Mac User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Mac User's Guide Retrospect® 15.0 Mac User's Guide COPYRIGHT © 2018 RETROSPECT, INC. Protecting data since 1984. Copyright © 2018 Retrospect, Inc. All rights reserved. Retrospect 15.0 Users Guide, first edition. Use of this product (the “Software”) is subject to acceptance of the license agreement presented in the installer. You may not install, copy or otherwise use the Software except as expressly provided in that license agreement. Retrospect is a registered trademark of Retrospect, Inc. in the United States and/or other jurisdictions. All other trademarks are the properties of their respective owners. ii MAC USER'S GUIDE Contents What's New...................................................................................................................................6 ▪ Email Protection.......................................................................................................................6 ▪ BackupBot...............................................................................................................................6 ▪ Remote Backup .......................................................................................................................7 ▪ Data Hooks ..............................................................................................................................7 ▪ Web Console ...........................................................................................................................7 ▪ Management Console Replication...........................................................................................8 ▪ Management Console Redirection ..........................................................................................8 ▪ Linux Virtual Host Server Support ...........................................................................................8 ▪ Bug Fixes.................................................................................................................................8 Introducing Retrospect .................................................................................................................9 ▪ Overview of Retrospect ...........................................................................................................9 ▪ Which Edition Is Right for You?.............................................................................................10 ▪ Retrospect Add-On Products................................................................................................10 ▪ Requirements.........................................................................................................................10 ▪ Installing Retrospect..............................................................................................................12 ▪ Installing the Retrospect Engine............................................................................................12 ▪ Installing the Retrospect Console..........................................................................................12 ▪ Installing Retrospect Client software on a machine running Mac OS X................................13 ▪ Installing Retrospect Client software on a machine running Microsoft Windows .................13 ▪ Installing Retrospect Client software on a machine running Linux .......................................13 ▪ Upgrading from Previous Versions of Retrospect .................................................................14 ▪ Upgrading from Retrospect 6.1.............................................................................................14 ▪ Stopping and Starting the Retrospect Engine.......................................................................15 ▪ Starting and Stopping the Retrospect Console.....................................................................15 ▪ Overview of the Retrospect Console.....................................................................................17 ▪ Toolbar...................................................................................................................................18 ▪ List and Detail Views..............................................................................................................19 ▪ List View Toolbar ...................................................................................................................19 ▪ Scope Bar..............................................................................................................................19 ▪ Bottom Bar ............................................................................................................................19 ▪ High-level Dashboard ............................................................................................................25 Fundamentals..............................................................................................................................27 ▪ How Retrospect Works..........................................................................................................27 ▪ Media Sets.............................................................................................................................29 ▪ Media Actions........................................................................................................................30 ▪ Catalog Files ..........................................................................................................................31 ▪ Retrospect Clients .................................................................................................................31 ▪ Proactive Backups.................................................................................................................31 Hardware.....................................................................................................................................32 ▪ Sources and Storage Devices ...............................................................................................32 ▪ Sources..................................................................................................................................32 1 ▪ Using the Sources toolbar .....................................................................................................33 ▪ Using the Scope bar..............................................................................................................34 ▪ Using the Detail area .............................................................................................................35 ▪ Customizing the Sources List................................................................................................38 ▪ Storage Devices.....................................................................................................................38 ▪ Hardware Overview ...............................................................................................................41 ▪ Working with Retrospect and Your Hardware.......................................................................42 ▪ Finder-Mountable Drives .......................................................................................................42 ▪ Tape Drives............................................................................................................................44 ▪ Tape Libraries ........................................................................................................................51 ▪ Media Longevity and Storage................................................................................................54 ▪ How Retrospect Works with Multiple Backup Devices .........................................................54 ▪ Communication errors with VXA-320 tape drives ...................................................................0 Working with Clients, Servers, and Network Shares ..................................................................56 ▪ Network Backup Overview ....................................................................................................56 ▪ Client Licenses ......................................................................................................................57 ▪ Working with Retrospect Clients ...........................................................................................57 ▪ Client Security........................................................................................................................59 ▪ Network Interfaces.................................................................................................................60 ▪ Adding Retrospect Clients to Sources ..................................................................................60 ▪ Testing Client Connectivity....................................................................................................62 ▪ Removing a Client..................................................................................................................63 ▪ Getting Information About a Client ........................................................................................64 ▪ Updating Clients ....................................................................................................................66 ▪ Uninstalling a Client and Its Software....................................................................................66 ▪ Working with Servers and Network Attached Storage ..........................................................67 ▪ Adding a Server or NAS as a Source ....................................................................................67
Recommended publications
  • Take Control of Backing up Your Mac
    EBOOK EXTRAS: v2.0 Downloads, Updates, Feedback TAKE CONTROL OF BACKING UP YOUR MAC by JOE KISSELL $20 2ND EDITION Table of Contents Read Me First ................................................................. 5 Updates and More .......................................................... 5 Basics ......................................................................... 6 What’s New in the Second Edition ..................................... 8 Introduction ................................................................. 11 Mac Backups Quick Start ............................................... 13 Plan a Backup Strategy ................................................. 15 Understand Joe’s Basic Backup Strategy ........................... 15 Why Create Versioned Backups? ...................................... 17 Why Create Bootable Duplicates? .................................... 18 Why Use an External Hard Drive? .................................... 22 Why Use Multiple Partitions? ........................................... 24 Why Automate Backups? ............................................... 24 Why Keep Multiple Backups? .......................................... 26 Why Store Backups Offsite? ............................................ 27 Reassess Your Backup Strategy ..................................... 29 What’s New in the World of Mac Backups ........................... 29 Factors to Reevaluate .................................................... 36 Choose a Versioned Backup Program ............................. 40 Decide If
    [Show full text]
  • Macquisition Quickstart Guide-V2020r1
    QUICK START GUIDE VERSION 2020 R1 INTRODUCTION MacQuisition 2020 R1 is officially supported on macOS 10.11 (El Capitan), 10.12 (Sierra), 10.13 (High Sierra), 10.14 (Mojave), and 10.15 (Catalina) systems, although 10.10 (Yosemite) and lower may potentially work. MacQuisition also boots into a forensically sound environment directly from the dongle. This QuickStart guide provides a brief explanation to get the examiner started. See the MacQuisition User Guide located on the 'Application' partition for more detailed information. Welcome to the MacQuisition Quick Start Guide MacQuisition™ is designed for triaging and imaging Mac computers. MacQuisition can be used to image Mac computers, including those with T2 chips, and also to collect data from live running Mac computers. This Quick Start guide will walk through live data collection with MacQuisition, booting a target system with MacQuisition for imaging, and running MacQuisition from an analysis Mac to acquire the target system via Target Disk Mode. Other factors that have to be considered when determining your approach, such as firmware passwords, FileVault2, T2 security chips, the file system used, and fusion drives will also be explored. The MacQuisition Device MacQuisition devices are setup up with multiple boot partitions, an application partition, a preferences partition, a license partition, and a data partition. The size of the data partition varies, depending on which MacQuisition device is purchased. Currently, there are two device sizes to choose, 1 TB or 120 GB. The devices connect via USB or USB-C cables shipped with the device. 300 Piercy Road • San Jose, CA 95138 • 408.844.8890 • https://www.blackbagtech.com Page 1 In Finder, the following partitions will appear when MacQuisition is connected: The Application partition contains the MacQuisition application, used to collect data from live systems and when running MacQuisition from an analysis Mac to acquire a target system.
    [Show full text]
  • Security on the Mac Or How Paranoid Are You?
    Security on the Mac or How Paranoid are You? Bob van Lier Wednesday, August 11, 2010 BackUp, BackUp, BackUp … First and foremost defense when something goes wrong Macs are reliable and well-built, but internal HDDs are commodity products HDDs will FAIL! It is only a matter of when? The most complete and practical solution is to use an external HDD • Multiple DVDs or CDs can be used for select folder, but no longer practical for today’s HDDs Time Machine is included with OS10.5 and 10.6 Carbon Copy Cloner SuperDuper! Many others Wednesday, August 11, 2010 BackUp Strategy While Time Machine works well and is a painless option consider cases of fire or theft Multiple copies using different software/process • Offsite backup ✦ Keep a copy at a friend's house, safety deposit box, or hidden fire-proof box ✦ Online storage - Mozy ($55/year) - Dropbox ($600/year for 100Gb) - Carbonite ($55/year unlimited) - CrashPlan (Free or $55/year to use their servers) Wednesday, August 11, 2010 OSX Security Settings Use of “standard account” rather than admin account for routine usage Deselect automatic login Keep software up to date so latest security patches are applied Set Screensaver password Parental Controls in OS X Use Private Browsing when exploring suspect web sites FileVault • Essentially creates an encrypted sparse image bundle of your user folder Wednesday, August 11, 2010 Hazards of Web Browsing 1. IP address which leads to your ISP's location can be cross correlated with other browsing history. IP address and logged in user account are all tied together 1.1.
    [Show full text]
  • Sparse Image - Wikipedia, the Free Encyclopedia Log in / Create Account Article Discussion Edit This Page History Sparse Image from Wikipedia, the Free Encyclopedia
    Sparse image - Wikipedia, the free encyclopedia Log in / create account article discussion edit this page history Sparse image From Wikipedia, the free encyclopedia A Sparse image is a type of disk image file that can be created under Mac OS X using Disk Utility. Encrypted sparse image files are used to secure a user's home directory by Mac OS X's FileVault feature. navigation Unlike a full image file (.dmg), which takes up as much actual space as the real disk it represents Main page Contents (regardless of the amount of unused space), a sparse image file (.sparseimage) takes up only as much Featured content actual disk space as the data contained within. Current events This can be advantageous when backing up data. For example, assume a user would like to make a Random article backup of a hard disk volume named "INFO" that is 5GB in size, yet only contains 2.5GB of actual search data. While a single layer DVD-R (with around 4.7GB capacity) would be too small to store a full-sized "INFO.dmg" image file, an "INFO.sparseimage" image file will fit. This is because the unused 2.5GB from the original volume is not actually allocated within the sparse image file. The "INFO.sparseimage" file will occupy only 2.5GB. interaction Note that if the 2.5GB "INFO.sparseimage" backup on the DVD is subsequently opened and mounted About Wikipedia as a "clone" of the source volume, the Finder will report the clone as having the original 5GB capacity, Community portal with 2.5GB available, but the virtual disk will be "read-only", because the source image file resides on Recent changes read-only media.
    [Show full text]
  • Xsan Security
    559 Appendix A Xsan Security Xsan is Apple’s implementation of a Clustered File System. This means that the file system can be accessed by multiple machines concurrently. Fibre Channel is an extension of the SCSI protocol and can be accessed through fiber optic cabling. Using Xsan, multiple Macs can simultaneously access shared storage provided over a Fibre Channel network. This allows multiple users to access data striped across a large number of physical drives (let’s just say six Promise VTrak RAIDs’ worth) as though they are one volume. Each client can access data at speeds of up to 4Gbps. Xsan is commonly used high-definition video and multiuser high-bandwidth creative environments, and it is also found in web and file-sharing farms. Xsan is based on the StorNext File System, made by Quantum. Apple and Quantum both claim interoperability between StorNext and Xsan, which means that by combining the two, it’s possibly for Macs, Windows, and many Unix variants (including Solaris, AIX, Linux and IRIX) can share communicate and share storage in a fast Fibre Channel environment. When looking to secure Xsan, you may find that there are specific features of StorNext that you want to use. Because Xsan is based on StorNext, many of the features of StorNext are built into the Xsan but might not be available through Xsan Admin. To begin unlocking some of the hidden features of Xsan, you will need to dip into the command line. Xsan stores most of its data in /Library/Filesystems/Xsan. Configuration files are stored in the Config directory, and binaries are in the bin directory.
    [Show full text]
  • 2020-06-02-RECON IMAGER Manual
    M A N U A L 1.Introduction 4 2. Version Comparisons 4 3. Supported Hardware 6 3.1 MODE A - SUPPORTED HARDWARE (Version 4.0.0) 6 3.2 MODE B - BOOT SUPPORTED HARDWARE (Version 5.0.0) 6 3.3 MODE C - SUPPORTED HARDWARE (Version 5.0.2 A1) 7 4. Before You Start 7 4.1 How Will You Process The Image? 7 4.2 What To Image? 8 4.3 What Image Format Should I Use? 8 5. Key Concepts To Understand 9 5.1 Apple File System (APFS) 9 5.2 Apple Extended Attributes 9 5.3 Fusion Drives 10 5.4 Core Storage 10 5.5 FileVault 11 5.6 T2 Security Chipset 11 5.7 Local Time Machine Snapshots (APFS) 12 5.8 Apple Boot Camp 12 6. Booting RECON IMAGER 13 6.1 Instant On - Portable Macs 13 6.2 Firmware Password 13 6.3 Connecting RECON IMAGER 14 6.4 Connecting Your Destination Drive 15 6.5 Starting RECON IMAGER 15 7. Using RECON Imager 17 7.1 Disk Manager 18 7.1.1 Refresh To Detect Changes 19 RECON IMAGER Copyright © 2010-2020 SUMURI LLC 1 of 58 7.1.2 Formatting a Collection Drive 20 7.1.3 Decrypting A FileVault Volume 22 7.1.4 System Date and Time 24 7.2 Disk Imager 24 7.2.1 Source 25 7.2.2 Image Type 25 7.2.3 Compression Options 27 7.2.4 Processing Local Time Machine Snapshots (APFS) 27 7.2.5 Destination 28 7.2.6 Image Name 28 7.2.7 Segment Size 29 7.2.8 Evidence Descriptor Fields 29 7.2.9 Hashing and Verification 30 8.
    [Show full text]
  • Read Doc < Mac OS X
    YMQ6DEXSN8LX # PDF » Mac OS X Mac OS X Filesize: 2.61 MB Reviews These sorts of ebook is the greatest ebook readily available. Sure, it can be engage in, nonetheless an interesting and amazing literature. I realized this pdf from my dad and i encouraged this pdf to learn. (Nicolette Hodkiewicz) DISCLAIMER | DMCA HWN1KMHNBE1S « Doc » Mac OS X MAC OS X Reference Series Books LLC Okt 2012, 2012. Taschenbuch. Book Condition: Neu. 247x190x10 mm. Neuware - Source: Wikipedia. Pages: 101. Chapters: Darwin, Mac OS X Server, History of Mac OS X, Safari, Classic Environment, Mac OS X Snow Leopard, Mac OS X Leopard, Mac OS X Tiger, OSx86, Internet Explorer 5, Apple Intel transition, Mac OS X Lion, HFS Plus, Pmset, Bonjour, Max, Launchd, BootX, Mac OS X v10.2, Mac OS X v10.0, IChat, Mac App Store, XNU, Apple Open Directory, Rhapsody, Spinning wait cursor, Uniform Type Identifier, Property list, FileVault, Rosetta, Mac OS X v10.1, Apple Disk Image, Target Disk Mode, Mac OS X Panther, Mail, Open Firmware, Application bundle, Keychain, Universal binary, System Preferences, Spaces, Soviet Unterzoegersdorf, Architecture of Mac OS X, Dictionary, New World ROM, Apple Soware Update, OoVoo, Photo Booth, Disk Utility, Apple Symbols, Mac OS X Public Beta, Mac OS X Server 1.0, Quartz, Speakable items, Quick Look, Ultracopier, Sparse image, Crash Reporter, .DS Store, NetInfo, Talking Moose, Apple Icon Image format, Grab, Migration Assistant, List of Mac OS X components, Automator, Repair permissions, DVD Player, List of Mac OS X technologies, Hidden file and hidden
    [Show full text]