Who is this article for?
CrashPlan for Small Business, no.
Code42 for Enterprise, yes.
Link: Product plans and features.
Code42 administrators can use this article to quickly locate resources for configuring and managing a Code42 environment. The steps below are optional and provided as suggestions for what to do next when first configuring.
Test backup and restore
Use the Code42 app to verify that your Code42 environment is installed correctly and to familiarize yourself with the backup and restore workflow for users.
- Back up your first device.
- Start backup from the Code42 app.
- Learn how backup works and how files are prioritized.
- Adjust settings for optimal speed.
- Prevent your computer from going to sleep.
- Increase the system resources the Code42 app is allowed to use.
- Back up to a second destination.
Back up to an external drive to improve backup redundancy. Local destinations can be used for faster backups and restores.
- Restore files from the Code42 app.
- Restoring files from the Code42 app is the most common method for restoring files.
- There are no limits on the amount of data that can be restored at one time with the app.
- Restore files from the web.
- Quickly access files backed up to a cloud destination using the administration console.
- Administrators can configure a data limit for web restores (250 MB by default).
In addition, administrators with appropriate permissions can restore files for end users; see Manage your Code42 environment for more information.
Familiarize yourself with the administration console
- Learn the basics of navigating the administration console.
- Use the administration console to view, manage, monitor, and configure your Code42 environment.
- Apply settings across your Code42 environment.
Plan and configure your environment
Your Code42 environment is structured into organizations, users, and devices. This hierarchy lets you configure and manage settings and data across job functions and in accordance with regulatory needs. It also gives you the ability to quickly address potential data security concerns and legal mandates with minimal disruption to your users.
- Create organizations to group users and apply shared settings.
- Sort users into groups and apply shared settings to their devices.
- An organization can contain child organizations, and an organization can exist without containing any users.
- Configure settings for individual organizations.
Define unique settings, such as backup frequency, available destinations, and data retention policies for each organization as needed.
Configure backup policies
- Determine what backup policies are appropriate for your Code42 environment.
- Review considerations for controlling what, how, and where data is backed up.
- Review relevant case studies for tuning your Code42 environment.
- Configure device backup settings.
Define what, how, and where data is backed up.
- Use include and exclude filters to fine tune what is backed up.
Refine what data is backed up using file extensions, filename patterns, substitution variables, and regular expressions.
- Configure network overrides.
- Control network limits between source devices and destinations.
- Independent bandwidth throttle settings exist for both LAN and WAN.
- Add individual users manually.
- Create multiple users at once by uploading a text file.
- Invite multiple users by sending an email invite. Invited users create their accounts from the administration console.
Deploy the Code42 app
- Review the Code42 app deployment options.
- If you have devices shared by multiple users, determine the installation type for those devices:
- Install the Code42 app per user on a shared device to use a separate archive for each user and limit restores to only the user who owns the data.
- Install the Code42 app for everyone on a shared device to use a single archive for the users and either allow all users on the device to restore the data, or restrict restores with permissions.
- Streamline deployment in your environment by predefining settings in the Code42 app.
Configure authentication and directory services
- Review options for user authentication and authorization.
- Configure single-sign on (SSO).
SSO is an authentication method that allows a user to use the same credentials to sign in to multiple applications.
Manage your Code42 environment
Once your Code42 environment is configured and deployed, you can use the administration console to monitor user activity and manage access and retention of data.
Restore files for users
- Restore files for other users as an administrator.
- Restore to a zip file on your computer.
- "Push" a restore to the user's device. (Code42 for Enterprise only)
Replace a computer or hard drive
- Replace a computer or hard drive.
- Restore all files to the new device.
- Adopt the previous computer's settings and backup archive(s).
Grant and remove access
- Review blocking, deactivating, and deauthorizing concepts.
- Consider use cases for restricting access to data.
- Take action to secure lost or stolen devices.
- Deactivate and reactivate users and devices.
- Deactivate users and devices.
- Reactivate user accounts and any associated devices, and reinstate users' backup data.
Monitor file activity
- Set up endpoint monitoring.
Monitor file activity on each device in real time to detect file exfiltration.
- Configure activity profiles.
Define profiles in Code42 Security Center to generate an email notification when a user exceeds a defined file activity threshold.
- Configure Forensic File Search.
Set up searching for file activity to answer questions such as:
- Who has a specific file?
- Are there any files in the enterprise infected with malware?
- What file activity occurred during a security incident?
- Identify devices that may require administrator action.
Use the administration console to monitor backup status and connectivity for potential issues.
- Troubleshoot the Code42 app.
Troubleshoot the most commonly reported issues with the Code42 app.
- Troubleshoot web restores.
Troubleshoot the most commonly reported issues with web restores.
For an understanding of the foundational concepts underpinning the Code42 environment, refer to the articles below.
- Code42 for Enterprise Security
Read a detailed description of the Code42 for Enterprise security model.