Mastering: System Center Data Protection Manager 2007

Book description

Simple backups are no longer enough. To fully protect a modern IT infrastructure, you need sophisticated data protection technologies. This comprehensive guide to Microsoft's new System Center Data Protection Manager 2007 (DPM) will help you improve your server security using this robust new software. The book thoroughly explains DPM's unique abilities, and you'll find step-by-step instructions on setting up and deployment. You'll learn how to recover critical data and monitor processes for Exchange Server, SQL Server, SharePoint Server, Microsoft Virtual Server virtual machines, and Windows file servers and workstations.

Table of contents

  1. Copyright
  2. Preface
  3. Acknowledgments
  4. About the Authors
  5. Introduction
  6. 1. Data Protection Concepts
    1. 1.1. General Concepts
      1. 1.1.1. Backups and Restores
      2. 1.1.2. Tape Backup
      3. 1.1.3. Disk Backup
      4. 1.1.4. Tape versus Disk
      5. 1.1.5. The Volume Shadow Copy Service
      6. 1.1.6. Replication
      7. 1.1.7. Data Protection
    2. 1.2. DPM Concepts
      1. 1.2.1. Replicas
      2. 1.2.2. Storage Pool
      3. 1.2.3. Protection Groups
      4. 1.2.4. Recovery Points
      5. 1.2.5. End-User Recovery
    3. 1.3. DPM Architecture
      1. 1.3.1. The Protection Agent
      2. 1.3.2. DPM Server
      3. 1.3.3. Third-Party Backup Software
    4. 1.4. The Bottom Line
  7. 2. Installing DPM
    1. 2.1. DPM Prerequisites
      1. 2.1.1. Documentation
      2. 2.1.2. Licensing
      3. 2.1.3. DPM Servers
      4. 2.1.4. Protected Servers
    2. 2.2. Installing the DPM Server
      1. 2.2.1. Installing DPM
    3. 2.3. Configuring DPM
      1. 2.3.1. Add Disks to the Storage Pool
      2. 2.3.2. Install the Protection Agent on Protected Servers
      3. 2.3.3. Create Protection Groups
    4. 2.4. The Bottom Line
  8. 3. Using the DPM Administration Console
    1. 3.1. Navigating the GUI
    2. 3.2. The Monitoring Tab
    3. 3.3. The Protection Tab
    4. 3.4. The Recovery Tab
    5. 3.5. The Reporting Tab
    6. 3.6. The Management Tab
    7. 3.7. The Bottom Line
  9. 4. Using the DPM Management Shell
    1. 4.1. The DPM Management Shell: Your New Best Friend
      1. 4.1.1. Introduction to Windows PowerShell
      2. 4.1.2. Navigating DPM Functions in the DPM Management Shell
    2. 4.2. Into the DMS
      1. 4.2.1. Get-DPMCommand
      2. 4.2.2. Add-BackupNetworkAddress
      3. 4.2.3. Add-ChildDatasource
      4. 4.2.4. Add-DPMDisk
      5. 4.2.5. Add-Tape
      6. 4.2.6. Connect-DPMServer
      7. 4.2.7. Copy-DPMTapeData
      8. 4.2.8. Disable-DPMLibrary
      9. 4.2.9. Disable-TapeDrive
      10. 4.2.10. Disconnect-DPMServer
      11. 4.2.11. Enable-DPMLibrary
      12. 4.2.12. Enable-TapeDrive
      13. 4.2.13. Get-BackupNetworkAddress
      14. 4.2.14. Get-ChildDatasource
      15. 4.2.15. Get-DatasetStatus
      16. 4.2.16. Get-Datasource
      17. 4.2.17. Get-DatasourceDiskAllocation
      18. 4.2.18. Get-DatasourceProtectionOption
      19. 4.2.19. Get-DPMDisk
      20. 4.2.20. Get-DPMLibrary
      21. 4.2.21. Get-DPMVolume
      22. 4.2.22. Get-HeadlessDataset
      23. 4.2.23. Get-MaintenanceJobStartTime
      24. 4.2.24. Get-ModifiableProtectionGroup
      25. 4.2.25. Get-PolicyObjective
      26. 4.2.26. Get-PolicySchedule
      27. 4.2.27. Get-ProductionCluster
      28. 4.2.28. Get-ProductionServer
      29. 4.2.29. Get-ProductionVirtualName
      30. 4.2.30. Get-ProtectionGroup
      31. 4.2.31. Get-ProtectionJobStartTime
      32. 4.2.32. Get-RecoverableItem
      33. 4.2.33. Get-RecoveryPoint
      34. 4.2.34. Get-RecoveryPointLocation
      35. 4.2.35. Get-ReplicaCreationMethod
      36. 4.2.36. Get-Tape
      37. 4.2.37. Get-TapeBackupOption
      38. 4.2.38. Get-TapeDrive
      39. 4.2.39. Get-TapeSlot
      40. 4.2.40. Lock-DPMLibraryDoor
      41. 4.2.41. Lock-DPMLibraryIEPort
      42. 4.2.42. New-ProtectionGroup
      43. 4.2.43. New-RecoveryNotification
      44. 4.2.44. New-RecoveryOption
      45. 4.2.45. New-RecoveryPoint
      46. 4.2.46. New-SearchOption
      47. 4.2.47. Recover-RecoverableItem
      48. 4.2.48. Remove-BackupNetworkAddress
      49. 4.2.49. Remove-ChildDatasource
      50. 4.2.50. Remove-DatasourceReplica
      51. 4.2.51. Remove-DPMDisk
      52. 4.2.52. Remove-RecoveryPoint
      53. 4.2.53. Remove-Tape
      54. 4.2.54. Rename-DPMLibrary
      55. 4.2.55. Rename-ProtectionGroup
      56. 4.2.56. Set-DatasourceDiskAllocation
      57. 4.2.57. Set-DatasourceProtectionOption
      58. 4.2.58. Set-MaintenanceJobStartTime
      59. 4.2.59. Set-PerformanceOptimization
      60. 4.2.60. Set-PolicyObjective
      61. 4.2.61. Set-PolicySchedule
      62. 4.2.62. Set-ProtectionGroup
      63. 4.2.63. Set-ProtectionJobStartTime
      64. 4.2.64. Set-ProtectionType
      65. 4.2.65. Set-ReplicaCreationMethod
      66. 4.2.66. Set-Tape
      67. 4.2.67. Set-TapeBackupOption
      68. 4.2.68. Start-DatasourceConsistencyCheck
      69. 4.2.69. Start-DPMDiskRescan
      70. 4.2.70. Start-DPMLibraryInventory
      71. 4.2.71. Start-DPMLibraryRescan
      72. 4.2.72. Start-OnlineRecatalog
      73. 4.2.73. Start-ProductionServerSwitchProtection
      74. 4.2.74. Start-TapeDriveCleaning
      75. 4.2.75. Start-TapeErase
      76. 4.2.76. Start-TapeRecatalog
      77. 4.2.77. Test-DPMTapeData
      78. 4.2.78. Unlock-DPMLibraryDoor
      79. 4.2.79. Unlock-DPMLibraryIEPort
    3. 4.3. The Bottom Line
  10. 5. End-User Recovery
    1. 5.1. Introducing End-User Recovery
      1. 5.1.1. Windows End-User Recovery
      2. 5.1.2. DPM End-User Recovery
    2. 5.2. Enabling DPM End-User Recovery
      1. 5.2.1. Preparing Active Directory
      2. 5.2.2. Deploying the Client
    3. 5.3. Recovering Protected Data
      1. 5.3.1. Recovering File Data from Windows Explorer
      2. 5.3.2. Recovering File Data from Microsoft Office
      3. 5.3.3. Recovering SharePoint Data
    4. 5.4. The Bottom Line
  11. 6. Protecting File Servers
    1. 6.1. Considerations
      1. 6.1.1. Prerequisites
      2. 6.1.2. Clustered Configurations
      3. 6.1.3. System State
      4. 6.1.4. Protected Data Sources
    2. 6.2. Backup Procedures
      1. 6.2.1. Standalone Configurations
      2. 6.2.2. Clustered Configurations
    3. 6.3. Restore Procedures
      1. 6.3.1. Recovery to the Original Location
    4. 6.4. The Bottom Line
  12. 7. Protecting Exchange Servers
    1. 7.1. Considerations
      1. 7.1.1. Prerequisites
      2. 7.1.2. Clustered Configurations
      3. 7.1.3. System State
      4. 7.1.4. Protected Data Sources
    2. 7.2. Backup Procedures
      1. 7.2.1. Installing the Protection Agent
    3. 7.3. Restore Procedures
      1. 7.3.1. Restoring a Storage Group
    4. 7.4. Restoring a Mailbox or Public Folder Database
      1. 7.4.1. Restoring to the Original Location
      2. 7.4.2. Restoring to Another Database on an Exchange server
      3. 7.4.3. Restoring to Recovery Storage Group
      4. 7.4.4. Copy to a Network Folder
      5. 7.4.5. Restoring to Tape
    5. 7.5. Restoring an Individual Mailbox
      1. 7.5.1. Recovering to an Exchange Database
      2. 7.5.2. Recovering to a Network Folder
      3. 7.5.3. Recovering to Tape
    6. 7.6. The Bottom Line
  13. 8. Protecting SQL Servers
    1. 8.1. Considerations
      1. 8.1.1. Prerequisites
      2. 8.1.2. Clustered Configurations
      3. 8.1.3. System State
      4. 8.1.4. Protected Data Sources
    2. 8.2. Backup Procedures
      1. 8.2.1. Standalone Configurations
      2. 8.2.2. Clustered Configurations
    3. 8.3. Restore Procedures
      1. 8.3.1. Restoring to the Original Instance
      2. 8.3.2. Restoring to an Alternative Instance
      3. 8.3.3. Restoring to a Network Folder
      4. 8.3.4. Copy to Tape
    4. 8.4. The Bottom Line
  14. 9. Protecting SharePoint Servers
    1. 9.1. Considerations
      1. 9.1.1. Prerequisites
      2. 9.1.2. Manually Protecting WSS 2.0 and SPS 2003
      3. 9.1.3. Clustered Configurations
      4. 9.1.4. System State
      5. 9.1.5. Protected Data Sources
    2. 9.2. Backup Procedures
      1. 9.2.1. Installing the Protection Agent
      2. 9.2.2. Protecting SharePoint Farms
    3. 9.3. Recovery Procedures
      1. 9.3.1. Recovering a Farm
      2. 9.3.2. Recovering a Site
      3. 9.3.3. Recovering Lists and Individual Items
    4. 9.4. The Bottom Line
  15. 10. Protecting Virtual Servers
    1. 10.1. Considerations
      1. 10.1.1. Prerequisites
      2. 10.1.2. Clustered Configurations
      3. 10.1.3. System State
      4. 10.1.4. Protected Data Sources
    2. 10.2. Backup Procedures
      1. 10.2.1. Installing the Protection Agent
    3. 10.3. Restore Procedures
      1. 10.3.1. Restoring to the Original Instance
      2. 10.3.2. Restoring to an Alternative Location
      3. 10.3.3. Copy to Tape
    4. 10.4. The Bottom Line
  16. 11. Protecting Workstations
    1. 11.1. Considerations
      1. 11.1.1. Prerequisites
      2. 11.1.2. System State
      3. 11.1.3. Protected Data Sources
      4. 11.1.4. Protecting Windows Vista
      5. 11.1.5. Protecting Encrypted Data
    2. 11.2. Backup Procedures
    3. 11.3. Restore Procedures
      1. 11.3.1. Recovery to the Original Location
    4. 11.4. The Bottom Line
  17. 12. Advanced DPM
    1. 12.1. Finishing Your Deployment
      1. 12.1.1. Establishing Email Notifications
      2. 12.1.2. Manually Sizing Disk Partitions
      3. 12.1.3. Multi-Forest and Multi-Domain Considerations
      4. 12.1.4. Protecting Other Workloads
      5. 12.1.5. Protecting DPM
    2. 12.2. Network Issues
      1. 12.2.1. Managing Network Traffic
      2. 12.2.2. Encryption
      3. 12.2.3. Firewalls
    3. 12.3. The Bottom Line
  18. A. The Bottom Line
    1. A.1. Chapter 1: Data Protection Concepts
    2. A.2. Chapter 2: Installing DPM
    3. A.3. Chapter 3: Using the DPM Administration Console
    4. A.4. Chapter 4: Using the DPM Management Shell
    5. A.5. Chapter 5: End-User Recovery Line
    6. A.6. Chapter 6: Protecting File Servers
    7. A.7. Chapter 7: Protecting Exchange Servers
    8. A.8. Chapter 8: Protecting SQL Servers
    9. A.9. Chapter 9: Protecting SharePoint Servers
    10. A.10. Chapter 10: Protecting Virtual Servers
    11. A.11. Chapter 11: Protecting Workstations
    12. A.12. Chapter 12: Advanced DPM
  19. B. Setting Up a Lab Environment
    1. B.1. Hardware and Software Requirements
      1. B.1.1. Using Physical Machines
      2. B.1.2. Using Virtualization
    2. B.2. Setting Up Your Virtual Machines
      1. B.2.1. Setting Up Your Lab Virtual Server
      2. B.2.2. Creating a Baseline Virtual Machine
    3. B.3. Setting Up Your Lab File Servers
      1. B.3.1. Standalone Configuration
      2. B.3.2. Clustered Configuration
    4. B.4. Setting Up Your Lab Exchange Servers
      1. B.4.1. Standalone Configuration
      2. B.4.2. Clustered Configuration
    5. B.5. Setting Up Your Lab SQL Servers
      1. B.5.1. Standalone Configuration
      2. B.5.2. Clustered Configuration
    6. B.6. Setting Up Your Lab SharePoint Servers
  20. C. A Collection of DPM Best Practices
    1. C.1. Installation and Architecture Best Practices
    2. C.2. End-User Recovery Best Practices
    3. C.3. File Server Best Practices
    4. C.4. Exchange Server Best Practices
    5. C.5. SQL Server Best Practices
    6. C.6. SharePoint Server Best Practices
    7. C.7. Virtual Server Best Practices
    8. C.8. Generic Best Practices
  21. D. Checklists
    1. D.1. DPM Planning
    2. D.2. DPM Deployment and Installation
    3. D.3. DPM Configuration Checklist
    4. D.4. DPM End-User Recovery Checklist
    5. D.5. DPM Protection Group Checklist
    6. D.6. Wrap Up Checklist

Product information

  • Title: Mastering: System Center Data Protection Manager 2007
  • Author(s): Devin L. Ganger, Ryan Femling
  • Release date: March 2008
  • Publisher(s): Wiley
  • ISBN: 9780470181522