Microsoft System Center Data Protection Manager 2012 SP1

Written by a team of Microsoft System Center Most Valued Professionals (MVPs), this is the ultimate guide to using Data Protection Management (DPM) to safeguard your organization’s valuable information. Packed with tips and real-life solutions.

Microsoft System Center Data Protection Manager 2012 SP1

Progressing
Steve Buchanan et al.

Written by a team of Microsoft System Center Most Valued Professionals (MVPs), this is the ultimate guide to using Data Protection Management (DPM) to safeguard your organization’s valuable information. Packed with tips and real-life solutions.
$29.99
$49.99
RRP $29.99
RRP $49.99
eBook
Print + eBook
$12.99 p/month

Get Access

Get Unlimited Access to every Packt eBook and Video course

Enjoy full and instant access to over 3000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.

Code Files
+ Collection
Free Sample

Book Details

ISBN 139781849686303
Paperback328 pages

About This Book

  • Practical guidance that will help you get the most out of Microsoft System Center Data Protection Manager 2012
  • Gain insight into deploying, monitoring, and administering System Center Data Protection Manager 2012 from a team of Microsoft MVPs
  • Learn the various methods and best practices for administrating and using Microsoft System Center Data Protection Manager 2012

Who This Book Is For

This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization’s data.

Table of Contents

Chapter 1: What is Data Protection Manager?
Planning for your DPM deployment
The Windows applications
The DPM disk pool
Dependent services, local accounts, and groups
Volume Shadow Copy Services (VSS)
How does the DPM agent operate?
A GUI walkthrough
Additional functions and roles within DPM
PSDataSourceConfig.XML
Troubleshooting backups
Upgrading scenarios
Summary
Chapter 2: Backup Strategies
The definition of data
Microsoft's approach
Service Level Agreements
Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives
What data should we back up?
The primary approach
The next step
Verification of your backups
Summary
Chapter 3: DPM Server Management Tasks
Automated installation of DPM
Migrating a DPM server to a new hardware
How to calculate storage for DPM
Creating custom reports in DPM
Changing the SQL Server instance used by DPM
Moving the DPM server to a new domain or renaming a DPM server
Adding disks to the storage pool
Removing a disk from the storage pool
Replacing a disk in the storage pool
DPM network bandwidth and control traffic
Working with DPM SQL self-service
Working with third-party tools to deduplicate DPM data
Summary
Chapter 4: Monitoring and Managing the Performance of DPM
Publishing the DPM event logs
Monitoring DPM with SCOM
Monitoring DPM without SCOM
Using the new DPM central console
Configuring remote administration of DPM
Configuring and using role-based access in DPM
Summary
Chapter 5: Workload Protection
Working with BMR and troubleshooting common issues in DPM
Working with system state protection and troubleshooting common issues in DPM
Protecting the domain controllers
Restoring Active Directory
Working with the Active Directory Recycle Bin
Generic data source protection in DPM
Non-Microsoft workload protection in DPM
Summary
Chapter 6: DPM-aware Windows Workload Protection
Protecting SQL with DPM
Remote SQL Server 2012 SP1
Protecting SharePoint with DPM
Protecting Exchange with DPM
Protecting Hyper-V with DPM
Hyper-V 3.0
Protecting Windows Clusters with DPM
Summary
Chapter 7: DPM Non-aware Windows Workload Protection
Protecting DFS with DPM
Summary
Chapter 8: Managing Tapes in DPM
How DPM manages tapes
Standalone tape drives and tape libraries
Virtual Tape Library (VTL)
Tape Library Sharing (TLS)
Tape reports
Summary
Chapter 9: Client Protection in DPM
Creating a plan for backing up end user data
Plan for off-site end user backup
Configuring DPM and Active Directory for end user protection
Installing the agent automatically and manually on a client computer
Performing image-level backups of client computers with DPM
Other resources for DPM client protection
Summary
Chapter 10: Workgroups and Untrusted Domains
Supported and not supported workgroup/untrusted domain protection
Using certificate-based authentication with the DPM protection
Setting up and working with workgroup protection in DPM
Protection across trusted domains
Configuring and protecting machines in workgroups and untrusted domains
Protecting the domain controller in an untrusted domain
Protection in DMZ
Troubleshooting common issues with protection of workgroups and untrusted domains
Summary
Chapter 11: Disaster Recovery
The purpose of a disaster recovery design
Recovering your organization's data when the only thing left is backup tapes
Protecting the Data Protection Manager database
Planning and implementing DPM chaining
Planning and implementing cyclic protection
Off-site DPM strategies
Protecting DPM with third-party software
Backup network design
Using DPM beyond the supported cloud providers
Summary
Chapter 12: DPM PowerShell, Automation, and Private Cloud
Connecting to DPM through remote PowerShell
Automating DPM in your private cloud
DPM and System Center Configuration Manager
Summary

What You Will Learn

  • Implementation of effective Backup Strategies
  • How to use DPM Central Console and  SCOM to monitor DPM
  • Carrying out disaster recovery for DPM
  • Automation with DPM using System Canter Orchestrator along with PowerShell
  • Using DPM with workgroups and untrusted domains
  • How to perform common management tasks for DPM
  • Better tape management with DPM
  • Using client protection with DPM

In Detail

Microsoft System Center Data Protection Manager is a centralized data protection solution. DPM is used for data protection and recovery for Microsoft workloads.

Data Protection Manager allows backup and recovery of Microsoft Workloads, including SQL Server, Exchange, Sharepoint, Client Computers, and Hyper-V. Enabling disk and tape-based backup methods, DPM also allows central management of the system state and “Bare-Metal Recovery”.

Microsoft System Center Data Protection Manager 2012 SP1 is a guide for administrators of System Center Data Protection Manager. By the end of this book, users will be able to carry out automated installs, migrate DPM to new hardware, set up custom reporting, use the DPM central console, and implement offsite DPM strategies such as chaining,  monitoring, and cyclic protection.

In this book you will gain insight from Microsoft Most Valued Professionals into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. It will also show administrators how to effectively create backups of the protected workloads and use these backups to recover from a disaster.

It will also contain information on backup networks, client protection, and how to automate tasks in DPM to make your job as an administrator easier.

After reading this book you should be confident enough to master protecting your organizations data with Microsoft System Center Data Protection Manager.

Authors

Table of Contents

Chapter 1: What is Data Protection Manager?
Planning for your DPM deployment
The Windows applications
The DPM disk pool
Dependent services, local accounts, and groups
Volume Shadow Copy Services (VSS)
How does the DPM agent operate?
A GUI walkthrough
Additional functions and roles within DPM
PSDataSourceConfig.XML
Troubleshooting backups
Upgrading scenarios
Summary
Chapter 2: Backup Strategies
The definition of data
Microsoft's approach
Service Level Agreements
Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives
What data should we back up?
The primary approach
The next step
Verification of your backups
Summary
Chapter 3: DPM Server Management Tasks
Automated installation of DPM
Migrating a DPM server to a new hardware
How to calculate storage for DPM
Creating custom reports in DPM
Changing the SQL Server instance used by DPM
Moving the DPM server to a new domain or renaming a DPM server
Adding disks to the storage pool
Removing a disk from the storage pool
Replacing a disk in the storage pool
DPM network bandwidth and control traffic
Working with DPM SQL self-service
Working with third-party tools to deduplicate DPM data
Summary
Chapter 4: Monitoring and Managing the Performance of DPM
Publishing the DPM event logs
Monitoring DPM with SCOM
Monitoring DPM without SCOM
Using the new DPM central console
Configuring remote administration of DPM
Configuring and using role-based access in DPM
Summary
Chapter 5: Workload Protection
Working with BMR and troubleshooting common issues in DPM
Working with system state protection and troubleshooting common issues in DPM
Protecting the domain controllers
Restoring Active Directory
Working with the Active Directory Recycle Bin
Generic data source protection in DPM
Non-Microsoft workload protection in DPM
Summary
Chapter 6: DPM-aware Windows Workload Protection
Protecting SQL with DPM
Remote SQL Server 2012 SP1
Protecting SharePoint with DPM
Protecting Exchange with DPM
Protecting Hyper-V with DPM
Hyper-V 3.0
Protecting Windows Clusters with DPM
Summary
Chapter 7: DPM Non-aware Windows Workload Protection
Protecting DFS with DPM
Summary
Chapter 8: Managing Tapes in DPM
How DPM manages tapes
Standalone tape drives and tape libraries
Virtual Tape Library (VTL)
Tape Library Sharing (TLS)
Tape reports
Summary
Chapter 9: Client Protection in DPM
Creating a plan for backing up end user data
Plan for off-site end user backup
Configuring DPM and Active Directory for end user protection
Installing the agent automatically and manually on a client computer
Performing image-level backups of client computers with DPM
Other resources for DPM client protection
Summary
Chapter 10: Workgroups and Untrusted Domains
Supported and not supported workgroup/untrusted domain protection
Using certificate-based authentication with the DPM protection
Setting up and working with workgroup protection in DPM
Protection across trusted domains
Configuring and protecting machines in workgroups and untrusted domains
Protecting the domain controller in an untrusted domain
Protection in DMZ
Troubleshooting common issues with protection of workgroups and untrusted domains
Summary
Chapter 11: Disaster Recovery
The purpose of a disaster recovery design
Recovering your organization's data when the only thing left is backup tapes
Protecting the Data Protection Manager database
Planning and implementing DPM chaining
Planning and implementing cyclic protection
Off-site DPM strategies
Protecting DPM with third-party software
Backup network design
Using DPM beyond the supported cloud providers
Summary
Chapter 12: DPM PowerShell, Automation, and Private Cloud
Connecting to DPM through remote PowerShell
Automating DPM in your private cloud
DPM and System Center Configuration Manager
Summary

Book Details

ISBN 139781849686303
Paperback328 pages
Read More

Recommended for You

Microsoft System Center 2012 Configuration Manager: Administration Cookbook
$ 29.99
Microsoft System Center Configuration Manager Advanced Deployment
$ 29.99
System Center 2012 R2 Virtual Machine Manager Cookbook - Second Edition
$ 35.99