zagandesign - Fotolia
Veritas Technologies has made the process of a Backup Exec 16 upgrade relatively easy. In-place upgrades are possible as long as an organization is using version 2010 R3 or higher, and is not running Backup Exec on a 32-bit OS.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Organizations running an earlier version of Backup Exec can theoretically still perform an in-place upgrade if Backup Exec is running on a 64-bit OS, but a multistep upgrade would be required. This means the organization would have to perform a preliminary upgrade to version 2010 R3 or higher, and then a secondary Backup Exec 16 upgrade.
When performing an in-place upgrade, Backup Exec preserves all of the catalogs and data directories from the previous version, unless you opt to remove them. The upgrade process also retains most of the previous version's settings, with the exception of custom filters and custom descriptions of managed media servers and remote agents. Support for these features was discontinued in Backup Exec 2012.
When planning a Backup Exec 16 upgrade, there are two main steps. First, you need to determine the licensing requirements. The technique used in the license verification process varies depending on the version of Backup Exec you are running.
The next step is to clean up your existing Backup Exec deployment. Veritas recommends running a database maintenance job and deleting any job histories and catalogs you won't need in the future.
It is also important to install any available updates for your current Backup Exec version before attempting an upgrade.
If you are performing a Backup Exec 16 upgrade from version 15, you should also view the video Veritas created to demonstrate the process.
Q&A: Veritas CEO dishes on data management
Veritas Vision: NetBackup adds support, integration
How to fix specific Backup Exec issues
Dig Deeper on Backup and recovery software
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.