Microsoft System Center Data Protection Manager 2012 SP1


Microsoft System Center Data Protection Manager 2012 SP1
eBook: $29.99
Formats: PDF, PacktLib, ePub and Mobi formats
$25.49
save 15%!
Print + free eBook + free PacktLib access to the book: $79.98    Print cover: $49.99
$49.99
save 37%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Support
Sample Chapters
  • Practical guidance that will help you get the most out of Microsoft System Center Data Protection Manager 2012
  • Gain insight into deploying, monitoring, and administering System Center Data Protection Manager 2012 from a team of Microsoft MVPs
  • Learn the various methods and best practices for administrating and using Microsoft System Center Data Protection Manager 2012

Book Details

Language : English
Paperback : 328 pages [ 235mm x 191mm ]
Release Date : June 2013
ISBN : 1849686300
ISBN 13 : 9781849686303
Author(s) : Steve Buchanan, Robert Hedblom, Islam Gomaa, Flemming Riis
Topics and Technologies : All Books, Data, Enterprise Products and Platforms, Microsoft Servers, Enterprise, Microsoft

Table of Contents

Preface
Chapter 1: What is Data Protection Manager?
Chapter 2: Backup Strategies
Chapter 3: DPM Server Management Tasks
Chapter 4: Monitoring and Managing the Performance of DPM
Chapter 5: Workload Protection
Chapter 6: DPM-aware Windows Workload Protection
Chapter 7: DPM Non-aware Windows Workload Protection
Chapter 8: Managing Tapes in DPM
Chapter 9: Client Protection in DPM
Chapter 10: Workgroups and Untrusted Domains
Chapter 11: Disaster Recovery
Chapter 12: DPM PowerShell, Automation, and Private Cloud
Index
  • Chapter 1: What is Data Protection Manager?
    • Planning for your DPM deployment
      • Hardware requirements
        • Minimum requirements
        • Recommended requirements
      • Limitations of DPM
    • The Windows applications
      • The Exchange server
      • The SQL Server
      • SharePoint
      • Virtual platforms
      • The Windows clients
      • The system state
    • The DPM disk pool
      • The RAID levels for the disk pool
        • Software controllers versus hardware controllers
        • The sector size
      • The custom volumes
      • Deduplication
    • Dependent services, local accounts, and groups
      • Services
        • DPM
        • The DPM AccessManager service
        • The DPM Agent Coordinator service
        • The DPM CPWrapper service
        • The DPM Writer service
        • The DPMLA service
        • The DPMRA service
      • Local accounts and groups
    • Volume Shadow Copy Services (VSS)
      • The creation of a shadow copy
      • A different creation of a shadow copy
    • How does the DPM agent operate?
      • Distributed Component Object Model (DCOM)
      • Direction of communication
      • The Firewall settings for DPM
      • Underlying technologies
        • Change Journal
        • The File System filter
        • The DPM File filter
    • A GUI walkthrough
      • The Navigation bar
        • Monitoring
        • Protection
        • Recovery
        • Reporting
        • Management
    • Additional functions and roles within DPM
      • End-user Restore Recovery (EUR)
      • DPM Self-service Recovery Tool (SSRT)
      • Single Instance Storage (SIS)
    • PSDataSourceConfig.XML
    • Troubleshooting backups
      • The local Windows logs
      • Troubleshooting VSS
      • The DPM agent logs
      • The DPM server logs
    • Upgrading scenarios
    • Summary
    • Chapter 2: Backup Strategies
      • The definition of data
      • Microsoft's approach
      • Service License Agreements
      • Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives
        • Recovery Point Objectives (RPO)
        • Recovery Time Objectives (RTO)
        • Recovery Level Objectives (RLO)
      • What data should we back up?
        • Initial tasks
      • Server technologies
        • Windows workload protection group design
        • Enterprise protection group design
    • The primary approach
      • Non-Windows application the servers
        • Generic data source protection
        • Local services
      • The Windows workloads
    • The next step
      • Protection group names
        • Member of the protection group
    • Verification of your backups
      • Restore training
      • The verification process
    • Summary
      • Chapter 3: DPM Server Management Tasks
        • Automated installation of DPM
        • Migrating a DPM server to a new hardware
        • How to calculate storage for DPM
        • Creating custom reports in DPM
          • DPM Report Views
          • Building a custom DPM report
          • Create custom DPM reports using Prism for DPM
        • Changing the SQL Server instance used by DPM
        • Moving the DPM server to a new domain or renaming a DPM server
        • Adding disks to the storage pool
        • Removing a disk from the storage pool
        • Replacing a disk in the storage pool
        • DPM network bandwidth and control traffic
          • Enabling the network-bandwidth-usage throttling
          • Enabling the network-bandwidth-usage throttling for multiple DPM agents at once
        • Working with DPM SQL self-service
        • Working with third-party tools to deduplicate DPM data
        • Summary
        • Chapter 4: Monitoring and Managing the Performance of DPM
          • Publishing the DPM event logs
          • Monitoring DPM with SCOM
          • Monitoring DPM without SCOM
          • Using the new DPM central console
            • Installing the DPM central console
            • Overview of the DPM Central Console
          • Configuring remote administration of DPM
          • Configuring and using role-based access in DPM
          • Summary
          • Chapter 5: Workload Protection
            • Working with BMR and troubleshooting common issues in DPM
              • Supported operating systems
                • How to backup BMR files
                • Performing a BMR restore
                • Troubleshooting BMR
            • Working with system state protection and troubleshooting common issues in DPM
              • Restoring the system state from the DPM server
              • Using the wbadmin tool
            • Protecting Domain Controllers
            • Restoring Active Directory
            • Working with the Active Directory Recycle Bin
            • Generic data source protection in DPM
            • Non-Microsoft workload protection in DPM
              • Protecting Oracle with DPM
                • Protecting Oracle using RMAN and pre/post scripts with DPM
                • Protecting Oracle as a generic data source with DPM
              • Protecting Linux with DPM
              • Protecting non-domain/workgroup computers with DPM
            • Summary
            • Chapter 6: DPM-aware Windows Workload Protection
              • Protecting SQL with DPM
                • Protect SQL Server 2012 AlwaysOn
              • Remote SQL Server 2012 SP1
                • SQL self-service recovery
                  • Configuring self-service recovery in DPM
                  • Installing the DPM self-service recovery tool (SSRT) on a client computer
              • Protecting SharePoint with DPM
                • Configuring SharePoint protection
                • Protecting all SharePoint components
                • How to protect a multi-tenancy SharePoint deployment
                • How to protect RBS with DPM
                • How to protect claims authentication with DPM
                • How to protect search with DPM
              • Protecting Exchange with DPM
                • Configure Exchange protection
                  • DPM agent deployment considerations
                  • DAG clusters
                  • Specifying the Exchange protection options
                  • Specifying the DAG protection
                • Restore Exchange mailboxes
                  • Recovering Exchange server mailboxes
                • How to protect a multi-tenancy Exchange deployment
                • BMR protection technique of Exchange
                • Exchange 2013 protection
              • Protecting Hyper-V with DPM
                • Configuring Hyper-V protection with DPM
                • Protecting Hyper-V from DPM running in Hyper-V
                • How Hyper-V ILR works with DPM
              • Hyper-V 3.0
                • Clustered Shared Volume (CSV) 2.0
                • Protection of Hyper-V servers using SMB and Hyper-V Replica
                  • Unsupported scenarios for SMB
                • DPM scale-out protection
                  • Enabling the scale-out protection
                • Protecting deduplicated volumes
                  • Recovering volumes with deduplication
                  • Protecting Resilient File System
                  • Protecting CSV 2
              • Protecting Windows Clusters with DPM
                • Protecting file server clusters
                  • Planned failover for file clusters
                  • Changing the resource group
                • Protecting DHCP clusters
              • Summary
                • Chapter 8: Managing Tapes in DPM
                  • How DPM manages tapes
                    • How DPM writes information to tape
                    • Tape information
                    • Basic tape management tasks for DPM
                    • Tape commands for DPM
                      • Tape library commands
                    • Protection Group configuration
                      • Specify long-term goals
                      • Select library and tape details
                    • Co-location of data on tape
                    • Co-locating tape and upgrading DPM
                  • Standalone tape drives and tape libraries
                    • Standalone tape drives
                    • Tape libraries
                  • Virtual Tape Library (VTL)
                    • Firestreamer
                  • Tape Library Sharing (TLS)
                  • Tape reports
                  • Summary
                  • Chapter 9: Client Protection in DPM
                    • Creating a plan for backing up end user data
                    • Plan for off-site end user backup
                    • Configuring DPM and Active Directory for end user protection
                      • Manually preparing Active Directory for DPM
                    • Installing the agent automatically and manually on a client computer
                      • Automatic install
                      • Manual install
                      • Scripted install
                    • Performing image-level backups of client computers with DPM
                    • Other resources for DPM client protection
                      • Setting size restrictions on client protection
                      • Allow non-admin users to perform end user recovery of DPM protected data
                      • Client Auto Deployment Management pack
                    • Summary
                    • Chapter 10: Workgroups and Untrusted Domains
                      • Supported and not supported workgroup/untrusted domain protection
                      • Using certificate-based authentication with the DPM protection
                      • Setting up and working with workgroup protection in DPM
                        • Local accounts or trusts
                        • DPM Agent
                      • Protection across trusted domains
                      • Configuring and protecting machines in workgroups and untrusted domains
                        • Communication
                          • Host files
                          • DNS
                          • Firewall
                          • VPN
                        • Installing and configuring the DPM Agent
                      • Protecting the domain controller in an untrusted domain
                      • Protection in DMZ
                      • Troubleshooting common issues with protection of workgroups and untrusted domains
                      • Summary
                      • Chapter 11: Disaster Recovery
                        • The purpose of a disaster recovery design
                          • The Active Directory domain
                          • The Data Protection Manager server
                          • Databases
                          • Short-term storage
                          • Long-term storage
                          • Public Key Infrastructure
                          • Windows Azure passphrase
                        • Recovering your organization's data when the only thing left is backup tapes
                        • Protecting the Data Protection Manager database
                        • Planning and implementing DPM chaining
                        • Planning and implementing cyclic protection
                        • Off-site DPM strategies
                          • The secondary DPM server
                          • Backing up to the cloud
                          • VTL to external drives
                          • Alternative off-site options
                        • Protecting DPM with third-party software
                        • Backup network design
                        • Using DPM beyond the supported cloud providers
                        • Summary
                        • Chapter 12: DPM PowerShell, Automation, and Private Cloud
                          • Connecting to DPM through remote PowerShell
                            • Using PowerShell ISE to work with DPM cmdlets
                          • Automating DPM in your private cloud
                            • DPM and private cloud
                            • Automating DPM using Orchestrator
                          • DPM and System Center Configuration Manager
                            • Deploying the DPM Remote Administration console via SCCM
                          • Summary

                          Steve Buchanan

                          Steve Buchanan is an infrastructure consultant at RBA with a focus on System Center. He has 13 years of experience in information technology around systems management and systems administration. Steve authored System Center Data Protection Manager (SCDPM) 2010 SP1 and was a technical reviewer for the System Center Service Manager 2012 Cookbook and System Center Virtual Machine Manager 2012 Cookbook, Packt Publishing. Steve is a Microsoft System Center MVP and holds the following certifications: Linux +, MCP, MCTS, MCSA, MCITP: Server Administrator, and MCSE: Private Cloud. Steve can be found blogging at www.buchatech.com.

                          Robert Hedblom

                          Robert Hedblom is a Microsoft Most Valuable Professional (MVP) for System Center Cloud and Datacenter Management and works as a Solution Architect for System Center for hosters, EPG, and SMB customers globally. He was previously an MVP for DPM. Robert's knowledge is often used by Microsoft as a reviewing partner and consultant via Microsoft Consultant Services (MCS) or Premier Field Engineers (PFE) on a global scale. He also runs one of the largest DPM blogs (http://robertanddpm.blogspot.com) where he blogs frequently about DPM and also other System Center products for the System Center community. Robert has written several DPM trainings for versions 2010, 2012, and 2012 SP1 that a large number of training centers are using. Robert is often seen as a speaker on MMS, TechEd, and several other seminars that Microsoft runs. He was involved in the previous book for System Center Data Protection Manager as a technical reviewer.

                          Islam Gomaa

                          Islam Gomaa is a System Architect at Kivuto Solutions Inc, the global leader in complex digital distribution solutions. Islam has over 15 years of expertise in helping organizations align their business goals using Microsoft technology and deploying Microsoft-based solutions, which helped Kivuto become ISO 27001 certified and achieve the Microsoft Gold competency as an ISV. Islam is an SCDM MVP and member of the Windows Springboard Technical Expert Panel (STEP) for Windows 8 and Server 2012, having delivered STEP presentations as an evangelist across Canada and the USA. He has also authored select advanced webcasts on Microsoft private cloud. Islam presented at both TechEd 2013 North America and Europe, and is welcomed each year to present for TechEd and MMS as a guest speaker. Islam has a Bachelor’s in computer science from Montreal University, holds several Microsoft technical designations, and is an active member of the IT community. Islam enjoys sharing his adventures and ideas about system administration through his blog at http://blog.islamgomaa.com and http://www.IslamGomaa.com.

                          Flemming Riis

                          Flemming Riis is an infrastructure consultant at Kompetera with a focus on System Center. He has been working there since 1997 in various roles, starting with repairing PCs and then presales support. He is now a consultant who started with management software, then became Operations Manager, and hasn't looked back since. Flemming is a Microsoft System Center MVP and holds the following certifications: MCP, MCTS, MCSA, and MCITP. Flemming can be found blogging at www.flemmingriis.com.
                          Sorry, we don't have any reviews for this title yet.

                          Submit Errata

                          Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.


                          Errata

                          - 4 submitted: last submission 14 Aug 2013

                          Errata type: Typo | Page number: 35 | Errata date: June 26, 2013

                          This line

                          It will also provide you with the tools to define your Service License Agreement (SLA), protection groups,and guidelines to determine what data is really critical for your company.

                          Should be

                          It will also provide you with the tools to define your Service Level Agreement (SLA), protection groups,and guidelines to determine what data is really critical for your company.

                           

                           

                          Errata type: Typo | Page number: 35 | Errata date: June 26, 2013

                          This bullet point

                          Service License Agreements

                          Should be

                          Service Level Agreements

                           

                           

                          Errata type: Typo | Page number: 37 | Errata date: June 26, 2013

                          The Service License Agreements heading should be Service Level Agreements

                           

                           

                          Errata type: Typo | Page number: 37 | Errata date: June 26, 2013

                          This line

                          A Service License Agreement (SLA) is the document that defines the strategic choices taken for the company's restore scenarios.

                          Should be

                          A Service Level Agreement (SLA) is the document that defines the strategic choices taken for the company's restore scenarios.

                           

                          Sample chapters

                          You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

                          Frequently bought together

                          Microsoft System Center Data Protection Manager 2012 SP1 +    SQL Server 2012 with PowerShell V3 Cookbook =
                          50% Off
                          the second eBook
                          Price for both: €36.65

                          Buy both these recommended eBooks together and get 50% off the cheapest eBook.

                          What you will learn from this book

                          • Implementation of effective Backup Strategies
                          • How to use DPM Central Console and  SCOM to monitor DPM
                          • Carrying out disaster recovery for DPM
                          • Automation with DPM using System Canter Orchestrator along with PowerShell
                          • Using DPM with workgroups and untrusted domains
                          • How to perform common management tasks for DPM
                          • Better tape management with DPM
                          • Using client protection with DPM

                          In Detail

                          Microsoft System Center Data Protection Manager is a centralized data protection solution. DPM is used for data protection and recovery for Microsoft workloads.

                          Data Protection Manager allows backup and recovery of Microsoft Workloads, including SQL Server, Exchange, Sharepoint, Client Computers, and Hyper-V. Enabling disk and tape-based backup methods, DPM also allows central management of the system state and “Bare-Metal Recovery”.

                          Microsoft System Center Data Protection Manager 2012 SP1 is a guide for administrators of System Center Data Protection Manager. By the end of this book, users will be able to carry out automated installs, migrate DPM to new hardware, set up custom reporting, use the DPM central console, and implement offsite DPM strategies such as chaining,  monitoring, and cyclic protection.

                          In this book you will gain insight from Microsoft Most Valued Professionals into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. It will also show administrators how to effectively create backups of the protected workloads and use these backups to recover from a disaster.

                          It will also contain information on backup networks, client protection, and how to automate tasks in DPM to make your job as an administrator easier.

                          After reading this book you should be confident enough to master protecting your organizations data with Microsoft System Center Data Protection Manager.

                          Approach

                          This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected.

                          Who this book is for

                          This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization’s data.

                          Code Download and Errata
                          Packt Anytime, Anywhere
                          Register Books
                          Print Upgrades
                          eBook Downloads
                          Video Support
                          Contact Us
                          Awards Voting Nominations Previous Winners
                          Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
                          Resources
                          Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software