You are previewing Microsoft System Center Data Protection Manager 2012 R2 Cookbook.
O'Reilly logo
Microsoft System Center Data Protection Manager 2012 R2 Cookbook

Book Description

Over 100 recipes to build your own designs exploring the advanced functionality and features of System Center DPM 2012 R2

In Detail

This book is the solution to the recurring data recovery and protection problems you face in your organization. It begins with the planning and installation of System Center Data Protection Manager, spanning across chapters that walk you through the pre-installation, installation, and post-installation tasks.

The book has dedicated chapters on file server protection, Hyper-V protection, client protection, and more. It will also walk you through Microsoft workload protection and restore scenarios with the help of engaging recipes. With this knowledge, you will confidently move on to building an actual service using monitoring, management, automation, and disaster recovery scenarios and solutions. The book concludes with recipes that enable you to build BaaS, RaaS, and DRaaS services within your data center.

What You Will Learn

  • Protect file shares, volumes, and catalogues and restore file data to its original or alternate location

  • Integrate DPM with other System Center members to build optimal services

  • Protect various environments such as Hyper-V, SQL, SharePoint, and Exchange Server

  • Build supported, optimal, and flexible restore scenarios

  • Protect and restore SharePoint farms

  • Provide online protection for your data center by integrating System Center DPM with Azure

  • Automate, monitor, and manage your BaaS, RaaS, and DRaaS services

  • Build a SQL Server that your BaaS, RaaS, and DRaaS services depend on

  • Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

    Table of Contents

    1. Microsoft System Center Data Protection Manager 2012 R2 Cookbook
      1. Table of Contents
      2. Microsoft System Center Data Protection Manager 2012 R2 Cookbook
      3. Credits
      4. About the Author
      5. About the Reviewers
      6. www.PacktPub.com
        1. Support files, eBooks, discount offers, and more
          1. Why subscribe?
          2. Free access for Packt account holders
          3. Instant updates on new Packt books
      7. Preface
        1. What this book covers
        2. What you need for this book
        3. Who this book is for
        4. Sections
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
          5. See also
        5. Conventions
        6. Reader feedback
        7. Customer support
          1. Downloading the color images of this book
          2. Errata
          3. Piracy
          4. Questions
      8. 1. Pre-installation Tasks
        1. Introduction
        2. What is System Center Data Protection Manager 2012 R2
          1. What's new in the R2 release
          2. The architecture of System Center Data Protection Manager 2012 R2
        3. Change tracking process
          1. Getting ready
          2. How to do it...
          3. How it works…
          4. There's more…
        4. Planning your DPM pre-installation tasks
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        5. Planning the DPM disk pool
          1. Getting ready
          2. How to do it...
          3. How it works…
          4. There's more…
        6. Firewall configuration
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
      9. 2. Installation and Upgrade
        1. Introduction
        2. Installing a SQL Server locally on the DPM server
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more...
        3. Preparing a remote SQL Server for DPMDB
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
          5. See also
        4. Installing SCDPM 2012 R2
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more …
        5. Installing SCDPM 2012 R2 using a remote SQL server or cluster
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        6. Understanding the supported upgrade scenarios
      10. 3. Post-installation Tasks
        1. Introduction
        2. Understanding the DPM terminology
        3. Configuring the DPM disk pool
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        4. Adding disk to the DPM disk pool
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        5. Growing volumes automatically in the DPM disk pool
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        6. Creating a replica manually
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        7. Installing the DPM agent via the DPM console
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        8. Installing the DPM agent manually
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There is more…
        9. Upgrading the DPM agents
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        10. Configuring DPM agent throttling
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        11. Understanding DPM Protection Groups
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        12. Optimizing the Protection Group
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        13. DPMDB optimization
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        14. Report management
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        15. Configuring a dedicated backup network
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        16. Configuring e-mail notifications
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There is more…
        17. Applying update rollups (UR) to the DPM server
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There is more…
        18. Working with filters
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
      11. 4. File Server Protection
        1. Introduction
        2. Understanding the prerequisites for supported file server protection
        3. Protecting file shares, volumes, and catalogs
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        4. Restoring file data to its original location
          1. Getting ready
          2. How to do it…
          3. How it works...
        5. Restoring file data to an alternative location
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        6. Copying protected data to tape
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        7. Restoring file data from tape
          1. Getting ready
          2. How to do it…
          3. How it works...
        8. Restoring file data from Azure
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        9. Protecting file server clusters
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        10. Understanding file server maintenance and management tasks
          1. Getting ready
          2. How to do it…
        11. Creating recovery points manually
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        12. Using Migrate-Datasource.ps1
          1. Getting ready
          2. How to do it…
          3. There's more…
      12. 5. SQL Protection
        1. Introduction
        2. Understanding SQL Server protection considerations
        3. Configuring your SQL Server 2012 for DPM protection
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        4. Understanding the SQL Server management tasks from a DPM perspective
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        5. Protecting SQL Server 2012 AlwaysOn
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        6. Protecting an availability group using SQL Server AlwaysOn configuration
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        7. Protecting your SQL Server databases
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        8. Enabling parallel backups
          1. Getting ready
          2. How to do it…
          3. How it works...
        9. Configuring the auto-protection feature
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        10. Configuring online protection
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        11. Restoring a SQL Server database to its original location
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        12. Restoring a SQL Server database to an alternative location
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        13. Restoring a SQL Server database and renaming the database
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        14. Restoring a SQL database to a network location
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        15. Restoring a SQL database from Azure
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        16. Restoring a SQL Server database from tape
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
        17. Restoring SQL databases using the Latest feature
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more...
      13. 6. Hyper-V Protection
        1. Introduction
        2. Understanding the prerequisites for Hyper-V protection
        3. Understanding the considerations for Hyper-V protection
        4. Protecting large-scale Hyper-V environments
          1. Getting started
          2. How to do it…
          3. How it works…
          4. See also
        5. Protecting System Center Virtual Machine Manager
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        6. Integrating SCDPM with SCVMM
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        7. Restoring a Hyper-V virtual machine
          1. Getting ready
          2. How to do it
          3. How it works…
          4. There's more…
        8. Restoring a VHD or VHDX
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        9. Using ILR (Item Level Restore)
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        10. Understanding Hyper-V management tasks
      14. 7. SharePoint Protection
        1. Introduction
        2. Understanding the prerequisites for supported SharePoint server protection
        3. Configuring the SharePoint VSS
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        4. Protecting a SharePoint farm
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        5. Protecting a SharePoint search
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        6. Protecting a SharePoint farm that uses SQL aliases
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        7. Restoring a SharePoint farm
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        8. Restoring individual objects (Item-level recovery)
          1. Getting ready
          2. How to do it..
          3. How it works...
          4. There's more…
          5. See also
        9. Understanding SharePoint maintenance tasks
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        10. Understanding SharePoint management tasks
          1. How to do it...
          2. How it works...
          3. There's more…
      15. 8. Exchange Server Protection
        1. Introduction
        2. Understanding the prerequisites for supported Exchange server protection
        3. Configuring Exchange server protection
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        4. Understanding how to adapt DPM to Exchange server management tasks
        5. Understanding how to adapt DPM to Exchange server maintenance tasks
        6. Protecting a single Exchange mailbox database
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        7. Understanding how DPM protects DAG configurations
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        8. Understanding how DPM can verify data integrity using ESEUTIL
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        9. Restoring an Exchange mailbox database to its original location
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        10. Restoring an Exchange mailbox database to an alternative location
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        11. Restoring an Exchange mailbox database to an Exchange Recovery Database
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        12. Restoring an Exchange mailbox database to a network folder
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        13. Copying the Exchange mailbox database to tape
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
      16. 9. Client Protection
        1. Introduction
        2. Finding and understanding Company Protection Policy
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. See also
        3. Understanding the prerequisites of client protection
        4. Creating a Protection Group for client protection
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        5. Restoring client data via the DPM client
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        6. Restoring client data from the DPM server
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        7. Setting up the end user recovery feature
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        8. Setting up the DPM self service recovery for SQL
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
      17. 10. Workgroup Protection and CBA
        1. Introduction
        2. Understanding workgroup protection
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        3. Understanding CBA protection
          1. How to do it...
          2. How it works…
          3. See also
        4. Setting up workgroup protection
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
          5. See also
        5. Setting up certificate-based authentication
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. See also
      18. 11. Azure Integration
        1. Introduction
        2. Understanding the prerequisites for the Microsoft Azure backup service
        3. Configuring your DPM server for online protection
          1. Getting ready
          2. How to do it...
        4. Registering your DPM server
          1. How to do it...
        5. Configuring the protection groups to enable online protection
          1. Getting ready
          2. How to do it...
        6. Manually creating online recovery points
          1. Getting ready
          2. How to do it...
        7. Recovering production data from Azure
          1. Getting ready
          2. How to do it...
        8. Troubleshooting Microsoft Azure Backup Agent
          1. How to do it...
      19. 12. Disaster Recovery
        1. Introduction
        2. Understanding the primary/secondary DPM server scenario
        3. Enabling a DPM server to be a secondary DPM server
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        4. Enabling the chaining of DPM servers
          1. How to do it…
          2. How it works…
          3. There's more…
        5. Understanding the replication process from the primary to secondary DPM server
        6. Switching from the primary to secondary DPM server
          1. How to do it
          2. How it works...
          3. There's more…
        7. Restoring data from a secondary DPM server
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        8. Restoring a DPM server
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
      20. 13. Tape Management
        1. Introduction
        2. Understanding the basics of tape backups
        3. Installing tape libraries and stand-alone tape drives
          1. Getting ready
          2. How to do it…
          3. How it works...
          4. There's more…
        4. Understanding the concept of VTL
          1. There's more…
          2. See also
        5. Understanding how DPM manages tapes
        6. Configuring tape optimization for DPM
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        7. Understanding tape reports in DPM
        8. Configuring the short erase feature
          1. Getting ready
          2. How to do it…
          3. How it works…
          4. There's more…
        9. Understanding tape management tasks
      21. 14. Monitoring and Automation
        1. Introduction
        2. Understanding how the System Center family should be your base for service delivery
        3. Understanding System Center Operations Manager 2012 R2
        4. Understanding System Center Orchestrator 2012 R2
        5. Understanding the DPM PowerShell Cmdlet
        6. Installing System Center Operations Manager
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        7. Installing System Center Orchestrator
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        8. Installing the DPM Central Console
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more…
        9. Understanding how to configure System Center Orchestrator for DPM automation
          1. How it works...
          2. See also
      22. Index