Solved

Veritas Backup Exec

Posted on 2004-10-12
2
449 Views
Last Modified: 2013-12-01
Hi there, i am using veritas 9 to backup my exchange 5.5 wich backs up no problem.

I managed to delete someones mailbox and i recreated it and now i want to restore the mails, but it runs for 30min and comes up with this error.

Job ended: Tuesday, October 12, 2004 at 7:04:46 PM
Completed status: Failed
Final error code: a0008488 HEX
Final error description: Access is denied.

Final error category: Security Errors


Please can someone help me asap, as this is quite urgent.

Thanks in advance
0
Comment
Question by:Robertwedd
2 Comments
 
LVL 3

Expert Comment

by:TRobertson
ID: 12296983
At first glance it looks like a security privilege problem.  Are you redirecting the restore to a different location.  Also what privileges does the user have that you are using to run the restore?  I would try to restore the mailbox to somewhere on the backup exec. server's local drive (ie. desktop) and see how that runs.
0
 
LVL 3

Accepted Solution

by:
Arl earned 500 total points
ID: 12297134
Hi Robertwedd,

I think you can spare some points, as this kind of question has been already plenty asked..
take a look at this one :
http://www.experts-exchange.com/Storage/Q_20985983.html

This one has has 3 references :
http://seer.support.veritas.com/docs/266178.htm
http://seer.support.veritas.com/docs/256057.htm
http://seer.support.veritas.com/docs/261744.htm

Hope that can help.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question