O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Microsoft System Center Data Protection Manager 2012 SP1

Book Description

Written by a team of Microsoft System Center Most Valued Professionals (MVPs), this is the ultimate guide to using Data Protection Management (DPM) to safeguard your organization’s valuable information. Packed with tips and real-life solutions.

  • Practical guidance that will help you get the most out of Microsoft System Center Data Protection Manager 2012
  • Gain insight into deploying, monitoring, and administering System Center Data Protection Manager 2012 from a team of Microsoft MVPs
  • Learn the various methods and best practices for administrating and using Microsoft System Center Data Protection Manager 2012

In Detail

Microsoft System Center Data Protection Manager is a centralized data protection solution. DPM is used for data protection and recovery for Microsoft workloads.

Data Protection Manager allows backup and recovery of Microsoft Workloads, including SQL Server, Exchange, Sharepoint, Client Computers, and Hyper-V. Enabling disk and tape-based backup methods, DPM also allows central management of the system state and “Bare-Metal Recovery”.

Microsoft System Center Data Protection Manager 2012 with Service Pack 1 is a guide for administrators of System Center Data Protection Manager. By the end of this book, users will be able to carry out automated installs, migrate DPM to new hardware, set up custom reporting, use the DPM central console, and implement offsite DPM strategies such as chaining, monitoring, and cyclic protection.

In this book you will gain insight from Microsoft Most Valued Professionals into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. It will also show administrators how to effectively create backups of the protected workloads and use these backups to recover from a disaster.

It will also contain information on backup networks, client protection, and how to automate tasks in DPM to make your job as an administrator easier.

After reading this book you should be confident enough to master protecting your organizations data with Microsoft System Center Data Protection Manager.

Table of Contents

  1. Microsoft System Center Data Protection Manager 2012 SP1
    1. Table of Contents
    2. Microsoft System Center Data Protection Manager 2012 SP1
    3. Credits
    4. About the Authors
    5. About the Reviewers
    6. www.PacktPub.com
      1. Support files, eBooks, discount offers and more
        1. Why Subscribe?
        2. Free Access for Packt account holders
        3. Instant Updates on New Packt Books
    7. Preface
      1. What this book covers
      2. Who this book is for
      3. What you need for this book
      4. Conventions
      5. Reader feedback
      6. Customer support
        1. Errata
        2. Piracy
        3. Questions
    8. 1. What is Data Protection Manager?
      1. Planning for your DPM deployment
        1. Hardware requirements
          1. Minimum requirements
          2. Recommended requirements
        2. Limitations of DPM
      2. The Windows applications
        1. The Exchange server
        2. The SQL Server
        3. SharePoint
        4. Virtual platforms
        5. The Windows clients
        6. The system state
      3. The DPM disk pool
        1. The RAID levels for the disk pool
          1. Software controllers versus hardware controllers
          2. The sector size
        2. The custom volumes
        3. Deduplication
      4. Dependent services, local accounts, and groups
        1. Services
          1. DPM
          2. The DPM AccessManager service
          3. The DPM Agent Coordinator service
          4. The DPM CPWrapper service
          5. The DPM Writer service
          6. The DPMLA service
          7. The DPMRA service
        2. Local accounts and groups
      5. Volume Shadow Copy Services (VSS)
        1. The creation of a shadow copy
        2. A different creation of a shadow copy
      6. How does the DPM agent operate?
        1. Distributed Component Object Model (DCOM)
        2. Direction of communication
        3. The firewall settings for DPM
        4. Underlying technologies
          1. Change Journal
          2. The File System filter
          3. The DPM File filter
      7. A GUI walkthrough
        1. The Navigation bar
          1. Monitoring
            1. Alerts
            2. Jobs
          2. Protection
            1. Facets pane
            2. Ribbons
            3. On-the-wire
            4. Resume backups
          3. Recovery
          4. Reporting
          5. Management
      8. Additional functions and roles within DPM
        1. End-user Restore Recovery (EUR)
        2. DPM Self-service Recovery Tool (SSRT)
        3. Single Instance Storage (SIS)
      9. PSDataSourceConfig.XML
      10. Troubleshooting backups
        1. The local Windows logs
        2. Troubleshooting VSS
        3. The DPM agent logs
        4. The DPM server logs
      11. Upgrading scenarios
      12. Summary
    9. 2. Backup Strategies
      1. The definition of data
      2. Microsoft's approach
      3. Service Level Agreements
      4. Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives
        1. Recovery Point Objectives (RPO)
        2. Recovery Time Objectives (RTO)
        3. Recovery Level Objectives (RLO)
      5. What data should we back up?
        1. Initial tasks
        2. Server technologies
          1. Windows workload protection group design
          2. Enterprise protection group design
            1. The Platinum class
            2. The Gold class
            3. The Silver class
            4. The Bronze class
      6. The primary approach
        1. Non-Windows application servers
          1. Generic data source protection
          2. Local services
        2. The Windows workloads
      7. The next step
        1. Protection group names
          1. Member of the protection group
      8. Verification of your backups
        1. Restore training
        2. The verification process
      9. Summary
    10. 3. DPM Server Management Tasks
      1. Automated installation of DPM
      2. Migrating a DPM server to a new hardware
      3. How to calculate storage for DPM
      4. Creating custom reports in DPM
        1. DPM Report Views
        2. Building a custom DPM report
        3. Create custom DPM reports using Prism for DPM
      5. Changing the SQL Server instance used by DPM
      6. Moving the DPM server to a new domain or renaming a DPM server
      7. Adding disks to the storage pool
      8. Removing a disk from the storage pool
      9. Replacing a disk in the storage pool
      10. DPM network bandwidth and control traffic
        1. Enabling the network-bandwidth-usage throttling
        2. Enabling the network-bandwidth-usage throttling for multiple DPM agents at once
      11. Working with DPM SQL self-service
      12. Working with third-party tools to deduplicate DPM data
      13. Summary
    11. 4. Monitoring and Managing the Performance of DPM
      1. Publishing the DPM event logs
      2. Monitoring DPM with SCOM
      3. Monitoring DPM without SCOM
      4. Using the new DPM central console
        1. Installing the DPM central console
        2. Overview of the DPM central console
      5. Configuring remote administration of DPM
      6. Configuring and using role-based access in DPM
      7. Summary
    12. 5. Workload Protection
      1. Working with BMR and troubleshooting common issues in DPM
        1. Supported operating systems
          1. How to backup BMR files
          2. Performing a BMR restore
          3. Troubleshooting BMR
      2. Working with system state protection and troubleshooting common issues in DPM
        1. Restoring the system state from the DPM server
        2. Using the wbadmin tool
      3. Protecting the domain controllers
      4. Restoring Active Directory
      5. Working with the Active Directory Recycle Bin
      6. Generic data source protection in DPM
      7. Non-Microsoft workload protection in DPM
        1. Protecting Oracle with DPM
          1. Protecting Oracle using RMAN and pre/post scripts with DPM
          2. Protecting Oracle as a generic data source with DPM
        2. Protecting Linux with DPM
        3. Protecting non-domain/workgroup computers with DPM
      8. Summary
    13. 6. DPM-aware Windows Workload Protection
      1. Protecting SQL with DPM
        1. Protect SQL Server 2012 AlwaysOn
      2. Remote SQL Server 2012 SP1
        1. SQL self-service recovery
          1. Configuring self-service recovery in DPM
          2. Installing the DPM self-service recovery tool (SSRT) on a client computer
      3. Protecting SharePoint with DPM
        1. Configuring SharePoint protection
        2. Protecting all SharePoint components
        3. How to protect a multi-tenancy SharePoint deployment
        4. How to protect RBS with DPM
        5. How to protect claims authentication with DPM
        6. How to protect search with DPM
      4. Protecting Exchange with DPM
        1. Configure Exchange protection
          1. DPM agent deployment considerations
          2. DAG clusters
          3. Specifying the Exchange protection options
            1. Exchange maintenance
          4. Specifying the DAG protection
        2. Restore Exchange mailboxes
          1. Recovering Exchange server mailboxes
        3. How to protect a multi-tenancy Exchange deployment
        4. BMR protection technique of Exchange
        5. Exchange 2013 protection
      5. Protecting Hyper-V with DPM
        1. Configuring Hyper-V protection with DPM
        2. Protecting Hyper-V from DPM running in Hyper-V
        3. How Hyper-V ILR works with DPM
      6. Hyper-V 3.0
        1. Clustered Shared Volume (CSV) 2.0
        2. Protection of Hyper-V servers using SMB and Hyper-V Replica
          1. Unsupported scenarios for SMB
        3. DPM scale-out protection
          1. Enabling the scale-out protection
        4. Protecting deduplicated volumes
          1. Recovering volumes with deduplication
          2. Protecting Resilient File System
          3. Protecting CSV 2
      7. Protecting Windows Clusters with DPM
        1. Protecting file server clusters
          1. Planned failover for file clusters
          2. Changing the resource group
        2. Protecting DHCP clusters
      8. Summary
    14. 7. DPM Non-aware Windows Workload Protection
      1. Protecting DFS with DPM
        1. Protecting Dynamics CRM with DPM
        2. Protecting Dynamics GP with DPM
        3. Protecting TMG 2010 with DPM
        4. How to protect IIS
        5. Protecting Lync 2010 with DPM
      2. Summary
    15. 8. Managing Tapes in DPM
      1. How DPM manages tapes
        1. How DPM writes information to tape
        2. Tape information
        3. Basic tape management tasks for DPM
        4. Tape commands for DPM
          1. Tape library commands
            1. Inventory library
            2. Rescan
            3. Refresh
            4. Unlock library door
            5. Rename library…
            6. Disable library
            7. Add tape (I/E port)…
            8. Clean
            9. Disable
        5. Protection group configuration
          1. Specify long-term goals
          2. Select library and tape details
        6. Co-location of data on tape
        7. Co-locating tape and upgrading DPM
      2. Standalone tape drives and tape libraries
        1. Standalone tape drives
        2. Tape libraries
      3. Virtual Tape Library (VTL)
        1. Firestreamer
      4. Tape Library Sharing (TLS)
      5. Tape reports
      6. Summary
    16. 9. Client Protection in DPM
      1. Creating a plan for backing up end user data
      2. Plan for off-site end user backup
      3. Configuring DPM and Active Directory for end user protection
        1. Manually preparing Active Directory for DPM
      4. Installing the agent automatically and manually on a client computer
        1. Automatic install
        2. Manual install
        3. Scripted install
      5. Performing image-level backups of client computers with DPM
      6. Other resources for DPM client protection
        1. Setting size restrictions on client protection
        2. Allow non-admin users to perform end user recovery of DPM protected data
        3. Client Auto Deployment Management pack
      7. Summary
    17. 10. Workgroups and Untrusted Domains
      1. Supported and not supported workgroup/untrusted domain protection
      2. Using certificate-based authentication with the DPM protection
      3. Setting up and working with workgroup protection in DPM
        1. Local accounts or trusts
        2. DPM agent
      4. Protection across trusted domains
      5. Configuring and protecting machines in workgroups and untrusted domains
        1. Communication
          1. Host files
          2. DNS
          3. Firewall
          4. VPN
        2. Installing and configuring the DPM agent
      6. Protecting the domain controller in an untrusted domain
      7. Protection in DMZ
      8. Troubleshooting common issues with protection of workgroups and untrusted domains
      9. Summary
    18. 11. Disaster Recovery
      1. The purpose of a disaster recovery design
        1. The Active Directory domain
        2. The Data Protection Manager server
        3. Databases
        4. Short-term storage
        5. Long-term storage
        6. Public Key Infrastructure
        7. Windows Azure passphrase
      2. Recovering your organization's data when the only thing left is backup tapes
      3. Protecting the Data Protection Manager database
      4. Planning and implementing DPM chaining
      5. Planning and implementing cyclic protection
      6. Off-site DPM strategies
        1. The secondary DPM server
        2. Backing up to the cloud
        3. VTL to external drives
        4. Alternative off-site options
      7. Protecting DPM with third-party software
      8. Backup network design
      9. Using DPM beyond the supported cloud providers
      10. Summary
    19. 12. DPM PowerShell, Automation, and Private Cloud
      1. Connecting to DPM through remote PowerShell
        1. Using PowerShell ISE to work with DPM cmdlets
      2. Automating DPM in your private cloud
        1. DPM and private cloud
        2. Automating DPM using Orchestrator
      3. DPM and System Center Configuration Manager
        1. Deploying the DPM Remote Administration console via SCCM
      4. Summary
    20. Index