- Page 1:
Storage Manager for Mail5.5Data Pro
- Page 4 and 5:
IBM ConfidentialNoteBefore using th
- Page 6 and 7:
IBM ConfidentialQuery Exchange opti
- Page 8 and 9:
IBM ConfidentialACN501E: Invalid Pr
- Page 10 and 11:
IBM ConfidentialACN5802T: When a Re
- Page 12 and 13:
x Storage Manager for Mail 5.5: Dat
- Page 14 and 15:
IBM ConfidentialRelatedProvides inf
- Page 16 and 17:
IBM ConfidentialThis IBM Redbook de
- Page 18 and 19: IBM ConfidentialDeveloper’s Kit (
- Page 20 and 21: IBM Confidential3. Select the Softw
- Page 22 and 23: IBM ConfidentialSeverity 2The probl
- Page 24 and 25: IBM ConfidentialMagnifying what is
- Page 26 and 27: xxiv Storage Manager for Mail 5.5:
- Page 28 and 29: IBM ConfidentialVSS Restore into th
- Page 30: IBM ConfidentialBackup Processing:
- Page 33 and 34: IBM ConfidentialLegacy BackupA lega
- Page 35 and 36: IBM Confidentialv Do not place mult
- Page 37 and 38: IBM ConfidentialWhen performing a r
- Page 39 and 40: IBM Confidentialvolume-level copy m
- Page 41 and 42: IBM ConfidentialFull backups onlyTh
- Page 43 and 44: IBM ConfidentialThis option must be
- Page 45 and 46: IBM Confidentiallonger needed, the
- Page 47 and 48: IBM Confidentialspecified in the bu
- Page 49 and 50: IBM ConfidentialTivoli Storage Mana
- Page 51 and 52: IBM ConfidentialChapter 2. Installi
- Page 53 and 54: IBM ConfidentialVSS Backup of CCR a
- Page 55 and 56: IBM ConfidentialFor detailed inform
- Page 57 and 58: IBM ConfidentialChapter 3. Configur
- Page 59 and 60: IBM ConfidentialStorage Manager ser
- Page 61 and 62: IBM Confidential- Specify backupdes
- Page 63 and 64: IBM ConfidentialStorage Manager ser
- Page 65 and 66: IBM ConfidentialAgentProtection for
- Page 67: IBM Confidential1. Verify that you
- Page 71 and 72: IBM ConfidentialAttention:If you pl
- Page 73 and 74: IBM ConfidentialArchive Client. Not
- Page 75 and 76: IBM ConfidentialChapter 4. Using th
- Page 77 and 78: IBM ConfidentialLog File Name (defa
- Page 79 and 80: IBM ConfidentialUtilitiesMenuThe fo
- Page 81 and 82: IBM ConfidentialBackup and Restore
- Page 83 and 84: IBM Confidential||||||1. The accoun
- Page 85 and 86: IBM Confidential|||||||||||||v Exch
- Page 87 and 88: IBM Confidentialv Select Replay Res
- Page 89 and 90: IBM ConfidentialChapter 5. Using th
- Page 91 and 92: IBM Confidential/EXCSERVer=server-n
- Page 93 and 94: IBM Confidential-------------------
- Page 95 and 96: IBM Confidentiallogfilename variabl
- Page 97 and 98: IBM Confidential►/ALl/CONFIGfile=
- Page 99 and 100: IBM Confidentialinstance to a diffe
- Page 101 and 102: IBM ConfidentialExchange Server : O
- Page 103 and 104: IBM Confidential►/LOGFile=tdpexc.
- Page 105 and 106: IBM ConfidentialThe configfilename
- Page 107 and 108: IBM ConfidentialONLY valid when /ba
- Page 109 and 110: IBM ConfidentialACN5057I The C:\Pro
- Page 111 and 112: IBM ConfidentialWhen using the rest
- Page 113 and 114: IBM Confidential►/BUFFers=3numbuf
- Page 115 and 116: IBM Confidentialmoving data between
- Page 117 and 118: IBM ConfidentialIf the /logfile par
- Page 119 and 120:
IBM ConfidentialRecovery Storage Gr
- Page 121 and 122:
IBM ConfidentialThe tdpexcc restore
- Page 123 and 124:
IBM ConfidentialRestorefilessyntaxU
- Page 125 and 126:
IBM Confidential/EXCAPPlication=SRS
- Page 127 and 128:
IBM Confidentialserver. You can als
- Page 129 and 130:
IBM ConfidentialLogging on to the T
- Page 131 and 132:
IBM ConfidentialWhen using multiple
- Page 133 and 134:
IBM ConfidentialTSM The backup is s
- Page 135 and 136:
IBM ConfidentialThe fmtnum variable
- Page 137 and 138:
IBM Confidential*|subcommandHelp ca
- Page 139 and 140:
IBM Confidentialwhere PARMname and
- Page 141 and 142:
IBM ConfidentialChapter 6. Using th
- Page 143 and 144:
IBM ConfidentialYou can use the Tiv
- Page 145 and 146:
IBM ConfidentialNote: If you need t
- Page 147 and 148:
IBM Confidentialchanges. An example
- Page 149 and 150:
IBM ConfidentialAppendix A. Quick c
- Page 151 and 152:
IBM ConfidentialAppendix B. Frequen
- Page 153 and 154:
IBM ConfidentialHowever, UNC-based
- Page 155 and 156:
IBM Confidential|||||||||||v Storag
- Page 157 and 158:
IBM ConfidentialAppendix C. Silent
- Page 159 and 160:
IBM ConfidentialThe following trans
- Page 161 and 162:
IBM ConfidentialInstallation proble
- Page 163 and 164:
IBM ConfidentialAppendix D. Advance
- Page 165 and 166:
IBM ConfidentialAppendix E. Data Pr
- Page 167 and 168:
IBM ConfidentialACN0057E: The check
- Page 169 and 170:
IBM ConfidentialSystem actionProces
- Page 171 and 172:
IBM ConfidentialACN0153I: Performan
- Page 173 and 174:
IBM ConfidentialUser responseEnter
- Page 175 and 176:
IBM ConfidentialSystem actionProces
- Page 177 and 178:
IBM ConfidentialUser responseNoneAC
- Page 179 and 180:
IBM ConfidentialSystem actionProces
- Page 181 and 182:
IBM ConfidentialACN0261I: There are
- Page 183 and 184:
IBM ConfidentialUser responseRe-ent
- Page 185 and 186:
IBM ConfidentialACN384E: Symbolic l
- Page 187 and 188:
IBM ConfidentialACN496I: TDP is con
- Page 189 and 190:
IBM ConfidentialACN516I: The Window
- Page 191 and 192:
IBM ConfidentialSystem actionPrunin
- Page 193 and 194:
IBM ConfidentialACN3506I: Data Prot
- Page 195 and 196:
IBM ConfidentialACN3512E: Data Prot
- Page 197 and 198:
IBM ConfidentialACN5050I: A new con
- Page 199 and 200:
IBM ConfidentialACN5057I: The logfi
- Page 201 and 202:
IBM ConfidentialACN5063E: An error
- Page 203 and 204:
IBM ConfidentialUser responseEnsure
- Page 205 and 206:
IBM ConfidentialSystem actionProces
- Page 207 and 208:
IBM ConfidentialUser responseEnsure
- Page 209 and 210:
IBM ConfidentialACN5240E: Unable to
- Page 211 and 212:
IBM ConfidentialSystem actionProces
- Page 213 and 214:
IBM ConfidentialACN5356E: The datab
- Page 215 and 216:
IBM ConfidentialACN5500E: The Multi
- Page 217 and 218:
IBM ConfidentialUser responseSelect
- Page 219 and 220:
IBM ConfidentialACN5802T: When a Re
- Page 221 and 222:
IBM ConfidentialACN5814E: Invalid c
- Page 223 and 224:
IBM ConfidentialUser responseRetry
- Page 225 and 226:
IBM ConfidentialNoticesThis informa
- Page 227 and 228:
IBM ConfidentialTrademarksIBM, the
- Page 229 and 230:
IBM ConfidentialGlossaryThe terms i
- Page 231 and 232:
IBM Confidentialgroups belong to ma
- Page 233 and 234:
IBM Confidentialprogress indicatorA
- Page 235 and 236:
IBM ConfidentialIndexAactive parame
- Page 237 and 238:
IBM Confidentialexample (continued)
- Page 239 and 240:
IBM Confidentialparameters (continu
- Page 241 and 242:
IBM Confidentialtsmoptfile paramete
- Page 244:
Program Number: 5608-APE, 5608-CSSI