faq:backup
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
faq:backup [2016/07/05 08:54 (8 years ago)] – [WARNING: Export PCI Encryption keys or backup will be useless] cliff | faq:backup [2020/09/18 10:11 (4 years ago)] (current) – [Getting everyone out] tanya | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | Manual Backup Link: [[: | ||
- | * {{: | ||
- | * {{: | ||
- | ====== Automatic backup & archive ====== | ||
- | Windward Software products do not have an automatic backup function. | ||
- | |||
- | **Your backup is only as good as your ability to restore.** | ||
- | |||
- | |||
- | ===== WARNING: Export PCI Encryption keys or backup will be useless ===== | ||
- | The PCI Encryption keys need to be backed up as well. These can be exported to a file and backed up. | ||
- | Most customers have some encrypted database files. The key to opening these encrypted files is in the registry of your PC's. A normal backup to a memory stick does not include this information. You must periodically export your PCI Encryption keys, so that if your off site backup is all that is left, you can still have access to any encrypted pervasive files. This could be critical files only, all files, or somewhere in between. | ||
- | |||
- | * The PCI Encryption keys are like the combination to a safe. Your encrypted data is like data in a safe. If you take the safe home and leave the key on top of the safe, you are not really protecting the data in the safe all that well. Please consider this carefully, and DON'T store them with the backup. | ||
- | |||
- | |||
- | ===== How to Export the PCI Keys ===== | ||
- | |||
- | Open the setup wizard and scroll down in the left hand window and click on Credit/ | ||
- | In the right hand window you will see a blue Hyperlink that says PCI Compliance Check. Click on it. | ||
- | This will open another popup that says PCI Check - Payment Card Industry Security Program. | ||
- | Click on the Key Management button. | ||
- | This will open the Exchanging Encryption Keys window. | ||
- | Now click on File, and Export. Save the file to a convenient location such as your desktop, or the System Five Folder, so that it can be copied to a safe place such as a USB stick. It should be kept separate from your normal backups. The reason being that if someone steals your backup, they now have the ability to restore it to their own computer and unencrypt your data. | ||
- | |||
- | |||
- | |||
===== Why backup is so important! ===== | ===== Why backup is so important! ===== | ||
Catastrophic failure of your data is a real possibility. | Catastrophic failure of your data is a real possibility. | ||
- | * Natural | + | |
+ | | ||
* A server component could fail such as the server hard drive. | * A server component could fail such as the server hard drive. | ||
* A virus or malicious employee could destroy your data. | * A virus or malicious employee could destroy your data. | ||
* Computers along with backup media could be stolen. | * Computers along with backup media could be stolen. | ||
- | Without a backup, you can seriously impair your ability to run your business | + | Windward Software on-premise products do not have an automatic |
+ | Without a backup, you can seriously impair your ability to run your business and Windward Software may not be able to re-create your lost information. | ||
+ | If you are hosting in our System Five on Cloud environment the following is our [[: | ||
===== Getting everyone out ===== | ===== Getting everyone out ===== | ||
- | * **WARNING: if anyone is logged into your data the backup will be no good. ** (Ex: logged in means has any System Five Screen Open, connected to polling etc.) | + | * **WARNING: if anyone is logged into your data, the backup/copy will not be fully intact/ |
To have a clean successful backup everyone should be signed out. To ensure this there are two methods available. | To have a clean successful backup everyone should be signed out. To ensure this there are two methods available. | ||
- | - Have your backup program create a file GETOUT!.NOW in the data folder. | + | - Have your backup program create a file GETOUT!.NOW in the data folder. |
- In the Setup Wizard, Enable the "Time Out Settings" | - In the Setup Wizard, Enable the "Time Out Settings" | ||
+ | - Alternatively, | ||
+ | For information on preforming a [[: | ||
+ | ===== WARNING: Export PCI Encryption keys or backup will be useless ===== | ||
+ | The PCI Encryption keys need to be backed up as well. These can be exported to a file and backed up. | ||
+ | Most customers have some encrypted database files. The key to opening these encrypted files is in the registry of your PC's. A normal backup to a memory stick does not include this information. You must periodically export your PCI Encryption keys, so that if your offsite backup is all that is left, you can still have access to any encrypted pervasive files. This could be critical files only, all files, or somewhere in between. | ||
+ | |||
+ | * The PCI Encryption keys are like the combination to a safe. Your encrypted data is like data in a safe. If you take the safe home and leave the key on top of the safe, you are not really protecting the data in the safe all that well. Please consider this carefully, and DON'T store them with the backup. | ||
+ | * Whenever you rotate the PCI keys, make sure to export them. You can store them on a separate external drive, another USB key, or other. Again, DON'T store them with the backup. | ||
+ | |||
+ | ==== How to Export the PCI Keys ==== | ||
+ | - Open the "Setup Wizard" | ||
+ | - In the right-hand window, in the " | ||
+ | - This will open another popup that says "PCI Check - Payment Card Industry Security Program" | ||
+ | - Click on the "Key Management" | ||
+ | - Click on File and Export. Save the file to a convenient location such as your desktop, or the System Five Folder, so that it can be copied to a safe place such as a USB stick. | ||
+ | |||
+ | <note tip>Best practice is to store these keys separately from your normal data backups. The reason being if someone gains access to your backup, they would have the ability to restore it to their own computer and decrypt your data. | ||
+ | </ | ||
- | ===== Overview | + | ===== On Premise Backup |
- | * Work with your local IT professional on the design and operation of your system/ | + | * Work with your local IT professional on the design and operation of your system/ |
- | * Please refer to the sections below for detailed information | + | |
* What to back up is important | * What to back up is important | ||
- | * Backup the data directory (Use help > about menu, the shared directory is the directory you want) | + | * Backup the data directory |
* Store a copy of the current executable files from the bin directory (use the help > about menu looking at the directories section for more info) | * Store a copy of the current executable files from the bin directory (use the help > about menu looking at the directories section for more info) | ||
* Save a copy of your PCI Encryption keys (All data sets have encrypted files) | * Save a copy of your PCI Encryption keys (All data sets have encrypted files) | ||
* Good ideas: | * Good ideas: | ||
* Make at least 1 week of daily backups so they are available at any time | * Make at least 1 week of daily backups so they are available at any time | ||
- | * Archive each month end backup | + | * Archive each month-end backup |
- | * Backups should be stored off site in the event of fire/flood etc. | + | * Backups should be stored off-site in the event of fire/flood etc. |
* CRITICAL ISSUE: test your backups by restoring them to training. | * CRITICAL ISSUE: test your backups by restoring them to training. | ||
* Also, it is important to try to restore your data to a fresh machine (ex: a laptop that has never had System Five installed on it). To prove that you can do the restore if you lose everything. | * Also, it is important to try to restore your data to a fresh machine (ex: a laptop that has never had System Five installed on it). To prove that you can do the restore if you lose everything. | ||
===== Best practices in backup ===== | ===== Best practices in backup ===== | ||
+ | Consider these best practices for configuration and backup regime for your on-premise server and data. | ||
+ | |||
+ | - Use [[https:// | ||
+ | - Have your users signed out and even consider stopping the Pervasive services to ensure the Pervasive database has cleanly flushed any cached data. | ||
- Backup often as you don't want to have to retype your information. | - Backup often as you don't want to have to retype your information. | ||
- | - Have several backup media, not just a single | + | - Have several backup media, not just a single |
- One backup media for each day of the week your business is open, four week ends, two month ends and a yearly. | - One backup media for each day of the week your business is open, four week ends, two month ends and a yearly. | ||
- | - Take the backup' | + | - Take the backup' |
- Verify your backup to see if you would be able to restore from it if it became necessary. (Most businesses do this yearly.) | - Verify your backup to see if you would be able to restore from it if it became necessary. (Most businesses do this yearly.) | ||
- Archive a backup from each month end so you can refer back to them in the future. Particularly valuable for inventory value detail. | - Archive a backup from each month end so you can refer back to them in the future. Particularly valuable for inventory value detail. | ||
Line 70: | Line 67: | ||
- | ===== What can you use? ===== | + | ===== What tools can you use? ===== |
- | - [[http:// | + | |
- Microsoft operating systems since Windows 2000 have come with a simple backup solution. | - Microsoft operating systems since Windows 2000 have come with a simple backup solution. | ||
- | - Offsite backup solutions are becoming popular, the disadvantage with this is restore time is based on your internet speed which may be an issue to consider. | + | - Offsite backup solutions are an option, the disadvantage with these is restore time is based on your internet speed which may be an issue to consider |
+ | - Actian does have a [[https://communities.actian.com/s/ | ||
- Any other backup solution that allows you to backup and restore your information. | - Any other backup solution that allows you to backup and restore your information. | ||
+ | |||
+ | <note warning> | ||
+ | |||
===== What to backup for System Five? ===== | ===== What to backup for System Five? ===== | ||
- Windward System Five data is normally stored in \System5\data folder. | - Windward System Five data is normally stored in \System5\data folder. | ||
- Windward System Five application is normally stored in \System5\bin folder. | - Windward System Five application is normally stored in \System5\bin folder. | ||
+ | - [[faq: | ||
- | ===== What to backup for SpeedyPOS? ===== | + | ==== To check where your data folder is located ==== |
- | - Windward SpeedyPOS data is normally stored in \SpeedyPOS\data folder. | + | |
- | - Windward SpeedyPOS application is normally stored in \SpeedyPOS\bin folder. | + | |
- | + | ||
- | ===== What to backup for SpeedyPOS Plus? ===== | + | |
- | - Windward SpeedyPOS Plus data is normally stored in \SpeedyPOSPlus\data folder. | + | |
- | - Windward SpeedyPOS Plus application is normally stored in \SpeedyPOSPlus\bin folder. | + | |
- | + | ||
- | ===== To check where your data folder is located | + | |
- Sign into your Windward Software version. | - Sign into your Windward Software version. | ||
- From the help menu, choose about. | - From the help menu, choose about. | ||
Line 94: | Line 87: | ||
- | + | ==== Clearing the No Backup Detected Warning Message in System Five ==== | |
- | + | ||
- | + | ||
- | ===== Clearing the No Backup Detected Warning Message in System Five ===== | + | |
There is a file in your " | There is a file in your " | ||
- | * If that is the case, then have your backup software OR | + | * If that is the case, then have your backup software |
* Execute a simple batch file that executes the command: **ATTRIB BACKUP.DAT -A** This will prevent the No Backup Detected warning message from displaying after a backup has been performed. | * Execute a simple batch file that executes the command: **ATTRIB BACKUP.DAT -A** This will prevent the No Backup Detected warning message from displaying after a backup has been performed. | ||
* You can also clear the archive bit with Windows explorer after each backup. | * You can also clear the archive bit with Windows explorer after each backup. | ||
{{faq: | {{faq: | ||
+ | |||
+ | |||
+ | |||
faq/backup.1467734042.txt.gz · Last modified: 2016/07/05 08:54 (8 years ago) by cliff