Top 8 Reasons for Missed Backups when using Ahsay Backup Software

Top 8 Reasons for Missed Backups when using Ahsay Backup Software

Have you ever wondered the reasons for those missed backups by your backup users? The following are top 8 reasons for missed scheduled backups, and their resolutions.

Reason #1: The client machine was shutdown or in hibernation mode at the start time of the scheduled backup.
Resolution: Make sure the machine is powered on or not hibernated at the scheduled backup start time.

Reason #2: The client machine is not connected to the network, thus no access to the backup server.
Resolution: Get the machine connected to the network.

Reason #3: For machine that connects to the internet via a proxy server, there are any bandwidth or access restriction on the proxy server which stops the client agent’s connection to the backup server.
Resolution: Edit the bandwidth or access restriction on the proxy server to allow AhsayOBM / AhsayACB client agent to connect to the AhsayCBS server during the backup window.

Reason #4: Firewall setting has been changed on the client machine or network.
Resolution: Edit the firewall setting to allow AhsayOBM / AhsayACB client agent to connect to the AhsayCBS server via HTTP and HTTPS.

Reason #5: The scheduler service for the backup agent is not running.
Resolution: Inform the user to try restarting the AhsayOBM / AhsayACB services and see if the next scheduled backup can be resumed.

Reason #6: The login password for the backup agent has been updated recently either through AhsayCBS user web console, or through the client agent on another machine using the same user account.
Resolution: Inform the user to login to the backup agent on the affected client machine to refresh the settings.

Reason #7: The Windows login password has been recently updated.
Resolution: The user needs to update password for this backup set in “User Authentication for Windows” through the client agent.

Reason #8: AhsayOBM / AhsayACB client agent was accidently uninstalled from the client machine.
Resolution: Reinstall the client agent and then login to the client agent with the original user account.

If none of the above resolutions solves your missed backup problem, contact our Customer Service for troubleshooting.

Renew your Ahsay Self-Signed SSL Certificate

For partners using the Ahsay self-signed SSL certificate, please be reminded to get it renewed before its expiry date.

Current expiration: Sep 24, 2017 (v7) or May 13, 2018 (v6) (Hong Kong time)
New expiration date after renewal: Mar 21, 2020 (Hong Kong time)

Please refer to the following KB Articles for details:

Ahsay Backup Software v7.13 Introduces Granular Restore

v71300-rss

Ahsay Backup Software Version 7.13 is released now! The Granular Restore feature enables businesses to minimize recovery time through quick access and restore of individual folders and files within a VM, without the need to restore the whole VM first.

Download Granular Restore Factsheet at: https://www.ahsay.com/jsp/en/downloads/ahsay_download_factsheet_granular-restore.jsp

Download FREE trial now at: www.ahsay.com/freetrial

For details of this version, read the Release Notes at: http://ahsay-dn.ahsay.com/document/v7/71300/customer/cbs-release-notes.htm

5 Q&A about Granular Recovery Technology

5-Q-and-A-about-Granular-Recovery-Technology

 

With Granular Recovery Technology set to be introduced in the coming Ahsay Backup Software release, let’s take a look at the 5 common Q&A about this latest feature.

1. What is granular recovery?

Granular recovery is an advanced technology that enables businesses to perform both file and image-based level recovery from a single pass backup operation. Many backup solutions require multiple backup sets to recover both individual files or folders and an entire virtual machine image. Granular recovery provides the ability to recover specific files in seconds from a single backup, without the need to restore an entire VM or perform a secondary redundant backup. This dramatically reduces the recovery time objective (RTO) and the footprint of backup on storage resources.

2. What applications does Ahsay granular recovery support?

Ahsay granular recovery can be used with three types of backup sets, namely file (called Open Direct), Microsoft Hyper-V, and VMware ESXi/vCenter.

3. What is the difference between traditional recovery and granular recovery?

Traditional backup and recovery procedures have been arduous and time-consuming whereas granular recovery offers swift recovery and cost-effectiveness. Take VMware as an example:

If your customers wish to restore individual files from a guest VM, the old school method requires two separate backup sets, one for the VM image and the other for the individual files. This also means they need two client access licenses. As the entire VM has to be completely restored before you can access any individual file, the restore time could be long if the VM size is large.

As opposed to the traditional method, with Ahsay granular recovery technology your customers only need one backup set for the VMware guest VM and just one client access license to achieve the same restore purpose. The backup storage required for one backup set is less and they can also save much time in backup and recovery to restore their desired files.

4. Does granular recovery address disaster recovery issues?

Granular recovery technology greatly eases disaster recovery through fast recovery of mission-critical production data. While full backup image restore is always an option, what if your customer is facing serious downtime only because of the significant time it takes for VM restore? Granular recovery provides another option to recover the data promptly.

With Ahsay granular recovery, you can restore only the exact essential files your customers require at the moment so that their urgent business operations can resume right away. Meanwhile, IT admin can work on restoring the rest of the data that carry a lower significance. As you can see, granular recovery is ideal for products like VMware and Hyper-V, which compose an advanced architecture and would take much time to recover from a base image.

5. Should MSPs care about this technology?

As an MSP, you should. Adding a granular recovery solution will be profitable to both you and your customers if you are offering or planning to offer data backup and recovery services. You will be able to provide value-added solutions and most up-to-date services to your customers; and it will come very handy when they need quick access and recovery of specific items from a large backup in different scenarios. If you could show your potential and existing customers with a few use cases on how granular recovery could reduce downtime, save resources and raise productivity, there is no reason why they wouldn’t want to join hands with you.

Stay tuned for official release on our website for more details. If you have any questions, just feel free to drop us a message.

5 Key Benefits of Agentless Backup

5-Key-Benefits-of-Agentless-BackupWhat Is An Agentless Backup Solution?

As the term suggests, agentless backup solution is implemented without the need to install or deploy a backup agent onto the physical or virtual server which the MSP or system administrator wants to protect. The backup and restore operations are centralized on a separate platform usually hosted and operated by the MSP, agentless backup solutions are usually centrally managed and administered.

What Are the Key Benefits Of An Agentless Backup Model?

1. Less time consuming

Agentless backup solutions are administered centrally, i.e. account, backup set management, backup, and restore, so a lot of time is saved on agent installation, setup, and upgrades either remotely or through on-site visits.

2. Easy support

As there is no backup agent running in the customer machine, agentless backup requires less time spent on agent support and management, i.e. handling issues related to the setup/backup/restore caused by the customer setup, environment, or hardware problems.

3. Significant savings

Customers do not need to provide a physical or virtual server(s) for backup/restore. With server agents, the operating and maintenance expenses for an enterprise environment can be huge. An agentless solution helps organizations eliminate those costs associated with agent-based backup.

4. Resource conservation

Backup agent will utilize the resources (CPU, memory, and disk I/O) of the local machine for backup and restore, which could potentially affect the performance of the machine. Whereas for an agentless backup solution, the “heavy lifting” is done by the MSP’s backup server and infrastructure.

5. Compliance

Some customers may not allow third party applications to be installed in their environment or servers, agentless backup solutions can fulfill this security and compliance requirement.

If you are interested in offering agentless backup solutions to your clients, just contact our pre-sales.

7 Facts about WannaCry ransomware

7-Facts-About-WannaCry-Ransomware

On Friday, 12 May 2017, a ransomware attack called WannaCry ran riot. Within a day this massive global cyber extortion attack crippled more than 230,000 computers in over 150 countries and left others scrambling to protect themselves. It hit Britain’s National Health Service, Spain’s Telefónica, FedEx, as well as many other countries and companies worldwide, leading to PCs and data being locked up and held for ransom.

What is it, why is this happening, and how to defend against WannaCry and other ransomware? Here are 7 facts organizations must be aware of.

1. What is WannaCry and how does it work?

WannaCry is a piece of ransomware first spotted by security researchers MalwareHunterTeam, at 9.45am on 12 May. It is also being called WanaCrypt0r 2.0, Wanna Decryptor 2.0, WCry 2, WannaCry 2 and Wanna Decryptor 2.

This ransomware exploits a known vulnerability in Microsoft Windows operating system and it is believed to be using tools developed by the United States National Security Agency (NSA) that was leaked by an anonymous group calling itself “Shadow Brokers” in April.

The infection initially takes place through an exposed Server Message Block (SMB) port of a computer, then it uses the vulnerability to spread out to random computers on the Internet and laterally to computers on the same network. Once WannaCry takes hold of the computer, it then encrypts files, locks the user out of the computer, and requests a ransom.

2. Who was behind the attack?

Attribution is tricky in the world of cyberwarfare. The Shadow Brokers, who said in April it had stolen a “cyber weapon” from the NSA, is being partly blamed for the attack. The hacking tool, called “Eternal Blue”, gives unprecedented access to all computers using Microsoft Windows. It had been originally developed by the NSA to gain access to computers used by terrorists and enemy states. It is reported that a separate crime group might have spotted this opportunity and updated the tool to attack the computers around the world.

Some experts examining the code have found technical clues they said could link North Korea with the attack. Symantec and Kaspersky Lab said on Monday some code in an earlier version of the WannaCry software had also appeared in programs used by the Lazarus Group, which researchers from many companies have identified as a North Korea-run hacking operation.

3. How much money are they asking for and has anyone paid?

Wana_Decrypt0r_screenshot

A key feature of successful ransomware is that the ransom is usually a modest sum – far less than the cost of paying a team of security experts to try to defeat the encryption attack. WannaCry is asking for $300-$600 worth of the cryptocurrency Bitcoin to unlock the contents of the computers. If victims did not pay up quickly, there is a threat that higher payments would be demanded.

Despite the widespread infection, only a small number of payments have been made. CNBC reports that payments have added up to just $50,000 worth of bitcoin payments, but the financial damage to victims around the world will be several orders of magnitude higher by the time all is said and done. Security experts continue to urge victims to not pay the ransom fee.

4. Will paying the ransom really unlock the files?

Sometimes paying the ransom will work, but sometimes it won’t. Security analysts say that over 200 of the WannaCry victims who promptly paid the ransom have gotten their data back. However, cybersecurity experts advise against paying the ransom, noting that historically only about two-thirds of compliant ransomware victims get their data back after meeting hacker demands. Microsoft also stated in the FAQ of ransomware that “there is no guarantee that handing over the ransom will give you access to your files again. Paying the ransom could also make you a target for more malware.”

5. What has Microsoft done to tackle it?

Microsoft stated that it had already released a security update to patch the vulnerability exploited by the ransomware. On 12 May, a Microsoft spokesman said its engineers had provided additional detection and protection services against the WannaCry ransomware and that it was working with customers to provide additional assistance. The spokesman reiterated that customers who have Windows Updates enabled and use the company’s free antivirus software are protected.

6. Will it continue to spread?

A British cybersecurity researcher has discovered a “kill switch” that can temporarily prevent the spread of the WannaCry ransomware. The researcher, tweeting as @MalwareTechBlog, said the discovery was accidental, but that registering a domain name used by the malware stops it from spreading.

However, it did not take long for new versions of WannaCry to appear after the kill switch code was removed.

7. How organizations can protect themselves?

Once ransomware has encrypted your files there’s not a lot you can do. The first line of defense against WannaCry is installing the latest Windows security updates. Resolving the flaw that allows this virus to propagate is vital.

Although WannaCry does not appear to have relied on phishing emails to spread, most ransomware viruses do, so another crucial tip is to avoid opening suspicious attachments or clicking mystery links in emails.

As ransomware encrypts data, the best defense against ransomware attacks is to maintain good backups of valuable data. In case a ransomware strikes, the system can be cleaned off, and a safe backup copy of the data can be restored. Backups of important data should be kept safe from contamination, so the best protection strategy is to store the backup data in multiple remote and cloud destinations.

Looking ahead, there will only be more rampant ransomware threatening organizations and individuals worldwide. It is now imperative for everyone to start backing up their computers in order to survive from the next waves of ransomware attacks. Just drop us a message if you would like to know more about offering backup solutions to your customers.

Sources: The Guardian, The San Diego Union Tribune, The Telegraph