Showing posts with label have. Show all posts
Showing posts with label have. Show all posts

Monday, April 24, 2017

Tips Veeam problem No disks have been mountedƒ?ÝWindows FLR

Tips Veeam problem No disks have been mountedƒ?ÝWindows FLR


If you are facing problems with Veeam during granulary restore like following screenshots/errors here is relative veeam article that helped us to solve problem:

Here I copy and paste article parts but I warmly suggest to view original veeam article:

http://www.veeam.com/kb1883


<-------------------->

Challenge

When attempting to perform a Windows FLR (Guest Files ?Windows?) the restore fails with:

User-added image

No disks have been mounted. Either disks of this type aren?t supported or some errors occurred. See log file for details.

Solution

Confirm that the VM that the files are being restored from was using one the following filesystems.        
  • FAT
  • FAT32
  • NTFS
  • ReFS*
 ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
Troubleshooting Steps
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

1.  Clear all temporary files from ?C:UsersAppDataLocalTemp?

Note: When the Veeam Backup Service account is ?local system?, the temporary directory used is C:WindowsTemp.

2.  Open an Administrator Command Prompt and run the following commands:

(The the installation path for Veeam if it was upgraded from 6.5 is: C:Program FilesVeeamBackup and Replication)
cd ?C:Program FilesVeeamBackup and ReplicationBackup?
vdk remove
vdk install
3.  Confirm that the account being used for the Veeam Backup Service has the "Perform volume maintenance tasks" right assigned to it. This can be located within the group policy (gpedit.msc) under:
Computer Configuration>Windows Settings>Security Settings>Local Policies>User Rights Assignment
4.  Reboot the Veeam server


Available link for download

Read more »

Monday, November 28, 2016

Tech privacy and security A debate we need to have Naked CIO

Tech privacy and security A debate we need to have Naked CIO


Its time to think hard about the attitudes of technology companies towards privacy and security.

ciosech.jpg

Apple has announced it is fighting a court order in the US which would allow authorities to gain access to the contents of an iPhone as part of a terrorist investigation.

It amazes me that technology companies can put in place encryption that prevent these type of investigations ? yet under similar circumstances a warrant can allow authorities access to homes, cars and personal effects without condition or compromise.

But this incident is just one of many that involves tech companies and privacy.
And the flip side is that so many other tech companies cite the importance of privacy and security when it suits them but yet collect, aggregate, sell, decipher and use personal data to forward their own strategic and financial goals.

They track location, usage behavior, habits and desires in order to benefit advertisers and support their own business and application development. Their privacy policies even mitigate their liability from the collection and security of this data and in some cases limit their responsibility for securing customer information.

The fact is these tech companies survive and grow on disseminating personal information where is suits them, yet seem to want to be community activists when it doesnt.

They can achieve this through slick PR campaigns around encryption and fighting authorities on information disclosure ? to offset the multiple legal battles in European courts and beyond that deal with customer privacy.
Years ago at a symposium a question was posed when Google was in its formative stages. Do you fear Google? It was an interesting question with even more interesting answers. I stood up and said Yes, because the moment you dont fear them you could regret it. By fearing them you recognize their ability to be too big and too influential within the fabric of our lives.

Regardless of your geopolitical opinions these are fundamental question that needs to be asked. Are we now at the point where we have allowed these companies to own too much of our data without the recourse to reign them in?

As IT leaders within organizations that invariably collect information it is our duty to ask those questions of ourselves, too.

Information is valuable yet we need to be able to balance the need to understand our customers better with the basics of protecting their privacy.

At what point do we cross the line between collecting information to better inform decisions on business needs, and storing and analyzing data on individuals that compromises their understanding of what is appropriate?

The Naked CIO is an anonymous technology executive.


Available link for download

Read more »