Data Recovery by Solution

Veeam Data Recovery

Ontrack Veeam Backup Recovery. Don‘t waste time! Contact the experts at Ontrack for data recovery.

To avoid the risk of an IT disaster, Ontrack employs advanced techniques to repair, restore, and reconstruct Veeam backups that have become inaccessible.

Ontrack's global team has years of experience and training, a variety of proprietary tools, and expertise gained by working with virtual machine software vendors and hardware OEMs who also recommend our services.

Gray-Veeam 2 Why is Backup

Why is backup and recovery important?

The most valuable and important thing in today's business environment is data.

Backup is usually only resorted to after primary data failures in order to restore an earlier point in time with a copy of the data. According to Veeam's Data Protection Reports, four out of ten physical servers experience at least one failure per year. Generally, however, only one in two backup and restore operations works completely. The complexity of IT environments is constantly increasing, along with environmental disasters, power outages, and the growing threat of cyberattacks. Staff shortages and human error add to the problem. Three out of four companies recorded a ransomware attack last year. About a third of the companies that paid the hackers were unable to access their data. The average downtime was generally two weeks.

Source: 2021 + 2023 Veeam Data Protection Report, 2022 Veeam Ransomware Trends Report

 

Why Ontrack Data Recovery

Gray-Hard Drive 3 Any Time

Multiple Service Offerings

Ontrack offer's flexible service offerings to meet your unique needs and budgetary considerations. Our experts are on standby 24/7/365.

Gray-Complete Transparency

Complete Transparency

We want you to have control over your data recovery process. You'll know exactly what can be recovered before paying.

Gray-Raid 14 unrivaled Global

Unrivaled Global Expertise

Backed by the world’s largest R&D team, we have the knowledge and ability to address your unique data recovery needs.

Veeam Data Recovery Services

Whether your device has suffered physical damage or undergone a logical failure, we offer you a range of services to match your specific needs.

Our experts are on-hand and will respond to your issue immediately. From assisting with troubleshooting to onsite recovery, our wide range of expert recovery options will ensure you receive the very best solution to solve your RAID data loss problem.

In-Lab Raid Data Icon
In-lab RAID Data Recovery
The recovery option supports any RAID system, no matter what data loss situation has been experienced. This recovery service is provided in our state-of-the-art data recovery lab and ISO-5/Class 100 cleanroom environment to ensure the safety of your data.
Remote Veeam Icon
Remote Veeam Data Recovery
Your data is recovered remotely without your media ever leaving your premises. We connect to your system via the Internet to perform a live recovery. Available when the storage device or system is still operational.
Custom Veeam Icon
Custom Veeam Data Recovery
We offer custom-designed recovery solutions for proprietary RAID systems and/or highly complex enterprise-level systems. Our R&D team will work with your IT staff to create an emergency solution to retrieve your data.
emergency-case

Ontrack is your partner in Veeam backup recovery.

When your normal availability of Veeam backup data starts having issues, things can get tight fast. We know how important your backups are and can help you recover and rescue your data.

  • Have you suffered hardware damage and no longer have access to your Veeam backup data?
  • Have your VBK files been deleted by mistake?
  • Is there a problem with restoring your Veeam Backup files?
  • Have you fallen victim to ransomware and lost your Veeam Backup files?

What Our Customers Say About Our Data Recovery Services

4-Step Data Recovery Process

We ensure that our process is transparent, quick and safe. You’ll be informed every step of the way for complete peace of mind.

Consultation Consultation
Consultation

Free consultation with quick and direct access to specialists. Contact our experts directly for comprehensive data recovery advice and a no obligation quote. Available 24/7 for business emergencies.

Evaluation Evaluation
Evaluation

After receiving your storage device, our experienced engineers will undertake an in-depth evaluation. We aim to quickly provide you information on how much data we expect to be able to save, how long it will take and at what fixed costs. Sometimes a more extensive diagnosis is necessary, and we will communicate your options to you at every step.

Data Recovery Data Recovery
Data Recovery

With your approval, we recover your data based on your chosen service level. Through our secure portal you can track the status of your recovery.

Data Return Data Return
Data Return

Once the data has been recovered, we will send it back to you in the agreed manner and encrypted on an external storage device.

Veeam Data Loss Causes

servers-raid

Common causes of data loss from Veeam virtual machine backups.

There are many causes of data loss. Fortunately, Ontrack has expertise in recovering data from the following situations, among others.

  • Hardware failures of backup servers such as NAS or SAN systems
  • Hard disk failures of external drives and RAID systems
  • Formatting of LTO tape backups
  • Deleted or encrypted backup server partitions
  • Factory reset on a network attached storage (NAS) system
  • Accidentally deleted Veeam backup files
  • Corruption in Veeam VBK and VIB backup files
  • Overwritten data after an erroneous backup restore
  • Faulty incremental files and restore points
  • Incomplete or faulty restore of virtual machines
  • Merging of faulty Veeam full and incremental backup files
  • Faulty tape backups

How Fast Do You Need Your Data Back?

Our team of trusted experts are on standby to help. We offer flexible service offerings to meet your unique needs and budgetary considerations.

Emergency

Emergency

Average of 12-24 hours

Priority

Priority

Average of 3 business days

Standard

Standard

10 business days

How do backup files become damaged or corrupted?

Backup files can become corrupt in a number of ways:
  • Large backup files may become damaged while copying to other devices
  • Backups were accidentally or intentionally deleted
  • Files may be damaged during encryption

What type of damage can you help with?

We can help retrieve data from devices affected by water damage, fire damage, heat damage, and lightning strike and power surges, as well as those that have been dropped. If you're not sure if we can help, get in touch!

What is the goal of secure data destruction?

The main objective of secure data destruction is to make it impossible to recover data from a data storage device that is no longer in use by an individual or organization. Destroying this data reduces the risks of identity theft, financial theft, reputational harm, or corporate espionage.

Does data destruction remove windows?

Physical data destruction such as degaussing or shredding will make a hard disk drive or SSD inoperable so that none of the data, software, or other programs on the device will function. Erasure software can be used in such a manner that it erases only specific files, leaving Windows or other operating systems intact when an organization desires to repurpose the asset after wiping the data. The comprehensive approach to drive eraser software will remove all data and programs, including the operating system.

Does degaussing a hard drive make it non-functional?

When degaussing a traditional hard drive, the magnetically coated platters that store data are completely erased. Degaussing involves subjecting a hard drive to a magnetic field, which essentially demagnetizes the platters. The drive is rendered completely inoperable because there are no longer tracks and sectors on the platter which are used to organize and locate data. Degaussing provides permanent removal of data and is recommended as a step in the data sanitization of traditional hard drives, tape, and other magnetic media. After degaussing, devices can be physically destroyed using a special shredder—the process guards against the possibility of any potential for possible data recovery.

Does destroying a hard drive with a hammer make it unrecoverable?

We've seen videos of do-it-yourself data destruction with nail guns, hammers, and automobiles. And while these methods physically destroy devices, they don't provide a verifiable, certified method to ensure data is inaccessible and unrecoverable. Destroying a hard drive with a hammer might render it inoperable, but because Ontrack engineers are known for their miraculous data recovery rescues (including a hard drive from the crashed Space Shuttle), anything is possible.

Is it possible to recover data from a shredded HDD or SSD?

If the grinding takes place with correct equipment intended for safe data destruction, it is impossible to reproduce any data. However, if a shredder doesn't create small enough pieces, from a memory chip, for example, an SSD or a mobile phone chip can pass through without being destroyed. If this happens, the content could be recovered by data recovery experts such as Ontrack.

What are the top advantages of hard drive and SSD granulators?

Granulators, also known as shredders, are machines that rip, tear or smash a hard drive or SSD into small pieces, making it inoperable and not possible to recover any data. Data that is no longer need by the organization for the business, legal, or retention requirements can be safely and permanently destroyed using a granulator. Organizations can reduce the risk of security breaches and reduce storage costs by disposing of data no longer needed.

What is secure data erasure?

There are several methods that result in secure data deletion. The use of erasing software is recommended when the storage media is to be reused. For example, when re-selling IT equipment that already contains information. If the software is certified and approved, it can be used on spinning Hard Disk Drives (HDD), Solid State Drives (SSD), mobile phones and memory cards. The software then also deletes the hidden areas and remapped sectors. Deletion is done according to government standards such as NIST, DOD and many more. Physical destruction of hard drives is another option. You can either expose hard drives (HDD) and tapes to a strong magnetic field with a degausser or simply grind the entire device down to small fragments with a hard drive chewer (a so-called shredder).

What is the best way to dispose of hard drives?

Best practices can involve using data erasure software to securely overwrite data on HDDs and SSDs, including the hidden areas and remapped sectors. Deletion is done according to government standards such as NIST, DOD and many more. Physical destruction of hard drives can be done with a degausser that uses a powerful magnetic field, which erases not only the data but removes the servo tracks, rendering the media unusable. The most obvious destruction solution is to shred hard drives and other media into tiny, tiny pieces. This is called shredding or fragmentation. These machines smash a hard drive or SSD into pieces so small that the data cannot be recovered from the media or memory chips.

What is the primary goal of secure data destruction?

The main objective of secure data destruction is to make it impossible to recover data from a data storage device that is no longer in use by an individual or organization. Destroying this data reduces the risks of identity theft, financial theft, reputational harm, or corporate espionage.

Why is data destruction important?

Data on storage devices no longer in use by an individual or for business purposes by an organization has the chance of being accessed by threat actors who may use the data for identity theft, compromising privacy, financial theft, reputational harm, or corporate espionage. Once the data is destroyed, it is no longer available to those who would choose to use the data in this manner.

What is data erasure?

Data deletion, or data sanitisation, allows you to erase data that is no longer needed using methods that make it impossible to recreate the data. This is different from, for example, formatting a hard drive. It's also not the same as pressing "delete" to free up space or moving files to the trash. After these actions, data can be recovered using many different methods. Erasing data safely means that the areas on storage devices that contain unwanted data are overwritten or that the entire hard drive is overwritten. Overwriting is a process undertaken as part of secure erasure programs.

How do you recover from corrupted SQL files?

Ontrack uses a number of techniques and custom software to extract, rebuild, and recreate corrupted SQL database files. With unique expertise and capabilities, Ontrack excels at recovering databases from the most challenging data loss scenarios.

Does implementing SSD storage introduce difficulties for Microsoft SQL Server recovery?

Before making a move to an SSD-based SQL Server data stores, CTOs need to decide:
  • How great a risk SSD failure poses to SQL Server recovery operations.
  • Which technology provides the best balance of performance and reliability (SSD vs. HDD).
  • How to monitor the SSD drives on which logs are stored to assess health.
  • How to recover data from a failed SSD in the event of a disaster or drive failure.
It is also important to remember that the strongest feature of SSDs - a lack of moving parts - is also one of the greatest weaknesses. SQL data recovery from a failed SSD drive is an expert job, usually requiring professional assistance. Where platters could be removed and cloned from a traditional spinning disk in a cleanroom environment, SSD memory chips are typically harder to recover.Data recovery from SSD memory cells is possible, but it remains a complicated procedure. And because any SQL Server deployment needs to include data recovery provisions as part of its plan, CTOs and systems architects need to consider and mitigate the impact SSD outages can have on availability.

How does a page-level restore improve SQL Server recovery provisions?

For very large Microsoft SQL Server databases, a complete restore operation can take many hours. During this time the database cannot be used to prevent data being entered and lost as information is copied back from tape or disk. In a high-availability environment, any downtime is costly, so keeping it to a minimum is essential.Fortunately, page-level restore techniques can be used to keep recovery times to a minimum by reducing the amount of data that needs to copied back from the backup media. Since the release of Microsoft SQL Server 2005, DBAs have had the option of carrying out a 'page level restore' which allows them to recover a 'handful' of pages, rather than having to restore entire datasets and copy the information back into the original database.The page-level restore operation is perfect for situations where data becomes corrupted during writes through a faulty disk controller, misconfigured antivirus software or an IO subsystem. Better still, restore level operations can be performed online for Enterprise editions of Microsoft SQL Server.

How Does In Memory Computing Affect SQL Server Recovery?

Built-in provisionsHekaton allows DBAs to select high priority tables and objects that need to be stored in RAM for super-fast querying. However, the underlying architecture has also been engineered to create a localized backup of that data:Transaction logJust like a standard disk-based database, Hekaton also relies on a transaction log record to track operations, and assist with SQL Server recovery. To ensure complete coverage, Hekaton integrates both disk-based and memory-based transaction logs, writing both to disk in batches.Understanding the Data FileRather than the traditional page structures used for data rows, Hekaton uses a pair of sequential files - Data and Delta files. The Data file contains free-form data rows that are then linked using in-memory indexes. Every time a row is changed by an INSERT or UPDATE statement, the changed row is appended to the end of the Data file.To maintain the speed of operation and to maintain an accurate audit trail, when a row is deleted or updated from an in-memory table, it is not removed from, or changed in the Data file.

What Do I Need For A Successful Microsoft SQL Server Database Restore?

A full backupJust like any other file on the network, the key to a successful database recovery is to have a full, current backup of the MDB and MDF files. You should be taking incremental copies of the database files at least once a day, combined with a full backup at least once a week.A log file backupA 100% accurate database restore is reliant on having a completely up-to-date set of log files that corresponds with data access and update operations. For industries that are heavily regulated, like finance and banking, the log files are essential to prove compliance.Microsoft is keen to point out that you must have "enough” log backups available for a restore sequence, including the tail-log backup, before beginning the process.Sufficient spare disk capacityIn order to test the restored data is correct, you will need to restore the database elsewhere first. This will then give you a chance to test the restored data and ensure that there is no corruption, and that you have an up-to-date set of records that gives a true indication of state before the crash/deletion/corruption.

Are there any fees for Ontrack Tech Support?

Ontrack Tech Support is free, and available Monday - Friday from 7:30 am - 6:00 pm Central Standard Time (CST).

Can Ontrack be trusted to handle extremely sensitive data?

Yes. Ontrack's Labs are ISO 27001 Certified. Ontrack also receives an annual SOC 2 (formerly SAS 70 II) report from a certified audit firm.

Does Ontrack look at the data on my external hard drive?

No. Ontrack does not open any of your files. Our data recovery experts simply generate a file report.

How much will it cost to recover data from my external hard drive?

Data recovery costs vary depending on the severity of each data loss incident. For more information, contact an Ontrack specialist to request a free data recovery quote.

What will be included in the evaluation report?

Your free, no-obligation evaluation report will provide an estimate of how much of your data we expect to recover, how long we think the recovery will take, and how much it will cost. There are no hidden costs, and we aim to have the report with you within 4 hours.

What if my external hard drive is encrypted?

Ontrack will need the encryption keys / passcode to properly evaluate your device.

Can I put my fire damaged device in the fridge to cool it down?

Never place an electronic device in a refrigerator or freezer as an attempt to cool it. Just as extreme heat can cause damage to your device, so can excessive cold temperatures. The sharp drop from hot to cold can lead to condensation which will damage the internal components of the device, rendering it unusable.

How can I protect electronics from heat or fire damage?

Fire may not always be preventable, so having a good response system should an incident occur is highly recommended. Survey the areas where your electronics are stored and ensure that Highly Sensitive Smoke Detection (HSSD), automatic sprinkler systems and clean agent extinguishing systems are properly installed. Keeping your devices out of direct sunlight and away from tight spaces with other electronic devices that may generate heat is also important. Remember, any source of heat can cause damage.

How does fire affect devices?

Extreme heat has the ability to damage both the external and internal electronics of your device. The exact amount of damage depends on the intensity of the fire.

What should I do if my device has fire damage?

Do not turn the device on. While fire damage is usually noticeable, smoke damage may not always be visible. Powering up the device can cause further damage, as any hidden soot can cause it to crash. In the same vein, a hard drive that has sustained comprehensive external damage may be perfectly operable internally. In either case, it's important to take caution and have the drive checked by a professional data recovery specialist as soon as possible.

How much heat can a laptop withstand?

Short timeframes of exposure to temperatures of 100° Fahrenheit may not cause any major damage, however, exposure at 200° Fahrenheit will most likely lead to some corruption of data. Exposure at 300° Fahrenheit or higher can cause more extensive damage, warping HDDs and platters and de-soldering your device's electronic connections.

Can I put my heat damaged device in the fridge to cool it down?

Never place an electronic device in a refrigerator or freezer as an attempt to cool it. Just as extreme heat can cause damage to your device, so can excessive cold temperatures. The sharp drop from hot to cold can lead to condensation which will damage the internal components of the device, rendering it unusable.

How can I protect electronics from heat damage?

Circumstances of extreme heat may not always be preventable, so having a good response system should an incident occur is highly recommended. Keeping your devices out of direct sunlight and away from tight spaces with other electronic devices that may generate heat is also important. Remember, any source of heat can cause damage.

How does heat affect devices?

Heat has the ability to damage both the external and internal electronics of your device. The exact amount of damage depends on the intensity of the heat applied.

How much heat can a laptop withstand?

Short timeframes of exposure to temperatures of 100° Fahrenheit may not cause any major damage, however, exposure at 200° Fahrenheit will most likely lead to some corruption of data. Exposure at 300° Fahrenheit or higher can cause more extensive damage, warping HDDs and platters and de-soldering your device's electronic connections.

What should I do if my device has heat damage?

Do not turn the device on. While fire damage is usually noticeable, smoke damage may not always be visible. Powering up the device can cause further damage, as any hidden soot can cause it to crash. In the same vein, a hard drive that has sustained comprehensive external damage may be perfectly operable internally. In either case, it's important to take caution and have the drive checked by a professional data recovery specialist as soon as possible.

Can a brownout or power outage damage my hard drive?

It is unlikely that a power incident could cause physical damage to your hard drive. However, there are cases where platter damage can happen if a power outage occurs when the drive is actively writing to the disk.

Do surge protectors protect my electronic device against lightning?

While surge protectors offer an added measure of protection against lightning strikes, the only way to completely protect your device against damage caused by lightning strikes, power outages or power surges is to unplug them.

How can I prevent data loss during a brownout or power surge?

For business-critical data storage, we highly recommend installing an uninterruptible power source (UPS) to help prevent data loss during a power surge incident. Created as a continuous power supply system, a UPS administers emergency power to electronic devices when main sources of power fail or are interrupted. It also bears repeating that backing up your data is a must.

How can I protect my electronics during a power outage?

The only surefire way to prevent power surges from affecting your device is to completely remove it from its power source (i.e., unplugging it). Understandably, this measure may not be ideal in most cases. Therefore, making sure that all digital electronics are connected through high-quality surge protectors is the next best defense against an electrical power surge.

What happens when my electronic device is struck by lightning?

The damage sustained from lightning depends on whether the strike is direct or indirect. A direct lightning strike may cause significant structural damage and result in the device catching fire. Indirect lightning strikes occur when the energetic current from a strike point travels through the ground to a nearby device. While not nearly as severe as a direct lightning strike, indirect strikes can cause major damage to devices if that are not connected to a surge protector.

Can dropping my phone damage it?

While it may seem that dropping your iPhone or Android device may not be a big deal, there could be more to the damage than simply a cracked phone screen. The device may have suffered damage to its logic board or other internal components which could lead to data loss.

Can I recover data from a physically damaged hard drive?

If you suspect that your device has been physically damaged, the best option is to have it evaluated by a data recovery professional immediately, as DIY attempts to recover data from the hard drive may lead to worse damage.

How do I avoid physical damage?

Avoid physically damaging your devices by treating them with care, keeping them somewhere safe, and refraining from carrying them around unless absolutely necessary.

How does physical damage affect devices?

One of the most common effects of physical damage to your device is a hard drive head crash. When this occurs, your device's read/write head hits the platter inside the drive, causing damage to the platters and moving the head out of position. If your device has been dropped or physically damaged, be on the lookout for any whirring, clicking or popping noises - this is the sound of the read/write head trying to get back into position but hitting something in the way. The spinning parts in the hard drive can also fail, and if you drop your device, you may find that it isn't recognized when plugged into a laptop or desktop.

What is considered physical damage on phones?

Physical damage to a phone may include a cracked frame, missing keys or buttons, loose screws, a shattered or cracked screen or a discolored screen display.

How do I find old and deleted Veeam backups?

You can find old and deleted Veeam backups in the Veeam backup repository. Here you should pay attention to the settings and configurations of the repository retention.

How does Ontrack recover data from virtual machines stored in Veeam backups?

Our engineers, with 35 years of research, experience, and development in data recovery, have the knowledge and tools to recover your data. Ontrack experts can recover data from Veeam and virtual machines backed up with it, such as from VMware and Hyper-V. All necessary steps are taken to ensure data integrity and recover the data as quickly as possible.

How long does it take to restore Veeam backup data?

As a rule, Veeam VB &R should be able to restore your data without any problems. The duration of the recovery of Veeam backup data depends on the type and size of the backed-up data. This also has an impact on any data recovery. However, Ontrack will take all necessary steps to complete the recovery process as quickly as possible and make the data available to the customer.

Is it possible to repair corrupted incremental Veeam VIB files?

Yes, in many cases damaged Veeam VIB files can be repaired. For this purpose, special tools and techniques will be used at Ontrack.

My Veeam VBK backup files have been damaged (corrupted) due to a ransomware attack. Can Ontrack recover my data?

Ontrack has many years of data recovery expertise and has developed proprietary software to recover data from Veeam backup files. As a result, a significant amount of damaged Veeam jobs can be recovered, even in cases where malware has corrupted files. Our exclusive recovery methods address damaged VBK files and we can recover lost data from any type of storage media.

What are the main causes of Veeam Backup data corruption?

  • Hardware failures
  • Faulty backup-restore operations
  • Faulty incremental files and restore points
  • Cyber attacks
  • CRC errors
  • Faulty tape backups
  • Formatting errors with LTO tape backup backups

What are the options to repair the Veeam data stored in an iSCSI device?

To repair Veeam data in an iSCSI device, it is important to note that very often there could be damage to the underlying storage tier or hardware. A professional data recovery specialist will be happy to help you with a consultation and clarification.

What backup strategy should I choose?

A good backup strategy is the 3-2-1 rule: three copies of your data, two of them on different media and one copy at a different location.

What can I do if the Veeam backup data files have been deleted?

If your Veeam backup data has been deleted, you should immediately contact a data recovery service like Ontrack to check the possibility of data recovery.

Why should I use Ontrack to recover my data on damaged or corrupted backups rather than the manufacturer?

The response time of Ontrack is much more flexible and can be actively influenced by the customer, i.e. choosing standard express or emergency level service. In addition, as a manufacturer-independent problem solver, Ontrack is in a unique position to guarantee a holistic view of the data loss situation, taking advantage of additional solutions that are not available to manufacturers using their own on-board resources. Ontrack is more agile and flexible, often offering a solution where manufacturers cannot get any further.

Can you recover data from VMware Storage Snapshot backups or virtual machines infected by malware?

Many organisations rely on virtual machines in their data centres and implement backups through Veeam software products. Ontrack fully supports the recovery of VMware, vSphere, and Microsoft Hyper-V integrated with the Veeam environment.

Can data be recovered from a water damaged phone?

Severity of water damage must be taken into consideration, however, in most cases, data (including photos, videos, text messages and voicemails) can be recovered from water damaged cell phones.

Can you retrieve data from my water damaged laptop?

The severity of damage must be assessed prior to providing a specific plan of data recovery from any device. However, if the device is presented to Ontrack in time, our engineers can successfully recover data from water damaged laptops.

Is there an additional cost associated with data recovery from my water damaged device?

Data recovery costs vary depending on the severity of each data loss incident. For more information, contact an Ontrack specialist to request a free data recovery quote.

What happens if data is not recoverable from my water damaged device?

If Ontrack is unable to recover data from your water damaged device, you will be charged a return fee to have the unrecoverable media shipped back to you. Should you decide not to have the device shipped back to you, Ontrack can recycle it free of charge.

What kind of support does Ontrack offer while data is being recovered from my device?

While your water damaged device is in the hands of Ontrack's data recovery experts, you will be provided with status updates via your designated customer portal.

What is email data recovery?

The term email data recovery refers to two situations, email restoration and email recovery. Email restoration is the process of accessing email data from a good backup and putting it back into a production email server or exporting for legal or compliance requests. The email database must be intact with no corruption or data loss for email restoration tools to restore the email.Conversely, email recovery involves the reconstruction of email databases and objects when there is data loss or database corruption. Ontrack in lab services uses a suite of proprietary tools and processes to repair databases and recover email data. Ontrack® PowerControls™ for Exchange and Ontrack® Email365 can be used to restore emails from Exchange backups and Office 365.

How do I restore a Microsoft Office 365 mailbox?

Ontrack® PowerControls™ will require the user to have a backup of the Office 365 mailbox to use as a source to perform a restore operation. Connect to the backup using the Source Wizard. Backups can be in .pst or .edb format. For .edb, locate the desired mailbox. If .pst, verify this backup corresponds to the correct mailbox. Use the Wizard to connect to the target Office 365 mailbox. Office 365 will require Active Directory credentials to access the target mailbox. Drag and drop the mailbox/pst from the source to the target mailbox.

How do I restore Microsoft Outlook emails with PowerControls software?

You can drag or copy and paste to restore a mailbox to a target PST root node or folder, or to a Microsoft Exchange Server root node, mailbox, or folder.
  1. In the Source pane, copy a mailbox (for example, User 1).
  2. In the Target pane, paste the mailbox into a folder, mailbox, PST root node, or Microsoft Exchange Server root node.
  3. In the Copy Progress window, verify your results to make sure that your messages from all mailboxes were copied to the target destination.
  4. In the Copy Progress window, click Close to return to the Ontrack PowerControls main window.
  5. All unduplicated messages in a mailbox are restored and their directory structure is preserved. If the mailbox does not exist in the target destination, a folder with its name is created.

How do I retrieve emails from an Exchange Server with the PowerControls software?

Use Ontrack® PowerControls™ to connect to the Exchange Server as a Target.Click Find in Target, and then, in the Target pane, select the folder (for example, mailbox(es), Inbox) you want to search. The selected folder(s) define the scope of the search.In the Search for words box, enter one or more words or phrases if you want to execute a keyword search using Boolean syntax, for example ["dog” AND "cat” AND "mouse”] OR ["rat]. Use the Exclude words box to refine the search.Select where to search using Search In, and select one or more of the following checkboxes: Message Subject, Message Body, Attachment File Name(s), or Attachment Text.Ontrack PowerControls has the ability to search multiple levels of embedded message items. Select Attachment Text in the Select in the checkbox. For Date, select an action performed on the document (such as Received, Sent, or Due) and qualify with dates for After, Before, or both. To preview the message items returned by the search, click the Preview checkbox.Ontrack PowerControls has the ability to further refine the search by applying additional filter criteria to the search results. In the Results area, select the message items you want to export.On the Tools menu in the Find in Exchange Target window, click Export.On the Tools menu, click Export.On the toolbar, click the Export icon. Right-click the mailbox, folder, or public EDB root, and on the shortcut menu, click Export. The Export Mailbox or Export Folder window appears. In the Format box, select PST, MSG, or TXT. In the Export to File or Export to Folder box, do one of the following: If you selected the PST format, enter the name of the resulting PST file. If you are exporting a mailbox, the name of the PST file defaults to the name of the mailbox (which can be modified).If you selected the MSG or TXT format, enter the location of the exported mailbox, folder, or public EDB file. Select the Export Subfolders checkbox if you want to export all of the subfolders for the selected mailbox or folder. Filter by date range if desired. Click Export.

What are email extraction services?

Using proprietary tools, Ontrack technicians can access email databases from tapes, backups, and storage systems and then access specific mailboxes, messages, calendar items, archives, and attachments and provide them in a file, folder or container formats (PST, NSF) as required by the customer.Email extraction is typically used when migrating legacy email to the cloud, to newer email platforms or when email is required for legal and compliance requests. For more information, see the Email Extraction Services page.

How do I extract and restore Microsoft Exchange from tape?

Use Ontrack PowerControls ExtractWizard to select the backup with the target Exchange database file (.edb), usually identified by Exchange Server and date. ExtractWizard supports all major backup formats. Select the .edb and extract to a target location on your network. Launch Ontrack PowerControls for Exchange and select the .edb as the source. Search across the entire .edb or within individual mailboxes, folders, attachments, and calendar items. With the advanced find functions of Ontrack PowerControls, it is easy to search by matching keywords, excluding keywords, dates, senders, subjects, and recipients. Select the items to be restored to the Exchange Server or exported for ediscovery.

How do I recover an email from Microsoft Exchange which is stored on a tape?

You can recover a single email from tape by using Ontrack PowerControls for Microsoft Exchange. To access a single email, you just have to import an existing Exchange database file (.edb) or Personal Storage file (.pst) into the software. By doing so, you now have full access to the emails inside the Exchange or Outlook database file. Then, you can easily find the email required by using the advanced search functions, selecting the item and copying and pasting the email to any location.

How do I restore emails from Microsoft Exchange?

Normally emails are stored deep within your backup software. The complete Microsoft Exchange mailbox server database file (.edb) is embedded within the backup software files. The .edb file contains all the mailboxes and their respective emails.In order to gain access to the emails, you must first restore the backup access the .edb file. Then you have two options:You make a brick-level backup with another physical Microsoft Exchange mailbox server to restore all or single emails.If you prefer an easy and reliable way, you use Ontrack PowerControls.Ontrack PowerControls is a specialised software package which allows you to easily extract the .edb file from its container format with its ExtractWizard and import it into the software. Soon after, you have full access to each and every email from the Microsoft Exchange mailbox server. Since Ontrack PowerControls maintains the integrity of the Exchange source files, it is the perfect tool to search, identify and export relevant data for ediscovery review or for compliance and regulatory requests.

How do I recover a deleted file in SharePoint using PowerControls?

The following instructions show you how to restore files or other individual items to a folder in a target server using Ontrack PowerControls for SharePoint:To restore items
  • In the Source pane or Find in Sources window, copy the item from the item list.
  • In the Target pane, paste the items into a folder or list in the target server.
  • Note: You can also drag an item from the Source pane to the Target pane.
In the Copy Progress window, verify that your items were successfully copied. You can also print or save the copy report by doing one of the following.
  • Click Print to print the copy report.
  • Click Save to save the copy report as a text file.
In the Copy Progress window, click Close to return to the main window.Guidelines for Restoring items
  • You can restore from the items list in the Source panel or the Find in Sources window.
  • Restoring individual items does not preserve the directory structure of the restored items.
  • "Pages” item types may switch their content type when restored; however, metadata is preserved. In this scenario, the content type becomes the default content type for the list. For example, the content type on the source would be "Welcome Page,” but after restoring, the content type would be "Page.”
  • When restoring an item with moderation status (or approval status) of "Pending”, the author and editor are updated to "System Account.”
  • When restoring items to Microsoft Office SharePoint Server 2010 and later, set the Content Approval to No in the Library (or List) Settings > Versioning setting for that particular list to avoid loss of version numbers and moderation status changes. Content Approval can be set to Yes after restoring.
Note: If you copy a site, list, folder, or item from the Source pane and paste it to any target destination, Ontrack PowerControls preserves the directory structure of all restored items.

How do I restore a list in SharePoint?

The following instructions show you how to restore a list to any target destination using Ontrack PowerControls for SharePoint:
  • In the Source pane, copy a list.
  • In the Target pane, paste the list into a site.
  • Note: You can also drag a list in the Source pane to the Target pane.
  • In the Copy Progress window, verify your results to make sure that your lists were copied to the target destination. You can also print or save the copy report by doing one of the following.
    • Click Print to print the copy report.
    • Click Save to save the copy report as a text file.
  • In the Copy Progress window, click Close to return to the main window.
  • Guidelines for Restoring a List
    • When restoring a list that contains a lookup column that includes a field column that references a list that does not exist on the target:
      • For Microsoft Office SharePoint Server 2013, when browsing to the restored list, a "File Not Found” error appears. To correct, manually remove the lookup field reference columns from the restored list.
      • For Microsoft Office SharePoint Server 2016, the lookup field reference column will be empty.
    • Note: When creating or editing a Lookup column, you can include a field column by selecting any of the "additional fields” columns associated with the lookup.
    • Summary links columns do not function correctly after a list is restored if the target does not have the Workflows site collection feature activated. Attempting to edit any restored items displays an XSLT error. To resolve the issue, enable the Workflows site collection feature.
      • Note: Summary Links columns can only be added to Issue Tracking lists.
    • For Microsoft Office SharePoint Server 2013, restored lists may be added to a site's quick links.

How do I restore a SharePoint site with PowerControls?

The following instructions show you how to restore a site to a target destination using Ontrack PowerControls for SharePoint:
  • In the Source pane, copy a site.
  • Paste the site into the desired location of the Target pane.
  • Note: You can also drag a site in the Source pane to the Target pane.
  • If the source site is pasted into the root node of a target, the Select Site Collection URL dialog box appears. Select the web application and site collection URL and enter the primary site collection administrator information to copy the site by doing the following:
  • In the Select a Web Application drop-down list, select the web application to be used as the target server.
  • In URL, view the web application URL label. This is the base URL where the new site collection will be located
  • In the Managed Path drop-down list, select the managed paths that reside in the target server for the selected Web Application. The contents of this list changes based on the Web Application selected. If you want to have a specific URL other than "/site/” for a site collection, you need to select a managed path.
  • If you select a managed path with Explicit Inclusion, a single Microsoft Office SharePoint Server site can be created for the given URL, so nothing more is required. If you select a managed path with Explicit Inclusion, the Site Name field will be disabled.
  • Note: This option may not be available if a site has already been created for
  • the given path.
  • Example: http://servername:portnumber/Sales
  • If you select a managed path with Wildcard Inclusion, you can create further site collections under the specified managed path. The Site Name field is enabled, and you can create the site name which is appended on the path URL. In this case you must specify a Site Name for the new site collection.
  • Example: http://servername:portnumber/Manufacturing/Group1 and http://servername:portnumber/Manufacturing/Group 2.
  • If the Site Name box is enabled, enter a site name for additional website addresses.
  • Note: The following characters cannot be used in the site name: " # % & * : < > ? /{ } ~. The site name also cannot start with an underscore character "_".
  • In the Authentication Mode drop-down list, select Windows Authentication or Forms Authentication.
  • In the Primary Site Collection Administrator box, enter the following depending on the mode of authentication you are using:
  • If you are using Windows Authentication, enter the domain and username of the user that will be the primary site collection administrator. This username must be in the DomainUsername format. Ontrack PowerControls will use this username to connect to the new site collection after it has been created.
  • If you are using Forms Authentication, enter the username of the user that will be the primary site collection administrator. Ontrack PowerControls will use this username to connect to the new site collection after it has been created.
  • In the Password: box, enter the password for the primary site collection administrator.
  • The username and password are validated for the primary site collection administrator, so the site collection will not be created until the correct password is supplied for the site collection administration.
  • Click OK. The source site is copied into the target site.
  • In the Copy Progress window, verify your results to ensure that your sites were copied to the target destination. You can also print or save the copy report by doing one of the following. Click Print to print the copy report.Click Save to save the copy report as a text file.
  • In the Copy Progress window, click Close to return to the main window.
  • Guidelines for Restoring a Site
    • Site Quotas for parent-level sites will not be restored.
    • For site and list permissions, if a matching group exists on the target, the site or list will use the target group's permission levels and users associated with that group. If the target group has different users or permissions levels than the source, the site or list will now use the target's permissions.
    • Quick Links for sites that contain a Pages List (Publishing Site, Personalization Site, etc.) may appear differently after restoring a site. Once a page type document (Page, Article Page, Master Page, etc.) is checked into a pages site, a Quick Link is added. Since
    • Ontrack PowerControls does not restore the checked-out state, items are assumed to be checked in. Therefore, additional Quick Links may appear after the site has been restored.
    • When restoring a site collection from Microsoft Office SharePoint 2007 to Microsoft Office SharePoint 2013 with the 2010 Experience, the following site collections are blocked:
    • Enterprise
      • Records Center
      • Site Directory
      • Report Center
      • Search Center with Tabs
      • My Site Host
    • Publishing
      • Collaboration Portal
      • Publishing Portal
    • When restoring a site with unique master page from Microsoft Office SharePoint 2007 to Microsoft Office SharePoint 2013 with the 2010 Experience, the default look and feel is applied. To restore the original master page look and feel, add the master page to the
    • Master Page Gallery list and change the master page in Site Settings.
    • Note: The master page should be prepared for Microsoft Office SharePoint Server 2013.
    • Also, all files referenced in the master page file must exist on the target.
  • Restoring sites to a Microsoft Office SharePoint Server 2013 or later target may produce duplicate "Site Contents” links in the site's "Current Navigation” pane.

How do I restore folders in SharePoint?

The following instructions show you how to restore a folder to any target destination using Ontrack PowerControls for SharePoint:
  • To restore a folder
  • 1. In the Source pane, copy a folder.
  • 2. In the Target pane, paste the folder into a folder or list.
  • Note: You can also drag a folder from the Source pane to the Target pane.
  • 3. In the Copy Progress window, verify your results to make sure your items from all folders were copied to the target destination. You can also print or save the copy report by doing one of the following.
    • Click Print to print the copy report.
    • Click Save to save the copy report as a text file.
  • 4. In the Copy Progress window, click Close to return to the main window.
  • Guidelines for Restoring a Folder
    • Folders may not have their created and/or modified date preserved when restored.
    • The moderation status (or approval status) of a folder is not retained. The status of a folder that has been restored is always "Approved.”

Is Ransom Encrypted data lost?

Ransomware encrypted data is not always lost. Ontrack has a wealth of self-developed tools and work processes to recover data affected by cyber-attacks from corporate IT infrastructures without paying a ransom.

Can Ontrack recover from a server infected with ransomware?

Ontrack's investment in the development of specialized software allows us to recover data from ransomware-encrypted systems, virtual machines, backup files, tapes, and other storage media.Ransomware incidents vary on the type of payload, and data recovery can be complex. Ontrack provides the best possible solutions for data recovery success.

Our virtual machine is infected with ransomware. Can Ontrack help?

Ontrack has invested in the continued development of proprietary software to recover data from ransomware-infected storage systems, virtual machines, backup files, tapes, and other storage media.Ransomware incidents vary on the type of payload, and data recovery can be complex. Ontrack provides the best possible solutions for data recovery success.

How are ransomware attacks performed?

The extension hardly distinguishes itself from the other malicious programs: for example, manipulated websites, a link from a spam email or an existing message about a social network and embedding them in a system. In many cases, the perpetrators send standard looking emails that contain about delivery or collection debt. In truth, the attached file does not contain any relevant information, except the damage code. From there the attackers start their work. The Lockheed Martin Cyber Kill Chain® framework illustrates what the adversaries must complete to achieve their objective. MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

How does ransomware spread, and do you get infected by ransomware?

(Spear) Phishing mail The most common delivery system for ransomware is a phishing email that includes an attachment or a link. For individual machines when the user opens the attachment or clicks the link, the ransomware runs a program that locks the system, and displays a demand for payment. When this happens, the only way to decrypt the data is through a mathematical key only known by the attacker. There have also been cases where malware will display a message claiming that the user's 'Windows' is locked. The user is then encouraged to call a "Microsoft" phone number and enter a six-digit code to reactivate the system. The message alleges that the phone call is free, but this is not true. While on the phone calling the fake 'Microsoft', the user racks up long-distance call charges. Infected Webpages and Malvertising/Adware Infected URLs are commonly used to distribute ransomware. Clicking on one of these links, whether through an email or an unverified website, can automatically trigger a ransomware download to your hard drive, also known as a “drive-by download.” Just visiting the site without even downloading anything can lead to a ransomware attack. Remote access points (RDP) Ann increasing number of attacks are gaining access to a company that has open and exposed remote access points, such as RDP and virtual network computing (VNC). RDP credentials can be brute-forced, obtained from password leaks, or simply purchased in underground markets. Where past ransomware criminals would set up a command and control environment for the ransomware and decryption keys, most criminals now approach victims with ransom notes that include an anonymous email service address, allowing bad actors to remain better hidden. For more sophisticated attacks this is just the start of a series of events as described in the Lockheed Martin Cyber Kill Chain® framework and MITRE ATT&CK® knowledge base.

How does ransomware work?

Ransomware is malware that blocks the operating system or entire server or encrypts existing data. The perpetrators are squeezing their victims by making clear that the data has only been released and made available after a ransom payment. Other ransomware variants focus on wiping or Data-Stealing exfiltration.

How much does ransomware cost an organization?

There is a big difference between an opportunistic ransomware- attack and a targeted attack. An opportunistic attack attempts to infect a significant number of victims and usually a few hundred or a few thousand is demanded. The amount is deliberately low so that paying ransom is the fastest and cheapest option to get back to normal with your IT systems. In the case of a targeted, carefully prepared attack by malicious parties, the ransom can run as high as millions. (NCSC)

What does ransomware mean?

The word ransom comes from English and means 'a sum of money demanded or paid for the release of a captive' and ransomware is therefore also called extortion software. In many cases, experts also speak of encryption trojans, since the extortion is based on the fact that the data is inextricably coded and inaccessible to the user. Ransomware fights itself into the system and the user usually notices in shock and contagious panic that its system is no longer accessible. Over time new tactics emerged combines data encryption with data theft (double extortion) and adding performing a distributed denial-of-service (DDoS) attack (triple extortion). Other variants are Locker ransomware that just locks the computer without encryption or Wiper with objective to permanently destroy access to data.

What is ransomware?

Ransomware is a type of malware that encrypts or otherwise locks users out of their files. When users try to access their data, they receive a notice demanding the payment of a ransom to regain its use. Around since the 1980s, the last decade has seen various ransomware trojans crop up, but the real opportunity for attackers has ramped up since the introduction of Bitcoin. This cryptocurrency allows attackers to collect money from their victims without going through traditional channels.

Who's behind the ransomware cash claim?

Those who stand behind ransomware attacks are usually very scammers with experience in computer programming. Often, ransomware infects your computer via an email attachment, a network, or an infected website. The threat actors range from highly organized cybercriminal groups, sometimes Nation-state actors to individuals using increasingly available easy to use hacking tools.

Should We Pay Ransom?

The short answer is never pay the ransom, but the longer answer is much more complicated. Apart from keeping the cybercrime ecosystem alive. There are cases of victims paying the ransom demanded and not receiving their data back in return. Rather than running this risk, companies should exhaust all other options. Do not forget to check with data recovery experts who may be able to regain access to data by, for example, reverse-engineering the malware.

What can be done to protect backups from ransomware attacks?

Ontrack advises that organisations: Implement a backup and recovery plan for all critical data using the 3-2-1-1-0 strategy: 3 - Retain a minimum of three copies of data, 2 - Store data on two different types of media, 1 - Secure one copy of your backups off-site, 1 - Store at least 1 of the copies offline (air gap), 0 : Be sure to have verified backups without errors. Test backups regularly to ensure proper configuration, which will limit the impact of a data breach and accelerate the recovery process. Implement copy-on-write file systems (NetApp WAFL - Linux ZFS) or WORM features in NAS systems or appliances. Patch critical operating systems and antivirus, security, and backup software as soon as possible. Establish ongoing cyber security training for users and admins to identify phishing emails.

Experiences that matter

Ontrack has extensive experience with all types of data loss scenarios. Our goal is to provide our customers with peace of mind in the event of data loss due to hardware failure, human error, natural disasters or cyberattacks.

40

Years

In the business

1

Million+

Customers and growing

120

Petabytes+

Of recovered data

73,661,023,683

Of data files recovered over the last twenty years... and more and more every day!

Start your data recovery now with a free consultation.

Contact our team of experts.

KLDiscovery Ontrack Limited, Nexus, 25 Farringdon Street, London, EC4A 4AB, United Kingdom (see all locations)