This guide provides an overview of your configuration options. In addition, this guide includes articles on how to manage users, storage, security, and more.
Browse the articles below for additional topics, tutorials, and reference guides, or search this guide using the search bar to the right. You can view all articles included in this guide by selecting Articles from the menu above.
- Adding Organizations For User Management
- A default organization is created when your Code42 environment is set up. This tutorial explains how to create additional organizations in your Code42 environment.
- Adding Storage
- This tutorial explains how to add storage in the following ways:
Add a new storage server to an existing destination
Add a store point
Add a provider as a destination
For full information on storage and data balancing, please see Destinations reference.
- Adding Users From The Administration Console
- There are three different ways to add users to your Code42 environment via the administration console. This article covers each option and provides step-by-step instructions for adding users by:
Entering information manually for each user
Uploading a text file with a list of users
Sending email invitations
For information about authenticating users with LDAP, please see Integrating With LDAP For User Authentication.
- Configuring A Radius Server
- RADIUS is a networking protocol that provides authentication, authorization and accounting. This tutorial explains how to configure your Code42 environment to authenticate with one or more RADIUS servers.
- Configuring Your Code42 Environment To Use RADIUS And LDAP Concurrently
- This tutorial explains how to configure your Code42 environment to support the use of RADIUS and LDAP together. Under this configuration, RADIUS is used for authentication, while LDAP handles other aspects of user management, such as user deactivation, role assignment, and organization assignment.
- Converting Your Code42 Environment From Local to Exclusively Cloud Destination
- This tutorial explains how to convert your Code42 environment from using exclusively local destinations (i.e., destinations using enterprise servers and store points in your own datacenter) to exclusively using cloud destinations provided by Code42 or a third party.
- Customizing Enterprise Email Templates
- Your Code42 environment sends email notifications for many types of events. By default, these emails follow standardized templates stored on your master server. You can create custom versions of these templates to customize the emails that your Code42 environment sends to your administrators and end users.
- Customizing The CrashPlan App
- You can prepare deployment packages for the CrashPlan app in order to apply customized images or settings to your environment's CrashPlan apps at installation. For example, you might co-brand the CrashPlan app by adding your own graphics, or you could automatically set the IP address of the master server. This article explains the specific elements that can be customized, and how to enable the customizations. Only the elements described in this article are customizable.
For information about customizing your administration console, rather than the CrashPlan app, see Custom Co-Branding The Console.
- Increasing Java Heap Space For Your Code42 Environment
- As the number of users and devices in your Code42 environment increases, the amount of Java Virtual Machine (JVM) heap space memory consumed on your enterprise server(s) will also increase. If your enterprise server runs out of heap space, it will be necessary to increase the maximum heap space setting. This tutorial explains how to increase the amount of memory allocated to your Code42 environment's JVM heap space.
- Installing Your Own SSL Certificate For HTTPS Console Access
- The enterprise server includes self-signed SSL certificates that can be used for secure access to the administration console. While this approach is secure, accessing these applications with a web browser can result in security warnings.
To eliminate browser security warnings when accessing the administration console via HTTPS, you can install a certificate signed by a recognized certificate authority (CA). This is very similar to the process of installing an SSL certificate for a standard web server.
The instructions in this article explain the details for obtaining and installing a CA-signed certificate into your enterprise server in several situations:
You have a private key and CA-signed certificate and your enterprise server runs on Mac, Linux or Solaris.
You have a private key and CA-signed certificate and your enterprise server run on Windows.
You do not have a private key or certificate.
- Offer Additional Destinations
- This article explains how to offer a destination to your organizations so that it can be used for redundant backup.
- Seeding To Your Own Private Cloud
- This tutorial explains how to expedite backing up a large amount of data through a process known as "seeding."
- Seeding Your Initial Backup To PROe Cloud Australia
- If you have a large amount of information to back up (at least 100 GB), completing an initial backup online could take many weeks. Code42's Seeded Backup service can help you complete your initial backup much more quickly.
- Setting Up Single-Sign On With The Okta CrashPlan PROe App
- This tutorial explains how to integrate your Code42 environment to work with Okta, an identity management provider. Okta provides centralized user access control using Single Sign-On (SSO) technologies such as SAML and supports integration with an existing directory service, such as Google Apps or Active Directory.
This tutorial uses Okta's customized application for CrashPlan PROe, which simplifies the integration and setup process. For greater control over integrating your Code42 environment with Okta, please see our general Okta integration article.
- Setting Up Single Sign-On With Okta
- This tutorial explains how to integrate your Code42 environment to work with the Okta identity management provider. Okta provides a standards-based service to enable centralized user access control using Single Sign-On (SSO) technologies such as SAML. Okta's cloud-based SSO service also supports integration with an existing directory service, such as Google Apps or Active Directory.
- Setting Up The PROe Cloud
- The PROe Cloud is a fast, simple way to start backing up with CrashPlan PROe. PROe Cloud customers can access their administration console, set up new devices, and start backing up immediately using this guide.
- Setting Up The PROe Hybrid Cloud
- This tutorial explains how to configure the CrashPlan PROe Cloud Destination in a hybrid deployment and make it an available backup destination for users.
Follow these instructions using the network and provider key information you received from your PRO Services engineer.
- Single Sign On With Ping Identity
- This tutorial explains how to integrate your Code42 environment to work with Ping Identity (also known as Ping One). Ping Identity provides a standards-based service to enable centralized user access control using Single Sign-On (SSO) technologies such as SAML and OpenID. Ping Identity's cloud-based SSO service also supports the use of an identity bridge to link to an existing directory service, such as Google Apps or Active Directory.
- Using Backup Sets
- Backup sets are an option in CrashPlan PROe that can configure different groups of files to back up to different locations with different settings. For example, you can configure devices in your Code42 environment to back up frequently changed documents with a high priority each day, but also to back up relatively static system files with a lower priority only once a week.
- Customizing Your Administration Console
- You can customize the administration console by adding your own graphics and text. The information in this article outlines what specific elements can be customized and how to enable the customizations. Only the elements described in this article are customizable.
- Destinations Overview & Settings
- A destination is a logical grouping of enterprise servers and storage servers within a single LAN or a single data center. Devices back up to destinations. For best data protection we always recommend backing up your devices to at least two destinations.
- Destination Servers Overview & Settings
- Describes in detail the available settings and controls for managing destination servers.
- Device Backup Overview & Settings
- The Backup tab under Settings > Device allows you to control how and when backup operations take place, what files to include and exclude from backup, the frequency of backup and how long versions should be retained. Advanced settings allow you to control backup processes like real-time file watching, data de-duplication, encryption and compression.
- Device Default General Overview & Settings
- This reference guide describes global default settings (Settings > Device) for all your devices.
- Device Security Overview & Settings
- Use the Security command on the Settings > Devices menu to set the default encryption key policy for all users (new and existing). After the encryption policy is upgraded, upgraded users can never downgrade their policy.
NOTE: Changing your account password or private password does not require that you restart your backup.
IMPORTANT: Changing your data key requires that you restart your backup.
- LDAP Overview & Settings
- Leverage your organization's existing directory services environment by enabling LDAP integration in CrashPlan PROe and SharePlan for Enterprise.
- My Profile Overview & Settings
- The My Profile command displays summary info and graphical views about your backup, restores and the location of your devices. The action menu contains commands to edit your profile and view deactivated devices.
- Device Default Network Overview & Settings
- Use the settings from Settings > Devices > Network to control connection performance settings over LAN and WAN, exclude wireless networks, exclude network interfaces or configure proxy settings.
- Organizations Overview & Settings
- Organizations are the Code42 environment's way of grouping users. You can configure different organizations to use different settings, different backup destinations or even use different LDAP servers to authenticate users.
- Reporting Overview & Settings
- From Settings > Device > Reporting, you can configure warnings and alerts that your users receive about their backup status.
- Report Settings Overview
- From Settings > Report, you can specify email addresses to receive reports and alert emails. This screen appears in versions 3.6.1.x.
- Security Overview & Settings
- This article contains a reference guide for settings used to manage security keys, roles, LDAP, Radius, and Single Sign-On.
- Server Overview & Settings
- From the Server Settings screen, you can access various server details, as well as configure email alerts related to free space, available licenses, and backup status.
- Store Points Overview & Settings
- Options for managing your store points, including assigned devices, cold storage, and device archives are available from the Store Point menu.
- Supported Metadata
- CrashPlan supports metadata on all platforms. Restored files will include supported metadata as described in this article.
- Top-Level Organization Overview & Settings
- The Settings > Organizations options specify the default organization settings (storage quotas, destinations, reporting, and security) for any new organizations you create. These top-level settings also affect settings for organizations that are configured to inherit the top-level settings.
CrashPlan PROe can be configured to support compliance with the Health Insurance Portability and Acc...
Administrators can control how quickly source devices are allowed to send back up data to their dest...
Implementing single sign-on (SSO) with your Code42 environment provides security benefits and simpli...
This article outlines how to use the administration console to define end-user backup settings at a ...
This tutorial explains how to enable basic user authentication via LDAP for CrashPlan PROe or ShareP...
By default, CrashPlan backs up files in the user's home directory. This article explains several way...