Book Image

Microsoft System Center Data Protection Manager 2012 SP1

By : Steve Buchanan (MVP), Islam Gomaa, Robert Hedblom, Flemming Riis
Book Image

Microsoft System Center Data Protection Manager 2012 SP1

By: Steve Buchanan (MVP), Islam Gomaa, Robert Hedblom, Flemming Riis

Overview of this book

<p>Microsoft System Center Data Protection Manager is a centralized data protection solution. DPM is used for data protection and recovery for Microsoft workloads.<br /><br />Data Protection Manager allows backup and recovery of Microsoft Workloads, including SQL Server, Exchange, Sharepoint, Client Computers, and Hyper-V. Enabling disk and tape-based backup methods, DPM also allows central management of the system state and “Bare-Metal Recovery”.<br /><br />Microsoft System Center Data Protection Manager 2012 SP1 is a guide for administrators of System Center Data Protection Manager. By the end of this book, users will be able to carry out automated installs, migrate DPM to new hardware, set up custom reporting, use the DPM central console, and implement offsite DPM strategies such as chaining,&nbsp; monitoring, and cyclic protection.<br /><br />In this book you will gain insight from Microsoft Most Valued Professionals into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. It will also show administrators how to effectively create backups of the protected workloads and use these backups to recover from a disaster.<br /><br />It will also contain information on backup networks, client protection, and how to automate tasks in DPM to make your job as an administrator easier.<br /><br />After reading this book you should be confident enough to master protecting your organizations data with Microsoft System Center Data Protection Manager.</p>
Table of Contents (19 chapters)
Microsoft System Center Data Protection Manager 2012 SP1
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
7
DPM Non-aware Windows Workload Protection
Index

Preface

Microsoft Data Protection Manager (DPM) 2012 SP1 is a protection and recovery solution, which provides continuous data protection for Windows application and file servers to seamlessly integrated disk, tape, and cloud.

This book includes deep dive contributions from seven experienced System Center MVPs, with hands-on and real-life experience in deploying, managing, and configuring DPM. This book will show you how to effectively plan and deploy DPM and how to effectively back up your business-critical data using Microsoft DPM 2012 SP1. This book will focus on Microsoft's best practices as well as the authors' own real-world experience.

What this book covers

Chapter 1, What is Data Protection Manager?, will give you an overview on System Center Data Protection Manager (SCDPM), what it is, and how it works using underlying components in the operating system such as VSS and PowerShell.

Chapter 2, Backup Strategies, will help you understand protection planning and show you how to create a backup and custom recovery strategy for your own enterprise.

Chapter 3, DPM Server Management Tasks, will provide guidance on how to manage your DPM server, including the most common DPM management task and DPM third-party add-ons.

Chapter 4, Monitoring and Managing Performance of DPM, will help you in monitoring your DPM server using standard Windows tools as well as operation manager.

Chapter 5, Workload Protection, will cover an introduction on how to protect Microsoft workloads using DPM with a workaround on how to back up non-Microsoft workloads.

Chapter 6, DPM-aware Windows Workload Protection, will cover how DPM is aware of certain workloads and how it protects and recovers these workloads.

Chapter 7, DPM Non-aware Windows Workload Protection, will cover how DPM can protect and recover some non-Microsoft workloads.

Chapter 8, Managing Tapes in DPM, will help you understand how DPM manages tapes and how it will write data to a tape using different recovery goals.

Chapter 9, Client Protection in DPM, will cover how DPM can protect trusted clients, off-site protection, and the challenges that this presents.

Chapter 10, Workgroups and Untrusted Domains, will focus on how DPM can protect untrusted and workgroup clients using various authentication methods.

Chapter 11, Disaster Recovery, will look at the steps we need to take to ensure that we can always recover our organization's data, even if multiple events occurs at the same time.

Chapter 12, DPM PowerShell, Automation, and Private Cloud, will cover DPM and PowerShell along with some new cmdlets, using PowerShell ISE with DPM. It will also help you understand DPM's role in private cloud, automating DPM with System Center Orchestrator, and how to deploy the DPM Remote Administration console via SCCM.

Who this book is for

This book is for IT professionals who are looking to expand their knowledge on how to use and monitor DPM to protect their enterprise and its mission-critical data.

What you need for this book

In order to perform the demo and examples within this book, a functional DPM installation 2012 SP1 is required. DPM SP1 is resource-intensive; in terms of storage, there are some areas in which you will need to have more than one server, especially when you are practicing the Cluster Shared Volume.

The configuration you decide to use will most likely need some type of virtualization software such as Hyper-V or VMware.

The following are the core software components that you will need to perform the demos and examples:

  • Windows Server 2008

  • Windows Server 2012

  • Exchange server 2012/2013

  • SQL Server 2008 R2 / 2012 in a cluster or mirroring scenario

  • SharePoint 2010/2013

  • File Server on Windows 2008 R2 / Windows 2012

  • Hyper-V 2012 in cluster or standalone mode

  • Reporting services 2008 R2

The book doesn't cover the installation of the workload that needs to be backed up by the DOM servers and nor does it cover troubleshooting the DPM installation. In order to know more about these tasks, refer to http://technet.com.

Conventions

In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Open the restored files and you will see a catalog with the structure name DPM_date_time."

A block of code is set as follows:

DECLARE @w int
SET @w = (SELECT [WorkHoursTransmissionRate] from tbl_AM_InstalledAgent WHERE InstallID = '2083CDAA-2872-4D2D-BAEA-ADF033021EB9′) 
DECLARE @n int
SET @n = (SELECT [NonWorkHoursTransmissionRate] from tbl_AM_InstalledAgent WHERE InstallID = '2083CDAA-2872-4D2D-BAEA-ADF033021EB9′) 
DECLARE @t nvarchar(max) 
SET @t = (SELECT [ThrottlingSettings] from tbl_AM_InstalledAgent WHERE InstallID = '2083CDAA-2872-4D2D-BAEA-ADF033021EB9′) 
UPDATE [DPMDB].[dbo].[tbl_AM_InstalledAgent] 
SET 
[IsThrottled] = 1 
,[WorkHoursTransmissionRate] = @w 
,[NonWorkHoursTransmissionRate] = @n 
,[ThrottlingSettings] = @t
GO

Any command-line input or output is written as follows:

start /wait setup.exe /i /f <path>\DPMsetup.ini /l <path>\dpmlog.txt

New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "In the Getting Started wizard, click on Chart Wizard."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.

To send us general feedback, simply send an e-mail to , and mention the book title via the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.

Piracy

Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors, and our ability to bring you valuable content.

Questions

You can contact us at if you are having a problem with any aspect of the book, and we will do our best to address it.