LATechNet Managed Endpoint Backup Procedure - Rev v2025.1

LATechNet Managed Backup is a fully managed service that secures your endpoint data with encrypted cloud snapshots, proactive monitoring, regular test restores, detailed audit logging, quarterly reviews, and annual disaster-recovery drills.

Backup Configuration (How we set it up)

1. Configure Backup Settings

  • Action: We sign in to the LATechNet Managed Backup dashboard for each contracted endpoint.

  • How We Do It: In the “Backup” section, we select Cloud as the destination and schedule the job to run daily at 5:00 PM (local device time). We also exclude removable drives so only the main system volumes and critical data are backed up.

  • Verification: We double-check that encryption is enabled and confirm our retention rules match the insurance requirements.

2. Define Retention Rules

  • Action: We establish how long each backup copy is kept.

  • How We Do It:

    • Daily backups are retained for 7 days.

    • Weekly backups are retained for 6 weeks.

    • Monthly backups continue until the 6-month limit is reached.

  • Verification: The dashboard’s retention summary shows the correct schedules and counts.

3. Apply Bandwidth Throttling

  • Action: We limit network usage so backups don’t slow day-to-day operations.

  • How We Do It: We set each device to 25 Mbps maximum throughput at all times.

    • Work hours: 7:00 AM–5:00 PM, Monday through Friday

    • Non-work hours: same 25 Mbps cap to maintain consistency

  • Verification: We confirm the throttling settings are applied per device and review any network-use alerts.

4. Monitor Backup Jobs

  • Action: We watch each backup run and immediately address any problems.

  • How We Do It: Every morning, we review the jobs dashboard for failed or missed backups and for any jobs that ran longer than expected.

  • Verification: Failed or stalled jobs trigger an alert email; we investigate until the issue is resolved.

5. Verify Backup Integrity

  • Action: We ensure backups remain reliable and restorable.

  • How We Do It: Once per month, we perform a test restore of a sample endpoint to an isolated machine. We check that files open correctly and that applications function as before.

  • Verification: We record each test’s outcome—date, endpoint name, and any discrepancies—in our internal log.

6. Cloud Backup Verification and Testing

  • Action: We confirm cloud backups are accessible and meet our recovery time objectives (RTO).

  • How We Do It: We restore data from the cloud into a virtual test environment, measuring how long it takes and checking data integrity.

  • Verification: We compare actual recovery times against our RTO targets and document results.


Restore Procedure (How We Perform It)

1. Initiate Restore Process

  • Action: We begin recovery when data must be returned.

  • How We Do It: In the LATechNet portal’s “Restore” section, we select the affected device and choose the backup date.

  • Verification: We verify the date and time of the backup before proceeding.

2. Select Backup Source

  • Action: We pick the exact backup set needed.

  • How We Do It: We browse the backup history—choosing either a specific day’s full system image or a point-in-time file set.

  • Verification: We confirm the correct backup source appears in the restore job summary.

3. Choose Restore Location

  • Action: We decide where to put the recovered data.

  • How We Do It: Options include:

    1. Original location (overwriting existing files)

    2. Alternate folder or test machine (for validation)

    3. Full image to a clean endpoint (for total system rebuild)

  • Verification: We review the target path or device name before starting.

4. Initiate Restore Job

  • Action: We launch the restoration.

  • How We Do It: Clicking “Start Restore” triggers the job; we monitor its progress on the dashboard.

  • Verification: We watch for any errors and confirm the job completes successfully.

5. Verify Restored Data

  • Action: We confirm data integrity and system functionality.

  • How We Do It: We open representative files, launch key applications, and check system settings and user profiles.

  • Verification: If everything matches the original environment, we mark the restore as verified.

6. Document Restore Completion

  • Action: We log the details for compliance and auditing.

  • How We Do It: We record:

    • Device name or ID

    • Backup date/version

    • Restore start and end times

    • Verification notes

  • Verification: The completed log entry is stored in our secure records, ready for any insurance or regulatory review.


Additional Considerations

  • Security & Compliance: Every backup is encrypted in transit and at rest, meeting industry and insurance-carrier standards.

  • Notifications & Reporting: Automated alerts notify our team of any backup or restore issues, and regular reports keep stakeholders informed.

  • Quarterly Reviews: We revisit and update these procedures every quarter to align with changing requirements or best practices.

  • Disaster Recovery Drills: Alongside routine tests, we conduct full DR exercises annually to ensure end-to-end readiness.


Managed Backup Policy Summary

Activity Frequency Time/Window Notes
Full System Backups Daily 5:00 PM (local device time) Cloud destination; excludes removable drives
Retention Pruning Daily, Weekly, Monthly N/A Daily kept 7 days; weekly for 6 weeks; monthly until 6 months
Bandwidth Throttling Review Continuous 7 AM–5 PM & off-hours (25 Mbps) Per-device cap; ensures consistent network performance
Backup Job Monitoring Daily First business hour Alerts on failures, misses, or long-running jobs
Integrity Test Restores Monthly Scheduled during off-peak Test restore to isolated machine; document findings
Cloud Recovery Tests Monthly Scheduled during off-peak Measure RTO and data integrity via cloud test restores
Procedure & Policy Review Quarterly First week of quarter Update schedules, retention rules, and security settings
Full Disaster Recovery Drill Annually As scheduled with stakeholders Simulate end-to-end recovery in a controlled environment