How SaBackup Protects Your Data — Features & Setup
Key protection features
- Incremental backups: Only changed files are saved after the initial backup, reducing bandwidth and storage use.
- End-to-end encryption: Data is encrypted on the client before transfer and remains encrypted at rest on the backup server.
- Versioning & retention: Multiple file versions are stored so you can restore from past points in time; retention policies automatically prune old versions.
- Integrity checks: Regular checksums and verification routines detect and repair corrupted backup data.
- Access controls: Role-based permissions and API keys restrict who can create, modify, or restore backups.
- Network throttling & scheduling: Limits bandwidth use and schedules backups during off-peak hours to avoid disruption.
Typical setup (assumes SaBackup server + client)
- Install client: Download and install the SaBackup client on systems to protect (Windows, macOS, Linux).
- Create account & register client: Generate API key or pair client with the SaBackup server using a registration token.
- Select data to back up: Choose files, folders, or mount points; set exclusion rules for temp files or large media.
- Configure encryption: Set a passphrase or use managed keys. If using a user passphrase, ensure it’s stored securely—losing it may prevent restores.
- Set schedule & retention: Define backup frequency (e.g., hourly incremental, daily full), retention windows, and version limits.
- Bandwidth & throttling: Configure limits and set maintenance windows for full backups or large restores.
- Enable alerts & monitoring: Configure email/SMS alerts for failures, verify daily reports, and enable integrity checks.
- Test restores: Perform periodic test restores (file-level and full system) to validate backup integrity and recovery time.
Best practices
- Use strong, unique encryption keys and store recovery keys separately (e.g., hardware token or secure vault).
- Follow 3-2-1 rule: Keep 3 copies of data, on 2 different media, with 1 copy offsite.
- Automate and monitor: Automate backups and alerting; review logs and failure reports weekly.
- Encrypt backups in transit and at rest.
- Limit access: Use least-privilege roles and rotate API keys regularly.
- Regular restore drills: Schedule quarterly full-restore tests to ensure recovery procedures work.
Recovery workflow
- Authenticate to SaBackup console or client with proper credentials.
- Locate dataset and choose restore point (timestamp or version).
- Select restore target (original location or alternate path).
- Start restore; monitor progress and verify checksums after completion.
- If full system restore, follow boot/media instructions provided by SaBackup for bare-metal recovery.
If you want, I can provide a sample client config file and a cron/scheduler example for a typical Linux server.
Leave a Reply