Symantec System Recovery Server virtual Edition

Posted on 2011-05-10
Last Modified: 2012-05-11
I have several servers that are protected with Symantec System Recovery Server Edition v8.5/2010.

I've just installed a MS 2008 R2 server running hyper-v and virtualised 2 servers on it, a 2003 and a 2008 server.

What's the best way to protect this machine? Should I load BESR on both virtual guest servers, or is it better just to install Symantec System Recovery Server virtual Edition on the host?

What are the real differences the virtual edition gives?
Question by:eymsIT
    LVL 8

    Expert Comment

    Actually Symantec support has been helpful for questions like this.  I remember asking them about the best way to setup Disk-to-disk-to-tape backups, how to setup dedicated disk targets per job, how to duplicate jobs to tape, etc.

    As long as your product is still covered under support they should be able to advise you.

    They also can share your desktop and set some things up directly, if you need them to.

    Some of Symantec's contact numbers
    800-721-3934      Customer Care
    888-727-8671      Get an IBR with ONLY current licenses.
    800-745-6054      Sales opt 3      
    800-342-0652      Technical Support
    800-634-4747,1,1      Technical Support
    LVL 42

    Expert Comment

    It depends.  Since BESR only does a "copy" it will not perform exchange or sql log flushing.  What BESR does give you is the capability to restore to physical hardware if your virtual hardware become unavailable or you would like to do a V2P

    Author Comment

    ok thanks for those comments.

    The question is though, is it better to have the software running on the guest (ie besr) or on the host (besr virtual edition)?

    Unfortunately I'm just out of support!
    LVL 42

    Accepted Solution

    One ach VM.  Running it on the host can kill the host since it uses VSS which may not be able hold that much data.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    Introduction In one of my previous articles (, I explained how to create a native Windows 2012 Cluster.  The metho…
    From Coral's  "So You Want To Play With Computers" Series Preface: What follows is a tweaked reprint from 2005/06. This is a True Story. The names have been changed to protect the guilty. While this deals with a fairly simple, text file recovery…
    This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
    This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now