U ft i V F_ R S! T A TS BIB L! MAMMOVER OTHEK J Microsoft System Center Data Protection Manager 2012 SP1 Learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 Steve Buchanan Islam Gomaa Robert Hedblom Flemming Riis PUBLISHING BIRMINGHAM - MUMBAI TIB/UB Hannover Table of Contents Preface 1 Chapter 1: What is Data Protection Manager? Planning for your DPM deployment Hardware requirements 7 Minimum The 9 9 10 applications Exchange 8 9 requirements Recommended requirements Limitations of DPM The Windows 8 10 server The SQL Server 10 SharePoint 11 Virtual 11 platforms The Windows clients 11 The system state 11 The DPM disk pool The RAID levels for the disk pool 11 12 Software controllers versus hardware controllers The sector size 13 The custom volumes Deduplication Dependent services, 13 14 14 local accounts, Services 14 15 DPM The DPM and groups 15 service AccessManager Agent Coordinator service DPM CPWrapper service 15 The DPM 15 The 15 The DPM Writer service 15 The DPM LA service 16 The DPMRA service 16 Local accounts and groups 16 Table of Contents Volume Shadow The creation of Copy Services (VSS) shadow copy a shadow copy How does the DPM agent operate? a A different creation of Distributed Component Object Model (DCOM) 17 18 19 19 19 Direction of communication 20 The Firewall 20 settings for DPM 21 Underlying technologies Change Journal 21 The File System filter The DPM File filter A GUI The 21 21 walkthrough Navigation bar 21 22 Monitoring 22 Protection 24 Recovery Reporting Management Additional functions and roles within DPM 26 27 28 28 End-user Restore 28 DPM Self-service 29 Recovery (EUR) Recovery Tool (SSRT) Single Instance Storage (SIS) PSDataSourceConfig.XML Troubleshooting backups The local Windows logs Troubleshooting VSS The DPM agent logs The DPM Upgrading server 29 30 31 31 31 31 32 logs scenarios 32 33 Summary Chapter 2: Backup Strategies 35 The definition of data 36 Microsoft's approach Agreements Recovery Point Objectives, Recovery Time Objectives, and Recovery 36 Service License 37 Level 37 Objectives Recovery Point Objectives (RPO) Recovery Time Objectives (RTO) Recovery Level Objectives (RLO) What data should we back up? 38 38 38 38 Initial tasks Server 39 42 technologies [H] Table of Contents Windows workload protection group design Enterprise protection group design The primary approach Non-Windows Generic data application source the 42 42 44 44 servers 44 protection Local services 44 The Windows workloads 45 The next step 45 Protection group names Member of the protection group 45 46 Verification of your backups Restore 46 training 46 The verification process 47 Summary Chapter 3: PPM Server Management Tasks 47 49 Automated installation of DPM Migrating a DPM server to a new 49 hardware 50 How to calculate storage for DPM Creating custom reports in DPM DPM Report Building a 51 52 Views 53 custom DPM Create custom DPM 53 report reports using Prism for DPM Changing the SQL Server instance used by DPM Moving the DPM server to a new domain or renaming Adding disks to the storage pool Removing a disk from the storage pool Replacing a disk in the storage pool 57 59 a DPM server DPM network bandwidth and control traffic Enabling Enabling the the network-bandwidth-usage throttling network-bandwidth-usage throttling for multiple DPM agents 60 60 61 63 64 64 at 65 once with DPM SQL self-service Working Working with third-party Summary tools to deduplicate DPM data Chapter 4: Monitoring and Managing the Performance of DPM 67 70 72 73 Publishing the DPM event logs Monitoring DPM with SCOM Monitoring DPM without SCOM Using the new DPM central console 73 Installing the DPM central console 81 Overview of the DPM Central Console 84 75 77 80 Table of Contents Configuring remote administration of DPM Configuring and using role-based access in Summary 91 94 DPM 97 99 Chapter 5: Workload Protection Working with BMR and troubleshooting common issues in DPM Supported operating systems How to backup Performing BMR files 101 104 BMR Working with system state protection common 100 101 a BMR restore Troubleshooting 100 and troubleshooting 105 issues in DPM state from the DPM system Restoring Using the wbadmin tool Protecting Domain Controllers Restoring Active Directory Working with the Active Directory Recycle Bin Generic data source protection in DPM 106 Non-Microsoft workload protection in DPM Protecting Oracle with DPM 110 the server 107 108 108 109 110 using RMAN and pre/post scripts with Oracle as a generic data source with DPM Protecting Linux with DPM Protecting Protecting 106 Oracle 111 DPM 111 112 non-domain/workgroup computers with DPM Protecting Summary Chapter 6: DPM-aware Windows Workload Protection Protecting SQL with 121 125 SQL self-service recovery recovery in DPM the DPM self-service recovery tool 125 Configuring self-service (SSRT) on a client computer protect multi-tenancy SharePoint How to protect RBS with DPM How to a protect claims 133 deployment 136 137 137 138 138 138 Configure Exchange protection agent deployment 130 authentication with DPM protect search with DPM Protecting Exchange with DPM How to DPM 128 129 Protecting SharePoint with DPM Configuring SharePoint protection Protecting all SharePoint components How to 117 120 AlwaysOn Remote SQL Server 2012 SP1 Installing 116 118 DPM Protect SQL Server 2012 113 139 considerations 139 DAG clusters [iv] Table Specifying the Exchange protection options Specifying the DAG protection Restore Exchange mailboxes server mailboxes Recovering Exchange How to protect multi-tenancy Exchange deployment technique of Exchange protection Protecting Hyper-V with DPM Configuring Hyper-V protection with DPM Protecting Hyper-V from DPM running in Hyper-V How Hyper-V ILR works with DPM Hyper-V 3.0 Clustered Shared Volume (CSV) 2.0 Protection of Hyper-V servers using SMB and Hyper-V Replica a BMR protection Exchange 2013 Unsupported scenarios for SMB DPM scale-out Enabling protection protection deduplicated volumes file server clusters 140 141 141 142 142 142 143 143 144 144 145 147 149 149 149 150 150 150 Planned failover for file clusters the 140 140 145 Recovering volumes with deduplication Protecting Resilient File System Protecting CSV 2 Protecting Windows Clusters with DPM Protecting 139 146 the scale-out Protecting of Contents 150 151 Changing Protecting DHCP clusters resource group 151 152 Summary Chapter 7: DPM Non-aware Windows Workload Protection Protecting DFS with DPM Protecting Dynamics CRM with DPM Protecting Dynamics GP with DPM 153 154 155 157 Protecting TMG 2010 with DPM 158 How to protect IIS 171 Protecting Lync Summary 2010 with DPM 173 174 Chapter 8: Managing Tapes in DPM How DPM manages 175 tapes How DPM writes information to Tape information Basic tape management tasks Tape commands for DPM Tape library commands 175 tape 175 176 for DPM 177 178 178 Table of Contents Protection 180 Group configuration 180 Specify long-term goals Select library and tape details Co-location of data Co-locating on tape and 183 185 tape upgrading Standalone tape drives and 187 DPM tape 187 libraries 188 Standalone tape drives Tape libraries Virtual 188 188 Tape Library (VTL) 188 Firestreamer Tape Library Sharing (TLS) Tape reports 189 Summary 190 189 Chapter 9: Client Protection in DPM Creating a plan for backing up end Plan for off-site end user user 191 192 data 194 backup Configuring DPM and Active Directory for end user protection Manually preparing Active Directory for DPM Installing the agent automatically and manually on a 197 201 204 client computer Automatic install 204 Manual install 207 Scripted 208 install Performing image-level backups of client computers with DPM Other resources Setting for DPM client size restrictions Allow non-admin DPM protection protection perform end user recovery of on users to client data 10: Workgroups 215 215 215 protected Client Auto Deployment Management pack Summary Chapter 209 216 216 and Untrusted Domains 217 Supported and not supported workgroup/untrusted domain 218 protection Using certificate-based authentication with the DPM protection 219 Setting up and working with Local accounts or trusts 221 DPM workgroup protection in DPM 221 222 Agent Protection across Configuring and trusted domains protecting and untrusted domains machines in 222 workgroups 222 Table of Contents 223 Communication Host files 223 DNS 223 Firewall 224 225 VPN Agent Installing configuring Protecting the domain controller in an untrusted domain 226 Protection in DMZ 231 and the DPM Troubleshooting common issues with protection of workgroups 232 and untrusted domains 232 Summary Chapter 11: Disaster Recovery The purpose of The Active a 233 233 disaster recovery design 234 Directory domain The Data Protection Manager 231 234 server Databases 234 Short-term storage 234 Long-term storage 234 Public 235 Key Infrastructure Windows Azure 235 passphrase Recovering your organization's data when the left is only thing 235 backup tapes Protecting the Data Protection Manager database 240 Planning and implementing DPM chaining Planning and implementing cyclic protection 243 Off-site DPM 249 strategies 248 secondary DPM server Backing up to the cloud 249 VTL to external drives 254 Alternative off-site 257 The Protecting 250 options DPM with third-party software 258 Backup network design providers supported Using beyond Summary Chapter 12: DPM PowerShell, Automation, and Private Cloud DPM the 257 cloud Connecting to DPM through remote PowerShell Using PowerShell ISE to work with DPM cmdlets Automating DPM in your private cloud DPM and private cloud Automating DPM using Orchestrator DPM and System Center Configuration Manager 260 264 265 266 274 276 276 278 287 Table of Contents Deploying the Summary Index DPM Remote Administration console via SCCM 288 294 295
© Copyright 2024