Cover image for Microsoft System Center Data Protection Manager 2012.
Microsoft System Center Data Protection Manager 2012.
Title:
Microsoft System Center Data Protection Manager 2012.
Author:
Buchannan, Steve.
ISBN:
9781849686310
Personal Author:
Physical Description:
1 online resource (381 pages)
Contents:
Microsoft System Center Data Protection Manager 2012 SP1 -- Table of Contents -- Microsoft System Center Data Protection Manager 2012 SP1 -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Instant Updates on New Packt Books -- Preface -- What this book covers -- Who this book is for -- What you need for this book -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- 1. What is Data Protection Manager? -- Planning for your DPM deployment -- Hardware requirements -- Minimum requirements -- Recommended requirements -- Limitations of DPM -- The Windows applications -- The Exchange server -- The SQL Server -- SharePoint -- Virtual platforms -- The Windows clients -- The system state -- The DPM disk pool -- The RAID levels for the disk pool -- Software controllers versus hardware controllers -- The sector size -- The custom volumes -- Deduplication -- Dependent services, local accounts, and groups -- Services -- DPM -- The DPM AccessManager service -- The DPM Agent Coordinator service -- The DPM CPWrapper service -- The DPM Writer service -- The DPMLA service -- The DPMRA service -- Local accounts and groups -- Volume Shadow Copy Services (VSS) -- The creation of a shadow copy -- A different creation of a shadow copy -- How does the DPM agent operate? -- Distributed Component Object Model (DCOM) -- Direction of communication -- The firewall settings for DPM -- Underlying technologies -- Change Journal -- The File System filter -- The DPM File filter -- A GUI walkthrough -- The Navigation bar -- Monitoring -- Alerts -- Jobs -- Protection -- Facets pane -- Ribbons -- On-the-wire -- Resume backups -- Recovery -- Reporting -- Management -- Additional functions and roles within DPM.

End-user Restore Recovery (EUR) -- DPM Self-service Recovery Tool (SSRT) -- Single Instance Storage (SIS) -- PSDataSourceConfig.XML -- Troubleshooting backups -- The local Windows logs -- Troubleshooting VSS -- The DPM agent logs -- The DPM server logs -- Upgrading scenarios -- Summary -- 2. Backup Strategies -- The definition of data -- Microsoft's approach -- Service Level Agreements -- Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives -- Recovery Point Objectives (RPO) -- Recovery Time Objectives (RTO) -- Recovery Level Objectives (RLO) -- What data should we back up? -- Initial tasks -- Server technologies -- Windows workload protection group design -- Enterprise protection group design -- The Platinum class -- The Gold class -- The Silver class -- The Bronze class -- The primary approach -- Non-Windows application servers -- Generic data source protection -- Local services -- The Windows workloads -- The next step -- Protection group names -- Member of the protection group -- Verification of your backups -- Restore training -- The verification process -- Summary -- 3. DPM Server Management Tasks -- Automated installation of DPM -- Migrating a DPM server to a new hardware -- How to calculate storage for DPM -- Creating custom reports in DPM -- DPM Report Views -- Building a custom DPM report -- Create custom DPM reports using Prism for DPM -- Changing the SQL Server instance used by DPM -- Moving the DPM server to a new domain or renaming a DPM server -- Adding disks to the storage pool -- Removing a disk from the storage pool -- Replacing a disk in the storage pool -- DPM network bandwidth and control traffic -- Enabling the network-bandwidth-usage throttling -- Enabling the network-bandwidth-usage throttling for multiple DPM agents at once -- Working with DPM SQL self-service.

Working with third-party tools to deduplicate DPM data -- Summary -- 4. Monitoring and Managing the Performance of DPM -- Publishing the DPM event logs -- Monitoring DPM with SCOM -- Monitoring DPM without SCOM -- Using the new DPM central console -- Installing the DPM central console -- Overview of the DPM central console -- Configuring remote administration of DPM -- Configuring and using role-based access in DPM -- Summary -- 5. Workload Protection -- Working with BMR and troubleshooting common issues in DPM -- Supported operating systems -- How to backup BMR files -- Performing a BMR restore -- Troubleshooting BMR -- Working with system state protection and troubleshooting common issues in DPM -- Restoring the system state from the DPM server -- Using the wbadmin tool -- Protecting the domain controllers -- Restoring Active Directory -- Working with the Active Directory Recycle Bin -- Generic data source protection in DPM -- Non-Microsoft workload protection in DPM -- Protecting Oracle with DPM -- Protecting Oracle using RMAN and pre/post scripts with DPM -- Protecting Oracle as a generic data source with DPM -- Protecting Linux with DPM -- Protecting non-domain/workgroup computers with DPM -- Summary -- 6. DPM-aware Windows Workload Protection -- Protecting SQL with DPM -- Protect SQL Server 2012 AlwaysOn -- Remote SQL Server 2012 SP1 -- SQL self-service recovery -- Configuring self-service recovery in DPM -- Installing the DPM self-service recovery tool (SSRT) on a client computer -- Protecting SharePoint with DPM -- Configuring SharePoint protection -- Protecting all SharePoint components -- How to protect a multi-tenancy SharePoint deployment -- How to protect RBS with DPM -- How to protect claims authentication with DPM -- How to protect search with DPM -- Protecting Exchange with DPM -- Configure Exchange protection.

DPM agent deployment considerations -- DAG clusters -- Specifying the Exchange protection options -- Exchange maintenance -- Specifying the DAG protection -- Restore Exchange mailboxes -- Recovering Exchange server mailboxes -- How to protect a multi-tenancy Exchange deployment -- BMR protection technique of Exchange -- Exchange 2013 protection -- Protecting Hyper-V with DPM -- Configuring Hyper-V protection with DPM -- Protecting Hyper-V from DPM running in Hyper-V -- How Hyper-V ILR works with DPM -- Hyper-V 3.0 -- Clustered Shared Volume (CSV) 2.0 -- Protection of Hyper-V servers using SMB and Hyper-V Replica -- Unsupported scenarios for SMB -- DPM scale-out protection -- Enabling the scale-out protection -- Protecting deduplicated volumes -- Recovering volumes with deduplication -- Protecting Resilient File System -- Protecting CSV 2 -- Protecting Windows Clusters with DPM -- Protecting file server clusters -- Planned failover for file clusters -- Changing the resource group -- Protecting DHCP clusters -- Summary -- 7. DPM Non-aware Windows Workload Protection -- Protecting DFS with DPM -- Protecting Dynamics CRM with DPM -- Protecting Dynamics GP with DPM -- Protecting TMG 2010 with DPM -- How to protect IIS -- Protecting Lync 2010 with DPM -- Summary -- 8. Managing Tapes in DPM -- How DPM manages tapes -- How DPM writes information to tape -- Tape information -- Basic tape management tasks for DPM -- Tape commands for DPM -- Tape library commands -- Inventory library -- Rescan -- Refresh -- Unlock library door -- Rename library… -- Disable library -- Add tape (I/E port)… -- Clean -- Disable -- Protection group configuration -- Specify long-term goals -- Select library and tape details -- Co-location of data on tape -- Co-locating tape and upgrading DPM -- Standalone tape drives and tape libraries -- Standalone tape drives -- Tape libraries.

Virtual Tape Library (VTL) -- Firestreamer -- Tape Library Sharing (TLS) -- Tape reports -- Summary -- 9. Client Protection in DPM -- Creating a plan for backing up end user data -- Plan for off-site end user backup -- Configuring DPM and Active Directory for end user protection -- Manually preparing Active Directory for DPM -- Installing the agent automatically and manually on a client computer -- Automatic install -- Manual install -- Scripted install -- Performing image-level backups of client computers with DPM -- Other resources for DPM client protection -- Setting size restrictions on client protection -- Allow non-admin users to perform end user recovery of DPM protected data -- Client Auto Deployment Management pack -- Summary -- 10. Workgroups and Untrusted Domains -- Supported and not supported workgroup/untrusted domain protection -- Using certificate-based authentication with the DPM protection -- Setting up and working with workgroup protection in DPM -- Local accounts or trusts -- DPM agent -- Protection across trusted domains -- Configuring and protecting machines in workgroups and untrusted domains -- Communication -- Host files -- DNS -- Firewall -- VPN -- Installing and configuring the DPM agent -- Protecting the domain controller in an untrusted domain -- Protection in DMZ -- Troubleshooting common issues with protection of workgroups and untrusted domains -- Summary -- 11. Disaster Recovery -- The purpose of a disaster recovery design -- The Active Directory domain -- The Data Protection Manager server -- Databases -- Short-term storage -- Long-term storage -- Public Key Infrastructure -- Windows Azure passphrase -- Recovering your organization's data when the only thing left is backup tapes -- Protecting the Data Protection Manager database -- Planning and implementing DPM chaining -- Planning and implementing cyclic protection.

Off-site DPM strategies.
Abstract:
This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization's data.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: