When backups are enabled an encryption key is generated on the email server and each night a backup is performed by encrypting the email server content and uploading it to the Helm backup servers. During the backup process the email server will determine what changes have occurred since the last time a backup was performed and only the changes are uploaded.
Since Helm has no access to the key that was used to encrypt the backups it's critical to store the encryption key in a safe location. Access to the encryption key will be required to restore from the backup.
Comments
0 comments
Please sign in to leave a comment.