User Tools

Site Tools


faq:backup

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
faq:backup [2019/12/16 13:26]
kevin
faq:backup [2020/04/01 09:31] (current)
kevin
Line 2: Line 2:
 Catastrophic failure of your data is a real possibility.  ​ Catastrophic failure of your data is a real possibility.  ​
   * Your data access can be blocked by [[https://​en.wikipedia.org/​wiki/​Ransomware|Ransomeware]]   * Your data access can be blocked by [[https://​en.wikipedia.org/​wiki/​Ransomware|Ransomeware]]
-  * Natural ​disaster ​can destroy your network. (Fire, flood, hurricane, etc)+  * Natural ​disasters ​can destroy your network. (Fire, flood, hurricane, etc)
   * A server component could fail such as the server hard drive.   * A server component could fail such as the server hard drive.
   * A virus or malicious employee could destroy your data.   * A virus or malicious employee could destroy your data.
Line 16: Line 16:
   * **WARNING: if anyone is logged into your data the backup will be no good. ** (Ex: logged in means has any System Five Screen Open, connected to polling etc.)   * **WARNING: if anyone is logged into your data the backup will be no good. ** (Ex: logged in means has any System Five Screen Open, connected to polling etc.)
 To have a clean successful backup everyone should be signed out.  To ensure this there are two methods available. To have a clean successful backup everyone should be signed out.  To ensure this there are two methods available.
-  - Have your backup program create a file GETOUT!.NOW in the data folder. ​ Any users still signed in will receive a three minute warning before the system will shut them down. Note, make sure that after your backup is complete, the GETOUT!.NOW file is deleted. If it is not, then you will be unable to login to System Five.+  - Have your backup program create a file GETOUT!.NOW in the data folder. ​ Any users still signed in will receive a three-minute warning before the system will shut them down. Note, make sure that after your backup is complete, the GETOUT!.NOW file is deleted. If it is not, then you will be unable to login to System Five.
   - In the Setup Wizard, Enable the "Time Out Settings"​ to have a time period when users can not sign in.   - In the Setup Wizard, Enable the "Time Out Settings"​ to have a time period when users can not sign in.
   - Alternatively,​ to confirm that everyone is out of the Live environment run File Check (Setup Tools --> Utilities --> File Check). ​ Click the "​Continue,​ I have done a backup"​ button. ​ The next screen displays a "List of Users Signed in" to the current environment. ​ If there are no users signed in to the environment,​ this screen should not list any users. ​ Click Quit to exit. ***Note:** This method will not prevent users from logging in after confirming everyone is out via the file check or subsequently anytime during the Backup procedure.   - Alternatively,​ to confirm that everyone is out of the Live environment run File Check (Setup Tools --> Utilities --> File Check). ​ Click the "​Continue,​ I have done a backup"​ button. ​ The next screen displays a "List of Users Signed in" to the current environment. ​ If there are no users signed in to the environment,​ this screen should not list any users. ​ Click Quit to exit. ***Note:** This method will not prevent users from logging in after confirming everyone is out via the file check or subsequently anytime during the Backup procedure.
Line 25: Line 25:
 ===== WARNING: Export PCI Encryption keys or backup will be useless ===== ===== WARNING: Export PCI Encryption keys or backup will be useless =====
 The PCI Encryption keys need to be backed up as well. These can be exported to a file and backed up. The PCI Encryption keys need to be backed up as well. These can be exported to a file and backed up.
-Most customers have some encrypted database files. The key to opening these encrypted files is in the registry of your PC's. A normal backup to a memory stick does not include this information. You must periodically export your PCI Encryption keys, so that if your off site backup is all that is left, you can still have access to any encrypted pervasive files. This could be critical files only, all files, or somewhere in between.+Most customers have some encrypted database files. The key to opening these encrypted files is in the registry of your PC's. A normal backup to a memory stick does not include this information. You must periodically export your PCI Encryption keys, so that if your offsite ​backup is all that is left, you can still have access to any encrypted pervasive files. This could be critical files only, all files, or somewhere in between.
  
   * The PCI Encryption keys are like the combination to a safe. Your encrypted data is like data in a safe. If you take the safe home and leave the key on top of the safe, you are not really protecting the data in the safe all that well. Please consider this carefully, and DON'T store them with the backup.   * The PCI Encryption keys are like the combination to a safe. Your encrypted data is like data in a safe. If you take the safe home and leave the key on top of the safe, you are not really protecting the data in the safe all that well. Please consider this carefully, and DON'T store them with the backup.
Line 31: Line 31:
  
 ==== How to Export the PCI Keys ==== ==== How to Export the PCI Keys ====
-  ​Open the setup wizard ​and scroll down in the left hand window and click on Payment Processing. +  ​Open the "Setup Wizard" ​and scroll down in the left-hand window and click on "Payment Processing"
-  ​In the right hand window, in the Credit Card Info tab, you will see a blue Hyperlink that says PCI Compliance Check. Click on it+  ​In the right-hand window, in the "Credit Card Info" ​tab, click on the blue Hyperlink that says "PCI Compliance Check"
-  ​This will open another popup that says PCI Check - Payment Card Industry Security Program. +  ​This will open another popup that says "PCI Check - Payment Card Industry Security Program"
-  ​Click on the Key Management button+  ​Click on the "Key Management" ​button ​which will open the "Exchanging Encryption Keys" ​window.  
-  * This will open the Exchanging Encryption Keys window.  +  ​- Click on File and Export. Save the file to a convenient location such as your desktop, or the System Five Folder, so that it can be copied to a safe place such as a USB stick. 
-  ​* Now click on Fileand Export. Save the file to a convenient location such as your desktop, or the System Five Folder, so that it can be copied to a safe place such as a USB stick.  + 
-  * It should be kept separate ​from your normal backups. The reason being that if someone ​steals ​your backup, they now have the ability to restore it to their own computer and decrypt your data.+<note tip>Best practice is to store these keys separately ​from your normal ​data backups. The reason being if someone ​gains access to your backup, they would have the ability to restore it to their own computer and decrypt your data. 
 +</​note>​
  
 ===== On Premise Backup ===== ===== On Premise Backup =====
-  * Work with your local IT professional on the design and operation of your system/​network backups. Windward Software does not offer backup services and are not responsible for your system backup. ​+  * Work with your local IT professional on the design and operation of your system/​network backups. Windward Software does not offer backup services and not responsible for your on-premise ​system backup. ​
   * What to back up is important   * What to back up is important
     * Backup the data directory and all folders contained within it (Use help > about menu, the shared directory is the directory you want).     * Backup the data directory and all folders contained within it (Use help > about menu, the shared directory is the directory you want).
Line 47: Line 48:
   * Good ideas:   * Good ideas:
     * Make at least 1 week of daily backups so they are available at any time     * Make at least 1 week of daily backups so they are available at any time
-    * Archive each month end backup +    * Archive each month-end backup 
-    * Backups should be stored off site in the event of fire/flood etc.+    * Backups should be stored off-site in the event of fire/flood etc.
   * CRITICAL ISSUE: test your backups by restoring them to training. ​   * CRITICAL ISSUE: test your backups by restoring them to training. ​
     * Also, it is important to try to restore your data to a fresh machine (ex: a laptop that has never had System Five installed on it). To prove that you can do the restore if you lose everything.     * Also, it is important to try to restore your data to a fresh machine (ex: a laptop that has never had System Five installed on it). To prove that you can do the restore if you lose everything.
Line 60: Line 61:
   - Have several backup media, not just a single source. ​ (For most businesses this is USB or external drives.)   - Have several backup media, not just a single source. ​ (For most businesses this is USB or external drives.)
   - One backup media for each day of the week your business is open, four week ends, two month ends and a yearly.   - One backup media for each day of the week your business is open, four week ends, two month ends and a yearly.
-  - Take the backup'​s off site.  (Most business owners or the person in charge of backup takes the last backup home with them.)+  - Take the backup'​s off-site.  (Most business owners or the person in charge of backup takes the last backup home with them.)
   - Verify your backup to see if you would be able to restore from it if it became necessary. (Most businesses do this yearly.)   - Verify your backup to see if you would be able to restore from it if it became necessary. (Most businesses do this yearly.)
   - Archive a backup from each month end so you can refer back to them in the future. Particularly valuable for inventory value detail.   - Archive a backup from each month end so you can refer back to them in the future. Particularly valuable for inventory value detail.
Line 78: Line 79:
   - Windward System Five data is normally stored in \System5\data folder. ​ This is all your business information so back this up.   - Windward System Five data is normally stored in \System5\data folder. ​ This is all your business information so back this up.
   - Windward System Five application is normally stored in \System5\bin folder. ​ This program folder is needed to run with your data.  If you choose to not backup this folder, you can choose to download the latest released version of our software if you were restoring but a data conversion may be required if you were running an older version.   - Windward System Five application is normally stored in \System5\bin folder. ​ This program folder is needed to run with your data.  If you choose to not backup this folder, you can choose to download the latest released version of our software if you were restoring but a data conversion may be required if you were running an older version.
 +  - [[faq:​backup#​how_to_export_the_pci_keys|Export your PCI keys]]
  
 ==== To check where your data folder is located ====  ==== To check where your data folder is located ==== 
faq/backup.1576531608.txt.gz · Last modified: 2019/12/16 13:26 by kevin