Backup
OneDrive
Caltech offers 50 GB standard and 200 GB of storage upon request included with all Office365 accounts. Files saved on OneDrive feature version control and are accessible to various devices when signed in with OneDrive applications. Backup of Desktop and Documents files can also be synced between devices. File backups can be performed on Windows, using Windows Backup, and MacOS with the OneDrive application. We are advising users to utilize these features.
Comet
Comet is a cloud backup solution that provides scheduled incremental backups to cloud storage. The client can be installed on most common operating systems and should be used to back up important local files and folders where other cloud solutions, such as OneDrive, don't suffice. We offer free licensing of Comet for our users and encourage all to try it as a viable backup solution.
Installation
Please contact [email protected] for account creation. Please include your group or advisor.
Once your account has been created:
- Navigate to Astro-Backup for client installation.
- Download backup agent

- Follow the Installation Procedure for your operating system
- On First logon, please ensure our server address is present

Usage
Once the backup agent has been installed on a device, you are able to manage backups from either the web GUI or the backup agent on the device directly.
Protected Items
Comet identifies backup objects as "Protected Items." This is where items such as files and folders are selected and also where the schedule for backup are created.
Please ensure a Protected Item is created and scheduled for backup

Detailed information about Protected Items
Note:
*Storage Vaults are managed by the Astro-IT team and allocated upon account creation.
*Files already stored in cloud locations such as OneDrive cannot be accessed and backed up redundantly through this method
For further questions, please contact [email protected]
Local Disk
Local disk backup solutions such as Time Machine for MacOS and Windows Backup (found in Control Panel) are recommended and should be used in addition to cloud backups. These methods are capable of full system backup, but may be compromised if the device is attached to a system in the event of ransomware. They are also subject to disk corruption or physical damage. These should be used as a first line of defense, but should not be relied on as the sole method of backup.