In this chapter, we will cover the following recipes:
Understanding the prerequisites of supported Exchange server protections
Configuring Exchange server protection
Understanding how to adapt DPM to Exchange server management tasks
Understanding how to adapt DPM to Exchange server maintenance tasks
Protecting a single Exchange mailbox database
Understanding how DPM protects DAG configurations
Understanding how DPM can verify data integrity using ESEUTIL
Restoring an Exchange mailbox database to its original location
Restoring an Exchange mailbox database to an alternative location
Restoring an Exchange mailbox database to an Exchange Recovery Database
Restoring an Exchange mailbox database to a network folder
Copying the Exchange mailbox database to tape