67
StorageCraft Recovery Environment User Guide

Shadow Protect 4.0 Recovery CD User Guide

Embed Size (px)

Citation preview

Page 1: Shadow Protect 4.0 Recovery CD User Guide

StorageCraft Recovery Environment

User Guide

Page 2: Shadow Protect 4.0 Recovery CD User Guide

User GuideStorageCraft™ Recovery Environment

Copyright (c) 2006 - 2011 StorageCraft Technology Corporation TM.

All rights reserved. This product and/or its use may be covered by one or more patents pending.Please visit www.storagecraft.com/legal for more information about StorageCraft TechnologyCorporation's (STC) intellectual property, trademarks, copyrights and any patents pending.

StorageCraft Recovery Environment is provided by STC to licensee on an "as is" basis and "withall faults." STC specifically calls the licensee's attention to provisions of the End-User LicenseAgreement ("License") that are intended to leave full responsibility and risk for the use or theresults of use of StorageCraft Recovery Environment entirely with the licensee. These provisionsinclude, but are not limited to, LIMITED WARRANTY, DISCLAIMER OF WARRANTIES andLIMITATION OF LIABILITY.

No part of this document may be reproduced in any means, electronic or mechanical, for anypurpose, except as expressed in the accompanying License Agreement.

for

StorageCraft Technology Corporation11850 S. Election Road, Suite 120Draper, UT 84020U.S.A.

Page 3: Shadow Protect 4.0 Recovery CD User Guide

3Contents

3

© 2006-2010 StorageCraft Technology Corporation

Table of Contents

Chapter 1: About the User Guide 5

Chapter 2: ShadowProtect Overview 6

................................................................................................................................... 6Features and Components2.1

................................................................................................................................... 8Recovery Environment Usage Scenarios2.2

Chapter 3: How ShadowProtect Works 10

................................................................................................................................... 11Create a Backup Image3.1

................................................................................................................................... 12Restore a Backup Image3.2

................................................................................................................................... 12Backup Image Files3.3

Chapter 4: Starting Recovery Environment 15

................................................................................................................................... 16Requirements4.1

................................................................................................................................... 16Testing the Recovery Environment CD4.2

Chapter 5: Understanding the User Interface 18

................................................................................................................................... 18Menu Bar5.1

................................................................................................................................... 20Task Panel5.2

................................................................................................................................... 21Tabs5.3

Chapter 6: Loading Drivers 24

Chapter 7: Using the Network Configuration Utility 25

Chapter 8: Creating a Backup Image File 27

................................................................................................................................... 28Options8.1

Chapter 9: Restoring a System Volume 32

................................................................................................................................... 34Resuming a Restore Operation9.1

................................................................................................................................... 35HSR Volume Options9.2

Chapter 10: Mounting a Backup Image File 40

................................................................................................................................... 41Dismounting a Backup Image File10.1

................................................................................................................................... 42Backup Image File Mount Options10.2

Chapter 11: Using Image Conversion Tool 43

Chapter 12: Using the Boot Configuration Utility 44

Page 4: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide4

© 2006-2010 StorageCraft Technology Corporation

Chapter 13: Using HIR 48

................................................................................................................................... 49HIR Advanced Options13.1

Chapter 14: Using Remote Management 51

Chapter 15: Other Operations 52

................................................................................................................................... 52Verifying Backup Image Files15.1

Chapter 16: Windows Boot Process 53

Chapter 17: Product Support 54

Chapter 18: Glossary 55

Chapter 19: End User License Agreement 59

Page 5: Shadow Protect 4.0 Recovery CD User Guide

About the User Guide 5

© 2006-2010 StorageCraft Technology Corporation

Chapter 1: About the User Guide

Welcome to the StorageCraft Recovery Environment User Guide. This Guide describes usingRecovery Environment to restore volume data. This Guide is divided into the following major sections:

Chapter 2: ShadowProtect Overview

Chapter 3: How ShadowProtect Works

Chapter 4: Starting Recovery Environment

Chapter 5: Understanding the User Interface

Chapter 6: Loading Drivers

Chapter 7: Using the Network Configuration Utility

Chapter 8: Creating a Backup Image File

Chapter 9: Restoring a System Volume

Chapter 10: Mounting a Backup Image File

Chapter 11: Using Image Conversion Tool

Chapter 12: Using the Boot Configuration Utility

Chapter 13: Using HIR

Chapter 14: Using Remote Management

Chapter 15: Other Operations

Chapter 16: Windows Boot Process

Chapter 17: Product Support

Chapter 18: Glossary

Chapter 19: End User License Agreement

Additional Information

For the latest information and resources:

The readme.txt file included with the StorageCraft Recovery Environment.

The StorageCraft technical support Web site at www.storagecraft.com/support.html

This User Guide is also available in the ShadowProtect user interface from the Help menu.

For a glossary of ShadowProtect terms and definitions, see Chapter 18: Glossary .

Documentation Conventions

This symbol designates Note or Warning text that provides important information about theconfiguration and/or use of ShadowProtect.

6

10

15

18

24

25

27

32

40

43

44

48

51

52

53

54

55

59

55

Page 6: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide6

© 2006-2010 StorageCraft Technology Corporation

Chapter 2: ShadowProtect Overview

ShadowProtect provides robust and flexible disaster recovery by creating and managing backup imagefiles. Each backup image file represents the exact state of your system at a given point-in-time. ShadowProtect provides tremendous advantages over traditional disaster recovery methods.

Table 1: Restoring a system volume

Other Methods ShadowProtect

1 Repair hardware if necessary 1 Repair hardware if necessary

2 Collect all necessary OS media 2 Boot from Recovery CD

3 Reload OS from CD-ROM 3 Restore entire system or selected files

4 Reboot 4 Reboot

5 Apply multiple service packs FULLY RESTORED IN MINUTES

6 Reboot (this could take several reboots)

7 Reload backup software from CD-ROM

8Patch backup software to the latest support

level

9 Reboot

10 Load recovery tape and restore

FULLY RESTORED IN HOURS

StorageCraft Recovery Environment is a critical component of the overall ShadowProtect disasterrecovery solution. You should be aware of the following information before using RecoveryEnvironment:

Features and Components

Usage Scenarios

Features and Components2.1

ShadowProtect consists of the following primary components:

Table 2: ShadowProtect components

Component Features

ShadowProtectConsole

A Windows-based disaster recovery environment that provides the following primaryfeatures. For more information about ShadowProtect Console, see theStorageCraft ShadowProtect User Guide:

6

8

Page 7: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Overview 7

© 2006-2010 StorageCraft Technology Corporation

New! VirtualBoot lets you create a VM from any backup image file that you canthen boot in the VirtualBox Virtual Machine environment.

New! The Image Conversion Tool, formerly the Backup Image Tool, nowprovides the ability to convert backup image files into virtual file formats,including the VMWare VMDK format and the Microsoft VHD format.

New! Support for Windows 7 and Windows Server 2008 R2, including 64-bitsupport.

New! The Management View greatly simplifies the administration ofShadowProtect on multiple systems, including the ability to push theShadowProtect Backup agent out to remote systems.

Microsoft Volume Shadow Copy Service (VSS) aware.

Schedule live backups in the background while you work.

Backup to any accessible drive, including network storage (SAN, NAS, iSCSI),removable drives (USB, FireWire), and optical media (CD, DVD, Blu-Ray).

Verify backup images to ensure complete recovery.

An easy-to-use user interface that lets you quickly recover folders or files from abackup image.

Create compressed and encrypted backup image files for efficiency and security.

Mount backup images for simple folder or file updates.

Restore your system to an exact point-in-time.

Restore images to different hardware or to virtual environments (P2P,P2V,V2P).

View backup images for quick file and folder recovery.

Shrink Volume allows you to shrink an image file so you can restore to a smallerdrive.

I/O throttling for each backup job.

Remotely manage system backup and recovery operations.

StorageCraftRecoveryEnvironment

The ShadowProtect CD contains a bootable Windows environment for disasterrecovery options without installing any software.

New! Resume on Interrupt lets you resume an interrupted restore operation fromthe point of interruption, rather than having to start the restore process overagain.

New! The Image Conversion Tool, formerly the Backup Image Tool, nowprovides the ability to convert backup image files into virtual file formats,including the VMWare VMDK format and the Microsoft VHD format.

New! HeadStart Restore lets you restore a volume while ShadowProtectcontinues to add Incremental backup images to the same backup image chain.This can reduce restore time from days or weeks to minutes or hours, even forvery large volumes.

Access all the features of the ShadowProtect Console from a standalonedisaster recovery environment.

Page 8: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide8

© 2006-2010 StorageCraft Technology Corporation

Loads from the bootable ShadowProtect CD.

Create ExactState™ backup images without installing any software.

If the system is unable to boot, ShadowProtect lets you back up the systembefore a destructive restore potentially destroys valuable data

Use Hardware Independent Restore (HIR) to rrestore backup image files to adifferent environment, either physical or virtual.

Network configuration tool to manage TCP/IP properties, domains and networkresources.

Remotely recover your system and data

Perform a quick and simple bare metal system recovery.

ShadowProtectBackup Agent

The engine that creates and manages a system's point-in-time backup images.The Backup Agent also handles mounting of backup image files. You can managethe operation of the Backup Agent from the ShadowProtect Console.

To access the ShadowProtect Backup Agent, you must be a domain user with localadministration rights.

ImageManager

ImageManager provides unprecedented control over your backup image files. Itprovides policy-driven services for managing backup image files, including:

Consolidation of Incremental backup image files into daily, weekly, and monthlyconsolidated image files that greatly reduce the number of files in an imagechain.

Verification and re-verification of backup image files, including consolidatedfiles.

Replication of backup image files to a local drive.

New! Purchase ImageManager Enterprise (IME) job licenses that let you extendreplication support to off-site storage through LAN/WAN and FTP.

New! Purchase ImageManager Enterprise (IME) job licenses to use HeadStartRestore (HSR), which lets you restore a backup image while ShadowProtectcontinues to add Incremental backup images to the same backup image chain.In a world of multi-Terabyte storage, HSR lets you short-circuit the restoreprocess, greatly limiting the down-time associated with hardware failure ormigration tasks.

For more information about ImageManager features, see the StorageCraftShadowProtect ImageManager User Guide.

Recovery Environment Usage Scenarios2.2

The following scenarios introduce several possible use cases for Recovery Environment:

Bare Metal Recovery

Problem: When a failure occurs, I need to be able to restore server, desktop and laptopvolumes as quickly as possible to minimize user downtime. Manually re-installing operatingsystems and rebuilding user environments takes too much time.

Page 9: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Overview 9

© 2006-2010 StorageCraft Technology Corporation

Solution: Use StorageCraft Recovery Environment to restore an entire system in minutes, andShadowProtect restores the system to its exact state before the failure.

Bare Metal Recovery to a Different System

Problem: Due to hardware failure or other circumstances, I need to restore a system volume topartially (or completely) different hardware, or to a virtual environment.

Solution: In the StorageCraft Recovery Environment, use Hardware Independent Restore (HIR)to restore a system to different hardware, or a virtual environment. HIR supports any type ofsystem restore (P2P, P2V, V2P and V2V). Additionally, VMWare provides support forStorageCraft Image Files in VMWare Workstation 6 and their Converter tool.

Server Migration using HeadStart Restore

Problem: You need to migrate a database server with 20TB of data to a new hardware platform,but you cannot afford to have the server offline for three days it takes to migrate the data to newhardware.

Solution: Keep the old server running, and generating incremental backups, while you begin aHeadStart Restore of the same backup image chain on the new hardware. Over time, the HSRcatches up to the most current incremental from the old server, at which point you can take theold server down in off hours, apply the final incremental backup to the new server, and bring thenew system on-line very quickly. You can even migrate the operating system volume by doing aHardware Independent Restore (HIR) to make sure the migrated OS boots properly on the newserver hardware.

Standby Server using HeadStart Restore

Problem: You want to have a stand-by server that can take over should your primary server fail,but you can't afford the high-priced server mirroring technology.

Solution: Your production server generates continuous incremental backups. Configure an HSRsolution to automatically apply those incremental backup images to a secondary "standby"server. If your production server fails, use HSR to finalize to the last incremental to the standbyserver (a matter of minutes), then bring it on-line as a replacement for the failed productionserver.

Page 10: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide10

© 2006-2010 StorageCraft Technology Corporation

Chapter 3: How ShadowProtect Works

ShadowProtect provides robust and flexible disaster recovery by creating and managing backup imagefiles. Each backup image file represents the exact state of your system at a given point-in-time.

ShadowProtect Backup and Restore - How it works

There are two primary tasks related to data recovery with ShadowProtect:

Create a Backup Image .

Restore a Backup Image

11

12

Page 11: Shadow Protect 4.0 Recovery CD User Guide

How ShadowProtect Works 11

© 2006-2010 StorageCraft Technology Corporation

Create a Backup Image3.1

Creating a ShadowProtect backup image involves two key processes:

Create a Virtual Volume

Using Microsoft VolSnap and VSS (with Windows Server 2003, Windows XP, or later), ShadowProtectcreates a point-in-time snapshot of the volume you want to backup. The entire process of taking asnapshot of a volume and creating a virtual volume takes only seconds and does not interfere withsystem operation.

Table 3: Snapshot methods supported by ShadowProtect

Snapshot Supported OSImageSpeed Quality Comments

StorageCraftVSM with VSS

Windows Server2000 Family

Fast Best

VSS aware applications are managed toachieve best backups.

Can use script files to manageapplications that are not VSS aware toimprove backups.

MicrosoftVolSnap withVSS

Windows Server2003/2008 Family

Slow Best

VSS aware applications are managedautomatically to achieve best backups.

Use script files (before and after thesnapshot) to manage non-VSS-awareapplications and improve backups.

Cannot create Incremental Image File

(see Chapter 18: Glossary ).

StorageCraftVSM direct

Windows 2000Server FamilyWindows2003/2008 ServerFamily

Fast Good

Use script files (before and after thesnapshot) to manage applications (bothVSS and non-VSS) and improvebackups.

Additionally, ShadowProtect provides a Backup Scheduler that lets you configure automated backupjobs for protected volumes. You can schedule Full Image, Incremental Images (as often as every 15minutes), and manage the retention of backup Image Sets. The ShadowProtect Backup Image Toolsimplifies image management by letting you manage existing image files, including consolidating filesin an Image Set, modifying password encryption and compression, and merging or splitting imagefiles.

Capture the Virtual Volume

To backup the volume, ShadowProtect replicates the virtual volume to create a backup image file. A backup image file is a sector-by-sector representation of the volume at the time the volume snapshotwas taken. For more information about backup image files, see Backup Image Files .

ShadowProtect writes the backup image file to the designated storage media. Options include networkstorage (SAN, iSCSI, NAS, etc.), removable storage (USB / FireWire), and optical storage (CD, DVD,Blu-ray). The amount of time it takes to write the backup image file depends upon the systemhardware and the size of the image file. For information about configuring and creating backup imagefiles, see "Creating Backup Image Files" in the ShadowProtect User Guide.

55

12

Page 12: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide12

© 2006-2010 StorageCraft Technology Corporation

Restore a Backup Image3.2

Once you have created a backup image, you can use a ShadowProtect backup image to restore datain two different ways:

Recover individual files and folders

Use the ShadowProtect Mount utility to mount the backup image file as a volume using either a driveletter or a mount point. The Mount utility can efficiently mount hundreds of backup imagessimultaneously, if desired. Furthermore, since the mounted backup image files preserve the Windowsvolume properties, users can share and access the backup image file for emergency access tobackup image file data, including modifying and saving changes to the backup image file as anincremental backup file.

For more information about mounting backup image files to recover data, see "Mounting Backup ImageFiles" in the ShadowProtect User Guide.

Restore an entire volume

Use the ShadowProtect Restore Wizard to restore an entire volume from a backup image file. You canrestore system volumes (that contains the system's operating system) using the StorageCraftRecovery Environment, or restore non-system volumes using either Recovery Environment or whilerunning ShadowProtect Console in Windows. For more information about recovering volumes, see"Restoring Backup Image Files" in the ShadowProtect User Guide.

Backup Image Files3.3

A ShadowProtect backup image file is a point-in-time representation of a computer volume. It is not astandard file copy of the volume, but rather a sector-by-sector duplicate of the volume. Because ofthis, you can mount a backup image file (using the ShadowProtect Mount utility) and view its contentsas if it were a regular volume. In the event that you need to recover data, you can recover specific filesand folders from the image or you may recover the entire volume to the exact point-in-time that thebackup image was taken.

ShadowProtect uses the following types of backup image files to provide a complete disaster recoverysolution.

Table 4: Types of Backup Image Files

Backup Images Description

Full (.spf)A stand-alone image file that represents a disk volume at a specificpoint-in-time. Full backup image files do not rely on any other files.

Incremental (.spi)

An image file that contains volume changes relative to another backupimage file. You can create Incremental backup image files relative toFull backup images or other Incremental backup images.ShadowProtect also creates an Incremental image file when anexisting image file is mounted as a read/write volume and modified.

Incremental backup image files let ShadowProtect offer multiplevolume backup strategies, including Differential and Incrementalbackup options. See Chapter 18: Glossary for information about55

Page 13: Shadow Protect 4.0 Recovery CD User Guide

How ShadowProtect Works 13

© 2006-2010 StorageCraft Technology Corporation

these backup strategies.

Spanned (.sp#)

Image files that belong to a spanned image set. Spanned image setsare made by breaking a backup image file into pieces for increasedportability (for example, to save the image file on multiple CDs).

The actual Spanned image file replaces the pound sign (#) with anumber that indicates the position of the file within the spanned imageset.

ImageManager (-cd.spi, -cw.spi, -cm.spi)

Image files that have been automatically collapsed by ShadowProtectImageManager. The suffix before the file extension indicates if the file is adaily, weekly or monthly collapsed backup files.

.spk A password key file used to encrypt backup image files.

File Naming Conventions

ShadowProtect backup image files use the following naming convention to help you identify the file andits relationship to, and dependencies on, other backup image files.

<Volume Identifier>-b<base-seq>-d<diff-seq>-i<inc-seq>.<extension>

The ShadowProtect naming convention uses the following variable components:

volume identifier: Identifies the volume that the backup image file represents.

base-seq: The Base Image File sequence number. This either identifies the sequence number ofthis file, or identifies the Base Image File upon which this file is dependent.

diff-seq: The Differential backup sequence number. This either identifies the sequence number ofthis file, or identifies the Differential Image File upon which this file is dependent.

inc-seq: The Incremental backup sequence number. This either identifies the sequence number ofthis file, or identifies the Incremental Image File upon which this file is dependent.

extension: The file extension, which identifies if the file is a Full, Incremental, or Spanned backupimage file.

Table 5: Examples of Backup Image File Names with a Description of the File

File Type Extension Description

C_Vol-b001.spf Full image of the C:\ volume.

C_Vol-b001-d001-i000.spi*

or

C_Vol-b001.d001.spi

Differential image of the C:\ volume with a dependency on the

full backup image file C_Vol-b001.spf

This type of backup is not available in ShadowProtect ITEdition.

C_Vol-b001-d000-i001.spi* Incremental image of the C:\ volume with a dependency on the

Page 14: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide14

© 2006-2010 StorageCraft Technology Corporation

or

C_Vol-b001-i001.spi

full backup image file C_Vol-b001.spf

The only time ShadowProtect IT Edition creates a .spi file is

when you mount a read/write backup image and save changesmade to that volume. Upon dismounting that volume, thechanges will be saved out to an incremental file.

C_Vol-b001-d001.i001.spi

Incremental backup image file of the C:\ volume with a

dependency on the differential backup image file C_Vol-b001-

d001.i000 which in turn has a dependency on C_Vol-b001.

spi.

This type of backup is not available in ShadowProtect ITEdition.

Note: Backup image file names that have a “-d000” or “-i000” segment use these name

segments only as place holders, and indicate that a differential backup image or anincremental backup image are not part of the image and the backup image file has nodependency on a previous differential or incremental backup image file.

File Dependencies

By examining the name of a backup file image, ShadowProtect users can tell identify the files that it isdependent on. However, it is not possible to determine if other backup image files are dependent onthis file. Because of this, it is very important to use the Backup Image Tool to review dependenciesprior to moving, modifying or deleting backup images.

WARNING: Deleting a backup image file on which other files depend renders the dependentbackup image files useless. You cannot browse or restore files contained by thesedependent backup image files.

Note: Deleting a full image file from an active backup image job causes ShadowProtect to createa new Full image during the next scheduled backup and start a new backup image set.

Page 15: Shadow Protect 4.0 Recovery CD User Guide

Starting Recovery Environment 15

© 2006-2010 StorageCraft Technology Corporation

Chapter 4: Starting Recovery Environment

Recovery Environment loads automatically when you boot from the ShadowProtect CD. Before you runShadowProtect, make sure your system meets the minimum hardware and software requirements(see Requirements ).

To load the StorageCraft Recovery Environment

1. If the backup image you wish to restore is located on a USB drive, attach that to the computer.

2. Insert the ShadowProtect CD into the computer.

3. Restart the computer.

Note: You might need to modify the boot options to have the computer boot to a CD drive.

The ShadowProtect CD Boot Options include the following options:

[1] Start Recommended Recovery Environment: Option 1 is the default boot option thatcontains commonly distributed drivers. It uses Windows 7 PE, which lets you dynamicallyload drivers and hot plug disk devices even after Recovery Environment has started.

[2] Start Legacy Recovery Environment: Option 2 contains all drivers in Option 1 along withother less commonly distributed drivers. Option 2 uses Windows Server 2003. Select Option 2if you know Option 1 does not provide the necessary storage or network drivers, or you areunable to dynamically load the drivers from Option 1.

[3] Boot from Hard Disk: Option 3 boots the system from the primary hard drive.

[4] Reboot: Option 4 restarts the system.

Because of the extended driver options and operating system, Option 2 takes significantly

16

Page 16: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide16

© 2006-2010 StorageCraft Technology Corporation

longer to boot into Recovery Environment than Option 1. Additionally, Option 2 requires that theShadowProtect CD remain loaded at all times. You cannot remove the ShadowProtect CD torestore a backup image file.

4. In the Network Support dialog box, click OK to start networking.

For information about using the Network Configuration utility, see Chapter 7: Using the NetworkConfiguration Utility .

The Network Support Dialog Box

Once Recovery Environment loads, you can perform ShadowProtect tasks as needed.

Requirements4.1

ShadowProtect Recovery Environment has the following minimum hardware requirements:

Hardware Recovery Environment (RE)

CPU

Windows 2008-based RE: 1 GHz or faster.

Windows 2008-based RE (Japan only): 1.4 GHz (x64 processor) or 1.3GHz(Dual Core).

Windows 2003-based RE: 550 MHz or faster. Supports up to fourprocessors per system.

MemoryWindows 2008-based RE: 512 MB minimum.

Windows 2003-based RE: 256 MB minimum.

Hard Drive space N/A

CD-ROM or DVD drive Required.

Monitor VGA or higher resolution.

Testing the Recovery Environment CD4.2

You should test the StorageCraft Recovery Environment to ensure that it runs properly on yourcomputer. To do this, boot your computer with the ShadowProtect CD.

If the StorageCraft Recovery Environment boots and runs as expected, you are ready to performShadowProtect operations from Recovery Environment in the event of a hardware failure, system

25

Page 17: Shadow Protect 4.0 Recovery CD User Guide

Starting Recovery Environment 17

© 2006-2010 StorageCraft Technology Corporation

volume failure, or to create a cold backup.

If the StorageCraft Recovery Environment does not boot or run as expected, investigate the followingissues:

You do not have the necessary network interface card (NIC) drivers to access the network. Youcan dynamically load NIC drivers from within Recovery Environment (Load Drivers in the Toolsmenu).

You do not have the necessary storage drivers to access a storage device on the computer. Toresolve this, do one of the following:

Load storage drivers during boot time

1. When prompted during Recovery Environment boot sequence, press F6 to add storagedrivers.

2. Browse to the appropriate storage driver files.

Load storage drivers after loading Recovery Environment

1. In the Tools menu, select Load Drivers.

2. Browse to the appropriate storage driver files.

Keep necessary storage drivers on a diskette that is available in the event you need to load RecoveryEnvironment.

If you find it necessary to load drivers for Recovery Environment, contact StorageCraft TechnicalSupport or send an e-mail to [email protected] so StorageCraft can include these drivers infuture releases of ShadowProtect.

Page 18: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide18

© 2006-2010 StorageCraft Technology Corporation

Chapter 5: Understanding the User Interface

Recovery Environment Main Screen

Menu Bar5.1

The Recovery Environment menu bar provides access to following menus:

Table 5: ShadowProtect File Menu Options

Menu Description Options

FileAccess application-leveloptions.

Exit: Close the Recovery Environment.

Tasks

Access ShadowProtectwizards.

Backup Volumes: Launches the Backup Wizard (seeChapter 8: Creating a Backup Image File ).

Restore Volume: Launches the Restore Wizard (seeChapter 9: Restoring a System Volume ).

Explore Backup Image: Launches the Explore BackupImage Wizard (see Chapter 10: Mounting a Backup ImageFile ).

Dismount Backup Image: Launches the Backup ImageDismount Wizard (see Section 10.1: Dismounting aBackup Image File ).

27

32

40

41

Page 19: Shadow Protect 4.0 Recovery CD User Guide

Understanding the User Interface 19

© 2006-2010 StorageCraft Technology Corporation

Image Conversion Tool: Launches the ImageConversion Tool Wizard (see Chapter 11: Using ImageConversion Tool ).

Verify Image: Launches the Verify Image Wizard (seeSection 15.1: Verifying Backup Image Files ).

View

Create custom toolbars andmanage toolbar visibility.

Toolbars: Opens the Customize Tool Bar dialog box,where you can create customized Recovery Environmenttool bars.

Status Bar: Toggles a status bar at the bottom of the UIthat provides application and environment statusinformation.

Task Panel: Toggles the Task Panel (see Task Panel).

Show Detail Tabs: Toggles the Details tab for eachactive backup or restore operation.

Tools

Access RecoveryEnvironment tools.

Network Configuration: Launches the NetworkConfiguration utility, where you can configure a computer'snetwork access settings.

HIR Configuration: Launches the Hardware IndependentRestore (HIR) utility, where you can restore a backupimage to a different environment from which it wascreated.

Load Drivers: Opens the Load Drivers dialog box, whereyou can configure storage drivers for use in RecoveryEnvironment.

File Browser: A simple file browser that lets you browsefiles and folders of a backup image file.

Text Editor: A simple text editor.

Boot Configuration Utility: Launches the BootConfiguration Utility, where you can manage the bootconfiguration repair process for those situations where theautomated process does not work (see Chapter 12: Usingthe Boot Configuration Utility ).

Partition Table Editor: A simple partition table editor.

UltraVNC Service: Launches the Remote Managementutility, where you can configure remote access tosystems running Recovery Environment.

Select Your Time Zone: Launches the Time Zone utility,where you can adjust the system's time zone information.

Display Settings: Opens the Display Settings dialog box,where you can configure the resolution and color modeused to display the Recovery Environment UI.

43

52

20

44

Page 20: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide20

© 2006-2010 StorageCraft Technology Corporation

Enable Logging: Opens the Logging dialog box, whereyou can specify a location for ShadowProtect log files.

Refresh Volumes Info: Refreshes the Volume Listinformation.

HelpDisplay general RecoveryEnvironment information.

About: Displays the Recovery Environment version andcopyright information.

Task Panel5.2

The ShadowProtect Task panel provides left-side access to Recovery Environment tasks and tools.The Task panel is organized into the following categories. You can collapse and expand each categoryas needed.

Table 6: ShadowProtect Task Panel Options

Menu Description Options

Tasks

Access ShadowProtectwizards.

Backup Volume: Launches the Backup Wizard (seeChapter 8: Creating a Backup Image File ).

Restore Volume: Launches the Restore Wizard (seeChapter 9: Recovering a System Volume ).

Explore Backup Image: Launches the Explore BackupImage Wizard (see Chapter 10: Mounting a Backup ImageFile ).

Dismount Backup Image: Launches the Backup ImageDismount Wizard (see Section 10.1: Dismounting a BackupImage File ).

Verify Backup Image: Launches the Verify Image Wizard(see Section 15.2: Verifying Backup Image Files ).

Tools

Access RecoveryEnvironment tools.

Network Configuration: Launches the NetworkConfiguration utility, where you can configure a computer'snetwork access settings.

HIR Configuration: Launches the Hardware IndependentRestore (HIR) utility, where you can restore a backup imageto a different environment from which it was created.

Load Drivers: Opens the Load Drivers dialog box, whereyou can configure storage drivers for use in RecoveryEnvironment.

File Browser: A simple file browser that lets you browsefiles and folders of a backup image file.

Text Editor: A simple text editor.

Select Your Time Zone: Launches the Time Zone utility,

27

32

40

41

52

Page 21: Shadow Protect 4.0 Recovery CD User Guide

Understanding the User Interface 21

© 2006-2010 StorageCraft Technology Corporation

where you can adjust the system's time zone information.

Refresh Volumes Info: Refreshes the Volume List inShadowProtect.

InfoDisplay systeminformation.

A quick reference to basic system information, includingComputer Name, IP Address and Time Zone information.

StatusDisplays currentShadowProtect taskstatus.

Queued Tasks: The number of queued tasks waiting to run.

Running Tasks: The number of tasks currently running.

Tabs5.3

The ShadowProtect tabs provide access to primary features and application status:

Wizards: Provides access to the three Wizards (Backup, Restore, and Explore Backup Image)that guide users through the most common Recovery Environment tasks.

Recovery Environment Wizards Tab

Disk Map: Provides a graphical view of the system drives. The Disk Map tab lets you accessthe Backup and Restore Wizards, and change partition creation policies for the selected drive.Additionally, in Recovery Environment you can also run Check Disk, format a drive and edit theselected disk's boot.ini.

Page 22: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide22

© 2006-2010 StorageCraft Technology Corporation

Recovery Environment Disk Map Tab

Task Manager: Displays the status of an active task. View task details by clicking ShowDetails, or abort an active task by clicking Cancel.

Note: If you abort a restore operation, you can restart it again if necessary (see Section 9.1:Resuming a Restore Operation ).

Recovery Environment Task Manager Tab

Task Details: Displays status information about a currently active task (Volume Backup,Volume Restore, Image Maintenance). You can control the display of these tabs by clickingShow Details / Hide Details in the Task Manager tab. For example:

34

Page 23: Shadow Protect 4.0 Recovery CD User Guide

Understanding the User Interface 23

© 2006-2010 StorageCraft Technology Corporation

Recovery Environment Task Details Tab

Page 24: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide24

© 2006-2010 StorageCraft Technology Corporation

Chapter 6: Loading Drivers

Recovery Environment lets you dynamically load storage or network drivers.

The ability to dynamically load drivers is available only if you loaded Recovery Environment usingOption 1 (see Chapter 4: Starting Recovery Environment ).

To dynamically load a driver

1. In Recovery Environment, click Load Drivers in the Tools menu.

Loading Drivers from the Recovery Environment

2. Click Add Path to browse to the INF files you need.

Click-and-drag the drivers to move them up and down the list in order to establish priority.

3. Select the proper driver, then click Load.

Recovery Environment loads the driver and automatically provides access to that device.

15

Page 25: Shadow Protect 4.0 Recovery CD User Guide

Using the Network Configuration Utility 25

© 2006-2010 StorageCraft Technology Corporation

Chapter 7: Using the Network Configuration Utility

The Network Configuration Utility (NCU) let's you configure a computer's Network Interface Cards(NICs), TCP/IP settings, and domain information for use in Recovery Environment.

Network Configuration Utility

To use the Network Configuration Utility

1. Open the Network Configuration Utility.

You can load the NCU in the following ways:

While booting Recovery Environment: Click OK when asked to start networking (seeChapter 4: Starting Recovery Environment ).

After loading Recovery Environment: Click Network Configuration in the Tools menu.

2. (Optional) Select an alternate UI language from the Language dropdown menu.

3. Select the appropriate Ethernet adapter from the dropdown list.

If necessary, select the adapter's preferred link speed and duplex mode.

4. Modify the adapter settings in the NCU interface. Available settings include:

IP Addresses: Select either Dynamic or Static IP address settings:

15

Page 26: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide26

© 2006-2010 StorageCraft Technology Corporation

Obtain an IP address automatically: Specify DHCP settings, including Releasing andRenewing DHCP leases.

Use the following IP address: Specify IP address, Subnet mask, and Default gateway. Youcan specify multiple IP addresses and gateways, if necessary.

DNS and WINS Servers: Select either Dynamic or Static DNS and WINS configurations. Whenusing a static configuration, click More to specify one or more IP addresses for the DNS or WINSenvironment.

Network Identification: Specify a computer name, Workgroup, and Primary DNS suffix. To dothis, type a value in the appropriate field, then click Set. The Full Computer Name field displaysthe current computer name.

5. Click Network Drives to configure drive mappings and file sharing.

Browse Network and Map Drives

You can configure drive mappings manually (under Map Network Drive), or search for networkresources by Domain or Computer Name (Browse Network). To browse the network, do thefollowing:

a. Enter a domain or computer name in the field, then click Add .

The NCU browses the network and locates all resources in the specified Domain or Computer,displaying them in the Resources pane.

b. Click Expand All to view all available resources in the specified Domain or Computer.

c. Select a resource to automatically populate the Network Path field in Map Network Drive.

d. (Optional) Click Clear All to remove all network resources from the Resources pane.

Page 27: Shadow Protect 4.0 Recovery CD User Guide

Creating a Backup Image File 27

© 2006-2010 StorageCraft Technology Corporation

Chapter 8: Creating a Backup Image File

The ShadowProtect Backup Wizard guides you through the process of creating a backup of an entiresystem, or a specific volume on a system. The process is the same whether you are making a HotBackup from Windows, or a Cold Backup from the StorageCraft Recovery Environment. For moreinformation about each of these options, see Section 2.1: Features and Components .

To create a backup image file

1. Start the ShadowProtect Console (see Chapter 4: Starting Recovery Environment ).

2. Open the Backup Wizard by doing one of the following:

In the Wizards tab, click Backup Wizard.

In the Tasks menu, click Backup Volume.

3. In the Volumes to Back Up page, select the volumes to backup, then click Next.

To backup the entire system, select all volumes.

4. In the Backup Type page, select the type of backup to perform, then click Next.

Perform a Full Backup: Makes a full backup image file for the selected volumes.Perform a Differential Backup: Makes a backup of volume changes since the last Full Backup.

Note: The ability to make an Incremental backup is available only in ShadowProtect ServerEdition and ShadowProtect Desktop Edition.

5. In the Backup Name and Destination page, specify where you want to store the backup image file,then click Next.

a. Select whether you want to store the backup image file on a local or network directory, or anoptical storage medium (CD/DVD/Blu-ray).

b. Browse to, or enter, the path to the location.c. (Optional) Right-click a file name, then select Rename to change the name of the backup

image file.

6. In the Options page, select the backup image file options, then click Next.

The Options page lets you set file compression, security (password and encryption), image filesize (splitting), and a backup comment. For more information about each of these options, see Section 8.1: Options .

7. In the Wizard Summary page, review the backup image file configuration, then click Finish tocreate the backup image file.You can monitor the progress of the backup in the Task Manager tab by clicking the Detailsbutton.

6

32

28

Page 28: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide28

© 2006-2010 StorageCraft Technology Corporation

Options8.1

The following options let you control how ShadowProtect creates a backup image file:

Backup Image File Storage Location

File Compression

Backup Image File Security

Splitting Backup Image Files

Backup Comments

Advanced Options

Backup Image File Storage Location

ShadowProtect lets you store backup image files on any disk device, including hard drives,removeable USB/FireWire drives, network drives and NAS (Network Attached Storage) devices. Youcan also store backup images to optical media such as CDs, DVDs, or Blu-Ray discs.

Note: If you select a destination that does not have enough disk space to save the backupimage, the backup job fails due to lack of destination storage space. ShadowProtect notes the reasonfor the failure in its log file.

Table 7: Advantages and Disadvantages for Various Storage Locations

Location Advantages Disadvantages

Local Hard DriveFast backup andrestore.Inexpensive.

Consumes local disk space.Vulnerable to loss if the drive fails.

28

29

29

30

30

30

Page 29: Shadow Protect 4.0 Recovery CD User Guide

Creating a Backup Image File 29

© 2006-2010 StorageCraft Technology Corporation

Location Advantages Disadvantages

Local USB/FireWireDrive

Fast backup andrestore.Preserves disk spaceon local drives.Inexpensive.Easy off-site storage.

More expensive than local harddrives.Vulnerable to loss if the drive fails.

Network Hard Drive

Fast backup andrestore.Protection from localhard drive failure.Off-site storage.

Must have network interface carddrivers supported by RecoveryEnvironment.Complexity. Users must have networkrights to save and access backupimages.

CD/DVD/Blu-Ray

Good media forarchiving.Protection from localhard drive failure.

Slower backups due to mediaspeeds.File restrictions due to limited size.

File Compression

ShadowProtect offers multiple file compression options when creating backup image files.

Table 8: Backup Image File Compression Levels

Compression Level Description

NoneNo file compression. This option provides faster backup where diskspace is not an issue.

StandardCompresses data by about 40% on average. This option provides abalance between backup speed and disk space consumption.

HighCompresses data by about 50% on average. This option requires themost time and system resources to complete a backup, but is usefulwhen disk space is limited.

Backup Image File Security

ShadowProtect lets you encrypt and password protect backup image files. This is particularly usefulwhen storing backup image files on a network or off-site. To mount or restore a protected backupimage file, you must provide the correct password. If you do not enter the correct password, or youforget the password, you cannot access the backup image file. Make sure the password is stored in asecure location. StorageCraft cannot bypass the encryption on a backup image files.

You may select from three methods when encrypting a backup image file.

RC 4 128 bit (Fast): Faster but less secure than AES 128-bit.

Page 30: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide30

© 2006-2010 StorageCraft Technology Corporation

AES 128 bit (More Secure): Faster but less secure than AES 256=bit.

AES 256 bit (Most Secure): Slowest but most secure security option.

In addition to bit strength, the password used to secure the backup image file can affect security. Usethe following password guidelines to ensure the best backup image file security:

At least eight characters

Random mixture of upper and lower case letters, characters and numbers.

Do not use words found in the dictionary.

Change passwords regularly, or if you suspect your password has been compromised.

Note: ShadowProtect passwords are case-sensitive and support alphanumeric characters.

Splitting Backup Image Files

ShadowProtect lets you split backup image files into multiple smaller image files, if desired. Splittingfiles lets you more easily move backup image files onto fixed length media such as CD or DVD.

You can split backup image files when creating them (either manually or during a scheduled backupjob), or after the fact with the Backup Image Utility (see Backup Image Tool ).

Note: A backup image file that has been split into multiple files is known as a Spanned imagefile. Spanned image files use a special file extension to indicate they are part of a file set (seeSection 3.3: Backup Image Files ).

Backup Comments

You can attach backup comments to a backup image file. These comments are available for reviewwhen mounting or restoring the backup image file at a later date. By default, the time and date stampare added as backup comments.

Advanced Options

Advanced backup image file options are available by clicking Advanced in the Options page of theBackup Wizard (see Chapter 8: Creating a Backup Image File ).

Note: StorageCraft recommends using the default advanced option settings unless you fullyunderstand the impact of changing these features.

Lock Source Volume

Default: Off

On: ShadowProtect does not use snapshot technology to backup the volume. Instead it attempts togain exclusive access to the volume. If it is unable to gain exclusive access, the backup fails.

Off: ShadowProtect uses snapshot technology to backup the volume so that it does not need to lockvolume access. You must use snapshot technology (Lock Source Volume = Off) to backup a

system volume.

If snapshot technology is not available in the Windows operating system you want to backup, you

43

12

27

Page 31: Shadow Protect 4.0 Recovery CD User Guide

Creating a Backup Image File 31

© 2006-2010 StorageCraft Technology Corporation

must set Lock Source Volume = On or run ShadowProtect from the StorageCraft Recovery

Environment. When running ShadowProtect from Recovery Environment, ShadowProtect automaticallygets exclusive access to volumes, including the system volume.

Include Free Space

Default: Off

On: Backs up all sectors on the volume, including those in the volumes free space.

Off: Backs up only sectors marked as currently containing data.

IO Throttle

Default: 100

Specifies, as a percentage, how much of the system's I/O subsystem you want ShadowProtect touse. To change this value, click-and-drag the slider control to the desired setting.

Enable Write Caching

Default: Off

On: ShadowProtect uses file caching when writing the backup image file, which might slow down theimaging process.

Off: ShadowProtect does not use file caching when writing the backup image file.

Page 32: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide32

© 2006-2010 StorageCraft Technology Corporation

Chapter 9: Restoring a System Volume

The primary purpose of Recovery Environment is to let you restore a system that cannot boot on itsown. The Restore Wizard guides you through the process of restoring a system volume. RecoveryEnvironment offers two ways to manage the restore of a system volume:

Finalized Restore: The finalized restore operation restores a system volume from a selectedbackup image file and prepares the volume for use in a single operation.

HeadStart Restore: HeadStart Restore (HSR) lets you break up the volume restore process intomultiple stages. Doing this is particularly useful for large volumes where the volume restore processcan take days. HSR lets you start the restoration process before a problem occurs. Then, when arestore is needed, you can finish restoring the latest Incrementals and finalize the restoration foruse. Instead of days of downtime, you have just a few hours.

Regardless of the type of restore you want to perform, the initial configuration of a restore operation isnearly identical.

To restore a system volume

1. Load Recovery Environment.

For more information, see Chapter 4: Starting Recovery Environment . If you need to useRemote Management, load the UltraVNC Server. For more information, see Chapter 14: UsingRemote Management .

2. In Recovery Environment, select Tasks > Restore Volume to launch the Restore Wizard.

You can also select Restore Volume in the left-side Navigation panel or select RestoreWizard in the Wizards tab.

3. On the Restore Type page, select Restore, then click Next.

4. On the Backup Image to Restore page, browse to the backup image that you want to restore, thenclick Next.

If the backup image is encrypted, you must specify the appropriate password to access thebackup image file.

The Backup Image to Restore page displays information about the selected backup image.

5. On the Backup Image Dependencies page, select the backup image file (the specific point-in-time)that you want to restore, then click Next.

The left pane displays all backup image files in the previously selected image set. Select abackup image file to display information about that file in the right pane.

6. On the Restore Destination page, select the hard disk where you want to restore the systemvolume, then click Next.

7. On the Finalization Options page, specify whether to finalize the restored volume for use, thenclick Next.

Finalize the volumeat the end of thisrestore

Select this option to perform a Standard restore operation, where therestored volume is ready for use when the restore operation completes.

Do not select this option to perform a HeadStart Restore.

Generate a .HSR file to Note: This option is available only for HSR operations.

15

51

Page 33: Shadow Protect 4.0 Recovery CD User Guide

Restoring a System Volume 33

© 2006-2010 StorageCraft Technology Corporation

use in a futurefinalization

(Optional) When selected, the Restore Wizard generates an HSR file,at the location you specify, that contains metadata about the HSRvolume. With this file, you can finalize the HSR volume withoutaccessing the source backup image files.

8. (Conditional) On the Specify the Restoration Options page, select the boot parameters you wantto apply to the restored volume, then click Next.

Recovery Environment displays this page only if you are finalizing the volume.

Set partition active Configures the restored volume as the active partition in the system (thedrive the machine boots from).

Restore MBR Restore the master boot record (MBR) as part of the volume restore job.The master boot record is stored in the first sector of the first physicalhard drive, and contains the master boot program and partition table.The master boot program uses the partition table to determine the activepartition, then starts the boot program from the boot sector of the activepartition. When selected, you have the following MBR restore options:

Restore MBR from the image file: Restores the MBR from thebackup image file.

Restore original Windows MBR: Restores the default MBR for theversion of Windows you are restoring.

Restore disk signature: Restores the original hard drive physical disksignature. Windows Server 2003, Windows 2000 Advanced Server,and Windows NT Server 4.0 Enterprise Edition (SP3 and later) requiredisk signatures to use the hard drive.

Restore Disk HiddenTrack

Restores the first 63 sectors of a drive. Some boot loader applicationsrequire this for the system to boot.

Use HardwareIndependent Restore

Instructs Recovery Environment to launch the Hardware IndependentRestore (HIR) utility when finalizing the volume for use so you canconfigure the restore operation to properly interact with the hardwarewhere you want to restore the volume.

For more information, see Chapter 13: Using HIR .

9. On the Summary page, review the details of the restore operation, then click Finish.

Recovery Environment begins the restore operation and opens the Task Manager so you can view itsprogress. Once the restore operation completes, you have the following options, depending on thetype of restore operation:

Finalized Restore: Optionally, use the Boot Configuration Utility to ensure that the newlyrestored system volume is "bootable" (see Chapter 12: Boot Configuration Utility ). You cannow reboot the system to the restored system volume.

HeadStart Restore: Because the volume is not finalized, an HSR volume is not available to usersor applications, but you can continue to restore additional Incremental images to the HSR volume.When ready, you can Finalize the HSR volume to make it ready for use. At this point, the HSRvolume becomes a standard system volume, and you can have the same post-restore options asdescribed above for a Standard Restore.

48

44

Page 34: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide34

© 2006-2010 StorageCraft Technology Corporation

Resuming a Restore Operation9.1

If a restore operation is interrupted for any reason, the Restore Wizard lets you resume the interruptedrestore operation.

To resume a restore operation

1. Load Recovery Environment.

For more information, see Chapter 4: Starting Recovery Environment . If you need to useRemote Management, load the UltraVNC Server. For more information, see Chapter 14: UsingRemote Management .

2. In Recovery Environment, select Tasks > Restore Volume to launch the Restore Wizard.

You can also select Restore Volume in the left-side Navigation panel or select RestoreWizard in the Wizards tab.

3. On the Restore Type page, select Resume Aborted Restore, then click Next.

4. On the Restore Destination page, select the hard disk where you previously started the restoreoperation, then click Next.

5. On the Backup Image to Restore page, browse to the backup image that you want to resumerestoring, then click Next.

If the backup image is encrypted, you must specify the appropriate password to access thebackup image file. The Backup Image to Restore page displays information about the selectedbackup image.

6. On the Finalization Options page, specify whether to finalize the restored volume for use, then click Next.

Finalize the volumeat the end of thisrestore

Select this option to perform a standard volume restore, where therestored volume is ready for use when the restore operation completes.

Do not select this option to perform a HeadStart Restore.

Generate a .HSR file touse in a futurefinalization

Note: This option is available only for HSR restore operations.

(Optional) When selected, the Restore Wizard generates an HSR file,at the location you specify, as part of the HSR restore operation thatcontains metadata about the HSR volume. With this file, you canfinalize the HSR volume without accessing the source backup imagefiles.

7. (Conditional) On the Specify the Restoration Options page, select the boot parameters you want toapply to the restored volume, then click Next.

Recovery Environment displays this page only if you are finalizing the volume as part of therestore operation.

Set partition active Configures the restored volume as the active partition in the system (thedrive the machine boots from).

Restore MBR Restore the master boot record (MBR) as part of the volume restore job.

15

51

Page 35: Shadow Protect 4.0 Recovery CD User Guide

Restoring a System Volume 35

© 2006-2010 StorageCraft Technology Corporation

The master boot record is stored in the first sector of the first physicalhard drive, and contains the master boot program and partition table.The master boot program uses the partition table to determine the activepartition, then starts the boot program from the boot sector of the activepartition. When selected, you have the following MBR restore options:

Restore MBR from the image file: Restores the MBR from thebackup image file.

Restore original Windows MBR: Restores the default MBR for theversion of Windows you are restoring.

Restore disk signature: Restores the original hard drive physical disksignature. Windows Server 2003, Windows 2000 Advanced Server,and Windows NT Server 4.0 Enterprise Edition (SP3 and later) requiredisk signatures to use the hard drive.

Restore Disk HiddenTrack

Restores the first 63 sectors of a drive. Some boot loader applicationsrequire this for the system to boot.

Use HardwareIndependent Restore

Instructs Recovery Environment to launch the Hardware IndependentRestore (HIR) utility when finalizing the volume for use so you canconfigure the restore operation to properly interact with the hardwarewhere you want to restore the volume.

For more information, see Chapter 13: Using HIR .

8. On the Summary page, review the details of the restore operation, then click Finish.

Recovery Environment resumes the restore operation using your configuration. Once the restoreoperation completes, you have the following options, depending on the type of restore operation:

Finalized Restore: Optionally, use the Boot Configuration Utility to ensure that the newlyrestored system volume is "bootable" (see Chapter 12: Boot Configuration Utility ). You cannow reboot the system to the restored system volume.

HeadStart Restore: Because the volume is not finalized, an HSR volume is not available to usersor applications, but you can continue to restore additional Incremental images to the HSR volume.When ready, you can Finalize the HSR volume to make it ready for use. At this point, the HSRvolume becomes a standard system volume, and you can have the same post-restore options asdescribed above for a Standard Restore.

HSR Volume Options9.2

Once you have created an HSR volume (see Recovering a System Volume ), you can either addIncremental images to the volume or finalize the volume for use.

Adding Incrementals to an HSR Volume

Finalizing an HSR Volume

Adding Incrementals to an HSR Volume

If you have an HSR volume that is not finalized, you can add Incremental images to the HSR volume.Consider the following when adding files to an HSR volume:

48

44

32

35

38

Page 36: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide36

© 2006-2010 StorageCraft Technology Corporation

You can only add Incremental images that are "descendants" of the last Incremental image filein the HSR volume. Descendant image files are newer Incremental images that are part of thesame Image Set used to create the HSR volume.

If you skip Incremental images in the Image Set, Recovery Environment automatically applies allIncremental images necessary to add the selected Incremental image to the HSR volume.

To add incremental images to an existing HSR volume

1. Load Recovery Environment.

For more information, see Chapter 4: Starting Recovery Environment . If you need to useRemote Management, load the UltraVNC Server. For more information, see Chapter 14: UsingRemote Management .

2. In Recovery Environment, select Tasks > Restore Volume to launch the Restore Wizard.

You can also select Restore Volume in the left-side Navigation panel or select RestoreWizard in the Wizards tab.

3. On the Restore Type page, select Restore Subsequent Incrementals, then click Next.

4. On the Restore Destination page, select the hard disk where you previously created the HSRvolume, then click Next.

5. On the Backup Image to Restore page, select the Incremental image to add to the HSR volume,then click Next.

If the backup image is encrypted, you must specify the appropriate password to access thebackup image file. The Backup Image to Restore page displays information about the selectedbackup image.

Note: Make sure you follow the conditions, listed at the beginning of this section, for addingan Incremental backup image to an HSR volume.

6. On the Backup Image Dependencies page, select the backup image file (the specific point-in-time)that you want to restore, then click Next.

The left pane displays all backup image files in the previously selected Image Set. Select abackup image file to display information about that file in the right pane.

7. On the Finalization Options page, specify whether to finalize the volume for use now, then click Next.

Finalize the volumeat the end of thisrestore

Select this option to finalize the HSR volume after adding the selectedIncremental image file. Once finalized, the HSR volume is ready for use.

Note: Do not select this option if you want to add additionalIncremental images to the HSR volume in the future.

Generate a .HSR file touse in a futurefinalization

Note: This option is available only if you are not finalizing thevolume.

(Optional) When selected, the Restore Wizard generates an HSR file,at the location you specify, that contains metadata about the HSRvolume. With this file, you can finalize the HSR volume withoutaccessing the source backup image files.

15

51

Page 37: Shadow Protect 4.0 Recovery CD User Guide

Restoring a System Volume 37

© 2006-2010 StorageCraft Technology Corporation

If you previously created an HSR file for the HSR volume, you mustselect the same HSR file.

8. (Conditional) On the Specify the Restoration Options page, select the boot parameters you wantto apply to the restored volume, then click Next.

Recovery Environment displays this page only if you are finalizing the volume as part of therestore operation.

Set partition active Configures the restored volume as the active partition in the system (thedrive the machine boots from).

Restore MBR Restore the master boot record (MBR) as part of the volume restore job.The master boot record is stored in the first sector of the first physicalhard drive, and contains the master boot program and partition table.The master boot program uses the partition table to determine the activepartition, then starts the boot program from the boot sector of the activepartition. When selected, you have the following MBR restore options:

Restore MBR from the image file: Restores the MBR from thebackup image file.

Restore original Windows MBR: Restores the default MBR for theversion of Windows you are restoring.

Restore disk signature: Restores the original hard drive physical disksignature. Windows Server 2003, Windows 2000 Advanced Server,and Windows NT Server 4.0 Enterprise Edition (SP3 and later) requiredisk signatures to use the hard drive.

Restore Disk HiddenTrack

Restores the first 63 sectors of a drive. Some boot loader applicationsrequire this for the system to boot.

Use HardwareIndependent Restore

Instructs Recovery Environment to launch the Hardware IndependentRestore (HIR) utility when finalizing the volume for use so you canconfigure the restore operation to properly interact with the hardwarewhere you want to restore the volume.

For more information, see Chapter 13: Using HIR .

9. On the Summary page, review the details of the restore operation, then click Finish.

Recovery Environment begins the restore operation and opens the Task Manager so you can view itsprogress. Once the restore operation completes, you have the following options, depending on thetype of restore operation:

Finalized Restore: Optionally, use the Boot Configuration Utility to ensure that the newlyrestored system volume is "bootable" (see Chapter 12: Boot Configuration Utility ). You cannow reboot the system to the restored system volume.

HeadStart Restore: Because the volume is not finalized, an HSR volume is not available to usersor applications, but you can continue to restore additional Incremental images to the HSR volume.When ready, you can Finalize the HSR volume to make it ready for use. At this point, the HSRvolume becomes a standard system volume, and you can have the same post-restore options asdescribed above for a Standard Restore.

48

44

Page 38: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide38

© 2006-2010 StorageCraft Technology Corporation

Finalizing an HSR Volume

If you previously created an HSR volume, the Restore Wizard lets you finalize it for use when you areready to let users and applications access the restored volume.

To finalize an HSR volume

1. Load Recovery Environment.

For more information, see Chapter 4: Starting Recovery Environment . If you need to useRemote Management, load the UltraVNC Server. For more information, see Chapter 14: UsingRemote Management .

2. In Recovery Environment, select Tasks > Restore Volume to launch the Restore Wizard.

You can also select Restore Volume in the left-side Navigation panel or select RestoreWizard in the Wizards tab.

3. On the Restore Type page, select Finalize an HSR Restore, then click Next.

4. On the Restore Destination page, select the hard disk where you previously created the HSRvolume, then click Next.

5. On the Specify Finalization File page, select how you want to finalize the HSR volume, then click Next.

Finalize using informationfrom the backup image fileset

Uses the original Image Set files to finalize the HSR volume. Thesource Image Set must be accessible to Recovery Environment tofinalize the volume.

Finalize using informationfrom a .HSR File

Uses a previously created HSR file to finalize the HSR volume. Thesource Image Set files are not needed to finalize the HSR volume.

You must specify that you want to create an HSR file whencreating the HSR volume (see Restoring a System Volume ).

6. On the Specify the Restoration Options page, select the boot parameters you want to apply to therestored volume, then click Next.

Set partition active Configures the restored volume as the active partition in the system (thedrive the machine boots from).

Restore MBR Restore the master boot record (MBR) as part of the volume restore job.The master boot record is stored in the first sector of the first physicalhard drive, and contains the master boot program and partition table.The master boot program uses the partition table to determine the activepartition, then starts the boot program from the boot sector of the activepartition. When selected, you have the following MBR restore options:

Restore MBR from the image file: Restores the MBR from thebackup image file.

Restore original Windows MBR: Restores the default MBR for theversion of Windows you are restoring.

Restore disk signature: Restores the original hard drive physical disksignature. Windows Server 2003, Windows 2000 Advanced Server,and Windows NT Server 4.0 Enterprise Edition (SP3 and later) require

15

51

32

Page 39: Shadow Protect 4.0 Recovery CD User Guide

Restoring a System Volume 39

© 2006-2010 StorageCraft Technology Corporation

disk signatures to use the hard drive.

Restore Disk HiddenTrack

Restores the first 63 sectors of a drive. Some boot loader applicationsrequire this for the system to boot.

Use HardwareIndependent Restore

Instructs Recovery Environment to launch the Hardware IndependentRestore (HIR) utility when finalizing the volume for use so you canconfigure the restore operation to properly interact with the hardwarewhere you want to restore the volume.

For more information, see Chapter 13: Using HIR .

7. On the Summary page, review the details of the restore operation, then click Finish.

Recovery Environment displays a "Success" message when the volume is finalized.

Optionally, you can use the Boot Configuration Utility to ensure that the newly restored system volumeis "bootable". For more information, see Chapter 12: Boot Configuration Utility .

48

44

Page 40: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide40

© 2006-2010 StorageCraft Technology Corporation

Chapter 10: Mounting a Backup Image File

The ShadowProtect Explore Backup Wizard guides you through the process of mounting a backupimage file to browse and restore files and folders. ShadowProtect automatically associates the filesrequired to browse and restore a specific backup image file. You need only select the backup imageyou want to explore.

For information about mount options, see Backup Image File Mount Options .

To restore files and folders

1. Start Recovery Environment (see Chapter 4: Starting Recovery Environment ).

2. Open the Explore Backup Wizard by doing one of the following:

In the Wizards tab, click Browse and Restore Files Wizard.

In the Tasks menu, click Explore Backup Image.

3. In the Backup Image File Name page, browse to the image file you want to browse, then click Next.

If the backup image is encrypted you must provide the appropriate password.

The Explore Backup Image Wizard displays a categorized list of information about the backupimage file.

4. (Conditional) In the Backup Image Dependencies page, select the desired point-in-time image fromthe selected backup image set, then click Next.

Recovery Environment displays this page if you select an Incremental image (.spi) to explore.

5. In the Explore Options page, select how you want to mount the backup image.

You can mount the backup image as a Drive Letter or Mount Point. For more information aboutthese options, see Backup Image File Mount Options .

Assign the followingDrive Letter

Mounts the backup image as the selected drive letter.

Mount in the FollowingEmpty NTFS Folder

Mounts the backup image as a Mount Point. You must specify how youwant to name the mount point sub-folder:

Time/Date: Uses the backup image's creation date and time as thesub-folder name (for example, 7-12-2008 10.19.24 AM).

File Name: Uses the backup image file name as the sub-folder name(for example, E_VOL b001).

Custom: Lets you specify a custom sub-folder name.

Mount Backup asRead-Only

Mounts the backup image as read-only.

6. In the Wizard Summary page, review the mount information, then click Finish.

ShadowProtect mounts the backup image file, then automatically launches an Explorer windowand displays the mounted volume.

42

15

42

Page 41: Shadow Protect 4.0 Recovery CD User Guide

Mounting a Backup Image File 41

© 2006-2010 StorageCraft Technology Corporation

Dismounting a Backup Image File10.1

Once mounted, a backup image file remains mounted until explicitly dismounted, or the systemreboots. The ShadowProtect Backup Image Dismount Wizard guides you through the process ofdismounting a previously mounted backup image file (see Mounting a Backup Image File ). As partof the dismount process, you can do the following:

Save changes to writeable backup images.

Shrink the volume so you can restore the image to a smaller drive.

Note: The Shrink Volume feature truncates mounted backup image so that the file systemends at the last currently-allocated cluster. To reduce the backup image size asmuch as possible, use a disk defragmentation tool on the mounted image toconsolidate file distribution within the volume and free up space at the end of thevolume.

To dismount a backup image

1. Start the ShadowProtect Console (see Chapter 4: Starting Recovery Environment ).

2. Open the Backup Image Dismount Wizard by doing one of the following:

In the Tasks menu, click Dismount Backup Image.

In the Disk Map tab, right-click a mounted backup image, then select Dismount BackupImage.

3. On the Mounted Backup Images page, select the backup image volume to dismount, then click Next.

When selecting a mounted backup image, this page also displays the volume's properties.

4. (Conditional) On the Backup Image Dismount Options page, select if you want to Save volumechanges, or Shrink the backup Image, then click Next.

Note: These options are available only if the backup image volume is writeable (see BackupImage File Mount Options ).

Save Changes toIncremental File

Saves changes made to the mounted volume. Right-click theIncremental File to save the modified backup image file using a differentname.

Shrink Volume Lets you shrink the volume so you can restore this image to a smallerhard drive. This option is available in the following situations:

Dismounting a writeable backup image of an NTFS volume inWindows Vista or Windows Server 2008 (or later).

Running StorageCraft Recovery Environment using boot option 1(Recommended), which boots using Windows PE (Windows 7-based).

5. On the Backup Image Dismount Summary page, review the dismount details, then click Finish.

40

15

42

Page 42: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide42

© 2006-2010 StorageCraft Technology Corporation

Backup Image File Mount Options10.2

When mounting a backup image file, consider the following:

Whether to mount the backup image as a drive letter or at a mount point location

Whether to mount the backup image as read-only or writeable.

Mounting a Backup Image as a Drive Letter

The ShadowProtect Mount Utility lets you mount a backup image file as a drive letter on yourcomputer with all the properties of the original volume.

After mounting a backup image as a drive letter, you may perform a variety of tasks, such as runningScanDisk (or CHKDSK), performing a virus check, defragmenting the drive, copying folders or files toan alternate location or simply viewing disk information about the drive such as used space and freespace.

When a drive is mounted, you may set it up as a shared drive. Users on a network can connect to theshared drive and restore files and folders from within the backup image if you want end users to recovertheir own files. You also may mount one or more backup images at a time. The drives will remainmounted until you dismount them or restart the machine. If an NTFS volume uses EFS (Encrypted FileSystem), the security remains intact on the volume when it is mounted.

Mounting a Backup Image as a Mount Point

The ShadowProtect Mount Utility lets you mount a backup image file as a mount point (a directory onan NTFS file system). Mount points overcome the available drive letter limitation and support morelogical organization of files and folders.

Mounting a Read-Only Backup Image

By default, ShadowProtect mounts backup image files as read-only. This lets users access thebackup image to do the following:

Recover files from an existing backup image.

View the contents of a backup image.

Run other applications that need to access the backup image, such as a storage resourcemanager or data mining application.

Note: Windows 2000 does not support read-only NTFS volumes.

Mounting a Writeable Backup Image

ShadowProtect can mount a backup image as writeable volume. This lets users access the backupimage to do the following:

Remove files from the backup image (viruses, malware, etc.)

Add files to the backup image.

Update the backup image security.

Restore a backup image to a smaller volume (see Dismounting Backup Image Files ).

Note: ShadowProtect prevents you from modifying a Base Image File to prevent corruption ofan entire backup Image Set.

41

Page 43: Shadow Protect 4.0 Recovery CD User Guide

Using Image Conversion Tool 43

© 2006-2010 StorageCraft Technology Corporation

Chapter 11: Using Image Conversion Tool

The Image Conversion Tool lets you do the following:

Change the compression setting on an existing image.

Change the encryption setting on an existing image.

Split an image into multiple files (a Spanned set) where each file has a maximum file size. Thisis useful for moving image files to CD or DVD.

Consolidate a Base Image File and any Incremental Image Files into a new Base Image File.

Convert existing image files into either .vmdk or .vhd format for use in a virtual environment.

To use the Image Conversion Tool

1. Start Recovery Environment (see Chapter 4: Starting Recovery Environment ).

2. In the Tasks menu, click Image Conversion Tool.

3. On the Source Image File page, select the Base image file you want to modify, then click Next.

If the backup image is encrypted you must provide the appropriate password.

4. On the Backup Image Dependencies page, select the Incremental backup image file toconsolidate with the Base image file, then click Next.

Select a backup image file (left pane) to view its properties (right pane), including:

Originating machine: The operating system version, the machine name, MAC addressand the engine version of ShadowProtect used to create the image file.

Disk Information: Disk geometry, disk size and number of the first track sectors. You canview the original disk layout in graphical form at the bottom of the screen.

Original Partition Information: Style, number, type, bootable option, starting offset andlength.

Image File Properties: Volume size, creation time, compression, password protection,comment.

5. On the Destination Image File page, specify the location and name of the new backup image file,then click Next.

You can save the new backup image file locally or to a network drive.

6. On the Backup Wizard Options page, specify the desired backup image file options, then click Next.

Information about each of these options, including the Advanced options, is available in Section8.1: Options .

7. On the Wizard Summary page, review the Image Conversion Tool job summary, then click Finish.

15

28

Page 44: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide44

© 2006-2010 StorageCraft Technology Corporation

Chapter 12: Using the Boot Configuration Utility

By default, ShadowProtect performs an automated boot configuration repair to help ensure that asystem volume remains bootable once restored by ShadowProtect. The Boot Configuration Utility(BCU) lets you manage the boot configuration repair process for those situations where the automatedprocess does not work, or for complex multi-boot scenarios not supported by the default process.

To effectively use the BCU and help ensure seamless migration and backup image restoration, youshould understand the Windows boot process. For more information, see Chapter 16: Windows BootProcess .

BCU tools are accessible as buttons on the right-side of the UI. Additionally, the BCU includes thefollowing UI-related options that help you organize and access BCU tools and data:

Hide Advanced Options: (Default: Selected) Hides all of the boot configuration tools except "AutoRepair".

To use the Boot Configuration Utility

1. Load Recovery Environment, then select Tools > Boot Configuration Menu.

The System Volumes pane lists all partitions that contain a Windows installation. Select ShowAll to display all detected volumes on the system, even if they do not contain a WindowsInstallation (this might be necessary for some Advanced boot scenarios). Each SystemVolumes entry includes the following information:

Status The status of the current boot configuration. Options include Bootable, and Broken.

53

Page 45: Shadow Protect 4.0 Recovery CD User Guide

Using the Boot Configuration Utility 45

© 2006-2010 StorageCraft Technology Corporation

System The root of the detected Windows installation.

Disk & Signature The disk number and its signature. Every disk has a unique signature(Duplicate disk signatures can cause boot failures).

Partition The disk partition where this volume resides.

Active Indicates if the partition is configured as a Boot Partition. Althougheach disk in the system can have a defined Boot Partition, whenusing the Boot Configuration Utility it is best to have only a singleBoot Partition in the system.

Boot Type The type of boot loader required by the Windows Installation. Possiblevalues include:

Legacy: Uses the pre-Windows-Vista boot loader.

BCD Compatible: Uses the BCD boot loader introduced withWindows Vista.

Boot Loader The Boot loader installed on the partition, if any.

2. Select the desired boot repair action by clicking the appropriate button.

The BCU organizes its tools into groups so you can view only those that you need.

General Tools

Auto Repair Run the automated ShadowProtect boot configuration routine. This action isavailable when the Status of the selected Windows installation is Broken

This should be your first course of action when attempting to repair a bootconfiguration.

Refresh Refreshes the volume data in the System Volumes field.

Diagnose Run the automated ShadowProtect boot configuration routine in read-onlymode so you can display a description of the boot configuration error andreview possible courses of action.

Connect Connects the Windows installation to an existing Boot Partition. This isnecessary if a partition is not mark as a Boot Partition.

Rename Opens the Boot Loader Entry Name dialog box, where you can change thename displayed for the selected volume at boot time.

Manage Opens the Manage Boot Entries dialog box, where you can delete unwantedboot entries from the selected volume. Each entry displays the technicalname and the listed name.

Use this option to remove unwanted boot entries at startup time.

Note: Deleting valid entries renders a volume unbootable until repaired.

Copy Log Copies the contents of the Log field to the clipboard so you can save it to a

text file.

BCD Toolset (displayed by selecting BCD Tools)

Page 46: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide46

© 2006-2010 StorageCraft Technology Corporation

General Tools

Install BCD Install a BCD boot loader. This might be necessary if the Windowsinstallation (Windows Vista or later) was not the Active partition on thesystem where it was created.

Fix BCD Repair BCD-compatible boot configurations. When migrating a volume to adifferent disk, information required for startup might be altered or lost. Fix

BCD repairs or replaces this information.

Custom CMD Open the BCDEdit utility for the BCD store of the selected Windows

installation.

Install WIM Select a Windows Image (WIM) as a boot option.

Install VHD Select a Virtual Hard Disk (VHD) image as a boot option.

Legacy Toolset (displayed by selecting BCD Tools)

Install NTLDR Install a legacy (NTLDR) boot loader. This might be necessary if the

Windows installation (pre-Vista) was not the Active partition on the systemwhere it was created.

Fix Boot.ini Repair the boot.ini file used by legacy (NTLDR) boot configurations.

Registry Toolset (displayed by selecting Additional Boot Tools)

Edit Services Opens the Service Explorer, where you can enable or disable services anddrivers for the selected volume. This is very helpful if you need to debug amigration compatibility issue or identify a driver or service that is causing astart-up failure.

Drive Letter Opens the Drive Letter editor, where you can assign a specific letter to anydrive in the selected volume. This lets you set drive letters as they werebefore the migration.

Undo Loads the registry backups for the selected volume. The BCU makes abackup of the registry whenever you use the Drive Letter Editor or the ServiceExplorer. This lets you back-out any changes that result in unexpectedbehavior.

Note: This registry backup is the same one used by the HardwareIndependent Restore (HIR), so any HIR changes are lost when you use Undo.

Disk Toolset (displayed by selecting Additional Boot Tools)

Patch MBR Replaces the currently selected MBR and Hidden tracks with the MBR andHidden Tracks from the volume's corresponding ShadowProtect image. Thisis useful if data from Hidden tracks were not restored.

Set Signature Opens the Enter New Disk Signature dialog box, where you can manually seta disk signature. Typically, Windows sets the disk signature duringinstallation, but migration and disk duplication can result in two disks with thesame signature.

Note: The Boot Configuration Utility will warn the user if there is a conflict.

Page 47: Shadow Protect 4.0 Recovery CD User Guide

Using the Boot Configuration Utility 47

© 2006-2010 StorageCraft Technology Corporation

General Tools

Toggle Active Sets the active partition flag for the selected partition.

There can only be one active partition per disk. If there is an active partitionset, Toggle Active disables it.

Initialize Opens the Initialize Disks dialog box, where you can initialize disks in thesystem. This process installs an MBR and configures the disk for use byWindows.

Note: After initializing a disk, you must reboot before using the disk.

3. Review the entries in the Log pane to view the status of the boot configuration action.

The Log field displays a summary of the most recent log action. If an action fails, the loginformation identifies the point of failure. Click Copy Log to copy the contents of the Log field tothe clipboard so you can paste it into a text file for more extended storage.

Page 48: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide48

© 2006-2010 StorageCraft Technology Corporation

Chapter 13: Using HIR

The Hardware Independent Restore (HIR) utility lets you restore system images to different hardware,or virtual environments. You must use HIR to restore backup image files in the following scenarios:

Restoring to a different physical computer (P2P)

Restoring from a physical computer to a virtual environment (P2V)

Restoring from a virtual environment to a physical computer (V2P)

Restoring from one virtual environment to another (V2V)

You can load the HIR utility from the Restore Wizard as part of a restore or as a stand-alone utility.

Note: To restore a backup image file of a system volume to different hardware using RecoveryEnvironment included with ShadowProtect Desktop/Server/SBS, you must install ShadowProtect onthe system volume before making a backup image of the volume. ShadowProtect IT Edition does nothave this limitation.

To use HIR from the Restore Wizard

1. When finalizing a volume restore, click Use Hardware Independent Restore.

HIR in the Recovery Environment

To use HIR as a stand-alone utility

1. Complete the steps for restoring a backup image (see Chapter 9: Restoring a System Volume).

2. In Recovery Environment, click HIR Configuration in the Tools menu.

3. Select the volume that contains the Windows (2000, XP, 2003, or Vista) operating system, then

32

Page 49: Shadow Protect 4.0 Recovery CD User Guide

Using HIR 49

© 2006-2010 StorageCraft Technology Corporation

click Start.

This prepares the restored volume to be bootable on the new system.

HIR Configuration Utility

HIR Advanced Options13.1

The HIR Advanced options dialog box lets you add files and directories to Recovery Environment'sdriver detection process.

Page 50: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide50

© 2006-2010 StorageCraft Technology Corporation

From the HIR Advanced Options dialog box, you can do the following:

Add File: Adds a driver to the HIR driver list. You must have both the .sys and the .inf file for any

driver you want to add.

Add Dir: Adds a directory to the driver search path. Any directory added to the driver search pathmust contain both the .sys and the .inf files for any driver that you want HIR to include in its driver

analysis.

Delete: Deletes the selected driver or directory from the HIR driver list.

DOWN/UP: Move the selected driver or directory up or down in the HIR driver list. RecoveryEnvironment attempts to use supplemental drivers in the order listed in the driver list.

De-Activate Windows: De-activates the Windows installation so you can subsequently activate itthrough normal Windows mechanisms. Sometimes, an HIR-restored Windows environment is nolonger active due to the changes in hardware.

Additionally, you can select how closely a driver must match the actual storage hardware to load.Options include:

Driver must match hardware EXACTLY.

Load drivers that are an EXCELLENT match if no better driver is found.

Load drivers that are a GOOD match if no better driver is found.

Load drivers that are a FAIR match if no better driver is found.

Load drivers that are a LOW match if no better driver is found.

Page 51: Shadow Protect 4.0 Recovery CD User Guide

Using Remote Management 51

© 2006-2010 StorageCraft Technology Corporation

Chapter 14: Using Remote Management

The ShadowProtect CD includes the UltraVNC Server and Viewer that let you remotely control, usingthe UltraVNC Viewer, a computer running Recovery Environment and UltraVNC Server.

To configure the UltraVNC remote management solution

1. Load UltraVNC Server on the computer that you need to manage

a) Load Recovery Environment (see Chapter 4: Starting Recovery Environment ).

b) In Recovery Environment, click UltraVNC in Tools menu.

UltraVNC Server prompts you to set the remote management password.

UltraVNC Remote Management Password

Once UltraVNC Server loads, you can remotely manage the computer with UltraVNC Viewer.

2. Configure UltraVNC Viewer on the remote computer

a) Collect the information necessary to connect to UltraVNC Server.

b) Load UltraVNC Viewer.

c) Specify the IP address of the computer running UltraVNC Server, then click Connect.

d) When prompted, specify the remote management password.

Once connected to the remote UltraVNC Server, you can operate ShadowProtect and RecoveryEnvironment as normal.

For more information about UltraVNC Server and UltraVNC Viewer, visit http://www.ultravnc.com/.

15

Page 52: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide52

© 2006-2010 StorageCraft Technology Corporation

Chapter 15: Other Operations

ShadowProtect IT Edition supports the following additional operations:

Verifying Backup Image Files15.1

On a regular basis, you should verify the quality and integrity of backup image files. This helps ensurethat backup image files are ready when needed. One way to do this is to mount a backup image andconfirm that you can browse the files and folders (see Chapter 10: Mounting a Backup Image File ).However, ShadowProtect provides a utility for verifying the integrity of backup image files.

To use the verify image wizard

1. Start the ShadowProtect Console (see Chapter 4: Starting Recovery Environment ).

2. In the Tasks menu, select Verify Backup Image.

3. In the Specify Verify Options page, browse to the image file you want to verify, then click Next.

4. In the Specify The Verify Options page, select the appropriate verify option, then click Next.

Verify only selected image: Verifies only the currently selected backup image file.

Verify selected image and all dependent files: Verifies the currently selected backupimage file, and any files dependent on the selected file. If you select this option, specify the fileorder you want the Verify Image Wizard to use.

5. In the Wizard Summary, review the verify job, then click Finish.

40

32

Page 53: Shadow Protect 4.0 Recovery CD User Guide

Windows Boot Process 53

© 2006-2010 StorageCraft Technology Corporation

Chapter 16: Windows Boot Process

The Boot Process can be complicated, with several different systems playing a part in it. To effectivelymigrate or restore bootable volumes, you should be familiar with some of these components. Thesystems that take part in the boot process include, in order of participation, the following:

BIOS -> MBR -> Boot Sector -> Boot Loader -> Boot Loader Configuration -> Windows System(Splash Screen)

BIOS: The Basic Input Output System (BIOS) initiates the boot process. The BIOS configurationdetermines the boot order for the bootable disks in the system. For example: CD Drive, then Hard disk0, then USB Storage Device. It is important to understand a system's boot order, because there is noway for Windows to query the BIOS to find out the disk used to boot the system.

MBR: The first sector of a bootable disk is the Master Boot Record (MBR). The MBR contains the diskpartition information for the bootable disk. Each disk has one "Active" partition. The Active partitioncontains a boot sector, which is the next step in the boot process. If the disk does not have an Activepartition, it is not bootable and the BIOS moves to the next disk in its boot order, or displays an error ifno disk has an active partition.

Boot Sector: The boot sector of an active partition is located in the first 16 sectors of the partition.The boot sector contains the boot loader (NTLDR or BOOTMGR). If there is not a valid boot sector inthe active partition, the BIOS displays an error, or a blank screen with a cursor.

Boot Loader and Configuration: The boot loader takes control of the boot process and reads itsconfiguration file (boot.ini or BOOT\BCD), which directs the boot process to a Windows installation

located on a specific disk and partition in the system wide. If the configuration file is valid, Windowsstarts loading and you see the Windows Splash screen appear on the system display. If the Windowsinstallation includes multiple boot options, the user can select the specific Windows installation touse. Any problems with the configuration filed result in system errors.

Page 54: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide54

© 2006-2010 StorageCraft Technology Corporation

Chapter 17: Product Support

Technical support for StorageCraft products is available beginning with the release of the product andending six months after the release of the next major version of the product or after StorageCraftdiscontinues the product line.

Complimentary Technical Support

StorageCraft complimentary technical support consists of self-help support tools that are availableat http://forum.storagecraft.com/Community/ (in English only), and an easy-to-use, powerfulknowledge base that helps you find answers to the most frequently asked product questions, as wellas “how-to” procedures and technical information about all StorageCraft products.

E-Mail Support

Requests for e-mail support in North America are processed 8:00 am to 5:00 pm MST, Mondaythrough Friday. To obtain e-mail technical support for specific technical questions or issues, fill outthe form at http://forum.storagecraft.com/Community/. Please provide as much detail as possible tohelp the technical support engineers understand and diagnose the issue.

In order to ensure efficient service, please provide at a minimum the following information:

Product name and version number

Detailed problem description, error code, log file description, etc.

Hardware and software configuration, operating system version, service pack number, etc.

Telephone Support

StorageCraft support engineers are available Monday through Friday 9:00 A.M. to 5:30 P.M. (MST),except for business holidays. To reach the StorageCraft technical support team, please call: (801)545-4710. Telephone support is available to all customers with a current maintenance plan orcustomers who have purchased product maintenance from the StorageCraft Web store. If you arenot immediately connected to a support engineer, leave a message and the next available supportengineer will return your call.

Page 55: Shadow Protect 4.0 Recovery CD User Guide

Glossary 55

© 2006-2010 StorageCraft Technology Corporation

Chapter 18: Glossary

Backup: The activity of copying files, volumes, and databases to preserve them in case of equipmentfailure or other catastrophe. An important part of a disaster recovery strategy, backup is oftenneglected, particularly for personal computer users.

Backup Image File: Files that contain the contents of a backup activity, Backup Image Files let yourestore the contents of a computer system to a specific point-in-time.

Bare Metal Recovery: The complete restoration of computer data after a catastrophic failure,including the operating system, file system, partitions, volumes and data, from a complete backupimage.

Base Image File: Backup files that contain a copy of all used sectors on a disk drive. This image filecontains all data on the computer, including the operating system, applications, and data.

Basic Disk: A physical disk drive that can be accessed by MS-DOS* and all Windows* operatingsystems. Basic disks can contain up to four primary partitions, or three primary partitions and anextended partition with multiple logical drives.

Cold Backup: A backup taken from the Recovery Environment, rather than when the computer'soperating system is loaded.

Continuous Incrementals: A backup scheduling model for ShadowProtect that lets you create abase backup file, then create additional incremental backup files that include only changes thatoccurred since the last backup.

Compression: A technology that reduces the size of a file. Compression lets you save time,bandwidth and storage space.

Differential Image File: Backup files containing the hard drive sectors that have changed since theBase Image File was created. Differential image files take about the same time to create as BaseImage Files, but they are smaller. When restoring a drive (or files and folders), you must use the BaseImage File with the appropriate Differential Image File to restore the computer to a specific point-in-time.

Disaster Recovery: The ability to recover from the complete loss of a computer, whether due tonatural disaster or malicious intent. Typical disaster recovery strategies include replication andbackup/restore.

Disk Device: A locally accessible disk drive, including locally attached USB or FireWire disk drives,and network drives such as SAN, NAS, iSCSI, SCSI, USB or FireWire.

Driver: A program that interacts with a particular device or software. The driver provides a commoninterface to the device, or software, that makes it accessible to other computer systems and the user.

Drive Letter: See Mount as Drive Letter.

Dynamic Disk: A physical disk that provides features that basic disks do not (see Basic Disk), suchas support for volumes spanning multiple disks. Dynamic disks use a hidden database to trackinformation about dynamic volumes on the disk and other dynamic disks in the computer.

Encryption: A procedure that renders the contents of a file unintelligible to anyone that cannot presentthe appropriate decryption key.

ExactState™ Imaging: The ability to create a backup image at a point where the computer is in thebest state for creating a backup (for example, no open files).

Full Image File – See Base Image File.

Page 56: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide56

© 2006-2010 StorageCraft Technology Corporation

Hard Drive: An electromagnetic storage device, also referred to as a “disk drive,” “hard drive,” or “harddisk drive” that stores and provides access to data on a computer.

Head Start Restore (HSR): The ability to begin the restoration of a large backup image chain whileShadowProtect continues to add Incremental backup image files to the same image chain. Thisreduces the time necessary to restore a large volume from days or weeks, to minutes or just a fewhours.

Hot Backup: A backup image taken when ShadowProtect is loaded on the computer's standardoperating system. A hot backup requires the use of a snapshot filter driver (see Snapshot).

Hot Restore: The restoration of a backup image while the computer or server remains up and running.You cannot perform a hot restore of a system volume.

Image or Image File: See Backup Image File.

Image Set: The combination of a Full image and all additional Incremental images necessary torestore a computer to a given point-in-time.

Incremental Image File: Backup files containing the sectors that have changed since the lastIncremental backup was taken. Incremental Images are fast to create and smaller than either BaseImage Files or Differential Image Files. When restoring a drive (or files and folders), you must use theBase Image File and the appropriate Incremental Image Files necessary to restore the computer to aspecific point-in-time.

Lock Volume: A software request to gain exclusive access to a particular drive. Locking the volumeprevents other software programs from changing the file system or opening files during the process ofwriting the image file.

Microsoft VolSnap: The proprietary Microsoft snapshot technology.

Microsoft Volume Shadow Copy Service (VSS): The backup infrastructure for Microsoft WindowsXP and Microsoft Windows Server 2003 operating systems, as well as a mechanism for creatingconsistent point-in-time copies of data. The Volume Shadow Copy Service produces consistentsnapshots by coordinating with business applications, file-system services, backup applications, fast-recovery solutions, and storage hardware.

Mount as Drive Letter: The process of assigning volumes (active primary partitions and logicalpartitions) to specific letter designators in the root namespace of a Microsoft operating system. Unlikemount points (see Mount Point), drive letter assignment permits only letters in the namespace, andthey solely represent volumes. In other words, it is a process of naming the roots of the "forest" thatrepresents the file-system (with each volume being an independent tree therein).

Mount Point: A directory on a volume that an application can use to "mount" (set up for use) adifferent volume. Mount points overcome the limitation of drive letters (see Mount as Drive Letter) andallow for more logical organization of files and folders.

Mounted Volume: The ability to see and use a backup image that is physically located somewhereelse on the network. When mounted, the backup image appears as a volume and behaves as if it is apart of the local computer system. Mounted volumes are read/write capable so users can updateexisting image files, scan for viruses or other malware, and repair the image file.

Operating System: Software that, after being loaded into the computer by a boot program, managesall other programs on a computer. Other programs are called applications or application programs.

Partition: The portion of a physical disk that functions as though it were a physically separate disk.Once created, a partition must be formatted and assigned a drive letter before data can be stored on it.On basic disks, partitions can contain basic volumes, which include primary partitions and logical

Page 57: Shadow Protect 4.0 Recovery CD User Guide

Glossary 57

© 2006-2010 StorageCraft Technology Corporation

drives. On dynamic disks, partitions are known as dynamic volumes and come in the following types:simple, striped, spanned, mirrored, and RAID–5 (striped with parity) volumes.

Restoring: The activity of retrieving computer data from a previously saved backup image file.

Snapshot: A type of backup that provides a point-in-time view of a volume. When you perform abackup or scheduled backup, ShadowProtect uses either StorageCraft Volume Snapshot Manager(VSM) or Microsoft Volume Shadow Copy Service (VSS) to take a snapshot of the volume. Anychanges that occur to the volume after the snapshot is taken are not included in the backup.

.spf: A file extension representing a ShadowProtect full or base image file.

.spi: A file extension representing a ShadowProtect incremental or differential image file.

.sp(number): A file extension representing a ShadowProtect image file that spans multiple files. Thenumber following .sp is the sequence of the file in the spanned image file group.

Point-In-Time Backup: A backup routine that lets you restore a file, folder, or the entire system to aspecific point-in-time. Point-in-time backups are often used to roll-back a computer to a point prior to acomputer problem.

Protected Volumes: Volumes that users have selected for backup by ShadowProtect.

RAID: Redundant Array of Independent Disks. A collection of disk drives that offers increasedperformance and fault tolerance. There are a number of different RAID levels. The three mostcommonly used are 0, 1, and 5:

Level 0: striping without parity (spreading out blocks of each file across multiple disks).Level 1: disk mirroring or duplexing.Level 5: block-level striping with distributed parity.

Real-Time: A level of computer responsiveness that a user perceives as essentially immediate, orthat enables the computer to keep up with some external process such as backing up.

Recovery Environment: See StorageCraft Recovery Environment.

Remote Computer (Node): A computer that is physically located somewhere else on a network butis accessible from a local computer.

Service: A program, routine, or process that performs a specific system function to support otherprograms, particularly at a low (close to the hardware) level.

Scheduled Job: A job created in the ShadowProtect interface. Scheduled jobs let ShadowProtectbackup events to occur automatically.

Spanned Image Set: A Backup Image File that has been divided into multiple smaller files for easiermanagement or storage. This lets you save the Backup Image File to removable media such as a CDor DVD.

StorageCraft Recovery Environment: A secondary boot environment (or operating system) thatgives a user the functionality necessary to access and restore Backup Image Files on a network. Thisenvironment is typically used when a drive cannot be restored from within Windows or when thecomputer has suffered a catastrophic failure and the entire hard drive must be restored.

System Downtime: The amount of time a server or PC is offline and inaccessible to users. This iscommonly known as having the system out of production.

System Volume: The volume that stores the boot files necessary to load an operating system.Typically, this is the C:\ volume.

Page 58: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide58

© 2006-2010 StorageCraft Technology Corporation

Tray Icon: A graphical representation of a computer program or application. For example,ShadowProtect uses a tray icon for the user to gain information about the program. Tray icons residein the system tray.

UNC (Universal Naming Convention): A method used to identify folders, files and programs on anetwork computer. A UNC path begins with two backslashes \\ followed by the server name, sharename, directory and filename. For example, \\server_name\share_name\backup_name.spi.

Unprotected Volumes: Volumes not protected by ShadowProtect.

User Interface (UI): The portions of a computer system with which a user interacts (display,keyboard, mouse, etc.) and the portion of a software program that accepts and responds to userinteraction.

Virtual Private Network (VPN): A private data network that makes use of the publictelecommunication infrastructure. VPNs maintain privacy through the use of tunneling protocols,encryption, and other security procedures.

VirtualBoot: The ability to create a Virtual Machine based on an existing backup image chain. Oncestarted, the VM provides complete access to data, applications, and services provided by the originalsystem, in a state corresponding with the last Incremental image included in the VM.

Virtual Volume: A locally referenced volume that does not physically exist on the system.ShadowProtect uses virtual volumes for the benefit of protecting computer systems.

Volume: An area of storage on a hard disk. A volume is formatted by using a file system, such as fileallocation table (FAT) or NTFS, and typically has a drive letter assigned to it. A single hard disk canhave multiple volumes, and volumes can also span multiple disks.

VSS Aware: An application designed to work with Microsoft Volume Shadow Copy Services (VSS)framework to ensure consistent data backup.

Page 59: Shadow Protect 4.0 Recovery CD User Guide

End User License Agreement 59

© 2006-2010 StorageCraft Technology Corporation

Chapter 19: End User License Agreement

END-USER LICENSE AGREEMENT FOR SELECT SHADOWPROTECT TM SOFTWARE PRODUCTS

END-USER LICENSE AGREEMENT FOR SELECT SHADOWPROTECT TM SOFTWARE PRODUCTS

Please carefully read the terms and conditions of this license agreement (the “Agreement”), which applies to use of the followingversions of StorageCraft Technology Corporation™ software: ShadowProtect Server 4.0, ShadowProtect Small Business Server4.0, ShadowProtect Desktop 4.0, ShadowProtect ImageManager™ 4.0, and ShadowProtect ImageManager Enterprise™ 4.0(collectively the "ShadowProtect Products" and individually a "ShadowProtect Product"). This Agreement specifies the terms andconditions of your use of any of the foregoing ShadowProtect Products. StorageCraft Technology Corporation (“StorageCraft”), iswilling to license a ShadowProtect Product to you as the individual, company or legal entity that will be using the ShadowProtectProduct (“you” or “Licensee”), but only on the condition that you accept all terms of this Agreement. This Agreement is a legaland enforceable contract between StorageCraft and you. You accept this Agreement and agree to its terms if you open apackage containing a ShadowProtect Product, break the seal on a ShadowProtect Product, click the “I Agree” button, orotherwise indicate assent to the terms of this Agreement by using the ShadowProtect Product (e.g., installing, loading, retaining,or copying the Product). If you do not agree to these terms and conditions, do not open the packaging, break the seal, click the “IAgree” button, or otherwise use the ShadowProtect Product. You may contact StorageCraft’s customer service department forinformation on both obtaining a refund of any License Fee you paid and instructions on returning the ShadowProtect Product andDocumentation. If you install or otherwise use the ShadowProtect Product under any trial, evaluation, or purchase transaction,your conduct constitutes acceptance of this Agreement and you will be bound by all of its terms and conditions. You andStorageCraft are sometimes collectively referred to in this Agreement as “the Parties” and individually as a “Party.” You mayaccess StorageCraft’s website at www.storagecraft.com/legal/ to download and print a copy of this Agreement.

Section 1 Definitions. Capitalized terms will have the meaning given in this Section 1.

1.1. “Archival Use” means the creation and confidential storage by Licensee of a single copy of the Software for use byLicensee only in the event that the Original Copy fails to function properly. Archival Use does not include simultaneous use of theOriginal Copy and the archival copy, which simultaneous use is prohibited by this Agreement.

1.2. “Desktop Operating System” means any broadly released Microsoft operating system intended for desktop computersincluding but not limited to: Windows 2000 Professional, Windows XP Home Edition, Windows XP Professional, Windows Vista,and Windows 7.

1.3. “Documentation” means all on-line help files or written instruction manuals and user guides addressing the use of theSoftware.

1.4. “Effective Date” means the date on which Licensee has both paid the License Fee and accepted this Agreement.

1.5. "ImageManager " means ShadowProtect ImageManager Version 4.0, which is an executable program used for thescheduled verification, retention, and consolidation of ShadowProtect image files and includes the ImageManager Service andImageManager Client, but excludes ImageManager Enterprise and the additional features and functionality included withImageManager Enterprise. ImageManager is included with the purchase of ShadowProtect Server, ShadowProtect SBS, orShadowProtect Desktop.

1.6. "ImageManager Enterprise" means ShadowProtect Image Manager Enterprise Version 4.0, which is an executableprogram used for the scheduled verification, retention, consolidation, monitoring, and management of ShadowProtect imagefiles. ImageManager Enterprise includes the advanced license features of image file replication and HeadStart Restore™, whichare licensed on a per-job basis. One job permits ImageManager Enterprise to perform: (a) one replication to a destinationcomputer (either a Physical or Virtual System) on which ShadowProtect Server, ShadowProtect Desktop, or ShadowProtect SBS isinstalled and (b) one HeadStart Restore to a destination computer (either a Physical or Virtual System) on which ShadowProtectServer, ShadowProtect Desktop, or ShadowProtect SBS is installed. Additional jobs must be purchased separately.

1.7. “Intellectual Property Rights” means all of StorageCraft’s ownership rights associated with intellectual property andthe Software, including but not limited to patents, copyrights, trademarks, and trade secrets, and any and all rights to excludeexisting from time to time in a specified jurisdiction under patent law, copyright law, moral rights law, trade-secret law,trademark law, unfair competition law, or other similar rights.

1.8. “License Fee” means the price paid by Licensee to StorageCraft or its reseller, distributor, or authorizedrepresentative in exchange for a license to use the Software in accordance with the limitations established in this Agreement.

1.9. "Maintenance" means, for the specific ShadowProtect Product to which you are licensed in accordance with thisAgreement and in exchange for which you paid a License Fee, a time-limited right to (i) all Updates and Upgrades to theShadowProtect Product that StorageCraft releases during the period that Maintenance is in effect and, (ii) in addition to thesupport specified elsewhere in this Agreement, telephone support during StorageCraft business hours. Maintenance is provided

Page 60: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide60

© 2006-2010 StorageCraft Technology Corporation

on a per-serial-number or per-seat basis and expressly excludes any other ShadowProtect Products, Updates to otherShadowProtect Products, separately licensed add-on modules, or features included in other ShadowProtect Products. Updates,Upgrades, and additional features of ShadowProtect Products will be released, added, or created at StorageCraft's sole andcomplete discretion, and StorageCraft makes no warranty, promise, or commitment to make any such offering.

1.10. “Object Code” means the output of a compiler after it processes StorageCraft’s source code in the form of anexecutable, dll, or library file.

1.11. “Original Copy” means the single copy of the Software provided to Licensee in conjunction with this Agreement.

1.12. “Physical System” means a computer hardware device supported by an installed operating system.

1.13. “Server Operating System” means any broadly released Microsoft operating system intended for server computersincluding but not limited to: Windows Server 2003 and Windows Server 2008.

1.14. "ShadowProtect Desktop" means ShadowProtect Desktop Version 4.0 and includes two components: the executableprogram installed on the computer and the StorageCraft Recovery Environment. ShadowProtect Desktop does not includeseparately licensed, fee-bearing products or add-on modules, including without limitation ImageManager Enterprise. ShadowProtect Desktop is licensed for use on either a Physical System or a Virtual Machine, but not both. ShadowProtectDesktop includes three proprietary StorageCraft applications: (a) VirtualBoot™, (b) ImageManager, and (c) ShadowProtectKeyFileMaker™ and other KeyFile Tools (collectively "KeyFileMaker").

1.15. ShadowProtect SBS" means ShadowProtect Small Business Server Version 4.0 and includes two components: theexecutable program installed on the computer and the StorageCraft Recovery Environment. ShadowProtect SBS does not includeseparately licensed, fee-bearing products or add-on modules, including without limitation ImageManager Enterprise. ShadowProtect SBS is licensed for use on either a Physical System or a Virtual Machine, but not both. ShadowProtect SBSincludes three proprietary StorageCraft applications: (a) VirtualBoot, (b) ImageManager, and (c) KeyFileMaker.

1.16. ShadowProtect Server" means ShadowProtect Server Version 4.0 and includes two components: the executableprogram installed on the computer and the StorageCraft Recovery Environment. ShadowProtect Server does not includeseparately licensed, fee-bearing products or add-on modules, including without limitation ImageManager Enterprise. ShadowProtect Server is licensed for use on either a Physical System or a Virtual Machine, but not both. ShadowProtect Serverincludes three proprietary StorageCraft applications: (a) VirtualBoot, (b) ImageManager, and (c) KeyFileMaker.

1.17. “Small Business Server Operating System” means Microsoft Small Business Server 2000, Microsoft Small BusinessServer 2003, and Microsoft Small Business Server 2008.

1.18. "Software" means: (a) the specific ShadowProtect Product to which you are licensed in accordance with thisAgreement and in exchange for which you paid a License Fee to StorageCraft or its authorized reseller, and/or (b) the specificShadowProtect Product to which you have been granted an Evaluation License, a Trial License, or an NFR License.

1.19. “StorageCraft Recovery Environment” means the bootable CD component of the Software or the ISO file that permitsyou to create the bootable CD component of the Software (and the all functionality included therein) that includes WinPE underlicense granted to StorageCraft by Microsoft Licensing, GP and which provides a bootable operating system environment thatruns a version of the Software.

1.20. "Update" means the process in which StorageCraft makes available to existing users of the Software patches, issuecorrections, and bug fixes. StorageCraft makes no warranty, promise, or commitment to create or release any Updates.

1.21. "Upgrade" means StorageCraft's release to the public of a version of the Software that replaces the prior version of theSoftware on StorageCraft's price list pursuant to StorageCraft's then-current Upgrade policies. StorageCraft makes no warranty,promise, or commitment to create or release any Upgrades.

1.22. “Use” means the ability to run, execute, and display the Software in its Object Code form as it was provided to you byStorageCraft or its authorized reseller, but only in accordance with the terms of this Agreement.

1.23. “Virtual Machine” means a software emulation of a computer hardware device with operating system. VMware® andVirtual PC are examples of software that create virtual machines. “Desktop Virtual Machine” means a Virtual Machineemploying a Desktop Operating System (e.g., VMware running the Windows 7 operating system). “Server Virtual Machine”means a Virtual Machine employing a Server Operating System (e.g., VMware running the Windows Server 2008 operatingsystem). “Small Business Server Virtual Machine” means a Virtual Machine employing a Small Business Server operating system(e.g., VMware running the Windows Small Business Server 2008 operating system).

1.24. “Volume License Certificate” means a license certificate issued by StorageCraft authorizing the Licensee to install anduse multiple copies of the Software in such numbers as are authorized by the certificate.

Page 61: Shadow Protect 4.0 Recovery CD User Guide

End User License Agreement 61

© 2006-2010 StorageCraft Technology Corporation

Section 2 Proprietary Rights. This is a license and not a sale. The Software and Documentation are proprietary products ofStorageCraft or its licensors and are protected under United States copyright laws and international treaty provisions. Nothingin this License constitutes a waiver of StorageCraft’s rights under U.S. or international copyright law or any other law. Ownershipof the Software and all copies, modifications, translations, components, features, and merged portions of the Software shall atall times remain with StorageCraft, including all copyrights, patent rights, trade secret rights, trademarks and other intellectualproperty rights in the Software and Documentation. Licensee’s rights to use the Software are limited solely to those rightsidentified in this Agreement. StorageCraft retains all rights not expressly granted to Licensee in this Agreement. This Agreementgoverns any Updates, Upgrades, releases, revisions, or enhancements to the Software that StorageCraft may furnish to theLicensee. This Agreement does not include a grant to Licensee of any: (a) ownership right, title, interest, security interest, orother interest in the source code or Object Code of the Software or in StorageCraft’s Intellectual Property Rights; (b) IntellectualProperty Rights relating to the Software, any copy of any part of the Software or the Documentation; (c) right or authority tomodify the Software; (d) right to use the Software to develop derivatives or derivative works of the Software; (e) right to reverseengineer, decompile, recompile the Software or otherwise attempt to discover source code or trade secrets related to theSoftware; (f) right to copy the Software except as expressly permitted in this Agreement; (g) right to copy, sublicense, sell, lend,rent, lease, give, transfer, assign, or otherwise dispose of all or any portion of the Software or any interest in the Softwarewithout StorageCraft’s prior written consent (any such disposition made without such consent shall be null and void); and/or (h)right to remove, obscure or alter any notice of patent, copyright, trade secret, trademark, or other proprietary right ofStorageCraft.

Section 3 Grant of License. Licensee is granted a fully paid, worldwide, perpetual, revocable, non-exclusive, non-transferable,non-sublicenseable, license-fee bearing, Object Code license, subject to timely payment to StorageCraft of any applicableLicense Fee, to do the following: (a) use the Software and Documentation in its "as is" and unmodified form as provided to you byStorageCraft; (b) use the Software strictly in accordance with the terms of this Agreement and with the specific conditions andlimitations applicable to the specific ShadowProtect Product licensed by Licensee, as specified in Section 3.1 below; (c) copy theSoftware for Archival Use only, provided that all titles, trademark symbols, copyright symbols and legends, and other proprietarymarkings are reproduced on such archival copy, and provided further that the archival copy is not used unless the original copy ofthe Software becomes inoperable or fails to function properly; and (d) use the Software on only one computer, unless Licenseehas acquired a Volume License Certificate, in which case the Licensee is authorized to install and operate the Software on asmany computers as are authorized by the Volume License Certificate. LICENSEE UNDERSTANDS AND AGREES THAT WITH RESPECT TOCERTAIN LICENSES COVERED BY THIS AGREEMENT ALL FUNCTIONALITY OF THE SOFTWARE WILL TIME OUT AND CEASE TO OPERATE ASGOVERNED BY THE AGREEMENT AND SOFTWARE. IN THE EVENT THAT THE SOFTWARE TIMES OUT AND CEASES TO OPERATE,STORAGECRAFT SHALL HAVE NO RESPONSIBILITY TO PROVIDE SERVICE OR SUPPORT FOR THE SOFTWARE.

3.1. Additional Terms, Conditions, and Limitations Applicable to Specific Versions of the Software.

3.1.1. Desktop License – A Desktop License to the Software permits use only on a Desktop Operating System. This version ofthe Software may be acquired by the Licensee either by purchase of a packaged boxed version or by download from the webstoreof StorageCraft or one of its reseller partners. It includes a license to use ImageManager.

3.1.2. Desktop Virtual Machine License – A Desktop Virtual Machine License to the Software permits use only on a VirtualMachine running a Desktop Operating System. This license does not authorize the Licensee to install and use the Software on aPhysical System. With the exception that the use of the Software granted under this License is limited to a Desktop VirtualMachine, all other rights granted and limitations imposed under the Desktop License apply. This version of the Software may beacquired by the Licensee either by purchase of a packaged boxed version or by download from the webstore of StorageCraft orone of its reseller partners. It includes a license to use ImageManager.

3.1.3. Evaluation License – An Evaluation License is a license to the Software that permits Licensee to use all features of thecorresponding ShadowProtect Product and includes the StorageCraft Recovery Environment. This license is provided to theLicensee for evaluation purposes for the specific evaluation period allowed by the Software. The Software will provide Licenseewith advance notice of the expiration of the Software before that event occurs. This License may not be copied, distributed orresold. This version of the Software may be acquired by the Licensee based on a pre-qualified transaction of a packaged boxedversion or by download from the website of StorageCraft or one of its reseller partners. It includes a license to useImageManager.

3.1.4. ImageManager Enterprise License – An ImageManager Enterprise License to the Software permits use of the advancedlicensed features of ImageManager Enterprise on a per-job basis. One job permits ImageManager Enterprise to perform: (a) onereplication to a destination computer (either a Physical or Virtual System) on which ShadowProtect Server, ShadowProtectDesktop, or ShadowProtect SBS is installed and (b) one HeadStart Restore to a destination computer (either a Physical or VirtualSystem) on which ShadowProtect Server, ShadowProtect Desktop, or ShadowProtect SBS is installed. Additional jobs must bepurchased separately.

3.1.5. Not for Resale (“NFR”) Software License – An NFR Software License permits the Licensee to use a ShadowProtectProduct for promotional purposes at no or reduced cost to Licensee. This license may not be copied, distributed or resold. Theelectronic delivery, packaging or media on which the NFR Software is provided is marked “NFR” or “Not For Resale.” This versionof the Software may be acquired by the Licensee either as a packaged boxed version provided by StorageCraft or by downloadfrom the webstore of StorageCraft or one of its reseller partners. It includes a license to use ImageManager but excludes

Page 62: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide62

© 2006-2010 StorageCraft Technology Corporation

Maintenance.

3.1.6. Server License – A Server License to the Software permits use only on a Server Operating System. This version of theSoftware may be acquired by the Licensee either by purchase of a packaged boxed version or by download from StorageCraft’swebstore or one of StorageCraft’s reseller partners. It includes a license to use ImageManager.

3.1.7. Server Virtual Machine License – A Server Virtual Machine License to the Software permits use only on a VirtualMachine running a Server Operating System. This license does not authorize the Licensee to install and use the Software on aPhysical System. With the exception that the use of the Software granted under this License is limited to a Server VirtualMachine, all other rights granted and limitations imposed under the Server License apply. This version of the Software may beacquired by the Licensee either by purchase of a packaged boxed version or by download from the webstore of StorageCraft orone of its reseller partners. It includes a license to use ImageManager.

3.1.8. Small Business Server License – A Small Business Server License to the Software permits use only on a Small BusinessServer Operating System. This version of the Software may be acquired by the Licensee either by purchase of a packaged boxedversion or by download from the webstore of StorageCraft or one of its reseller partners. It includes a license to useImageManager.

3.1.9. Small Business Server Virtual Machine License – A Small Business Server Virtual Machine License to the Softwarepermits use only on a Virtual Machine running a Small Business Server Operating System. This license does not authorize theLicensee to install and use the Software on a Physical System. With the exception that the use of the Software granted underthis License is limited to a Small Business Server Virtual Machine, all other rights granted and limitations imposed under theSmall Business Server License apply. This version of the Software may be acquired by the Licensee either by purchase of apackaged boxed version or by download from the webstore of StorageCraft or one of its reseller partners. It includes a license touse ImageManager.

3.1.10. Trial License – A Trial License is a license to the Software that permits Licensee to use all features of the correspondingShadowProtect Product, but does not include the StorageCraft Recovery Environment. This version of the Software may beacquired by the Licensee by download from StorageCraft’s website or a download provider authorized by StorageCraft. Itincludes a license to use ImageManager but excludes Maintenance.

SECTION 4 LICENSE RESTRICTIONS. Licensee agrees that, unless it has obtained StorageCraft's prior written consent, it will notdirectly or through any parent, subsidiary, affiliate, agent, or third party do any of the following with respect to the Software andDocumentation:

4.1. Use the Software or Documentation in violation of the terms of this Agreement;

4.2. Copy the Software or Documentation except as specifically authorized by this Agreement;

4.3. Permit concurrent use of any copy of the Software except as authorized by a Volume License Certificate;

4.4. Sell, lease, license, sublicense or otherwise deal with any portion of the Software or Documentation;

4.5. Provide, lend, disclose, divulge, make available to, or permit use of the Software or Documentation by persons otherthan the Licensee without StorageCraft’s prior written consent;

4.6. Rent, lease, grant a security interest in, or otherwise transfer rights to, or possession of, the Software or any copythereof;

4.7. Use the Software in any service bureau, facility management, or time sharing arrangement;

4.8. Use the StorageCraft Recovery Environment except in conjunction with the licensed copy of the ShadowProtectProduct with which the StorageCraft Recovery Environment was provided to you;

4.9. Remove or alter any proprietary notices, labels, or legends on any copy of the Software or Documentation;

4.10. Ship or transmit (directly or indirectly) any copies of the Software or Documentation to any country or destinationprohibited by the United States Government;

4.11. Reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of theSoftware, or create derivative works from, employ, or manipulate the Software;

4.12. Use a Virtual Machine license on a Physical System;

4.13. Use KeyFileMaker, or VirtualBoot in conjunction with image files created by software other than the specific seat oflicensed Software with which KeyFileMaker or VirtualBoot were provided to Licensee; and

Page 63: Shadow Protect 4.0 Recovery CD User Guide

End User License Agreement 63

© 2006-2010 StorageCraft Technology Corporation

4.14. Assign or transfer the rights granted to Licensee under this Agreement on a permanent basis unless: (a) Licenseeretains no copies of the Software, (b) prior to such assignment or transfer, the assignee or transferee agrees in writing to theterms and conditions of this Agreement, and (c) StorageCraft consents to such assignment or transfer.

Section 5 License Fee.

5.1. License Fee. With the exception of an Evaluation License, Trial License, and NFR License, Licensee is required to paythe License Fee established by StorageCraft or its authorized reseller.

5.2. Maintenance and Support Fee. Maintenance or additional support beyond the support granted in this Agreement isavailable by a separate maintenance or support agreement with StorageCraft.

Section 6 Support, Updates and Upgrades.

6.1. Licensee is entitled to receive Updates and participate in StorageCraft’s support program in consideration for itspayment of the License Fee. StorageCraft’s support program includes StorageCraft’s on-line support system, the StorageCraft-moderated user forum, and StorageCraft’s knowledge base, which is a question and answer resource that includes frequentlyasked questions.

6.2. StorageCraft reserves the right to require that any Upgrades of the Software that you have obtained pursuant to aVolume License Certificate may only be obtained in a quantity equal to the number of seats licensed pursuant to the VolumeLicense Certificate. Any Upgrade is provided under StorageCraft's policies in effect at the time of order. This Agreement does notseparately license you for licenses in addition to those which you have purchased and which have been authorized byStorageCraft.

Section 7 Termination. This Agreement is effective until terminated as permitted in this Section. Either Party may terminate thisLicense for convenience at any time, but in the event of StorageCraft’s termination for convenience, it shall refund to Licenseethe License Fee paid by Licensee. StorageCraft may terminate this License effective immediately by providing a notice toLicensee of its breach of any provision in Sections 3, 4 and 5 of this Agreement. StorageCraft may terminate this Agreement ontwenty (20) days written notice to Licensee if Licensee breaches any other provision of this Agreement and fails to cure suchbreach within twenty (20) days after receiving StorageCraft's written notice of the breach. Upon termination of this License,Licensee must cease all use of the Software and Documentation and destroy all copies of the Software and Documentation.

Section 8 Limited Warranty, Exclusive Remedy. StorageCraft warrants that, for sixty (60) days after the date Licensee firstpurchased the Software from StorageCraft or its reseller, distributor, or authorized representative, the media on which theSoftware is provided will be free from defects in materials and workmanship under normal use. This warranty gives Licenseespecific rights and Licensee may also have other rights that vary from state to state. In the event of any breach of this limitedwarranty, Licensee’s sole and exclusive remedy against StorageCraft and its agents, employees, representatives, officers,directors, contractors, dealers, and distributors is, at StorageCraft’s option, either: (a) return of the license fee paid for thelicense or (b) replacement of the defective media on which the Software is contained, provided that Licensee notifiesStorageCraft of the nonconformance within the sixty (60) day warranty period. Licensee must return the defective media toStorageCraft or its dealer, distributor, or authorized representative at Licensee’s expense, together with a copy of Licensee’sproof of payment of the License Fee within the sixty (60) day warranty period. This limited warranty is void if the defect is theresult of alteration, abuse, damage, or misapplication. Any replacement media will be warranted for the remainder of theoriginal warranty period, or thirty (30) days, whichever is longer.

Section 9 Disclaimer of Warranties. STORAGECRAFT DOES NOT WARRANT THAT THE SOFTWARE WILL MEET LICENSEE’SREQUIREMENTS OR THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR-FREE. EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT,THE SOFTWARE IS PROVIDED AND LICENSED "AS IS" AND WITH ALL FAULTS. THERE ARE NO WARRANTIES, REPRESENTATIONS, ORCONDITIONS, EXPRESS OR IMPLIED, WRITTEN OR ORAL, ARISING BY STATUTE, OPERATION OF LAW, OR OTHERWISE, REGARDING THESOFTWARE OR ANY OTHER PRODUCT OR SERVICE PROVIDED UNDER OR IN CONNECTION WITH THIS AGREEMENT. TO THE MAXIMUMEXTENT PERMITTED BY APPLICABLE LAW, STORAGECRAFT AND ITS DEALERS, DISTRIBUTORS AND AUTHORIZED REPRESENTATIVESDISCLAIM ALL WARRANTIES AND CONDITIONS, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING WITHOUT LIMITATION ANY (IFANY) WARRANTIES OR CONDITIONS OF OR RELATED TO: MERCHANTABILITY, DURABILITY, FITNESS FOR A PARTICULAR PURPOSE, LACK OFVIRUSES, NONINFRINGEMENT, ACCURACY OR COMPLETENESS OF RESPONSES, RESULTS, WORKMANLIKE EFFORT, AND LACK OFNEGLIGENCE. ALSO, TO THE MAXIMUM EXTENT PERMITTED BY LAW, THERE IS NO WARRANTY, DUTY, OR CONDITION OF TITLE, QUIETENJOYMENT, QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION, OR NONINFRINGEMENT. THE ENTIRE RISK ARISING OUT OF USEOR PERFORMANCE OF THE SOFTWARE REMAINS WITH LICENSEE. IF ANY IMPLIED WARRANTY IS NOT DISCLAIMED UNDER APPLICABLELAW, THEN SUCH IMPLIED WARRANTY IS LIMITED TO THIRTY (30) DAYS FROM THE DATE LICENSEE ACQUIRED THE SOFTWARE FROMSTORAGECRAFT OR ITS DEALERS, DISTRIBUTORS OR AUTHORIZED REPRESENTATIVES AND IS SUBJECT TO THE EXCLUSIVE REMEDYPROVISION SET FORTH IN SECTION 8. SOME JURISDICTIONS DO NOT PERMIT LIMITATIONS ON IMPLIED WARRANTIES, SO THEFOREGOING THIRTY (30) DAY TIME LIMITATION ON IMPLIED WARRANTIES MAY NOT APPLY TO LICENSEE. THE LIMITED WARRANTYHEREIN GIVES LICENSEE SPECIFIC LEGAL RIGHTS AND LICENSEE MAY ALSO HAVE OTHER LEGAL RIGHTS WHICH VARY BY JURISDICTION. WARRANTY INQUIRIES MAY BE SENT TO STORAGECRAFT AT: [email protected] OR TO LEGAL DEPARTMENT, 121 WESTELECTION ROAD, SUITE 110, DRAPER, UTAH 84020, U.S.A. NO AGREEMENTS VARYING OR EXTENDING THE FOREGOING WARRANTIES ORLIMITATIONS WILL BE BINDING ON EITHER PARTY UNLESS IN WRITING AND SIGNED BY AN AUTHORIZED REPRESENTATIVE OF BOTH

Page 64: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide64

© 2006-2010 StorageCraft Technology Corporation

PARTIES.

Section 10 Limitation of Liability. THE LIABILITY TO LICENSEE OF STORAGECRAFT AND THAT OF ITS DEALERS, DISTRIBUTORS ANDAUTHORIZED REPRESENTATIVES FOR ANY LOSSES SHALL BE LIMITED TO DIRECT DAMAGES AND SHALL NOT EXCEED THE AMOUNTLICENSEE ORIGINALLY PAID FOR THE SOFTWARE. IN NO EVENT SHALL STORAGECRAFT OR ITS DEALERS, DISTRIBUTORS OR AUTHORIZEDREPRESENTATIVES BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUTLIMITATION PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF PROFITS, USE, OR DATA; OR BUSINESS INTERRUPTION), EVENIF STORAGECRAFT OR ITS AGENTS OR REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. These limitationsapply even in the event of fault, tort, negligence, misrepresentation, or strict or product liability. In no event shall any personwho has contributed to any part of the Software be liable for any damages whatsoever, however caused, and on any theory ofliability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of theSoftware, even if advised of the possibility of such damage. Some jurisdictions do not allow the exclusion or limitation ofincidental or consequential damages, so the above limitation or exclusion may not apply to Licensee. Licensee releasesStorageCraft from all liability in excess of the liabilities that are limited by this Section, including without limitation any claim forindemnification or contribution whether arising under statutory or common law or otherwise. End users in certain countries(such as Malaysia, New Zealand, and Australia) may be subject to certain consumer protection laws unique to their locale andwhich limit the ability to modify or exclude liability. If Licensee acquired the Software for the purposes of a business, Licenseeconfirms that any applicable consumer protection laws do not apply. If StorageCraft breaches a condition or warranty implied byapplicable law and which cannot lawfully be modified or excluded by this Agreement then, to the extent permitted by law,StorageCraft’s liability to Licensee is limited, at StorageCraft’s option, to: (a) replacement or repair of the Software and/or re-supply of customer support; or (b) the cost of replacing or repairing the Software and/or the cost of re-supplying customersupport.

Section 11 United States Government Restricted Rights. RESTRICTED RIGHTS LEGEND. All StorageCraft products anddocumentation are commercial in nature. The Software and Software Documentation are "Commercial Items", as that term isdefined in 48 C.F.R. § 2.101, consisting of "Commercial Computer Software" and "Commercial Computer SoftwareDocumentation", as such terms are defined in 48 C.F.R. § 252.227-7014(a)(5) and 48 C.F.R. § 252.227-7014(a)(1), and used in 48 C.F.R. § 12.212 and 48 C.F.R. § 227.7202, as applicable. Consistent with 48 C.F.R. §§ 12.212, 252.227-7015, 227.7202 – 227.7202-4,and 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, StorageCraft's Software andDocumentation are licensed to United States Government end users with only those rights as granted to all other end users,according to the terms and conditions contained in this Agreement.

Section 12 Compliance with Export Law. The Software is subject to export controls by the U.S. Department of Commerce (DOC),under the Export Administration Regulations (“EAR”) (see http://www.access.gpo.gov/bis/index.html). Violation of U.S. law isstrictly prohibited. Licensee agrees to comply with the requirements of the EAR and all applicable international, national, state,regional and local laws and regulations, including any applicable import and use restrictions. StorageCraft products arecurrently prohibited for export or re-export to certain countries subject to U.S. trade sanctions. Licensee agrees not to export, orre-export, directly or indirectly, any product to any country outlined in the EAR, nor to any person or entity on the DOC DeniedPersons, Entities and Unverified Lists, the U.S. Department of State’s Debarred List, or on the U.S. Department of Treasury's listsof Specially Designated Nationals, Specially Designated Narcotics Traffickers, or Specially Designated Terrorists. Furthermore,Licensee agrees not to export or re-export StorageCraft products to any military entity not approved under the EAR, or to anyother person or entity for any military purpose, nor will Licensee sell any StorageCraft product for use in connection withchemical, biological, or nuclear weapons or missiles capable of delivering such weapons.

Section 13 Notices. All notices between the Parties shall be in writing and shall be deemed to have been given if personallydelivered or sent by certified or registered mail (return receipt requested) or electronic facsimile to the addresses set forth asfollows, and shall be deemed effective upon receipt:

If to StorageCraft to:

Legal DepartmentStorageCraft Technology Corporation11850 South Election Road, Suite 120Draper, UT 84020

With a Copy to:

StorageCraft Technology CorporationP.O. Box 1149Riverton, UT 84065

If to Licensee to: To the last known address that Licensee provided to StorageCraft

Section 14 Microsoft® Windows® Preinstallation Environment License (“WinPE”). StorageCraft is a licensee under a licensegranted by Microsoft with respect to Microsoft Windows Preinstallation Environment software, including versions 2005 and 2.0. Licensee accepts the following terms and conditions concerning WinPE:

Page 65: Shadow Protect 4.0 Recovery CD User Guide

End User License Agreement 65

© 2006-2010 StorageCraft Technology Corporation

14.1. The Software is limited to use as a boot, diagnostic, disaster recovery, set up, restoration, emergency services,installation, test/or configuration utilities program, and is not for use as a general purpose operating system or as a substitutefor a fully functional version of any operating system products.

14.2. THE SOFTWARE CONTAINS WINPE, WHICH INCLUDES A SECURITY FEATURE THAT WILL CAUSE THE COMPUTER SYSTEM TOREBOOT WITHOUT PRIOR NOTIFICATION TO THE LICENSEE AFTER TWENTY-FOUR (24) HOURS OF CONTINUOUS USE. THIS TIME-OUTFEATURE WILL RESET EACH TIME THE COMPONENT CONTAINING WINPE IS RELAUNCHED.

14.3. Any and all Microsoft and Microsoft affiliate’s liability related to the Software are disclaimed in full and withoutcondition.

14.4. All customer support issues will be handled solely by StorageCraft.

14.5. Licensee is specifically prohibited from reverse engineering, decompiling, or disassembling WinPE, except to theextent expressly permitted by applicable law.

14.6. Licensee is specifically informed that the Software is subject to U.S. export jurisdiction.

14.7. In the event that Licensee’s breach of this Agreement places StorageCraft in breach of its license agreement withMicrosoft, Licensee agrees to indemnify and hold StorageCraft harmless from any such breach, notwithstanding the limitationson liability imposed elsewhere in this Agreement.

Section 15 Passwords. If you invoke any password-protection or encryption functionality of the Software, you understand thatloss of your password may result in the loss of access to your data and/or access to image files created by the Software. Youunderstand and acknowledge that StorageCraft does not keep, maintain, or monitor any password you create, and StorageCrafthas neither liability associated with loss of your password nor obligation to assist in its recovery. By creating a password orencrypting your data, you assume all risk associated with loss of that password.

Section 16 Miscellaneous.

16.1. Activation. The Documentation describes the process of activating the Software, which involves recognition of eachseat of licensed Software by StorageCraft’s activation server. The records of StorageCraft’s activation server are determinativein any question concerning whether a seat of licensed Software has been activated by Licensee.

16.2. Severability. If any provision of this Agreement is unenforceable or invalid pursuant to any applicable law, suchunenforceability or invalidity will not render this Agreement unenforceable or invalid as a whole, and such unenforceable orinvalid provision will be changed and interpreted so as to best accomplish the objectives of such provision within the limits ofapplicable law.

16.3. Entire Agreement. Unless Licensee has entered into a separate, written and signed agreement with StorageCraft orone of its dealers, distributors, resellers, or authorized representatives for the supply of the Software (including withoutlimitation a managed service provider agreement), this Agreement is the complete and exclusive statement of the agreementbetween StorageCraft and Licensee concerning the Software and supersedes all previous communications, representations,understandings and agreements, either oral or written, between the Parties.

16.4. No Waiver or Modification. This Agreement may not be modified except by a written and express addendum issued bya duly authorized representative of StorageCraft. No delay or failure to take action represents a waiver of the rights inherent toor granted to StorageCraft under this Agreement.

16.5. No Third Party Beneficiary. No third party is or shall be a beneficiary of this Agreement and no third party shall havethe right to enforce this Agreement.

16.6. Assignment. This Agreement is personal to Licensee and may not be assigned or assumed (including by operation oflaw) without StorageCraft’s prior written consent. A change of control of Licensee shall constitute an assignment.

16.7. Compliance. For Software licensed for business or commercial purposes, during the period this Agreement remains ineffect, and for three years thereafter, StorageCraft may verify Licensee’s compliance with this Agreement on its premises duringits normal business hours and in a manner that minimizes disruption to Licensee’s business. StorageCraft may use anindependent auditor for this purpose with Licensee’s prior approval, which Licensee will not unreasonably withhold.

16.8. Headings and Captions. The headings and captions used in this Agreement are for convenience or reference only andshall not modify, expand, limit, or describe the scope or intent of this Agreement or in any other way affect the terms orconditions of this Agreement.

16.9. Force Majeure. No delay, failure or default in performance of any obligation of StorageCraft hereunder shall constitutea breach of the Agreement to the extent caused by a force majeure.

Page 66: Shadow Protect 4.0 Recovery CD User Guide

ShadowProtect Recovery Environment User Guide66

© 2006-2010 StorageCraft Technology Corporation

16.10. Applicable Law. This Agreement shall be governed and construed in accordance with the laws of the State of Utah, U.S.A., without application of any choice-of-law or conflict-of-law principles, rules, or provision that would result in the application ofthe laws of any jurisdiction other than Utah. Any action for provisional relief concerning this Agreement or the Parties’relationship hereunder, including but not limited to a temporary restraining order, preliminary injunction, attachment in aid ofarbitration, or order for any interim or conservatory measure, shall be brought in Salt Lake County, State of Utah, U.S.A. TheParties consent and submit to the exclusive jurisdiction of the state or federal courts in Salt Lake County, State of Utah, U.S.A., forpurposes of any action for such provisional remedy or interim or conservatory measure.

16.11. Dispute Resolution. At the election of either Party to this Agreement, any dispute, controversy, or claim arising out of,relating to, or in connection with the following shall be submitted for final resolution by arbitration administered by theAmerican Arbitration Association (the “AAA”): Licensee's purchase or use of the Software; the Software's performance, includingwithout limitation any alleged deficiency or defect; the existence or breach of a contractual, statutory, or common-law warranty;the terms and obligations of this Agreement; the performance, termination, rescission, or alleged breach of this Agreement; andthe Agreement's validity or enforceability, including without limitation any claim that all or any part of this Agreement is void,voidable, unconscionable, or unenforceable (collectively, "Arbitratable Dispute"). Notwithstanding the foregoing, any claim forinfringement or violation of copyright, trademark, or other intellectual property rights is not an Arbitratable Dispute, but shall bebrought before a court of competent jurisdiction in Salt Lake County, State of Utah, U.S.A. In the event of an Arbitratable Disputethe election to arbitrate must be made in writing by a Party on or before the last day to answer and/or respond to a summonsand/or complaint brought by the other Party. If Licensee is a U.S. resident or maintains a place of business in the U.S., thearbitration shall be conducted in accordance with the AAA Commercial Arbitration Rules in effect at the time of the arbitration,excepting any rules pertaining to class arbitrations. If Licensee is not a U.S. resident or does not maintain a place of business inthe U.S., the arbitration shall be conducted in accordance with the AAA International Arbitration Rules in effect at the time of thearbitration, excepting any rules pertaining to class arbitrations. (The Commercial Arbitration Rules and InternationalArbitration Rules are collectively referred to as the "Rules".) The Parties intend that any arbitration between them shall involveonly the dispute between the Parties and no other, even identical, dispute between a Party and a third party. Class arbitrationshall not be permitted.

If the Arbitratable Dispute involves a claim for damages of $20,000 U.S.D. or less, the arbitration shall be conducted by a singlearbitrator selected in accordance with the Rules. All other Arbitratable Disputes shall be conducted by three arbitratorsselected as follows: Each Party shall select one arbitrator and deliver written notice of such selection to the other Party and tothe AAA within twenty (20) calendar days after the deadline for serving a statement of defense. In the event a Party fails to selectan arbitrator or deliver notice of such selection to the other Party and to the AAA within such time period, upon request of eitherParty, such arbitrator shall instead be appointed by the AAA (as provided in the Rules) within fifteen (15) calendar days ofreceiving such request. The two arbitrators so appointed shall nominate a third arbitrator, notifying the Parties and the AAA ofthe nomination within fifteen (15) calendar days of their appointment. If the first two appointed arbitrators fail to nominate athird arbitrator within that time period, then, upon request of either Party, the third arbitrator shall be appointed by the AAA (asprovided in the Rules). The third arbitrator shall serve as chairman of the arbitral tribunal. In the event that an arbitrator is nolonger able or willing to serve as arbitrator, the method of selection used to select such arbitrator shall be used to select thereplacement arbitrator. Any arbitrator must be fluent in the English language and a licensed attorney with experience insoftware licensing transactions. In the event of an arbitration conducted under the International Arbitration Rules, thearbitrator(s) must also have experience in international software licensing transactions.

The place of arbitration shall be Salt Lake County, State of Utah, U.S.A., unless the Parties agree otherwise in writing. Thearbitration shall be conducted in the English language. Any award rendered by the arbitrators must be a reasoned award that:fully sets forth findings of fact from the evidence presented; applies the findings of fact to the law of the case; fully sets forthconclusions of law based upon the Parties' respective legal theories; explains which legal theories were followed and why; and,if damages, costs, and/or fees are awarded, specifies the calculations of the types of damages, costs, and/or fees awarded as toeach Party. Any award is final and binding on the Parties and may be challenged in a court of competent jurisdiction only uponthose grounds allowed under the Utah Uniform Arbitration Act, Utah Code Ann. section 78B-11-101 et seq. In the absence ofchallenge, judgment on the award may be entered in any court of competent jurisdiction. Without limiting the authorityconferred on the arbitral tribunal by this Agreement and the Rules, the tribunal shall have the authority to exercise equitableprinciples and award equitable remedies. By agreeing to Arbitration, the Parties do not intend to deprive any court ofcompetent jurisdiction in Salt Lake County, State of Utah, U.S.A., of its ability to issue any form of provisional remedy, includingbut not limited to a temporary restraining order, preliminary injunction, attachment in aid of arbitration, or order for any interimor conservatory measure. A request for such provisional remedy or interim or conservatory measure by a Party to a court shallnot be deemed a waiver of an agreement to arbitrate.

16.12. CDDL. The Software’s executable, VBoxHDDXSP.dll, includes unmodified files containing VirtualBox Open SourceEdition source code, which is licensed under the Common Development and Distribution License Version 1.0 (“CDDL”). StorageCraft made no “modifications” to the CDDL-licensed files and StorageCraft is not a “contributor” as those terms aredefined in the CDDL. Irrespective of the CDDL, the Software is licensed and distributed solely in accordance with the terms andconditions of this Agreement and the CDDL gives Licensee no right, title or interest in or to the Software. The CDDL and allreferenced CDDL-licensed source code are available at http://download.virtualbox.org/virtualbox/3.1.2/VirtualBox-3.1.2-OSE.tar.bz2; http://download.virtualbox.org/ virtualbox/3.1.8/VirtualBox-3.1.8-OSE.tar.bz2; and http://download.virtualbox.org/virtualbox/3.2.0_BETA3 /VirtualBox-3.2.0_BETA3-OSE.tar.bz2..

Page 67: Shadow Protect 4.0 Recovery CD User Guide

End User License Agreement 67

© 2006-2010 StorageCraft Technology Corporation

16.13. Customer Contact. If Licensee has any questions concerning this Agreement, Licensee may contact StorageCraft asfollows: website - www.storagecraft.com; telephone – 801-545-4700; fax - 801-545-4705; mail – StorageCraft TechnologyCorporation, 11850 S. Election Road, Suite 120, Draper, Utah 84020, U.S.A.

Vers. May 18, 2010

© Copyright 2006-2010 StorageCraft Technology Corporation. All Rights Reserved. This Software and Documentation are thecopyrighted property of StorageCraft Technology Corporation and all rights in and to ShadowProtect Server, ShadowProtect SmallBusiness Server, ShadowProtect Desktop, VirtualBoot, ImageManager, ImageManager Enterprise and ShadowProtectKeyFileMaker are exclusively reserved to and owned by StorageCraft Technology Corporation. StorageCraft, StorageCraftRecovery Environment, ShadowProtect Server, ShadowProtect Small Business Server, ShadowProtect Desktop, VirtualBoot,HeadstartRestore, ImageManager, ImageManager Enterprise, KeyFileMaker, and ExactState and their respective logos andtrademarks are owned exclusively by StorageCraft Technology Corporation in the United States and elsewhere. Microsoft andWindows are registered trademarks of Microsoft Corporation. Windows Preinstallation Environment and WinPE are or may betrademarks of Microsoft Corporation. VMware is or may be a registered trademark of VMware Inc. The Software includes theNetwork Configuration Utility based on a derivative created by StorageCraft under a license granted by Pierre Mounir (a/k/a TheTruth), a proprietary software product that is or may be copyrighted by that licensor © 2003-2010 with all rights reserved. Allother brands and product names referenced in this Agreement are or may be the trademarks or registered trademarks of theirrespective owners.