Amazon cover image
Image from Amazon.com

Microsoft System Center Data Protection Manager 2012.

By: Contributor(s): Material type: TextTextPublication details: Birmingham : Packt Publishing, 2013.Description: 1 online resource (328 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781849686310
  • 1849686319
Subject(s): Genre/Form: Additional physical formats: Print version:: Microsoft System Center Data Protection Manager 2012.DDC classification:
  • 005.376
LOC classification:
  • QA76.9.D348
Online resources:
Contents:
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: What is Data Protection Manager?; Planning for your DPM deployment; Hardware requirements; Minimum requirements; Recommended requirements; Limitations of DPM; The Windows applications; The Exchange server; The SQL Server; SharePoint; Virtual platforms; The Windows clients; The system state; The DPM disk pool; The RAID levels for the disk pool; Software controllers versus hardware controllers; The sector size; The Custom volumes; Deduplication.
Dependent services, local accounts, and groupsServices; DPM; The DPM AccessManager service; The DPM Agent Coordinator service; The DPM CPWrapper service; The DPM Writer service; The DPMLA service; The DPMRA service; The local accounts and groups; Volume Shadow Copy Services (VSS); The creation of a shadow copy; Different creation of the shadow copy; How does the DPM agent operate?; Distributed Component Object Model (DCOM); Direction of communication; The Firewall settings for DPM; Underlying technologies; Change Journal; The File System Filter; DPM File filter; A GUI walkthrough.
The Navigation barMonitoring; Protection; Recovery; Reporting; Management; Additional functions and roles within DPM; End-user Restore Recovery (EUR); DPM Self-service Recovery Tool (SSRT); Single Instance Storage (SIS); PSDataSourceConfig. XML; Troubleshooting backups; The local Windows logs; Troubleshooting VSS; The DPM agent logs; The DPM server logs; Upgrading scenarios; Summary; Chapter 2: Backup Strategies; The definition of data; Microsoft's approach; Service License Agreements; Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives.
Recovery Point Objectives (RPO)Recovery Time Objectives (RTO); Recovery Level Objectives (RLO); What data should we back up?; Initial tasks; Server technologies; Windows workload protection group design; Enterprise protection group design; The primary approach; Non-Windows applications servers; Generic data source protection; Local services; The Windows workloads; The next step; Protection group names; Member of the protection group; Verification of your backups; Restore training; The verification process; Summary; Chapter 3: DPM Server Management Tasks; Automated installation of DPM.
Migrating a DPM server to a new hardwareHow to calculate storage for DPM; Creating custom reports in DPM; DPM Report Views; Building a custom DPM report; Create custom DPM reports using Prism for DPM; Changing the SQL Server instance used by DPM; Moving the DPM server to a new domain or renaming a DPM server; Adding disks to the storage pool; Removing a disk from the storage pool; Replacing a disk in the storage pool; DPM network bandwidth and control traffic; Enabling the network-bandwidth-usage throttling; Enabling the network-bandwidth-usage throttling for multiple DPM agents at once.
Summary: This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization's data.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Print version record.

Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: What is Data Protection Manager?; Planning for your DPM deployment; Hardware requirements; Minimum requirements; Recommended requirements; Limitations of DPM; The Windows applications; The Exchange server; The SQL Server; SharePoint; Virtual platforms; The Windows clients; The system state; The DPM disk pool; The RAID levels for the disk pool; Software controllers versus hardware controllers; The sector size; The Custom volumes; Deduplication.

Dependent services, local accounts, and groupsServices; DPM; The DPM AccessManager service; The DPM Agent Coordinator service; The DPM CPWrapper service; The DPM Writer service; The DPMLA service; The DPMRA service; The local accounts and groups; Volume Shadow Copy Services (VSS); The creation of a shadow copy; Different creation of the shadow copy; How does the DPM agent operate?; Distributed Component Object Model (DCOM); Direction of communication; The Firewall settings for DPM; Underlying technologies; Change Journal; The File System Filter; DPM File filter; A GUI walkthrough.

The Navigation barMonitoring; Protection; Recovery; Reporting; Management; Additional functions and roles within DPM; End-user Restore Recovery (EUR); DPM Self-service Recovery Tool (SSRT); Single Instance Storage (SIS); PSDataSourceConfig. XML; Troubleshooting backups; The local Windows logs; Troubleshooting VSS; The DPM agent logs; The DPM server logs; Upgrading scenarios; Summary; Chapter 2: Backup Strategies; The definition of data; Microsoft's approach; Service License Agreements; Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives.

Recovery Point Objectives (RPO)Recovery Time Objectives (RTO); Recovery Level Objectives (RLO); What data should we back up?; Initial tasks; Server technologies; Windows workload protection group design; Enterprise protection group design; The primary approach; Non-Windows applications servers; Generic data source protection; Local services; The Windows workloads; The next step; Protection group names; Member of the protection group; Verification of your backups; Restore training; The verification process; Summary; Chapter 3: DPM Server Management Tasks; Automated installation of DPM.

Migrating a DPM server to a new hardwareHow to calculate storage for DPM; Creating custom reports in DPM; DPM Report Views; Building a custom DPM report; Create custom DPM reports using Prism for DPM; Changing the SQL Server instance used by DPM; Moving the DPM server to a new domain or renaming a DPM server; Adding disks to the storage pool; Removing a disk from the storage pool; Replacing a disk in the storage pool; DPM network bandwidth and control traffic; Enabling the network-bandwidth-usage throttling; Enabling the network-bandwidth-usage throttling for multiple DPM agents at once.

Working with DPM SQL self-service.

This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization's data.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library