Microsoft System Center Data Protection Manager Cookbook

Book description

Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM

Key Features

  • Adapt to the modern data center design challenges and improve storage efficiency
  • Effective recipes to help you create your own robust architectural designs
  • Solve data protection and recovery problems in your organization

Book Description

System Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data. With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM.

This book starts by helping you install SCDPM and then moves on to post-installation and management tasks. You will come across a lot of useful recipes that will help you recover your VMware and Hyper-V VMs. It will also walk you through tips for monitoring SCDPM in different scenarios. Next, the book will also offer insights into protecting windows workloads followed by best practices on SCDPM. You will also learn to back up your Azure Stack Infrastructure using Azure Backup. You will also learn about recovering data from backup and implementing disaster recovery. Finally, the book will show you how to configure the protection groups to enable online protection and troubleshoot Microsoft Azure Backup Agent.

What you will learn

  • Install and prepare SQL Server for the SCDPM database
  • Reduce backup storage with SCDPM and data deduplication
  • Learn about the prerequisites for supported Hyper-V Server protection
  • Integrate SCDPM with other System Center products to build optimal services
  • Protect and restore the SCDPM database
  • Protect your data center by integrating SCDPM with Azure Backup
  • Manually create online recovery points and recover production data from Azure
  • Protect and learn about the requirements to recover Azure Stack with SCDPM

Who this book is for

If you are an SCDPM administrator, this book will help you verify your knowledge and provide you with everything you need to know about the new release of System Center Data Protection Manager.

Publisher resources

View/Submit Errata

Table of contents

  1. Title Page
  2. Copyright and Credits
    1. Microsoft System Center Data Protection Manager Cookbook
  3. Dedication
  4. About Packt
    1. Why subscribe?
    2. Packt.com
  5. Contributors
    1. About the authors
    2. About the reviewer
    3. Packt is searching for authors like you
  6. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
      1. Download the color images
      2. Conventions used
    4. Sections
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There's more…
      5. See also
    5. Get in touch
      1. Reviews
  7. Installing and Upgrading DPM
    1. Introduction
    2. Planning your DPM deployment
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    3. Preparing your DPM deployment
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    4. Installing SQL Server for the DPM database
      1. Getting ready
      2. How to do it...
        1. Option 1 – local SQL Server instance
        2. Option 2 – remote SQL Server instance
      3. How it works...
    5. Enabling the Transport Layer Security 1.2 protocol for DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
        1. Using certificate-based authentication to protect servers in a workgroup or untrusted domain
        2. Protecting workloads on the cloud using DPM
      5. See also
    6. Installing DPM
      1. Getting ready
      2. How to do it...
        1. Option 1 – installing DPM using a local SQL Server
        2. Option 2 – installing DPM using a remote SQL Server
      3. How it works...
      4. There's more...
    7. Automating the installation of DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    8. Upgrading to the latest release of DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    9. Migrating legacy storage to Modern Backup Storage
      1. Getting ready
      2. How to do it...
      3. How it works...
    10. Installing the DPM agents
      1. Getting ready
      2. How to do it...
        1. Option 1 – installing the agent from the DPM console
        2. Option 2 – installing the agent manually
      3. How it works...
      4. There's more...
    11. Upgrading the DPM agents
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
  8. DPM Post-Installation and Management Tasks
    1. Introduction
    2. Using the DPM UI
      1. How to do it...
      2. How it works...
    3. Enabling Modern Backup Storage (MBS)
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    4. Configuring DPM agent throttling
      1. Getting ready
      2. How to do it...
      3. How it works...
    5. Optimizing the protection group
      1. Getting ready
      2. How to do it...
      3. How it works...
    6. Working with filters
      1. Getting ready
      2. How to do it...
      3. How it works...
    7. Configuring email notifications
      1. Getting ready
      2. How to do it...
      3. How it works...
    8. Applying Update Rollups (UR) to the DPM server
      1. Getting ready
      2. How to do it...
      3. How it works...
    9. Configuring a dedicated backup network
      1. Getting ready
      2. How to do it...
      3. How it works...
    10. Configuring Workload-Aware Storage
      1. Getting ready
      2. How to do it...
      3. How it works...
    11. Backup Storage Migration
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    12. Preventing unexpected data loss
      1. Getting ready
      2. How to do it...
      3. See also
    13. Creating a manual initial replica
      1. Getting ready
      2. How to do it...
      3. How it works...
    14. Creating custom reports
      1. Getting ready
      2. How to do it...
      3. How it works...
  9. Protecting Hyper-V VMs
    1. Introduction
    2. Configuring Hyper-V protection with DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    3. Protecting Hyper-V VMs with Resilient Change Tracking
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    4. Protecting Hyper-V clusters over SMB and Hyper-V replica
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    5. Protecting Hyper-V clusters over Clustered Shared Volumes
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    6. Protecting Hyper-V shielded VMs
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    7. Enabling DPM for scale-out Hyper-V protection
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    8. Recovering a Hyper-V virtual machine
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    9. Recovering a Hyper-V virtual hard disk
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    10. Recovering a single file using Item-Level Recovery
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
  10. Monitoring DPM and Configuring Role-Based Access
    1. Introduction
    2. Monitoring DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
    3. Publishing the DPM logs
      1. Getting ready
      2. How to do it...
      3. How it works...
    4. Monitoring DPM with SCOM
      1. Getting ready
      2. How to do it...
      3. How it works...
    5. Monitoring DPM without SCOM
      1. Getting ready
      2. How to do it...
        1. Monitoring DPM operations through Windows Event Viewer
        2. Monitoring DPM operations through the DPM Administrator Console
        3. Using DPM reports to view usage and health trends
        4. Using Performance Monitor to monitor the standard built-in operating system performance counters
      3. How it works...
    6. Installing the DPM Central Console
      1. Getting ready
      2. How to do it...
      3. How it works...
    7. Using the DPM Scoped Console
      1. Getting ready
      2. How to do it...
      3. How it works...
    8. Configuring remote administration
      1. Getting ready
      2. How to do it...
      3. How it works...
    9. Configuring and using role-based access
      1. Getting ready
      2. How to do it...
      3. How it works...
    10. Central reporting
      1. Getting ready
      2. How to do it...
      3. How it works...
  11. Protecting Microsoft Workloads with DPM
    1. Introduction
    2. Enabling file server protection with DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    3. Enabling SQL Server protection with DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    4. Enable Windows bare metal protection with DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
  12. Securing Windows Client with DPM
    1. Introduction
    2. Creating a plan for backing up end user data
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    3. Plan for off-site end user backup
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    4. Configuring DPM and Active Directory for end user protection
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    5. Installing the agent automatically and manually on a client computer
      1. Getting ready
      2. How to do it...
      3. How it works...
    6. Performing image-level backups of client computers with DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
  13. Protecting Microsoft Azure Stack with DPM
    1. Introduction
    2. Preparing to back up Azure Stack with DPM
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    3. Backing up the infrastructure layer
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    4. Backing up the Azure Stack tenant layer
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    5. Overview of cloud recovery
      1. Getting ready
      2. How to do it...
      3. How it works...
  14. Protecting Workgroups and Untrusted Domains
    1. Introduction
    2. Setting up DPM protection with NTLM authentication
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    3. Setting up DPM protection with certificate authentication
      1. Getting ready
      2. How to do it...
        1. Adding a HTTP CRL Distribution Point
        2. Creating the DPM Certificate Template
        3. Configuring the certificate on the DPM server
        4. Installing the DPM agents on the protected systems
        5. Configuring the certificate on the protected computer
        6. Attaching the computer to the DPM server
        7. Test backing up the VMs
      3. How it works...
      4. There's more...
  15. Recovering Data from Backup
    1. Introduction
    2. Recovering file server data with PowerShell
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. See also
    3. Recovering SQL data using the Self-Service Recovery Tool (SSRT)
      1. Getting ready
      2. How to do it...
      3. How it works...
    4. Recovering a failed server using bare-metal recovery
      1. Getting ready
      2. How to do it...
      3. How it works...
    5. Recovering data from Azure Backup
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    6. Recovering data from an external DPM server
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
    7. Recovering data from a secondary DPM server
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
  16. Integrating DPM with Azure Backup
    1. Introduction
    2. Integrating DPM with Azure Backup
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    3. Protecting data with Azure Backup
      1. Getting ready
      2. How to do it...
      3. How it works...
      4. There's more...
      5. See also
    4. Creating online recovery points
      1. Getting ready
      2. How to do it...
      3. How it works...
    5. Monitoring and centralized reporting
      1. Getting ready
      2. How to do it...
        1. Configuring Azure Storage Account
        2. Viewing reports in Power BI
      3. How it works...
      4. There's more...
      5. See also
  17. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think

Product information

  • Title: Microsoft System Center Data Protection Manager Cookbook
  • Author(s): Charbel Nemnom, Patrick Lownds
  • Release date: December 2018
  • Publisher(s): Packt Publishing
  • ISBN: 9781787289284