Loch Mars Mac OS

-->

You can use the Azure Backup service to back up on-premises machines and apps and to back up Azure virtual machines (VMs). This article summarizes support settings and limitations when you use the Microsoft Azure Recovery Services (MARS) agent to back up machines.

Mars Space Flight Facility, Arizona State University Mailing Address: PO Box 876305, Moeur Building Rm 131, Tempe, AZ Shipping Address: 201 E. Orange Mall, Tempe, AZ 85287 link to map. MarsEdit is a desktop blog editing application for the Mac. It provides an interface to most popular blogging systems. WordPress, Tumblr, Movable Type, and many other systems are supported.

The MARS agent

Azure Backup uses the MARS agent to back up data from on-premises machines and Azure VMs to a backup Recovery Services vault in Azure. The MARS agent can:

  • Run on on-premises Windows machines so that they can back up directly to a backup Recovery Services vault in Azure.
  • Run on Windows VMs so that they can back up directly to a vault.
  • Run on Microsoft Azure Backup Server (MABS) or a System Center Data Protection Manager (DPM) server. In this scenario, machines and workloads back up to MABS or to the DPM server. The MARS agent then backs up this server to a vault in Azure.

Note

Azure Backup doesn't support automatic adjustment of clock for daylight savings time (DST). Modify the policy to ensure daylight savings is taken into account to prevent discrepancy between the actual time and scheduled backup time.

Your backup options depend on where the agent is installed. For more information, see Azure Backup architecture using the MARS agent. For information about MABS and DPM backup architecture, see Back up to DPM or MABS. Also see requirements for the backup architecture.

InstallationDetails
Download the latest MARS agentYou can download the latest version of the agent from the vault, or download it directly.
Install directly on a machineYou can install the MARS agent directly on an on-premises Windows server or on a Windows VM that's running any of the supported operating systems.
Install on a backup serverWhen you set up DPM or MABS to back up to Azure, you download and install the MARS agent on the server. You can install the agent on supported operating systems in the backup server support matrix.

Note

By default, Azure VMs that are enabled for backup have an Azure Backup extension installation. This extension backs up the entire VM. You can install and run the MARS agent on an Azure VM alongside the extension if you want to back up specific folders and files, rather than the complete VM.When you run the MARS agent on an Azure VM, it backs up files or folders that are in temporary storage on the VM. Backups fail if the files or folders are removed from the temporary storage or if the temporary storage is removed.

Cache folder support

When you use the MARS agent to back up data, the agent takes a snapshot of the data and stores it in a local cache folder before it sends the data to Azure. The cache (scratch) folder has several requirements:

CacheDetails
SizeFree space in the cache folder should be at least 5 to 10 percent of the overall size of your backup data.
LocationThe cache folder must be locally stored on the machine that's being backed up, and it must be online. The cache folder shouldn't be on a network share, on removable media, or on an offline volume.
FolderThe cache folder shouldn't be encrypted on a deduplicated volume or in a folder that's compressed, that's sparse, or that has a reparse point.
Location changesYou can change the cache location by stopping the backup engine (net stop bengine) and copying the cache folder to a new drive. (Ensure the new drive has sufficient space.) Then update two registry entries under HKLMSOFTWAREMicrosoftWindows Azure Backup (Config/ScratchLocation and Config/CloudBackupProvider/ScratchLocation) to the new location and restart the engine.

Networking and access support

URL and IP access

The MARS agent needs access to these URLs:

  • http://www.msftncsi.com/ncsi.txt
  • *.Microsoft.com
  • *.WindowsAzure.com
  • *.MicrosoftOnline.com
  • *.Windows.net
  • www.msftconnecttest.com

And to these IP addresses:

  • 20.190.128.0/18
  • 40.126.0.0/18

Access to all of the URLs and IP addresses listed above uses the HTTPS protocol on port 443.

When backing up files and folders from Azure VMs using the MARS Agent, the Azure virtual network also needs to be configured to allow access. If you use Network Security Groups (NSG), use the AzureBackup service tag to allow outbound access to Azure Backup. In addition to the Azure Backup tag, you also need to allow connectivity for authentication and data transfer by creating similar NSG rules for Azure AD (AzureActiveDirectory) and Azure Storage(Storage). The following steps describe the process to create a rule for the Azure Backup tag:

  1. In All Services, go to Network security groups and select the network security group.
  2. Select Outbound security rules under Settings.
  3. Select Add. Enter all the required details for creating a new rule as described in security rule settings. Ensure the option Destination is set to Service Tag and Destination service tag is set to AzureBackup.
  4. Select Add to save the newly created outbound security rule.

You can similarly create NSG outbound security rules for Azure Storage and Azure AD. For more information on service tags, see this article.

Azure ExpressRoute support

You can back up your data over Azure ExpressRoute with public peering (available for old circuits) and Microsoft peering. Backup over private peering isn't supported.

With public peering: Ensure access to the following domains/addresses:

  • URLs
    • www.msftncsi.com
    • *.Microsoft.com
    • *.WindowsAzure.com
    • *.microsoftonline.com
    • *.windows.net
    • www.msftconnecttest.com
  • IP addresses
    • 20.190.128.0/18
    • 40.126.0.0/18

With Microsoft peering, select the following services/regions and relevant community values:

  • Azure Backup (according to the location of your Recovery Services vault)
  • Azure Active Directory (12076:5060)
  • Azure Storage (according to the location of your Recovery Services vault)

For more information, see the ExpressRoute routing requirements.

Note

Public Peering is deprecated for new circuits.

Private Endpoint support

You can now use Private Endpoints to back up your data securely from servers to your Recovery Services vault. Since Azure Active Directory doesn't currently support private endpoints, IPs and FQDNs required for Azure Active Directory will need to be allowed outbound access separately.

When you use the MARS Agent to back up your on-premises resources, make sure your on-premises network (containing your resources to be backed up) is peered with the Azure VNet that contains a private endpoint for the vault. You can then continue to install the MARS agent and configure backup. However, you must ensure all communication for backup happens through the peered network only.

If you remove private endpoints for the vault after a MARS agent has been registered to it, you'll need to re-register the container with the vault. You don't need to stop protection for them.

Read more about private endpoints for Azure Backup.

Throttling support

FeatureDetails
Bandwidth controlSupported. In the MARS agent, use Change Properties to adjust bandwidth.
Network throttlingNot available for backed-up machines that run Windows Server 2008 R2, Windows Server 2008 SP2, or Windows 7.

Supported operating systems

Note

The MARS agent does not support Windows Server Core SKUs.

You can use the MARS agent to back up directly to Azure on the operating systems listed below that run on:

  1. On-premises Windows Servers
  2. Azure VMs running Windows

The operating systems must be 64 bit and should be running the latest services packs and updates. The following table summarizes these operating systems:

Operating systemFiles/foldersSystem stateSoftware/Module requirements
Windows 10 (Enterprise, Pro, Home)YesNoCheck the corresponding server version for software/module requirements
Windows 8.1 (Enterprise, Pro)YesNoCheck the corresponding server version for software/module requirements
Windows 8 (Enterprise, Pro)YesNoCheck the corresponding server version for software/module requirements
Windows Server 2016 (Standard, Datacenter, Essentials)YesYes- .NET 4.5
- Windows PowerShell
- Latest Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0
Windows Server 2012 R2 (Standard, Datacenter, Foundation, Essentials)YesYes- .NET 4.5
- Windows PowerShell
- Latest Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0
Windows Server 2012 (Standard, Datacenter, Foundation)YesYes- .NET 4.5
-Windows PowerShell
- Latest Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0
- Deployment Image Servicing and Management (DISM.exe)
Windows Storage Server 2016/2012 R2/2012 (Standard, Workgroup)YesNo- .NET 4.5
- Windows PowerShell
- Latest Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0
Windows Server 2019 (Standard, Datacenter, Essentials)YesYes- .NET 4.5
- Windows PowerShell
- Latest Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0

For more information, see Supported MABS and DPM operating systems.

Operating Systems at end of support

The following operating systems are at the end of support and it's strongly recommended to upgrade the operating system to continue to stay protected.

If existing commitments prevent upgrading the operating system, consider migrating the Windows servers to Azure VMs and leverage Azure VM backups to continue staying protected. Visit the migration page here for more information about migrating your Windows server.

For on-premises or hosted environments, where you can't upgrade the operating system or migrate to Azure, activate Extended Security Updates for the machines to continue staying protected and supported. Notice that only specific editions are eligible for Extended Security Updates. Visit the FAQ page to learn more.

Operating systemFiles/foldersSystem stateSoftware/Module requirements
Windows 7 (Ultimate, Enterprise, Pro, Home Premium/Basic, Starter)YesNoCheck the corresponding server version for software/module requirements
Windows Server 2008 R2 (Standard, Enterprise, Datacenter, Foundation)YesYes- .NET 3.5, .NET 4.5
- Windows PowerShell
- Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0
- Deployment Image Servicing and Management (DISM.exe)
Windows Server 2008 SP2 (Standard, Datacenter, Foundation)YesNo- .NET 3.5, .NET 4.5
- Windows PowerShell
- Compatible Microsoft VC++ Redistributable
- Microsoft Management Console (MMC) 3.0
- Deployment Image Servicing and Management (DISM.exe)
- Virtual Server 2005 base + KB KB948515

Backup limits

Size limits

Azure Backup limits the size of a file or folder data source that can be backed up. The items that you back up from a single volume can't exceed the sizes summarized in this table:

Operating systemSize limit
Windows Server 2012 or later54,400 GB
Windows Server 2008 R2 SP11,700 GB
Windows Server 2008 SP21,700 GB
Windows 8 or later54,400 GB
Windows 71,700 GB

Minimum retention limits

The following are the minimum retention durations that can be set for the different recovery points:

Recovery pointDuration
Daily recovery point7 days
Weekly recovery point4 weeks
Monthly recovery point3 months
Yearly recovery point1 year

Other limitations

  • MARS doesn't support protection of multiple machines with the same name to a single vault.

Supported file types for backup

TypeSupport
Encrypted*Supported.
CompressedSupported.
SparseSupported.
Compressed and sparseSupported.
Hard linksNot supported. Skipped.
Reparse pointNot supported. Skipped.
Encrypted and sparseNot supported. Skipped.
Compressed streamNot supported. Skipped.
Sparse streamNot supported. Skipped.
OneDrive (synced files are sparse streams)Not supported.
Folders with DFS Replication enabledNot supported.

* Ensure that the MARS agent has access to the required certificates to access the encrypted files. Inaccessible files will be skipped.

Supported drives or volumes for backup

Drive/volumeSupportDetails
Read-only volumesNot supportedVolume Copy Shadow Service (VSS) works only if the volume is writable.
Offline volumesNot supportedVSS works only if the volume is online.
Network shareNot supportedThe volume must be local on the server.
BitLocker-locked volumesNot supportedThe volume must be unlocked before the backup starts.
File system identificationNot supportedOnly NTFS is supported.
Removable mediaNot supportedAll backup item sources must have a fixed status.
Deduplicated drivesSupportedAzure Backup converts deduplicated data to normal data. It optimizes, encrypts, stores, and sends the data to the vault.

Loch Mars Mac Os Catalina

Support for initial offline backup

Azure Backup supports offline seeding to transfer initial backup data to Azure by using disks. This support is helpful if your initial backup is likely to be in the size range of terabytes (TBs). Offline backup is supported for:

  • Direct backup of files and folders on on-premises machines that are running the MARS agent.
  • Backup of workloads and files from a DPM server or MABS.

Offline backup can't be used for system state files.

Support for data restoration

By using the Instant Restore feature of Azure Backup, you can restore data before it's copied to the vault. The machine you're backing up must be running .NET Framework 4.5.2 or higher.

Backups can't be restored to a target machine that's running an earlier version of the operating system. For example, a backup taken from a computer that's running Windows 7 can be restored on Windows 8 or later. But a backup taken from a computer that's running Windows 8 can't be restored on a computer that's running Windows 7.

Previous MARS agent versions

The following table lists the previous versions of the agent with their download links. We recommend you to upgrade the agent version to the latest, so you can leverage the latest features and optimal performance.

VersionsKB Articles
2.0.9145.0Not available
2.0.9151.0Not available
2.0.9153.0Not available
2.0.9162.0Not available
2.0.9169.04515971
2.0.9170.0Not available
2.0.9173.04538314
2.0.9177.0Not available
2.0.9181.0Not available
2.0.9190.04575948
2.0.9195.04582474
2.0.9197.04589598
2.0.9207.05001305

Note

MARS agent versions with minor reliability and performance improvements don't have a KB article.

Next steps

  • Learn more about backup architecture that uses the MARS agent.
  • Learn what's supported when you run the MARS agent on MABS or a DPM server.
Mars

There are a number of different ways to lock or sleep your screen in macOS. Before we show them to you, however, it’s important to make the distinction between locking your screen and just putting it to sleep.

If you lock your Mac you’ll put it to sleep and need to type in your login password on your Mac’s lock screen (or unlock it with TouchID on a MacBook Pro with Touch Bar, or with an Apple Watch). If you put it to sleep, you won’t necessarily lock it. In order to lock your screen, you need to set up the password in System Preferences. Here’s how to do that.

How to set up a password to lock the screen

  1. Launch System Preferences either by clicking on its icon in the Dock or by choosing it from the Apple menu.
  2. Click on the Security & Privacy pane.
  3. Choose the General tab and check the option that starts ‘Require password…’
  4. Choose an option from the dropdown menu.

Now, whenever your Mac goes to sleep or a screensaver starts, it will lock and you’ll have to authenticate with your user password, Apple Watch or TouchID to gain access.

Worried about your Mac’s security in public places? Get Beepify, a Setapp app that protects your Mac from theft.

Download Beepify Free

How to lock your Mac

If you have a MacBook, a MacBook Air or a MacBook Pro, the quickest and easiest way to lock your Mac is just to shut the lid. When you do that, the Mac goes to sleep and when you open it again you’ll need to unlock it.

However, there are occasions when you’ll want to prevent anyone from seeing the screen without actually closing it. And, in any case, if you have an iMac, Mac mini or Mac Pro, it’s not an option. Here are some other ways you can lock your Mac’s display.

1. Use Apple menu

Go to the Apple menu and choose Sleep. This will display the login screen for your account and won’t unlock with a password (unless you’re wearing an Apple Watch when you do it and then it will lock and unlock immediately)

Loch Mars Mac Os Download

Tip: If you want your Mac to remain locked even when you’re close by and you have an Apple Watch, go to System Preferences>Security & Privacy>General and uncheck the Allow your Apple Watch to unlock your Mac option.

2. Use shortcuts

If you’re using a Mac that’s running macOS Catalina, go to the Apple menu and choose Lock Screen or press Command+Control+Q. This will lock your Mac and return you to the Login screen.

For older versions of the operating system, press Control+Shift+Power button (or Control+Shift+Eject if your Mac has an optical drive). It will lock the screen.

You can also use a keyboard shortcut to put your Mac to sleep. Press Command+Option+Power (or Eject). This works in a similar way to the previous one, but rather than just lock your Mac it powers down the hard drive, puts the CPU into low power mode and stops background tasks in order to save energy.

3. Set up a hot corner

Hot corners allow you to drag to the mouse pointer to one of the four corners of the screen to initiate an action – you can use one as a sleep shortcut on your Mac. To set it up:

  1. Launch System Preferences.
  2. Choose the Desktop & Screen Saver pane.
  3. Click the Hot Corners button at the bottom right of the window.
  4. In the drop down window, choose a corner.
  5. Click on the menu and choose either Start Screen Saver or Put Display to Sleep.

4. Use fast user switching

Fast user switching allows you to quickly log into another user account on your Mac. But you can also use it to return to the log in window, which locks your Mac. Got to System Preferences>Users & Groups and click the padlock, then type in your password. Click Login Options and check the box next to ‘Show fast user switch menu as.’ You can also choose whether to show the menu as your full name, the account name or an icon.

To lock your Mac, click the fast user switching menu at the right of the menu bar and choose Login Window…

5. Add Keychain Access to the menu bar

This option was removed in macOS Mojave but works on versions before High Sierra:

  1. Go to Finder.
  2. Choose Applications > Utilities.
  3. Launch Keychain Access.
  4. Click in the Keychain Access menu and select Preferences.
  5. Check the box next to Show keychain status in menu bar.
  6. You’ll see a lock in the Finder menu bar. Click it and choose Lock Screen to lock your Mac.

Other ways to protect your privacy

First of all, fet a Finder-like Terminal for Mac that will help you completely control the login settings. It’s called MacPilot. The app covers over 1,200 hidden macOS features. For privacy, you can go into the Login tab and customize access by users, enable the option of automatic screen locking, and edit launch items.

If you’re looking for physical protection of your Mac, Beepify is the app you need. Whenever you have to step away from the computer in a public place, activate Beepify and it will be set to produce a loud sound in case someone tries to close the screen or disconnect charger.

One of the main reasons for locking your Mac when you step away from it is to stop prying eyes accessing your files, browser history, or anything else you don’t want them to see. CleanMyMac X has a tool that gives you even more privacy protection.

CleanMyMac’s Privacy tool allows you to quickly delete your browser history in Chrome, Firefox, and Safari. But it also allows you to delete message threads and attachments in Messages, and to remove entries from macOS’ recent files lists.

Also, CleanMyMac’s Shredder is a quick and easy way to securely delete sensitive data. You can download CleanMyMac for free and give it a try.

As you can see, putting your Mac to sleep or locking it is very easy. There are lots of different ways to do it, although some are dependent on the version of macOS you’re using. If you regularly lock your Mac to prevent others accessing it, you should ensure your login password is strong and secure.

Loch Mars Mac Os 11

Finally, if privacy is important, CleanMyMac has a couple of tools that can help delete sensitive data.