Recovering Disks Using Bootable Media

Recovering Disks Using Bootable Media

This article explains how to recover an entire disk using the bootable media, this is useful for recovering disks of a non-booting computer or recovering an entire disk after a malware incident. If you only need to recover files or folders to a functioning computer, use this article: https://support.esilo.com/portal/en/kb/articles/recovering-files-and-folders-using-the-cyber-protect-console

Use this article to create bootable media if needed: https://support.esilo.com/portal/en/kb/articles/creating-bootable-media

Getting Started

You will not need to log in to the Cyber Protect Console to follow these instructions, but you can monitor and manage the recovery process from the Console if needed. If you are recovering backups from cloud storage, you will need to link your account once the computer boots from the bootable media. When creating bootable media you can choose to pre-register it to your account so it will connect automatically when the computer boots up, otherwise you may need to log in manually. For recovery from local storage locations or file shares you do not need to log in to your account. 

Recovering Your Backup

  1. Boot the target machine by using bootable media.
  2. [Only when recovering a Mac] If you are recovering APFS-formatted disks/volumes to a non-original machine or to bare metal, re-create the original disk configuration manually:

    1. Click Disk Utility.
    2. Erase and format the target disk into APFS. For instructions, refer to https://support.apple.com/en-us/HT208496#erasedisk.
    3. Re-create the original disk configuration. For instructions, refer to https://support.apple.com/guide/disk-utility/add-erase-or-delete-apfs-volumes-dskua9e6a110/19.0/mac/10.15.
    4. Click Disk Utility > Quit Disk Utility.
  3. Click Manage this machine locally or click Rescue Bootable Media twice, depending on the media type you are using.
  4. If a proxy server is enabled in your network, click Tools > Proxy server, and then specify the proxy server host name/IP address, port, and credentials. Otherwise, skip this step.
  5. [Optional] When recovering Windows or Linux, click Tools > Register media in the Cyber Protection service, and then specify the registration token that you obtained when downloading the media. If you do this, you will not need to enter credentials or a registration code to access the cloud storage, as described in step 8.
  6. On the welcome screen, click Recover.
  7. Click Select data, and then click Browse.
  1. Specify the backup location:

    • To recover from cloud storage, select Cloud storage. Enter the credentials of the account to which the backed up machine is assigned.

      When recovering Windows or Linux, you have the option to request a registration code and use it instead of the credentials. Click Use registration code > Request the code. The software shows the registration link and the registration code. You can copy them and perform the registration steps on a different machine. The registration code is valid for one hour.

    • To recover from a local or a network folder, browse to the folder under Local folders or Network folders.
    • To recover from backup locations on public cloud storage such as Microsoft Azure, Amazon S3, Wasabi or S3 compatible, first click Register media in the Cyber Protection service, and then configure recovery using the web interface. 

    Click OK to confirm your selection.

  2. Select the backup from which you want to recover the data. If prompted, type the password for the backup.
  1. In Backup contents, select the disks that you want to recover. Click OK to confirm your selection.
  2. Under Where to recover, the software automatically maps the selected disks to the target disks.

    If the mapping is not successful or if you are unsatisfied with the mapping result, you can re-map disks manually.

    Changing disk layout may affect the operating system bootability. Please use the original machine's disk layout unless you feel fully confident of success.

  3. [When recovering Linux] If the backed-up machine had logical volumes (LVM) and you want to reproduce the original LVM structure:

    1. Ensure that the number of the target machine disks and each disk capacity are equal to or exceed those of the original machine, and then click Apply RAID/LVM.
    2. Review the volume structure, and then click Apply RAID/LVM to create it.
  4. [Optional] Click Recovery options to specify additional settings.
  5. Click OK to start the recovery.
    • Related Articles

    • Creating Bootable Media

      You can recover either Windows or Linux by using the same media. To recover macOS, create media on a device running macOS. For instructions on using bootable media to perform a recovery, use this article: ...
    • Recovering Files and Folders Using the Cyber Protect Console

      This article explains how to recover files or folders to a computer via the web console at console.esilo.com. This method assumes the computer you are recovering files to is working and connected to the internet. To recover an entire disk or a ...
    • Recovering Google Workspace Backup Data

      Accessing the eSilo Cyber Protect Console To get started recovering your data, you'll first need to login to the web console by going to console.esilo.com in your web browser. Once there, you'll be prompted for your login credentials, for most users ...
    • How to Create a Local Backup Job Using Veeam Agent for Windows

      This is useful when you need to comply with the 3-2-1 rule of backups: 3 copies of important data (1 production copy and 2 backups) 2 types of storage media (e.g. internal hard drive, external hard drive, USB flash drive, cloud copy, tape backup, ...
    • Managing Backup and Security Settings

      Logging in to the Cyber Protection Console To manage registration tokens for your company, such as creating a new token to use for registering devices, you will start by going to console.esilo.com in your web browser. You may be prompted to log in, ...