System Manager Microsoft Center

U ft i V F_ R S! T A TS BIB L!
MAMMOVER
OTHEK
J
Microsoft
System Center Data
Protection Manager 2012 SP1
Learn how to
deploy, monitor, and administer System
Center Data Protection Manager 2012 SP1
Steve Buchanan
Islam Gomaa
Robert Hedblom
Flemming Riis
PUBLISHING
BIRMINGHAM
-
MUMBAI
TIB/UB Hannover
Table of Contents
Preface
1
Chapter 1: What is Data Protection Manager?
Planning for your DPM deployment
Hardware requirements
7
Minimum
The
9
9
10
applications
Exchange
8
9
requirements
Recommended requirements
Limitations of DPM
The Windows
8
10
server
The SQL Server
10
SharePoint
11
Virtual
11
platforms
The Windows clients
11
The system state
11
The DPM disk pool
The RAID levels for the disk pool
11
12
Software controllers versus hardware controllers
The sector size
13
The custom volumes
Deduplication
Dependent services,
13
14
14
local
accounts,
Services
14
15
DPM
The DPM
and groups
15
service
AccessManager
Agent Coordinator service
DPM CPWrapper service
15
The DPM
15
The
15
The DPM Writer service
15
The DPM LA service
16
The DPMRA service
16
Local accounts and groups
16
Table of Contents
Volume Shadow
The creation of
Copy Services (VSS)
shadow copy
a shadow copy
How does the DPM agent operate?
a
A different creation of
Distributed
Component Object Model (DCOM)
17
18
19
19
19
Direction of communication
20
The Firewall
20
settings for DPM
21
Underlying technologies
Change
Journal
21
The File System filter
The DPM File filter
A GUI
The
21
21
walkthrough
Navigation bar
21
22
Monitoring
22
Protection
24
Recovery
Reporting
Management
Additional functions and roles within DPM
26
27
28
28
End-user Restore
28
DPM Self-service
29
Recovery (EUR)
Recovery Tool (SSRT)
Single Instance Storage (SIS)
PSDataSourceConfig.XML
Troubleshooting backups
The local Windows logs
Troubleshooting VSS
The DPM agent logs
The DPM
Upgrading
server
29
30
31
31
31
31
32
logs
scenarios
32
33
Summary
Chapter 2: Backup Strategies
35
The definition of data
36
Microsoft's
approach
Agreements
Recovery Point Objectives, Recovery Time Objectives, and Recovery
36
Service License
37
Level
37
Objectives
Recovery Point Objectives (RPO)
Recovery Time Objectives (RTO)
Recovery Level Objectives (RLO)
What data should we back up?
38
38
38
38
Initial tasks
Server
39
42
technologies
[H]
Table
of Contents
Windows workload
protection group design
Enterprise protection group design
The primary approach
Non-Windows
Generic data
application
source
the
42
42
44
44
servers
44
protection
Local services
44
The Windows workloads
45
The next step
45
Protection group names
Member of the protection group
45
46
Verification of your backups
Restore
46
training
46
The verification process
47
Summary
Chapter 3: PPM Server Management Tasks
47
49
Automated installation of DPM
Migrating
a
DPM
server to a new
49
hardware
50
How to calculate storage for DPM
Creating custom reports in DPM
DPM
Report
Building
a
51
52
Views
53
custom DPM
Create custom DPM
53
report
reports using
Prism for DPM
Changing the SQL Server instance used by DPM
Moving the DPM server to a new domain or renaming
Adding disks to the storage pool
Removing a disk from the storage pool
Replacing a disk in the storage pool
57
59
a
DPM
server
DPM network bandwidth and control traffic
Enabling
Enabling
the
the
network-bandwidth-usage throttling
network-bandwidth-usage throttling for multiple DPM agents
60
60
61
63
64
64
at
65
once
with DPM SQL self-service
Working
Working with third-party
Summary
tools to
deduplicate DPM data
Chapter 4: Monitoring and Managing the Performance of DPM
67
70
72
73
Publishing the DPM event logs
Monitoring DPM with SCOM
Monitoring DPM without SCOM
Using the new DPM central console
73
Installing the DPM central console
81
Overview of the DPM Central Console
84
75
77
80
Table of Contents
Configuring remote administration of DPM
Configuring and using role-based access in
Summary
91
94
DPM
97
99
Chapter 5: Workload Protection
Working with BMR and troubleshooting common issues in DPM
Supported operating systems
How to
backup
Performing
BMR files
101
104
BMR
Working with system state protection
common
100
101
a BMR restore
Troubleshooting
100
and
troubleshooting
105
issues in DPM
state from the DPM
system
Restoring
Using the wbadmin tool
Protecting Domain Controllers
Restoring Active Directory
Working with the Active Directory Recycle Bin
Generic data source protection in DPM
106
Non-Microsoft workload protection in DPM
Protecting Oracle with DPM
110
the
server
107
108
108
109
110
using RMAN and pre/post scripts with
Oracle as a generic data source with DPM
Protecting Linux with DPM
Protecting
Protecting
106
Oracle
111
DPM
111
112
non-domain/workgroup computers with DPM
Protecting
Summary
Chapter 6: DPM-aware Windows Workload Protection
Protecting SQL with
121
125
SQL self-service recovery
recovery in DPM
the DPM self-service recovery tool
125
Configuring self-service
(SSRT)
on a
client
computer
protect multi-tenancy SharePoint
How to protect RBS with DPM
How to
a
protect claims
133
deployment
136
137
137
138
138
138
Configure Exchange protection
agent deployment
130
authentication with DPM
protect search with DPM
Protecting Exchange with DPM
How to
DPM
128
129
Protecting SharePoint with DPM
Configuring SharePoint protection
Protecting all SharePoint components
How to
117
120
AlwaysOn
Remote SQL Server 2012 SP1
Installing
116
118
DPM
Protect SQL Server 2012
113
139
considerations
139
DAG clusters
[iv]
Table
Specifying the Exchange protection options
Specifying the DAG protection
Restore Exchange mailboxes
server mailboxes
Recovering Exchange
How to
protect
multi-tenancy Exchange deployment
technique of Exchange
protection
Protecting Hyper-V with DPM
Configuring Hyper-V protection with DPM
Protecting Hyper-V from DPM running in Hyper-V
How Hyper-V ILR works with DPM
Hyper-V 3.0
Clustered Shared Volume (CSV) 2.0
Protection of Hyper-V servers using SMB and Hyper-V Replica
a
BMR protection
Exchange 2013
Unsupported scenarios for SMB
DPM scale-out
Enabling
protection
protection
deduplicated volumes
file
server
clusters
140
141
141
142
142
142
143
143
144
144
145
147
149
149
149
150
150
150
Planned failover for file clusters
the
140
140
145
Recovering volumes with deduplication
Protecting Resilient File System
Protecting CSV 2
Protecting Windows Clusters with DPM
Protecting
139
146
the scale-out
Protecting
of Contents
150
151
Changing
Protecting DHCP clusters
resource group
151
152
Summary
Chapter 7: DPM Non-aware Windows Workload Protection
Protecting DFS with DPM
Protecting Dynamics CRM with DPM
Protecting Dynamics GP with DPM
153
154
155
157
Protecting TMG 2010 with DPM
158
How to protect IIS
171
Protecting Lync
Summary
2010 with DPM
173
174
Chapter 8: Managing Tapes in DPM
How DPM manages
175
tapes
How DPM writes information to
Tape information
Basic tape management tasks
Tape commands for DPM
Tape library commands
175
tape
175
176
for DPM
177
178
178
Table of Contents
Protection
180
Group configuration
180
Specify long-term goals
Select library and tape details
Co-location of data
Co-locating
on
tape and
183
185
tape
upgrading
Standalone tape drives and
187
DPM
tape
187
libraries
188
Standalone tape drives
Tape libraries
Virtual
188
188
Tape Library (VTL)
188
Firestreamer
Tape Library Sharing (TLS)
Tape reports
189
Summary
190
189
Chapter 9: Client Protection in DPM
Creating
a
plan for backing up end
Plan for off-site end
user
user
191
192
data
194
backup
Configuring DPM and Active Directory for end user protection
Manually preparing Active Directory for DPM
Installing the agent automatically and manually
on a
197
201
204
client computer
Automatic install
204
Manual install
207
Scripted
208
install
Performing image-level backups of client computers with DPM
Other
resources
Setting
for DPM client
size restrictions
Allow non-admin
DPM
protection
protection
perform end user recovery of
on
users to
client
data
10:
Workgroups
215
215
215
protected
Client Auto Deployment Management pack
Summary
Chapter
209
216
216
and Untrusted Domains
217
Supported and not supported workgroup/untrusted
domain
218
protection
Using certificate-based authentication with the DPM protection
219
Setting up and working with
Local accounts or trusts
221
DPM
workgroup protection
in DPM
221
222
Agent
Protection
across
Configuring
and
trusted domains
protecting
and untrusted domains
machines in
222
workgroups
222
Table
of Contents
223
Communication
Host files
223
DNS
223
Firewall
224
225
VPN
Agent
Installing
configuring
Protecting the domain controller in an untrusted domain
226
Protection in DMZ
231
and
the DPM
Troubleshooting
common
issues with
protection of workgroups
232
and untrusted domains
232
Summary
Chapter 11: Disaster Recovery
The purpose of
The Active
a
233
233
disaster recovery design
234
Directory domain
The Data Protection
Manager
231
234
server
Databases
234
Short-term storage
234
Long-term storage
234
Public
235
Key Infrastructure
Windows Azure
235
passphrase
Recovering your organization's data when the
left is
only thing
235
backup tapes
Protecting
the Data Protection
Manager
database
240
Planning and implementing DPM chaining
Planning and implementing cyclic protection
243
Off-site DPM
249
strategies
248
secondary DPM server
Backing up to the cloud
249
VTL to external drives
254
Alternative off-site
257
The
Protecting
250
options
DPM with
third-party software
258
Backup network design
providers
supported
Using
beyond
Summary
Chapter 12: DPM PowerShell, Automation, and Private Cloud
DPM
the
257
cloud
Connecting to DPM through remote PowerShell
Using PowerShell ISE to work with DPM cmdlets
Automating DPM in your private cloud
DPM and private cloud
Automating DPM using Orchestrator
DPM and System Center Configuration Manager
260
264
265
266
274
276
276
278
287
Table of Contents
Deploying the
Summary
Index
DPM Remote Administration console via SCCM
288
294
295