Who is this article for?
CrashPlan for Small Business, no.
Code42 for Enterprise, yes.
Link: Product plans and features.
Code42 administrators can use this article to quickly locate resources for configuring and managing a Code42 environment.
New administrator toolkit
For a list of top troubleshooting articles for new administrators, see New admin toolkit.
For help, you can search our extensive support site, go to our customer portal, view community postings, or contact our Customer Champion team.
Learn the basics
Familiarize yourself with the administration console
- Learn the basics of navigating the administration console.
- Use the administration console to view, manage, monitor, and configure your Code42 environment.
- Apply settings across your Code42 environment.
Test backup and restore
Review backup concepts
Back up files
- Back up your first device.
- Start backup from the Code42 app.
- Learn how backup works and how files are prioritized.
- Adjust settings for optimal speed.
- Prevent your computer from going to sleep.
- Increase the system resources the Code42 app is allowed to use.
- Back up to a second destination.
Back up to an external drive to improve backup redundancy. Local destinations can be used for faster backups and restores.
- Restore files from the Code42 app.
- Restoring files from the Code42 app is the most common method for restoring files.
- There are no limits on the amount of data that can be restored at one time with the app.
- Restore files from the web.
- Quickly access files backed up to a cloud destination using the administration console.
- Administrators can configure a data limit for web restores (250 MB by default).
In addition, administrators with appropriate permissions can restore files for end users; see Manage your Code42 environment for more information.
Configure your Code42 environment
Your Code42 environment is structured into organizations, users, and devices. This hierarchy lets you configure and manage settings and data across job functions and in accordance with regulatory needs. It also gives you the ability to quickly address potential data security concerns and legal mandates with minimal disruption to your users.
- Create organizations to group users and apply shared settings.
- Sort users into groups and apply shared settings to their devices.
- An organization can contain child organizations, and an organization can exist without containing any users.
- Configure settings for individual organizations.
Define unique settings, such as backup frequency, available destinations, and data retention policies for each organization as needed.
Configure backup policies
- Determine what backup policies are appropriate for your Code42 environment.
- Review considerations for controlling what, how, and where data is backed up.
- Review relevant case studies for tuning your Code42 environment.
- Configure device backup settings.
Define what, how, and where data is backed up.
- Use include and exclude filters to fine tune what is backed up.
Refine what data is backed up using file extensions, filename patterns, substitution variables, and regular expressions.
- Configure network overrides.
- Control network limits between source devices and destinations.
- Independent bandwidth throttle settings exist for both LAN and WAN.
- Add individual users manually.
- Create multiple users at once by uploading a text file.
- Invite multiple users by sending an email invite. Invited users create their accounts from the administration console.
Deploy the Code42 app
- Review the Code42 app deployment options.
- If you have devices shared by multiple users, determine the installation type for those devices:
- Streamline deployment in your environment by predefining settings in the Code42 app.
Configure file activity monitoring
- Set up endpoint monitoring.
Monitor file activity on each device in real time to detect file exfiltration.
- Configure activity profiles.
Define profiles in Code42 Security Center to generate an email notification when a user exceeds a defined file activity threshold.
- Configure Forensic File Search.
Set up searching for file activity to answer questions such as:
- Who has a specific file?
- Are there any files in the enterprise infected with malware?
- What file activity occurred during a security incident?
- Configure Legal Hold.
If you suspect employees in your company of malicious file activity, use Legal Hold to collect their files as evidence. The resulting gathered files can be used in legal proceedings if needed.
Configure authentication and directory services
- Review options for user authentication and authorization.
- Configure single-sign on (SSO).
SSO is an authentication method that allows a user to use the same credentials to sign in to multiple applications.
Manage your Code42 environment
Once your Code42 environment is configured and deployed, you can use the administration console to monitor user activity and manage access and retention of data.
Restore files for users
- Restore files for other users as an administrator.
- Restore to a zip file on your computer.
- "Push" a restore to the user's device. (Code42 for Enterprise only)
Replace a computer or hard drive
- Replace a computer or hard drive.
- Restore all files to the new device.
- Adopt the previous computer's settings and backup archive(s).
Grant and remove access
- Review blocking, deactivating, and deauthorizing concepts.
- Consider use cases for restricting access to data.
- Take action to secure lost or stolen devices.
- Deactivate and reactivate users and devices.
- Deactivate users and devices.
- Reactivate user accounts and any associated devices, and reinstate users' backup data.
- Identify devices that may require administrator action.
Use the administration console to monitor backup status and connectivity for potential issues.
- Troubleshoot the Code42 app.
Troubleshoot the most commonly reported issues with the Code42 app.
- Troubleshoot web restores.
Troubleshoot the most commonly reported issues with web restores.