbox folder permissions control the access.

Table: How Backup Exec Retrieve works

Process order

Role

Task or Process

1

Administrator

Optional – Installs Backup Exec and Backup Exec Archiving Option on the Backup Exec media server.

2

Administrator

Installs Backup Exec Retrieve on a Web server or on the Backup Exec media server that is on a Web server.

3

Administrator

Configures Backup Exec Retrieve with the locations of any of the following indexers that can be included in searches by end users:

  • Media server (for the files and the emails that the Backup Exec Archiving Option archives).

  • Backup Exec System Recovery Manager server (for files in recovery points that Backup Exec System Recovery creates).

  • Continuous Management Service server (for the files that Continuous Protection Servers back up).

  • Desktop and Laptop Option server (for the files that the Backup Exec Desktop and Laptop Option backs up).

4

Administrator

Notifies the end users of the following Backup Exec Retrieve Web address so that they can search their own files and emails.

https://<Backup Exec Retrieve Web server name>/BERetrieve

You must also provide the following information to the end users:

  • If the standard Windows security alert screens are displayed to the user, inform the user to click Yes or OK to continue.

  • If a message appears to the user with information about the security certificate, it is related to SSL certificates. Have the user click Yes to continue.

5

End user

  • Launches Backup Exec Retrieve using the Web address that the administrator supplies.

  • The browser may prompt the end user to download and install Microsoft Silverlight, which is a necessary component to use Backup Exec Retrieve.

    Your organization may not permit end users to download files from the Web. In such cases, the administrator must deploy Silverlight to the end users’ computers before end users can use Backup Exec Retrieve.

    See About deploying the Silverlight run time in your organization.

    If Silverlight is already installed on the user’s computer, the browser immediately displays the Backup Exec Retrieve logon screen.

  • At the logon screen, the end users type their user name, password, and domain.

    The credentials that a user specifies here determines what data they are authorized to view and retrieve.

6

End user

Selects to search, browse, or view recent activity for files or email.

7

End user

Submits a query. Backup Exec Retrieve displays the results for the end user to page through. The user can click a related link to drill down into the information.

8

End user

Retrieves the selected file or email and saves it locally on their computer or elsewhere.

How Backup Exec Retrieve works