Chat now with support
Chat with Support

Rapid Recovery 6.1.2 - Mailbox Restore for Exchange User Guide

Legend Understanding Mailbox Restore for Exchange Preparing to use Mailbox Restore for Exchange The Local Mount Utility and Mailbox Restore Using Mailbox Restore for Exchange Restoring Exchange data using Mailbox Restore Exchange database maintenance in Mailbox Restore About us Glossary


The Rapid Recovery Agent is software installed on a physical or virtual machine that lets it be added to protection in the Rapid Recovery Core.

A checksum is a function that creates blocks of data that are used for the purpose of detecting accidental errors that are created during transmission or storage.

The Rapid Recovery Core is the central component of the Rapid Recovery architecture. The Core provides the essential services for backup, recovery, retention, replication, archiving, and management. In the context of replication, the Core is also called a source core. The source core is the originating core, while the target core is the destination (another Rapid Recovery Core on its own dedicated server, where protected machines or clusters are replicated).

Data store is the Microsoft term for an Exchange database. The data store is a storage file with the extension ‘.edb’ on the Exchange server that comprises the Outlook data. It contains the Exchange items that can be recovered by Mailbox Restore.

Differential Restore is a type of data recovery in Mailbox Restore that lets you recover only the differences between one or more offline and online Exchange databases.

The Storage Networking Industry Association (SNIA) defines data deduplication as the replacement of multiple copies of data—at variable levels of granularity—with references to a shared copy to save storage space or bandwidth. The Rapid Recovery Volume Manager performs global data deduplication within a logical volume. The granularity level of deduplication is 8 KB. The scope of deduplication in Rapid Recovery is limited to protected machines using the same repository and encryption key.

Rapid Recovery Live Recovery is an instant recovery technology for VMs and servers. It provides near-continuous access to data volumes in a virtual or physical server, letting you recover an entire volume with near-zero RTO and a RPO of minutes.

The Local Mount Utility (LMU) is a downloadable application that lets you mount a recovery point on a remote Rapid Recovery Core from any machine.

Log truncation is a function that removes log records from the transaction log. For a SQL Server machine, when you force truncation of the SQL Server logs, this process identifies free space on the SQL server. For an Exchange Server machine, when you force truncation of the Exchange Server logs, this action frees up space on the Exchange server.

Mailbox Restore for Exchange (Mailbox Restore) is a program that works with Rapid Recovery and Microsoft Exchange to recover Microsoft Outlook mail items, such as email messages, Calendar appointments, and Address Book contacts.

Microsoft Exchange (Exchange) is a server program that manages and stores Microsoft Outlook content, such as email messages, Calendar appointments, and Address Book contacts.

Exchange mountability is a corruption detection feature that alerts administrators of potential failures and ensures that all data on the Exchange servers is recovered successfully in the event of a failure.

An abbreviation for Personal Storage Table file, a PST file is an open-source format of storing email messages, Calendar appointments, and other Exchange items. The file uses the extension ‘.pst’.

The Profile Wizard in Mailbox Restore is a tool that lets you create, edit, and remove Outlook profiles directly from within Mailbox Restore. It is only available when the machine on which Mailbox Restore is installed also includes a compatible version of Microsoft Outlook.

A protected machine—sometimes called an "agent"— is a physical computer or virtual machine that is protected in the Rapid Recovery Core. Backup data is transmitted from the protected machine to the repository specified in the Core using a predefined protection interval. The base image transmits all data to a recovery point (including the operating system, applications, and settings). Each subsequent incremental snapshot commits only the changed blocks on the specified disk volumes of the protected machine. Software-based protected machines have the Rapid Recovery Agent software installed. Some virtual machines can also be protected agentlessly, with some limitations.

Rapid Recovery sets a new standard for unified data protection by combining backup, replication, and recovery in a single solution that is engineered to be the fastest and most reliable backup for protecting virtual machines (VM), as well as physical and cloud environments.

Recovery points are a collection of snapshots of various disk volumes. For example, C:, D:, and E:.

A remote Core represents an Rapid Recovery Core that is accessed by a non-Core machine using the Local Mount Utility or the Central Management Console.

The process of restoring one or more storage volumes on a machine from recovery points saved on the Rapid Recovery Core is known as performing a restore. This was formerly known as rollback.

A snapshot is a common industry term that defines the ability to capture and store the state of a disk volume at a given point, while applications are running. The snapshot is critical if system recovery is needed due to an outage or system failure. Rapid Recovery snapshots are application aware, which means that all open transactions and rolling transaction logs are completed and caches are flushed prior to creating the snapshot. Rapid Recovery uses Microsoft Volume Shadow Services (VSS) to facilitate application crash consistent snapshots.

True Scale is the scalable architecture of Rapid Recovery.

Rapid Recovery Universal Recovery technology provides unlimited machine restoration flexibility. It enables you to perform monolithic recovery to- and from- any physical or virtual platform of your choice as well as incremental recovery updates to virtual machines from any physical or virtual source. It also lets you perform application-level, item-level, and object-level recovery of individual files, folders, email, calendar items, databases, and applications.

Verified Recovery technology is used to perform automated recovery testing and verification of backups. It supports various file systems and servers.

Related Documents