Book Image

Microsoft System Center Data Protection Manager Cookbook

By : Charbel Nemnom, Patrick Lownds
Book Image

Microsoft System Center Data Protection Manager Cookbook

By: Charbel Nemnom, Patrick Lownds

Overview of this book

System Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data. With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM. This book starts by helping you install SCDPM and then moves on to post-installation and management tasks. You will come across a lot of useful recipes that will help you recover your VMware and Hyper-V VMs. It will also walk you through tips for monitoring SCDPM in different scenarios. Next, the book will also offer insights into protecting windows workloads followed by best practices on SCDPM. You will also learn to back up your Azure Stack Infrastructure using Azure Backup. You will also learn about recovering data from backup and implementing disaster recovery. Finally, the book will show you how to configure the protection groups to enable online protection and troubleshoot Microsoft Azure Backup Agent.
Table of Contents (17 chapters)
Title Page
Dedication
About Packt
Contributors
Preface
Index

Introduction


System Center Data Protection Manager (SCDPM) supports the protection of computers in workgroups and untrusted domains using local user accounts (NTLM authentication); however, local accounts increase security risks for attack and are not allowed in most organizations and, therefore, this solution does not work. As an alternative, starting with DPM 2012 and later versions, you can use certificates to authenticate computers in workgroups or untrusted domains.

This chapter describes how to set up DPM protection with NTLM authentication as well as certificate-based authentication to protect computers in workgroups or untrusted domains.