PacktLib: Microsoft System Center Data Protection Manager 2012 SP1

Microsoft System Center Data Protection Manager 2012 SP1


About the Authors

About the Reviewers


What is Data Protection Manager?

Planning for your DPM deployment

The Windows applications

The DPM disk pool

Dependent services, local accounts, and groups

Volume Shadow Copy Services (VSS)

How does the DPM agent operate?

A GUI walkthrough

Additional functions and roles within DPM


Troubleshooting backups

Upgrading scenarios


Backup Strategies

The definition of data

Microsoft's approach

Service Level Agreements

Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives

What data should we back up?

The primary approach

The next step

Verification of your backups


DPM Server Management Tasks

Automated installation of DPM

Migrating a DPM server to a new hardware

How to calculate storage for DPM

Creating custom reports in DPM

Changing the SQL Server instance used by DPM

Moving the DPM server to a new domain or renaming a DPM server

Adding disks to the storage pool

Removing a disk from the storage pool

Replacing a disk in the storage pool

DPM network bandwidth and control traffic

Working with DPM SQL self-service

Working with third-party tools to deduplicate DPM data


Monitoring and Managing the Performance of DPM

Publishing the DPM event logs

Monitoring DPM with SCOM

Monitoring DPM without SCOM

Using the new DPM central console

Configuring remote administration of DPM

Configuring and using role-based access in DPM


Workload Protection

Working with BMR and troubleshooting common issues in DPM

Working with system state protection and troubleshooting common issues in DPM

Protecting the domain controllers

Restoring Active Directory

Working with the Active Directory Recycle Bin

Generic data source protection in DPM

Non-Microsoft workload protection in DPM


DPM-aware Windows Workload Protection

Protecting SQL with DPM

Remote SQL Server 2012 SP1

Protecting SharePoint with DPM

Protecting Exchange with DPM

Protecting Hyper-V with DPM

Hyper-V 3.0

Protecting Windows Clusters with DPM


DPM Non-aware Windows Workload Protection

Protecting DFS with DPM


Managing Tapes in DPM

How DPM manages tapes

Standalone tape drives and tape libraries

Virtual Tape Library (VTL)

Tape Library Sharing (TLS)

Tape reports


Client Protection in DPM

Creating a plan for backing up end user data

Plan for off-site end user backup

Configuring DPM and Active Directory for end user protection

Installing the agent automatically and manually on a client computer

Performing image-level backups of client computers with DPM

Other resources for DPM client protection


Workgroups and Untrusted Domains

Supported and not supported workgroup/untrusted domain protection

Using certificate-based authentication with the DPM protection

Setting up and working with workgroup protection in DPM

Protection across trusted domains

Configuring and protecting machines in workgroups and untrusted domains

Protecting the domain controller in an untrusted domain

Protection in DMZ

Troubleshooting common issues with protection of workgroups and untrusted domains


Disaster Recovery

The purpose of a disaster recovery design

Recovering your organization's data when the only thing left is backup tapes

Protecting the Data Protection Manager database

Planning and implementing DPM chaining

Planning and implementing cyclic protection

Off-site DPM strategies

Protecting DPM with third-party software

Backup network design

Using DPM beyond the supported cloud providers


DPM PowerShell, Automation, and Private Cloud

Connecting to DPM through remote PowerShell

Automating DPM in your private cloud

DPM and System Center Configuration Manager