Book description
Simple backups are no longer enough. To fully protect a modern IT infrastructure, you need sophisticated data protection technologies. This comprehensive guide to Microsoft's new System Center Data Protection Manager 2007 (DPM) will help you improve your server security using this robust new software. The book thoroughly explains DPM's unique abilities, and you'll find step-by-step instructions on setting up and deployment. You'll learn how to recover critical data and monitor processes for Exchange Server, SQL Server, SharePoint Server, Microsoft Virtual Server virtual machines, and Windows file servers and workstations.
Table of contents
- Copyright
- Preface
- Acknowledgments
- About the Authors
- Introduction
- 1. Data Protection Concepts
- 2. Installing DPM
- 3. Using the DPM Administration Console
-
4. Using the DPM Management Shell
- 4.1. The DPM Management Shell: Your New Best Friend
-
4.2. Into the DMS
- 4.2.1. Get-DPMCommand
- 4.2.2. Add-BackupNetworkAddress
- 4.2.3. Add-ChildDatasource
- 4.2.4. Add-DPMDisk
- 4.2.5. Add-Tape
- 4.2.6. Connect-DPMServer
- 4.2.7. Copy-DPMTapeData
- 4.2.8. Disable-DPMLibrary
- 4.2.9. Disable-TapeDrive
- 4.2.10. Disconnect-DPMServer
- 4.2.11. Enable-DPMLibrary
- 4.2.12. Enable-TapeDrive
- 4.2.13. Get-BackupNetworkAddress
- 4.2.14. Get-ChildDatasource
- 4.2.15. Get-DatasetStatus
- 4.2.16. Get-Datasource
- 4.2.17. Get-DatasourceDiskAllocation
- 4.2.18. Get-DatasourceProtectionOption
- 4.2.19. Get-DPMDisk
- 4.2.20. Get-DPMLibrary
- 4.2.21. Get-DPMVolume
- 4.2.22. Get-HeadlessDataset
- 4.2.23. Get-MaintenanceJobStartTime
- 4.2.24. Get-ModifiableProtectionGroup
- 4.2.25. Get-PolicyObjective
- 4.2.26. Get-PolicySchedule
- 4.2.27. Get-ProductionCluster
- 4.2.28. Get-ProductionServer
- 4.2.29. Get-ProductionVirtualName
- 4.2.30. Get-ProtectionGroup
- 4.2.31. Get-ProtectionJobStartTime
- 4.2.32. Get-RecoverableItem
- 4.2.33. Get-RecoveryPoint
- 4.2.34. Get-RecoveryPointLocation
- 4.2.35. Get-ReplicaCreationMethod
- 4.2.36. Get-Tape
- 4.2.37. Get-TapeBackupOption
- 4.2.38. Get-TapeDrive
- 4.2.39. Get-TapeSlot
- 4.2.40. Lock-DPMLibraryDoor
- 4.2.41. Lock-DPMLibraryIEPort
- 4.2.42. New-ProtectionGroup
- 4.2.43. New-RecoveryNotification
- 4.2.44. New-RecoveryOption
- 4.2.45. New-RecoveryPoint
- 4.2.46. New-SearchOption
- 4.2.47. Recover-RecoverableItem
- 4.2.48. Remove-BackupNetworkAddress
- 4.2.49. Remove-ChildDatasource
- 4.2.50. Remove-DatasourceReplica
- 4.2.51. Remove-DPMDisk
- 4.2.52. Remove-RecoveryPoint
- 4.2.53. Remove-Tape
- 4.2.54. Rename-DPMLibrary
- 4.2.55. Rename-ProtectionGroup
- 4.2.56. Set-DatasourceDiskAllocation
- 4.2.57. Set-DatasourceProtectionOption
- 4.2.58. Set-MaintenanceJobStartTime
- 4.2.59. Set-PerformanceOptimization
- 4.2.60. Set-PolicyObjective
- 4.2.61. Set-PolicySchedule
- 4.2.62. Set-ProtectionGroup
- 4.2.63. Set-ProtectionJobStartTime
- 4.2.64. Set-ProtectionType
- 4.2.65. Set-ReplicaCreationMethod
- 4.2.66. Set-Tape
- 4.2.67. Set-TapeBackupOption
- 4.2.68. Start-DatasourceConsistencyCheck
- 4.2.69. Start-DPMDiskRescan
- 4.2.70. Start-DPMLibraryInventory
- 4.2.71. Start-DPMLibraryRescan
- 4.2.72. Start-OnlineRecatalog
- 4.2.73. Start-ProductionServerSwitchProtection
- 4.2.74. Start-TapeDriveCleaning
- 4.2.75. Start-TapeErase
- 4.2.76. Start-TapeRecatalog
- 4.2.77. Test-DPMTapeData
- 4.2.78. Unlock-DPMLibraryDoor
- 4.2.79. Unlock-DPMLibraryIEPort
- 4.3. The Bottom Line
- 5. End-User Recovery
- 6. Protecting File Servers
- 7. Protecting Exchange Servers
- 8. Protecting SQL Servers
- 9. Protecting SharePoint Servers
- 10. Protecting Virtual Servers
- 11. Protecting Workstations
- 12. Advanced DPM
-
A. The Bottom Line
- A.1. Chapter 1: Data Protection Concepts
- A.2. Chapter 2: Installing DPM
- A.3. Chapter 3: Using the DPM Administration Console
- A.4. Chapter 4: Using the DPM Management Shell
- A.5. Chapter 5: End-User Recovery Line
- A.6. Chapter 6: Protecting File Servers
- A.7. Chapter 7: Protecting Exchange Servers
- A.8. Chapter 8: Protecting SQL Servers
- A.9. Chapter 9: Protecting SharePoint Servers
- A.10. Chapter 10: Protecting Virtual Servers
- A.11. Chapter 11: Protecting Workstations
- A.12. Chapter 12: Advanced DPM
- B. Setting Up a Lab Environment
- C. A Collection of DPM Best Practices
- D. Checklists
Product information
- Title: Mastering: System Center Data Protection Manager 2007
- Author(s):
- Release date: March 2008
- Publisher(s): Wiley
- ISBN: 9780470181522
You might also like
book
IBM ProtecTIER Implementation and Best Practices Guide
This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM TS7600 …
book
IBM ProtecTier Implementation and Best Practices Guide
The IBM® System Storage® TS7650G ProtecTIER® Deduplication Gateway and the IBM System Storage TS7650 ProtecTIER Deduplication …
book
IBM ProtecTIER Implementation and Best Practices Guide
This IBM® Redbooks® publication provides best practice guidance for planning, installing, configuring, and employing the IBM …
book
Implementation Best Practices for IBM Tivoli License Manager
The primary objective of this IBM Redbooks publication is to provide best practices for the implementation …