<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">Virtualization &amp; VM Backup</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup.feed</id>
	<updated>2026-04-11T12:45:40+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup.feed?type=atom"/>
	<entry>
		<title>Ultimate Guide: Install Windows 11 on VMware ESXi – Easily Bypass TPM Security Requirement</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html"/>
		<published>2024-10-04T13:38:29+10:00</published>
		<updated>2024-10-04T13:38:29+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/virtualization-and-vm-backups/windows-11-esxi-tpm-bypass/intro-windows11-on-vmware-esxi.webp&quot; alt=&quot;Install Windows 11 on VMware ESXi&quot; width=&quot;501&quot; height=&quot;300&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/windows-11-esxi-tpm-bypass/01-intro-vmware-windows11-install.webp&quot; alt=&quot;Windows 11 Installation on VMware ESXi&quot; width=&quot;250&quot; height=&quot;140&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Windows 11 Installation on VMware ESXi&quot; /&gt;In this article, we’ll show you &lt;strong&gt;how to setup or install Microsoft Windows 11&lt;/strong&gt; on &lt;strong&gt;VMware’s ESXi&lt;/strong&gt; servers and bypass the &lt;strong&gt;Trusted Platform Module version 2.0&lt;/strong&gt; (&lt;strong&gt;TPM 2.0&lt;/strong&gt;) requirement. We've also made the&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/downloads/article-attachments/vmware-esxi-windows11-tpm-bypass.html&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;strong&gt;TPM bypass ISO&lt;/strong&gt; image&lt;/strong&gt;&lt;/a&gt; available as a free download.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html#vmware-esxi-tpm&quot;&gt;VMware ESXi – TPM – vTPM and Windows 11&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html#download-mount-tpm-iso&quot;&gt;Downloading &amp;amp; Mounting TPM Bypass Script (ISO)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html#summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download Free VM Backup Solution&quot;&gt;Download&lt;/a&gt; now your free copy of the latest &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download Free VM Backup Solution&quot;&gt;V9 VM backup&lt;/a&gt; now.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;vmware-esxi-tpm&quot;&gt;VMware ESXi – TPM – vTPM and Windows 11&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Trusted Platform Module version 2.0&lt;/strong&gt; (&lt;strong&gt;TPM 2.0&lt;/strong&gt;) is required to run Microsoft’s &lt;strong&gt;Windows 11&lt;/strong&gt;. This restricts the operating system’s installation on newer PCs, it also means users with older hardware are likely to be forced to upgrade. While the &lt;strong&gt;virtualization&lt;/strong&gt; world is often more forgiving when it comes to hardware requirements, trying to &lt;strong&gt;install Windows 11&lt;/strong&gt; on &lt;strong&gt;VMware’s ESXi &lt;/strong&gt;platform usually present the error: “&lt;strong&gt;&lt;em&gt;This PC can’t run Windows 11&lt;/em&gt;&lt;/strong&gt;”:&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/windows-11-esxi-tpm-bypass/01-this-pc-cant-run-win11-error.webp&quot; alt=&quot;Windows 11 Installation Error in VMware ESXi&quot; width=&quot;500&quot; height=&quot;269&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Windows 11 Installation Error in VMware ESXi&quot; /&gt;Windows 11 Installation Error in VMware ESXi&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Running &lt;strong&gt;Windows 11&lt;/strong&gt; as a &lt;strong&gt;virtual machine&lt;/strong&gt; on VMware ESXi requires a &lt;strong&gt;virtual Trusted Platform Module&lt;/strong&gt; (vTPM) present. For more details on &lt;strong&gt;Microsoft Windows 11 requirements&lt;/strong&gt; see,&amp;nbsp;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/whats-new/windows-11-requirements&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/whats-new/windows-11-requirements&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://docs.microsoft.com/en-us/windows/whats-new/windows-11-requirements&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While VMware supports &lt;strong&gt;vTPM&lt;/strong&gt; and doesn’t require a &lt;strong&gt;physical TPM 2.0 chip&lt;/strong&gt;, to use it, you need to configure a number of different services, depending on your VMware Platform version, including &lt;strong&gt;vCenter&lt;/strong&gt;, &lt;strong&gt;vSphere Native Key Provider&lt;/strong&gt; and more, making it a complicated task – especially for those running home labs. For more details see, &lt;a href=&quot;https://core.vmware.com/resource/windows-11-support-vsphere#section2&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://core.vmware.com/resource/windows-11-support-vsphere#section2&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://core.vmware.com/resource/windows-11-support-vsphere#section2&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The next steps will take you through downloading the &lt;strong&gt;TPM ISO image&lt;/strong&gt; used to &lt;strong&gt;bypass the Windows TPM check&lt;/strong&gt;.&lt;/p&gt;
</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/virtualization-and-vm-backups/windows-11-esxi-tpm-bypass/intro-windows11-on-vmware-esxi.webp&quot; alt=&quot;Install Windows 11 on VMware ESXi&quot; width=&quot;501&quot; height=&quot;300&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/windows-11-esxi-tpm-bypass/01-intro-vmware-windows11-install.webp&quot; alt=&quot;Windows 11 Installation on VMware ESXi&quot; width=&quot;250&quot; height=&quot;140&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Windows 11 Installation on VMware ESXi&quot; /&gt;In this article, we’ll show you &lt;strong&gt;how to setup or install Microsoft Windows 11&lt;/strong&gt; on &lt;strong&gt;VMware’s ESXi&lt;/strong&gt; servers and bypass the &lt;strong&gt;Trusted Platform Module version 2.0&lt;/strong&gt; (&lt;strong&gt;TPM 2.0&lt;/strong&gt;) requirement. We've also made the&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/downloads/article-attachments/vmware-esxi-windows11-tpm-bypass.html&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;strong&gt;TPM bypass ISO&lt;/strong&gt; image&lt;/strong&gt;&lt;/a&gt; available as a free download.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html#vmware-esxi-tpm&quot;&gt;VMware ESXi – TPM – vTPM and Windows 11&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html#download-mount-tpm-iso&quot;&gt;Downloading &amp;amp; Mounting TPM Bypass Script (ISO)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-install-windows11-vmware-esxi-without-tpm-security.html#summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download Free VM Backup Solution&quot;&gt;Download&lt;/a&gt; now your free copy of the latest &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download Free VM Backup Solution&quot;&gt;V9 VM backup&lt;/a&gt; now.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;vmware-esxi-tpm&quot;&gt;VMware ESXi – TPM – vTPM and Windows 11&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Trusted Platform Module version 2.0&lt;/strong&gt; (&lt;strong&gt;TPM 2.0&lt;/strong&gt;) is required to run Microsoft’s &lt;strong&gt;Windows 11&lt;/strong&gt;. This restricts the operating system’s installation on newer PCs, it also means users with older hardware are likely to be forced to upgrade. While the &lt;strong&gt;virtualization&lt;/strong&gt; world is often more forgiving when it comes to hardware requirements, trying to &lt;strong&gt;install Windows 11&lt;/strong&gt; on &lt;strong&gt;VMware’s ESXi &lt;/strong&gt;platform usually present the error: “&lt;strong&gt;&lt;em&gt;This PC can’t run Windows 11&lt;/em&gt;&lt;/strong&gt;”:&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/windows-11-esxi-tpm-bypass/01-this-pc-cant-run-win11-error.webp&quot; alt=&quot;Windows 11 Installation Error in VMware ESXi&quot; width=&quot;500&quot; height=&quot;269&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Windows 11 Installation Error in VMware ESXi&quot; /&gt;Windows 11 Installation Error in VMware ESXi&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Running &lt;strong&gt;Windows 11&lt;/strong&gt; as a &lt;strong&gt;virtual machine&lt;/strong&gt; on VMware ESXi requires a &lt;strong&gt;virtual Trusted Platform Module&lt;/strong&gt; (vTPM) present. For more details on &lt;strong&gt;Microsoft Windows 11 requirements&lt;/strong&gt; see,&amp;nbsp;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/whats-new/windows-11-requirements&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/whats-new/windows-11-requirements&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://docs.microsoft.com/en-us/windows/whats-new/windows-11-requirements&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While VMware supports &lt;strong&gt;vTPM&lt;/strong&gt; and doesn’t require a &lt;strong&gt;physical TPM 2.0 chip&lt;/strong&gt;, to use it, you need to configure a number of different services, depending on your VMware Platform version, including &lt;strong&gt;vCenter&lt;/strong&gt;, &lt;strong&gt;vSphere Native Key Provider&lt;/strong&gt; and more, making it a complicated task – especially for those running home labs. For more details see, &lt;a href=&quot;https://core.vmware.com/resource/windows-11-support-vsphere#section2&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://core.vmware.com/resource/windows-11-support-vsphere#section2&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://core.vmware.com/resource/windows-11-support-vsphere#section2&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The next steps will take you through downloading the &lt;strong&gt;TPM ISO image&lt;/strong&gt; used to &lt;strong&gt;bypass the Windows TPM check&lt;/strong&gt;.&lt;/p&gt;
</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>8 Critical Features to Have in a VM Backup Solution</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html"/>
		<published>2023-05-16T21:11:57+10:00</published>
		<updated>2023-05-16T21:11:57+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/virtualization-and-vm-backups/8-critical-features-for-vm-backup/vm-backup-key-features-intro.jpg&quot; alt=&quot;8 Key-Features of a VM Backup&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/8-critical-features-for-vm-backup/vm-backup-key-features-intro.jpg&quot; alt=&quot;vm backup key features&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vm backup key features&quot; /&gt;Businesses that rely on &lt;strong&gt;virtual machines&lt;/strong&gt; for their day-to-day operations should think twice about &lt;strong&gt;securing their infrastructure&lt;/strong&gt;. Modern use of virtual machines stems from the benefits of &lt;strong&gt;virtualization&lt;/strong&gt;, which include accessibility, &lt;strong&gt;reduced operating costs&lt;/strong&gt;, and &lt;strong&gt;flexibility&lt;/strong&gt;, among others. But your virtual infrastructure becomes obsolete without &lt;strong&gt;proper security&lt;/strong&gt;. One way to achieve that is through &lt;strong&gt;virtual machine backup&lt;/strong&gt; and &lt;strong&gt;recovery solutions&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;VM backups&lt;/a&gt; are &lt;strong&gt;crucial&lt;/strong&gt; for maintaining &lt;strong&gt;business continuity&lt;/strong&gt;. They help businesses &lt;strong&gt;prevent data loss&lt;/strong&gt; and offer a failsafe if something happens to your &lt;a href=&quot;https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html&quot; target=&quot;_blank&quot; title=&quot;Hyper-V Virtualization&quot;&gt;Hyper-V&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;VMware&quot;&gt;VMware&lt;/a&gt; virtual infrastructure. These services aren't uncommon. But knowing which one to choose depends on several factors. None are more important than the product's features, which directly impact your ability to keep the infrastructure running.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So that begs the question, what are the essential features of a &lt;strong&gt;VM backup software&lt;/strong&gt;? That's exactly what this short guide focuses on. So, let's dive in.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#ransomware-protection&quot; title=&quot;Ransomware Protection&quot;&gt;Ransomware Protection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#augmented-inline-deduplication&quot; title=&quot;Storage Savings with Augmented Inline Deduplication Technology&quot;&gt;Storage Savings with Augmented Inline Deduplication Technology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#cloud-backup&quot; title=&quot;Cloud Backup&quot;&gt;Cloud Backup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#continuous-data-protection&quot; title=&quot;Continuous Data Protection (CDP)&quot;&gt;Continuous Data Protection (CDP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#centralized-control-panel&quot; title=&quot;Centralized Control Panel&quot;&gt;Centralized Control Panel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#health-monitor&quot; title=&quot;Health Monitor - Real-time Monitoring&quot;&gt;Health Monitor - Real-time Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#encryption&quot; title=&quot;Encryption&quot;&gt;Encryption&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#instant-recovery&quot; title=&quot;Instant Recovery&quot;&gt;Instant Recovery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download&quot;&gt;Download&lt;/a&gt; now your free copy of the latest &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;V9 VM backup&lt;/a&gt; now.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;ransomware-protection&quot;&gt;Ransomware Protection&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Ransomware attacks&lt;/strong&gt; are making the rounds, and cybersecurity blogs and experts talk extensively regarding the potential damage these attacks can do. A potential ransomware attack &lt;strong&gt;can render your data obsolete&lt;/strong&gt;, locking it and demanding a ransom for releasing said data. Therefore, it becomes a necessity to &lt;strong&gt;protect against potential ransomware attacks&lt;/strong&gt;. Luckily, ransomware protection is a &lt;strong&gt;core feature&lt;/strong&gt; of the &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;V9 VM backup&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The feature makes it &lt;strong&gt;impossible&lt;/strong&gt; for malicious software to tamper with the data on your virtual machines. Moreover, the &lt;strong&gt;ransomware data protection&lt;/strong&gt; feature prevents any user, even with admin or root access, from &lt;strong&gt;modifying&lt;/strong&gt; or &lt;strong&gt;deleting&lt;/strong&gt; the backup data on your backup server. With this level of protection against devastating malware, businesses add another layer of security to their virtual environment.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;augmented-inline-deduplication&quot;&gt;Storage Saving With Augmented Inline Deduplication Technology&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Storage costs&lt;/strong&gt; are a significant concern for businesses, and choosing a &lt;strong&gt;VM backup provider&lt;/strong&gt; that offers &lt;strong&gt;massive storage-saving features&lt;/strong&gt; is essential. Few storage-saving features are as comprehensive as the &lt;strong&gt;Augmented &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Inline Deduplication&quot;&gt;Inline Deduplication&lt;/a&gt; Technology&lt;/strong&gt; with the &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;V9 VM Backup&lt;/a&gt;. The feature works by eliminating redundant data, resulting in significant storage savings.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This technology uses &lt;strong&gt;machine learning&lt;/strong&gt; to identify the changed data from the previous backup, thus backing up only the changed data to the customers' backup server or repository. In comparison, most VM backup and restore services approach the backup process differently, removing identical data after the transfer to the backup repository.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The benefits of the technology result in &lt;strong&gt;massive storage savings&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;cloud-backup&quot;&gt;Cloud Backup&lt;/a&gt;&lt;/h2&gt;
</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/virtualization-and-vm-backups/8-critical-features-for-vm-backup/vm-backup-key-features-intro.jpg&quot; alt=&quot;8 Key-Features of a VM Backup&quot; width=&quot;320&quot; height=&quot;200&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/8-critical-features-for-vm-backup/vm-backup-key-features-intro.jpg&quot; alt=&quot;vm backup key features&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vm backup key features&quot; /&gt;Businesses that rely on &lt;strong&gt;virtual machines&lt;/strong&gt; for their day-to-day operations should think twice about &lt;strong&gt;securing their infrastructure&lt;/strong&gt;. Modern use of virtual machines stems from the benefits of &lt;strong&gt;virtualization&lt;/strong&gt;, which include accessibility, &lt;strong&gt;reduced operating costs&lt;/strong&gt;, and &lt;strong&gt;flexibility&lt;/strong&gt;, among others. But your virtual infrastructure becomes obsolete without &lt;strong&gt;proper security&lt;/strong&gt;. One way to achieve that is through &lt;strong&gt;virtual machine backup&lt;/strong&gt; and &lt;strong&gt;recovery solutions&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;VM backups&lt;/a&gt; are &lt;strong&gt;crucial&lt;/strong&gt; for maintaining &lt;strong&gt;business continuity&lt;/strong&gt;. They help businesses &lt;strong&gt;prevent data loss&lt;/strong&gt; and offer a failsafe if something happens to your &lt;a href=&quot;https://www.firewall.cx/operating-systems/microsoft/windows-servers/hyper-v-hypervisor-virtualization-guide-windows-2016.html&quot; target=&quot;_blank&quot; title=&quot;Hyper-V Virtualization&quot;&gt;Hyper-V&lt;/a&gt; or &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;VMware&quot;&gt;VMware&lt;/a&gt; virtual infrastructure. These services aren't uncommon. But knowing which one to choose depends on several factors. None are more important than the product's features, which directly impact your ability to keep the infrastructure running.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So that begs the question, what are the essential features of a &lt;strong&gt;VM backup software&lt;/strong&gt;? That's exactly what this short guide focuses on. So, let's dive in.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#ransomware-protection&quot; title=&quot;Ransomware Protection&quot;&gt;Ransomware Protection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#augmented-inline-deduplication&quot; title=&quot;Storage Savings with Augmented Inline Deduplication Technology&quot;&gt;Storage Savings with Augmented Inline Deduplication Technology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#cloud-backup&quot; title=&quot;Cloud Backup&quot;&gt;Cloud Backup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#continuous-data-protection&quot; title=&quot;Continuous Data Protection (CDP)&quot;&gt;Continuous Data Protection (CDP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#centralized-control-panel&quot; title=&quot;Centralized Control Panel&quot;&gt;Centralized Control Panel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#health-monitor&quot; title=&quot;Health Monitor - Real-time Monitoring&quot;&gt;Health Monitor - Real-time Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#encryption&quot; title=&quot;Encryption&quot;&gt;Encryption&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#instant-recovery&quot; title=&quot;Instant Recovery&quot;&gt;Instant Recovery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/critical-features-for-vmbackup.html#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download&quot;&gt;Download&lt;/a&gt; now your free copy of the latest &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;V9 VM backup&lt;/a&gt; now.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;ransomware-protection&quot;&gt;Ransomware Protection&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Ransomware attacks&lt;/strong&gt; are making the rounds, and cybersecurity blogs and experts talk extensively regarding the potential damage these attacks can do. A potential ransomware attack &lt;strong&gt;can render your data obsolete&lt;/strong&gt;, locking it and demanding a ransom for releasing said data. Therefore, it becomes a necessity to &lt;strong&gt;protect against potential ransomware attacks&lt;/strong&gt;. Luckily, ransomware protection is a &lt;strong&gt;core feature&lt;/strong&gt; of the &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;V9 VM backup&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The feature makes it &lt;strong&gt;impossible&lt;/strong&gt; for malicious software to tamper with the data on your virtual machines. Moreover, the &lt;strong&gt;ransomware data protection&lt;/strong&gt; feature prevents any user, even with admin or root access, from &lt;strong&gt;modifying&lt;/strong&gt; or &lt;strong&gt;deleting&lt;/strong&gt; the backup data on your backup server. With this level of protection against devastating malware, businesses add another layer of security to their virtual environment.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;augmented-inline-deduplication&quot;&gt;Storage Saving With Augmented Inline Deduplication Technology&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Storage costs&lt;/strong&gt; are a significant concern for businesses, and choosing a &lt;strong&gt;VM backup provider&lt;/strong&gt; that offers &lt;strong&gt;massive storage-saving features&lt;/strong&gt; is essential. Few storage-saving features are as comprehensive as the &lt;strong&gt;Augmented &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Inline Deduplication&quot;&gt;Inline Deduplication&lt;/a&gt; Technology&lt;/strong&gt; with the &lt;a href=&quot;https://clixtrac.com/goto/?307993&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup&quot;&gt;V9 VM Backup&lt;/a&gt;. The feature works by eliminating redundant data, resulting in significant storage savings.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This technology uses &lt;strong&gt;machine learning&lt;/strong&gt; to identify the changed data from the previous backup, thus backing up only the changed data to the customers' backup server or repository. In comparison, most VM backup and restore services approach the backup process differently, removing identical data after the transfer to the backup repository.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The benefits of the technology result in &lt;strong&gt;massive storage savings&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;cloud-backup&quot;&gt;Cloud Backup&lt;/a&gt;&lt;/h2&gt;
</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player &amp; Pro</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html"/>
		<published>2022-04-01T09:12:46+11:00</published>
		<updated>2022-04-01T09:12:46+11:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-esxi-vsphere-vcenter-intro.png&quot; alt=&quot;vmware esxi vsphere vcenter intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vmware esxi vsphere vcenter intro&quot; /&gt;In this article we will cover the &lt;strong&gt;differences&lt;/strong&gt; between &lt;strong&gt;VMware ESXi&lt;/strong&gt;, &lt;strong&gt;vSphere&lt;/strong&gt; and &lt;strong&gt;vCenter&lt;/strong&gt; while also explain the &lt;strong&gt;features&lt;/strong&gt; supported by each &lt;strong&gt;vSphere edition&lt;/strong&gt;: &lt;strong&gt;vSphere&lt;/strong&gt; &lt;strong&gt;Standard&lt;/strong&gt;, &lt;strong&gt;Enterprise plus&lt;/strong&gt; and &lt;strong&gt;Plantium edition&lt;/strong&gt;. We will touch on the &lt;strong&gt;differences and limitations&lt;/strong&gt; between &lt;strong&gt;VMware Workstation Player &lt;/strong&gt;and &lt;strong&gt;VMware Workstation Pro&lt;/strong&gt;, and also compare them with &lt;strong&gt;EXSi Free&lt;/strong&gt; and &lt;strong&gt;EXSi Paid editions&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally we will demystify the &lt;strong&gt;role of vCenter&lt;/strong&gt; and the &lt;strong&gt;additional features&lt;/strong&gt; it provides to a &lt;strong&gt;VMware infrastructure&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#difference-between-vsphere-vcenter&quot; title=&quot;Difference between VMware vSphere and vCenter&quot;&gt;Difference between VMware vSphere and vCenter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#what-is-vmware-esxi&quot; title=&quot;What is VMware ESXi?&quot;&gt;What is VMware ESXi?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#difference-between-esxi-versions&quot; title=&quot;Difference Between VMware ESXi Free and ESXi Paid Version&quot;&gt;Difference Between VMware ESXi Free and ESXi Paid Version&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#when-do-you-need-vcenter&quot; title=&quot;When Do You Need vCenter?&quot;&gt;When Do You Need vCenter?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#vmware-workstation-player-vs-pro&quot; title=&quot;Difference Between VMware Workstation Player and VMware Workstation Pro&quot;&gt;Difference Between VMware Workstation Player and VMware Workstation Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup.html&quot; target=&quot;_blank&quot; title=&quot;Virtualization and Backup section&quot;&gt;Virtualization and Backup section&lt;/a&gt; for more high-quality technical articles.&lt;/p&gt;
&lt;h2&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere.png&quot; alt=&quot;vmware vsphere&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware vsphere&quot; /&gt;&lt;/h2&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&quot;&gt;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-invalid-status-virtual-machine.html&quot; target=&quot;_blank&quot; title=&quot;How to Fix VMware ESXi Virtual Machine 'Invalid Status'&quot;&gt;How to Fix VMware ESXi Virtual Machine 'Invalid Status'&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&quot;&gt;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;difference-between-vsphere-vcenter&quot;&gt;Difference Between VMware vSphere &amp;amp; vCenter&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It’s sometimes difficult to keep up to date with the latest names of software. Even the largest technology vendors change their product names from time to time. Unfortunately, getting the product name wrong can result in various costly consequences including purchasing the wrong product or an older version with differentiating feature sets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Contrary to popular belief, &lt;strong&gt;vSphere&lt;/strong&gt; and &lt;strong&gt;vCenter&lt;/strong&gt; are actually different products:&lt;/p&gt;
&lt;ul class=&quot;checkbox check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vSphere&lt;/strong&gt; is VMware’s name for a &lt;strong&gt;suite of Infrastructure products&lt;/strong&gt;. You can think of it as a platform name which includes lots of different components.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vCenter&lt;/strong&gt; is the name of &lt;strong&gt;one of the components under&lt;/strong&gt; the &lt;strong&gt;vSphere&lt;/strong&gt; suite. &lt;strong&gt;vCenter&lt;/strong&gt; runs on a Windows Server VM and provides the &lt;strong&gt;management and control plane&lt;/strong&gt; of the &lt;strong&gt;entire VMware environment&lt;/strong&gt;. This is also shown in the diagram below:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/differences-between-vsphere-and-vcenter.jpg&quot; alt=&quot;differences between vsphere and vcenter&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;differences between vsphere and vcenter&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the &lt;strong&gt;vSphere suite&lt;/strong&gt;, the &lt;strong&gt;components&lt;/strong&gt; and &lt;strong&gt;features&lt;/strong&gt; that vSphere includes depend on your licenses. &lt;strong&gt;vCenter Server&lt;/strong&gt; is available on &lt;strong&gt;all vSphere editions&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Here is an overview of some features for the &lt;strong&gt;main vSphere editions&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-editions-feature-comparison.png&quot; alt=&quot;vmware vsphere editions feature comparison&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware vsphere editions feature comparison&quot; /&gt;You will notice that this vSphere feature table contains many different technologies which are found in different VMware software components.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vCenter&lt;/strong&gt; is a management tool that helps &lt;strong&gt;manage multiple ESXi / vSphere Hypervisors&lt;/strong&gt; within the datacentre. Earlier versions of &lt;strong&gt;vCenter&lt;/strong&gt; (also known as &lt;strong&gt;vCenter Server&lt;/strong&gt;) ran exclusively on &lt;a href=&quot;https://www.firewall.cx/operating-systems/microsoft/windows-servers.html&quot; target=&quot;_blank&quot; title=&quot;Windows Server&quot;&gt;Windows Server&lt;/a&gt; (shown in the previous diagram) whereas now VMware now offers the &lt;strong&gt;vCenter Server Appliance&lt;/strong&gt; (&lt;strong&gt;vCSA&lt;/strong&gt;) which runs on either &lt;strong&gt;SUSE Linux Enterprise Server 64-bit&lt;/strong&gt; (&lt;strong&gt;vCSA v6.0&lt;/strong&gt;) or VMware’s proprietary &lt;strong&gt;Photon OS&lt;/strong&gt; (&lt;strong&gt;vCSA v6.5 and above&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You log in to &lt;strong&gt;vCenter Server&lt;/strong&gt; via an HTML5 browser (formally a Flash client) which looks like this:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-login.png&quot; alt=&quot;vmware vsphere login&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware vsphere login&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From here, we can manage all &lt;strong&gt;vSphere&lt;/strong&gt; related &lt;strong&gt;components&lt;/strong&gt; (and their corresponding features) which include:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vCenter Server (vCSA)&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vSphere Hypervisors (ESXi Servers)&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vSphere Update Manager&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vSphere Replication&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So, in summary, the difference between &lt;strong&gt;vSphere&lt;/strong&gt; and &lt;strong&gt;vCenter&lt;/strong&gt; is that &lt;strong&gt;vSphere&lt;/strong&gt; consists of a &lt;strong&gt;suite of VMware components &lt;/strong&gt;with &lt;strong&gt;vCenter Server&lt;/strong&gt; being one of those.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vCenter Server&lt;/strong&gt; is the &lt;strong&gt;management software&lt;/strong&gt; or if you prefer, tool, to help manage your vSphere Components and all their features.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can use some vSphere components without a &lt;strong&gt;vCenter Server&lt;/strong&gt; but some features will not be available.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;what-is-vmware-esxi&quot;&gt;What is VMware ESXi?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;ESXi&lt;/strong&gt; is a &lt;strong&gt;Type-1 Hypervisor&lt;/strong&gt; which means it’s a piece of software that runs directly on a &lt;strong&gt;bare-metal server&lt;/strong&gt; without the requirement of an operating system. As a Hypervisor, ESXi manages access to all physical resources such as CPUs, memory, network interface cards, storage (HDD, SSDs etc) and other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;ESXi’s &lt;strong&gt;vmkernel&lt;/strong&gt; sits between the virtual machines and physical hardware and from there it shares the available hardware including CPUs, storage (HDDs, SSDs etc), memory and network interfaces of the physical host amongst the multiple virtual machines. Applications running in virtual machines can access these resources without direct access to the underlying hardware.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Vmkernel&lt;/strong&gt; is the core software responsible of receiving requests from virtual machines for resources and presenting the requests to the physical hardware.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are stricter compatibility requirements for ESXi installations as hardware drivers need to be certified. However once ESXi is installed and operational, you get access to Enterprise-grade Virtual Machines features.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-esxi-server-large.png&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;VMware ESXi - Management GUI&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;VMware ESXi - Management GUI&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-esxi-server-small.png&quot; alt=&quot;vmware esxi server web gui&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware esxi server web gui&quot; /&gt;&lt;/a&gt;VMware ESXi GUI Interface - Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware ESXi&lt;/strong&gt; comes in a variety of flavours. A &lt;strong&gt;free version&lt;/strong&gt; exists if you simply need to deploy &lt;strong&gt;basic Virtual Machines&lt;/strong&gt; with &lt;strong&gt;no High Availability&lt;/strong&gt; or &lt;strong&gt;central management&lt;/strong&gt; requirements. This is best suited for trialling software and labs which are not in production.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For mission-critical applications, you should consider the paid version of ESXi which comes with VMware support and features geared toward professional environments. Add on VMware’s &amp;nbsp;&lt;strong&gt;vCenter Server&lt;/strong&gt; enable central management all of your ESXi servers and take your datacentre one step further with features such as:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Clustering&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;High Availability&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fault Tolerance&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Distributed Resource Scheduler&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Virtual Machine Encryption&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;difference-between-esxi-versions&quot;&gt;Difference Between VMware ESXi Free &amp;amp; ESXi Paid Version&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VMware ESXi free&lt;/strong&gt; vs &lt;strong&gt;ESXi paid&lt;/strong&gt; debate comes up a lot, but fortunately, it is easily answered.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The question to ask yourself is if you are planning to run &lt;strong&gt;mission-critical applications&lt;/strong&gt; on top of &lt;strong&gt;ESXi&lt;/strong&gt;. By mission-critical we mean applications that your business depends on. If the answer is &lt;strong&gt;yes&lt;/strong&gt;, then you will require the paid version of &lt;strong&gt;ESXi&lt;/strong&gt; with support so that you can contact VMware should anything go wrong.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even if the answer is &lt;strong&gt;no&lt;/strong&gt;, you might still consider a paid version of &lt;strong&gt;ESXi&lt;/strong&gt; if you need the management functions of &lt;strong&gt;vCenter Server&lt;/strong&gt;. Such use cases might be large development companies who don’t consider their test and development environments mission-critical but they do want a way to manage hundreds or thousands of Virtual Machines.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware ESXi&lt;/strong&gt; &lt;strong&gt;free&lt;/strong&gt; is still feature-rich though. Therefore for a small environment where your business won’t grind to a halt if an &lt;strong&gt;ESXi&lt;/strong&gt; server goes offline, might be cost-effective even with additional manual management tasks to conduct. Keep in mind though that backup features will not be available in the free version, meaning that native backup via &lt;strong&gt;ESXi&lt;/strong&gt; won’t be possible. You can work around this by installing and managing backup agents within your operating systems. This is one example of management overhead that you wouldn’t have with a paid version.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;when-do-you-need-vcenter&quot;&gt;When Do You Need vCenter?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It’s worth keeping in mind that even with a &lt;strong&gt;paid version of ESXi&lt;/strong&gt;, you will still need a &lt;strong&gt;vCenter Server license&lt;/strong&gt; to use any &lt;strong&gt;clustering features&lt;/strong&gt;. A &lt;strong&gt;paid version of ESXi&lt;/strong&gt; does offer some benefits (such as VADP backup abilities) but without a &lt;strong&gt;vCenter Server license&lt;/strong&gt;, most of the benefits are not available.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Almost all customers of paid ESXi licenses will also purchase a &lt;strong&gt;vCenter Server license&lt;/strong&gt; so that those licenses ESXi servers can be centrally managed. Once all ESXi servers are managed by &lt;strong&gt;vCenter Server&lt;/strong&gt;, you unlock all the ESXi features that you are licensed for.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So when do you need a &lt;strong&gt;vCenter Server&lt;/strong&gt;? The answer is simple. To unlock features such as &lt;strong&gt;Clustering&lt;/strong&gt;, &lt;strong&gt;High Availability&lt;/strong&gt; (an automatic reboot of VMs on a failed host to a healthy host), &lt;strong&gt;Cloning&lt;/strong&gt; and &lt;strong&gt;Fault Tolerance&lt;/strong&gt;. If you are looking to add other VMware solutions to the datacentre including &lt;strong&gt;vSAN&lt;/strong&gt;, &lt;strong&gt;vSphere Replication&lt;/strong&gt; or &lt;strong&gt;Site Recovery Manager&lt;/strong&gt;, then all of those solutions require access to a &lt;strong&gt;vCenter Server&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, if you find that you need the paid ESXi version then you are most likely also going to need a &lt;strong&gt;vCenter Server&lt;/strong&gt; &lt;strong&gt;license&lt;/strong&gt; too. Fortunately, VMware provides discounted&amp;nbsp; &lt;strong&gt;Essentials&lt;/strong&gt; and &lt;strong&gt;Essentials Plus bundles&lt;/strong&gt; with a &lt;strong&gt;3 host (physical servers) limit&lt;/strong&gt;, these bundles include &lt;strong&gt;ESXi&lt;/strong&gt; and a &lt;strong&gt;vCenter server license&lt;/strong&gt; at a discounted rate to keep initial costs down.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Just by looking at the &lt;strong&gt;vSphere Client&lt;/strong&gt; can you see the various &lt;strong&gt;vCenter&lt;/strong&gt; related options which show the value added by bolting on &lt;strong&gt;vCenter&lt;/strong&gt; to your stack of management software for your datacentre:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-client-large.png&quot; class=&quot;jcepopup&quot; title=&quot;vmware vsphere client&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;VMware vsphere client login&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-client-small.png&quot; alt=&quot;vmware vsphere client &quot; title=&quot;vmware vsphere client &quot; /&gt;&lt;/a&gt;&lt;br /&gt;VMware vsphere client - Click to enlarge&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vmware-workstation-player-vs-pro&quot;&gt;VMware Workstation Player vs VMware Workstation Pro&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware Workstation Player&lt;/strong&gt; is &lt;strong&gt;free software&lt;/strong&gt; that lets you run a &lt;strong&gt;Virtual Machine&lt;/strong&gt; on top of your own Windows PC’s Operating System. There are &lt;strong&gt;two versions&lt;/strong&gt; of &lt;strong&gt;VMware Workstation Player&lt;/strong&gt;; &lt;strong&gt;Workstation Player&lt;/strong&gt; and &lt;strong&gt;Workstation Pro&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The key differences between these two versions are that with &lt;strong&gt;VMware Workstation Player&lt;/strong&gt; you can only run &lt;strong&gt;one Virtual Machine&lt;/strong&gt; on your computer at once and enterprise features are disabled.&lt;strong&gt; &amp;nbsp;VMware Workstation Pro&lt;/strong&gt; on the other hand supports running multiple virtual machines at the same time plus a few more neat features mentioned below.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here is what &lt;strong&gt;Workstation Pro&lt;/strong&gt; looks like - notice how you can have &lt;strong&gt;many virtual machines&lt;/strong&gt; running at once:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-workstation-pro-large.png&quot; class=&quot;jcepopup&quot; title=&quot;vmware workstation pro&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;VMware Workstation Pro &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-workstation-pro-small.png&quot; alt=&quot;vmware workstation pro &quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware workstation pro &quot; /&gt;&lt;/a&gt;VMware Workstation Pro - Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware Workstation&lt;/strong&gt; is essentially an application installed on top of Windows which lets you run connected or isolated Virtual Machines. It’s best suited for developer’s who need access and control to deploy and test code or for systems administrators looking to test applications on the latest version of a particular Operating System, of which over 200 are supported in &lt;strong&gt;Workstation Player&lt;/strong&gt; and &lt;strong&gt;Pro&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We’ve already explained that &lt;strong&gt;Workstation Player&lt;/strong&gt; is the &lt;strong&gt;free version&lt;/strong&gt; of &lt;strong&gt;Workstation Pro&lt;/strong&gt; but when it comes to functional differences we’ve detailed those for you below:&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-player-workstationpro-feature-comparison.png&quot; alt=&quot;vmware player workstation pro feature comparison&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware player workstation pro feature comparison&quot; /&gt;&lt;strong&gt;VMware Workstation&lt;/strong&gt; &lt;strong&gt;Player&lt;/strong&gt; and &lt;strong&gt;Pro&lt;/strong&gt; both get installed onto your Windows PC or Laptop, on which you can run your virtual machines. &lt;strong&gt;Pro&lt;/strong&gt; is interesting because you can run as many Virtual Machines as your Windows PC or Laptop hardware can handle making it a great bit of software for running live product demonstrations or testing without needing access to remote infrastructure managed by another team. The key element here is to ensure your laptop or PC has enough resources available (CPU/Cores, RAM and HDD space) for the Virtual Machines that will be running on it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Diving into some of the features that &lt;strong&gt;VMware Workstation&lt;/strong&gt; &lt;strong&gt;Pro&lt;/strong&gt; provides shows how much value for money that software is; Being able to take a &lt;strong&gt;snapshot&lt;/strong&gt; of Virtual Machines is useful so that you can &lt;strong&gt;roll back&lt;/strong&gt; a Virtual Machine to a particular date and time in just a few seconds. You can also &lt;strong&gt;clone&lt;/strong&gt; Virtual Machines should you need many copies of the same VM for testing. &lt;strong&gt;Encryption&lt;/strong&gt; is also available in the event that your local Virtual Machines contain sensitive information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware Workstation&lt;/strong&gt; &lt;strong&gt;Pro&lt;/strong&gt; is, therefore, a &lt;strong&gt;mini version of ESXi&lt;/strong&gt;, it’s not capable of clustering features but it is an extremely cost-effective way (Approximately $300 USD) to make use of some of the unused resources on your Windows machine.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary here are our definitions for everything covered in this article:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vSphere: vSphere&lt;/strong&gt; is a naming convention or “brand” for a selection of VMware Infrastructure solutions including vCenter Server, ESXi, vSphere Replication and Update Manager.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;vCenter Server: vCenter Server&lt;/strong&gt; is one of the solutions under the vSphere suite. It is used to manage multiple ESXi servers and enabled cluster level and high availability features for ESXi servers and Virtual Machines. &lt;strong&gt;vCenter Server&lt;/strong&gt; is generally purchased when paid versions of ESXi have been deployed.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Workstation Player: &lt;/strong&gt;Workstation Player is free software by VMware that lets you run one Virtual Machine at a time within your Windows Operating System.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Workstation Pro: Workstation Pro&lt;/strong&gt; is the same as Workstation Player but it requires a paid license which enables enterprise features such as the ability to run many Virtual Machines from your Windows PC or Laptop. Features such as Virtual Machine snapshots, cloning and encryption are also supported with Pro.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ESXi: ESXi&lt;/strong&gt; is the enterprise-grade solution for running Virtual Machines in the datacentre. It is installed onto bare metal servers. There is a basic free version, suitable for labs and test environments but the paid versions are more suitable for running mission-critical virtual machines and applications for your business, enabling cluster level features such as &lt;strong&gt;High Availability&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-esxi-vsphere-vcenter-intro.png&quot; alt=&quot;vmware esxi vsphere vcenter intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vmware esxi vsphere vcenter intro&quot; /&gt;In this article we will cover the &lt;strong&gt;differences&lt;/strong&gt; between &lt;strong&gt;VMware ESXi&lt;/strong&gt;, &lt;strong&gt;vSphere&lt;/strong&gt; and &lt;strong&gt;vCenter&lt;/strong&gt; while also explain the &lt;strong&gt;features&lt;/strong&gt; supported by each &lt;strong&gt;vSphere edition&lt;/strong&gt;: &lt;strong&gt;vSphere&lt;/strong&gt; &lt;strong&gt;Standard&lt;/strong&gt;, &lt;strong&gt;Enterprise plus&lt;/strong&gt; and &lt;strong&gt;Plantium edition&lt;/strong&gt;. We will touch on the &lt;strong&gt;differences and limitations&lt;/strong&gt; between &lt;strong&gt;VMware Workstation Player &lt;/strong&gt;and &lt;strong&gt;VMware Workstation Pro&lt;/strong&gt;, and also compare them with &lt;strong&gt;EXSi Free&lt;/strong&gt; and &lt;strong&gt;EXSi Paid editions&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally we will demystify the &lt;strong&gt;role of vCenter&lt;/strong&gt; and the &lt;strong&gt;additional features&lt;/strong&gt; it provides to a &lt;strong&gt;VMware infrastructure&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#difference-between-vsphere-vcenter&quot; title=&quot;Difference between VMware vSphere and vCenter&quot;&gt;Difference between VMware vSphere and vCenter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#what-is-vmware-esxi&quot; title=&quot;What is VMware ESXi?&quot;&gt;What is VMware ESXi?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#difference-between-esxi-versions&quot; title=&quot;Difference Between VMware ESXi Free and ESXi Paid Version&quot;&gt;Difference Between VMware ESXi Free and ESXi Paid Version&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#when-do-you-need-vcenter&quot; title=&quot;When Do You Need vCenter?&quot;&gt;When Do You Need vCenter?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#vmware-workstation-player-vs-pro&quot; title=&quot;Difference Between VMware Workstation Player and VMware Workstation Pro&quot;&gt;Difference Between VMware Workstation Player and VMware Workstation Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;Visit our &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup.html&quot; target=&quot;_blank&quot; title=&quot;Virtualization and Backup section&quot;&gt;Virtualization and Backup section&lt;/a&gt; for more high-quality technical articles.&lt;/p&gt;
&lt;h2&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere.png&quot; alt=&quot;vmware vsphere&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware vsphere&quot; /&gt;&lt;/h2&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&quot;&gt;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-invalid-status-virtual-machine.html&quot; target=&quot;_blank&quot; title=&quot;How to Fix VMware ESXi Virtual Machine 'Invalid Status'&quot;&gt;How to Fix VMware ESXi Virtual Machine 'Invalid Status'&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&quot;&gt;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;difference-between-vsphere-vcenter&quot;&gt;Difference Between VMware vSphere &amp;amp; vCenter&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It’s sometimes difficult to keep up to date with the latest names of software. Even the largest technology vendors change their product names from time to time. Unfortunately, getting the product name wrong can result in various costly consequences including purchasing the wrong product or an older version with differentiating feature sets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Contrary to popular belief, &lt;strong&gt;vSphere&lt;/strong&gt; and &lt;strong&gt;vCenter&lt;/strong&gt; are actually different products:&lt;/p&gt;
&lt;ul class=&quot;checkbox check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vSphere&lt;/strong&gt; is VMware’s name for a &lt;strong&gt;suite of Infrastructure products&lt;/strong&gt;. You can think of it as a platform name which includes lots of different components.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vCenter&lt;/strong&gt; is the name of &lt;strong&gt;one of the components under&lt;/strong&gt; the &lt;strong&gt;vSphere&lt;/strong&gt; suite. &lt;strong&gt;vCenter&lt;/strong&gt; runs on a Windows Server VM and provides the &lt;strong&gt;management and control plane&lt;/strong&gt; of the &lt;strong&gt;entire VMware environment&lt;/strong&gt;. This is also shown in the diagram below:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/differences-between-vsphere-and-vcenter.jpg&quot; alt=&quot;differences between vsphere and vcenter&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;differences between vsphere and vcenter&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the &lt;strong&gt;vSphere suite&lt;/strong&gt;, the &lt;strong&gt;components&lt;/strong&gt; and &lt;strong&gt;features&lt;/strong&gt; that vSphere includes depend on your licenses. &lt;strong&gt;vCenter Server&lt;/strong&gt; is available on &lt;strong&gt;all vSphere editions&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Here is an overview of some features for the &lt;strong&gt;main vSphere editions&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-editions-feature-comparison.png&quot; alt=&quot;vmware vsphere editions feature comparison&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware vsphere editions feature comparison&quot; /&gt;You will notice that this vSphere feature table contains many different technologies which are found in different VMware software components.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vCenter&lt;/strong&gt; is a management tool that helps &lt;strong&gt;manage multiple ESXi / vSphere Hypervisors&lt;/strong&gt; within the datacentre. Earlier versions of &lt;strong&gt;vCenter&lt;/strong&gt; (also known as &lt;strong&gt;vCenter Server&lt;/strong&gt;) ran exclusively on &lt;a href=&quot;https://www.firewall.cx/operating-systems/microsoft/windows-servers.html&quot; target=&quot;_blank&quot; title=&quot;Windows Server&quot;&gt;Windows Server&lt;/a&gt; (shown in the previous diagram) whereas now VMware now offers the &lt;strong&gt;vCenter Server Appliance&lt;/strong&gt; (&lt;strong&gt;vCSA&lt;/strong&gt;) which runs on either &lt;strong&gt;SUSE Linux Enterprise Server 64-bit&lt;/strong&gt; (&lt;strong&gt;vCSA v6.0&lt;/strong&gt;) or VMware’s proprietary &lt;strong&gt;Photon OS&lt;/strong&gt; (&lt;strong&gt;vCSA v6.5 and above&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You log in to &lt;strong&gt;vCenter Server&lt;/strong&gt; via an HTML5 browser (formally a Flash client) which looks like this:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-login.png&quot; alt=&quot;vmware vsphere login&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware vsphere login&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From here, we can manage all &lt;strong&gt;vSphere&lt;/strong&gt; related &lt;strong&gt;components&lt;/strong&gt; (and their corresponding features) which include:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vCenter Server (vCSA)&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vSphere Hypervisors (ESXi Servers)&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vSphere Update Manager&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;vSphere Replication&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So, in summary, the difference between &lt;strong&gt;vSphere&lt;/strong&gt; and &lt;strong&gt;vCenter&lt;/strong&gt; is that &lt;strong&gt;vSphere&lt;/strong&gt; consists of a &lt;strong&gt;suite of VMware components &lt;/strong&gt;with &lt;strong&gt;vCenter Server&lt;/strong&gt; being one of those.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vCenter Server&lt;/strong&gt; is the &lt;strong&gt;management software&lt;/strong&gt; or if you prefer, tool, to help manage your vSphere Components and all their features.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can use some vSphere components without a &lt;strong&gt;vCenter Server&lt;/strong&gt; but some features will not be available.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;what-is-vmware-esxi&quot;&gt;What is VMware ESXi?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;ESXi&lt;/strong&gt; is a &lt;strong&gt;Type-1 Hypervisor&lt;/strong&gt; which means it’s a piece of software that runs directly on a &lt;strong&gt;bare-metal server&lt;/strong&gt; without the requirement of an operating system. As a Hypervisor, ESXi manages access to all physical resources such as CPUs, memory, network interface cards, storage (HDD, SSDs etc) and other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;ESXi’s &lt;strong&gt;vmkernel&lt;/strong&gt; sits between the virtual machines and physical hardware and from there it shares the available hardware including CPUs, storage (HDDs, SSDs etc), memory and network interfaces of the physical host amongst the multiple virtual machines. Applications running in virtual machines can access these resources without direct access to the underlying hardware.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Vmkernel&lt;/strong&gt; is the core software responsible of receiving requests from virtual machines for resources and presenting the requests to the physical hardware.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are stricter compatibility requirements for ESXi installations as hardware drivers need to be certified. However once ESXi is installed and operational, you get access to Enterprise-grade Virtual Machines features.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-esxi-server-large.png&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;VMware ESXi - Management GUI&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;VMware ESXi - Management GUI&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-esxi-server-small.png&quot; alt=&quot;vmware esxi server web gui&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware esxi server web gui&quot; /&gt;&lt;/a&gt;VMware ESXi GUI Interface - Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware ESXi&lt;/strong&gt; comes in a variety of flavours. A &lt;strong&gt;free version&lt;/strong&gt; exists if you simply need to deploy &lt;strong&gt;basic Virtual Machines&lt;/strong&gt; with &lt;strong&gt;no High Availability&lt;/strong&gt; or &lt;strong&gt;central management&lt;/strong&gt; requirements. This is best suited for trialling software and labs which are not in production.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For mission-critical applications, you should consider the paid version of ESXi which comes with VMware support and features geared toward professional environments. Add on VMware’s &amp;nbsp;&lt;strong&gt;vCenter Server&lt;/strong&gt; enable central management all of your ESXi servers and take your datacentre one step further with features such as:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;Clustering&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;High Availability&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fault Tolerance&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Distributed Resource Scheduler&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Virtual Machine Encryption&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;difference-between-esxi-versions&quot;&gt;Difference Between VMware ESXi Free &amp;amp; ESXi Paid Version&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;VMware ESXi free&lt;/strong&gt; vs &lt;strong&gt;ESXi paid&lt;/strong&gt; debate comes up a lot, but fortunately, it is easily answered.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The question to ask yourself is if you are planning to run &lt;strong&gt;mission-critical applications&lt;/strong&gt; on top of &lt;strong&gt;ESXi&lt;/strong&gt;. By mission-critical we mean applications that your business depends on. If the answer is &lt;strong&gt;yes&lt;/strong&gt;, then you will require the paid version of &lt;strong&gt;ESXi&lt;/strong&gt; with support so that you can contact VMware should anything go wrong.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even if the answer is &lt;strong&gt;no&lt;/strong&gt;, you might still consider a paid version of &lt;strong&gt;ESXi&lt;/strong&gt; if you need the management functions of &lt;strong&gt;vCenter Server&lt;/strong&gt;. Such use cases might be large development companies who don’t consider their test and development environments mission-critical but they do want a way to manage hundreds or thousands of Virtual Machines.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware ESXi&lt;/strong&gt; &lt;strong&gt;free&lt;/strong&gt; is still feature-rich though. Therefore for a small environment where your business won’t grind to a halt if an &lt;strong&gt;ESXi&lt;/strong&gt; server goes offline, might be cost-effective even with additional manual management tasks to conduct. Keep in mind though that backup features will not be available in the free version, meaning that native backup via &lt;strong&gt;ESXi&lt;/strong&gt; won’t be possible. You can work around this by installing and managing backup agents within your operating systems. This is one example of management overhead that you wouldn’t have with a paid version.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;when-do-you-need-vcenter&quot;&gt;When Do You Need vCenter?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It’s worth keeping in mind that even with a &lt;strong&gt;paid version of ESXi&lt;/strong&gt;, you will still need a &lt;strong&gt;vCenter Server license&lt;/strong&gt; to use any &lt;strong&gt;clustering features&lt;/strong&gt;. A &lt;strong&gt;paid version of ESXi&lt;/strong&gt; does offer some benefits (such as VADP backup abilities) but without a &lt;strong&gt;vCenter Server license&lt;/strong&gt;, most of the benefits are not available.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Almost all customers of paid ESXi licenses will also purchase a &lt;strong&gt;vCenter Server license&lt;/strong&gt; so that those licenses ESXi servers can be centrally managed. Once all ESXi servers are managed by &lt;strong&gt;vCenter Server&lt;/strong&gt;, you unlock all the ESXi features that you are licensed for.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So when do you need a &lt;strong&gt;vCenter Server&lt;/strong&gt;? The answer is simple. To unlock features such as &lt;strong&gt;Clustering&lt;/strong&gt;, &lt;strong&gt;High Availability&lt;/strong&gt; (an automatic reboot of VMs on a failed host to a healthy host), &lt;strong&gt;Cloning&lt;/strong&gt; and &lt;strong&gt;Fault Tolerance&lt;/strong&gt;. If you are looking to add other VMware solutions to the datacentre including &lt;strong&gt;vSAN&lt;/strong&gt;, &lt;strong&gt;vSphere Replication&lt;/strong&gt; or &lt;strong&gt;Site Recovery Manager&lt;/strong&gt;, then all of those solutions require access to a &lt;strong&gt;vCenter Server&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary, if you find that you need the paid ESXi version then you are most likely also going to need a &lt;strong&gt;vCenter Server&lt;/strong&gt; &lt;strong&gt;license&lt;/strong&gt; too. Fortunately, VMware provides discounted&amp;nbsp; &lt;strong&gt;Essentials&lt;/strong&gt; and &lt;strong&gt;Essentials Plus bundles&lt;/strong&gt; with a &lt;strong&gt;3 host (physical servers) limit&lt;/strong&gt;, these bundles include &lt;strong&gt;ESXi&lt;/strong&gt; and a &lt;strong&gt;vCenter server license&lt;/strong&gt; at a discounted rate to keep initial costs down.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Just by looking at the &lt;strong&gt;vSphere Client&lt;/strong&gt; can you see the various &lt;strong&gt;vCenter&lt;/strong&gt; related options which show the value added by bolting on &lt;strong&gt;vCenter&lt;/strong&gt; to your stack of management software for your datacentre:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-client-large.png&quot; class=&quot;jcepopup&quot; title=&quot;vmware vsphere client&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;VMware vsphere client login&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-vsphere-client-small.png&quot; alt=&quot;vmware vsphere client &quot; title=&quot;vmware vsphere client &quot; /&gt;&lt;/a&gt;&lt;br /&gt;VMware vsphere client - Click to enlarge&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vmware-workstation-player-vs-pro&quot;&gt;VMware Workstation Player vs VMware Workstation Pro&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware Workstation Player&lt;/strong&gt; is &lt;strong&gt;free software&lt;/strong&gt; that lets you run a &lt;strong&gt;Virtual Machine&lt;/strong&gt; on top of your own Windows PC’s Operating System. There are &lt;strong&gt;two versions&lt;/strong&gt; of &lt;strong&gt;VMware Workstation Player&lt;/strong&gt;; &lt;strong&gt;Workstation Player&lt;/strong&gt; and &lt;strong&gt;Workstation Pro&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The key differences between these two versions are that with &lt;strong&gt;VMware Workstation Player&lt;/strong&gt; you can only run &lt;strong&gt;one Virtual Machine&lt;/strong&gt; on your computer at once and enterprise features are disabled.&lt;strong&gt; &amp;nbsp;VMware Workstation Pro&lt;/strong&gt; on the other hand supports running multiple virtual machines at the same time plus a few more neat features mentioned below.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here is what &lt;strong&gt;Workstation Pro&lt;/strong&gt; looks like - notice how you can have &lt;strong&gt;many virtual machines&lt;/strong&gt; running at once:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-workstation-pro-large.png&quot; class=&quot;jcepopup&quot; title=&quot;vmware workstation pro&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;VMware Workstation Pro &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-workstation-pro-small.png&quot; alt=&quot;vmware workstation pro &quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware workstation pro &quot; /&gt;&lt;/a&gt;VMware Workstation Pro - Click to enlarge&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware Workstation&lt;/strong&gt; is essentially an application installed on top of Windows which lets you run connected or isolated Virtual Machines. It’s best suited for developer’s who need access and control to deploy and test code or for systems administrators looking to test applications on the latest version of a particular Operating System, of which over 200 are supported in &lt;strong&gt;Workstation Player&lt;/strong&gt; and &lt;strong&gt;Pro&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We’ve already explained that &lt;strong&gt;Workstation Player&lt;/strong&gt; is the &lt;strong&gt;free version&lt;/strong&gt; of &lt;strong&gt;Workstation Pro&lt;/strong&gt; but when it comes to functional differences we’ve detailed those for you below:&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-vsphere-vcenter-esxi/vmware-player-workstationpro-feature-comparison.png&quot; alt=&quot;vmware player workstation pro feature comparison&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vmware player workstation pro feature comparison&quot; /&gt;&lt;strong&gt;VMware Workstation&lt;/strong&gt; &lt;strong&gt;Player&lt;/strong&gt; and &lt;strong&gt;Pro&lt;/strong&gt; both get installed onto your Windows PC or Laptop, on which you can run your virtual machines. &lt;strong&gt;Pro&lt;/strong&gt; is interesting because you can run as many Virtual Machines as your Windows PC or Laptop hardware can handle making it a great bit of software for running live product demonstrations or testing without needing access to remote infrastructure managed by another team. The key element here is to ensure your laptop or PC has enough resources available (CPU/Cores, RAM and HDD space) for the Virtual Machines that will be running on it.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Diving into some of the features that &lt;strong&gt;VMware Workstation&lt;/strong&gt; &lt;strong&gt;Pro&lt;/strong&gt; provides shows how much value for money that software is; Being able to take a &lt;strong&gt;snapshot&lt;/strong&gt; of Virtual Machines is useful so that you can &lt;strong&gt;roll back&lt;/strong&gt; a Virtual Machine to a particular date and time in just a few seconds. You can also &lt;strong&gt;clone&lt;/strong&gt; Virtual Machines should you need many copies of the same VM for testing. &lt;strong&gt;Encryption&lt;/strong&gt; is also available in the event that your local Virtual Machines contain sensitive information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware Workstation&lt;/strong&gt; &lt;strong&gt;Pro&lt;/strong&gt; is, therefore, a &lt;strong&gt;mini version of ESXi&lt;/strong&gt;, it’s not capable of clustering features but it is an extremely cost-effective way (Approximately $300 USD) to make use of some of the unused resources on your Windows machine.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In summary here are our definitions for everything covered in this article:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;vSphere: vSphere&lt;/strong&gt; is a naming convention or “brand” for a selection of VMware Infrastructure solutions including vCenter Server, ESXi, vSphere Replication and Update Manager.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;vCenter Server: vCenter Server&lt;/strong&gt; is one of the solutions under the vSphere suite. It is used to manage multiple ESXi servers and enabled cluster level and high availability features for ESXi servers and Virtual Machines. &lt;strong&gt;vCenter Server&lt;/strong&gt; is generally purchased when paid versions of ESXi have been deployed.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Workstation Player: &lt;/strong&gt;Workstation Player is free software by VMware that lets you run one Virtual Machine at a time within your Windows Operating System.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Workstation Pro: Workstation Pro&lt;/strong&gt; is the same as Workstation Player but it requires a paid license which enables enterprise features such as the ability to run many Virtual Machines from your Windows PC or Laptop. Features such as Virtual Machine snapshots, cloning and encryption are also supported with Pro.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ESXi: ESXi&lt;/strong&gt; is the enterprise-grade solution for running Virtual Machines in the datacentre. It is installed onto bare metal servers. There is a basic free version, suitable for labs and test environments but the paid versions are more suitable for running mission-critical virtual machines and applications for your business, enabling cluster level features such as &lt;strong&gt;High Availability&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>5 Most Critical Microsoft M365 Vulnerabilities Revealed and How to Fix Them - Free Webinar</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/free-webinar-how-to-protect-against-m365-critical-vulnerabilities.html"/>
		<published>2021-06-14T09:48:16+10:00</published>
		<updated>2021-06-14T09:48:16+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/free-webinar-how-to-protect-against-m365-critical-vulnerabilities.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Microsoft 365&lt;/strong&gt; is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to &lt;strong&gt;steal your data&lt;/strong&gt;. The good news is that there are plenty of ways admins can fight back and &lt;strong&gt;safeguard&lt;/strong&gt; their &lt;strong&gt;Microsoft 365 infrastructure against attack&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Your 5 Most Critical Microsoft M365 Vulnerabilities Revealed and How to Fix Them&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/2021-06-webinar-m365-critical-vulnerabilities/m365-vulnerabilities-webinar.jpg&quot; alt=&quot;5 Most Critical Microsoft M365 Vulnerabilities and How to Fix Them&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;5 Most Critical Microsoft M365 Vulnerabilities and How to Fix Them&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This &lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Your 5 Most Critical Microsoft M365 Vulnerabilities Revealed and How to Fix Them&quot;&gt;free upcoming webinar&lt;/a&gt;, on &lt;strong&gt;June 23 &lt;/strong&gt;and produced by Hornetsecurity/Altaro, features two enterprise security experts from the &lt;strong&gt;leading security consultancy Treusec&lt;/strong&gt; - Security Team Leader Fabio Viggiani and Principal Cyber Security Advisor Hasain Alshakarti. They will explain the &lt;strong&gt;5 most critical vulnerabilities&lt;/strong&gt; in your &lt;strong&gt;M365 environment&lt;/strong&gt; and what you can do to mitigate the risks they pose. To help attendees fully understand the situation, a series of &lt;strong&gt;live demonstrations&lt;/strong&gt; will be performed to &lt;strong&gt;reveal the threats&lt;/strong&gt; and their &lt;strong&gt;solutions&lt;/strong&gt; covering:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;O365 Credential Phishing&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Insufficient or Incorrectly Configured MFA Settings&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Malicious Application Registrations&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;External Forwarding and Business Email Compromise Attacks&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Insecure AD Synchronization in Hybrid Environments&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;This is truly an unmissable event for all &lt;strong&gt;Microsoft 365 admins&lt;/strong&gt;!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The webinar will be presented &lt;strong&gt;live twice on June 23&lt;/strong&gt; to enable as many people as possible to join the event live and ask questions directly to the expert panel of presenters. It will be presented at &lt;strong&gt;2pm CEST/8am EDT/5am PDT&lt;/strong&gt; and &lt;strong&gt;7pm CEST/1pm EDT/10am PDT&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&quot;box-info&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free access to the Webinar event&quot;&gt;While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.&lt;/a&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Microsoft 365&lt;/strong&gt; is an incredibly powerful software suite for businesses, but it is becoming increasingly targeted by people trying to &lt;strong&gt;steal your data&lt;/strong&gt;. The good news is that there are plenty of ways admins can fight back and &lt;strong&gt;safeguard&lt;/strong&gt; their &lt;strong&gt;Microsoft 365 infrastructure against attack&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Your 5 Most Critical Microsoft M365 Vulnerabilities Revealed and How to Fix Them&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/2021-06-webinar-m365-critical-vulnerabilities/m365-vulnerabilities-webinar.jpg&quot; alt=&quot;5 Most Critical Microsoft M365 Vulnerabilities and How to Fix Them&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;5 Most Critical Microsoft M365 Vulnerabilities and How to Fix Them&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This &lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Your 5 Most Critical Microsoft M365 Vulnerabilities Revealed and How to Fix Them&quot;&gt;free upcoming webinar&lt;/a&gt;, on &lt;strong&gt;June 23 &lt;/strong&gt;and produced by Hornetsecurity/Altaro, features two enterprise security experts from the &lt;strong&gt;leading security consultancy Treusec&lt;/strong&gt; - Security Team Leader Fabio Viggiani and Principal Cyber Security Advisor Hasain Alshakarti. They will explain the &lt;strong&gt;5 most critical vulnerabilities&lt;/strong&gt; in your &lt;strong&gt;M365 environment&lt;/strong&gt; and what you can do to mitigate the risks they pose. To help attendees fully understand the situation, a series of &lt;strong&gt;live demonstrations&lt;/strong&gt; will be performed to &lt;strong&gt;reveal the threats&lt;/strong&gt; and their &lt;strong&gt;solutions&lt;/strong&gt; covering:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;O365 Credential Phishing&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Insufficient or Incorrectly Configured MFA Settings&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Malicious Application Registrations&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;External Forwarding and Business Email Compromise Attacks&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Insecure AD Synchronization in Hybrid Environments&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;This is truly an unmissable event for all &lt;strong&gt;Microsoft 365 admins&lt;/strong&gt;!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The webinar will be presented &lt;strong&gt;live twice on June 23&lt;/strong&gt; to enable as many people as possible to join the event live and ask questions directly to the expert panel of presenters. It will be presented at &lt;strong&gt;2pm CEST/8am EDT/5am PDT&lt;/strong&gt; and &lt;strong&gt;7pm CEST/1pm EDT/10am PDT&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&quot;box-info&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free access to the Webinar event&quot;&gt;While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.&lt;/a&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>The Backup Bible. A Free Complete Guide to Disaster Recovery, Onsite - AWS &amp; Azure Cloud Backup Strategies. Best Backup Practices</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html"/>
		<published>2021-04-08T11:50:54+10:00</published>
		<updated>2021-04-08T11:50:54+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Cloud and Onprem backup strategies&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/the-backup-bible/onprem-cloud-backup.jpg&quot; alt=&quot;onprem and cloud backup&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;&lt;/a&gt;The Free &lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Backup Bible Complete Edition&quot;&gt;Backup Bible Complete Edition&lt;/a&gt; written by backup expert and &lt;strong&gt;Microsoft MVP Eric Siron&lt;/strong&gt;, is comprised of &lt;strong&gt;200+ pages&lt;/strong&gt; of actionable content divided into &lt;strong&gt;3 core parts&lt;/strong&gt;, including &lt;strong&gt;11 customizable templates&lt;/strong&gt; enabling you to create your own personalized &lt;strong&gt;on-prem&lt;/strong&gt; and &lt;strong&gt;cloud-based&lt;/strong&gt; (&lt;strong&gt;AWS&lt;/strong&gt;, &lt;strong&gt;Azure&lt;/strong&gt;) &lt;strong&gt;backup strategy&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 1&lt;/strong&gt; and&lt;strong&gt; 2&lt;/strong&gt; are updated versions of previously released eBooks (&lt;strong&gt;&lt;em&gt;Creating a Backup &amp;amp; Disaster Recovery Strategy&lt;/em&gt; and &lt;em&gt;Backup Best Practices in Action&lt;/em&gt;&lt;/strong&gt;) but &lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;Part 3&lt;/a&gt; is a &lt;strong&gt;brand-new section&lt;/strong&gt; on &lt;strong&gt;disaster recovery&lt;/strong&gt; (&lt;strong&gt;&lt;em&gt;Disaster Recovery &amp;amp; Business Continuity Blueprint&lt;/em&gt;&lt;/strong&gt;) that includes tons of valuable insights into the process of gathering organizational information required to build a DR plan and how to carry it out in practical terms.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;The &lt;strong&gt;Backup Bible&lt;/strong&gt; is offered &lt;strong&gt;Free&lt;/strong&gt; and is available for &lt;strong&gt;&lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;download here&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;Let’s take a look at what’s covered:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html#fundamentals-of-backup&quot; target=&quot;_blank&quot; title=&quot;Fundamentals of backup&quot;&gt;Part 1 - Fundamentals of Backup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html#selecting-your-backup-strategy&quot; target=&quot;_blank&quot; title=&quot;Backup Bible - Selecting your backup strategy&quot;&gt;Part 2 - Selecting your Backup Strategy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html#disaster-recovery&quot; target=&quot;_blank&quot; title=&quot;Aligning Disaster Recovery Strategies to your Business Needs&quot;&gt;Part 3 - Aligning Disaster Recovery Strategies to your Business NeedsAligning Disaster Recovery Strategies to your Business Needs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;fundamentals-of-backup&quot;&gt;The Backup Bible – Part 1: Fundamentals of Backup&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 1&lt;/strong&gt; covers the &lt;strong&gt;fundamentals of backup&lt;/strong&gt; and tactics that will help you understand your unique backup requirements. You'll learn how to:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Begin planning your backup and disaster recovery planning&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Set recovery objectives and loss tolerances&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Translate your business plan into a technically oriented outlook&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Create a customized agenda for obtaining key stakeholder support&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Set up a critical backup checklist&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;selecting-your-backup-strategy&quot;&gt;The Backup Bible – Part 2: Selecting your Backup Strategy&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 2&lt;/strong&gt; shows you what an exceptional backup looks like on a daily basis and the steps you need to get there, including:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Choosing the Right Backup and Recovery Software&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Setting and Achieving Backup Storage Targets&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Securing and Protecting Backup Data&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Defining Backup Schedules&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Monitoring, Testing, and Maintaining Systems&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Access both parts for free now and ensure you’re properly protecting your vital data today!&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;disaster-recovery&quot;&gt;The Backup Bible – Part 3: Aligning Disaster Recovery Strategies to your Business Needs&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 3&lt;/strong&gt; guides you through the process of &lt;strong&gt;creating a reliable disaster recovery strategy&lt;/strong&gt; based on your own business continuity requirements, covering:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Understanding key disaster recovery considerations&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Mapping out your organizational composition&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Replication&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Cloud solutions&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Testing the efficacy of your strategy&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;The Backup Bible&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/the-backup-bible/the-backup-bible.jpg&quot; alt=&quot;the backup bible&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the most useful features of &lt;strong&gt;The Backup Bible&lt;/strong&gt; is the customizable templates and lists that enable the reader to put the theory into practice. These are found in the appendix but are linked in the text at the end of each relevant chapter. If you are going to read this book cover to cover it would be a good idea to fill out the templates and lists as you go through it, so by the time you’ve finished reading you’ll have a fully personalized backup action plan ready for you to carry out!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Sure, it’s not the most exciting aspect of an IT administrator’s job but having a reliable and secure backup and disaster recovery strategy could be the most important thing you do. I’m sure you’ve heard many data loss horror stories that have crippled organizations costing thousands, if not millions, of dollars. This &lt;strong&gt;free eBook&lt;/strong&gt; from &lt;strong&gt;Altaro&lt;/strong&gt; will make sure you’re not the next horror story victim.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;The Backup Bible Complete Edition&lt;/strong&gt; also works as a great reference guide for all IT admins and anyone with an interest in &lt;strong&gt;protecting organizational data&lt;/strong&gt;. And the best thing of all: &lt;strong&gt;it’s free&lt;/strong&gt;! Learn how to &lt;strong&gt;create your own backup&lt;/strong&gt; and &lt;strong&gt;disaster recovery plan&lt;/strong&gt;, &lt;strong&gt;protect and secure your data backup&lt;/strong&gt; for both &lt;strong&gt;onsite&lt;/strong&gt;/&lt;strong&gt;on-premises&lt;/strong&gt; and &lt;strong&gt;cloud-based&lt;/strong&gt; (&lt;strong&gt;AWS&lt;/strong&gt; and &lt;strong&gt;Azure&lt;/strong&gt;) installations plus more. What are you waiting for? &lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your copy now!&quot;&gt;Download your copy now!&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Cloud and Onprem backup strategies&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/the-backup-bible/onprem-cloud-backup.jpg&quot; alt=&quot;onprem and cloud backup&quot; style=&quot;margin: 7px; float: left;&quot; /&gt;&lt;/a&gt;The Free &lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Backup Bible Complete Edition&quot;&gt;Backup Bible Complete Edition&lt;/a&gt; written by backup expert and &lt;strong&gt;Microsoft MVP Eric Siron&lt;/strong&gt;, is comprised of &lt;strong&gt;200+ pages&lt;/strong&gt; of actionable content divided into &lt;strong&gt;3 core parts&lt;/strong&gt;, including &lt;strong&gt;11 customizable templates&lt;/strong&gt; enabling you to create your own personalized &lt;strong&gt;on-prem&lt;/strong&gt; and &lt;strong&gt;cloud-based&lt;/strong&gt; (&lt;strong&gt;AWS&lt;/strong&gt;, &lt;strong&gt;Azure&lt;/strong&gt;) &lt;strong&gt;backup strategy&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 1&lt;/strong&gt; and&lt;strong&gt; 2&lt;/strong&gt; are updated versions of previously released eBooks (&lt;strong&gt;&lt;em&gt;Creating a Backup &amp;amp; Disaster Recovery Strategy&lt;/em&gt; and &lt;em&gt;Backup Best Practices in Action&lt;/em&gt;&lt;/strong&gt;) but &lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;Part 3&lt;/a&gt; is a &lt;strong&gt;brand-new section&lt;/strong&gt; on &lt;strong&gt;disaster recovery&lt;/strong&gt; (&lt;strong&gt;&lt;em&gt;Disaster Recovery &amp;amp; Business Continuity Blueprint&lt;/em&gt;&lt;/strong&gt;) that includes tons of valuable insights into the process of gathering organizational information required to build a DR plan and how to carry it out in practical terms.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;The &lt;strong&gt;Backup Bible&lt;/strong&gt; is offered &lt;strong&gt;Free&lt;/strong&gt; and is available for &lt;strong&gt;&lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;download here&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;Let’s take a look at what’s covered:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html#fundamentals-of-backup&quot; target=&quot;_blank&quot; title=&quot;Fundamentals of backup&quot;&gt;Part 1 - Fundamentals of Backup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html#selecting-your-backup-strategy&quot; target=&quot;_blank&quot; title=&quot;Backup Bible - Selecting your backup strategy&quot;&gt;Part 2 - Selecting your Backup Strategy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/the-backup-bible-onsite-cloud-backup-and-disaster-recovery-strategies.html#disaster-recovery&quot; target=&quot;_blank&quot; title=&quot;Aligning Disaster Recovery Strategies to your Business Needs&quot;&gt;Part 3 - Aligning Disaster Recovery Strategies to your Business NeedsAligning Disaster Recovery Strategies to your Business Needs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;fundamentals-of-backup&quot;&gt;The Backup Bible – Part 1: Fundamentals of Backup&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 1&lt;/strong&gt; covers the &lt;strong&gt;fundamentals of backup&lt;/strong&gt; and tactics that will help you understand your unique backup requirements. You'll learn how to:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Begin planning your backup and disaster recovery planning&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Set recovery objectives and loss tolerances&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Translate your business plan into a technically oriented outlook&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Create a customized agenda for obtaining key stakeholder support&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Set up a critical backup checklist&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;selecting-your-backup-strategy&quot;&gt;The Backup Bible – Part 2: Selecting your Backup Strategy&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 2&lt;/strong&gt; shows you what an exceptional backup looks like on a daily basis and the steps you need to get there, including:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Choosing the Right Backup and Recovery Software&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Setting and Achieving Backup Storage Targets&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Securing and Protecting Backup Data&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Defining Backup Schedules&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Monitoring, Testing, and Maintaining Systems&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Access both parts for free now and ensure you’re properly protecting your vital data today!&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;disaster-recovery&quot;&gt;The Backup Bible – Part 3: Aligning Disaster Recovery Strategies to your Business Needs&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Part 3&lt;/strong&gt; guides you through the process of &lt;strong&gt;creating a reliable disaster recovery strategy&lt;/strong&gt; based on your own business continuity requirements, covering:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Understanding key disaster recovery considerations&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Mapping out your organizational composition&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Replication&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Cloud solutions&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Testing the efficacy of your strategy&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;The Backup Bible&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/the-backup-bible/the-backup-bible.jpg&quot; alt=&quot;the backup bible&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the most useful features of &lt;strong&gt;The Backup Bible&lt;/strong&gt; is the customizable templates and lists that enable the reader to put the theory into practice. These are found in the appendix but are linked in the text at the end of each relevant chapter. If you are going to read this book cover to cover it would be a good idea to fill out the templates and lists as you go through it, so by the time you’ve finished reading you’ll have a fully personalized backup action plan ready for you to carry out!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Sure, it’s not the most exciting aspect of an IT administrator’s job but having a reliable and secure backup and disaster recovery strategy could be the most important thing you do. I’m sure you’ve heard many data loss horror stories that have crippled organizations costing thousands, if not millions, of dollars. This &lt;strong&gt;free eBook&lt;/strong&gt; from &lt;strong&gt;Altaro&lt;/strong&gt; will make sure you’re not the next horror story victim.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;The Backup Bible Complete Edition&lt;/strong&gt; also works as a great reference guide for all IT admins and anyone with an interest in &lt;strong&gt;protecting organizational data&lt;/strong&gt;. And the best thing of all: &lt;strong&gt;it’s free&lt;/strong&gt;! Learn how to &lt;strong&gt;create your own backup&lt;/strong&gt; and &lt;strong&gt;disaster recovery plan&lt;/strong&gt;, &lt;strong&gt;protect and secure your data backup&lt;/strong&gt; for both &lt;strong&gt;onsite&lt;/strong&gt;/&lt;strong&gt;on-premises&lt;/strong&gt; and &lt;strong&gt;cloud-based&lt;/strong&gt; (&lt;strong&gt;AWS&lt;/strong&gt; and &lt;strong&gt;Azure&lt;/strong&gt;) installations plus more. What are you waiting for? &lt;a href=&quot;https://clixtrac.com/goto/?297024&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your copy now!&quot;&gt;Download your copy now!&lt;/a&gt;&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>SysAdmin Day 2020 - Get your Free Amazon Voucher &amp; Gifts Now!</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/sysadmin-day-2020.html"/>
		<published>2020-08-18T11:38:00+10:00</published>
		<updated>2020-08-18T11:38:00+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/sysadmin-day-2020.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;SysAdmin Day 2020&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/sysadmin-day-2020/sysadmin-day-2020-amazon-voucher.png&quot; alt=&quot;sysadmin day 2020 amazon voucher&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;sysadmin day 2020 amazon voucher&quot; /&gt;SysAdmin Day&lt;/strong&gt;&lt;/a&gt; has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to keep going, despite all challenges thrown our way. Now it is &lt;strong&gt;Altaro’s&lt;/strong&gt; turn to &lt;strong&gt;thank YOU&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;If you are an &lt;strong&gt;Office 365&lt;/strong&gt;, &lt;strong&gt;Hyper-V&lt;/strong&gt; or &lt;strong&gt;VMware user&lt;/strong&gt;, celebrate with Altaro. Just &lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Signup - SysAdmin Day&quot;&gt;&lt;strong&gt;sign up for a 30-day free trial&lt;/strong&gt;&lt;/a&gt; of either Altaro VM Backup or Altaro Office 365 Backup – it's your choice!&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;SysAdmin Day 2020&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/sysadmin-day-2020/sysadmin-day-2020-altaro.png&quot; alt=&quot;sysadmin day 2020 altaro&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;SysAdmin Day 2020 with Altaro&quot; /&gt;&lt;/a&gt;&lt;br /&gt;What can you Win?&lt;/h2&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Receive a &lt;strong&gt;€/£/$20 Amazon voucher&lt;/strong&gt; when you use your trial of &lt;strong&gt;Altaro Office 365 Backup&lt;/strong&gt; or &lt;strong&gt;Altaro VM Backup&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Get the chance to also win one of their &lt;strong&gt;Grand Prizes&lt;/strong&gt; by sharing your greatest 2020 victory with Altaro in an up to 60-seconds video.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What are you waiting for? &lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Sign Up Now!&quot;&gt;Sign up now&lt;/a&gt;! &lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;SysAdmin Day 2020&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/sysadmin-day-2020/sysadmin-day-2020-amazon-voucher.png&quot; alt=&quot;sysadmin day 2020 amazon voucher&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;sysadmin day 2020 amazon voucher&quot; /&gt;SysAdmin Day&lt;/strong&gt;&lt;/a&gt; has arrived, and with it, gratitude for all the unsung heroes that 2020 has needed. Your hard work has made it possible for all of us to keep going, despite all challenges thrown our way. Now it is &lt;strong&gt;Altaro’s&lt;/strong&gt; turn to &lt;strong&gt;thank YOU&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;If you are an &lt;strong&gt;Office 365&lt;/strong&gt;, &lt;strong&gt;Hyper-V&lt;/strong&gt; or &lt;strong&gt;VMware user&lt;/strong&gt;, celebrate with Altaro. Just &lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Signup - SysAdmin Day&quot;&gt;&lt;strong&gt;sign up for a 30-day free trial&lt;/strong&gt;&lt;/a&gt; of either Altaro VM Backup or Altaro Office 365 Backup – it's your choice!&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;SysAdmin Day 2020&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/sysadmin-day-2020/sysadmin-day-2020-altaro.png&quot; alt=&quot;sysadmin day 2020 altaro&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;SysAdmin Day 2020 with Altaro&quot; /&gt;&lt;/a&gt;&lt;br /&gt;What can you Win?&lt;/h2&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Receive a &lt;strong&gt;€/£/$20 Amazon voucher&lt;/strong&gt; when you use your trial of &lt;strong&gt;Altaro Office 365 Backup&lt;/strong&gt; or &lt;strong&gt;Altaro VM Backup&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Get the chance to also win one of their &lt;strong&gt;Grand Prizes&lt;/strong&gt; by sharing your greatest 2020 victory with Altaro in an up to 60-seconds video.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What are you waiting for? &lt;a href=&quot;https://clixtrac.com/goto/?231448&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Sign Up Now!&quot;&gt;Sign up now&lt;/a&gt;! &lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>How to Fix VMware ESXi Virtual Machine 'Invalid Status'</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-invalid-status-virtual-machine.html"/>
		<published>2020-06-16T14:34:40+10:00</published>
		<updated>2020-06-16T14:34:40+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-invalid-status-virtual-machine.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;In this article, we'll show you how to deal with VMs which are reported to have an&amp;nbsp;&lt;strong&gt;Invalid&lt;/strong&gt; &lt;strong&gt;Status &lt;/strong&gt;as shown in the screenshot below. This is a common problem many&amp;nbsp;&lt;strong&gt;VMware&lt;/strong&gt; and &lt;strong&gt;System Administrators&lt;/strong&gt; are faced with when dealing with &lt;strong&gt;VMs&lt;/strong&gt;. We'll show you &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;enable SSH on ESXi&quot;&gt;how to enable SSH on ESXi&lt;/a&gt; (required for this task), use the&lt;strong&gt; vim-cmd &lt;/strong&gt;to obtain a list of the &lt;strong&gt;invalid VMs&lt;/strong&gt;, use the&amp;nbsp;&lt;strong&gt;vim-cmd /vmsvc/unregister&lt;/strong&gt; command to &lt;strong&gt;unregister&lt;/strong&gt; - &lt;strong&gt;delete&lt;/strong&gt; the VMs and edit the &lt;strong&gt;/etc/vmware/hostd/vmInventory.xml file&lt;/strong&gt; to &lt;strong&gt;remove&lt;/strong&gt; the section(s) that references the &lt;strong&gt;invalid VM(s)&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Invalid&lt;/strong&gt; &lt;strong&gt;Status &lt;/strong&gt;issue is usually caused after attempting to &lt;strong&gt;delete a VM&lt;/strong&gt;, manually &lt;strong&gt;removing VM files &lt;/strong&gt;after a &lt;strong&gt;vMotion, &lt;/strong&gt;a &lt;strong&gt;problem&lt;/strong&gt; with the &lt;strong&gt;VMFS storage&lt;/strong&gt; or even after &lt;strong&gt;physically removing the storage &lt;/strong&gt;from the ESXi host e.g &lt;strong&gt;replacing a failed hdd&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-machine-invalid-status.png&quot; alt=&quot;esxi vm machine invalid status&quot; id=&quot;esxi vm machine invalid status&quot; style=&quot;display: block; margin: 7px auto; border: 1px solid #000000;&quot; title=&quot;esxi vm machine invalid status&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Another difficulty with VMs stuck in an &lt;strong&gt;Invalid Status&lt;/strong&gt; is that VMware will &lt;strong&gt;not allow you to remove&lt;/strong&gt; or &lt;strong&gt;delete&lt;/strong&gt; any &lt;strong&gt;Datastore&lt;/strong&gt; associated with the VM e.g if you wanted to &lt;strong&gt;remove a HDD&lt;/strong&gt;. For safety reasons, you must first &lt;strong&gt;remove or migrate the affected VM&lt;/strong&gt; so that there is no VM associated with the &lt;strong&gt;Datastore&lt;/strong&gt; before VMware allows you to delete it.&lt;/p&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and their data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&quot;&gt;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&quot;&gt;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&quot;&gt;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The screenshot below shows ESXi failing to delete &lt;strong&gt;datastore 256G-SSD&lt;/strong&gt; - which is used by VM &lt;strong&gt;FCX-ISE1&lt;/strong&gt; above, now reported to be in an &lt;strong&gt;Invalid Status:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-unable-to-delete-datastore.png&quot; alt=&quot;esxi vm unable to delete datastore&quot; id=&quot;esxi vm unable to delete datastore&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;esxi vm unable to delete datastore&quot; /&gt;&lt;/p&gt;
&lt;p&gt;As most System Administrators discover in these situations - they are pretty much stuck and the only way to &lt;strong&gt;remove&lt;/strong&gt; the &lt;strong&gt;VM&lt;/strong&gt;, now marked as '&lt;strong&gt;Invalid&lt;/strong&gt;'&lt;strong&gt;,&lt;/strong&gt; is to &lt;strong&gt;delete it&lt;/strong&gt; as the &lt;strong&gt;Unregister&lt;/strong&gt; option cannot be selected when &lt;strong&gt;right clicking&lt;/strong&gt; on top of the VM:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-invalid-status-delete-unregister-option-unavailable.png&quot; alt=&quot;esxi vm invalid status delete unregister option unavailable&quot; id=&quot;esxi vm invalid status delete unregister option unavailable&quot; style=&quot;display: block; margin: 7px auto; border: 1px solid #000000;&quot; title=&quot;esxi vm invalid status delete unregister option unavailable&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Notice in the screenshot above how the &lt;strong&gt;Unregister&lt;/strong&gt; or &lt;strong&gt;Delete&lt;/strong&gt; menu options are &lt;strong&gt;not available&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The only method to &lt;strong&gt;delete&lt;/strong&gt; this &lt;strong&gt;VM&lt;/strong&gt; is to use the &lt;strong&gt;SSH console&lt;/strong&gt; on the ESXi host and execute a number of commands. This implies that &lt;strong&gt;SSH&lt;/strong&gt; has been &lt;strong&gt;enabled&lt;/strong&gt; on the &lt;strong&gt;ESXi host&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;Read our quick guide on “&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to enable SSH on VMware ESXi&quot;&gt;How to enable SSH on an ESXi host&lt;/a&gt;” if SSH is not enabled on your ESXi host.&lt;/p&gt;
&lt;p&gt;Once ssh is enabled, connect to your &lt;strong&gt;ESXi host&lt;/strong&gt; with any &lt;strong&gt;ssh client&lt;/strong&gt; such as e.g &lt;strong&gt;Putty&lt;/strong&gt; using your&lt;strong&gt; ESXi root credentials&lt;/strong&gt;, then use the&lt;strong&gt; vim-cmd &lt;/strong&gt;with the following parameters to obtain a list of the &lt;strong&gt;invalid VMs&lt;/strong&gt;:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;samp&gt;&lt;span style=&quot;color: #000000;&quot;&gt;[root@esxi1:~] &lt;strong&gt;vim-cmd vmsvc/getallvms | grep invalid&lt;/strong&gt;&lt;br /&gt; &lt;strong&gt;Skipping invalid VM '8'&lt;/strong&gt;&lt;br /&gt; [root@esxi1:~]&lt;/span&gt;&lt;/samp&gt;&lt;/p&gt;
&lt;p&gt;From the command output it is apparent that &lt;strong&gt;VM No.8&lt;/strong&gt; is the one we are after.&amp;nbsp; As a last attempt we can try to reload the VM in hope it will rectify the problem by executing the &lt;strong&gt;vim-cmd vmsvc/reload&lt;/strong&gt; command:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@esxi1:~] &lt;strong&gt;vim-cmd vmsvc/reload 8&lt;br /&gt; (vmodl.fault.SystemError) {&lt;br /&gt; &amp;nbsp;&amp;nbsp; faultCause = (vmodl.MethodFault) null,&lt;br /&gt; &amp;nbsp;&amp;nbsp; faultMessage = &amp;lt;unset&amp;gt;,&lt;br /&gt; &amp;nbsp;&amp;nbsp; reason = &quot;Invalid fault&quot;&lt;br /&gt; &amp;nbsp;&amp;nbsp; msg = &quot;Received SOAP response fault from [&amp;lt;cs p:03d09848, TCP:localhost:80&amp;gt;]: reload&lt;br /&gt; vim.fault.InvalidState&quot;&lt;br /&gt; }&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;Unfortunately, no joy. We now need to proceed to &lt;strong&gt;unregister&lt;/strong&gt;/&lt;strong&gt;delete&lt;/strong&gt; the VM using the &lt;strong&gt;vim-cmd /vmsvc/unregister&lt;/strong&gt; command as shown below:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;[root@esxi1:~] &lt;strong&gt;vim-cmd /vmsvc/unregister 8&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Once the command is executed, the &lt;strong&gt;invalid VM&lt;/strong&gt; will magically disappear from the ESXi GUI interface:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-machine-invalid-vm-deleted.png&quot; alt=&quot;esxi vm machine invalid vm deleted&quot; id=&quot;esxi vm machine invalid vm deleted&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;esxi vm machine invalid vm deleted&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Another way to &lt;strong&gt;delete the VM&lt;/strong&gt; is to edit the &lt;strong&gt;/etc/vmware/hostd/vmInventory.xml file&lt;/strong&gt; and&lt;strong&gt; remove the section that references the invalid VM. &lt;/strong&gt;In the snippet below we need to simply &lt;strong&gt;remove&lt;/strong&gt; the highlighted text:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&amp;lt;ConfigRoot&amp;gt;&lt;br /&gt; &amp;nbsp; &amp;lt;ConfigEntry id=&quot;0000&quot;&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;objID&amp;gt;1&amp;lt;/objID&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;secDomain&amp;gt;23&amp;lt;/secDomain&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;vmxCfgPath&amp;gt;/vmfs/volumes/5a87661c-a465347a-a344-180373f17d5a/Voyager-DC/Voyager-DC.vmx&amp;lt;/vmxCfgPath&amp;gt;&lt;br /&gt; &amp;nbsp; &amp;lt;/ConfigEntry&amp;gt;&lt;br /&gt; &amp;nbsp; …………&lt;br /&gt; &lt;span style=&quot;background-color: #008000; color: #ffffff;&quot;&gt;&amp;nbsp; &amp;lt;ConfigEntry id=&quot;0008&quot;&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;objID&amp;gt;8&amp;lt;/objID&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;secDomain&amp;gt;54&amp;lt;/secDomain&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;vmxCfgPath&amp;gt;/vmfs/volumes/&amp;nbsp;&amp;nbsp; &amp;lt;/vmxCfgPath&amp;gt;&lt;br /&gt; &amp;nbsp; &amp;lt;/ConfigEntry&amp;gt;&lt;/span&gt;&lt;br /&gt; &amp;lt;/ConfigRoot&amp;gt;&lt;/p&gt;
&lt;p&gt;When finished, simply &lt;strong&gt;save&lt;/strong&gt; the &lt;strong&gt;vmInventory.xml&lt;/strong&gt; file.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;This article showed how to deal with an &lt;strong&gt;ESXi VM&lt;/strong&gt; that is in an &lt;strong&gt;invalid status&lt;/strong&gt;. We explained possible causes of this issue, &lt;strong&gt;how to enable SSH&lt;/strong&gt; on ESXi and the &lt;strong&gt;SSH commands&lt;/strong&gt; required to &lt;strong&gt;reload&lt;/strong&gt; or &lt;strong&gt;delete&lt;/strong&gt; the &lt;strong&gt;invalid VM&lt;/strong&gt;. Finally we saw how to delete a VM by executing the&amp;nbsp;&lt;strong&gt;vim-cmd /vmsvc/unregister&lt;/strong&gt; command or &lt;strong&gt;editing&lt;/strong&gt; the &lt;strong&gt;vmInventory.xml XML &lt;/strong&gt;&lt;strong&gt;file. &lt;/strong&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;In this article, we'll show you how to deal with VMs which are reported to have an&amp;nbsp;&lt;strong&gt;Invalid&lt;/strong&gt; &lt;strong&gt;Status &lt;/strong&gt;as shown in the screenshot below. This is a common problem many&amp;nbsp;&lt;strong&gt;VMware&lt;/strong&gt; and &lt;strong&gt;System Administrators&lt;/strong&gt; are faced with when dealing with &lt;strong&gt;VMs&lt;/strong&gt;. We'll show you &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;enable SSH on ESXi&quot;&gt;how to enable SSH on ESXi&lt;/a&gt; (required for this task), use the&lt;strong&gt; vim-cmd &lt;/strong&gt;to obtain a list of the &lt;strong&gt;invalid VMs&lt;/strong&gt;, use the&amp;nbsp;&lt;strong&gt;vim-cmd /vmsvc/unregister&lt;/strong&gt; command to &lt;strong&gt;unregister&lt;/strong&gt; - &lt;strong&gt;delete&lt;/strong&gt; the VMs and edit the &lt;strong&gt;/etc/vmware/hostd/vmInventory.xml file&lt;/strong&gt; to &lt;strong&gt;remove&lt;/strong&gt; the section(s) that references the &lt;strong&gt;invalid VM(s)&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Invalid&lt;/strong&gt; &lt;strong&gt;Status &lt;/strong&gt;issue is usually caused after attempting to &lt;strong&gt;delete a VM&lt;/strong&gt;, manually &lt;strong&gt;removing VM files &lt;/strong&gt;after a &lt;strong&gt;vMotion, &lt;/strong&gt;a &lt;strong&gt;problem&lt;/strong&gt; with the &lt;strong&gt;VMFS storage&lt;/strong&gt; or even after &lt;strong&gt;physically removing the storage &lt;/strong&gt;from the ESXi host e.g &lt;strong&gt;replacing a failed hdd&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-machine-invalid-status.png&quot; alt=&quot;esxi vm machine invalid status&quot; id=&quot;esxi vm machine invalid status&quot; style=&quot;display: block; margin: 7px auto; border: 1px solid #000000;&quot; title=&quot;esxi vm machine invalid status&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Another difficulty with VMs stuck in an &lt;strong&gt;Invalid Status&lt;/strong&gt; is that VMware will &lt;strong&gt;not allow you to remove&lt;/strong&gt; or &lt;strong&gt;delete&lt;/strong&gt; any &lt;strong&gt;Datastore&lt;/strong&gt; associated with the VM e.g if you wanted to &lt;strong&gt;remove a HDD&lt;/strong&gt;. For safety reasons, you must first &lt;strong&gt;remove or migrate the affected VM&lt;/strong&gt; so that there is no VM associated with the &lt;strong&gt;Datastore&lt;/strong&gt; before VMware allows you to delete it.&lt;/p&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and their data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&quot;&gt;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&quot;&gt;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&quot;&gt;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The screenshot below shows ESXi failing to delete &lt;strong&gt;datastore 256G-SSD&lt;/strong&gt; - which is used by VM &lt;strong&gt;FCX-ISE1&lt;/strong&gt; above, now reported to be in an &lt;strong&gt;Invalid Status:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-unable-to-delete-datastore.png&quot; alt=&quot;esxi vm unable to delete datastore&quot; id=&quot;esxi vm unable to delete datastore&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;esxi vm unable to delete datastore&quot; /&gt;&lt;/p&gt;
&lt;p&gt;As most System Administrators discover in these situations - they are pretty much stuck and the only way to &lt;strong&gt;remove&lt;/strong&gt; the &lt;strong&gt;VM&lt;/strong&gt;, now marked as '&lt;strong&gt;Invalid&lt;/strong&gt;'&lt;strong&gt;,&lt;/strong&gt; is to &lt;strong&gt;delete it&lt;/strong&gt; as the &lt;strong&gt;Unregister&lt;/strong&gt; option cannot be selected when &lt;strong&gt;right clicking&lt;/strong&gt; on top of the VM:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-invalid-status-delete-unregister-option-unavailable.png&quot; alt=&quot;esxi vm invalid status delete unregister option unavailable&quot; id=&quot;esxi vm invalid status delete unregister option unavailable&quot; style=&quot;display: block; margin: 7px auto; border: 1px solid #000000;&quot; title=&quot;esxi vm invalid status delete unregister option unavailable&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Notice in the screenshot above how the &lt;strong&gt;Unregister&lt;/strong&gt; or &lt;strong&gt;Delete&lt;/strong&gt; menu options are &lt;strong&gt;not available&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The only method to &lt;strong&gt;delete&lt;/strong&gt; this &lt;strong&gt;VM&lt;/strong&gt; is to use the &lt;strong&gt;SSH console&lt;/strong&gt; on the ESXi host and execute a number of commands. This implies that &lt;strong&gt;SSH&lt;/strong&gt; has been &lt;strong&gt;enabled&lt;/strong&gt; on the &lt;strong&gt;ESXi host&lt;/strong&gt;.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;Read our quick guide on “&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to enable SSH on VMware ESXi&quot;&gt;How to enable SSH on an ESXi host&lt;/a&gt;” if SSH is not enabled on your ESXi host.&lt;/p&gt;
&lt;p&gt;Once ssh is enabled, connect to your &lt;strong&gt;ESXi host&lt;/strong&gt; with any &lt;strong&gt;ssh client&lt;/strong&gt; such as e.g &lt;strong&gt;Putty&lt;/strong&gt; using your&lt;strong&gt; ESXi root credentials&lt;/strong&gt;, then use the&lt;strong&gt; vim-cmd &lt;/strong&gt;with the following parameters to obtain a list of the &lt;strong&gt;invalid VMs&lt;/strong&gt;:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;samp&gt;&lt;span style=&quot;color: #000000;&quot;&gt;[root@esxi1:~] &lt;strong&gt;vim-cmd vmsvc/getallvms | grep invalid&lt;/strong&gt;&lt;br /&gt; &lt;strong&gt;Skipping invalid VM '8'&lt;/strong&gt;&lt;br /&gt; [root@esxi1:~]&lt;/span&gt;&lt;/samp&gt;&lt;/p&gt;
&lt;p&gt;From the command output it is apparent that &lt;strong&gt;VM No.8&lt;/strong&gt; is the one we are after.&amp;nbsp; As a last attempt we can try to reload the VM in hope it will rectify the problem by executing the &lt;strong&gt;vim-cmd vmsvc/reload&lt;/strong&gt; command:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;[root@esxi1:~] &lt;strong&gt;vim-cmd vmsvc/reload 8&lt;br /&gt; (vmodl.fault.SystemError) {&lt;br /&gt; &amp;nbsp;&amp;nbsp; faultCause = (vmodl.MethodFault) null,&lt;br /&gt; &amp;nbsp;&amp;nbsp; faultMessage = &amp;lt;unset&amp;gt;,&lt;br /&gt; &amp;nbsp;&amp;nbsp; reason = &quot;Invalid fault&quot;&lt;br /&gt; &amp;nbsp;&amp;nbsp; msg = &quot;Received SOAP response fault from [&amp;lt;cs p:03d09848, TCP:localhost:80&amp;gt;]: reload&lt;br /&gt; vim.fault.InvalidState&quot;&lt;br /&gt; }&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;Unfortunately, no joy. We now need to proceed to &lt;strong&gt;unregister&lt;/strong&gt;/&lt;strong&gt;delete&lt;/strong&gt; the VM using the &lt;strong&gt;vim-cmd /vmsvc/unregister&lt;/strong&gt; command as shown below:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;[root@esxi1:~] &lt;strong&gt;vim-cmd /vmsvc/unregister 8&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Once the command is executed, the &lt;strong&gt;invalid VM&lt;/strong&gt; will magically disappear from the ESXi GUI interface:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-invalid-status-vm/esxi-vm-machine-invalid-vm-deleted.png&quot; alt=&quot;esxi vm machine invalid vm deleted&quot; id=&quot;esxi vm machine invalid vm deleted&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;esxi vm machine invalid vm deleted&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Another way to &lt;strong&gt;delete the VM&lt;/strong&gt; is to edit the &lt;strong&gt;/etc/vmware/hostd/vmInventory.xml file&lt;/strong&gt; and&lt;strong&gt; remove the section that references the invalid VM. &lt;/strong&gt;In the snippet below we need to simply &lt;strong&gt;remove&lt;/strong&gt; the highlighted text:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&amp;lt;ConfigRoot&amp;gt;&lt;br /&gt; &amp;nbsp; &amp;lt;ConfigEntry id=&quot;0000&quot;&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;objID&amp;gt;1&amp;lt;/objID&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;secDomain&amp;gt;23&amp;lt;/secDomain&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;vmxCfgPath&amp;gt;/vmfs/volumes/5a87661c-a465347a-a344-180373f17d5a/Voyager-DC/Voyager-DC.vmx&amp;lt;/vmxCfgPath&amp;gt;&lt;br /&gt; &amp;nbsp; &amp;lt;/ConfigEntry&amp;gt;&lt;br /&gt; &amp;nbsp; …………&lt;br /&gt; &lt;span style=&quot;background-color: #008000; color: #ffffff;&quot;&gt;&amp;nbsp; &amp;lt;ConfigEntry id=&quot;0008&quot;&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;objID&amp;gt;8&amp;lt;/objID&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;secDomain&amp;gt;54&amp;lt;/secDomain&amp;gt;&lt;br /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;vmxCfgPath&amp;gt;/vmfs/volumes/&amp;nbsp;&amp;nbsp; &amp;lt;/vmxCfgPath&amp;gt;&lt;br /&gt; &amp;nbsp; &amp;lt;/ConfigEntry&amp;gt;&lt;/span&gt;&lt;br /&gt; &amp;lt;/ConfigRoot&amp;gt;&lt;/p&gt;
&lt;p&gt;When finished, simply &lt;strong&gt;save&lt;/strong&gt; the &lt;strong&gt;vmInventory.xml&lt;/strong&gt; file.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;This article showed how to deal with an &lt;strong&gt;ESXi VM&lt;/strong&gt; that is in an &lt;strong&gt;invalid status&lt;/strong&gt;. We explained possible causes of this issue, &lt;strong&gt;how to enable SSH&lt;/strong&gt; on ESXi and the &lt;strong&gt;SSH commands&lt;/strong&gt; required to &lt;strong&gt;reload&lt;/strong&gt; or &lt;strong&gt;delete&lt;/strong&gt; the &lt;strong&gt;invalid VM&lt;/strong&gt;. Finally we saw how to delete a VM by executing the&amp;nbsp;&lt;strong&gt;vim-cmd /vmsvc/unregister&lt;/strong&gt; command or &lt;strong&gt;editing&lt;/strong&gt; the &lt;strong&gt;vmInventory.xml XML &lt;/strong&gt;&lt;strong&gt;file. &lt;/strong&gt;&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>How to Enable SNMP on VMware ESXi Host &amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html"/>
		<published>2020-05-29T16:05:00+10:00</published>
		<updated>2020-05-29T16:05:00+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we will show you &lt;strong&gt;how to enable SNMP&lt;/strong&gt; on your &lt;strong&gt;VMware ESXi host&lt;/strong&gt;, &lt;strong&gt;configure SNMP Community string&lt;/strong&gt; and &lt;strong&gt;configure your ESXi firewall&lt;/strong&gt; to &lt;strong&gt;allow &lt;/strong&gt;or&lt;strong&gt; block access&lt;/strong&gt; to the &lt;strong&gt;SNMP service&lt;/strong&gt; from &lt;strong&gt;specific host(s)&lt;/strong&gt; or &lt;strong&gt;network(s)&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Enabling SNMP service&lt;/strong&gt; on a &lt;strong&gt;VMware ESXi host&lt;/strong&gt; is considered mandatory in any production environment as it allows a &lt;strong&gt;Network Monitoring System&lt;/strong&gt; (NMS) access and &lt;strong&gt;monitor the ESXi host(s) &lt;/strong&gt;and obtain valuable information such as &lt;strong&gt;CPU&lt;/strong&gt;, &lt;strong&gt;RAM&lt;/strong&gt; and &lt;strong&gt;Storage usage&lt;/strong&gt;, &lt;strong&gt;vmnic&lt;/strong&gt; (network) &lt;strong&gt;utilization&lt;/strong&gt; and much more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?225545&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Enterprise Grade Network Monitoring System&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/how-to-enable-snmp-on-vmware-esxi/how-to-enable-snmp-on-esxi-host-1.png&quot; alt=&quot;how to enable snmp on esxi host&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;how to enable snmp on esxi host&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Furthermore, an &lt;a href=&quot;https://clixtrac.com/goto/?225545&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;Enterprise Grade NMS System&quot; title=&quot;Enterprise Grade NMS System&quot;&gt;enterprise grade NMS system&lt;/a&gt; can connect to your VMware infrastructure and provide &lt;strong&gt;alerting&lt;/strong&gt;, &lt;strong&gt;performance&lt;/strong&gt; and &lt;strong&gt;statistical analysis reports&lt;/strong&gt; to help better determine sizing requirements but also identify &lt;strong&gt;bottlenecks&lt;/strong&gt; and other problems that might be impacting the virtualization environment.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Execution Time&lt;/strong&gt;: 10 minutes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Related Articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&quot;&gt;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&quot;&gt;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Enable SSH on ESXi&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First step it to &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;enable SSH on ESXi&quot;&gt;enable SSH on ESXi&lt;/a&gt;. This can be easily perform via the vSphere client, ESXi console or Web GUI. All these methods are covered in details in our article &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SSH on VMware ESXi&quot;&gt;How to Enable SSH on VMware ESXi&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Enable and Configure ESXi SNMP Service&lt;/h2&gt;
&lt;p&gt;Once &lt;strong&gt;SSH&lt;/strong&gt; has been &lt;strong&gt;enabled&lt;/strong&gt;, ssh to your ESXi host and use the following commands to &lt;strong&gt;enable and configure the SNMP service&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli system snmp set --communities COMMUNITY_STRING&lt;br /&gt; esxcli system snmp set --enable true&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Replace “&lt;strong&gt;COMMUNITY_STRING&lt;/strong&gt;” with the SNMP string of your choice.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Enable SNMP on ESXi Firewall&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next step is to add a firewall rule to allow inbound SNMP queries to the ESXi host. There are two scenarios here:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Allow traffic from everywhere&lt;/li&gt;
&lt;li&gt;Allow traffic from specific hosts or networks&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Allow SNMP Traffic from Everywhere&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below rules allow SNMP traffic from everywhere – all hosts and networks:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli network firewall ruleset set --ruleset-id snmp --allowed-all true&lt;br /&gt; esxcli network firewall ruleset set --ruleset-id snmp --enabled true&lt;/strong&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Allow SNMP Traffic from Specific Hosts or Networks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below rules allow SNMP traffic from &lt;strong&gt;host 192.168.5.25&lt;/strong&gt; and &lt;strong&gt;network 192.168.1.0/24&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli network firewall ruleset set --ruleset-id snmp --allowed-all false&lt;br /&gt; esxcli network firewall ruleset allowedip add --ruleset-id snmp --ip-address 192.168.5.25&lt;br /&gt; esxcli network firewall ruleset allowedip add --ruleset-id snmp --ip-address 192.168.1.0/24&lt;br /&gt; esxcli network firewall ruleset set --ruleset-id snmp --enabled true&lt;/strong&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Block Host or Network from Accessing SNMP Service&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To &lt;strong&gt;block a previously allowed host or network&lt;/strong&gt; from accessing the SNMP service simply execute the following command(s):&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli network firewall ruleset allowedip remove --ruleset-id snmp --ip-address 192.168.5.25&lt;br /&gt; esxcli network firewall ruleset allowedip remove --ruleset-id snmp --ip-address 192.168.1.0/24&lt;/strong&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Restart SNMP Service&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now that everything is configured, all we need to do is &lt;strong&gt;restart the SNMP service&lt;/strong&gt; using the following command:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;strong&gt;/etc/init.d/snmpd restart&lt;/strong&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we explained the &lt;strong&gt;importance and usage of the SNMP Service&lt;/strong&gt; for VMware ESXi Hosts and vCenter. We explained &lt;strong&gt;how to enable the SNMP Service&lt;/strong&gt; on an &lt;strong&gt;ESXi host&lt;/strong&gt;, &lt;strong&gt;configure the SNMP community string&lt;/strong&gt; (public/private) and provided examples on &lt;strong&gt;how to configure the ESXi Firewall&lt;/strong&gt; to &lt;strong&gt;control SNMP access&lt;/strong&gt; to the &lt;strong&gt;ESXi host&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we will show you &lt;strong&gt;how to enable SNMP&lt;/strong&gt; on your &lt;strong&gt;VMware ESXi host&lt;/strong&gt;, &lt;strong&gt;configure SNMP Community string&lt;/strong&gt; and &lt;strong&gt;configure your ESXi firewall&lt;/strong&gt; to &lt;strong&gt;allow &lt;/strong&gt;or&lt;strong&gt; block access&lt;/strong&gt; to the &lt;strong&gt;SNMP service&lt;/strong&gt; from &lt;strong&gt;specific host(s)&lt;/strong&gt; or &lt;strong&gt;network(s)&lt;/strong&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Enabling SNMP service&lt;/strong&gt; on a &lt;strong&gt;VMware ESXi host&lt;/strong&gt; is considered mandatory in any production environment as it allows a &lt;strong&gt;Network Monitoring System&lt;/strong&gt; (NMS) access and &lt;strong&gt;monitor the ESXi host(s) &lt;/strong&gt;and obtain valuable information such as &lt;strong&gt;CPU&lt;/strong&gt;, &lt;strong&gt;RAM&lt;/strong&gt; and &lt;strong&gt;Storage usage&lt;/strong&gt;, &lt;strong&gt;vmnic&lt;/strong&gt; (network) &lt;strong&gt;utilization&lt;/strong&gt; and much more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?225545&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Enterprise Grade Network Monitoring System&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/how-to-enable-snmp-on-vmware-esxi/how-to-enable-snmp-on-esxi-host-1.png&quot; alt=&quot;how to enable snmp on esxi host&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;how to enable snmp on esxi host&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Furthermore, an &lt;a href=&quot;https://clixtrac.com/goto/?225545&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;Enterprise Grade NMS System&quot; title=&quot;Enterprise Grade NMS System&quot;&gt;enterprise grade NMS system&lt;/a&gt; can connect to your VMware infrastructure and provide &lt;strong&gt;alerting&lt;/strong&gt;, &lt;strong&gt;performance&lt;/strong&gt; and &lt;strong&gt;statistical analysis reports&lt;/strong&gt; to help better determine sizing requirements but also identify &lt;strong&gt;bottlenecks&lt;/strong&gt; and other problems that might be impacting the virtualization environment.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Execution Time&lt;/strong&gt;: 10 minutes&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Related Articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html&quot; target=&quot;_blank&quot; title=&quot;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&quot;&gt;Understanding Deduplication. Complete Guide to Deduplication Methods &amp;amp; Their Impact on Storage and VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&quot;&gt;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Enable SSH on ESXi&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First step it to &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;enable SSH on ESXi&quot;&gt;enable SSH on ESXi&lt;/a&gt;. This can be easily perform via the vSphere client, ESXi console or Web GUI. All these methods are covered in details in our article &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SSH on VMware ESXi&quot;&gt;How to Enable SSH on VMware ESXi&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Enable and Configure ESXi SNMP Service&lt;/h2&gt;
&lt;p&gt;Once &lt;strong&gt;SSH&lt;/strong&gt; has been &lt;strong&gt;enabled&lt;/strong&gt;, ssh to your ESXi host and use the following commands to &lt;strong&gt;enable and configure the SNMP service&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli system snmp set --communities COMMUNITY_STRING&lt;br /&gt; esxcli system snmp set --enable true&lt;/strong&gt;&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Replace “&lt;strong&gt;COMMUNITY_STRING&lt;/strong&gt;” with the SNMP string of your choice.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Enable SNMP on ESXi Firewall&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next step is to add a firewall rule to allow inbound SNMP queries to the ESXi host. There are two scenarios here:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Allow traffic from everywhere&lt;/li&gt;
&lt;li&gt;Allow traffic from specific hosts or networks&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Allow SNMP Traffic from Everywhere&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below rules allow SNMP traffic from everywhere – all hosts and networks:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli network firewall ruleset set --ruleset-id snmp --allowed-all true&lt;br /&gt; esxcli network firewall ruleset set --ruleset-id snmp --enabled true&lt;/strong&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Allow SNMP Traffic from Specific Hosts or Networks&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below rules allow SNMP traffic from &lt;strong&gt;host 192.168.5.25&lt;/strong&gt; and &lt;strong&gt;network 192.168.1.0/24&lt;/strong&gt;:&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli network firewall ruleset set --ruleset-id snmp --allowed-all false&lt;br /&gt; esxcli network firewall ruleset allowedip add --ruleset-id snmp --ip-address 192.168.5.25&lt;br /&gt; esxcli network firewall ruleset allowedip add --ruleset-id snmp --ip-address 192.168.1.0/24&lt;br /&gt; esxcli network firewall ruleset set --ruleset-id snmp --enabled true&lt;/strong&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Block Host or Network from Accessing SNMP Service&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To &lt;strong&gt;block a previously allowed host or network&lt;/strong&gt; from accessing the SNMP service simply execute the following command(s):&lt;/p&gt;
&lt;div class=&quot;box-content&quot;&gt;&lt;strong&gt;esxcli network firewall ruleset allowedip remove --ruleset-id snmp --ip-address 192.168.5.25&lt;br /&gt; esxcli network firewall ruleset allowedip remove --ruleset-id snmp --ip-address 192.168.1.0/24&lt;/strong&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Restart SNMP Service&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now that everything is configured, all we need to do is &lt;strong&gt;restart the SNMP service&lt;/strong&gt; using the following command:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;strong&gt;/etc/init.d/snmpd restart&lt;/strong&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we explained the &lt;strong&gt;importance and usage of the SNMP Service&lt;/strong&gt; for VMware ESXi Hosts and vCenter. We explained &lt;strong&gt;how to enable the SNMP Service&lt;/strong&gt; on an &lt;strong&gt;ESXi host&lt;/strong&gt;, &lt;strong&gt;configure the SNMP community string&lt;/strong&gt; (public/private) and provided examples on &lt;strong&gt;how to configure the ESXi Firewall&lt;/strong&gt; to &lt;strong&gt;control SNMP access&lt;/strong&gt; to the &lt;strong&gt;ESXi host&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html"/>
		<published>2020-05-13T06:47:07+10:00</published>
		<updated>2020-05-13T06:47:07+10:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;SSH access&lt;/strong&gt; to VMware’s &lt;strong&gt;ESXi server&lt;/strong&gt; is by &lt;strong&gt;disabled&lt;/strong&gt; by &lt;strong&gt;default&lt;/strong&gt; however there are many reasons where SSH might be required. VMware and System administrators often find the need to perform advanced administrative tasks that require &lt;strong&gt;SSH access&lt;/strong&gt; to the &lt;strong&gt;ESXi host&lt;/strong&gt;. For example, deleting or reloading a VM with an &lt;strong&gt;Invalid Status&lt;/strong&gt; can only be performed via &lt;strong&gt;SSH&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article, we’ll show you &lt;strong&gt;how to enable SSH&lt;/strong&gt; on your &lt;strong&gt;ESXi host&lt;/strong&gt; with just a few simple steps. This task can be achieved via the ESXi Web GUI, vSphere Web GUI (vCenter) vSphere client or ESXi console. We’ll cover all three methods.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;strong&gt;Execution Time:&lt;/strong&gt; 5 minutes&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-disabling-ssh-on-vmware-esxi-via-web-gui&quot; title=&quot;Enabling and Disabling SSH on VMware ESXi via Web GUI&quot;&gt;Enabling and Disabling SSH on VMware ESXi via Web GUI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-disabling-ssh-on-vmware-via-vsphere-web-gui-client-vcenter&quot; title=&quot;Enabling and Disabling SSH on VMware via vSphere Web GUI Client (vCenter)&quot;&gt;Enabling and Disabling SSH on VMware via vSphere Web GUI Client (vCenter)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-eisabling-ssh-on-vmware-esxi-via-vsphere-client&quot; title=&quot;Enabling and Disabling SSH on VMware ESXi via vSphere Client&quot;&gt;Enabling and Disabling SSH on VMware ESXi via vSphere Client&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-disabling-ssh-console-on-vmware-esxi-via-esxi-console&quot; title=&quot;Enabling and Disabling SSH on VMware ESXi via ESXi Console&quot;&gt;Enabling and Disabling SSH on VMware ESXi via ESXi Console&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-warning&quot;&gt;&lt;strong&gt;Security Tip&lt;/strong&gt;: If your ESXi host management IP is not protected or isolated from the rest of the network, it is advisable to &lt;strong&gt;enable SSH&lt;/strong&gt; on an &lt;strong&gt;as-needed basis&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-disabling-ssh-on-vmware-esxi-via-web-gui&quot;&gt;Enabling and Disabling SSH Console on VMware ESXi via Web GUI&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Log into your ESXi server and select the &lt;strong&gt;host&lt;/strong&gt; from the &lt;strong&gt;Navigator window&lt;/strong&gt;. Next, go to &lt;strong&gt;Action &amp;gt; Services&lt;/strong&gt; and select the &lt;strong&gt;Enable Secure Shell (SSH)&lt;/strong&gt; menu option:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh.png&quot; alt=&quot;vmware esxi enable ssh&quot; id=&quot;vmware esxi enable ssh&quot; style=&quot;margin-top: 7px; margin-bottom: 7px; border: 1px solid #000000;&quot; title=&quot;vmware esxi enable ssh&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This will immediately &lt;strong&gt;enable SSH&lt;/strong&gt;. To &lt;strong&gt;disable SSH&lt;/strong&gt;, repeat the same steps. You’ll notice that the &lt;strong&gt;Disable Secure Shell (SSH)&lt;/strong&gt; option is now available:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-disable-ssh.png&quot; alt=&quot;vmware esxi disable ssh&quot; id=&quot;vmware esxi disable ssh&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi disable ssh&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-disabling-ssh-on-vmware-via-vsphere-web-gui-client-vcenter&quot;&gt;Enabling and Disabling SSH on VMware via vSphere Web GUI Client (vCenter)&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For those with a VMware vCenter environment, you can enable SSH for each ESXi host by selecting the host and then going to &lt;strong&gt;Manage &amp;gt; Settings &amp;gt; Security Profile &amp;gt; Edit&lt;/strong&gt;.&amp;nbsp; In the pop-up window, &lt;strong&gt;scroll down&lt;/strong&gt; to &lt;strong&gt;SSH Server&lt;/strong&gt; and &lt;strong&gt;tick it&lt;/strong&gt;. Optionally enter the &lt;strong&gt;IP address&lt;/strong&gt; or &lt;strong&gt;network(s)&lt;/strong&gt; you require to have SSH access to the host:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-vsphere-web-gui.png&quot; alt=&quot;vmware esxi enable ssh vsphere web gui&quot; id=&quot;vmware esxi enable ssh vsphere web gui&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh vsphere web gui&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-eisabling-ssh-on-vmware-esxi-via-vsphere-client&quot;&gt;Enabling and Disabling SSH on VMware ESXi via vSphere Client&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Launch your &lt;strong&gt;vSphere client&lt;/strong&gt; and log into your ESXi host. From vSphere, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;ESXi host&lt;/strong&gt; (1), then select the &lt;strong&gt;Configuration&lt;/strong&gt; tab (2). From there, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Security Profile &lt;/strong&gt;(3) under the &lt;strong&gt;Software section&lt;/strong&gt;. Finally &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Properties&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-vsphere-client.png&quot; alt=&quot;vmware esxi enable ssh via vsphere client&quot; id=&quot;vmware esxi enable ssh via vsphere client&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via vsphere client&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;On the pop-up window, select &lt;strong&gt;SSH&lt;/strong&gt; and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Options&lt;/strong&gt; button: &lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-vsphere-client-remote-access.png&quot; alt=&quot;vmware esxi enable ssh via vsphere client remote access&quot; id=&quot;vmware esxi enable ssh via vsphere client remote access&quot; style=&quot;border: 1px solid #000000; margin: 7px auto; display: block;&quot; title=&quot;vmware esxi enable ssh via vsphere client remote access&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Select the required &lt;strong&gt;Startup Policy&lt;/strong&gt;. Note that the ‘&lt;strong&gt;Start and stop with host’&lt;/strong&gt; option will permanently &lt;strong&gt;enable SSH&lt;/strong&gt;. Next, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Start&lt;/strong&gt; button under &lt;strong&gt;Service Commands&lt;/strong&gt; to enable SSH immediately. When done, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;OK&lt;/strong&gt; button:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-vsphere-client-start-stop.png&quot; alt=&quot;vmware esxi enable ssh via vsphere client start stop&quot; id=&quot;vmware esxi enable ssh via vsphere client start stop&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via vsphere client start stop&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To &lt;strong&gt;disable&lt;/strong&gt; the &lt;strong&gt;SSH service&lt;/strong&gt; via &lt;strong&gt;vSphere&lt;/strong&gt;, follow the same process as above and ensure you select the “&lt;strong&gt;Start and stop manually&lt;/strong&gt;” &lt;strong&gt;Startup Policy&lt;/strong&gt; option and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Stop&lt;/strong&gt; button under the &lt;strong&gt;Service Commands&lt;/strong&gt; section.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-disabling-ssh-console-on-vmware-esxi-via-esxi-console&quot;&gt;Enabling and Disabling SSH Console on VMware ESXi via ESXi Console&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;From your ESXi console, &lt;strong&gt;hit F2&lt;/strong&gt; to customise the system:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-1.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p&gt;At the prompt, enter the ESXi root user credentials:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-2.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At the next window, highlight &lt;strong&gt;Troubleshooting Options&lt;/strong&gt; and &lt;strong&gt;hit Enter&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-3.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, go down to the &lt;strong&gt;Enable SSH&lt;/strong&gt; option and &lt;strong&gt;hit Enter&lt;/strong&gt; to &lt;strong&gt;enable SSH&lt;/strong&gt;: &lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-4.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Notice that ESXi is now reporting that &lt;strong&gt;SSH is enabled&lt;/strong&gt;:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-5.png&quot; alt=&quot;vmware esxi enable ssh via console 5&quot; id=&quot;vmware esxi enable ssh via console 5&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console 5&quot; /&gt;&lt;/h2&gt;
&lt;p&gt;Now &lt;strong&gt;hit Esc&lt;/strong&gt; to exit the menu and &lt;strong&gt;logout&lt;/strong&gt; from the ESXi host console.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we showed &lt;strong&gt;how to enable and disable the SSH service&lt;/strong&gt; on a &lt;strong&gt;VMware ESXi host&lt;/strong&gt; using the &lt;strong&gt;Web GUI&lt;/strong&gt;, &lt;strong&gt;vSphere client &lt;/strong&gt;and&lt;strong&gt; ESXi Console&lt;/strong&gt;. We explained why the SSH service is sometimes required to be enabled and also noted the security risks in permanently enabling SSH.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;SSH access&lt;/strong&gt; to VMware’s &lt;strong&gt;ESXi server&lt;/strong&gt; is by &lt;strong&gt;disabled&lt;/strong&gt; by &lt;strong&gt;default&lt;/strong&gt; however there are many reasons where SSH might be required. VMware and System administrators often find the need to perform advanced administrative tasks that require &lt;strong&gt;SSH access&lt;/strong&gt; to the &lt;strong&gt;ESXi host&lt;/strong&gt;. For example, deleting or reloading a VM with an &lt;strong&gt;Invalid Status&lt;/strong&gt; can only be performed via &lt;strong&gt;SSH&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article, we’ll show you &lt;strong&gt;how to enable SSH&lt;/strong&gt; on your &lt;strong&gt;ESXi host&lt;/strong&gt; with just a few simple steps. This task can be achieved via the ESXi Web GUI, vSphere Web GUI (vCenter) vSphere client or ESXi console. We’ll cover all three methods.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;strong&gt;Execution Time:&lt;/strong&gt; 5 minutes&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-disabling-ssh-on-vmware-esxi-via-web-gui&quot; title=&quot;Enabling and Disabling SSH on VMware ESXi via Web GUI&quot;&gt;Enabling and Disabling SSH on VMware ESXi via Web GUI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-disabling-ssh-on-vmware-via-vsphere-web-gui-client-vcenter&quot; title=&quot;Enabling and Disabling SSH on VMware via vSphere Web GUI Client (vCenter)&quot;&gt;Enabling and Disabling SSH on VMware via vSphere Web GUI Client (vCenter)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-eisabling-ssh-on-vmware-esxi-via-vsphere-client&quot; title=&quot;Enabling and Disabling SSH on VMware ESXi via vSphere Client&quot;&gt;Enabling and Disabling SSH on VMware ESXi via vSphere Client&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#enabling-and-disabling-ssh-console-on-vmware-esxi-via-esxi-console&quot; title=&quot;Enabling and Disabling SSH on VMware ESXi via ESXi Console&quot;&gt;Enabling and Disabling SSH on VMware ESXi via ESXi Console&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-warning&quot;&gt;&lt;strong&gt;Security Tip&lt;/strong&gt;: If your ESXi host management IP is not protected or isolated from the rest of the network, it is advisable to &lt;strong&gt;enable SSH&lt;/strong&gt; on an &lt;strong&gt;as-needed basis&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-disabling-ssh-on-vmware-esxi-via-web-gui&quot;&gt;Enabling and Disabling SSH Console on VMware ESXi via Web GUI&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Log into your ESXi server and select the &lt;strong&gt;host&lt;/strong&gt; from the &lt;strong&gt;Navigator window&lt;/strong&gt;. Next, go to &lt;strong&gt;Action &amp;gt; Services&lt;/strong&gt; and select the &lt;strong&gt;Enable Secure Shell (SSH)&lt;/strong&gt; menu option:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh.png&quot; alt=&quot;vmware esxi enable ssh&quot; id=&quot;vmware esxi enable ssh&quot; style=&quot;margin-top: 7px; margin-bottom: 7px; border: 1px solid #000000;&quot; title=&quot;vmware esxi enable ssh&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This will immediately &lt;strong&gt;enable SSH&lt;/strong&gt;. To &lt;strong&gt;disable SSH&lt;/strong&gt;, repeat the same steps. You’ll notice that the &lt;strong&gt;Disable Secure Shell (SSH)&lt;/strong&gt; option is now available:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-disable-ssh.png&quot; alt=&quot;vmware esxi disable ssh&quot; id=&quot;vmware esxi disable ssh&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi disable ssh&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-disabling-ssh-on-vmware-via-vsphere-web-gui-client-vcenter&quot;&gt;Enabling and Disabling SSH on VMware via vSphere Web GUI Client (vCenter)&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For those with a VMware vCenter environment, you can enable SSH for each ESXi host by selecting the host and then going to &lt;strong&gt;Manage &amp;gt; Settings &amp;gt; Security Profile &amp;gt; Edit&lt;/strong&gt;.&amp;nbsp; In the pop-up window, &lt;strong&gt;scroll down&lt;/strong&gt; to &lt;strong&gt;SSH Server&lt;/strong&gt; and &lt;strong&gt;tick it&lt;/strong&gt;. Optionally enter the &lt;strong&gt;IP address&lt;/strong&gt; or &lt;strong&gt;network(s)&lt;/strong&gt; you require to have SSH access to the host:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-vsphere-web-gui.png&quot; alt=&quot;vmware esxi enable ssh vsphere web gui&quot; id=&quot;vmware esxi enable ssh vsphere web gui&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh vsphere web gui&quot; /&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-eisabling-ssh-on-vmware-esxi-via-vsphere-client&quot;&gt;Enabling and Disabling SSH on VMware ESXi via vSphere Client&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Launch your &lt;strong&gt;vSphere client&lt;/strong&gt; and log into your ESXi host. From vSphere, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;ESXi host&lt;/strong&gt; (1), then select the &lt;strong&gt;Configuration&lt;/strong&gt; tab (2). From there, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Security Profile &lt;/strong&gt;(3) under the &lt;strong&gt;Software section&lt;/strong&gt;. Finally &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Properties&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-vsphere-client.png&quot; alt=&quot;vmware esxi enable ssh via vsphere client&quot; id=&quot;vmware esxi enable ssh via vsphere client&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via vsphere client&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;On the pop-up window, select &lt;strong&gt;SSH&lt;/strong&gt; and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Options&lt;/strong&gt; button: &lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-vsphere-client-remote-access.png&quot; alt=&quot;vmware esxi enable ssh via vsphere client remote access&quot; id=&quot;vmware esxi enable ssh via vsphere client remote access&quot; style=&quot;border: 1px solid #000000; margin: 7px auto; display: block;&quot; title=&quot;vmware esxi enable ssh via vsphere client remote access&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Select the required &lt;strong&gt;Startup Policy&lt;/strong&gt;. Note that the ‘&lt;strong&gt;Start and stop with host’&lt;/strong&gt; option will permanently &lt;strong&gt;enable SSH&lt;/strong&gt;. Next, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Start&lt;/strong&gt; button under &lt;strong&gt;Service Commands&lt;/strong&gt; to enable SSH immediately. When done, &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;OK&lt;/strong&gt; button:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-vsphere-client-start-stop.png&quot; alt=&quot;vmware esxi enable ssh via vsphere client start stop&quot; id=&quot;vmware esxi enable ssh via vsphere client start stop&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via vsphere client start stop&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To &lt;strong&gt;disable&lt;/strong&gt; the &lt;strong&gt;SSH service&lt;/strong&gt; via &lt;strong&gt;vSphere&lt;/strong&gt;, follow the same process as above and ensure you select the “&lt;strong&gt;Start and stop manually&lt;/strong&gt;” &lt;strong&gt;Startup Policy&lt;/strong&gt; option and &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Stop&lt;/strong&gt; button under the &lt;strong&gt;Service Commands&lt;/strong&gt; section.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;enabling-and-disabling-ssh-console-on-vmware-esxi-via-esxi-console&quot;&gt;Enabling and Disabling SSH Console on VMware ESXi via ESXi Console&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;From your ESXi console, &lt;strong&gt;hit F2&lt;/strong&gt; to customise the system:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-1.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p&gt;At the prompt, enter the ESXi root user credentials:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-2.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At the next window, highlight &lt;strong&gt;Troubleshooting Options&lt;/strong&gt; and &lt;strong&gt;hit Enter&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-3.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, go down to the &lt;strong&gt;Enable SSH&lt;/strong&gt; option and &lt;strong&gt;hit Enter&lt;/strong&gt; to &lt;strong&gt;enable SSH&lt;/strong&gt;: &lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-4.png&quot; alt=&quot;vmware esxi enable ssh via console&quot; id=&quot;vmware esxi enable ssh via console&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Notice that ESXi is now reporting that &lt;strong&gt;SSH is enabled&lt;/strong&gt;:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vmware-esxi-enable-ssh/vmware-esxi-enable-ssh-via-console-5.png&quot; alt=&quot;vmware esxi enable ssh via console 5&quot; id=&quot;vmware esxi enable ssh via console 5&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;vmware esxi enable ssh via console 5&quot; /&gt;&lt;/h2&gt;
&lt;p&gt;Now &lt;strong&gt;hit Esc&lt;/strong&gt; to exit the menu and &lt;strong&gt;logout&lt;/strong&gt; from the ESXi host console.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we showed &lt;strong&gt;how to enable and disable the SSH service&lt;/strong&gt; on a &lt;strong&gt;VMware ESXi host&lt;/strong&gt; using the &lt;strong&gt;Web GUI&lt;/strong&gt;, &lt;strong&gt;vSphere client &lt;/strong&gt;and&lt;strong&gt; ESXi Console&lt;/strong&gt;. We explained why the SSH service is sometimes required to be enabled and also noted the security risks in permanently enabling SSH.&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>World Backup Day with Free Amazon Voucher and Prizes for Everyone!</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/world-backup-day-free-prizes.html"/>
		<published>2020-03-18T10:39:05+11:00</published>
		<updated>2020-03-18T10:39:05+11:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/world-backup-day-free-prizes.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;strong&gt;Celebrate World Backup Day &lt;/strong&gt;&lt;strong&gt;and &lt;a href=&quot;https://clixtrac.com/goto/?265417&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;World Backup Day with Free Prizes&quot;&gt;WIN with Altaro! &lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We all remember how grateful we were to have backup software when facing so many data loss mishaps and near-catastrophes.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?265417&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;World Backup Day 2020 - Get your Free Amazon Voucher and win prizes!&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/world-backup-day-2020/world-backup-day-2020-win-with-altaro.png&quot; alt=&quot;world backup day 2020 - win with altaro&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;world backup day 2020 - win with altaro&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you manage your company's &lt;strong&gt;Office 365 data&lt;/strong&gt;, celebrate this World Backup Day&amp;nbsp;with&amp;nbsp;Altaro. All you&amp;nbsp;have to&amp;nbsp;do is sign up for a &lt;strong&gt;30-day free trial&lt;/strong&gt; of &lt;strong&gt;Altaro Office 365 Backup&lt;/strong&gt;. There’s a&amp;nbsp;&lt;strong&gt;guaranteed Amazon voucher&lt;/strong&gt;&amp;nbsp;in it for you, and if you&amp;nbsp;share your biggest backup mishap with them, you&amp;nbsp;get a chance to &lt;strong&gt;WIN&lt;/strong&gt; one of the&amp;nbsp;&lt;strong&gt;grand&amp;nbsp;prizes&lt;/strong&gt;:&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;
&lt;div&gt;DJI Mavic Mini Drone&amp;nbsp;FlyCamQuadcopter,&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Google Stadia Premiere Edition,&amp;nbsp;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Ubiquity&amp;nbsp;UniFiDream Machine&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Logitech MX Master 3 Advanced Wireless Mouse&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What are you waiting for? Offer expires on the &lt;strong&gt;22nd of April &lt;/strong&gt;so&amp;nbsp; &lt;a href=&quot;https://clixtrac.com/goto/?265417&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;World Backup day with Free Prizes - Signup now!&quot;&gt;Sign up now! &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Good luck &amp;amp; happy World Backup Day!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;strong&gt;Celebrate World Backup Day &lt;/strong&gt;&lt;strong&gt;and &lt;a href=&quot;https://clixtrac.com/goto/?265417&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;World Backup Day with Free Prizes&quot;&gt;WIN with Altaro! &lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We all remember how grateful we were to have backup software when facing so many data loss mishaps and near-catastrophes.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?265417&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;World Backup Day 2020 - Get your Free Amazon Voucher and win prizes!&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/world-backup-day-2020/world-backup-day-2020-win-with-altaro.png&quot; alt=&quot;world backup day 2020 - win with altaro&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;world backup day 2020 - win with altaro&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you manage your company's &lt;strong&gt;Office 365 data&lt;/strong&gt;, celebrate this World Backup Day&amp;nbsp;with&amp;nbsp;Altaro. All you&amp;nbsp;have to&amp;nbsp;do is sign up for a &lt;strong&gt;30-day free trial&lt;/strong&gt; of &lt;strong&gt;Altaro Office 365 Backup&lt;/strong&gt;. There’s a&amp;nbsp;&lt;strong&gt;guaranteed Amazon voucher&lt;/strong&gt;&amp;nbsp;in it for you, and if you&amp;nbsp;share your biggest backup mishap with them, you&amp;nbsp;get a chance to &lt;strong&gt;WIN&lt;/strong&gt; one of the&amp;nbsp;&lt;strong&gt;grand&amp;nbsp;prizes&lt;/strong&gt;:&amp;nbsp;&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;
&lt;div&gt;DJI Mavic Mini Drone&amp;nbsp;FlyCamQuadcopter,&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Google Stadia Premiere Edition,&amp;nbsp;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Ubiquity&amp;nbsp;UniFiDream Machine&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Logitech MX Master 3 Advanced Wireless Mouse&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What are you waiting for? Offer expires on the &lt;strong&gt;22nd of April &lt;/strong&gt;so&amp;nbsp; &lt;a href=&quot;https://clixtrac.com/goto/?265417&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;World Backup day with Free Prizes - Signup now!&quot;&gt;Sign up now! &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Good luck &amp;amp; happy World Backup Day!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>Understanding Deduplication. Complete Guide to Deduplication Methods &amp; Their Impact on Storage and VM Backups</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html"/>
		<published>2020-01-30T19:51:27+11:00</published>
		<updated>2020-01-30T19:51:27+11:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/complete-guide-to-deduplication.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/data-deduplication-process-vm-backup.png&quot; alt=&quot;data deduplication process vm backup&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;data deduplication process vm backup&quot; /&gt;When considering your &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup Solution&quot;&gt;&lt;strong&gt;VM backup&lt;/strong&gt; solution&lt;/a&gt;, key features such as &lt;strong&gt;deduplication&lt;/strong&gt; are incredibly important. This is not simply from a cost perspective but also an operational one. While is it true that &lt;strong&gt;deduplication&lt;/strong&gt; of your &lt;strong&gt;backup data&lt;/strong&gt; can have &lt;strong&gt;considerable cost savings&lt;/strong&gt; for your business, it is also true that the wrong &lt;strong&gt;type of deduplication&lt;/strong&gt; can often have &lt;strong&gt;negative performance&lt;/strong&gt; and contribute to a negative end-user experience.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article will explore the various &lt;strong&gt;deduplication types&lt;/strong&gt; including general &lt;strong&gt;Inline Deduplication&lt;/strong&gt; and &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro VM Backup Deduplication&quot;&gt;Altaro’s &lt;strong&gt;Augmented Inline Deduplication&lt;/strong&gt;&lt;/a&gt; for your &lt;strong&gt;VM Backup Storage. &lt;/strong&gt;We'll also cover deduplication concerns such as software interoperability, disk wear, performance and other important areas.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#deduplication-basics&quot; title=&quot;Deduplication Basics&quot;&gt;Deduplication Basics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#file-based-deduplication&quot; title=&quot;File-Based Deduplication&quot;&gt;File-Based Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#block-level-deduplication&quot; title=&quot;Block-Level Deduplication&quot;&gt;Block-Level Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#post-process-deduplication&quot; title=&quot;Post-Process Deduplication&quot;&gt;Post-Process Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#inline-deduplication&quot; title=&quot;Inline Deduplication&quot;&gt;Inline Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#augmented-inline-deduplication&quot; title=&quot;Augmented Inline Deduplication&quot;&gt;Augmented Inline Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#deduplication-gotchas&quot; title=&quot;Deduplication Gotchas&quot;&gt;Deduplication Gotchas&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Software Interoperability&lt;/li&gt;
&lt;li&gt;Performance&lt;/li&gt;
&lt;li&gt;Disk Wear&lt;/li&gt;
&lt;li&gt;Operations&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#impact-of-augmented-inline-dedup-for-vm-backups&quot; title=&quot;The Impact of Augmented Inline Deduplication for VM Backups&quot;&gt;The Impact of Augmented Inline Deduplication for VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and their data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&quot;&gt;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&quot;&gt;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;deduplication-basics&quot;&gt;Deduplication Basics&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In fundamental terms, deduplication is &lt;strong&gt;the process of minimizing the amount of physical storage required for your data&lt;/strong&gt;. In this article, we are using your VM backups as the data subject.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While physical storage costs are improving year on year, storage is still a considerable cost for any organization which is why &lt;strong&gt;deduplication techniques&lt;/strong&gt; are being included into common data handing products such as &lt;strong&gt;backup software&lt;/strong&gt; for your &lt;strong&gt;Virtual Machines&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are various forms of deduplication available and it’s imperative to understand each one as all of them have various cost-saving vs performance trade-offs.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;file-based-deduplication&quot;&gt;File-Based Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;File-based deduplication&lt;/strong&gt; was popular in the early days of deduplication however this method’s shortcomings became quickly apparent. With this method, files would be examined and checked to ensure identical files wouldn’t be stored a second time. The problem here was that much of a file could be identical to other files despite being named differently and having a different time-stamp. Furthermore other &lt;strong&gt;file-level differences&lt;/strong&gt; would make the &lt;strong&gt;deduplication engine&lt;/strong&gt; to mark the file as &lt;strong&gt;unique&lt;/strong&gt; which would force the whole file to be backed up.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The end result is a significant amount of data being backed up multiple times, reducing the efficiency of the &lt;strong&gt;file-based deduplication engine&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;block-level-deduplication&quot;&gt;Block-Level Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Block-level deduplication&lt;/strong&gt; is the evolution of &lt;strong&gt;file-based deduplication&lt;/strong&gt; which successfully addresses the shortcomings of its predecessor. With this method, the &lt;strong&gt;deduplication engine&lt;/strong&gt; now examines the &lt;strong&gt;raw blocks of data &lt;/strong&gt;on the filesystems themselves.&amp;nbsp; By concentrating on the &lt;strong&gt;raw blocks of data&lt;/strong&gt; the &lt;strong&gt;deduplication engine&lt;/strong&gt; no longer worries about the overall file a block is part of and can accurately understand the type of data the raw block contains.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The end result is a &lt;strong&gt;very efficient&lt;/strong&gt; and &lt;strong&gt;intelligent deduplication engine&lt;/strong&gt; that is capable of saving more space on the backup target.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help better understand the &lt;strong&gt;block-level deduplication engine&lt;/strong&gt;, we’ve included an example of how this process works with &lt;strong&gt;Altaro’s VM Backup solution&lt;/strong&gt;. &amp;nbsp;Our example consists of 3 VMs and the diagram shows how each VM’s data is broken into different blocks (A to E).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In &lt;strong&gt;Phase 1&lt;/strong&gt;, &lt;strong&gt;block-level deduplication&lt;/strong&gt; is performed across each VM resulting in a significant saving of &lt;strong&gt;110GB&lt;/strong&gt; of space across all VMs. In &lt;strong&gt;Phase 2&lt;/strong&gt;, &lt;strong&gt;block-level deduplication&lt;/strong&gt; is performed &lt;strong&gt;across all VMs&lt;/strong&gt; achieving an amazing &lt;strong&gt;118GB reduction&lt;/strong&gt; of storage space!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So far, &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro’s VM Backup&quot;&gt;&lt;strong&gt;Altaro’s VM Backup&lt;/strong&gt;&lt;/a&gt; has saved &lt;strong&gt;228GB of storage space&lt;/strong&gt; which represents an impressive &lt;strong&gt;47% reduction of VM Backup storage&lt;/strong&gt;! In &lt;strong&gt;Phase 3&lt;/strong&gt;, the deduplicated data is compressed to just &lt;strong&gt;151GB&lt;/strong&gt; and transferred to the backup storage.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/block-level-deduplication-vm-backup.png&quot; alt=&quot;block level deduplication vm backup&quot; id=&quot;block level deduplication vm backup&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;block level deduplication vm backup&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As noted in the diagram above, the overall &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM backup storage&quot;&gt;&lt;strong&gt;VM backup storage&lt;/strong&gt;&lt;/a&gt; requirements has been reduced from &lt;strong&gt;481GB&lt;/strong&gt; to just &lt;strong&gt;151GB&lt;/strong&gt; – representing a &lt;strong&gt;68.8% reduction in size&lt;/strong&gt; and allowing you to have more backups using much less storage space.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your free copy of Altaro's VM Backup Solution&quot;&gt;Download your free copy of Altaro's VM Backup Solution&lt;/a&gt; - Free for specific number of physical hosts!&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;post-process-deduplication&quot;&gt;Post-Process Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Compared to other deduplication options, &lt;strong&gt;post-process deduplication&lt;/strong&gt; is a more simple form. All VM backup data is sent to the target storage device for your backups. After this, on a schedule, a process runs on the backup device to remove duplicated data.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/post-process-deduplication.png&quot; alt=&quot;post process deduplication&quot; id=&quot;post process deduplication&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;post process deduplication&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While this is simple in that &lt;strong&gt;no agents&lt;/strong&gt; are required on your &lt;strong&gt;Virtual Machines&lt;/strong&gt;, your &lt;strong&gt;target backup device&lt;/strong&gt; will need to be large enough to cater for all backup data. Only after the data is there, will you see a reduction of data in time for the next day’s worth of backups.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Post-process&lt;/strong&gt; is also problematic because you might need to enforce a “&lt;strong&gt;blackout window&lt;/strong&gt;”, this being a period of time when you should not perform any backups because the storage device is busy moving data around and running the &lt;strong&gt;deduplication process&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;benefit&lt;/strong&gt; of &lt;strong&gt;post-process deduplication &lt;/strong&gt;though, is that it does deduplicate your data and not only on a &lt;strong&gt;per VM&lt;/strong&gt; or &lt;strong&gt;per backup window&lt;/strong&gt; but it often (depending on the implementation and vendor) will deduplicate across &lt;strong&gt;all backed up data&lt;/strong&gt;. This can have a massive space-saving benefit, but only &lt;strong&gt;after&lt;/strong&gt; the deduplication process has run.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;inline-deduplication&quot;&gt;Inline Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Inline Deduplication&lt;/strong&gt; is an intelligent form of deduplication because it usually runs &lt;strong&gt;deduplication algorithms&lt;/strong&gt; (processing) as the data is being sent to the target storage device. In some cases, the data is processed before it is sent along the wire.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/inline-deduplication-process.png&quot; alt=&quot;inline deduplication process&quot; id=&quot;inline deduplication process&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;inline deduplication process&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In these scenarios, you can benefit from a &lt;strong&gt;target storage device&lt;/strong&gt; with a &lt;strong&gt;lower storage capacity&lt;/strong&gt; than traditionally required, &lt;strong&gt;reducing your backup storage target costs&lt;/strong&gt;. Depending on the type of data being backed up and the efficiency of the deduplication technology by your vendor, savings can range significantly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Consider a scenario where you are backing up the same operating system a hundred or more times, &lt;strong&gt;deduplication savings&lt;/strong&gt; would expected to be quite good.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since &lt;strong&gt;inline deduplication&lt;/strong&gt; does &lt;strong&gt;not&lt;/strong&gt; run on the target storage device, the performance degradation on the device is typically lower than other methods. This corresponds to &lt;strong&gt;higher throughput&lt;/strong&gt; available for more backups to run sequentially, allowing for your VM backups to complete within scheduled backup windows.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The main benefits of &lt;strong&gt;inline-deduplication&lt;/strong&gt; are that your target storage device can have a &lt;strong&gt;lower capacity&lt;/strong&gt; than originally required, additional similar workloads will not add much data to the target and the storage target performance is better than when using other deduplication options. You also benefit from &lt;strong&gt;less disk wear&lt;/strong&gt; which can cause a problem with both &lt;strong&gt;HDD&lt;/strong&gt; and &lt;strong&gt;SSD&lt;/strong&gt; drive types.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the &lt;strong&gt;drawbacks&lt;/strong&gt; though is that depending on the implementation, &lt;strong&gt;in-line deduplication&lt;/strong&gt; might &lt;strong&gt;not deduplicate&lt;/strong&gt; your VM job’s worth of data across all data on the target storage array. The implementation could be on a per VM or per-job basis resulting in &lt;strong&gt;lower deduplication benefits&lt;/strong&gt; than other methods.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;augmented-inline-deduplication&quot;&gt;Augmented Inline Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Augmented in-line deduplication&lt;/strong&gt; is an implementation of &lt;strong&gt;in-line deduplication&lt;/strong&gt; used by &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro VM Backup Solution&quot;&gt;&lt;strong&gt;Altaro’s&lt;/strong&gt;&lt;strong&gt; VM backup solution&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this implementation, variable block sizes are used to &lt;strong&gt;maximise deduplication efficiency&lt;/strong&gt;. This is all achieved with &lt;strong&gt;very low memory and CPU requirements&lt;/strong&gt;, resulting in &lt;strong&gt;extra space for more backups&lt;/strong&gt; in &lt;strong&gt;less space&lt;/strong&gt; than without any deduplication in place.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/deduplication-and-compression.png&quot; alt=&quot;deduplication and compression&quot; id=&quot;deduplication and compression&quot; style=&quot;display: block; margin: 7px auto;&quot; title=&quot;deduplication and compression&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another important consideration here is that &lt;strong&gt;less bandwidth&lt;/strong&gt; is required to ship your &lt;strong&gt;VM backup data&lt;/strong&gt; to the &lt;strong&gt;backup storage system&lt;/strong&gt;. If your &lt;strong&gt;backup infrastructure&lt;/strong&gt; is located in a &lt;strong&gt;different building&lt;/strong&gt; or &lt;strong&gt;geographic location&lt;/strong&gt;, bandwidth can get expensive. Now that data is &lt;strong&gt;deduplicated before it is sent across the wire&lt;/strong&gt;, the &lt;strong&gt;bandwidth requirements&lt;/strong&gt; are reduced significantly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Altaro’s implementation is impressive because it’s a form of &lt;strong&gt;inline deduplication&lt;/strong&gt;, promising &lt;strong&gt;deduplication across all backed up data&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the graphic below we can see that data is shipped to a &lt;strong&gt;central backup target&lt;/strong&gt; from &lt;strong&gt;various Virtual Machines&lt;/strong&gt;. While this is happening, &lt;strong&gt;deduplication&lt;/strong&gt; processes are &lt;strong&gt;running&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro VM Backup - Deduplication and Compression&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/augmented-inline-deduplication.png&quot; alt=&quot;vm backup with augmented inline deduplication&quot; id=&quot;vm backup with augmented inline deduplication&quot; style=&quot;display: block; margin: 7px auto;&quot; title=&quot;vm backup with augmented inline deduplication&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The benefits of such a solution are clear;&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Very Fast backups. &lt;/strong&gt;There is no storage performance lost as there are no post-processes running on the storage target.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Excellent deduplication rates. &lt;/strong&gt;Deduplication occurs between the &lt;strong&gt;source data and ALL data on the backup target&lt;/strong&gt;. If the data is already in the backup storage device, it will not be copied to the destination storage again, saving space.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No operational overhead. &lt;/strong&gt;There are &lt;strong&gt;no agents&lt;/strong&gt; to install or manage. Installation of the feature is a &lt;strong&gt;simple checkbox&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No additional SSD or HDD wear on the target. &lt;/strong&gt;Since there are &lt;strong&gt;no post-processes&lt;/strong&gt; there is no “&lt;strong&gt;double touch&lt;/strong&gt;” of the backed up data. This &lt;strong&gt;significantly reduces the wear&lt;/strong&gt; on HDDs and SSDs resulting in fewer disk failures.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;deduplication-gotchas&quot;&gt;Deduplication Gotchas&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If your backup software comes with &lt;strong&gt;deduplication &lt;/strong&gt;as standard, then there is no reason to not use it? This statement is incorrect! You must consider the type of deduplication in use and the overall impact it has on your backup systems.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Software Interoperability&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A key consideration when analysing backup solutions is &lt;strong&gt;feature interoperability&lt;/strong&gt;. Some backup vendors will &lt;strong&gt;not support deduplication&lt;/strong&gt; with other features. An example of this is a storage device which runs &lt;strong&gt;post-process deduplication&lt;/strong&gt; combined with &lt;strong&gt;backup software&lt;/strong&gt; that supports &lt;strong&gt;instant VM recovery&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Instant VM recovery&lt;/strong&gt;, direct from the backup target can be a very beneficial feature for your business, however, you must ensure that the vendor supports this feature on &lt;strong&gt;deduplicated storage targets&lt;/strong&gt; (if this is the type of system your business has in place.)&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Performance&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From a &lt;strong&gt;performance perspective&lt;/strong&gt;, there is &lt;strong&gt;no point&lt;/strong&gt; in having a &lt;strong&gt;smart deduplication system&lt;/strong&gt; if it’s &lt;strong&gt;slowing your backups down&lt;/strong&gt; to the point you &lt;strong&gt;cannot complete&lt;/strong&gt; them. Be sure to &lt;strong&gt;trial deduplication features&lt;/strong&gt; to correctly assess the performance impact on your platforms. Also ensure that there is little or no impact on &lt;strong&gt;production Virtual Machines&lt;/strong&gt;. We know that &lt;strong&gt;post-process deduplication&lt;/strong&gt; has &lt;strong&gt;no effect&lt;/strong&gt; on &lt;strong&gt;production workloads&lt;/strong&gt;, but it is possible that &lt;strong&gt;in-line&lt;/strong&gt; can, so it should be tested.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;quick way&lt;/strong&gt; to check performance would be to &lt;strong&gt;compare&lt;/strong&gt; backup times &lt;strong&gt;before enabling deduplication features&lt;/strong&gt; with &lt;strong&gt;afterwards&lt;/strong&gt;. From here you can look at a &lt;strong&gt;cost-saving vs performance analysis&lt;/strong&gt; to consider which is better for your business.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Disk Wear&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Take a look the SMART data for your disks after &lt;strong&gt;enabling deduplication&lt;/strong&gt; for an extended period of time. If the wear-out time on SSDs is significantly reduced, then consider an &lt;strong&gt;inline deduplication&lt;/strong&gt; feature rather than &lt;strong&gt;post-process&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Operations&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If &lt;strong&gt;enabling deduplication&lt;/strong&gt; means installing, upgrading and generally managing agents everywhere, consider another solution which does not require agents. Agents will also consume CPU and Memory which can &lt;strong&gt;negatively impact&lt;/strong&gt; the end-user experience of your applications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For &lt;strong&gt;post-process deduplication&lt;/strong&gt; ensure you are not limited to time windows for your backups and restores. Also, check the performance of this feature, especially on large backup targets.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;impact-of-augmented-inline-dedup-for-vm-backups&quot;&gt;The Impact of Augmented Inline Deduplication for VM backups&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Deploying a VM backup solution that uses &lt;strong&gt;augmented inline deduplication&lt;/strong&gt; is a great idea if you have limited space on an existing backup target. It’s also a good fit if you are looking at a more expensive SSD option, but do not want to stretch your IT budget to one that will natively store multiple copies of the same Virtual Machine.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;An example of some of the storage savings can be seen in the below graphic:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/altaro-augmented-inline-deduplication.png&quot; alt=&quot;altaro augmented inline deduplication&quot; id=&quot;altaro augmented inline deduplication&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;altaro augmented inline deduplication&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most organizations have multiple Virtual Machines with the same operating system. A typical Windows Server can have around &lt;strong&gt;20GB&lt;/strong&gt; of data just for the &lt;strong&gt;Operating System&lt;/strong&gt;. Consider 100’s of similar VMs with &lt;strong&gt;daily backups&lt;/strong&gt; and &lt;strong&gt;long retention policies&lt;/strong&gt;. The savings can be considerable.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike physical machines, VMs do not usually require additional agents for &lt;strong&gt;deduplication&lt;/strong&gt; or &lt;strong&gt;backups&lt;/strong&gt; to run - there are some exceptions of course.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we covered the &lt;strong&gt;basics on deduplication&lt;/strong&gt;, analyzed &lt;strong&gt;Post-Process Deduplication&lt;/strong&gt;, &lt;strong&gt;Inline Deduplication&lt;/strong&gt; and &lt;strong&gt;Augmented Inline Deduplication&lt;/strong&gt;. Further more, we explained the strengths and weakenesses of each deduplication method and provided examples on how &lt;strong&gt;organizations can leverage deduplication backups&lt;/strong&gt; for their &lt;strong&gt;VM backups&lt;/strong&gt; and save space and money.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To wrap-up, there are almost no reasons why a &lt;strong&gt;deduplication capable VM backup solution&lt;/strong&gt; should be ignored when choosing your &lt;strong&gt;backup platform&lt;/strong&gt;. There are some caveats depending on your business and technical requirements, but there are several options available to get started with deduplication.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Fortunately, for the most part, &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro Augmented Inline Deduplication Process&quot;&gt;&lt;strong&gt;Altaro’s Augmented Inline Deduplication&lt;/strong&gt;&lt;/a&gt; features are a good fit for most scenarios and are available at a &lt;strong&gt;competitive price point&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Remember, when selecting your &lt;strong&gt;VM backup solution&lt;/strong&gt;, consider the limitations of the various kinds of deduplication and go with what works best for your business.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/data-deduplication-process-vm-backup.png&quot; alt=&quot;data deduplication process vm backup&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;data deduplication process vm backup&quot; /&gt;When considering your &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM Backup Solution&quot;&gt;&lt;strong&gt;VM backup&lt;/strong&gt; solution&lt;/a&gt;, key features such as &lt;strong&gt;deduplication&lt;/strong&gt; are incredibly important. This is not simply from a cost perspective but also an operational one. While is it true that &lt;strong&gt;deduplication&lt;/strong&gt; of your &lt;strong&gt;backup data&lt;/strong&gt; can have &lt;strong&gt;considerable cost savings&lt;/strong&gt; for your business, it is also true that the wrong &lt;strong&gt;type of deduplication&lt;/strong&gt; can often have &lt;strong&gt;negative performance&lt;/strong&gt; and contribute to a negative end-user experience.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article will explore the various &lt;strong&gt;deduplication types&lt;/strong&gt; including general &lt;strong&gt;Inline Deduplication&lt;/strong&gt; and &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro VM Backup Deduplication&quot;&gt;Altaro’s &lt;strong&gt;Augmented Inline Deduplication&lt;/strong&gt;&lt;/a&gt; for your &lt;strong&gt;VM Backup Storage. &lt;/strong&gt;We'll also cover deduplication concerns such as software interoperability, disk wear, performance and other important areas.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#deduplication-basics&quot; title=&quot;Deduplication Basics&quot;&gt;Deduplication Basics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#file-based-deduplication&quot; title=&quot;File-Based Deduplication&quot;&gt;File-Based Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#block-level-deduplication&quot; title=&quot;Block-Level Deduplication&quot;&gt;Block-Level Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#post-process-deduplication&quot; title=&quot;Post-Process Deduplication&quot;&gt;Post-Process Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#inline-deduplication&quot; title=&quot;Inline Deduplication&quot;&gt;Inline Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#augmented-inline-deduplication&quot; title=&quot;Augmented Inline Deduplication&quot;&gt;Augmented Inline Deduplication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#deduplication-gotchas&quot; title=&quot;Deduplication Gotchas&quot;&gt;Deduplication Gotchas&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Software Interoperability&lt;/li&gt;
&lt;li&gt;Performance&lt;/li&gt;
&lt;li&gt;Disk Wear&lt;/li&gt;
&lt;li&gt;Operations&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#impact-of-augmented-inline-dedup-for-vm-backups&quot; title=&quot;The Impact of Augmented Inline Deduplication for VM Backups&quot;&gt;The Impact of Augmented Inline Deduplication for VM Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;Concerned about your VM machines and their data? &lt;a href=&quot;https://clixtrac.com/goto/?215955&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your Free Enterprise grade VM Backup&quot;&gt;Download now your Free Enterprise-grade VM Backup solution&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html&quot; target=&quot;_blank&quot; title=&quot;6 Key Areas to Consider When Selecting a VM Backup Solution&quot;&gt;6 Key Areas to Consider When Selecting a VM Backup Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-vsphere-vcenter-esxi-vmware-workstation-pro.html&quot; target=&quot;_blank&quot; title=&quot;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&quot;&gt;Differences Between VMware vSphere, vCenter, ESXi Free vs ESXi Paid, Workstation Player and Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&quot;&gt;How to Enable SNMP on VMware ESXi Host &amp;amp; Configure ESXi Firewall to Allow or Block Access to the SNMP Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/vmware-esxi-enable-ssh-service.html&quot; target=&quot;_blank&quot; title=&quot;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&quot;&gt;How to Enable or Disable SSH on VMware ESXi via Web GUI, vSphere Web GUI (vCenter), vSphere Client and Shell Console&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;deduplication-basics&quot;&gt;Deduplication Basics&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In fundamental terms, deduplication is &lt;strong&gt;the process of minimizing the amount of physical storage required for your data&lt;/strong&gt;. In this article, we are using your VM backups as the data subject.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While physical storage costs are improving year on year, storage is still a considerable cost for any organization which is why &lt;strong&gt;deduplication techniques&lt;/strong&gt; are being included into common data handing products such as &lt;strong&gt;backup software&lt;/strong&gt; for your &lt;strong&gt;Virtual Machines&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are various forms of deduplication available and it’s imperative to understand each one as all of them have various cost-saving vs performance trade-offs.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;file-based-deduplication&quot;&gt;File-Based Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;File-based deduplication&lt;/strong&gt; was popular in the early days of deduplication however this method’s shortcomings became quickly apparent. With this method, files would be examined and checked to ensure identical files wouldn’t be stored a second time. The problem here was that much of a file could be identical to other files despite being named differently and having a different time-stamp. Furthermore other &lt;strong&gt;file-level differences&lt;/strong&gt; would make the &lt;strong&gt;deduplication engine&lt;/strong&gt; to mark the file as &lt;strong&gt;unique&lt;/strong&gt; which would force the whole file to be backed up.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The end result is a significant amount of data being backed up multiple times, reducing the efficiency of the &lt;strong&gt;file-based deduplication engine&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;block-level-deduplication&quot;&gt;Block-Level Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Block-level deduplication&lt;/strong&gt; is the evolution of &lt;strong&gt;file-based deduplication&lt;/strong&gt; which successfully addresses the shortcomings of its predecessor. With this method, the &lt;strong&gt;deduplication engine&lt;/strong&gt; now examines the &lt;strong&gt;raw blocks of data &lt;/strong&gt;on the filesystems themselves.&amp;nbsp; By concentrating on the &lt;strong&gt;raw blocks of data&lt;/strong&gt; the &lt;strong&gt;deduplication engine&lt;/strong&gt; no longer worries about the overall file a block is part of and can accurately understand the type of data the raw block contains.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The end result is a &lt;strong&gt;very efficient&lt;/strong&gt; and &lt;strong&gt;intelligent deduplication engine&lt;/strong&gt; that is capable of saving more space on the backup target.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To help better understand the &lt;strong&gt;block-level deduplication engine&lt;/strong&gt;, we’ve included an example of how this process works with &lt;strong&gt;Altaro’s VM Backup solution&lt;/strong&gt;. &amp;nbsp;Our example consists of 3 VMs and the diagram shows how each VM’s data is broken into different blocks (A to E).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In &lt;strong&gt;Phase 1&lt;/strong&gt;, &lt;strong&gt;block-level deduplication&lt;/strong&gt; is performed across each VM resulting in a significant saving of &lt;strong&gt;110GB&lt;/strong&gt; of space across all VMs. In &lt;strong&gt;Phase 2&lt;/strong&gt;, &lt;strong&gt;block-level deduplication&lt;/strong&gt; is performed &lt;strong&gt;across all VMs&lt;/strong&gt; achieving an amazing &lt;strong&gt;118GB reduction&lt;/strong&gt; of storage space!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So far, &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro’s VM Backup&quot;&gt;&lt;strong&gt;Altaro’s VM Backup&lt;/strong&gt;&lt;/a&gt; has saved &lt;strong&gt;228GB of storage space&lt;/strong&gt; which represents an impressive &lt;strong&gt;47% reduction of VM Backup storage&lt;/strong&gt;! In &lt;strong&gt;Phase 3&lt;/strong&gt;, the deduplicated data is compressed to just &lt;strong&gt;151GB&lt;/strong&gt; and transferred to the backup storage.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/block-level-deduplication-vm-backup.png&quot; alt=&quot;block level deduplication vm backup&quot; id=&quot;block level deduplication vm backup&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;block level deduplication vm backup&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As noted in the diagram above, the overall &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;VM backup storage&quot;&gt;&lt;strong&gt;VM backup storage&lt;/strong&gt;&lt;/a&gt; requirements has been reduced from &lt;strong&gt;481GB&lt;/strong&gt; to just &lt;strong&gt;151GB&lt;/strong&gt; – representing a &lt;strong&gt;68.8% reduction in size&lt;/strong&gt; and allowing you to have more backups using much less storage space.&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Download your free copy of Altaro's VM Backup Solution&quot;&gt;Download your free copy of Altaro's VM Backup Solution&lt;/a&gt; - Free for specific number of physical hosts!&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;post-process-deduplication&quot;&gt;Post-Process Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Compared to other deduplication options, &lt;strong&gt;post-process deduplication&lt;/strong&gt; is a more simple form. All VM backup data is sent to the target storage device for your backups. After this, on a schedule, a process runs on the backup device to remove duplicated data.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/post-process-deduplication.png&quot; alt=&quot;post process deduplication&quot; id=&quot;post process deduplication&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;post process deduplication&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While this is simple in that &lt;strong&gt;no agents&lt;/strong&gt; are required on your &lt;strong&gt;Virtual Machines&lt;/strong&gt;, your &lt;strong&gt;target backup device&lt;/strong&gt; will need to be large enough to cater for all backup data. Only after the data is there, will you see a reduction of data in time for the next day’s worth of backups.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Post-process&lt;/strong&gt; is also problematic because you might need to enforce a “&lt;strong&gt;blackout window&lt;/strong&gt;”, this being a period of time when you should not perform any backups because the storage device is busy moving data around and running the &lt;strong&gt;deduplication process&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;benefit&lt;/strong&gt; of &lt;strong&gt;post-process deduplication &lt;/strong&gt;though, is that it does deduplicate your data and not only on a &lt;strong&gt;per VM&lt;/strong&gt; or &lt;strong&gt;per backup window&lt;/strong&gt; but it often (depending on the implementation and vendor) will deduplicate across &lt;strong&gt;all backed up data&lt;/strong&gt;. This can have a massive space-saving benefit, but only &lt;strong&gt;after&lt;/strong&gt; the deduplication process has run.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;inline-deduplication&quot;&gt;Inline Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Inline Deduplication&lt;/strong&gt; is an intelligent form of deduplication because it usually runs &lt;strong&gt;deduplication algorithms&lt;/strong&gt; (processing) as the data is being sent to the target storage device. In some cases, the data is processed before it is sent along the wire.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/inline-deduplication-process.png&quot; alt=&quot;inline deduplication process&quot; id=&quot;inline deduplication process&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;inline deduplication process&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In these scenarios, you can benefit from a &lt;strong&gt;target storage device&lt;/strong&gt; with a &lt;strong&gt;lower storage capacity&lt;/strong&gt; than traditionally required, &lt;strong&gt;reducing your backup storage target costs&lt;/strong&gt;. Depending on the type of data being backed up and the efficiency of the deduplication technology by your vendor, savings can range significantly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Consider a scenario where you are backing up the same operating system a hundred or more times, &lt;strong&gt;deduplication savings&lt;/strong&gt; would expected to be quite good.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since &lt;strong&gt;inline deduplication&lt;/strong&gt; does &lt;strong&gt;not&lt;/strong&gt; run on the target storage device, the performance degradation on the device is typically lower than other methods. This corresponds to &lt;strong&gt;higher throughput&lt;/strong&gt; available for more backups to run sequentially, allowing for your VM backups to complete within scheduled backup windows.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The main benefits of &lt;strong&gt;inline-deduplication&lt;/strong&gt; are that your target storage device can have a &lt;strong&gt;lower capacity&lt;/strong&gt; than originally required, additional similar workloads will not add much data to the target and the storage target performance is better than when using other deduplication options. You also benefit from &lt;strong&gt;less disk wear&lt;/strong&gt; which can cause a problem with both &lt;strong&gt;HDD&lt;/strong&gt; and &lt;strong&gt;SSD&lt;/strong&gt; drive types.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the &lt;strong&gt;drawbacks&lt;/strong&gt; though is that depending on the implementation, &lt;strong&gt;in-line deduplication&lt;/strong&gt; might &lt;strong&gt;not deduplicate&lt;/strong&gt; your VM job’s worth of data across all data on the target storage array. The implementation could be on a per VM or per-job basis resulting in &lt;strong&gt;lower deduplication benefits&lt;/strong&gt; than other methods.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;augmented-inline-deduplication&quot;&gt;Augmented Inline Deduplication&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Augmented in-line deduplication&lt;/strong&gt; is an implementation of &lt;strong&gt;in-line deduplication&lt;/strong&gt; used by &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro VM Backup Solution&quot;&gt;&lt;strong&gt;Altaro’s&lt;/strong&gt;&lt;strong&gt; VM backup solution&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this implementation, variable block sizes are used to &lt;strong&gt;maximise deduplication efficiency&lt;/strong&gt;. This is all achieved with &lt;strong&gt;very low memory and CPU requirements&lt;/strong&gt;, resulting in &lt;strong&gt;extra space for more backups&lt;/strong&gt; in &lt;strong&gt;less space&lt;/strong&gt; than without any deduplication in place.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/deduplication-and-compression.png&quot; alt=&quot;deduplication and compression&quot; id=&quot;deduplication and compression&quot; style=&quot;display: block; margin: 7px auto;&quot; title=&quot;deduplication and compression&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another important consideration here is that &lt;strong&gt;less bandwidth&lt;/strong&gt; is required to ship your &lt;strong&gt;VM backup data&lt;/strong&gt; to the &lt;strong&gt;backup storage system&lt;/strong&gt;. If your &lt;strong&gt;backup infrastructure&lt;/strong&gt; is located in a &lt;strong&gt;different building&lt;/strong&gt; or &lt;strong&gt;geographic location&lt;/strong&gt;, bandwidth can get expensive. Now that data is &lt;strong&gt;deduplicated before it is sent across the wire&lt;/strong&gt;, the &lt;strong&gt;bandwidth requirements&lt;/strong&gt; are reduced significantly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Altaro’s implementation is impressive because it’s a form of &lt;strong&gt;inline deduplication&lt;/strong&gt;, promising &lt;strong&gt;deduplication across all backed up data&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the graphic below we can see that data is shipped to a &lt;strong&gt;central backup target&lt;/strong&gt; from &lt;strong&gt;various Virtual Machines&lt;/strong&gt;. While this is happening, &lt;strong&gt;deduplication&lt;/strong&gt; processes are &lt;strong&gt;running&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro VM Backup - Deduplication and Compression&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/augmented-inline-deduplication.png&quot; alt=&quot;vm backup with augmented inline deduplication&quot; id=&quot;vm backup with augmented inline deduplication&quot; style=&quot;display: block; margin: 7px auto;&quot; title=&quot;vm backup with augmented inline deduplication&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The benefits of such a solution are clear;&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Very Fast backups. &lt;/strong&gt;There is no storage performance lost as there are no post-processes running on the storage target.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Excellent deduplication rates. &lt;/strong&gt;Deduplication occurs between the &lt;strong&gt;source data and ALL data on the backup target&lt;/strong&gt;. If the data is already in the backup storage device, it will not be copied to the destination storage again, saving space.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No operational overhead. &lt;/strong&gt;There are &lt;strong&gt;no agents&lt;/strong&gt; to install or manage. Installation of the feature is a &lt;strong&gt;simple checkbox&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No additional SSD or HDD wear on the target. &lt;/strong&gt;Since there are &lt;strong&gt;no post-processes&lt;/strong&gt; there is no “&lt;strong&gt;double touch&lt;/strong&gt;” of the backed up data. This &lt;strong&gt;significantly reduces the wear&lt;/strong&gt; on HDDs and SSDs resulting in fewer disk failures.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;deduplication-gotchas&quot;&gt;Deduplication Gotchas&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If your backup software comes with &lt;strong&gt;deduplication &lt;/strong&gt;as standard, then there is no reason to not use it? This statement is incorrect! You must consider the type of deduplication in use and the overall impact it has on your backup systems.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Software Interoperability&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A key consideration when analysing backup solutions is &lt;strong&gt;feature interoperability&lt;/strong&gt;. Some backup vendors will &lt;strong&gt;not support deduplication&lt;/strong&gt; with other features. An example of this is a storage device which runs &lt;strong&gt;post-process deduplication&lt;/strong&gt; combined with &lt;strong&gt;backup software&lt;/strong&gt; that supports &lt;strong&gt;instant VM recovery&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Instant VM recovery&lt;/strong&gt;, direct from the backup target can be a very beneficial feature for your business, however, you must ensure that the vendor supports this feature on &lt;strong&gt;deduplicated storage targets&lt;/strong&gt; (if this is the type of system your business has in place.)&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Performance&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From a &lt;strong&gt;performance perspective&lt;/strong&gt;, there is &lt;strong&gt;no point&lt;/strong&gt; in having a &lt;strong&gt;smart deduplication system&lt;/strong&gt; if it’s &lt;strong&gt;slowing your backups down&lt;/strong&gt; to the point you &lt;strong&gt;cannot complete&lt;/strong&gt; them. Be sure to &lt;strong&gt;trial deduplication features&lt;/strong&gt; to correctly assess the performance impact on your platforms. Also ensure that there is little or no impact on &lt;strong&gt;production Virtual Machines&lt;/strong&gt;. We know that &lt;strong&gt;post-process deduplication&lt;/strong&gt; has &lt;strong&gt;no effect&lt;/strong&gt; on &lt;strong&gt;production workloads&lt;/strong&gt;, but it is possible that &lt;strong&gt;in-line&lt;/strong&gt; can, so it should be tested.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;quick way&lt;/strong&gt; to check performance would be to &lt;strong&gt;compare&lt;/strong&gt; backup times &lt;strong&gt;before enabling deduplication features&lt;/strong&gt; with &lt;strong&gt;afterwards&lt;/strong&gt;. From here you can look at a &lt;strong&gt;cost-saving vs performance analysis&lt;/strong&gt; to consider which is better for your business.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Disk Wear&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Take a look the SMART data for your disks after &lt;strong&gt;enabling deduplication&lt;/strong&gt; for an extended period of time. If the wear-out time on SSDs is significantly reduced, then consider an &lt;strong&gt;inline deduplication&lt;/strong&gt; feature rather than &lt;strong&gt;post-process&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Operations&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If &lt;strong&gt;enabling deduplication&lt;/strong&gt; means installing, upgrading and generally managing agents everywhere, consider another solution which does not require agents. Agents will also consume CPU and Memory which can &lt;strong&gt;negatively impact&lt;/strong&gt; the end-user experience of your applications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For &lt;strong&gt;post-process deduplication&lt;/strong&gt; ensure you are not limited to time windows for your backups and restores. Also, check the performance of this feature, especially on large backup targets.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;impact-of-augmented-inline-dedup-for-vm-backups&quot;&gt;The Impact of Augmented Inline Deduplication for VM backups&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Deploying a VM backup solution that uses &lt;strong&gt;augmented inline deduplication&lt;/strong&gt; is a great idea if you have limited space on an existing backup target. It’s also a good fit if you are looking at a more expensive SSD option, but do not want to stretch your IT budget to one that will natively store multiple copies of the same Virtual Machine.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;An example of some of the storage savings can be seen in the below graphic:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/deduplication/altaro-augmented-inline-deduplication.png&quot; alt=&quot;altaro augmented inline deduplication&quot; id=&quot;altaro augmented inline deduplication&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;altaro augmented inline deduplication&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most organizations have multiple Virtual Machines with the same operating system. A typical Windows Server can have around &lt;strong&gt;20GB&lt;/strong&gt; of data just for the &lt;strong&gt;Operating System&lt;/strong&gt;. Consider 100’s of similar VMs with &lt;strong&gt;daily backups&lt;/strong&gt; and &lt;strong&gt;long retention policies&lt;/strong&gt;. The savings can be considerable.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike physical machines, VMs do not usually require additional agents for &lt;strong&gt;deduplication&lt;/strong&gt; or &lt;strong&gt;backups&lt;/strong&gt; to run - there are some exceptions of course.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we covered the &lt;strong&gt;basics on deduplication&lt;/strong&gt;, analyzed &lt;strong&gt;Post-Process Deduplication&lt;/strong&gt;, &lt;strong&gt;Inline Deduplication&lt;/strong&gt; and &lt;strong&gt;Augmented Inline Deduplication&lt;/strong&gt;. Further more, we explained the strengths and weakenesses of each deduplication method and provided examples on how &lt;strong&gt;organizations can leverage deduplication backups&lt;/strong&gt; for their &lt;strong&gt;VM backups&lt;/strong&gt; and save space and money.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To wrap-up, there are almost no reasons why a &lt;strong&gt;deduplication capable VM backup solution&lt;/strong&gt; should be ignored when choosing your &lt;strong&gt;backup platform&lt;/strong&gt;. There are some caveats depending on your business and technical requirements, but there are several options available to get started with deduplication.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Fortunately, for the most part, &lt;a href=&quot;https://clixtrac.com/goto/?286548&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro Augmented Inline Deduplication Process&quot;&gt;&lt;strong&gt;Altaro’s Augmented Inline Deduplication&lt;/strong&gt;&lt;/a&gt; features are a good fit for most scenarios and are available at a &lt;strong&gt;competitive price point&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Remember, when selecting your &lt;strong&gt;VM backup solution&lt;/strong&gt;, consider the limitations of the various kinds of deduplication and go with what works best for your business.&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>FREE Webinar - Fast Track your IT Career with VMware Certifications</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/free-webinar-vmware-certification-fast-track.html"/>
		<published>2019-11-17T22:35:14+11:00</published>
		<updated>2019-11-17T22:35:14+11:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/free-webinar-vmware-certification-fast-track.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;Everyone who attends the webinar has a chance of winning a &lt;strong&gt;VMware VCP course&lt;/strong&gt; (&lt;strong&gt;VMware Install, Config, Manage&lt;/strong&gt;) worth &lt;strong&gt;$4,500&lt;/strong&gt;!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Climbing the career ladder in the IT industry is usually dependent on one crucial condition: having the right certifications. If you’re not certified to a specified level in a certain technology used by an employer, that’s usually a non-negotiable roadblock to getting a job or even further career progression within a company. Understanding the route you should take, and creating a short, medium, and long term plan for your certification goals is something everyone working in the IT industry must do. In order to do this properly you need the right information and luckily, an upcoming webinar from the guys at Altaro has you covered!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;em&gt;Fast Track your IT Career with VMware Certifications&lt;/em&gt;&lt;/strong&gt; is a &lt;strong&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;free webinar - VM Certifications&quot;&gt;free webinar&lt;/a&gt;&lt;/strong&gt; presented by &lt;strong&gt;vExperts Andy Syrewicze&lt;/strong&gt; and &lt;strong&gt;Luke Orellana&lt;/strong&gt; on &lt;strong&gt;November 20&lt;sup&gt;th&lt;/sup&gt;&lt;/strong&gt; outlining &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;strong&gt;everything you need know about the VMware certification world&lt;/strong&gt;&lt;/span&gt; including costs, value, certification tracks, preparation, resources, and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free VMware Webinar - Certification Fast Track&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/2019-11-20-vmware-webinar/2019-11-20-vmware-webinar.jpg&quot; alt=&quot;Free vmware certification webinar&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Free vmware certification webinar&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to the great content being discussed, everyone who attends the webinar has a chance of winning a &lt;strong&gt;VMware VCP course&lt;/strong&gt; (VMware Install, Config, Manage) &lt;strong&gt;worth $4.5k&lt;/strong&gt;! This incredible giveaway is open to anyone over the age of 18 and all you need to do to enter is register and attend the webinar on November 20&lt;sup&gt;th&lt;/sup&gt;! The winner will be announced the day after the webinar via email to registrants.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware VCP Certification&lt;/strong&gt; is one of the most widely recognized and valued certifications for technicians and system administrators today however the hefty price tag of $4.5k puts it out of reach of many. The chance to get this course for free does not come along every day and should definitely not be missed!&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free access to the Webinar event&quot;&gt;While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;Everyone who attends the webinar has a chance of winning a &lt;strong&gt;VMware VCP course&lt;/strong&gt; (&lt;strong&gt;VMware Install, Config, Manage&lt;/strong&gt;) worth &lt;strong&gt;$4,500&lt;/strong&gt;!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Climbing the career ladder in the IT industry is usually dependent on one crucial condition: having the right certifications. If you’re not certified to a specified level in a certain technology used by an employer, that’s usually a non-negotiable roadblock to getting a job or even further career progression within a company. Understanding the route you should take, and creating a short, medium, and long term plan for your certification goals is something everyone working in the IT industry must do. In order to do this properly you need the right information and luckily, an upcoming webinar from the guys at Altaro has you covered!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;em&gt;Fast Track your IT Career with VMware Certifications&lt;/em&gt;&lt;/strong&gt; is a &lt;strong&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;free webinar - VM Certifications&quot;&gt;free webinar&lt;/a&gt;&lt;/strong&gt; presented by &lt;strong&gt;vExperts Andy Syrewicze&lt;/strong&gt; and &lt;strong&gt;Luke Orellana&lt;/strong&gt; on &lt;strong&gt;November 20&lt;sup&gt;th&lt;/sup&gt;&lt;/strong&gt; outlining &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;strong&gt;everything you need know about the VMware certification world&lt;/strong&gt;&lt;/span&gt; including costs, value, certification tracks, preparation, resources, and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free VMware Webinar - Certification Fast Track&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/2019-11-20-vmware-webinar/2019-11-20-vmware-webinar.jpg&quot; alt=&quot;Free vmware certification webinar&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Free vmware certification webinar&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to the great content being discussed, everyone who attends the webinar has a chance of winning a &lt;strong&gt;VMware VCP course&lt;/strong&gt; (VMware Install, Config, Manage) &lt;strong&gt;worth $4.5k&lt;/strong&gt;! This incredible giveaway is open to anyone over the age of 18 and all you need to do to enter is register and attend the webinar on November 20&lt;sup&gt;th&lt;/sup&gt;! The winner will be announced the day after the webinar via email to registrants.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;VMware VCP Certification&lt;/strong&gt; is one of the most widely recognized and valued certifications for technicians and system administrators today however the hefty price tag of $4.5k puts it out of reach of many. The chance to get this course for free does not come along every day and should definitely not be missed!&lt;/p&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?284413&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free access to the Webinar event&quot;&gt;While the event date has passed, it has been recorded and is available for viewing. All material are available as direct downloads. Click here to access the event.&lt;/a&gt;&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
	<entry>
		<title>6 Key Areas to Consider When Selecting a VM Backup Solution</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html"/>
		<published>2019-10-16T11:55:08+11:00</published>
		<updated>2019-10-16T11:55:08+11:00</updated>
		<id>https://www.firewall.cx/operating-systems/virtualization-vm-backup/key-areas-when-selecting-vm-backup-solution.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vm-backup-considerations.png&quot; alt=&quot;vm backup considerations&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vm backup considerations&quot; /&gt;Backup and Disaster&lt;/strong&gt; recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Your business depends on reliable IT systems to support the business's core functions. Even a short 1-hour outage can cause considerable disruption and have a financial impact to the business. Given our ever-growing reliance on IT systems, it is important more than ever to choose the &lt;strong&gt;right VM Backup software&lt;/strong&gt; for your business to protect your &lt;strong&gt;Virtual Infrastructure&lt;/strong&gt; (Vmware, Hyper-V) and &lt;strong&gt;business data&lt;/strong&gt; in the case of a &lt;strong&gt;system failure&lt;/strong&gt; or &lt;strong&gt;security incident&lt;/strong&gt; while at the same time provide &lt;strong&gt;fast individual file or folder, server database &lt;/strong&gt;or&lt;strong&gt; entire VM restoration&lt;/strong&gt;. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By utilizing &lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free VM Backup Download&quot;&gt;&lt;strong&gt;Altaro VM Backup&lt;/strong&gt;&lt;/a&gt; as a case study, this article will guide you through the following &lt;strong&gt;main 6 areas&lt;/strong&gt; which you should consider when choosing your &lt;strong&gt;VM Backup solution&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#analyze-your-business-requirements&quot; target=&quot;_self&quot; title=&quot;Analyze Your Businnes Requirements&quot;&gt;Analyze your Business Requirements&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#specialist-features&quot; title=&quot;Specialist Features&quot;&gt;Specialist Features&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Deduplication&lt;/li&gt;
&lt;li&gt;WAN Optimization&lt;/li&gt;
&lt;li&gt;Guest Quiescing&lt;/li&gt;
&lt;li&gt;Instant Restore&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vm-backup-billing-model-and-price&quot; target=&quot;_self&quot; title=&quot;VM Backup Billing Model &amp;amp; Price&quot;&gt;VM Backup - Billing Model &amp;amp; Price&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vm-backup-security-and-encryption&quot; target=&quot;_self&quot; title=&quot;VM Backup - Security &amp;amp; Encryption&quot;&gt;VM Backup - Security &amp;amp; Encryption&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vendor-reputation&quot; target=&quot;_self&quot; title=&quot;Vendor Reputation&quot;&gt;Vendor Reputation&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vendor-support&quot; target=&quot;_self&quot; title=&quot;Vendor Support - SLA and Availability&quot;&gt;Vendor Support – SLA and Availability&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;analyze-your-business-requirements&quot;&gt;Analyze Your Business Requirements&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;The most important part of electing a backup solution is to ensure that the solution will meet your requirements.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;There are various requirements that you might have, a few examples are:&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Number of Virtual Machines and Hosts&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You need to ensure that the &lt;strong&gt;backup software&lt;/strong&gt; is capable of handling the size of your virtualized estate. So if your total number of &lt;strong&gt;VM hosts&lt;/strong&gt; is very large or changing constantly, then you might want to ensure that the solution is scalable and it is easy to add additional workloads into the platform.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Type of Backup Storage&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most &lt;strong&gt;backup solutions&lt;/strong&gt; for a &lt;strong&gt;virtualized environment&lt;/strong&gt; are software-based, meaning that they run on top of a Window Server installation or from within their own appliance which you deploy to your virtualized platform. Other options include a physical appliance with storage built-in.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you already have storage infrastructure in place, ensure that your choice of backup solution allows connectivity to this backup target natively. If you are looking for a storage device for the backups, consider one which supports a simple standards that works over existing networking infrastructure such as &lt;strong&gt;NAS&lt;/strong&gt; or &lt;strong&gt;SMB Network Share&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;specialist-features&quot;&gt;Specialist Features&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Be sure to analyse any existing features that you are using or consider new ones as part of your backup solution selection process.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;Some of the features to consider include:&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Deduplication&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Deduplication&lt;/strong&gt; of the storage used at the target backup location can significantly reduce the amount of storage that is needed to host your backups. Check with your backup vendor what the average deduplication rates are and ensure you check any small print that is attached to any claims.&lt;/p&gt;
&lt;p&gt;When we look at &lt;strong&gt;duplication&lt;/strong&gt; from Altaro’s perspective, they rightfully boast how they can outperform event their closest competitors. With &lt;strong&gt;Altaro&lt;/strong&gt;, you can backup &lt;strong&gt;858GB&lt;/strong&gt; of &lt;strong&gt;VM data&lt;/strong&gt; into only &lt;strong&gt;390GB&lt;/strong&gt; of space. Imagine the backup storage costs savings there:&lt;/p&gt;
&lt;div&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Augmented Inline Deduplication&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/augmented-inline-deduplication-example.png&quot; alt=&quot;augmented inline deduplication example&quot; id=&quot;augmented-inline-deduplication-example&quot; style=&quot;margin: 7px auto; display: block;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Try Altaro's Free VM Backup Solution - Download Now&quot;&gt;Try Altaro's Free VM Backup Solution - Download Now&lt;/a&gt;&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;WAN Optimisation&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you are &lt;strong&gt;backing up&lt;/strong&gt; your &lt;strong&gt;Virtual Machines&lt;/strong&gt; to a &lt;strong&gt;secondary site&lt;/strong&gt;, over a &lt;strong&gt;WAN connection&lt;/strong&gt; then consider a solution which includes &lt;strong&gt;WAN Optimisation&lt;/strong&gt;. Bandwidth isn’t free which is how &lt;strong&gt;WAN optimisation&lt;/strong&gt; can help. Backup data is compressed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In some better implementations, only data that the backup storage doesn’t already have will be sent over the WAN. This can drastically save your bandwidth and avoid “burst” costs by your ISP. &lt;strong&gt;WAN Optimization&lt;/strong&gt; can also free up the link for other uses and applications.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Guest Quiescing&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you have databases which require backing up, then ensure your selected solution supports backing up of your databases type and version. In this scenario is not enough to &lt;strong&gt;backup Virtual Machines&lt;/strong&gt; on their own. Typically for &lt;strong&gt;databases&lt;/strong&gt;, an &lt;strong&gt;agent needs to be deployed&lt;/strong&gt; to the machine which will instruct the database to flush all writes that are in memory to disk. If you don’t do this then there is a risk that the database will not restore correctly. Something to keep in mind is that with &lt;strong&gt;Altaro&lt;/strong&gt;, Exchange, SQL and other applications &lt;strong&gt;only require VMware tools&lt;/strong&gt; for VMware vSphere environment for &lt;strong&gt;guest quiescing&lt;/strong&gt;. &lt;strong&gt;No additional agents are required&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Guest Quiescing&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/guest-quiescing.png&quot; alt=&quot;vm backup - guest quiescing&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vm backup - guest quiescing&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Instant Restore&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Instant restore&lt;/strong&gt; is a more modern approach to restoring &lt;strong&gt;Virtual Machines&lt;/strong&gt;. Some providers will allow you to instantly map the backup file to your systems so that you can get back online in seconds rather than waiting for several hours for a restore to complete.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Altaro&lt;/strong&gt; aims to &lt;strong&gt;meet all of these business requirements&lt;/strong&gt; through their &lt;strong&gt;VM Backup solution&lt;/strong&gt;. Altaro supports &lt;strong&gt;all common storage types&lt;/strong&gt; out of the box (Network Drive, NAS, iSCSI, eSATA and USB) with &lt;strong&gt;no advanced configuration required&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro's Free VM Backup supports multiple backup locations&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vm-backup-select-backup-location.png&quot; alt=&quot;vm backup select backup location&quot; id=&quot;vm backup select backup location&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;vm backup select backup location&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Furthermore, all of the advanced features that you can think of are supported by &lt;strong&gt;Altaro VM Backup&lt;/strong&gt; including &lt;strong&gt;Deduplication&lt;/strong&gt;, &lt;strong&gt;WAN Optimisation&lt;/strong&gt;, &lt;strong&gt;Guest Quiescing&lt;/strong&gt; via &lt;strong&gt;VMware Tools&lt;/strong&gt; and &lt;strong&gt;Instant Restore Technology&lt;/strong&gt; to bring your backups online in &lt;strong&gt;just a few seconds&lt;/strong&gt;, &lt;strong&gt;regardless of their size&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vm-backup-billing-model-and-price&quot;&gt;VM Backup - Billing Model &amp;amp; Price&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are various billing models out there these days. Most solutions will charge you a &lt;strong&gt;fee per server CPU&lt;/strong&gt; or by the &lt;strong&gt;number of Virtual Machines&lt;/strong&gt;. Then there is usually a maintenance fee on top which covers support and entitlement to new versions of the software.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With various options available, work out if a &lt;strong&gt;per CPU&lt;/strong&gt; or &lt;strong&gt;per VM option&lt;/strong&gt; is more advantageous for your business. This applies for the long term, so forecast this pricing out over 3 or 5 years. It might also be a good time to see if you can &lt;strong&gt;consolidate your Virtual Machines&lt;/strong&gt; down onto fewer hosts and go for a host orientated option rather than per VM.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It would also be wise to look into deals on &lt;strong&gt;longer-term agreements&lt;/strong&gt; and If you have a large estate, to see if there are discounts for signing up to a larger commitment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some vendors will offer an &lt;strong&gt;OPEX model&lt;/strong&gt; rather than a &lt;strong&gt;fixed price&lt;/strong&gt; upfront CAPEX solution. Paying monthly can help with budgets so check with your vendor about the options.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When we look at &lt;strong&gt;Altaro VM Backup&lt;/strong&gt;, the billing model is simple; all you need is the number of hosts in your environment and the edition of the software you wish to purchase. 24/7 support upgrades are included for the first year too; you can purchase software maintenance agreements (SMA) for continued upgrade and Technik support in future years. Altaro does not bill you on the number of VMs or sockets so you can leverage a cost-saving over the competition here.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vm-backup-security-and-encryption&quot;&gt;VM Backup – Security &amp;amp; Encryption&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Security is a growing concern so don’t fall into the gap and forget about it when looking at your backup solution:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Check to ensure your chosen solution’s backups can put an air gap in place for your production &lt;strong&gt;Virtual Machines&lt;/strong&gt; to prevent the spread of threats such as &lt;strong&gt;crypto-locker&lt;/strong&gt; to your backups.&lt;/li&gt;
&lt;li&gt;Do you need to &lt;strong&gt;encrypt your VM backups&lt;/strong&gt;? This can slow down your backup jobs and prevent some features from working so ask your shortlisted vendors what the deal is here.&lt;/li&gt;
&lt;li&gt;For ultra-security conscience businesses, you might want your backups to be encrypted as the data is sent down the network to your storage device. This can be advantageous, but there are sometimes cheaper options such as using a &lt;strong&gt;VPN&lt;/strong&gt; or a &lt;strong&gt;dedicated VLAN&lt;/strong&gt; to help protect you to a certain degree.&lt;/li&gt;
&lt;li&gt;Backup software such as Altaro can use the &lt;strong&gt;inbuild Encryption&lt;/strong&gt; feature which would encrypt all backups with an &lt;strong&gt;AES 256bit Encryption&lt;/strong&gt; (Military Grade) hence preventing from having one encrypting backups manually and possibly rendering the backups not accessible even to the backup solution itself.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Try Altaro's Free VM Backup Solution - Download Now&quot;&gt;Try Altaro's Free VM Backup Solution - Download Now&lt;/a&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vendor-reputation&quot;&gt;Vendor Reputation&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Before signing up to a contract with a backup vendor, ask yourself the&amp;nbsp; following questions&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;How long has the company been in business?&lt;/li&gt;
&lt;li&gt;How many version of the software has been released?&lt;/li&gt;
&lt;li&gt;Is the software supported by your virtualization vendor (VMware/ HyperV etc)?&lt;/li&gt;
&lt;li&gt;How quickly does the backup vendor’s software support a recently released update from your Virtualization vendor?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For peace of mind, &lt;strong&gt;Altaro&lt;/strong&gt; wins awards every year which are published on their website. They have &lt;strong&gt;over 30 awards&lt;/strong&gt; to their name and a series of impressive independent reviews. Altaro also boast over 50,000 customers including:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Try Altaro's Free VM Backup Solution&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/altaro-vm-backup-customers.png&quot; alt=&quot;altaro vm backup customers&quot; id=&quot;altaro vm backup customers&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;altaro vm backup customers&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vendor-support&quot;&gt;Vendor Support&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When things go wrong and you have to rely on your backup solution to save the day, you need to know that the vendor support is ready to help you should you need them. Here are some things to consider:&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Support Reviews&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Look online to see if there are any reviews on the solution you are looking at purchasing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A quick google search should be all you need to see if there are any major issues with the software.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Service Level Agreements&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you receive your terms, review the support clauses to see if the SLAs are in line with your expectations. Ideally, you want the vendor to respond fairly quickly to your support requests especially if they are related to a restore.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Support Availability&lt;/h3&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;For availability, the two main areas for consideration are:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Can you phone or email the support team?&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Being able to call the support team is important because other methods such as email and chat are slow and might be triaged for several hours or misclassified into another severity level. Phone support is incredibly important when looking at your options.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Support hours&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It always feels as though we need support at the worst possible time. Trying to get an application or &lt;strong&gt;Virtual Machine restore&lt;/strong&gt; completed through the evening so that it is ready for the morning can be a challenge. With this in mind, we should try to choose a &lt;strong&gt;VM backup vendor&lt;/strong&gt; that has a &lt;strong&gt;24/7 helpdesk&lt;/strong&gt; who you can call at any time and log a case.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt; One of the great things about &lt;strong&gt;Altaro&lt;/strong&gt; is their support. They commit to responding to support calls in &lt;strong&gt;under 30 seconds&lt;/strong&gt;. Guaranteed!&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Legendary Support by Altaro - Free Download&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/altaro-customer-support.png&quot; alt=&quot;altaro customer support&quot; id=&quot;altaro customer support&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;altaro customer support&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h1&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article helped identify the &lt;strong&gt;main considerations&lt;/strong&gt; for your &lt;strong&gt;VM Backup solution&lt;/strong&gt; to ensure &lt;strong&gt;business continiouity&lt;/strong&gt;, &lt;strong&gt;data integrity&lt;/strong&gt;, &lt;strong&gt;data availability&lt;/strong&gt; and more. We talked about the importance of the &lt;strong&gt;number of VMs and Hosts&lt;/strong&gt; supported by the &lt;strong&gt;VM backup&lt;/strong&gt;, type of &lt;strong&gt;backup storage supported&lt;/strong&gt;, advanced&amp;nbsp; &lt;strong&gt;storage space conservation&lt;/strong&gt; techniques such as &lt;strong&gt;Augmented Inline Deduplication&lt;/strong&gt;, &lt;strong&gt;WAN Optimization backup techniques&lt;/strong&gt; to maximise your &lt;strong&gt;backups over WAN links&lt;/strong&gt;, &lt;strong&gt;Guest Quiescing&lt;/strong&gt; for &lt;strong&gt;database backups&lt;/strong&gt;, &lt;strong&gt;Instant restore&lt;/strong&gt; capabilities for fast restoration, VM Billing and Pricing models, VM Backup Security and encryption and vendor support.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We believe that &lt;strong&gt;Altaro&lt;/strong&gt; fits the needs of most organisations due to their scalable, feature-rich solution. With an average call pickup of &lt;strong&gt;only 22 seconds&lt;/strong&gt;, straight to a product expert with no gatekeepers in the way of your support experience is enough on its own for most to look at Altaro as a viable solution.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vm-backup-considerations.png&quot; alt=&quot;vm backup considerations&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;vm backup considerations&quot; /&gt;Backup and Disaster&lt;/strong&gt; recovery are core considerations for any business with an IT footprint, whether that is on-premises or in the cloud.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Your business depends on reliable IT systems to support the business's core functions. Even a short 1-hour outage can cause considerable disruption and have a financial impact to the business. Given our ever-growing reliance on IT systems, it is important more than ever to choose the &lt;strong&gt;right VM Backup software&lt;/strong&gt; for your business to protect your &lt;strong&gt;Virtual Infrastructure&lt;/strong&gt; (Vmware, Hyper-V) and &lt;strong&gt;business data&lt;/strong&gt; in the case of a &lt;strong&gt;system failure&lt;/strong&gt; or &lt;strong&gt;security incident&lt;/strong&gt; while at the same time provide &lt;strong&gt;fast individual file or folder, server database &lt;/strong&gt;or&lt;strong&gt; entire VM restoration&lt;/strong&gt;. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;By utilizing &lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free VM Backup Download&quot;&gt;&lt;strong&gt;Altaro VM Backup&lt;/strong&gt;&lt;/a&gt; as a case study, this article will guide you through the following &lt;strong&gt;main 6 areas&lt;/strong&gt; which you should consider when choosing your &lt;strong&gt;VM Backup solution&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#analyze-your-business-requirements&quot; target=&quot;_self&quot; title=&quot;Analyze Your Businnes Requirements&quot;&gt;Analyze your Business Requirements&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#specialist-features&quot; title=&quot;Specialist Features&quot;&gt;Specialist Features&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Deduplication&lt;/li&gt;
&lt;li&gt;WAN Optimization&lt;/li&gt;
&lt;li&gt;Guest Quiescing&lt;/li&gt;
&lt;li&gt;Instant Restore&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vm-backup-billing-model-and-price&quot; target=&quot;_self&quot; title=&quot;VM Backup Billing Model &amp;amp; Price&quot;&gt;VM Backup - Billing Model &amp;amp; Price&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vm-backup-security-and-encryption&quot; target=&quot;_self&quot; title=&quot;VM Backup - Security &amp;amp; Encryption&quot;&gt;VM Backup - Security &amp;amp; Encryption&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vendor-reputation&quot; target=&quot;_self&quot; title=&quot;Vendor Reputation&quot;&gt;Vendor Reputation&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#vendor-support&quot; target=&quot;_self&quot; title=&quot;Vendor Support - SLA and Availability&quot;&gt;Vendor Support – SLA and Availability&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;analyze-your-business-requirements&quot;&gt;Analyze Your Business Requirements&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;The most important part of electing a backup solution is to ensure that the solution will meet your requirements.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;There are various requirements that you might have, a few examples are:&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Number of Virtual Machines and Hosts&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You need to ensure that the &lt;strong&gt;backup software&lt;/strong&gt; is capable of handling the size of your virtualized estate. So if your total number of &lt;strong&gt;VM hosts&lt;/strong&gt; is very large or changing constantly, then you might want to ensure that the solution is scalable and it is easy to add additional workloads into the platform.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Type of Backup Storage&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Most &lt;strong&gt;backup solutions&lt;/strong&gt; for a &lt;strong&gt;virtualized environment&lt;/strong&gt; are software-based, meaning that they run on top of a Window Server installation or from within their own appliance which you deploy to your virtualized platform. Other options include a physical appliance with storage built-in.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you already have storage infrastructure in place, ensure that your choice of backup solution allows connectivity to this backup target natively. If you are looking for a storage device for the backups, consider one which supports a simple standards that works over existing networking infrastructure such as &lt;strong&gt;NAS&lt;/strong&gt; or &lt;strong&gt;SMB Network Share&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;specialist-features&quot;&gt;Specialist Features&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Be sure to analyse any existing features that you are using or consider new ones as part of your backup solution selection process.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;Some of the features to consider include:&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Deduplication&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Deduplication&lt;/strong&gt; of the storage used at the target backup location can significantly reduce the amount of storage that is needed to host your backups. Check with your backup vendor what the average deduplication rates are and ensure you check any small print that is attached to any claims.&lt;/p&gt;
&lt;p&gt;When we look at &lt;strong&gt;duplication&lt;/strong&gt; from Altaro’s perspective, they rightfully boast how they can outperform event their closest competitors. With &lt;strong&gt;Altaro&lt;/strong&gt;, you can backup &lt;strong&gt;858GB&lt;/strong&gt; of &lt;strong&gt;VM data&lt;/strong&gt; into only &lt;strong&gt;390GB&lt;/strong&gt; of space. Imagine the backup storage costs savings there:&lt;/p&gt;
&lt;div&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Augmented Inline Deduplication&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/augmented-inline-deduplication-example.png&quot; alt=&quot;augmented inline deduplication example&quot; id=&quot;augmented-inline-deduplication-example&quot; style=&quot;margin: 7px auto; display: block;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Try Altaro's Free VM Backup Solution - Download Now&quot;&gt;Try Altaro's Free VM Backup Solution - Download Now&lt;/a&gt;&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;WAN Optimisation&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you are &lt;strong&gt;backing up&lt;/strong&gt; your &lt;strong&gt;Virtual Machines&lt;/strong&gt; to a &lt;strong&gt;secondary site&lt;/strong&gt;, over a &lt;strong&gt;WAN connection&lt;/strong&gt; then consider a solution which includes &lt;strong&gt;WAN Optimisation&lt;/strong&gt;. Bandwidth isn’t free which is how &lt;strong&gt;WAN optimisation&lt;/strong&gt; can help. Backup data is compressed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In some better implementations, only data that the backup storage doesn’t already have will be sent over the WAN. This can drastically save your bandwidth and avoid “burst” costs by your ISP. &lt;strong&gt;WAN Optimization&lt;/strong&gt; can also free up the link for other uses and applications.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Guest Quiescing&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you have databases which require backing up, then ensure your selected solution supports backing up of your databases type and version. In this scenario is not enough to &lt;strong&gt;backup Virtual Machines&lt;/strong&gt; on their own. Typically for &lt;strong&gt;databases&lt;/strong&gt;, an &lt;strong&gt;agent needs to be deployed&lt;/strong&gt; to the machine which will instruct the database to flush all writes that are in memory to disk. If you don’t do this then there is a risk that the database will not restore correctly. Something to keep in mind is that with &lt;strong&gt;Altaro&lt;/strong&gt;, Exchange, SQL and other applications &lt;strong&gt;only require VMware tools&lt;/strong&gt; for VMware vSphere environment for &lt;strong&gt;guest quiescing&lt;/strong&gt;. &lt;strong&gt;No additional agents are required&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Guest Quiescing&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/guest-quiescing.png&quot; alt=&quot;vm backup - guest quiescing&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;vm backup - guest quiescing&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Instant Restore&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Instant restore&lt;/strong&gt; is a more modern approach to restoring &lt;strong&gt;Virtual Machines&lt;/strong&gt;. Some providers will allow you to instantly map the backup file to your systems so that you can get back online in seconds rather than waiting for several hours for a restore to complete.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Altaro&lt;/strong&gt; aims to &lt;strong&gt;meet all of these business requirements&lt;/strong&gt; through their &lt;strong&gt;VM Backup solution&lt;/strong&gt;. Altaro supports &lt;strong&gt;all common storage types&lt;/strong&gt; out of the box (Network Drive, NAS, iSCSI, eSATA and USB) with &lt;strong&gt;no advanced configuration required&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Altaro's Free VM Backup supports multiple backup locations&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/vm-backup-select-backup-location.png&quot; alt=&quot;vm backup select backup location&quot; id=&quot;vm backup select backup location&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;vm backup select backup location&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Furthermore, all of the advanced features that you can think of are supported by &lt;strong&gt;Altaro VM Backup&lt;/strong&gt; including &lt;strong&gt;Deduplication&lt;/strong&gt;, &lt;strong&gt;WAN Optimisation&lt;/strong&gt;, &lt;strong&gt;Guest Quiescing&lt;/strong&gt; via &lt;strong&gt;VMware Tools&lt;/strong&gt; and &lt;strong&gt;Instant Restore Technology&lt;/strong&gt; to bring your backups online in &lt;strong&gt;just a few seconds&lt;/strong&gt;, &lt;strong&gt;regardless of their size&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vm-backup-billing-model-and-price&quot;&gt;VM Backup - Billing Model &amp;amp; Price&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are various billing models out there these days. Most solutions will charge you a &lt;strong&gt;fee per server CPU&lt;/strong&gt; or by the &lt;strong&gt;number of Virtual Machines&lt;/strong&gt;. Then there is usually a maintenance fee on top which covers support and entitlement to new versions of the software.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With various options available, work out if a &lt;strong&gt;per CPU&lt;/strong&gt; or &lt;strong&gt;per VM option&lt;/strong&gt; is more advantageous for your business. This applies for the long term, so forecast this pricing out over 3 or 5 years. It might also be a good time to see if you can &lt;strong&gt;consolidate your Virtual Machines&lt;/strong&gt; down onto fewer hosts and go for a host orientated option rather than per VM.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It would also be wise to look into deals on &lt;strong&gt;longer-term agreements&lt;/strong&gt; and If you have a large estate, to see if there are discounts for signing up to a larger commitment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some vendors will offer an &lt;strong&gt;OPEX model&lt;/strong&gt; rather than a &lt;strong&gt;fixed price&lt;/strong&gt; upfront CAPEX solution. Paying monthly can help with budgets so check with your vendor about the options.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When we look at &lt;strong&gt;Altaro VM Backup&lt;/strong&gt;, the billing model is simple; all you need is the number of hosts in your environment and the edition of the software you wish to purchase. 24/7 support upgrades are included for the first year too; you can purchase software maintenance agreements (SMA) for continued upgrade and Technik support in future years. Altaro does not bill you on the number of VMs or sockets so you can leverage a cost-saving over the competition here.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vm-backup-security-and-encryption&quot;&gt;VM Backup – Security &amp;amp; Encryption&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Security is a growing concern so don’t fall into the gap and forget about it when looking at your backup solution:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Check to ensure your chosen solution’s backups can put an air gap in place for your production &lt;strong&gt;Virtual Machines&lt;/strong&gt; to prevent the spread of threats such as &lt;strong&gt;crypto-locker&lt;/strong&gt; to your backups.&lt;/li&gt;
&lt;li&gt;Do you need to &lt;strong&gt;encrypt your VM backups&lt;/strong&gt;? This can slow down your backup jobs and prevent some features from working so ask your shortlisted vendors what the deal is here.&lt;/li&gt;
&lt;li&gt;For ultra-security conscience businesses, you might want your backups to be encrypted as the data is sent down the network to your storage device. This can be advantageous, but there are sometimes cheaper options such as using a &lt;strong&gt;VPN&lt;/strong&gt; or a &lt;strong&gt;dedicated VLAN&lt;/strong&gt; to help protect you to a certain degree.&lt;/li&gt;
&lt;li&gt;Backup software such as Altaro can use the &lt;strong&gt;inbuild Encryption&lt;/strong&gt; feature which would encrypt all backups with an &lt;strong&gt;AES 256bit Encryption&lt;/strong&gt; (Military Grade) hence preventing from having one encrypting backups manually and possibly rendering the backups not accessible even to the backup solution itself.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Try Altaro's Free VM Backup Solution - Download Now&quot;&gt;Try Altaro's Free VM Backup Solution - Download Now&lt;/a&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vendor-reputation&quot;&gt;Vendor Reputation&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Before signing up to a contract with a backup vendor, ask yourself the&amp;nbsp; following questions&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;How long has the company been in business?&lt;/li&gt;
&lt;li&gt;How many version of the software has been released?&lt;/li&gt;
&lt;li&gt;Is the software supported by your virtualization vendor (VMware/ HyperV etc)?&lt;/li&gt;
&lt;li&gt;How quickly does the backup vendor’s software support a recently released update from your Virtualization vendor?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For peace of mind, &lt;strong&gt;Altaro&lt;/strong&gt; wins awards every year which are published on their website. They have &lt;strong&gt;over 30 awards&lt;/strong&gt; to their name and a series of impressive independent reviews. Altaro also boast over 50,000 customers including:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Try Altaro's Free VM Backup Solution&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/altaro-vm-backup-customers.png&quot; alt=&quot;altaro vm backup customers&quot; id=&quot;altaro vm backup customers&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;altaro vm backup customers&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;vendor-support&quot;&gt;Vendor Support&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When things go wrong and you have to rely on your backup solution to save the day, you need to know that the vendor support is ready to help you should you need them. Here are some things to consider:&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Support Reviews&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Look online to see if there are any reviews on the solution you are looking at purchasing.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A quick google search should be all you need to see if there are any major issues with the software.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Service Level Agreements&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When you receive your terms, review the support clauses to see if the SLAs are in line with your expectations. Ideally, you want the vendor to respond fairly quickly to your support requests especially if they are related to a restore.&lt;/p&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Support Availability&lt;/h3&gt;
&lt;p style=&quot;text-align: left;&quot;&gt;For availability, the two main areas for consideration are:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Can you phone or email the support team?&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Being able to call the support team is important because other methods such as email and chat are slow and might be triaged for several hours or misclassified into another severity level. Phone support is incredibly important when looking at your options.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Support hours&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It always feels as though we need support at the worst possible time. Trying to get an application or &lt;strong&gt;Virtual Machine restore&lt;/strong&gt; completed through the evening so that it is ready for the morning can be a challenge. With this in mind, we should try to choose a &lt;strong&gt;VM backup vendor&lt;/strong&gt; that has a &lt;strong&gt;24/7 helpdesk&lt;/strong&gt; who you can call at any time and log a case.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt; One of the great things about &lt;strong&gt;Altaro&lt;/strong&gt; is their support. They commit to responding to support calls in &lt;strong&gt;under 30 seconds&lt;/strong&gt;. Guaranteed!&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?283240&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Legendary Support by Altaro - Free Download&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/virtualization-and-vm-backups/altaro-customer-support.png&quot; alt=&quot;altaro customer support&quot; id=&quot;altaro customer support&quot; style=&quot;margin: 7px auto; display: block;&quot; title=&quot;altaro customer support&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h1&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article helped identify the &lt;strong&gt;main considerations&lt;/strong&gt; for your &lt;strong&gt;VM Backup solution&lt;/strong&gt; to ensure &lt;strong&gt;business continiouity&lt;/strong&gt;, &lt;strong&gt;data integrity&lt;/strong&gt;, &lt;strong&gt;data availability&lt;/strong&gt; and more. We talked about the importance of the &lt;strong&gt;number of VMs and Hosts&lt;/strong&gt; supported by the &lt;strong&gt;VM backup&lt;/strong&gt;, type of &lt;strong&gt;backup storage supported&lt;/strong&gt;, advanced&amp;nbsp; &lt;strong&gt;storage space conservation&lt;/strong&gt; techniques such as &lt;strong&gt;Augmented Inline Deduplication&lt;/strong&gt;, &lt;strong&gt;WAN Optimization backup techniques&lt;/strong&gt; to maximise your &lt;strong&gt;backups over WAN links&lt;/strong&gt;, &lt;strong&gt;Guest Quiescing&lt;/strong&gt; for &lt;strong&gt;database backups&lt;/strong&gt;, &lt;strong&gt;Instant restore&lt;/strong&gt; capabilities for fast restoration, VM Billing and Pricing models, VM Backup Security and encryption and vendor support.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We believe that &lt;strong&gt;Altaro&lt;/strong&gt; fits the needs of most organisations due to their scalable, feature-rich solution. With an average call pickup of &lt;strong&gt;only 22 seconds&lt;/strong&gt;, straight to a product expert with no gatekeepers in the way of your support experience is enough on its own for most to look at Altaro as a viable solution.&lt;/p&gt;</content>
		<category term="Virtualization &amp; VM Backup" />
	</entry>
</feed>
