{"id":13588,"date":"2017-11-13T05:02:08","date_gmt":"2017-11-13T05:02:08","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=13588"},"modified":"2019-11-14T05:20:22","modified_gmt":"2019-11-14T05:20:22","slug":"hyper-v-backup-best-practice-guide","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide","title":{"rendered":"Hyper-V backup best practice guide"},"content":{"rendered":"\n<p>This guide explains how to create reliable, best practice Hyper-V backup of your Hyper-V Server using BackupAssist System Protection.<\/p>\n\n\n\n<p>File Protection and File Archiving can also be used to back up Hyper-V environments, but System Protection is our recommended backup type for Hyper-V because it supports:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Customized Hyper-V destination, CSV and Exchange Server detection steps<\/li><li>Block level backups of a Hyper-V Server<\/li><li>Incremental image backups, including&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/support\/fast-incremental-backups-for-system-protection\/#more-2574\" target=\"_blank\">fast incremental<\/a>.<\/li><li>Superior handing of large files.<\/li><li>Bare-metal&nbsp;<a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/recover\/recover-tab.htm\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">recovery<\/a><\/li><\/ul>\n\n\n\n<p>For additional information on Hyper-V backup solutions, refer to our&nbsp;<a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/hyper-v\/overview.htm\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Hyper-V guides<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hyper-V backup requirements and features<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Hyper-V requirements<\/h3>\n\n\n\n<p>See out <a href=\"https:\/\/www.backupassist.com\/support\/en\/getting-started\/supported-platforms.htm\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"supported platforms page (opens in a new tab)\">supported platforms page<\/a> to view what version of Windows Server are supported for Hyper-V<\/p>\n\n\n\n<p>Pre-requisites for BackupAssist Hyper-V backup:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If Windows Server Backup is not installed, BackupAssist will provide a prompt to install it when the first backup job is created.<\/li><li>In a CSV environment, BackupAssist must be installed and licensed on each host.<\/li><li>For Windows Server 2008 \/ 2008 R2, partition size of the disks being backed up should be less than 2TB<\/li><\/ul>\n\n\n\n<p>The following features support guests backed up from CSV environments:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The Exchange granular restores<\/li><li>The Hyper-V granular restores<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Windows 2012 \/ 2012 R2 Hyper-V support<\/h3>\n\n\n\n<p>Windows Server 2012 introduced the CSVFS format, which allows a cluster to differentiate CSV storage from NTFS storage. BackupAssist\u2019s support for these and other feature is listed below:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>BackupAssist can back up Hyper-V guests located on CSV storage using the CSVFS file system.<\/li><li>BackupAssist supports SMB 3.0 servers as a CSVFS backup destination.<\/li><li>BackupAssist does not support backups of CSVFS and NTFS locations in the same snapshot. E.g. It\u2019s not possible to back up a guest that uses CSV as well as a guest that uses an NTFS volume.<\/li><li>BackupAssist supports Hyper-V Replica and can back up and restore a primary Hyper-V guest.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Best practice Hyper-V backup<\/h2>\n\n\n\n<p>The backup media will be made bootable the first time the job runs unless you deselect the&nbsp;<strong>Make media bootable with RecoverAssist&nbsp;<\/strong>tick box on the&nbsp;<em>Set up destination<\/em>&nbsp;step.<\/p>\n\n\n\n<p>Backing Hyper-V virtual machines, can become complicated once you factor in host data, volumes, domains, disks, VSS writers, services and the resulting issues that can arise. To keep the backups of your virtual machines as simple and robust as the environments themselves, we\u2019ve put together a list of 10 tips for best practice Hyper-V backups.<\/p>\n\n\n\n<p><strong>Do not install other roles or applications on your Hyper-V host.<\/strong><\/p>\n\n\n\n<p>Your physical Hyper-V host server should only have one function, to be the Hyper-V host server. It should not double as a file server, a DNS server or, even worse, an application server. Any non-Hyper-V software and data should be on another physical server or one of the Hyper-V guests.<\/p>\n\n\n\n<p>If you don\u2019t follow this advice, you can complicate host level backups and affect the stability of the host server itself. Any problem with another role or application on the Hyper-V host can impact the guests. Even something as simple as a patch to an application could require a physical server reboot, and cause an outage for all of your Hyper-V guests (VMs) and the services they provide.<\/p>\n\n\n\n<p><strong>Only assign a single role or application to each guest<\/strong><\/p>\n\n\n\n<p>Each Hyper-V guest (VM) should only have a single role or application. It\u2019s easy enough to make another guest, and dedicated environments are what make virtual machines so great.<br>For backups, having only one role or application per guest makes it easier to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Recover guests and services in a managed way.<\/li><li>Allocate backup agents and licenses<\/li><li>Perform granular restores of data inside of Hyper-V guests.<\/li><\/ul>\n\n\n\n<p><strong>Focus on a guest only Hyper-V backup<\/strong><\/p>\n\n\n\n<p>The Hyper-V host provides the platform, architecture and processes required to support and maintain your Hyper-V guests (VMs). Although it\u2019s good to have a bare-metal backup of the entire physical server, backups of just the Hyper-V guests can also be very useful as they contain all the data you need and use less space. For a recovery, you can just reinstall the Hyper-V Server and use the backup to add the guests back. A mix of weekly full-metal archive backups and daily \u201cguest only\u201d backups can provide a good balance.<\/p>\n\n\n\n<p><strong>Enable Hyper-V integration services<\/strong><\/p>\n\n\n\n<p>Backup software can use a VSS snapshot to maintain a copy of data that has changed during the backup, so that all of the data in the backup reflects the data as it was at a single point in time \u2013 this is called crash-consistent. Application-consistent means a VSS-Aware application checks its own files in the VSS snapshot to make sure they are correct. For example, information in memory and uncompleted database transactions are included in the snapshot, making it more accurate and consistent.&nbsp;This is critical, especially for applications like Exchange and SQL.<\/p>\n\n\n\n<p>Without&nbsp;<em>Hyper-V Integration Services&nbsp;<\/em>installed, a&nbsp;Hyper-V guest (VM) will not be aware of the backup job so you will only get a crash-consistent backup. When you install the&nbsp;<em>Hyper-V Integration Services<\/em>&nbsp;on the host, and enable it on the guest, the host and guest VSS writers can work together to create online, application-consistent backups of applications like Exchange and SQL, inside the Hyper-V guest.<\/p>\n\n\n\n<p><strong>Run the Hyper-V backup on the Hyper-V host server, not the guest<\/strong><\/p>\n\n\n\n<p>The easiest way to protect Hyper-V guests is to install your backup software on the Hyper-V host (physical server) and back up the guests from there. This way you can back up multiple guests using the same backup job, and have those guests in a single backup. This will also save money, because you only need one backup license. Some backup solutions may require a backup agent on each guest but BackupAssist only requires a single host license.<\/p>\n\n\n\n<p>As long as you have Hyper-V integration services installed, the Hyper-V VSS writer on the host, where the backup is running, can communicate with an application (Exchange, SQL) VSS writer on the guest, so that you have application-consistent backups of all guests &#8211; in a single backup.<\/p>\n\n\n\n<p>To learn more about the VSS process, see our&nbsp;<a href=\"http:\/\/www.backupassist.com\/BackupAssist\/tour_creating_consistent_backups_with_vss.html\" target=\"_blank\" rel=\"noreferrer noopener\">virtual shadow copy article<\/a>.<\/p>\n\n\n\n<p><strong>Do not backup a CSV device directly<\/strong><\/p>\n\n\n\n<p>If your guests use a cluster shared volume (CSV), do not back up the CSV device directly because the Hyper-V Server\u2019s VSS writer will not be involved. Back up the Hyper-V Server so that the Hyper-V VSS writer is used to make application-consistent backups of data on the cluster shared volume.<\/p>\n\n\n\n<p><strong>Don\u2019t put the Hyper-V host on the same domain as the guests<\/strong><\/p>\n\n\n\n<p>This safeguard applies when one of your Hyper-V guests (VMs) has the role of domain controller. If that domain controller guest goes down and the host is on the same domain, you may not be able to log into your Hyper-V Server.<\/p>\n\n\n\n<p><strong>Hyper-V<\/strong> <strong>Backup of the whole volume<\/strong><\/p>\n\n\n\n<p>When performing a Hyper-V image backup (i.e. BackupAssist&nbsp;<a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/backup\/system-protection.htm\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">System Protection<\/a>&nbsp;backup), it\u2019s best to back up the whole volume. This can improve the performance of incremental image backups, and it makes the backups faster.<\/p>\n\n\n\n<p>If you follow this best practice, and backup the whole volume, you should have your non-production guests (VMs) on a different volume, so that you can exclude them from the backup. If you mix guest categories or guest files across volumes, both backups and restores become more complicated and less efficient.<\/p>\n\n\n\n<p><strong>Keep system and guest data on separate volumes.<\/strong><\/p>\n\n\n\n<p>The volume you install Microsoft Hyper-V Server onto, and the volume used by the physical server\u2019s operating system, should not be used to store Hyper-V guest data (VHDs). For example, if your physical server uses C: drive, your Hyper-V guests should not. They should have their own volumes, and those volumes should not contain system files, such as the physical server\u2019s swap file. This is important for performance and to remove conflicts. It\u2019s also important for backups because you want to be able to make \u201cguest only\u201d backups using complete volumes.<\/p>\n\n\n\n<p><strong>Use fixed virtual disks<\/strong><\/p>\n\n\n\n<p>The types of disks you use can have an impact on your Hyper-V host server\u2019s performance and data integrity, both of which are important for backups. For this reason, your Hyper-V host server should use fixed virtual disks. Pass-through disks add complexity and don\u2019t allow VM snapshots or Hyper-V replica, and dynamic and differencing disks add a performance and space overhead. Fixed disks enable better performance and data integrity. This means better backups.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hyper-V backup in a CSV environment<\/h2>\n\n\n\n<p>Cluster Share Volume (CSV) is Microsoft\u2019s implementation of server clustering, and designed for use with Hyper-V. CSV provides a shared disk that can be used by any guest in the cluster. This means a guest can be moved within the disk cluster, and guests can share the same physical disk. This improves flexibility and helps to provide seamless operation in the event of a system or hardware problem.<\/p>\n\n\n\n<p>When stored in a CSV, a guests files present as a shared resource between the hosts. As the CSV&#8217;s files are shared, access must be coordinated so that only one host accesses a guest&#8217;s files at a time.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image1.png\" alt=\"Hyper-V in a CSV environment\" width=\"314\" \/><\/a><figcaption> Two hosts in a CSV cluster <\/figcaption><\/figure>\n\n\n\n<p><strong>This diagram<\/strong>&nbsp;depicts a configuration with a small cluster of two hosts with a single virtual machine, which may fail-over at any time from Host 1 to 2. This virtual machine will only be active on a single host at any time &#8211; referred to as the&nbsp;<em>active node<\/em>. The other node is called the&nbsp;<em>passive node<\/em>. Other virtual machines added to the cluster may be active on either host at any point in time.<\/p>\n\n\n\n<p><strong>Backuping up a CSV environment:<\/strong><\/p>\n\n\n\n<p>Because a backup of a CSV must be coordinated, BackupAssist jobs on each host must have their start times staggered. The scheduled start time of the jobs on each host must be set at least 5 minutes apart. This allows BackupAssist time to initialize and coordinate its access to the CSV. BackupAssist will delay the second job so that it will not commence until the first job has completed.<\/p>\n\n\n\n<p><strong>CSV backup considerations:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>BackupAssist v9 and later supports Hyper-V CSV on both Windows Server 2008R2 and 2012 R1\/R2 machines.<\/li><li>During the backup process, the guests are copied to an intermediate staging area, from where they are backed up into a single image. The staging disk acts as a cache for the backup job.<\/li><li>The staging disk must be a local disk and it is overwritten each time a backup is run.<\/li><li>The staging disk must be able to hold every guest being backed up from all CSVs used to store the guests\u2019 files (a copy of every file). The staging disk must be used for this purpose only.<\/li><li>When a fail-over or migration occurs, one or more of the virtual machines will no longer be active on the original host. Therefore,&nbsp;BackupAssist must be installed and licensed on each host.<\/li><\/ul>\n\n\n\n<p><strong>Restoring to a CSV environment<\/strong><\/p>\n\n\n\n<p>When a guest is successfully restored to a Hyper-V cluster (CSV), it will become available on the Hyper-V machine that it was restored to.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If the restore replaces the existing guest, the CSV settings will be retained and the guest will be added back to the cluster.<\/li><li>If the restore does not replace the existing guest, the CSV setting will need to be manually configured to add the guest to the cluster.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Hyper-V tab<\/h2>\n\n\n\n<p>When you install BackupAssist on a server with the Hyper-V role installed, a Hyper-V tab will appear. The tab lists all guests on the server, including those without BackupAssist. At a glance, you can see what guests are active, what guests are being backed up and when the last successful backup ran. You can also begin a granular restore or a guest recovery.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hyper-V tab columns<\/h3>\n\n\n\n<p>The Hyper-V tab lists all of the guests on the Hyper-V host, and uses columns to provide information about the guests. You can sort the guests by selecting a columns\u2019 heading.<\/p>\n\n\n\n<p>The&nbsp;<strong>Name<\/strong>&nbsp;column displays the name of the guest. To the left of the name are two icon columns. One column shows if the guest has an error, alert or warning, the other column, the guest\u2019s configuration. The configuration icon will indicate if the guest uses CSV and if it is running an Exchange Server.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-tab-icons.png\" alt=\"Hyper-V guest information\" \/><\/figure>\n\n\n\n<p>The&nbsp;<strong>Status<\/strong>&nbsp;column shows if a guest is running, backing up, saved, paused or off. Guests can be started and stopped using the Microsoft Hyper-V Manager.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-tab.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-tab.png\" alt=\"BackupAssist's Hyper-V tab\" \/><\/a><figcaption> Hyper-V monitoring tab <\/figcaption><\/figure>\n\n\n\n<p>The&nbsp;<strong>Size<\/strong>&nbsp;column shows the total size of the guest\u2019s virtual disk and configuration files, on the host.<\/p>\n\n\n\n<p>The&nbsp;<strong>Backups<\/strong>&nbsp;column shows the results of the last 5 backups. The icons indicate if the backup was successful, had a warning or failed. Mouse over an icon to display any warnings, errors or messages.<\/p>\n\n\n\n<p>The&nbsp;<strong>available<\/strong>&nbsp;column shows how many backups are available for restoring to the guest, and the&nbsp;<strong>last successful<\/strong>&nbsp;column shows when the last successful backup job ran.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Guest details view<\/h3>\n\n\n\n<p>When you select a guest, a details panel will display guest information at the bottom of the tab. The information provided includes links to the backup jobs configured for that guest, and the results of recent backups. The results are displayed as icons below the relevant backup job.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-tab-panel.png\" alt=\"Guest details view\" \/><\/figure>\n\n\n\n<p>Selecting the job\u2019s result icon will open the backup report for that backup.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hyper-V Tab menu<\/h3>\n\n\n\n<p>The Hyper-V Tab\u2019s menu can be used to access BackupAssist\u2019s guest restore and guest recovery tools.<\/p>\n\n\n\n<p><strong>Granular Guest Restore<\/strong><\/p>\n\n\n\n<p>This button starts the guided restore process for the selected guest. This process will use the&nbsp;<em>Integrated Restore Console&nbsp;<\/em>to restore files and folders from inside the guest. Hyper-V Granular Restore can also be accessed from the BackupAssist Restore tab.<br>Granular Guest Restoreis a licensed feature that requires the&nbsp;<em>Hyper-V Advanced<\/em>&nbsp;add-on.<\/p>\n\n\n\n<p><strong>Full VM Recovery<\/strong><\/p>\n\n\n\n<p>This button will take you directly into the&nbsp;<em>Full VM Recovery<\/em>&nbsp;process with the highlighted guest already selected. The Full VM Recovery console will be used to recover the guest to the current host.&nbsp;<em>Full VM Recovery<\/em>&nbsp;can also be accessed from the BackupAssist Recovery tab.<\/p>\n\n\n\n<p>You can perform a Full VM Recovery of both a normal VM and a Rapidly Recovered VM. To learn more about these options, see the BackupAssist&nbsp;<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/recover\/rapid-vm-recovery.htm\" target=\"_blank\">Rapid-VM Recovery guide<\/a><\/p>\n\n\n\n<p><em>Full VM Recovery<\/em>&nbsp;is included in the base BackupAssist license.<\/p>\n\n\n\n<p><strong>Rapid VM Recovery<\/strong><\/p>\n\n\n\n<p>This button starts a&nbsp;<em>Rapid VM Recovery<\/em>, which will use the current Hyper-V host to run a guest from its backup. This means if the guest that was backed up becomes unavailable, the backup can be used to resume that guest\u2019s functions within seconds, while a recovery of the guest is planned and scheduled.<\/p>\n\n\n\n<p>When you select the&nbsp;<em>Rapid VM Recovery<\/em>&nbsp;button, you will be asked to confirm if you want to proceed with a&nbsp;<em>Rapid VM Recovery<\/em>&nbsp;for the selected guest.<\/p>\n\n\n\n<p><em>Rapid VM Recovery<\/em>&nbsp;is a licensed feature that requires the Hyper-V Advanced add-on.<\/p>\n\n\n\n<p><strong>Discard Rapid VM<\/strong><\/p>\n\n\n\n<p>This will stop a Rapidly Recovered VM, discard any changes made to the guest\u2019s data since it was rapidly recovered, and remove the guest instance from the Hyper-V Manager.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hyper-V Backup <\/h2>\n\n\n\n<p>You can learn how to create a Hyper-V backup using System Protection on our step-by-step <a rel=\"noreferrer noopener\" aria-label=\"Hyper-V backups page (opens in a new tab)\" href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/backup\/hyper-v-backups.htm\" target=\"_blank\">Hyper-V backups page<\/a>.<\/p>\n\n\n\n<p>When you use BackupAssist System Protection to create a Hyper-V backup job, you will be presented with some Hyper-V specific setup screens, as described in this section.<\/p>\n\n\n\n<p><strong>Hyper-V Data Selections<\/strong>&nbsp;<strong>screen<\/strong>&nbsp;makes it easier to select Hyper-V guests and guest configuration files for Application consistent guest only backups, as well as full host backups.<\/p>\n\n\n\n<p>There will also be an <strong>Exchange VM Detection<\/strong> steps that is used to provide authentication information for that guest. With this information, BackupAssist can see what guest contains the Exchange Server, even if it is on a different domain to the host. BackupAssist can then create a backup catalogue of the Exchange Server\u2019s EDB files that the Exchange Granular Restore Add-on can use to perform a granular restore.<\/p>\n\n\n\n<p>When you create a Hyper-V backup, all active Hyper-V guests and their host will be detected and displayed for selection.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-exchange-vm-detection.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-exchange-vm-detection.png\" alt=\"Exchange VM detection step\" \/><\/a><\/figure>\n\n\n\n<p>If more than one guest has an Exchange Server, then each guest with an Exchange Server should be on the same domain, and accessible using the same account. This account\u2019s username, password and domain is entered in the Exchange VM detection screen.<\/p>\n\n\n\n<p>A granular restore of Exchange data from a Hyper-V guest, requires both&nbsp;<em>Hyper-V Granular Restore Add-on<\/em>&nbsp;(which will run automatically as part of the restore) and the&nbsp;<em>Exchange Granular Restore Add-on<\/em>&nbsp;licenses.<\/p>\n\n\n\n<p>If you are using a <strong>clustered shared volume (CSV)<\/strong>, there will be a Hyper-V CSV step that is used to configure an intermediate backup location, called a staging disk. System Protection uses the staging disk to put the Hyper-V host and its guests into a single image backup (VHD file), even if they are on different volumes.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-csv-configuration.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/hyperv-csv-configuration.png\" alt=\"Hyper-V CSV options\" \/><\/a><\/figure>\n\n\n\n<p>Hyper-V CSV staging disk considerations:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The intermediate backup&#8217;s location must be a local disk.<\/li><li>The intermediate backup&#8217;s disk is overwritten each time a backup is run.<\/li><li>The image backup is taken from the whole staging disk.<\/li><li>The staging drives available and the Backup destination shown are based on the selections made during the Set up destination step.<\/li><\/ul>\n\n\n\n<p>If you have selected&nbsp;<strong>BitLocker encryption,&nbsp;<\/strong>use the&nbsp;<strong>prepare&nbsp;<\/strong>media button to indicate what drives are to be encrypted. The encryption process will be initiated by the final backup job creation step.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hyper-V restore<\/h2>\n\n\n\n<p>BackupAssist\u2019s Restore tab displays two restore options for Hyper-V:&nbsp;<strong>Hyper-V Host Files<\/strong>&nbsp;and<strong>&nbsp;Hyper-V Granular Restore<\/strong>. <\/p>\n\n\n\n<p>The<strong>&nbsp;Hyper-V Host Files<\/strong>&nbsp;restore option allows you to restore files and folders from the Hyper-V host to their original location or a new location.&nbsp;<strong>Hyper-V Host Files<\/strong>&nbsp;comes with the BackupAssist base license.<\/p>\n\n\n\n<p><strong>Hyper-V Granular Restore<\/strong>&nbsp;allows you to restore individual files from a guest using a Hyper-V backup of one or more guests.&nbsp;<strong>Hyper-V Granular Restore<\/strong>&nbsp;requires the Hyper-V Advanced add-on license.<\/p>\n\n\n\n<p>You can also restore mail items from an Exchange Server installed on a Hyper-V guest by using both the Exchange Granular Add-on and the Hyper-V Advanced Add-on. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hyper-V recovery<\/h2>\n\n\n\n<p>BackupAssist can be used to perform a full VM recovery and a Rapid VM recovery<\/p>\n\n\n\n<p><strong>Full VM Recovery<\/strong><\/p>\n\n\n\n<p>A Full VM Recovery uses a backup of a guest to recover that guest to a Hyper-V host. This will return the guest and its operating system, applications, data and services, to a previous working state. You can recover the guest to its original location, overwriting the existing guest, or to a different location on the host. You can also recover the guest\u2019s VHD (virtual hard drive) to a different Hyper-V host and use that VHD to create a new guest.<\/p>\n\n\n\n<p> <strong>Rapid VM Recovery<\/strong><\/p>\n\n\n\n<p>A Rapid VM Recovery runs a guest on its backup destination, and the Hyper-V host treats that guest as a regular guest. A Rapid VM Recovery can be performed in just a few minutes so that the critical functions performed by the guest can be resumed with minimal interruption. This temporary solution provides business continuity until a suitable time can be found to perform a Full VM Recovery, which could take many hours.<\/p>\n\n\n\n<p>Rapid VM Recovery is part of the&nbsp;Hyper-V Advanced add-on<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Hyper-V Config Reporter<\/h2>\n\n\n\n<p>Best practice backup standards require you to document the configurations of every important server so you can recreate or reconfigure it in the event of a major disaster. With Hyper-V, if you need to migrate a guest machine from one host to another, or restore a guest to a new host, you need the configuration settings of the relevant guest(s) so you can manually create new guest machines that match the original configuration.<\/p>\n\n\n\n<p>To fully document the setup of a Hyper-V Server, you need to include the setup of each guest machine and the configuration of the host. The BackupAssist Hyper-V Config Reporter (included with the Hyper-V Granular Restore Add-on ) simplifies and automates this task by creating an HTML report of the configuration settings for each Hyper-V guest VM, and the Hyper-V host settings. The report contains everything needed to recreate the host, migrate a guest from one host to another, or restore a guest to a new host.<\/p>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;System Protection backup reports contain a Recovery options section, which explains the BIOS, EFI and Hyper-V guest recovery options available for each System Protection backup.<\/p>\n\n\n\n<p>To generate a report using the Hyper-V Config Reporter:<\/p>\n\n\n\n<p>1. Run the Hyper-V Config Reporter from the Windows Start Menu on the Hyper-V host machine.<\/p>\n\n\n\n<p>The Hyper-V Config Reporter will display a list of guests configured on the Hyper-V host.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image11.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image11.png\" alt=\"Hyper-V Config Reporter\" \/><\/a><figcaption> Hyper-V Config Reporter &#8211; guest selection <\/figcaption><\/figure>\n\n\n\n<p><strong>2.&nbsp;<\/strong>To generate a report of your guest VM settings, select the individual guest from the list that you want, and click&nbsp;<strong>Generate Report.<\/strong><\/p>\n\n\n\n<p>Check&nbsp;<strong>Include Host Security Report<\/strong>&nbsp;if you want the report to include security and access settings that have been configured on the actual Hyper-V host.<\/p>\n\n\n\n<p>3. A HTML report will then be created and displayed in a new window.<\/p>\n\n\n\n<p>You can use the buttons at the top of the Hyper-V Config Reporter window to either print a copy of the report, save the report to a HTML file that can be opened with a web browser, or close the report window.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image12.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image12.png\" alt=\"Hyper-V Configuration report\" \/><\/a><figcaption>Configuration report<\/figcaption><\/figure>\n\n\n\n<p>At the top of the report, as shown below, is a list of all the guest VMs selected during the previous step. If you click the Virtual Machine Name link of any guest in the list you will be directed to a list of settings for the latest running configuration for that guest VM.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image13.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image13.png\" alt=\"Hyper-V Configuration report\" \/><\/a><\/figure>\n\n\n\n<p>Under the list are details of each VM and its associated snapshots. You can click the link for any available snapshot to view the specific settings associated with that snapshot. Each VM included in the report will contain a full description of the VM settings for the latest running configuration at the top, and then a list of any further snapshots available underneath that, in date order.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image14.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/education\/v9\/backupassist\/hyper-v_system_protection_whitepaper_files\/image14.png\" alt=\"Hyper-V Configuration report Role definitions\" \/><\/a><figcaption>Role definitions<\/figcaption><\/figure>\n\n\n\n<p>The Host Security Report will be located at the very bottom of the overall report.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This guide explains how to create reliable, best practice Hyper-V backup of your Hyper-V Server using BackupAssist System Protection. File Protection and File Archiving can also be used to back up Hyper-V environments, but System Protection is our recommended backup type for Hyper-V because it supports: Customized Hyper-V destination, CSV and Exchange Server detection steps &#8230; <a title=\"Hyper-V backup best practice guide\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\">Read more <span class=\"screen-reader-text\">Hyper-V backup best practice guide<\/span><\/a><\/p>\n","protected":false},"author":13,"featured_media":13831,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,760],"tags":[],"class_list":["post-13588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","category-legacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hyper-V backup best practice guide - Cyber Resilience Blog<\/title>\n<meta name=\"description\" content=\"BackupAssist&#039;s comprehensive guide to Windows Hyper-V backups. Protect your VMS using a System Protection Hyper-V backup and the Hyper-V Advanced Add-on.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hyper-V backup best practice guide - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"BackupAssist&#039;s comprehensive guide to Windows Hyper-V backups. Protect your VMS using a System Protection Hyper-V backup and the Hyper-V Advanced Add-on.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-13T05:02:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-14T05:20:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"Hyper-V backup best practice guide\",\"datePublished\":\"2017-11-13T05:02:08+00:00\",\"dateModified\":\"2019-11-14T05:20:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\"},\"wordCount\":3732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"articleSection\":{\"1\":\"Z-Legacy\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\",\"url\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\",\"name\":\"Hyper-V backup best practice guide - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"datePublished\":\"2017-11-13T05:02:08+00:00\",\"dateModified\":\"2019-11-14T05:20:22+00:00\",\"description\":\"BackupAssist's comprehensive guide to Windows Hyper-V backups. Protect your VMS using a System Protection Hyper-V backup and the Hyper-V Advanced Add-on.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"width\":842,\"height\":596},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hyper-V backup best practice guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hyper-V backup best practice guide - Cyber Resilience Blog","description":"BackupAssist's comprehensive guide to Windows Hyper-V backups. Protect your VMS using a System Protection Hyper-V backup and the Hyper-V Advanced Add-on.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide","og_locale":"en_US","og_type":"article","og_title":"Hyper-V backup best practice guide - Cyber Resilience Blog","og_description":"BackupAssist's comprehensive guide to Windows Hyper-V backups. Protect your VMS using a System Protection Hyper-V backup and the Hyper-V Advanced Add-on.","og_url":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide","og_site_name":"Cyber Resilience Blog","article_published_time":"2017-11-13T05:02:08+00:00","article_modified_time":"2019-11-14T05:20:22+00:00","og_image":[{"width":842,"height":596,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","type":"image\/png"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"Hyper-V backup best practice guide","datePublished":"2017-11-13T05:02:08+00:00","dateModified":"2019-11-14T05:20:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide"},"wordCount":3732,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","articleSection":{"1":"Z-Legacy"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide","url":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide","name":"Hyper-V backup best practice guide - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","datePublished":"2017-11-13T05:02:08+00:00","dateModified":"2019-11-14T05:20:22+00:00","description":"BackupAssist's comprehensive guide to Windows Hyper-V backups. Protect your VMS using a System Protection Hyper-V backup and the Hyper-V Advanced Add-on.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","width":842,"height":596},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/hyper-v-backup-best-practice-guide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Hyper-V backup best practice guide"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/13588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=13588"}],"version-history":[{"count":20,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/13588\/revisions"}],"predecessor-version":[{"id":14277,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/13588\/revisions\/14277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/13831"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=13588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=13588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=13588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}