Microsoft Data Protection Manager (DPM) 2012 SP1 is a protection and recovery solution, which provides continuous data protection for Windows application and file servers to seamlessly integrated disk, tape, and cloud.
This book includes deep dive contributions from seven experienced System Center MVPs, with hands-on and real-life experience in deploying, managing, and configuring DPM. This book will show you how to effectively plan and deploy DPM and how to effectively back up your business-critical data using Microsoft DPM 2012 SP1. This book will focus on Microsoft's best practices as well as the authors' own real-world experience.
Chapter 1, What is Data Protection Manager?, will give you an overview on System Center Data Protection Manager (SCDPM), what it is, and how it works using underlying components in the operating system such as VSS and PowerShell.
Chapter 2, Backup Strategies, will help you understand protection planning and show you how to create a backup and custom recovery strategy for your own enterprise.
Chapter 3, DPM Server Management Tasks, will provide guidance on how to manage your DPM server, including the most common DPM management task and DPM third-party add-ons.
Chapter 4, Monitoring and Managing Performance of DPM, will help you in monitoring your DPM server using standard Windows tools as well as operation manager.
Chapter 5, Workload Protection, will cover an introduction on how to protect Microsoft workloads using DPM with a workaround on how to back up non-Microsoft workloads.
Chapter 6, DPM-aware Windows Workload Protection, will cover how DPM is aware of certain workloads and how it protects and recovers these workloads.
Chapter 7, DPM Non-aware Windows Workload Protection, will cover how DPM can protect and recover some non-Microsoft workloads.
Chapter 8, Managing Tapes in DPM, will help you understand how DPM manages tapes and how it will write data to a tape using different recovery goals.
Chapter 9, Client Protection in DPM, will cover how DPM can protect trusted clients, off-site protection, and the challenges that this presents.
Chapter 10, Workgroups and Untrusted Domains, will focus on how DPM can protect untrusted and workgroup clients using various authentication methods.
Chapter 11, Disaster Recovery, will look at the steps we need to take to ensure that we can always recover our organization's data, even if multiple events occurs at the same time.
Chapter 12, DPM PowerShell, Automation, and Private Cloud, will cover DPM and PowerShell along with some new cmdlets, using PowerShell ISE with DPM. It will also help you understand DPM's role in private cloud, automating DPM with System Center Orchestrator, and how to deploy the DPM Remote Administration console via SCCM.
This book is for IT professionals who are looking to expand their knowledge on how to use and monitor DPM to protect their enterprise and its mission-critical data.
In order to perform the demo and examples within this book, a functional DPM installation 2012 SP1 is required. DPM SP1 is resource-intensive; in terms of storage, there are some areas in which you will need to have more than one server, especially when you are practicing the Cluster Shared Volume.
The configuration you decide to use will most likely need some type of virtualization software such as Hyper-V or VMware.
The following are the core software components that you will need to perform the demos and examples:
Windows Server 2008
Windows Server 2012
Exchange server 2012/2013
SQL Server 2008 R2 / 2012 in a cluster or mirroring scenario
SharePoint 2010/2013
File Server on Windows 2008 R2 / Windows 2012
Hyper-V 2012 in cluster or standalone mode
Reporting services 2008 R2
The book doesn't cover the installation of the workload that needs to be backed up by the DOM servers and nor does it cover troubleshooting the DPM installation. In order to know more about these tasks, refer to http://technet.com.
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Open the restored files and you will see a catalog with the structure name DPM_date_time
."
A block of code is set as follows:
DECLARE @w int SET @w = (SELECT [WorkHoursTransmissionRate] from tbl_AM_InstalledAgent WHERE InstallID = '2083CDAA-2872-4D2D-BAEA-ADF033021EB9′) DECLARE @n int SET @n = (SELECT [NonWorkHoursTransmissionRate] from tbl_AM_InstalledAgent WHERE InstallID = '2083CDAA-2872-4D2D-BAEA-ADF033021EB9′) DECLARE @t nvarchar(max) SET @t = (SELECT [ThrottlingSettings] from tbl_AM_InstalledAgent WHERE InstallID = '2083CDAA-2872-4D2D-BAEA-ADF033021EB9′) UPDATE [DPMDB].[dbo].[tbl_AM_InstalledAgent] SET [IsThrottled] = 1 ,[WorkHoursTransmissionRate] = @w ,[NonWorkHoursTransmissionRate] = @n ,[ThrottlingSettings] = @t GO
Any command-line input or output is written as follows:
start /wait setup.exe /i /f <path>\DPMsetup.ini /l <path>\dpmlog.txt
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "In the Getting Started wizard, click on Chart Wizard."
Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.
To send us general feedback, simply send an e-mail to <[email protected]>
, and mention the book title via the subject of your message.
If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.
Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.
Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.
Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.
Please contact us at <[email protected]>
with a link to the suspected pirated material.
We appreciate your help in protecting our authors, and our ability to bring you valuable content.
You can contact us at <[email protected]>
if you are having a problem with any aspect of the book, and we will do our best to address it.