Microsoft Data Protection Manager 2010

Microsoft Data Protection Manager 2010
eBook: $35.99
Formats: PDF, PacktLib, ePub and Mobi formats
save 15%!
Print + free eBook + free PacktLib access to the book: $95.98    Print cover: $59.99
save 37%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Table of Contents
Sample Chapters
  • A step-by-step guide to backing up your business data using Microsoft Data Protection Manager 2010 in this practical book and eBook
  • Discover how to back up and restore Microsoft applications that are critical in many of today's businesses
  • Understand the various components and features of Data Protection Manager 2010
  • Gain valuable insight into using Data Protection Manager through the author's real world experience
  • The author, Steve Buchanan has contributed to a Microsoft Data Protection Manager 2010 poster which you can download here.

Book Details

Language : English
Paperback : 360 pages [ 235mm x 191mm ]
Release Date : May 2011
ISBN : 184968202X
ISBN 13 : 9781849682022
Author(s) : Steve Buchanan
Topics and Technologies : All Books, Enterprise Products and Platforms, Microsoft Other, Enterprise, Microsoft

Table of Contents

Chapter 1: DPM Overview
Chapter 2: Planning For Your Backup Needs
Chapter 3: Installation
Chapter 4: Configuration
Chapter 5: Administration
Chapter 6: Configuring DPM to Back Up Servers and Clients
Chapter 7: Backing Up Critical Applications
Chapter 8: Recovery Options
Chapter 9: Offsite, Cloud, Backup and Recovery
Chapter 10: DPM PowerShell
Chapter 11: Troubleshooting and Resources
  • Chapter 1: DPM Overview
    • What is DPM?
    • Cons of DPM
    • DPM pricing
    • DPM feature set
      • New features of DPM 2010
    • What makes DPM different from other back up solutions
    • Summary
    • Chapter 2: Planning For Your Backup Needs
      • Why back up?
      • Assessing your backup needs
        • What to back up?
        • Which media to use?
        • Capacity planning
        • Backup and restore time
        • Backup schedule
          • Local and offsite backup
      • Integrity of backups and testing restore
        • Data privacy and security
        • Policies and processes
      • Disaster Recovery
      • Planning DPM deployment
        • DPM backup and recovery goals
          • Protection Groups
          • Backup schedule and retention
          • Choosing media for DPM
          • Storage pools
          • Capacity planning
          • Other considerations
        • DPM server configuration
          • How many DPM servers?
          • Location of DPM servers
          • DPM SQL instance
          • DPM security
          • Antivirus on DPM server
          • Firewall ports
          • End-user recovery requirements
      • Summary
      • Chapter 3: Installation
        • Prerequisites
          • Hardware requirements
          • Software requirements
            • Operating system
            • Software
          • User privilege requirement
          • Restrictions
          • Single Instance Store
        • Installing Single Instance Store (SIS)
        • Installing DPM
          • Installing DPM using a local instance of SQL Server 2008
          • Installing DPM using a remote instance of SQL Server 2008
        • Migrating from DPM 2007 to DPM 2010
          • Upgrade process
          • The post-upgrade process
            • Upgrading a protection agent
        • Summary
        • Chapter 4: Configuration
          • Required configurations
            • Adding disks to the storage pool
            • Configuring tape libraries
            • The WSS Writer service
          • Optional configurations
            • Auto Discovery
              • Changing the Auto Discovery time
            • Throttle
            • Setting up an SMTP server
              • Configuring DPM to use your SMTP server
            • Configuring alert notifications
            • Publishing DPM alerts
            • Configuring DPM Management Shell
              • Installing the DPM Management Shell
            • Configuring DPM for End-user Recovery
              • Configuring Active Directory and enabling End-user Recovery in DPM
              • Manually prepare Active Directory for DPM
          • Summary
          • Chapter 5: Administration
            • DPM structure
              • DPM file locations
              • DPM processes
              • DPM processes that impact DPM performance
              • Important DPM terms
            • DPM Administrator Console
              • Menu
                • File
                • Action
                • View
                • Help
              • Navigation
                • Monitoring
                • Protection
                • Recovery
                • Reporting
                • Management
              • Display pane
              • Details pane
              • Information icon
              • Actions pane
            • DPM general maintenance
              • Restarting the DPM server
              • Running antivirus on a DPM server
              • Disk Defragmenter and Check Disk
              • Windows update on a DPM server
              • Moving DPM to a different SQL instance
              • Adding disks to the storage pool
              • Removing and replacing a disk in the storage pool
            • DPM reporting
              • Monitoring with reports and alert notifications
              • Displaying reports in DPM
            • Managing DPM performance
              • The pagefile on DPM
              • DPM performance monitors
              • Performance counters
                • Processor usage
                • Disk queue length
                • Memory usage
              • Ways to improve performance
            • Summary
            • Chapter 6: Configuring DPM to Back Up Servers and Clients
              • Configuring DPM backup on servers
                • Installing the DPM agent
                • Installing the DPM agent manually
                • Creating Protection Groups
                • Backing up System State
              • Protecting computers in workgroups and untrusted domains
              • Configuring DPM backup on clients
                • Configuring End-user Recovery
                  • Installing the DPM client
                  • Configuring clients in Protection Groups
              • Summary
                • Chapter 8: Recovery Options
                  • General recovery
                    • Recovery overview in the DPM Administrator Console
                    • Recovering files, folders, shares, and volumes
                    • Using self service recovery for end-users through the DPM client
                    • Recovering data using System State
                  • Bare Metal Backup and Recovery
                    • What is Bare Metal Backup and Recovery?
                    • How to perform a Bare Metal Recovery?
                      • Recovering BMR data in DPM
                      • Restoring BMR data on your server
                  • Restoring critical applications with DPM
                    • Restoring Exchange mailboxes with DPM
                      • Recovering mail in Exchange 2007
                      • Recovery in Exchange 2010
                    • Restoring Hyper-V virtual machines with DPM
                      • Recovery of a VM to its original location
                      • Recovery of a VM to an alternate location
                      • Item-level recovery of a Hyper-V VM
                    • Restoring SharePoint data with DPM
                      • Farm recovery
                      • Recovering sites, documents, and lists
                      • Item-level Recovery
                    • Restoring SQL databases with DPM
                      • SQL database recovery
                    • Configuring and using SQL self service recovery for SQL administrators
                      • Setting up self service recovery for SQL
                      • Recovering through self service recovery for SQL
                  • Summary
                  • Chapter 9: Offsite, Cloud, Backup and Recovery
                    • DPM offsite backup
                      • Disk-to-Disk-to-Tape
                      • Backing up DPM using a secondary DPM server
                      • Backing up DPM using third-party software
                        • Third-party tool that supports DPM
                        • Third-party tool that supports only VSS
                        • Third-party tool that does not support DPM or VSS
                        • Re-establishing protection after recovering the primary DPM server
                    • DPM cloud backup
                      • Iron Mountain CloudRecovery®
                        • Installing the agent
                        • Configuring the agent
                        • CloudRecovery and adding protected data
                        • Restoring data from the cloud
                      • i365 EVault
                        • EDPM installation
                        • EDPM agent installation
                        • EDPM administration
                        • Adding a Protection Set
                      • Recovery
                    • Summary
                    • Chapter 10: DPM PowerShell
                      • PowerShell
                        • Background of command line and scripting in Windows
                        • Basics of PowerShell
                          • Cmdlets
                          • Help
                          • Variables
                          • Pipeline
                          • Tab
                      • DPM Management Shell
                        • Overview of DMS
                        • DMS cmdlets
                        • DPM tasks and functions from the shell
                          • Library
                          • Disk management
                          • Protection
                          • Recovery
                          • Backup network
                          • Other
                        • DPM scripts
                        • Running pre-backup and post-backup scripts in DPM
                        • Overview of Opalis
                      • Summary
                      • Chapter 11: Troubleshooting and Resources
                        • Troubleshooting DPM
                          • Overview of DPM troubleshooting
                          • Troubleshooting DPM installation issues
                          • Troubleshooting agent installation issues
                          • Troubleshooting protected server issues
                          • Troubleshooting DPM client issues
                        • DPM resources
                          • Documentation
                          • List of DPM error codes
                          • List of DPM releases
                          • Forums
                          • Blogs
                          • Communities
                          • Training
                          • Other Tools
                        • Summary

                        Steve Buchanan

                        Steve Buchanan is an information technology professional with over 11 years of experience in systems administration of server and desktop environments. For many years Steve has worked with backup solutions and disaster recovery. Steve has an Associate of Arts degree as a Network Support Specialist and a Bachelor of Science degree in Information Technology. Steve holds the following certifications: A +, Linux +, MCSA, MCTS: (Hyper-V, SharePoint 2007, Exchange 2007, Vista). Steve currently is an IT Manager. Steve enjoys sharing his adventures and ideas about system administration through his blog at Steve is happily married and is a proud father of three boys.
                        Sorry, we don't have any reviews for this title yet.

                        Submit Errata

                        Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.


                        - 2 submitted: last submission 12 Dec 2013

                        Errata type: Others | Acknowledgement Page

                        The Acknowledgement should read as follows:

                        "First and foremost I want to give thanks to God for blessing me with the opportunity to write this book and work with a great group of people. Without God none of this would be possible. I want to thank my wife Ayasha and three sons Malcolm, Jalen, and Sean. My Dad, Mom, my brothers David, and Anthony, my cousin John and everyone else in my family. I also want to thank everyone that has supported the idea of me writing a book: Pastor Tim Jackson and the Men of Destiny, Zach Osiowhemu, Cesar Duran, Ngozika Okoye, Mike Foye, and Luke Grindahl.

                        I also want to give a big thanks to the Microsoft System Center and DPM MVP's that were involved with this project. Thanks to Islam Gomaa for connecting me with the right people during this project and writing that piece on Opalis and DPM on such a short notice. Thanks to Robert Hedblom for all your helpful insight in your reviews and positive feedback. Thanks to David Allen for your helpful feedback and contributing that piece on using Operations Manager with DPM. You guys were all a huge help and this project would not have gone as smoothly as it did without you.

                        I want to thank the team at Packt for working me through the production of this book. Thanks Kerry George and Alina Lewis for being patient with me and all my questions as a first time author. Thanks to Vishal Bodwani for helping me stay on track and be on time. Thanks to the rest of the team over at Packt.

                        Being around Microsoft MVP's and authors is inspirational and I want to thank Bill English, Todd Bleeker and Brian Alderman for inspiring me to write. Working for Mindsharp has been a great experience. Thanks to Russ Kaufmann. I learned a great deal about technology during my time working with you. I also want to thank Ben Curry for inspiring me to write as well and for being a great mentor.

                        Thank you to Gary Broadwater and Ken Galvin of Quest Software, Brendan Carr of Iron Mountain, Geralyn Miller and David Langdon of i365 and the rest of the vendors that gave me demos and answered all my questions about their products. Also a big thanks to Yegor Startsev and the entire DPM community!"


                        Errata type: Typo | Page number: 9 | Errata date: 30 December 2011

                        ""In DPM 2010. SRT is only used for BMR when protecting 2003 servers." should be ""In DPM 2010, SRT is only used for BMR when protecting 2003 servers." "


                        Sample chapters

                        You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

                        Frequently bought together

                        Microsoft Data Protection Manager 2010 +    Oracle JDeveloper 11gR2 Cookbook =
                        50% Off
                        the second eBook
                        Price for both: $51.15

                        Buy both these recommended eBooks together and get 50% off the cheapest eBook.

                        What you will learn from this book

                        • Learn how to develop a backup solution strategy
                        • Install, configure, and administer Data Protection Manager 2010 effectively
                        • Learn how to back up and perform bare metal recovery of Windows servers using Data Protection Manager
                        • Discover how to back up and restore critical Microsoft applications such as SharePoint, SQL, Hyper-V, Exchange, and ISA 2006
                        • Understand what is available for Data Protection Manager Offsite, cloud backup, and recovery options as well as how to configure them
                        • Master PowerShell to perform tasks with Data Protection Manager
                        • Troubleshoot common Data Protection Manager Problems
                        • Configure and use SQL service self-recovery
                        • Learn how to configure and use client protection in Data Protection Manager
                        • Protect clients and servers in untrusted domains or in workgroups

                        In Detail

                        Microsoft Data Protection Manager (DPM) 2010 is a backup and recovery solution that provides continuous data protection of the Windows environment and file servers to seamlessly integrated disk, tape, and cloud storage.

                        This practical, step-by-step tutorial will show you how to effectively back up your business data using Microsoft Data Protection Manager 2010 and how to plan, deploy, install, configure, and troubleshoot Microsoft Data Protection Manager 2010 as a standalone product. The book focuses on Microsoft best practices as well as the author's own real-world experience with Data Protection Manager.

                        The book starts by providing an overview of DPM and the relevant planning that is required for your backup needs, before moving on to installing DPM. Then it dives deep into topics such as DPM Administrator console and Task Areas, configuring DPM to function, configuring DPM backup on servers, backing up critical applications, recovery options, and DPM offsite backup and recovery, amongst others.

                        A practical guide to using Data Protection Manager 2010 as your backup and recovery solution


                        This book is a practical, step-by-step tutorial to planning deployment, installing, configuring, and troubleshooting Data Protection Manager 2010. It will take you through all the steps required to use DPM to effectively back up your business data.

                        Who this book is for

                        If you are a Network Administrator, System Administrator, Backup Administrator, Storage Administrator or IT consultant who wants to effectively back up your business data using Microsoft Data Protection Manager 2010, then this book is for you.

                        A good understanding of operating systems and backup devices and network administration is required. However, prior knowledge of Data Protection Manager is not necessary.

                        Code Download and Errata
                        Packt Anytime, Anywhere
                        Register Books
                        Print Upgrades
                        eBook Downloads
                        Video Support
                        Contact Us
                        Awards Voting Nominations Previous Winners
                        Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
                        Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software