{"id":5314,"date":"2020-07-07T21:13:48","date_gmt":"2020-07-07T20:13:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5314"},"modified":"2021-07-13T13:18:10","modified_gmt":"2021-07-13T12:18:10","slug":"backup-monitoring-part-4-tracking-and-controlling-usage","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage","title":{"rendered":"Backup Monitoring, Part 4\u2014Tracking and Controlling Usage"},"content":{"rendered":"<p>One of the most common reasons to monitor devices is to track and control usage. Below I use monitoring and adjustments to backup selection as two methods to potentially control costs, reduce processing times, and shrink backup windows\u2014all while still maintaining data protection for compliance and disaster recovery purposes.<\/p>\n<h3>Tracking fair use policies<\/h3>\n<p>The SolarWinds<sup>\u00ae<\/sup>\u00a0Backup\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/legal\/backup-fair-use-policy\" target=\"_blank\" rel=\"noopener\">Fair Use Policy<\/a>\u00a0outlines the typical fair use limits for an account. The fair use limits for your account could differ, so please consult with your account team if you need clarification. Regardless, let\u2019s assume you want advanced notice that a device is close to or has exceeded a selected size fair use policy. To see this in the\u00a0<a class=\"ext\" href=\"https:\/\/backup.management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Backup Management console<\/a>\u00a0you can create new\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/views.htm?Highlight=saved%20views\" target=\"_blank\" rel=\"noopener noreferrer\">dashboard views<\/a>\u00a0using variations of the\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/advanced-filter-expressions-legacy.htm\" target=\"_blank\" rel=\"noopener noreferrer\">advanced search filters expressions<\/a>\u00a0found below. You can also set up periodic email alerts by setting up daily or weekly\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/emails.htm?Highlight=email%20views\" target=\"_blank\" rel=\"noopener noreferrer\">scheduled email<\/a>\u00a0views to be delivered only when devices meet or exceed the defined criteria.<\/p>\n<table width=\"100%\" cellspacing=\"5\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td valign=\"top\"><b>Expression<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Description<\/b><\/td>\n<\/tr>\n<tr>\n<td>T3 &gt; 500.gibi() AND OT == 2<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">Total selected size greater than 500 GB AND OS type equals server (i.e., servers over fair use policy)<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\">T3 &lt;= 500.gibi() AND OT == 2<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">Total selected size less or equal to 500 GB AND OS type equals server (i.e., servers under fair use policy)<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">T3 &gt; 100.gibi() AND OT == 1 AND OP != &#8220;Documents&#8221;<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">Selected size is greater than 100 GB with a workstation OS and a non-documents profile (i.e. workstations over fair use policy)<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\">T3 &lt;= 100.gibi() AND OT == 1 AND OP != &#8220;Documents&#8221;<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">Selected size is less than 100 GB with a workstation OS and a non-documents profile (i.e. workstations over fair use policy)<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\">(T3 &gt; 500.gibi() AND OT == 2) OR (T3 &gt; 100.gibi() AND OT == 1 AND OP != &#8220;Documents&#8221;)<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">Combined servers or workstations under fair use policy<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\">(T3 &lt;= 100.gibi() AND OT == 1 AND OP != &#8220;Documents&#8221;) OR (T3 &lt;= 500.gibi() AND OT == 2)<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">Combined servers or workstations under fair use policy<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>Preventing double selection<\/h3>\n<p>Another way to help control data size is to deselect, filter, or exclude data to ensure you don\u2019t protect the same data using multiple data sources. For example, a 300 GB\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\/use-cases\/hyper-v\" target=\"_blank\" rel=\"noopener\">Hyper-V virtual machine<\/a>\u00a0or MS SQL databases that was also backed up as part of the File System could significantly impact your total selected size, your monthly cost, and the overall duration of your backup window.<\/p>\n<p>Before applying any\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-guide\/backup-filters.htm\" target=\"_blank\" rel=\"noopener noreferrer\">backup filters<\/a>, it\u2019s very important you review any planned exclusions that will be applied to the files and folders data source. Before adding exclusions, make sure the backups using the application-specific data source are already configured and successfully protecting the data. If they aren\u2019t, it could result in the inability to perform data recovery later.<\/p>\n<p>&nbsp;<\/p>\n<table width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"13%\"><b>Application Data<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\" width=\"14%\"><b>File Extensions<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\" width=\"35%\"><b>Sample Exclusion Path<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\" width=\"35%\"><b>Sample Exclusion Path<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">Microsoft HyperV<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">.vhd<\/p>\n<p>.avhd<\/p>\n<p>.vhdx<\/p>\n<p>.avhdx<\/p>\n<p>.bin<\/p>\n<p>.vsv<\/p>\n<p>.xml<\/p>\n<p>.vmrs<\/p>\n<p>.vmcx<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">*\\Virtual Hard Disks\\*\\*.vhd<\/p>\n<p>*\\Virtual Hard Disks\\*\\*.avhd<\/p>\n<p>*\\Virtual Hard Disks\\*\\*.vhdx<\/p>\n<p>*\\Virtual Hard Disks\\*\\*.avhdx<\/p>\n<p>*\\Virtual Hard Disks\\*.vhd<\/p>\n<p>*\\Virtual Hard Disks\\*.avhd<\/p>\n<p>*\\Virtual Hard Disks\\*.vhdx<\/p>\n<p>*\\Virtual Hard Disks\\*.avhdx<\/p>\n<p>*\\Snapshots\\*\\*.bin<\/p>\n<p>*\\Snapshots\\*\\*.vsv<\/p>\n<p>*\\Snapshots\\*.xml<\/p>\n<p>*\\Snapshots\\*.vmrs<\/p>\n<p>*\\Snapshots\\*.vmcx<\/p>\n<p>*\\Resource Types\\*.vmcx<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">*\\Virtual Machines\\*\\*.vhd<\/p>\n<p>*\\Virtual Machines\\*\\*.avhd<\/p>\n<p>*\\Virtual Machines\\*\\*.vhdx<\/p>\n<p>*\\Virtual Machines\\*\\*.avhdx<\/p>\n<p>*\\Virtual Machines\\*.vhd<\/p>\n<p>*\\Virtual Machines\\*.avhd<\/p>\n<p>*\\Virtual Machines\\*.vhdx<\/p>\n<p>*\\Virtual Machines\\*.avhdx<\/p>\n<p>*\\Virtual Machines\\*\\*.bin<\/p>\n<p>*\\Virtual Machines\\*\\*.vsv<\/p>\n<p>*\\Virtual Machines\\*.xml<\/p>\n<p>*\\Virtual Machines\\*.vmrs<\/p>\n<p>*\\Virtual Machines\\*.vmcx<\/p>\n<p>*\\Resource Types\\*.xml<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">Microsoft SQL<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">.mdf<\/p>\n<p>.ndf<\/p>\n<p>.ldf<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">*\\MSSQL\\DATA\\*.mdf<\/p>\n<p>*\\MSSQL\\DATA\\*.ndf<\/p>\n<p>*\\MSSQL\\DATA\\*.ldf<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">*\\MSSQL\\LOG\\*.ldf<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">Microsoft Exchange<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">.edb<\/p>\n<p>.log<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">*\\Mailbox Database*\\*.edb<\/p>\n<p>*\\Mailbox Database*\\*.log<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\">*\\Mailbox*\\*.edb<\/p>\n<p>*\\Mailbox*\\*.log<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>I\u2019ve provided some examples of common application data file paths above you could use as a base for building out your customer specific exclusion filters. However, before you apply these\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-guide\/backup-filters.htm\" target=\"_blank\" rel=\"noopener noreferrer\">backup filters<\/a>\u00a0to a device locally, via\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/backup-manager\/backup-manager-guide\/command-line.htm\" target=\"_blank\" rel=\"noopener noreferrer\">command line<\/a>,\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/remote-commands.htm\" target=\"_blank\" rel=\"noopener noreferrer\">remote command<\/a>, a\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/backup\/documentation\/Content\/service-management\/console\/profiles.htm\" target=\"_blank\" rel=\"noopener noreferrer\">backup profile<\/a>, or\u00a0<a class=\"ext\" href=\"https:\/\/documentation.solarwindsmsp.com\/remote-management\/helpcontents\/files_and_folders.htm\" target=\"_blank\" rel=\"noopener noreferrer\">RMM backup policy<\/a>, please compare these against your individual backup devices and adjust the file paths as needed.<\/p>\n<p>You can locate a processed file list either in the local Backup Manager or in the Management Console and use it to reference the file paths for currently protected files.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg\" alt=\"\" data-entity-type=\"\" data-entity-uuid=\"\" \/><span title=\"Click and drag to resize\">\u200b<\/span><\/p>\n<p><em>Figure 1 &#8211; Viewing Processed files to help identify possibly exclusion paths<\/em><\/p>\n<p>This is just the tip of the iceberg when it comes to fine tuning your backup selection and exclusion settings. Check back for our next installment where we cover setting exclusions for drives, volumes, and shares.<\/p>\n<p><em>Eric Harless is the Head Backup Nerd at SolarWinds MSP. Eric has worked with SolarWinds Backup since 2013 and has over 25+ years of data protection industry experience in sales, support, marketing, systems engineering, and product management.<\/em><\/p>\n<p><em>You can follow Eric on Twitter\u00a0at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/backup_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@backup_nerd<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Other blogs in this series<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-1-manage-exception\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 1\u2014Manage by Exception<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-2-defining-success\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 2\u2014Defining Success<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-3-triaging-your-devices\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 3\u2014Triaging Your Devices<\/a><\/li>\n<li class=\"p1\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-5-tuning-your-backup-selections\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 5\u2014Tuning Your Backup Selections<\/a><\/li>\n<li class=\"p1\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-6-securing-your-backup-devices\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 6\u2014Securing Your Backup Devices<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.<\/p>\n","protected":false},"author":45,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5314","post","type-post","status-publish","format-standard","hentry","topic-backup-disaster-recovery","topic-head-nerds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Backup Monitoring\u2014Tracking and Controlling Usage - N-able<\/title>\n<meta name=\"description\" content=\"Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup Monitoring\u2014Tracking and Controlling Usage - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-07T20:13:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T12:18:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg\" \/>\n<meta name=\"author\" content=\"Eric Harless\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Harless\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\"},\"author\":{\"name\":\"Eric Harless\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/17837915039282731e00c56fd2b18ff2\"},\"headline\":\"Backup Monitoring, Part 4\u2014Tracking and Controlling Usage\",\"datePublished\":\"2020-07-07T21:13:48+01:00\",\"dateModified\":\"2021-07-13T12:18:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\"},\"wordCount\":820,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg\",\"articleSection\":[\"Backup &amp; Disaster Recovery\",\"Head Nerds\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\",\"name\":\"Backup Monitoring\u2014Tracking and Controlling Usage - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg\",\"datePublished\":\"2020-07-07T21:13:48+01:00\",\"dateModified\":\"2021-07-13T12:18:10+00:00\",\"description\":\"Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Backup &amp; Disaster Recovery\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/backup-disaster-recovery\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup Monitoring, Part 4\u2014Tracking and Controlling Usage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/17837915039282731e00c56fd2b18ff2\",\"name\":\"Eric Harless\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"caption\":\"Eric Harless\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Backup Monitoring\u2014Tracking and Controlling Usage - N-able","description":"Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage","og_locale":"it_IT","og_type":"article","og_title":"Backup Monitoring\u2014Tracking and Controlling Usage - N-able","og_description":"Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.","og_url":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-07-07T20:13:48+00:00","article_modified_time":"2021-07-13T12:18:10+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg","type":"","width":"","height":""}],"author":"Eric Harless","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Eric Harless","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage"},"author":{"name":"Eric Harless","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/17837915039282731e00c56fd2b18ff2"},"headline":"Backup Monitoring, Part 4\u2014Tracking and Controlling Usage","datePublished":"2020-07-07T21:13:48+01:00","dateModified":"2021-07-13T12:18:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage"},"wordCount":820,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg","articleSection":["Backup &amp; Disaster Recovery","Head Nerds"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage","url":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage","name":"Backup Monitoring\u2014Tracking and Controlling Usage - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg","datePublished":"2020-07-07T21:13:48+01:00","dateModified":"2021-07-13T12:18:10+00:00","description":"Find out how monitoring and adjustments to backup selection can help you control costs, reduce processing times, and shrink backup windows.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/07\/backup_window.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Backup &amp; Disaster Recovery","item":"https:\/\/www.n-able.com\/it\/blog\/category\/backup-disaster-recovery"},{"@type":"ListItem","position":2,"name":"Backup Monitoring, Part 4\u2014Tracking and Controlling Usage"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/17837915039282731e00c56fd2b18ff2","name":"Eric Harless","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","caption":"Eric Harless"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=5314"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5314\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=5314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}