Microsoft Data Protection Manager 2010

Chapter 1: - Page 24
Chapter 1: - Page 25
Cons of DPM - Page 26
Cons of DPM - Page 27
DPM pricing - Page 28
DPM feature set - Page 29
DPM feature set - Page 30
What makes DPM different from other back up solutions - Page 31
What makes DPM different from other back up solutions - Page 32
What makes DPM different from other back up solutions - Page 33
Summary - Page 34
Summary - Page 35
Chapter 2: - Page 36
Why back up? - Page 37
What to back up? - Page 38
Which media to use? - Page 39
Which media to use? - Page 40
Capacity planning - Page 41
Backup schedule - Page 42
Integrity of backups and testing restore - Page 43
Policies and processes - Page 44
Disaster Recovery - Page 45
Protection groups - Page 46
Choosing media for DPM - Page 47
Choosing media for DPM - Page 48
Capacity planning - Page 49
Location of DPM servers - Page 50
DPM SQL instance - Page 51
Antivirus on DPM server - Page 52
Firewall ports - Page 53
Firewall ports - Page 54
End-user recovery requirements - Page 55
Summary - Page 56
Summary - Page 57
Chapter 3: - Page 58
Hardware requirements - Page 59
Software - Page 60
Restrictions - Page 61
Restrictions - Page 62
Installing DPM - Page 63
Installing DPM - Page 64
Installing DPM - Page 65
Installing DPM - Page 66
Installing DPM - Page 67
Installing DPM - Page 68
Installing DPM using a remote instance of SQL Server 2008 - Page 69
Installing DPM using a remote instance of SQL Server 2008 - Page 70
Installing DPM using a remote instance of SQL Server 2008 - Page 71
Installing DPM using a remote instance of SQL Server 2008 - Page 72
Installing DPM using a remote instance of SQL Server 2008 - Page 73
Migrating from DPM 2007 to DPM 2010 - Page 74
Migrating from DPM 2007 to DPM 2010 - Page 75
Migrating from DPM 2007 to DPM 2010 - Page 76
Upgrade process - Page 77
Upgrade process - Page 78
Upgrade process - Page 79
Upgrade process - Page 80
Upgrade process - Page 81
The post-upgrade process - Page 82
Summary - Page 83
Chapter 4: - Page 84
Required configurations - Page 85
Required configurations - Page 86
Required configurations - Page 87
Configuring tape libraries - Page 88
Configuring tape libraries - Page 89
Configuring tape libraries - Page 90
Configuring tape libraries - Page 91
Configuring tape libraries - Page 92
The WSS Writer service - Page 93
The WSS Writer service - Page 94
Throttle - Page 95
Setting up an SMTP server - Page 96
Configuring DPM to use your SMTP server - Page 97
Configuring alert notifications - Page 98
Publishing DPM alerts - Page 99
Configuring DPM Management Shell - Page 100
Installing the DPM Management Shell - Page 101
Configuring Active Directory and enabling End-user Recovery in DPM - Page 102
Configuring Active Directory and enabling End-user Recovery in DPM - Page 103
Configuring Active Directory and enabling End-user Recovery in DPM - Page 104
Configuring Active Directory and enabling End-user Recovery in DPM - Page 105
Manually prepare Active Directory for DPM - Page 106
Manually prepare Active Directory for DPM - Page 107
Summary - Page 108
Summary - Page 109
Chapter 5: - Page 110
DPM file locations - Page 111
DPM processes - Page 112
DPM processes that impact DPM performance - Page 113
Important DPM terms - Page 114
Important DPM terms - Page 115
Important DPM terms - Page 116
DPM Administrator Console - Page 117
Action - Page 118
Action - Page 119
Protection - Page 120
Reporting - Page 121
Management - Page 122
Management - Page 123
Display pane - Page 124
Details pane - Page 125
Actions pane - Page 126
Disk Defragmenter and Check Disk - Page 127
Adding disks to the storage pool - Page 128
DPM reporting - Page 129
Displaying reports in DPM - Page 130
Displaying reports in DPM - Page 131
Displaying reports in DPM - Page 132
Managing DPM performance - Page 133
Managing DPM performance - Page 134
Managing DPM performance - Page 135
Managing DPM performance - Page 136
Performance counters - Page 137
Ways to improve performance - Page 138
Ways to improve performance - Page 139
Chapter 6: - Page 140
Configuring DPM backup on servers - Page 141
Installing the DPM agent - Page 142
Installing the DPM agent - Page 143
Installing the DPM agent - Page 144
Installing the DPM agent manually - Page 145
Installing the DPM agent manually - Page 146
Installing the DPM agent manually - Page 147
Installing the DPM agent manually - Page 148
Creating Protection Groups - Page 149
Creating Protection Groups - Page 150
Creating Protection Groups - Page 151
Creating Protection Groups - Page 152
Creating Protection Groups - Page 153
Creating Protection Groups - Page 154
Creating Protection Groups - Page 155
Backing up System State - Page 156
Backing up System State - Page 157
Backing up System State - Page 158
Protecting computers in workgroups and untrusted domains - Page 159
Protecting computers in workgroups and untrusted domains - Page 160
Protecting computers in workgroups and untrusted domains - Page 161
Protecting computers in workgroups and untrusted domains - Page 162
Protecting computers in workgroups and untrusted domains - Page 163
Configuring DPM backup on clients - Page 164
Installing the DPM client - Page 165
Configuring clients in Protection Groups - Page 166
Configuring clients in Protection Groups - Page 167
Configuring clients in Protection Groups - Page 168
Configuring clients in Protection Groups - Page 169
Configuring clients in Protection Groups - Page 170
Summary - Page 171
Chapter 7: - Page 172
Protecting Exchange with DPM - Page 173
Protecting Exchange with DPM - Page 174
Protecting Exchange with DPM - Page 175
Protecting Exchange with DPM - Page 176
Protecting Hyper-V with DPM - Page 177
Protecting Hyper-V with DPM - Page 178
Protecting Hyper-V with DPM - Page 179
Protecting SharePoint with DPM - Page 180
Protecting SharePoint with DPM - Page 181
Protecting SharePoint with DPM - Page 182
Protecting SQL Server with DPM - Page 183
Protecting SQL Server with DPM - Page 184
Protecting ISA Server 2006 with DPM - Page 185
Protecting ISA Server 2006 with DPM - Page 186
Protecting ISA Server 2006 with DPM - Page 187
Protecting ISA Server 2006 with DPM - Page 188
Protecting ISA Server 2006 with DPM - Page 189
Protecting ISA Server 2006 with DPM - Page 190
Protecting ISA Server 2006 with DPM - Page 191
Protecting ISA Server 2006 with DPM - Page 192
Protecting ISA Server 2006 with DPM - Page 193
Protecting ISA Server 2006 with DPM - Page 194
Protecting ISA Server 2006 with DPM - Page 195
Protecting ISA Server 2006 with DPM - Page 196
Protecting ISA Server 2006 with DPM - Page 197
Protecting ISA Server 2006 with DPM - Page 198
Summary - Page 199
Chapter 8: - Page 200
General recovery - Page 201
General recovery - Page 202
Recovering files, folders, shares, and volumes - Page 203
Recovering files, folders, shares, and volumes - Page 204
Recovering files, folders, shares, and volumes - Page 205
Using self service recovery for end-users through the DPM client - Page 206
Using self service recovery for end-users through the DPM client - Page 207
Using self service recovery for end-users through the DPM client - Page 208
Using self service recovery for end-users through the DPM client - Page 209
Using self service recovery for end-users through the DPM client - Page 210
Using self service recovery for end-users through the DPM client - Page 211
Using self service recovery for end-users through the DPM client - Page 212
Recovering data using System State - Page 213
Bare Metal Backup and Recovery - Page 214
How to perform a Bare Metal Recovery? - Page 215
How to perform a Bare Metal Recovery? - Page 216
How to perform a Bare Metal Recovery? - Page 217
Restoring BMR data on your server - Page 218
Restoring BMR data on your server - Page 219
Restoring BMR data on your server - Page 220
Restoring BMR data on your server - Page 221
Restoring BMR data on your server - Page 222
Restoring BMR data on your server - Page 223
Restoring critical applications with DPM - Page 224
Restoring Exchange mailboxes with DPM - Page 225
Restoring Exchange mailboxes with DPM - Page 226
Restoring Exchange mailboxes with DPM - Page 227
Restoring Exchange mailboxes with DPM - Page 228
Restoring Exchange mailboxes with DPM - Page 229
Restoring Exchange mailboxes with DPM - Page 230
Recovery in Exchange 2010 - Page 231
Recovery in Exchange 2010 - Page 232
Recovery in Exchange 2010 - Page 233
Recovery in Exchange 2010 - Page 234
Restoring Hyper-V virtual machines with DPM - Page 235
Restoring Hyper-V virtual machines with DPM - Page 236
Recovery of a VM to an alternate location - Page 237
Recovery of a VM to an alternate location - Page 238
Item-level recovery of a Hyper-V VM - Page 239
Restoring SharePoint data with DPM - Page 240
Farm recovery - Page 241
Farm recovery - Page 242
Recovering sites, documents, and lists - Page 243
Recovering sites, documents, and lists - Page 244
Recovering sites, documents, and lists - Page 245
Restoring SQL databases with DPM - Page 246
Restoring SQL databases with DPM - Page 247
Configuring and using SQL self service recovery for SQL administrators - Page 248
Configuring and using SQL self service recovery for SQL administrators - Page 249
Configuring and using SQL self service recovery for SQL administrators - Page 250
Recovering through self service recovery for SQL - Page 251
Recovering through self service recovery for SQL - Page 252
Recovering through self service recovery for SQL - Page 253
Recovering through self service recovery for SQL - Page 254
Summary - Page 255
Chapter 9: - Page 256
DPM offsite backup - Page 257
Disk-to-Disk-to-Tape - Page 258
Disk-to-Disk-to-Tape - Page 259
Disk-to-Disk-to-Tape - Page 260
Backing up DPM using a secondary DPM server - Page 261
Backing up DPM using a secondary DPM server - Page 262
Backing up DPM using a secondary DPM server - Page 263
Backing up DPM using third-party software - Page 264
Backing up DPM using third-party software - Page 265
Backing up DPM using third-party software - Page 266
Third-party tool that supports DPM - Page 267
Third-party tool that does not support DPM or VSS - Page 268
Re-establishing protection after recovering the primary DPM server - Page 269
DPM cloud backup - Page 270
Iron Mountain CloudRecovery® - Page 271
Iron Mountain CloudRecovery® - Page 272
Configuring the agent - Page 273
Configuring the agent - Page 274
Configuring the agent - Page 275
CloudRecovery and adding protected data - Page 276
CloudRecovery and adding protected data - Page 277
Restoring data from the cloud - Page 278
Restoring data from the cloud - Page 279
Restoring data from the cloud - Page 280
i365 EVault - Page 281
EDPM installation - Page 282
EDPM installation - Page 283
EDPM installation - Page 284
EDPM installation - Page 285
EDPM installation - Page 286
EDPM agent installation - Page 287
EDPM agent installation - Page 288
EDPM agent installation - Page 289
EDPM agent installation - Page 290
EDPM administration - Page 291
EDPM administration - Page 292
EDPM administration - Page 293
EDPM administration - Page 294
EDPM administration - Page 295
Add a Protection Set - Page 296
Add a Protection Set - Page 297
Add a Protection Set - Page 298
Add a Protection Set - Page 299
Recovery - Page 300
Summary - Page 301
Chapter 10: - Page 302
Background of command-line and scripting in Windows - Page 303
Basics of PowerShell - Page 304
Help - Page 305
DPM Management Shell - Page 306
Overview of DMS - Page 307
DMS cmdlets - Page 308
DMS cmdlets - Page 309
DMS cmdlets - Page 310
DMS cmdlets - Page 311
DMS cmdlets - Page 312
DMS cmdlets - Page 313
DPM tasks and functions from the shell - Page 314
DPM tasks and functions from the shell - Page 315
Disk management - Page 316
Disk management - Page 317
Recovery - Page 318
Backup network - Page 319
Other - Page 320
DPM scripts - Page 321
DPM scripts - Page 322
DPM scripts - Page 323
Running pre-backup and post-backup scripts in DPM - Page 324
Overview of Opalis - Page 325
Overview of Opalis - Page 326
Summary - Page 327
Chapter 11: - Page 328
Troubleshooting DPM - Page 329
Troubleshooting DPM - Page 330
Troubleshooting DPM - Page 331
Troubleshooting DPM - Page 332
Troubleshooting DPM installation issues - Page 333
Troubleshooting agent installation issues - Page 334
Troubleshooting protected server issues - Page 335
Troubleshooting DPM client issues - Page 336
Documentation - Page 337
List of DPM error codes - Page 338
Blogs - Page 339
Communities - Page 340
Training - Page 341
Training - Page 342
Training - Page 343
Training - Page 344
Summary - Page 345