Tami activity
0 Articles Written Last Month
0 0 0 0 0 0 0
Migrate the system to a new server - x360Sync
Overview The following information describes the steps needed to perform a system migration. Preparing for migration If you need to migrate any other Private Cloud Server components, except for the database server, from one machine to another, please refer to Setting up a High Availability (HA) environment. This article covers such scenarios in gre...
3 min reading timeUninstall an agent remotely - x360Recover
Why would you need to do this? It is possible you might lose physical or remote access to a protected system without first having the opportunity to cleanly remove the managed software (including backup agents.) With x360Recover 12.1.0 and newer, you can remotely trigger the x360Recover agent to uninstall itself from a protected system. You'll do t...
1 min reading timeVirtual Disk Image - BMR (Bare metal restore)
Bare Metal Restore Guide Our x360Recover Bare Metal Restore Wizard offers several options for performing different types of recovery, depending on where your data is located: Perform BMR from an appliance Perform BMR from a vault with local cache Perform BMR from a vault without local cache Perform BMR from a virtual disk image ...
4 min reading timeError: An unexpected error occurred on a send (receive). Problems with TLS 1.2 / 1.3
Examples of possible error messages Error message: The underlying connection was closed: An unexpected error occurred on a send. This error might occur when you are unable to restore mail to the original mailbox. Error message: An unexpected error occurred on a send This error might occur if you are unable to connect to Exchange Server. This error m...
2 min reading timeComponents of x360Recover - BDR - FAQs
The components of x360Recover BDR are: 1. The x360Recover agent x360Recover is an agent-based backup and disaster recovery solution. Agent software must be installed on each system to be protected. Backups of protected systems are image-based. You will deploy the agent software on systems to be protected. Windows workstations and servers are su...
3 min reading timeWhat is RAID? - x360Recover
RAID (Redundant Array of Inexpensive Disks) A common question: What is RAID, and what do all those RAID numbers mean? RAID stands for Redundant Array of Inexpensive Disks. At its core, RAID is a mechanism to provide some level of redundancy to a disk storage system, so that the loss of a single disk doesn’t result in the total loss of all data being...
5 min reading timeCreate an organization in Google Workspace - x360Cloud
Overview When you have an x360Cloud reseller account, you can log in to the x360 portal and create an organization to protect Google Workspace accounts. Note: If you need to create an organization for a Microsoft 365 account, please click here. Log in and create an organization To log in to your x360Cloud reseller account: STEP 1: Launch x360C...
2 min reading time(macOS) Deploy a Privacy Preference Policy Control (PPPC) file
What is a Privacy Preferences Policy Control (PPPC) file? A Privacy Preferences Policy Control (PPPC) file is an xml formatted metadata file used by the mobile device manager service on macOS to allow administrators to pre-assign security permissions and other settings for an application. Certain security settings (notably Full Disk Access permissio...
2 min reading timeRecover protected systems with 4K AF drives - x360Recover BDR
Many new computer systems are beginning to ship with Advanced Format (4K) hard drives. These devices have a native low level block size of 4096 (4K) rather than the 512 bytes used by standard drives. Support for protected systems with Advanced Format Disks (Native 4K block size.): Backup and recovery of protected systems using 4K drives is supporte...
2 min reading timeBRC - Configure antivirus exclusions
This information is for administrators who are experiencing conflicts with the Axcient Service and their antivirus software. Please note that steps might vary depending on which antivirus software is being used. This guide is intended to provide general steps for adding Axcient services to the allow list of common anti-virus software. To add the A...
1 min reading time