{"id":15854,"date":"2020-05-19T05:36:03","date_gmt":"2020-05-19T05:36:03","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=15854"},"modified":"2020-05-20T01:53:13","modified_gmt":"2020-05-20T01:53:13","slug":"extreme-recovery-windows-surface-mac","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac","title":{"rendered":"BackupAssist ER Challenge<br\/>Scenario 4 &#8211; <b>The Extreme Recovery<\/b>"},"content":{"rendered":"\n<p>This final recovery scenario is&nbsp;a bit of fun,&nbsp;designed to show off your&nbsp;creativity and push the boundaries of what\u2019s possible.&nbsp;We want to see what recoveries can be achieved&nbsp;with some \u201cout of the box\u201d thinking.&nbsp;<\/p>\n\n\n\n<p>So,&nbsp;we know that&nbsp;there are three main pathways for recovery, as you\u2019ve seen in the previous recovery challenges.&nbsp;<\/p>\n\n\n\n<p>What else can we do?&nbsp;&nbsp;<\/p>\n\n\n\n<p>That\u2019s why we created an \u201cExtreme\u201d category \u2013 for anyone who can use non-standard methods to do a successful recovery.&nbsp;<\/p>\n\n\n\n<p>What can be considered extreme?&nbsp;It\u2019s up to the creativity of each challenger!&nbsp;My definition is something that\u2019s \u201coff the beaten&nbsp;path\u201d, such as a combination of:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Hardware that\u2019s not normally considered for&nbsp;running a&nbsp;Windows platform&nbsp;(e.g. a Mac)&nbsp;<\/li><li>Using a&nbsp;hypervisor that\u2019s not from Microsoft&nbsp;\u2013&nbsp;such as VMware or VirtualBox&nbsp;<\/li><li>Running on a host operating system other than Windows (MacOS or Linux)&nbsp;<\/li><li>Using backup hardware exposed through different interfaces&nbsp;\u2013 e.g. you back up via&nbsp;NAS, but&nbsp;recover via USB.&nbsp;<\/li><\/ol>\n\n\n\n<p>Contents&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#how-did-I-do-in-the-challenge\">How did I do in the challenge?&nbsp;<\/a><\/li><li><a href=\"#My-test-setup\">My test setup&nbsp;<\/a><\/li><li><a href=\"#How-to-do-it\">How to do it&nbsp;<\/a><\/li><li><a href=\"#My-experiences\">My experiences&nbsp;and observations&nbsp;<\/a><\/li><li><a href=\"#Performance-analysis\">Performance analysis&nbsp;<\/a><\/li><li><a href=\"#Conclusion\">Conclusion<\/a>&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-did-I-do-in-the-challenge\">How did I do&nbsp;in the challenge?&nbsp;<\/h2>\n\n\n\n<p>By the time I did this challenge, I had already done a few recoveries, so I had got my times down&nbsp;to a minimum.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;\">\n  <tbody>\n   <tr>\n    <td style=\"width:75%;border:1px solid white;background:#193a66;color:white;\"><b>Task<\/b><\/td>\n    <td style=\"border:1px solid white;background:#193a66;color:white;\"><b>Duration<\/b><\/td>\n   <\/tr>\n\n   <tr>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;\"><b>Hands-on with BackupAssist ER<\/b><br>&#8211; Creating a bootable Lifeline Media ISO<br>&#8211; Booting the Lifeline Media, and starting the recovery<\/td>\n    <td style=\"border:1px solid white;background:#C1E9F7;color:#193a66;\">2 min 40 sec<\/td>\n   <\/tr>\n\n   <tr>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;\"><b>Waiting time <\/b><br>&#8211; Waiting for Lifeline Media to be created<br>&#8211; Waiting for data to be copied from backup to the recovery machine.<br>&#8211; Waiting for the recovery machine to boot and detect new hardware, and get to the login screen. <\/td>\n    <td style=\"border:1px solid white;background:#C1E9F7;color:#193a66;\">22 min 37 sec<\/td>\n   <\/tr>\n\n   <tr>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;\"><b>Total time&nbsp;<\/b><\/td>\n    <td style=\"border:1px solid white;background:#C1E9F7;color:#193a66;\"><b>25 min 17 sec<\/b><\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<p>For the&nbsp;BackupAssist&nbsp;ER Challenge&nbsp;Leaderboard, my hands-on time is&nbsp;2&nbsp;minutes and&nbsp;40&nbsp;seconds.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s the video of me doing it:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"BackupAssist ER Challenge Scenario 4 \u2013 The Extreme Recovery to Mac in less than 3 minutes\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/1gSbu2D9rtk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"My-test-setup\">My test setup&nbsp;<\/h2>\n\n\n\n<p>My extreme recovery was to&nbsp;an Apple MacBook Pro.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;\">\n  <tbody>\n   <tr>\n    <td style=\"width:50%;border:1px solid white;background:#193a66;color:white;\"><b>Equipment<\/b><\/td>\n    <td style=\"border:1px solid white;background:#193a66;color:white;\"><b>Brand \/ model <\/b><\/td>\n   <\/tr>\n   <tr>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;\">Original machine backed up<\/td>\n    <td style=\"border:1px solid white;background:#C1E9F7;color:#193a66;\">Microsoft Surface Pro 4 (from 2015)<br>Intel Core m3-6Y30 CPU @ 0.90GHz<br>4GB RAM. Windows 10, 64-bit OS<\/td>\n   <\/tr>\n   <tr>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;\">Local backup disk<\/td>\n    <td style=\"border:1px solid white;background:#C1E9F7;color:#193a66;\">Intel SSD 520 Series 180GB (from 2012)<br>Connected via USB 3.0 enclosure, ADATA XPG\n<\/td>\n   <\/tr>\n   <tr>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;\">Recovery machine \u2013 P2V recovery<\/td>\n    <td style=\"border:1px solid white;background:#C1E9F7;color:#193a66;\">Apple MacBook Pro 2016, 15 inch<br>16 GB 2133 MHz LPDDR3<br>2.7 GHz Intel Core i7<br>VMWare Fusion 11.1 <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<p>I felt it was a good test of:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>VMware virtual hardware&nbsp;\u2013 would it boot&nbsp;the Lifeline&nbsp;Recovery ISO properly? Will the recovered Guest machine run properly&nbsp;with VMware virtual hardware?&nbsp;<\/li><li>Using an NTFS backup disk on a Mac. Mac only enables read-only ability on NTFS. Would this cause any issues?&nbsp;<\/li><li>Would there be any issues mapping the backup disk through to the Guest, via&nbsp;a&nbsp;USB pass through?&nbsp;<\/li><\/ul>\n\n\n\n<p>Under the hood:&nbsp;a&nbsp;Bare Metal Recovery on a different platform&nbsp;<\/p>\n\n\n\n<p>After setting myself this challenge, I&nbsp;did a little research to find out whether I could do a Local VM Instant Boot, or whether&nbsp;it would have to be a Bare Metal Recovery.&nbsp;<\/p>\n\n\n\n<p>VMware Fusion is not able to use the VHDX file format.&nbsp;So,&nbsp;the option of VM Instant Boot was off the table.&nbsp;However, in theory, the full Bare Metal Recovery should still be possible, just as if I were recovering to a physical machine.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"How-to-do-it\">How to do it&nbsp;<\/h2>\n\n\n\n<p>I decided to create Lifeline Recovery Media on an ISO, so I could attach that ISO to the VMware Guest&nbsp;and boot it, to kick start the recovery.&nbsp;<\/p>\n\n\n\n<p>The trick is to copy the ISO onto the Mac\u2019s filesystem and attach it to the Guest from there. I found (out&nbsp;the hard way) that if you have the ISO on the backup disk and attach it from the backup disk, it means you will not be able to subsequently map the backup disk to the Guest via USB.&nbsp;<\/p>\n\n\n\n<p>The rest of this recovery follows ordinary&nbsp;BMR instructions, as documented&nbsp;<a href=\"https:\/\/www.backupassist.com\/er\/documentation\/recover\/bare-metal-recoveries.htm\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"My-experiences\">My experiences&nbsp;<\/h2>\n\n\n\n<p>I&nbsp;actually did&nbsp;the recovery twice. What you see in the video&nbsp;is my second attempt, where I was able to connect the disk via&nbsp;a&nbsp;USB pass-through.&nbsp;The whole process was remarkably simple. There are absolutely no hiccups \u2013 it was so&nbsp;easy,&nbsp;in retrospect it didn\u2019t seem extreme at all! I&nbsp;was hoping to exercise my I.T. prowess by doing something&nbsp;fancy, and&nbsp;was disappointed.&nbsp;<\/p>\n\n\n\n<p>However, the first recovery I attempted was the opposite. I made the mistake of attaching the Lifeline Media ISO from the backup disk itself \u2013 something I did not realize until much later.&nbsp;I tried grappling with mapping the USB disk to the guest \u2013 something that I was ultimately unable to do.&nbsp;After 9 minutes, I admitted defeat\u2026 and then had another idea \u2013 keep the backup disk connected to the host, and then expose&nbsp;it via a Network Share from the host to the guest, using Apple File Sharing. That ended up working, but my hands-on time&nbsp;blew out to nearly 18 minutes.&nbsp;<\/p>\n\n\n\n<p>If I get time in the future, I\u2019ll document my experiences on that run, and compare&nbsp;the two. Without a doubt, USB pass-through may fail so it\u2019s nice to have a fallback method for exposing the backup to the Guest.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Performance-analysis\">Performance analysis&nbsp;<\/h2>\n\n\n\n<p>It\u2019s interesting to compare the time taken&nbsp;for this P2V VMware Fusion Guest BMR, against the P2P Intel Nuc that I did earlier. Let\u2019s see how things stack up:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;\">\n  <tbody>\n   <tr>\n    <td><\/td>\n    <td style=\"width:30%;border:1px solid white;background:#193a66;color:white;text-align:center;\"><b>P2V VMware Fusion (Mac)<\/b><\/td><td style=\"width:30%;border:1px solid white;background:#193a66;color:white;text-align:center;\"><b>P2P Intel NUC<\/b><\/td>\n   <\/tr>\n\n\n   <tr>\n    <td style=\"width:40%;border:1px solid white;background:#193a66;color:white;\"><b>Create the Lifeline Media on ISO<\/b><\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">1 minutes 6 seconds<\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">1 minute 18 seconds<\/td>\n   <\/tr>\n\n\n\n   <tr>\n    <td style=\"width:40%;border:1px solid white;background:#193a66;color:white;\"><b>Boot the Lifeline Media<\/b><\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">35 seconds<\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">45 seconds<\/td>\n   <\/tr>\n\n   <tr>\n    <td style=\"width:40%;border:1px solid white;background:#193a66;color:white;\"><b>Data transfer (re-image the disk)<\/b><\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">23 minutes 28 seconds<\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">5 minutes 33 seconds<\/td>\n   <\/tr>\n\n   <tr>\n    <td style=\"width:40%;border:1px solid white;background:#193a66;color:white;\"><b>Reboot, detect new hardware, and get to login screen<\/b><\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">1 minute 52 seconds<\/td>\n    <td style=\"border:1px solid white;background:#aed0f4;color:#193a66;text-align:center;\">1 minute 6 seconds<\/td>\n   <\/tr>\n\n\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<p>It\u2019s quite clear that the first two operations are faster on my P2V recovery \u2013 most likely due to the fact that my ISO created on and run from a&nbsp;solid state&nbsp;drive, whereas the P2P used a USB Flash Drive.&nbsp;<\/p>\n\n\n\n<p>What was unexpected is how much slower the data transfer was.&nbsp;<\/p>\n\n\n\n<p>Given the backup VHDX file size of\u202f50,138,331,579 bytes, the recovery speed&nbsp;was therefore\u202f35,609,610&nbsp;bytes per second, or&nbsp;<strong>35.6&nbsp;MB\/s<\/strong>.&nbsp;<\/p>\n\n\n\n<p>In contrast, the P2P recovery ran at\u202f<strong>150.6\u202fMB\/s.<\/strong>\u202f&nbsp;<\/p>\n\n\n\n<p>I conclude that the USB pass-through is very slow&nbsp;in VMware Fusion&nbsp;in comparison to native.&nbsp;This is a useful finding to know&nbsp;for the future.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Conclusion\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>The challenge was&nbsp;easier to do than I expected. It was pleasing that the recovery was successful, as would be expected from a \u201cRecover Anywhere\u201d product.&nbsp;<\/p>\n\n\n\n<p>There are so many other extreme recoveries that are possible, I look forward to hearing about your\u00a0adventures!\u00a0<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Related Articles<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc.jpg\" alt=\"\" class=\"wp-image-16023\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption><a href=\"https:\/\/www.backupassist.com\/blog\/2020-ba-cyber-resilience-champion\">Who will be the 2020 BA Cyber-Resilience Champion?<\/a><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_bcp.jpg\" alt=\"\" class=\"wp-image-16018\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_bcp.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_bcp-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption><a href=\"https:\/\/www.backupassist.com\/blog\/vm-instant-boot-recovery\"><\/a><a href=\"https:\/\/www.backupassist.com\/blog\/disk-disk-cloud-backup\">BackupAssist ER Challenge<br><strong>The Disk-To-Disk-To-Cloud Backup<\/strong><\/a><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-1.jpg\" alt=\"\" class=\"wp-image-16019\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-1.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-1-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption><a href=\"https:\/\/www.backupassist.com\/blog\/bare-metal-recovery-bmr\"><\/a><a href=\"https:\/\/www.backupassist.com\/blog\/vm-instant-boot-recovery\">BackupAssist ER Challenge<br>Scenario 1 \u2013&nbsp;<strong>The Local VM Instant Boot Recovery<\/strong><\/a><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-2.jpg\" alt=\"\" class=\"wp-image-16020\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-2.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-2-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption><a href=\"https:\/\/www.backupassist.com\/blog\/cloud-virtual-machine-disaster-recovery-vmdr\"><\/a><a href=\"https:\/\/www.backupassist.com\/blog\/cloud-virtual-machine-disaster-recovery-vmdr\"><\/a><a href=\"https:\/\/www.backupassist.com\/blog\/bare-metal-recovery-bmr\">BackupAssist ER Challenge<br>Scenario 2 \u2013&nbsp;<strong>The Full Bare Metal Recovery<\/strong><\/a><\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-3.jpg\" alt=\"\" class=\"wp-image-16021\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-3.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/tiles_erc-3-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption><a href=\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\"><a href=\"https:\/\/www.backupassist.com\/blog\/cloud-virtual-machine-disaster-recovery-vmdr\">BackupAssist ER Challenge<br>Scenario 3 \u2013\u00a0<strong>The Cloud VM Disaster Recovery (VMDR)<\/strong><\/a><\/a><\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This final recovery scenario is a bit of fun, designed to show off your creativity and push the boundaries of what\u2019s possible. We want to see what recoveries can be achieved with some \u201cout of the box\u201d thinking. That\u2019s why we created an \u201cExtreme\u201d category \u2013 for anyone who can use non-standard methods to do a successful recovery. <\/p>\n","protected":false},"author":17,"featured_media":15927,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[767,764,757,4,95,22,16],"tags":[],"class_list":["post-15854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-er","category-best-practices","category-cyber-resilience","category-dev","category-guides","category-interest","category-releases"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BackupAssist ER ChallengeScenario 4 - The Extreme Recovery - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BackupAssist ER ChallengeScenario 4 - The Extreme Recovery - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"This final recovery scenario is a bit of fun, designed to show off your creativity and push the boundaries of what\u2019s possible. We want to see what recoveries can be achieved with some \u201cout of the box\u201d thinking. That\u2019s why we created an \u201cExtreme\u201d category \u2013 for anyone who can use non-standard methods to do a successful recovery.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T05:36:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-20T01:53:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"545\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"BackupAssist ER Challenge Scenario 4 &#8211; The Extreme Recovery\",\"datePublished\":\"2020-05-19T05:36:03+00:00\",\"dateModified\":\"2020-05-20T01:53:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\"},\"wordCount\":1269,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg\",\"articleSection\":[\"BackupAssist ER\",\"Best practices\",\"Cyber Resilience\",\"Developer\",\"Guides\",\"Interest\",\"Product Releases\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\",\"url\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\",\"name\":\"BackupAssist ER Challenge Scenario 4 - The Extreme Recovery - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg\",\"datePublished\":\"2020-05-19T05:36:03+00:00\",\"dateModified\":\"2020-05-20T01:53:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg\",\"width\":1500,\"height\":545},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BackupAssist ER ChallengeScenario 4 &#8211; The Extreme Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BackupAssist ER ChallengeScenario 4 - The Extreme Recovery - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac","og_locale":"en_US","og_type":"article","og_title":"BackupAssist ER ChallengeScenario 4 - The Extreme Recovery - Cyber Resilience Blog","og_description":"This final recovery scenario is a bit of fun, designed to show off your creativity and push the boundaries of what\u2019s possible. We want to see what recoveries can be achieved with some \u201cout of the box\u201d thinking. That\u2019s why we created an \u201cExtreme\u201d category \u2013 for anyone who can use non-standard methods to do a successful recovery.","og_url":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac","og_site_name":"Cyber Resilience Blog","article_published_time":"2020-05-19T05:36:03+00:00","article_modified_time":"2020-05-20T01:53:13+00:00","og_image":[{"width":1500,"height":545,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"BackupAssist ER Challenge Scenario 4 &#8211; The Extreme Recovery","datePublished":"2020-05-19T05:36:03+00:00","dateModified":"2020-05-20T01:53:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac"},"wordCount":1269,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg","articleSection":["BackupAssist ER","Best practices","Cyber Resilience","Developer","Guides","Interest","Product Releases"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac","url":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac","name":"BackupAssist ER Challenge Scenario 4 - The Extreme Recovery - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg","datePublished":"2020-05-19T05:36:03+00:00","dateModified":"2020-05-20T01:53:13+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-extreme-recovery.jpg","width":1500,"height":545},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/extreme-recovery-windows-surface-mac#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"BackupAssist ER ChallengeScenario 4 &#8211; The Extreme Recovery"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=15854"}],"version-history":[{"count":29,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15854\/revisions"}],"predecessor-version":[{"id":16035,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15854\/revisions\/16035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/15927"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=15854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=15854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=15854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}