DPMV 3 Operations Guide
DPMV 3 Operations Guide
Feedback
Send suggestions and comments about this document to dpmfdbk@microsoft.com.
This document is provided “as-is”. Information and views expressed in this document, including
URL and other Internet Web site references, may change without notice. You bear the risk of
using it.
Some examples depicted herein are provided for illustration only and are fictitious. No real
association or connection is intended or should be inferred.
This document does not provide you with any legal rights to any intellectual property in any
Microsoft product. You may copy and use this document for your internal, reference purposes.
You may modify this document for your internal, reference purposes.
© 2010 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, SQL Server, Windows, Windows PowerShell, Windows
Server, and Windows Vista are trademarks of the Microsoft group of companies.
All other trademarks are property of their respective owners.
Contents
DPM 2010 Operations ................................................................................................................... 21
In This Section............................................................................................................................ 21
Protecting an Exchange Server 2007 SCR Target Server Configured as Single Node Cluster ... 96
Protecting an Exchange Server 2007 SCR Server in Standalone Mode ...................................... 97
Procedure to enable protection for an SCR server .................................................................... 97
How to Recover a SQL Database and Allow Additional Log Backups ........................................ 117
See Also ................................................................................................................................... 118
Protecting a SharePoint Farm by Using Databases With SQL Server Aliases ........................... 128
Prerequisites ............................................................................................................................ 128
Additional Resources ............................................................................................................... 128
Protecting Windows SharePoint Services 3.0 SP Search Service Data ..................................... 130
Protecting WSS 3.0 SP Search Service Data .......................................................................... 130
Protecting MOSS 2007 Shared Services Provider (SSP) Search ............................................... 131
Protecting SharePoint Search and MOSS 2007 Shared Service Provider (SSP) ................... 131
Recovering a SharePoint Farm by Using Databases with SQL Server Aliases .......................... 134
Recovering a farm that uses a database with a SQL Server alias .......................................... 134
See Also ................................................................................................................................... 135
Recovering Windows SharePoint Services 3.0 SP Search Service Data ................................... 149
Recovering Windows SharePoint Services 3.0 SP Search Service Data................................ 149
Recovering MOSS 2007 Shared Services Provider (SSP) Search ............................................. 150
How to Recover MOSS 2007 Shared Services Provider (SSP) Search .................................. 150
How to Recover an Index with Mirrored Database in MOSS 2007 Shared Services Provider
(SSP) Search ........................................................................................................................ 150
Additional Resources ............................................................................................................... 151
Conditions When DPM Fails to Back up Hyper-V Virtual Machines in an Online State .............. 177
Considerations for Backing Up Virtual Machines on CSV with Hardware VSS Providers .......... 199
Migrating from the System VSS Provider to a Hardware VSS Provider ..................................... 200
Considerations for Backing Up Virtual Machines on CSV with the System VSS Provider ......... 201
Enabling Per Node Serialization .............................................................................................. 201
Enabling Per CSV LUN Serialization ....................................................................................... 201
Procedure to Create the DataSourceGroups.xml File and Serialize the Backup Jobs ............ 203
Procedure to Generate the DataSourceGroups.xml File on a CSV Cluster ............................ 203
Procedure to Merge the DataSourceGroups.xml Files from All CSV Clusters ........................ 204
Security Considerations for Protecting Computers in Workgroups or Untrusted Domains ......... 206
In This Section
Managing DPM Servers
Managing Protected File Servers and Workstations
Managing Protected Servers Running Exchange
Managing Protected Servers Running SQL Server
Managing Protected Servers Running SharePoint
Managing Protected Virtual Servers
Managing Protected Client Computers
Managing Hyper-V Computers
Managing Protected Computers in Workgroups and Untrusted Domains
Managing System Protection
Managing Performance
Managing Tapes
Appendix A: Quick Reference to DPM Tasks
Appendix B: DPM 2010 Schema Extension
Appendix C: Custom Report Views
Appendix D: Configuration of Inbox Tracing
Appendix E: Windows Server Logo Certification
21
Managing DPM Servers
As a system administrator, you are accustomed to managing servers in different roles. You plan
your maintenance routines to accommodate each server’s role, and you take that role into
account when making structural changes such as changing the server name or relocating the
server. So what do you need to consider when the role of a server running System Center Data
Protection Manager (DPM) is added to your network structure?
This section discusses performing common maintenance tasks on DPM servers. It provides
guidance on making changes to server configurations after DPM is set up and on how DPM
manages time zones. This section provides information about configuring firewalls on both the
DPM server and protected computers so that communication can be maintained. This section
also provides recommendations for monitoring DPM and offers methods for monitoring.
In This Section
Performing General DPM Server Maintenance
Performing DPM Server Management Tasks
Managing the Storage Pool
Monitoring DPM Server
See Also
Managing Performance
Managing Protected File Servers and Workstations
Managing Protected Servers Running Exchange
Managing Protected Servers Running SQL Server
Managing Protected Servers Running SharePoint
Managing Protected Virtual Servers
In This Section
Using Windows Maintenance Tools on the DPM Server
22
Applying Operating System Updates to the DPM Server
Running Antivirus Software on the DPM Server
See Also
Managing the Storage Pool
Monitoring DPM Server
Performing DPM Server Management Tasks
Disk Cleanup: Use to remove temporary files, Disk Cleanup is not available for replica
Internet cache files, and unnecessary program volumes and recovery points volumes in the
files. DPM storage pool.
Disk Defragmenter: Use to analyze volumes You should not run Disk Defragmenter on disks
for the amount of fragmentation and to that are members of the storage pool on the
defragment volumes. DPM server. Knowledge Base article 312067
explains the issue with Disk Defragmenter as
follows:
"The System Shadow Copy provider uses a
copy-on-write mechanism that operates at a 16-
KB block level. This is independent of the file
system's cluster allocation unit size. If the file
system's cluster size is smaller than 16 KB, the
System Shadow Copy provider cannot easily
determine that disk defragmentation I/O is
different from typical write I/O, and performs a
copy-on-write operation. This might cause the
Shadow Copy storage area to grow very
quickly. If the storage area reaches its user-
defined limit, the oldest shadow copies are
23
Windows Tool Considerations
deleted first."
For more information about this issue, see the
Microsoft Knowledge Base article Shadow
copies may be lost when you defragment a
volume
(http://go.microsoft.com/fwlink/?LinkId=65210).
Chkdsk.exe: Use to check the file system and Do not run chkdisk on DPM replica and
file system metadata for errors and to display a recovery point volumes. Chkdsk causes the
status report of its findings. volumes to dismount, and if data is written to
the replica volume while the recovery point
volume is dismounted, it might cause a
complete loss of recovery points.
See Also
Applying Operating System Updates to the DPM Server
Running Antivirus Software on the DPM Server
Using Windows Maintenance Tools on File Servers and Workstations
Using Windows Maintenance Tools on SQL Servers
Using Windows Maintenance Tools on Exchange Servers
Using Windows Maintenance Tools on SharePoint Servers
Using Windows Maintenance Tools on Virtual Server
24
You should also check regularly for updates to DPM and prerequisite software. For a list of the
prerequisite software, see DPM Server Software Prerequisites
(http://go.microsoft.com/fwlink/?LinkID=158965).
Updates to DPM are available through Microsoft Update, which is a service from Microsoft that
delivers required updates from the Microsoft Update Catalog. The Microsoft Update Catalog is a
repository for Microsoft software updates and contains updates that address security and
reliability issues. The Microsoft Update service queries the Microsoft Update Catalog to determine
what updates are available for the computer on which Microsoft Update is installed.
You can subscribe to Microsoft Update at any time on the Microsoft Update Web site
(http://go.microsoft.com/fwlink/?LinkId=41291).
See Also
Running Antivirus Software on the DPM Server
Using Windows Maintenance Tools on the DPM Server
25
Windows\Microsoft.net\Framework\v2.0.50727\csc.exe. The csc.exe process is the C#
compiler. Real-time monitoring of the csc.exe process can degrade performance because it
causes the antivirus software to scan files that the csc.exe process emits when it generates
XML messages. For information about configuring real-time monitoring based on process
name, see your antivirus product documentation.
Delete infected files on protected servers and the DPM server.
To prevent data corruption of replicas and recovery points, configure the antivirus software to
delete infected files rather than automatically cleaning or quarantining them. Automatic
cleaning and quarantining can result in data corruption because these processes cause the
antivirus software to modify files, making changes that DPM cannot detect.
Whenever DPM attempts to synchronize a replica that has been modified by another
program, data corruption of the replica and recovery points can result. Configuring the
antivirus software to delete infected files resolves this problem. For information about
configuring your antivirus software to delete infected files, see the documentation for your
antivirus software.
Important
You must run a manual synchronization with consistency check job each time that
the antivirus software deletes a file from the replica, even though the replica will not
be marked as inconsistent.
See Also
Applying Operating System Updates to the DPM Server
Using Windows Maintenance Tools on the DPM Server
In This Section
Managing the DPM Database Volume
Finding DPM Servers in Active Directory Domain Services
How to Migrate a DPM Server to New Hardware
Restarting the DPM Server
Moving the DPM Server to a New Domain
Renaming the DPM Server
Changing the SQL Server Instance Used by DPM
26
Coordinating Protection Across Time Zones
How to Change the Time Zone of the DPM Server
See Also
Managing the Storage Pool
Monitoring DPM Server
Performing General DPM Server Maintenance
See Also
Performing DPM Server Management Tasks
Note
If DPM is installed on a server that is not a member of a domain and the server is then
added to a domain, the service connection point will not be registered in Active Directory
Domain Services.
27
To locate DPM servers in Active Directory Domain Services, use a query tool such as Adsiedit to
find all computers in the domain that have a “serviceClassName=MSDPM” service connection
point.
Note
Adsiedit is a Microsoft Management Console (MMC) snap-in that is available when you
install the Windows Server 2003 Support Tools. For more information about using
Adsiedit, see Adsiedit Overview on the Windows Server 2003 TechCenter
(http://go.microsoft.com/fwlink/?LinkId=50377).
See Also
Performing DPM Server Management Tasks
28
To migrate a DPM server to new hardware,
1. Install DPM on a new server. For more information, see Installing DPM 2010
(http://go.microsoft.com/fwlink/?LinkID=179156).
2. Identify a protected computer to migrate and run SetDPMServer.exe -DPMServerName <Name
of new DPM server> on the protected computer.
3. Run the PowerShell script Attach-ProductionServer.ps1 from the DPM Management
Shell on the DPM server.
Note
For more information about using the Attach-ProductionServer script, see
Installing Protection Agents Manually
(http://go.microsoft.com/fwlink/?LinkID=185786).
4. Create protection groups on the new DPM server for the protected computers. For more
information, see Configuring DPM 2010 (http://go.microsoft.com/fwlink/?LinkID=179157).
5. Maintain the previous DPM server until the recovery points from inactive replicas on it are
no longer required.
See Also
Performing DPM Server Management Tasks
29
Copy to tape
Recovery from tape
Tape verification
If you are erasing a tape, postpone the restart until the current job is complete. Cancel any
pending tape erase jobs, restart the computer, and then reschedule the canceled tape erase
jobs.
See Also
Performing DPM Server Management Tasks
See Also
Performing DPM Server Management Tasks
See Also
Performing DPM Server Management Tasks
30
4. Restore DPMDB to the new instance of SQL Server, run DpmSync, and then run a
consistency check for the data sources protected by the DPM server.
This process depends on the availability of a backup of the DPM database. For more information
about backing up and restoring the DPM database, see Setting Up Disaster Recovery.
See Also
Performing DPM Server Management Tasks
31
servers. At 9:00 P.M. Berlin time, you cannot schedule an initial replica creation job for the file
server in Reykjavik at 8:00 P.M. on the same day, even though it is not yet 8:00 P.M. in
Reykjavik, because that time is in the past for the DPM server in Berlin.
Initial replica creation jobs occur by using the time of the protected computer. This means that if
you schedule an initial replica creation job for the file server in Reykjavik to occur at 9:00 P.M. on
a set date, the job will run at 9:00 P.M. Reykjavik time on that day.
Suppose the DPM server in Berlin is also protecting a file server in Sofia, which is an hour later
than Berlin. At 8:00 P.M. in Berlin, you schedule an initial replica creation job for the file server in
Sofia to begin at 8:30 P.M. You can schedule it for 8:30 P.M. because that time is in the future for
the DPM server. However, because it is already past 8:30 P.M. in Sofia, the initial replica creation
will begin immediately.
See Also
How to Change the Time Zone of a File Server or Workstation
How to Change the Time Zone of the DPM Server
Performing DPM Server Management Tasks
See Also
How to Change the Time Zone of a File Server or Workstation
Coordinating Protection Across Time Zones
Performing DPM Server Management Tasks
Note
The subnet should cover the entire range of network addresses for the DPM server
and the servers you intend to protect.
3. Restart the DPM agent on the DPM server and the protected computers. It may cause
ongoing tasks to fail. Post a restart, watch out for alerts, and perform the recommended
actions, if needed.
33
Example
This example details the process of setting up a backup network address for a DPM server
protecting another server. All names and addresses are hypothetical and for illustration only.
The existing backup setup consists of dpm.x.y.com protecting ps.x.y.com. Name lookup using
“nslookup” on either server returns the following IPs (that is, each IP address is visible to each
node):
Note
The name lookups must be performed on the FQDNs; for example, “nslookup
ps.x.y.com”.
Now, to set up a backup network, another NIC is added to each of the above servers and
connected to another network such as 192.168.1.0/24 with a corresponding subnet mask
255.255.255.0. When the network and NICs are configured, the name lookup using “nslookup”
returns two addresses per server as given below.
We recommend that you verify whether the DPM server is able to ping the protected computer’s
backup network address (192.168.1.24). Similarly, the protected computer should be able to ping
the DPM server’s backup network address (192.168.1.23).
At this stage, backup LAN configuration information is added to the DPM server as follows:
Add-BackupNetworkAddress -DpmServername DPM -Address 192.168.1.0/24 -
SequenceNumber 1
Note
The “Address” parameter specifies the backup network/subnet.
The DPM agents on TestingServer and the protected server are restarted (“net stop dpmra”
followed by “net start dpmra” on each server).
Finally, a backup task is triggered and the NIC used for backup data transfer verified using
taskmgr->networking. The backup task must correspond to a data source on the protected
server.
Note
34
Add-BackupNetworkAddress enables you to configure more than one backup network.
You can also use the primary network as a fallback network while using the backup
network. In the above example, the primary network could also have been added with
SequenceNumber 2. As a result, if the primary network is removed and the name lookup
of servers no longer returns 192.168.1.0/24 addresses, DPM can automatically start
using the primary network for backup data traffic.
Note
The FQDN and version of DPM on both Server1 and Server2 must be the same.
1. At the command prompt, run DPMBackup.exe -db, located at Microsoft Data Protection
Manager\DPM\bin.
2. In the console tree of the backup program, browse to Microsoft Data Protection
Manager\DPM\Volumes\ShadowCopy\Database Backups. The file name of the DPM
database backup is DPMDB.bak.
3. Select the media to which you want to back up the database.
4. Start the backup.
35
To install DPM
For information about how to install DPM, see Installing DPM 2010
(http://go.microsoft.com/fwlink/?LinkId=179156).
1. At the command prompt, type DpmSync –restoredb –dbloc <DPMDB location>, and
then press ENTER.
Note
The default location of DPMDB is C:\Program Files\Microsoft
DPM\DPM\DPMDB. When you use an existing instance of SQL Server for DPM,
the default location of DPMDB is the path on the instance of SQL Server where
the SQL databases are located.
2. At the command prompt, type DpmSync -sync.
3. After the new installation is complete and the database is restored, in DPM Administrator
Console, in the Monitoring task area, check for protection jobs that failed. Manually
restart any failed jobs.
4. After you restart the failed jobs, you must perform a consistency check for all data
sources. For more information about how to perform a manual consistency check, see
"How to synchronize a replica" in DPM 2010 Help.
Remove-ProductionServer.PS1
Syntax: Remove-ProductionServer.ps1 -DPMServername [DPMServerName] -PSName
[ProtectedComputerName]
Parameter Description
36
Parameter Description
Important
There should be no actively protected data sources on the computer you are trying to
remove.
Important
Some original equipment manufacturers (OEMs) include a diagnostic partition that is
installed from media that they provide. The diagnostic partition might also be named the
OEM partition, or the EISA partition. EISA partitions must be removed from disks before
you can add the disk to the DPM storage pool.
In This Section
Adding Disks to the Storage Pool
How to Replace a Disk in the Storage Pool
Removing a Disk from the Storage Pool
37
See Also
Monitoring DPM Server
Performing DPM Server Management Tasks
Performing General DPM Server Maintenance
Note
All disks without a friendly name are listed as “Disk Drive.” An example of a
friendly name is “HITACHI_DK23EB-40”.
3. On the Action menu, click Scan for hardware changes to reinstall the disk.
See Also
How to Replace a Disk in the Storage Pool
Removing a Disk from the Storage Pool
38
volumes that are stored on the failed disk.
2. Remove protection from the data sources that have replica volumes and recovery point
volumes on the failed disk, and select Delete protected data.
3. Physically remove the disk that needs to be replaced.
4. Physically add the replacement disk.
5. In DPM Administrator Console, click Management on the navigation bar, and then click
the Disks tab.
6. Select the disk that you removed, and in the Actions pane, click Remove.
7. In the Actions pane, click Add.
8. In the Available disks section, select the replacement disk, click Add, and then click OK.
9. Add the data sources from step 2 to an existing protection group, or create a new
protection group for these data sources.
a. If you create a new protection group and have tape backup of the data sources,
create the replicas manually by using the tape backup.
b. If you create a new protection group and do not have tape backup of the data
sources, allow DPM to create the replicas across the network.
c. If you add the data sources to an existing protection group, DPM will start an
immediate consistency check, which will re-create the replicas.
Note
For more information, in the TechNet Library, see Configuring DPM
(http://go.microsoft.com/fwlink/?LinkID=179157).
See Also
Adding Disks to the Storage Pool
Removing a Disk from the Storage Pool
39
the disk from the storage pool, when you bring the disk online again, DPM will remap the volumes
on the disk and can access the existing data on it.
See Also
Adding Disks to the Storage Pool
How to Replace a Disk in the Storage Pool
Note
For information about monitoring server performance, see Managing Performance.
In This Section
Establishing a Monitoring Schedule
Locating Information
Methods for Monitoring DPM
See Also
Managing Performance
Managing the Storage Pool
Performing DPM Server Management Tasks
Performing General DPM Server Maintenance
40
aware of trends and troubleshooting issues, and so that you can respond quickly to any problems
that require your attention. The following table lists suggestions for a monitoring schedule.
At this interval Check these sources And look for this information
Disk Utilization
See Also
Locating Information
Managing Performance
Methods for Monitoring DPM
Locating Information
After you implement your monitoring schedule, you will observe certain trends and notice various
alerts. You might want to investigate the issues underlying the alerts, troubleshoot problems, or
analyze some of the trends. DPM provides a number of resources to help you with your research.
The following table lists a number of references that you can use to locate information that will
help you answer many common questions.
Information Locations
41
What do you want to know? Look here:
Are recovery goals being met?
Do I need to add disk space to the storage Management task area, Disks tab
pool? Disk Utilization report
How many recovery points are available for a Protection task area, Details pane
data source? Recovery task area
Are all replicas consistent?
What tapes are available in the library? Management task area, Libraries tab
What data is on each tape?
Did a recovery job complete successfully? Monitoring task area, Alerts tab
Monitoring task area, Jobs tab
E-mail notification (if you subscribe to e-
mail notification when you initiate a
recovery)
Is the DPM server able to contact each Management task area, Agents tab
protected computer?
What is the status of the DPM service? Microsoft Management Console (MMC)
Services snap-in
Event log, in case of service failures
What is the status of each of my DPM servers MOM Operator console, State view
and the computers that they protect?
See Also
Establishing a Monitoring Schedule
Managing Performance
Methods for Monitoring DPM
42
Methods for Monitoring DPM
To monitor protection activities in System Center Data Protection Manager (DPM) 2010, you can
use the following methods:
Use DPM Administrator Console to view DPM operations running on a specific DPM server.
Configure DPM to provide reports and notifications of alerts by e-mail. For instructions, see
How to Create or Modify Report Subscriptions
(http://go.microsoft.com/fwlink/?LinkId=196773) in DPM 2010 Help.
Monitor operations for multiple DPM servers by using the System Center Data Protection
Manager (DPM) Management Pack for Microsoft Operations Manager 2005 or System
Center Operations Manager 2007.
Monitor the instance of SQL Server that DPM installs by using the System Center
SQL Server Management Pack for Microsoft Operations Manager 2005.
In This Section
Monitoring with DPM Administrator Console
Monitoring with Reports and Alert Notifications
Monitoring with DPM Management Packs
See Also
Establishing a Monitoring Schedule
Locating Information
Managing Performance
Note
You do not need to monitor each task area in DPM Administrator Console. For more
information, see Establishing a Monitoring Schedule.
43
Monitoring Task Area
The Monitoring task area contains two tabs: Jobs and Alerts.
For monitoring purposes, the Alerts tab provides the more critical information. You should check
the Alerts tab daily to provide timely resolution of issues that might be preventing successful
protection of data.
44
Note
Marking an alert as inactive should be evaluated on a case-by-case basis and should
not be done except when absolutely necessary.
45
Capacity of disks in the storage pool (used and free space)
Status of disks in the storage pool
Which protected volumes are contained on each disk
The Disks tab displays a list of disks included in the storage pool, and it enables you to add and
remove disks from the pool.
Note
46
When a DPM server is protecting a large number of computers, you should stagger the
delivery schedule for reports sent by e-mail. If you schedule all reports to be sent at the
same time, the memory limitations of SQL Server Reporting Services might prevent some
reports from being sent.
The following table summarizes the available reports and indicates how you should use them. For
information about interpreting the data in reports, see Report Types
(http://go.microsoft.com/fwlink/?LinkId=196781) in DPM 2010 Help.
DPM Reports
Note
The Status report includes the error codes for
any alerts recorded during the report period. To
view the error message associated with an error
code, see the DPM 2010 Error Code Catalog
(http://go.microsoft.com/fwlink/?LinkID=179174).
Tape Management The Tape Management report provides details for tape
rotation and decommissioning, and it verifies that the
free media threshold is not exceeded.
Use this report to manage tape circulation between the
library and your offsite location.
See Also
Managing Performance
Monitoring DPM Server
Monitoring with DPM Management Packs
Monitoring with Reports and Alert Notifications
48
Individual notification for each alert of the type to which you subscribe, and a notification
when the alert has been resolved.
If you enable notifications or subscribe to reports, consider setting up a rule in Microsoft Office
Outlook to filter notification and report mail into one or more dedicated mailbox folders. You can
filter these e-mail notifications by using the From address or subject line. The From address of e-
mail messages that contain notifications or reports will be the address that you specify when you
configure the SMTP server.
The Subject Lines Contained in E-Mail Notifications table provides a list of subject lines that
are used in each type of alert notification and each type of DPM report. You can use the text in
these subject lines when you set up rules in Outlook to filter reports and alert notifications into
specific folders. You can customize your e-mail notifications by using Operations Manager.
See Also
Managing Performance
Monitoring DPM Server
Monitoring with DPM Administrator Console
Monitoring with DPM Management Packs
49
Monitoring with DPM Management Packs
The System Center Data Protection Manager 2010 Management Packs for Operations Manager
enable an administrator to use a MOM Management Server to centrally monitor data protection,
state, health, and performance of multiple DPM servers and the computers that they protect.
From the Operations Manager Operator console, the administrator can monitor DPM and network
infrastructure simultaneously, analyzing issues with data protection in the context of other factors
in system and network performance. From the same console, the administrator can monitor other
mission-critical applications, such as Microsoft SQL Server and Microsoft Exchange Server.
From the Operations Manager server, administrators can perform the following monitoring tasks
for managed DPM servers and the computers that they protect:
Centrally monitor the health and status of data protection and critical performance indicators
of multiple DPM servers and the computers that they protect.
View the state of all roles on DPM servers and computers servers.
Monitor actionable DPM alerts relating to replica creation, synchronization, and recovery
point creation. The DPM Management Pack filters out alerts that do not require an action,
such as a synchronization job in progress.
Through Operations Manager alerts, monitor the status of memory, CPU, and disk resources
on DPM servers, and be alerted to DPM database failures.
Monitor resource usage and performance trends on DPM servers.
Diagnose and resolve problems on a remote DPM server.
The DPM Management Packs are not included with the DPM product. You can download
management packs at the DPM Management Pack download site
(http://go.microsoft.com/fwlink/?linkid=50208).
See Also
Managing Performance
Monitoring DPM Server
Monitoring with DPM Administrator Console
Monitoring with Reports and Alert Notifications
50
Data sources cannot be protected because
prerequisite software is missing
Error 31008 appears because the DPM prerequisite software requirements are not met. For a
complete list of all prerequisite software requirements and the required hotfixes and updates, see
Software Requirements (http://go.microsoft.com/fwlink/?LinkId=187362).
51
DPM does not support protection of data sources
if the data is on nested mount points
DPM does not support protection of a data source if the data is located on a nested mount point.
For example, if you create a SQL Server database on nested mount points as shown in the
scenario outlined in the following table, protection will fail for the SQL Server database located on
volume V3.
C:\ V1
D:\mnt1 (MP) V2
D:\mnt1\mnt2 (MP) V3
52
Manager 2007 automatically suppresses the additional alerts. This is because the System Center
Operations Manager 2007 Console takes time to refresh the view.
53
BitLocker locks volumes on reboot
If you have enabled BitLocker on the DPM server, replicas and shadow copy volumes get locked
and become inaccessible. This leads to failure of DPM jobs. The administrator needs to unlock
the volumes so DPM jobs can run.
In This Section
Performing General Maintenance on File Servers and Workstations
Performing File Server and Workstation Management Tasks
Managing Clustered File Servers
Additional Resources
Disaster Recovery (http://go.microsoft.com/fwlink/?LinkID=179152)
See Also
Managing DPM Servers
Managing Performance
Managing Protected Servers Running Exchange
Managing Protected Servers Running SQL Server
Managing Protected Servers Running SharePoint
Managing Protected Virtual Servers
Managing Tapes
54
Performing General Maintenance on File
Servers and Workstations
General maintenance includes tasks such as disk and file maintenance, updating operating
systems and applications, and protecting data by using antivirus software and performing regular
backups.
When you need to perform maintenance on a protected server and do not want protection jobs to
continue for the duration of the maintenance, you can use the following procedure to disable the
protection agent.
Note
If you disable a protection agent for a server that is a cluster node, you should disable the
protection agent for every node of the cluster.
In This Section
Using Windows Maintenance Tools on File Servers and Workstations
Applying Operating System Updates on File Servers and Workstations
Running Antivirus Software on File Servers and Workstations
See Also
Managing Clustered File Servers
Performing File Server and Workstation Management Tasks
55
Windows Maintenance Tools and Protected Computers
Disk Cleanup: Use to remove temporary files, Running Disk Cleanup should have no adverse
Internet cache files, and unnecessary program affect on performance or data protection.
files.
Disk Defragmenter: Use to analyze volumes Before adding a volume to a protection group,
for the amount of fragmentation and to check the volume for fragmentation, and if
defragment volumes. necessary, defragment the volume by using
Disk Defragmenter. When protection is applied
to extremely fragmented volumes, boot times
on the protected computer might be slowed
down and protection jobs might fail.
It is recommended that you run Disk Cleanup
before running Disk Defragmenter.
Chkdsk.exe: Use to check the file system and Before you run chkdsk /f on a protected
file system metadata for errors and to display a volume, verify that a consistency check of that
status report of its findings. volume is not being performed. Running
chkdsk /f on a protected volume while a
consistency check is being performed on that
volume can cause 100% CPU utilization.
Run synchronization with consistency check
after running Chkdsk.exe on the protected
computer.
See Also
Applying Operating System Updates on File Servers and Workstations
Managing Protected File Servers and Workstations
Running Antivirus Software on File Servers and Workstations
Using Windows Maintenance Tools on the DPM Server
Using Windows Maintenance Tools on Exchange Servers
Using Windows Maintenance Tools on SQL Servers
Using Windows Maintenance Tools on SharePoint Servers
Using Windows Maintenance Tools on Virtual Server
56
Applying Operating System Updates on File
Servers and Workstations
An important part of computer maintenance is ensuring that operating systems and software are
up to date. Updates—known as "fixes," "patches," "service packs," and "security rollup
packages"—help to protect computers and data.
You can use your preferred method for deploying software updates, such as Automatic Updates
or Windows Server Update Services, on DPM protected computers. Because some software
updates require a computer restart, you should schedule or perform the updates at times that
have the least impact on protection operations.
See Also
Managing Protected File Servers and Workstations
Running Antivirus Software on File Servers and Workstations
Using Windows Maintenance Tools on File Servers and Workstations
See Also
Applying Operating System Updates on File Servers and Workstations
Managing Protected File Servers and Workstations
Using Windows Maintenance Tools on File Servers and Workstations
57
Performing File Server and Workstation
Management Tasks
When events or business requirements demand it, you might need to make changes to your
protected file servers and workstations or to the data sources on the protected computer. The
topics in this section discuss the impact certain changes might have on DPM protection.
In This Section
Changing the Path of a Data Source
Moving File Servers and Workstations Between Domains
How to Rename a File Server or Workstation
How to Change the Time Zone of a File Server or Workstation
Using Migrate-Datasource
Using MigrateDatasourceDataFromDPM
See Also
Managing Clustered File Servers
Managing Performance
Performing General Maintenance on File Servers and Workstations
58
See Also
How to Change the Time Zone of a File Server or Workstation
How to Rename a File Server or Workstation
Managing Protected File Servers and Workstations
Moving File Servers and Workstations Between Domains
See Also
Changing the Path of a Data Source
How to Change the Time Zone of a File Server or Workstation
How to Rename a File Server or Workstation
Managing Protected File Servers and Workstations
59
How to Rename a File Server or Workstation
DPM uses the computer name as a unique identifier for replicas, recovery points, DPM database
entries, reporting database entries, and so on.
You cannot do the following:
Change the name of a protected computer and continue protection without disruption.
Change the name of a protected computer and associate the existing replicas and recovery
points with the new computer name.
We recommend that you do not change the name of a protected computer. If you must change
the name of a protected computer, you must complete two tasks:
Remove the data sources on the computer from protection (the old computer name).
Protect the data source on the computer (the new computer name).
See Also
Changing the Path of a Data Source
How to Change the Time Zone of a File Server or Workstation
Managing Protected File Servers and Workstations
Moving File Servers and Workstations Between Domains
60
How to Change the Time Zone of a File
Server or Workstation
DPM automatically identifies the time zone of a protected computer during installation of the
protection agent. If a protected computer is moved to a different time zone after protection is
configured, ensure that you do the following:
Change the computer time in Control Panel by using the Time Zone tab in the Date and
Time Properties dialog box.
Update the time zone in the DPM database.
For more information about time zones and DPM protection, see Coordinating Protection Across
Time Zones.
See Also
Changing the Path of a Data Source
How to Rename a File Server or Workstation
Managing Protected File Servers and Workstations
Moving File Servers and Workstations Between Domains
Using Migrate-Datasource
Migrate-Datasource is a command-line script that lets you continue protecting a data source (file,
folder, volume, or share) to the same replica volume even after it has been migrated to a different
volume on the same protected computer. You have to run the Migrate-Datasource script even if
you have not changed the drive letters of the volume because DPM recognizes volumes by the
GUID and not the drive letter.
61
Important
If you have secondary DPM protection configured, you must run the Migrate-Datasource
script on the secondary server also.
Note
Migrate-Datasource is used to migrate protected computer volumes while
MigrateDatasourceDataFromDPM is used to migrate DPM volumes.
The possible reasons for moving DPM-protected data sources across volumes include the
following:
The disk is corrupt.
Organization policy demands that disks be replaced at certain time intervals.
Syntax
Migrate-Datasource.ps1 [-DPMServerName] <string> [-Option [auto or manual]] [-PSName]
<string>
Parameter Description
62
Things to Remember
Migrate-Datasource is used only for migration of file system data sources, such as volumes.
For other data sources, follow the instructions in the alerts.
DPM does not support migration from a volume on a drive (for example, D:\) to a mounted
volume (for example, E:\<mountpoint>, where mountpoint is a location on which the volume
has been mounted).
For auto-migration of mounted volumes, the volume on the new computer should have the
same mount point name as the volume on the previously protected computer. DPM does not
allow you to migrate to a drive.
For migration of mounted volumes (where the old volume is protected by using a mount
point):
If the protected volume has multiple mount points, at least one mount point of the volume
on the new computer should have the same mount point path as before.
Old volume: C:\mnt
new volume: C:\mnt (may have drive letter and other mount points)
If the volume also has a drive letter, only the drive letter is visible while you select the
new volume for migration. This should be selected manually.
You should migrate volumes only if you have reformatted them or if the volume GUID
associated with the volume has changed.
Note
After migration, you cannot perform original location recovery for the recovery points
created before the migration. Recovery fails with the message Couldn't find the
selected volume. You can, however, recover to an alternate location.
Using MigrateDatasourceDataFromDPM
MigrateDatasourceDataFromDPM is a command-line script that lets you migrate DPM data for a
data source – replica volumes and recovery point volumes – across disks. Such a migration might
be necessary when your disk is full and cannot expand, your disk is due for replacement, or disk
errors show up.
Note
MigrateDatasourceDataFromDPM is used to migrate DPM volumes whereas Migrate-
Datasource is used to migrate protected computer volumes.
Depending on how you have configured your environment, this could mean one of more of the
following scenarios for moving data source data:
DPM disk to DPM disk
Data source to DPM disk
Data source to custom volume
63
The MigrateDatasourceDataFromDPM script moves all data for a data source or disk to the new
disk or volume. After migration is complete, the original disk from where the data was migrated is
not chosen for hosting any new backups. You must retain your old disks until all recovery points
on them expire. After the recovery points expire, DPM automatically deallocates the replicas and
recovery point volumes on these disks.
All backup schedules continue to apply and protection of the data source continues as before.
After migrating the replica of a data source that has secondary protection enabled, you must start
the Modify Protection Group wizard on the secondary DPM server, select the same data source,
and complete the wizard. This reconfigures secondary backups to run from the new replica
volume on the primary DPM server.
Syntax
MigrateDatasourceDataFromDPM.ps1 [-DPMServerName] <string> [-Source] <disk[]> [-
Destination] <disk[]>
MigrateDatasourceDataFromDPM.ps1 [-DPMServerName] <string> [-Source] <data source> [-
Destination] <disk[]>
MigrateDatasourceDataFromDPM.ps1 [-DPMServerName] <string> [-Source] <data source> [-
Destination] <DPM server volume[]>
Parameter Description
64
Note
The numbering for the disk array starts with 0.
Examples
The following examples show how the script works.
Example 1: Disk D1 contains the replica and recovery points for the data source DS1.
D1 R1 RP1
To do a disk to disk migration of the volumes on D1 to another disk D2, do the following:
$disk = Get-DPMDisk –DPMServerName DPMTestServer
./MigrateDatasourceDataFromDPM.ps1 –DPMServerName DPMTestServer –Source
$disk[0] –Destination $disk[1]
This results in the following:
D1 R1 RP1
D2 R1’ RP1’
You need to retain D1 for the retention range of the latest recovery point on it, usually one month.
After the latest recovery point expires, DPM will deallocate the replicas and recovery points on
disk D1 automatically.
Example 2: Disk D1 contains the replica of the data source DS1 and the recovery point for data
source DS2. Disk 2 contains the replica of DS2 and the recovery point for DS1.
D1 R1 RP2
D2 R2 RP1
If you do a DPM disk to DPM disk migration to a third disk (Disk 3), this disk will have four
volumes, replicas and recovery points for DS1 and DS2.
$disk = Get-DPMDisk –DPMServerName DPMTestServer
./MigrateDatasourceDataFromDPM.ps1 –DPMServerName DPMTestServer –Source
$disk[0] –Destination $disk[2]
This results in the following:
65
Disk Replica Recovery Point
D1 R1 RP2
D2 R2 RP1
This happens because DPM cannot move just a replica or a recovery point, it will always move
them in pairs, hence even though the command only moves the volumes from D1, DPM will move
also the related replica and recovery point.
Example 3: Disk D1 contains the replica of the data source DS1 and the recovery point for data
source DS2. Disk D2 contains the replica of DS2 and the recovery point for DS1.
D1 R1 RP2
D2 R2 RP1
If you choose to migrate only the data for DS1 to a third disk (Disk 3), this disk will have two
volumes, the replica and recovery point for DS1.
$pg = Get-ProtectionGroup DPMTestServer
$ds = Get-Datasource $pg[0]
$disk = Get-DPMDisk –DPMServerName DPMTestServer
./MigrateDatasourceDataFromDPM.ps1 –DPMServerName DPMTestServer –Source $ds[0]
–Destination $disk[2]
D1 R1 RP2
D2 R2 RP1
D3 R1’ RP1’
66
In This Section
Changing File Server Cluster Members
Changing Resource Groups on Clustered File Servers
See Also
Managing Performance
Performing File Server and Workstation Management Tasks
Performing General Maintenance on File Servers and Workstations
See Also
Changing Resource Groups on Clustered File Servers
Performing File Server and Workstation Management Tasks
Performing General Maintenance on File Servers and Workstations
67
Changing Resource Groups on Clustered
File Servers
A cluster node can have any number of resource groups. Moving a DPM protected data source to
a resource group, between resource groups, or out of a resource group can cause protection job
failures. To successfully make any of those changes to resource group membership, perform the
following steps:
1. Stop existing protection of the data source. The data source could belong to a protection
group as a single data source on a protected server or as a data source as a member of a
resource group.
2. Begin protection of the data source according to its new status, either as a single data source
on a protected server or as a data source as a member of a resource group. This will allocate
a new replica for the data source.
Changing the name of a resource group will affect the protection of all data sources in the
resource group. To change the name of a resource group, perform the following steps:
1. Stop protection of the resource group.
2. Change the name of the resource group.
3. Begin protection of the resource group under its new name.
See Also
Changing File Server Cluster Members
Performing File Server and Workstation Management Tasks
Performing General Maintenance on File Servers and Workstations
In This Section
What's New for Protecting Exchange Server 2010
Performing General Maintenance on Servers Running Exchange
Performing Exchange Server Management Tasks
Managing Clustered Exchange Servers
Recovering Exchange Data
68
Managing Exchange SCR Servers
In This Section
Exchange Server 2010 Prerequisites
Installing Protection Agents on Exchange Server 2010 Nodes
Protecting Exchange Server 2010
Recovering Exchange Server 2010 Data
69
With DPM 2010, the maximum amount of data that you can protect with a single DPM server is
80 TB. Therefore you can protect DAG’s that have up to 20 nodes with a single server or up to
10,000 mailboxes with a DPM server.
Note
When you install a protection agent on a DAG node, DPM 2010 displays the following
warning: "You cannot protect cluster data in the selected nodes without installing agents
on the other nodes." This is a DPM 2010 warning when you are protecting clusters. This
does not relate to Exchange Server 2010 and you can ignore this message.
Note
When parallel backups are tried on multiple copies of same Exchange Server database,
then backups will fail.
In addition to the wizard pages you used to protect Exchange Server 2007, you perform the steps
on the following wizard pages to protect Exchange Server 2010:
1. On the Select Protection Group Type page, select Server, and then click Next to continue.
2. On the Select Group Members page, expand the domain under which the DAG resides,
expand the DAG, all the existing databases together with their respective nodes are
displayed. Select the data you want to protect, and then click Next to continue.
Note
The Create New Protection Group Wizard does not indicate which databases are
active or passive. You must already know which databases are active or passive
when performing the steps in the wizard. For servers that are part of a DAG, the
databases will be listed under the <DAG-name> node.
Insert art: Databases in a DAG that have been selected for protection.
3. On the Specify Exchange Protection Options page, specify if you want to run the Eseutil
tool on one of the Exchange Server databases. For members on Exchange Server 2010,
select if you want to run the Eseutil tool for both the database and the log files or just for the
log files. If you are protecting DAG servers, Exchange Server recommends that you run the
Eseutil tool for log files only. For stand-alone servers, we recommend that you select both the
database and the log files.
4. On the Specify Exchange DAG Protection page, select the databases for copy backup and
express full backup. For protecting multiples copies of the same database, select only one
database for express full and incremental backup and then select the remaining copies for
copy backup.
Insert art: Databases selected for express full and copy backups.
70
5. On the Select Data Protection Method page, select whether you want to use short-term
disk-based protection or long-term tape-based protection, and then click Next to continue.
6. On the Select Short-term Goals page, specify your protection goals such as retention range
and synchronization frequency, and then click Next to continue.
7. On the Summary page, review your selections, and then click Create Group to complete the
wizard.
Note
After creating the protection group for the Exchange Server database, changing the
status of the Exchange Server database from active to passive or vice-versa on the
Exchange Server does not require any changes on the DPM server. DPM will
continue backing up the data from the same node without any failures.
71
3. Recover to an Exchange Recovery database. Recover to an Exchange Recovery
database instead of a standard mailbox database.
4. Recover to network location. Copy the database to a network folder.
5. Copy to tape. Create an on-tape copy of the database.
Note
DPM 2010 does not support recovering mailbox databases to passive databases. While
recovering to the original database or to an alternate database, the target database on
which the recovery is being performed should not be passive.
Note
If you disable a protection agent for a server that is a cluster node, you should disable the
protection agent for every node of the cluster.
In This Section
Using Windows Maintenance Tools on Exchange Servers
Performing Exchange Maintenance Tasks
Applying Operating System Updates on Exchange Servers
Running Antivirus Software on Exchange Servers
72
Using Windows Maintenance Tools on
Exchange Servers
Running Disk Cleanup, Disk Defragmenter, or Chkdsk.exe should have no adverse affect on
performance or data protection.
See Also
Using Windows Maintenance Tools on the DPM Server
Using Windows Maintenance Tools on File Servers and Workstations
Using Windows Maintenance Tools on SQL Servers
Using Windows Maintenance Tools on SharePoint Servers
Using Windows Maintenance Tools on Virtual Server
73
Running Antivirus Software on Exchange
Servers
To prevent data corruption of replicas and shadow copies, configure the antivirus software to
delete infected files rather than automatically cleaning or quarantining them. Automatic cleaning
and quarantining can result in data corruption because these processes cause the antivirus
software to modify files, making changes that System Center Data Protection Manager
(DPM) 2010 cannot detect. For instructions on configuring your antivirus software to delete
infected files, see the documentation for your antivirus software.
For instructions on configuring firewalls on computers when installing protection agents, see
Installing Protection Agents (http://go.microsoft.com/fwlink/?LinkId=179676) in Deploying
DPM 2010.
In This Section
Upgrading Exchange Server 2003 to Exchange Server 2007
Moving Exchange Servers Between Domains
How to Rename an Exchange Server
Adding Storage Groups and Databases
Dismounting Databases
Changing the Path of a Database or Log File
Renaming Storage Groups
Moving Databases Between Storage Groups
75
Change the name of a protected computer and associate the existing replicas and recovery
points with the new computer name.
We recommend that you do not change the name of a protected computer. If you must change
the name of a protected computer, you must complete two tasks:
Remove the data sources on the computer from protection (the old computer name).
Protect the data source on the computer (the new computer name).
To resolve this issue, you must manually reconfigure an express full backup on another copy of
the database so that log truncation happens for that database.
Dismounting Databases
When a database that belongs to a protected storage group is dismounted, protection jobs for
that database only will fail. Logs for that storage group will not be truncated. However, the longer
that the database remains dismounted, the more likely it is that the log space on the Microsoft
Exchange server will overflow, which will result in the dismount of the storage group on the
Exchange server. If the database will not be needed, you should delete it.
76
If a recovery point is created after the path changes, you cannot recover the storage group or
recovery points from recovery points based on the old path. You can still recover data to a
network folder.
If you recover a Microsoft Exchange 2003 storage group after the path for databases or log files
has changed and the most recent recovery point was created before the path change, the
recovery copies the files to the old path and tries to mount the databases. If the databases can be
mounted, the recovery appears to succeed.
If this occurs, you can take one of the following actions:
Change the databases back to the original path and then recover the storage group again.
Recover the databases using the Copy to a network folder option. Specify the new location
of the databases as the copy destination. Select the Bring database to a clean shutdown
after copying the files option. Mount the database after recovery.
If you recover an Exchange 2007 storage group after the path for databases or log files has
changed and the most recent recovery point was created before the path changed, DPM will
recover the databases to the new location.
When you change the path of log files for a storage group that uses disk-to-tape backup and only
incremental backups have been performed since the path change, recovery of a storage group
using Latest as the recovery point will fail. To avoid this issue, perform one of the following
actions:
Run a full backup and then retry the storage group recovery.
Recover individual databases, rather than the storage group.
Recover the storage group to a network folder as files.
77
For instructions on tasks involving protection groups, see DPM Help.
From To Result
A protected storage group A storage group that is not DPM stops protection of that
protected database. Run a consistency
check for the protected storage
group after the move.
A storage group that is not A protected storage group DPM begins protection of that
protected database if the database files
are on a volume protected by
DPM. If the database files are
not on a protected volume, run
the Modify Group Wizard. Run
a consistency check for the
protected storage group after
the move.
SharePoint tbl_RM_SharePointRecoverableObject
tbl_RM_RecoverySource
Rebuilding Indexes
Rebuilding an index deletes the index and creates a new one. Rebuilding an index removes
fragmentation and reclaims disk space by compacting the pages that are using the specified or
existing fill factor setting, and the index rows are reordered in contiguous pages, allocating new
pages as needed. This can improve SQL query performance by reducing the number of page
reads required to obtain the requested data.
Query to rebuild an index
USE DPMDB
GO
ALTER INDEX ALL ON <tableName> REBUILD
GO
Reorganizing Indexes
Reorganizing an index defragments the leaf level of clustered and nonclustered indexes on tables
and views by physically reordering the leaf-level pages to match the logical order (left to right) of
the leaf nodes. Having the pages in order improves index-scanning performance. The index is
reorganized within the existing pages allocated to it; no new pages are allocated. If an index
spans more than one file, the files are reorganized one at a time. Pages do not migrate between
files.
Reorganizing an index also compacts the index pages. Any empty pages created by this
compaction are removed providing additional available disk space. In some cases, the gain might
not be significant. It is also takes longer than rebuilding the index.
Query to rebuild indexes
USE DPMDB
GO
ALTER INDEX ALL ON <tableName> REORGANIZE
GO
79
Rebuilding Compared To Reorganizing
Rebuilding Reorganizing
Takes the table whose indexes are being Leaves the table whose indexes are being
currently rebuilt offline. Rebuilding should be reorganized online and working normally. Does
done when it will least affect normal operations. not affect normal operations.
Substantial performance gains in search and Moderate performance gains in search and
browse operations. browse operations.
Most effective when index is heavily Most effective when index is not heavily
fragmented. fragmented.
Additional Resources
ALTER INDEX (Transact-SQL) (http://go.microsoft.com/fwlink/?LinkId=129339)
In This Section
Changing Exchange Server Cluster Members
Changing Resource Groups on Clustered Exchange Servers
80
For example, assume you have a server cluster that contains four computers: Node1, Node2,
Node3, and Node4. You need to replace computer Node4 with a new computer, named Node5.
You use the administration console for your cluster service to add Node5 to the cluster and
configure the resources that can be failed over to Node5.
DPM issues an alert that protection of the server cluster will fail until a protection agent is installed
on Node5. You install the protection agent on Node5.
You fail over the resources from Node4 to other nodes in the cluster. When no resources remain
on Node4, you remove it from the cluster. DPM detects the failovers and continues protection of
the cluster.
DPM detects that Node4 has left the cluster—it appears as a stand-alone node now. If it no
longer exists on the network, you can remove the record for this server in DPM Administrator
Console.
81
If you select this option, and the recovery destination contains files that have the same
names as the files you are recovering, the current database files will be overwritten during
recovery.
For Exchange 2003 only: You must configure the target database to allow it to be overwritten
by the recovered data. For instructions, see "How to Configure the Exchange Databases so
That the Restore Process Overwrites Them" (http://go.microsoft.com/fwlink/?LinkId=97929).
Recover the database to another database on an Exchange 2007 server.
This option is available only for Exchange 2007.
This option is not available if you select Latest as the recovery point. You must specify an
existing database to which the selected database will be recovered. You must configure the
target database to allow it to be overwritten by the recovered data. For instructions, see "How
to Configure the Exchange Databases so That the Restore Process Overwrites Them"
(http://go.microsoft.com/fwlink/?LinkId=97929).
Recover to Recovery Storage Group.
This option is available only for Exchange 2007.
This option is not available if you select Latest as the recovery point.
Copy the database to a network folder.
This option is not available if you select Latest as the recovery point. Data Protection
Manager (DPM) creates the following directory structure at the destination that you specify:
DPM_Recovery_Point_timestamp\DPM_Recovered_At_timestamp\Server name\Exchange
application\Database name\Files
To use the Bring the database to a clean shutdown after copying the files option, the
DPM protection agent and the Eseutil utility must be installed on the destination server. The
Eseutil utility can be installed as part of either an Exchange Server installation or an
Exchange Server Administrator-only-mode installation.
Copy the database to tape.
This option is not available if you select Latest as the recovery point. This option copies the
replica of the storage group that contains the selected database.
In This Section
How to Recover a Storage Group to its Original Location
How to Recover a Database to Its Original Location
How to Recover a Database to an Alternate Database
How to Copy Exchange Data to a Network Folder
How to Copy Exchange Data to Tape
Recovering Mailboxes
Recovering Data to Clustered Servers
82
How to Recover a Storage Group to its
Original Location
When you recover a storage group to its original location, and the recovery destination contains
files that have the same names as the files you are recovering, the current database files will be
overwritten during recovery.
See Also
How to Recover a Database to Its Original Location
How to Recover a Database to an Alternate Database
How to Copy Exchange Data to a Network Folder
How to Copy Exchange Data to Tape
Recovering Mailboxes
Recovering Data to Clustered Servers
83
How to Recover a Database to Its Original
Location
When you recover a Microsoft Exchange Server 2003 database to the original location, Data
Protection Manager (DPM) does not use the latest log files from the protected server; therefore,
the recovery is to the last saved state. To perform a database recovery without losing data,
recover the database to the original location using one of the following methods:
If there are no databases mounted under the storage group, recover the storage group using
the Latest recovery point.
If any database is mounted under the storage group, create a recovery point for the storage
group, and then recover the database using the Latest recovery point.
If you select Latest as the recovery point for an Exchange Server 2007 database, DPM applies
the log files from the protected server and performs a lossless recovery without any additional
steps.
Note
In Exchange 2007, if there are multiple databases in a storage group, all databases will
be dismounted during recovery. An Exchange 2007 best practice is to have one database
per storage group.
84
9. On the Summary page, review the recovery settings and then click Recover.
See Also
How to Recover a Storage Group to its Original Location
How to Recover a Database to an Alternate Database
How to Copy Exchange Data to a Network Folder
How to Copy Exchange Data to Tape
Recovering Mailboxes
Recovering Data to Clustered Servers
85
See Also
How to Recover a Storage Group to its Original Location
How to Recover a Database to Its Original Location
How to Copy Exchange Data to a Network Folder
How to Copy Exchange Data to Tape
Recovering Mailboxes
Recovering Data to Clustered Servers
86
This option is available if you are copying a database, and it brings the database files
to a mountable condition by copying the logs. Select this option only if the destination
is an Exchange-based server that has the same version of the Exchange application
and the same or later version of Eseutil.exe as at the time of protection.
Send an e-mail when this recovery completes.
Select this option to specify an e-mail address or addresses to notify upon recovery
completion. If you select this option, you must enter the e-mail address to notify.
Multiple e-mail addresses must be separated by a comma.
10. On the Summary page, review the recovery settings and then click Recover.
See Also
How to Recover a Storage Group to its Original Location
How to Recover a Database to Its Original Location
How to Recover a Database to an Alternate Database
How to Copy Exchange Data to Tape
Recovering Mailboxes
Recovering Data to Clustered Servers
87
copy the data to tape.
When the data is being copied from tape and the tape library has multiple tape
drives, the library you select in Primary library will read from the source tape and
copy the data to another tape.
When the data is being copied from tape and the tape library has only a single tape
drive, the library you select in Primary library will read from the source tape and the
library you select in Copy library will copy the data to tape.
9. Enter a label for the tape on which the storage group will be copied.
10. Specify if the data that is copied should be compressed.
11. On the Specify recovery options page, you can select Send an e-mail when this
recovery completes.
Select this option to specify an e-mail address or addresses to notify upon recovery
completion. If you select this option, you must enter the e-mail address to notify. Multiple
e-mail addresses must be separated by a comma.
12. On the Summary page, review the recovery settings, and then click Recover.
Additional Resources
How to Copy a Tape (http://go.microsoft.com/fwlink/?LinkId=196785)
See Also
How to Recover a Storage Group to its Original Location
How to Recover a Database to Its Original Location
How to Recover a Database to an Alternate Database
How to Copy Exchange Data to a Network Folder
Recovering Mailboxes
You can recover deleted e-mail messages using Microsoft Outlook. For instructions, see "How to
Recover a Deleted Item" (http://go.microsoft.com/fwlink/?LinkId=97933). To recover a deleted
mailbox, use the Exchange Management Shell or the Exchange Management Console. For
instructions, see "How to Recover a Deleted Mailbox"
(http://go.microsoft.com/fwlink/?LinkId=97934).
If you cannot recover the mailbox using the Exchange Management Shell or the Exchange
Management Console, such as when the retention period is expired, you can use System Center
Data Protection Manager (DPM) to recover the mailbox.
To recover a mailbox, DPM must copy the entire database because this is the recommended
method that Exchange supports, as explained in Knowledge Base article 904845, "Microsoft
88
support policy for third-party products that modify or extract Exchange database contents"
(http://go.microsoft.com/fwlink/?LinkId=96542).
When you select a mailbox for recovery, you cannot select Latest as the recovery point. The
Latest option recovers the data from the most recent recovery point, and then applies all
committed transactions from the server logs. This functionality is not available for individual
mailboxes.
Item details will not appear on the Recovery Wizard Summary page for Exchange Server
mailboxes.
In This Section
How to Recover an Exchange 2003 Mailbox
How to Recover an Exchange 2007 Mailbox
Caution
DPM needs to restore the entire Exchange database before you can recover an
individual mailbox. Please make sure you have sufficient space on the server to which
you are restoring the database.
89
(http://go.microsoft.com/fwlink/?LinkId=153245).
10. Complete the Recovery Wizard.
11. Extract the mailbox from the recovered database.
For Exchange Server 2003, use the Microsoft Exchange Server Mailbox Merge
Wizard (ExMerge).
For Exchange Server 2003 SP1, extract and merge data using Exchange 2003
System Manager.
See Also
How to Copy Exchange Data to a Network Folder
Recovering Mailboxes
How to Recover an Exchange 2007 Mailbox
90
The procedure you use depends on whether there is an existing mailbox to which you want to
recover a previous version or the mailbox no longer exists and you want to recover it.
Caution
DPM needs to restore the entire Exchange database before you can recover an
individual mailbox. Please make sure you have sufficient space on the server to which
you are restoring the database.
Example
You need to retrieve some items from a mailbox for an employee who has left the organization.
The following is the identification of the mailbox:
Exchange Server: exchangeserver1
Storage group: SG1
Database: DB11
Mailbox: John
91
Storage group SG1 is protected by DPM. You decide to recover the mailbox John to the
manager's mailbox so that he can retrieve the necessary items. The following is the identification
of the manager's mailbox:
Exchange Server: exchangeserver1
Storage group: SG2
Database: DB21
Mailbox: Simon
To recover the mailbox John to the mailbox Simon, you perform the following steps:
1. Create a Recovery Storage Group (RSG) by running the following Exchange Management
Shell cmdlet:
new-storagegroup -Server exchangeserver1 -LogFolderPath C:\RSG\ -Name RSG -
SystemFolderPath C:\RSG\ -Recovery
This creates a storage group named RSG on exchangeserver1.
2. Add a recovery database to the RSG by running the following Exchange Management Shell
cmdlet:
new-mailboxdatabase -mailboxdatabasetorecover exchangeserver1\SG1\DB11 -
storagegroup exchangeserver1\RSG -edbfilepath C:\RSG\DB11.edb
This creates a mailbox on exchangeserver1\RSG\DB11. The .edb file name must be the
same as the .edb file name for the mailbox you are recovering.
3. Set the recovery database to allow overwrites by running the following Exchange
Management Shell cmdlet:
set-mailboxdatabase -identity exchangeserver1\RSG\DB11 -AllowFileRestore 1
4. Open DPM Administrator Console and click Recovery on the navigation bar.
5. Expand the tree and select SG1.
6. Double-click database DB11.
7. Select John, and click Recover.
8. In the Recovery Wizard, on the Review Recovery Selection page, click Next.
9. On the Select Recovery Type page, select Recover mailbox to an Exchange server
database.
10. On the Specify Destination page, enter the following information:
For Exchange server: exchangeserver1
For storage group: RSG
For database: DB11
11. Specify your recovery options, and then click Recover.
12. Set the destination database to allow overwrites by running the following Exchange
Management Shell cmdlet:
set-mailboxdatabase -identity exchangeserver1\SG2\DB21 -AllowFileRestore 1
The destination database is the database that contains the mailbox to which we want to
recover the e-mail from the John mailbox.
92
13. When the recovery is complete, run the following Exchange Management Shell cmdlet:
Restore-Mailbox -RSGMailbox 'John' -RSGDatabase 'RSG\DB11' -id 'Simon' -
TargetFolder 'John E-mail'
The manager opens his mailbox and finds a new folder named John E-mail, which contains
the e-mail items from the recovered mailbox.
See Also
Recovering Mailboxes
How to Recover an Exchange 2003 Mailbox
To recover the storage group or database in clean shutdown state to a network share
1. On the DPM server, recover the storage group or database, selecting the Copy to a
network folder option.
2. On the Specify Destination page, specify a folder on a server running Exchange 2007
server.
3. On the Specify Recovery Options page, select the Bring the database to a clean
shutdown state after copying the files option.
4. On the Summary page, click Recover.
93
Cluster Continuous Replication and Local
Continuous Replication Recovery
Data Protection Manager (DPM) will always recover to the active node, regardless of protection
topology.
If the database or logs on the passive node are corrupt, use either of the following procedures to
recover data.
To recover from failure on the passive node (if both copies are corrupt)
1. Set the Exchange Server database property Override by restore to True.
2. In the DPM Recovery Wizard, recover to the active node.
3. On the Exchange server, in Exchange Management Shell, run get-
storagegroupcopystatus to verify the copy status.
4. After recovery, synchronize the passive nodes with the active node.
See Also
Managing Clustered Exchange Servers
Recovering Exchange Data
94
Managing Exchange SCR Servers
System Center Data Protection Manager (DPM) 2010 provides support for backup and recovery
of Microsoft Exchange Server while supporting backup and recovery of the SCR server. For more
information, see Exchange Server 2007 - Standby Continuous Replication
(http://go.microsoft.com/fwlink/?LinkId=134034).
In the current scenario, an onsite DPM server protects the Exchange server or cluster. The DPM
server is protected by an offsite DPM server for disaster recovery. The Exchange server also
replicates its logs and databases to the SCR server at a remote location. By using this
deployment, you make sure that you have disaster recovery options both onsite and offsite.
However, this also means that both Exchange and DPM are sending data across the network.
In the new scenario, instead of having both DPM and Exchange send data over the network, you
use each DPM server to protect the local Exchange servers. The onsite DPM protects the onsite
Exchange server (SCR source); the offsite DPM protects the SCR server (SCR target). This
deployment lets you continue having a disaster recovery scenario both onsite and offsite without
the cost of both applications transporting data over the network.
Depending on business requirements, you can choose to protect either both the SCR source and
the SCR target server or just one of them.
Note
Incremental backups are not enabled for all Exchange data sources on an SCR target.
SCR protection requires a dedicated protection group.
DPM does not support configurations where a stand-alone Exchange server uses a clustered
SCR or vice versa.
Important
If SCR protection was enabled at the time of backup, make sure that it is also enabled at
the time of recovery.
Supported Scenarios
Both SCR source and target servers are Exchange Server 2007 in standalone mode.
Both SCR source and target servers are Exchange Server 2007 in SCC mode.
Both CCR source and target servers are Exchange Server 2007 in CCR mode.
In This Section
Protecting an Exchange Server 2007 SCR Target Server Configured as Single Node Cluster
Protecting an Exchange Server 2007 SCR Server in Standalone Mode
Modifying Protection For an Exchange Server 2007 SCR
95
Recovering an Exchange Server 2007 SCR Server
Stopping Protection for an Exchange Server 2007 SCR Server
Disabling Protection for an Exchange Server 2007 SCR Server
Protecting an Exchange Server 2007 SCR Server Post-Activation
Important
If you are using a Single Copy Cluster (SCC) server as your SCR source, you must set
the registry key EnableSccForScr of type DWORD under
HKLM\Software\Microsoft\Microsoft Data Protection Manager\Agent\2.0 to 1 before
proceeding with the following procedure on SCR target server.
Where Cluster FQDN for the cluster must be provided in the format
<Cluster Name>.<Domain>.
Example: Enable-ExchangeSCRProtection.ps1 DPMTest
ExchangeSCRCluster.DRCLUSTER.contoso.com
Note
You can check if Exchange SCR protection has been enabled by running get-
ExchangeSCRProtection.ps1.
96
The value for <Cluster FQDN> must be provided in the following format - <Cluster
Name>.<Domain Name>.
3. Run the Add-SCRSG script from the SCR target server.
Syntax: add-SCRSG.ps1 <SCRSourceFQDN> <Storage Group Name>
<Size of Storage Group in MB> <SCRTargetFQDN> <is cluster>
Where target FQDN for the cluster must be provided in the format
<Resource Group Name>.<Cluster Name>.<Domain>.
Example: add-SCRSG.ps1 ExchangeCluster.DRCluster.contoso.com testSG 1024
ExchangeSCRCluster.contoso.com $true
Note
In case of clusters, the source FQDN must be entered as <Resource Group
Name>.<Domain>.
4. On the DPM server, start the Create New Protection Group wizard.
Note
On the Specify Short-Term Goals page of the Create New Protection Group
wizard, you can only select Express full backups for SCR protection.
Important
After activating the SCR server as the primary Exchange server, you must run
Remove-SCRSG.ps1 on the SCR server to enable DPM protection. After
fallback, you must run Add-SCRSG.ps1 on the SCR server to enable DPM
protection.
97
Note
You can check if Exchange SCR protection has been enabled by running get-
ExchangeSCRProtection.ps1.
2. Create a storage group and database, with .log, .sys and .ebd files, with the same name as
the source at some temporary location on the SCR server.
Caution
Ensure that the log file path does not point to the location where the log files for the
SCR source exist. This can lead to the replication service failing.
3. Add the SCR server to the protection group using the Add-SCRSG script from the Exchange
Management Shell.
Syntax: add-SCRSG.ps1 <SCRSourceFQDN> <SGName> <Size of storage group in
MB> <SCRTargetFQDN> <is cluster> <cluster name>
Example: add-SCRSG.ps1 ExchangeServer.contoso.com testSG 1024
ExchangeCluster.contoso.com $false
Important
If the SCR server has been activated (if it is now the primary Exchange server), you
do not need to run this script as the Exchange writer will provide this information to
DPM.
4. Follow the wizard to create a new protection group on the DPM server.
Note
On the Specify Short-Term Goals page of the Modify Group wizard, you can only select
express full backups for SCR protection.
Note
98
On the Recovery tab in DPM Administrator Console, you cannot expand the SCR server to
display individual items.
You can only recover the SCR server to a network share.
Note
All scripts used in the procedure can be found under the <DPM Installation folder>\Bin
folder of the computer on which the action is being performed. For example, if the script
has to be run on the SCR server, the script is in .\Program Files\Microsoft Data Protection
Manager\DPM\Bin. On the DPM server, the script is in .\Program Files\Microsoft
DPM\DPM\Bin.
Scripts on the SCR server must be run in the Exchange Management Shell.
Syntax (standalone server): Disable-ExchangeSCRProtection.ps1 <DPMServerName>
<ScrPSFQDN>
99
Example: Disable-ExchangeSCRProtection.ps1 DPMTest ExchangeSCR.contoso.com
Syntax (clustered server): Disable-ExchangeSCRProtection.ps1 <DPMServerName>
<ResourceGroup>.<ClusterFQDN>
Example: Disable-ExchangeSCRProtection.ps1 DPMTest
ExchangeSCRCluster.DRCLUSTER.contoso.com
Important
After you activate the SCR server as the primary Exchange server, a new SCR server
has to be put in place to continue SCR protection. You must specifically enable protection
for the new SCR target.
In This Section
Performing General Maintenance on Servers Running SQL
Performing SQL Server Management Tasks
Managing Clustered SQL Servers
Managing Mirrored SQL Servers
Recovering SQL Server Data
100
Performing General Maintenance on Servers
Running SQL
General maintenance includes tasks such as disk and file maintenance, updating operating
systems and applications, and protecting data by using antivirus software and performing regular
backups. Some special considerations apply when you are performing server maintenance on
SQL Servers that are protected by Data Protection Manager (DPM).
When you need to perform maintenance on a protected server and do not want protection jobs to
continue for the duration of the maintenance, you can use the following procedure to disable the
protection agent.
Note
If you disable a protection agent for a server that is a cluster node, you should disable the
protection agent for every node of the cluster.
In This Section
Using Windows Maintenance Tools on SQL Servers
Performing SQL Maintenance Tasks
Applying Operating System Updates on SQL Servers
Running Antivirus Software on SQL Servers
101
See Also
Using Windows Maintenance Tools on the DPM Server
Using Windows Maintenance Tools on File Servers and Workstations
Using Windows Maintenance Tools on Exchange Servers
Using Windows Maintenance Tools on SharePoint Servers
Using Windows Maintenance Tools on Virtual Server
102
Running Antivirus Software on SQL Servers
To prevent data corruption of replicas and recovery points, configure the antivirus software to
delete infected files rather than automatically cleaning or quarantining them. Automatic cleaning
and quarantining can result in data corruption because these processes cause the antivirus
software to modify files, making changes that DPM cannot detect. For instructions on configuring
your antivirus software to delete infected files, see the documentation for your antivirus software.
In This Section
Upgrading SQL Server 2000 to SQL Server 2005
Moving SQL Servers Between Domains
How to Rename a Computer Running SQL Server
Changing the Recovery Model of a Database
Replacing a Disk on a SQL Server
Adding Databases to a SQL Server
Changing the Path of a SQL Server Database
Renaming a SQL Server Database
Running Parallel Backups
103
Note
After you reconfigure protection, DPM Administrator Console displays the protected
database as two separate nodes. The protection status in the Protection task area
appears as Inactive replica for one of the database nodes, and the Recovery task area
displays two database nodes with the same name.
104
Change the name of a protected computer and continue protection without disruption.
Change the name of a protected computer and associate the existing replicas and recovery
points with the new computer name.
We recommend that you do not change the name of a protected computer. If you must change
the name of a protected computer, you must complete two tasks:
Remove the data sources on the computer from protection (the old computer name).
Protect the data source on the computer (the new computer name).
105
When a database is added to a protection group, DPM detects the recovery model that the
database is configured to use. DPM does not allow log, or incremental, backups for databases
configured in the simple recovery model. Log backups are only allowed for databases configured
in the full and bulk-logged recovery models.
When the recovery model of a protected database is changed from simple to full or bulk-logged,
DPM protection continues as configured. When the recovery model of a protected database is
changed from full or bulk-logged to simple, express full backups will continue to succeed, but
incremental backups will fail.
To change the recovery model of a protected database to the simple recovery model
1. Stop protection of the database, selecting the retain replica option.
2. Change the recovery model on the SQL Server database.
3. Add the database to a protection group.
You should also stop protection of a database before you configure log shipping for the database
or change the database to Read Only. After you make the changes to the database, you can
reconfigure protection for the database.
When protecting SQL Server databases that are configured to use the full or bulk-logged
recovery models, DPM creates a folder on the SQL Server that is being protected. This folder is
created in the same location as the first log file (*.ldf) of each protected database.
This folder is used as a temporary store for logs during SQL Server log backup and SQL Server
log restore by DPM. If DPM finds the folder missing, DPM will re-create the folder.
106
Enabling SQL Server Instance Auto-Protection
SQL Server instance auto-protection is turned on by default for any instance of SQL Server that
you protect. When you add an instance of SQL Server to a protection group, auto-protection is
automatically enabled on the instance.
You can use the cmdlet Start-AutoProtection to force DPM to immediately check for new
databases and add them to protection if you cannot wait for the nightly job.
Supported Scenarios
The following is a list of scenarios in which you can perform parallel backups of a SQL data
source.
107
The databases are on Microsoft SQL Server 2008.
Note
Both the databases must be on different protection groups.
Both the databases are on different versions of SQL Server. For example, one is on Microsoft
SQL Server 2000 and the other on Microsoft SQL Server 2005.
Unsupported Scenarios
Neither Microsoft SQL Server 2000 nor Microsoft SQL Server 2005 support parallel backups. If
two databases from the same version and instance of SQL Server are scheduled for backup at
the same time, the backup will happen serially.
In This Section
Changing SQL Server Cluster Members
Changing Resource Groups on Clustered SQL Servers
108
You fail over the resources from Node4 to other nodes in the cluster. When no resources remain
on Node4, you remove it from the cluster. DPM detects the failovers and continues protection of
the cluster.
DPM detects that Node4 has left the cluster – it appears as a stand-alone node now. If it no
longer exists on the network, you can remove the record for this server in DPM Administrator
Console.
109
Protecting a Mirrored SQL Server Database
The procedure to protect a mirrored database is the same as protecting a SQL Server database.
When you select a mirrored database to add to the protection group in the Create New Protection
Group wizard, DPM automatically detects that the database is mirrored and displays the mirror
details on the Select Group Members page.
Note
DPM agents must be installed on all the computers in the cluster.
DPM protects all the following configurations:
Principal is clustered, mirror is not.
Principal is not clustered, mirror is.
Both principal and mirror are clustered.
Common Scenarios
Note
DPM will maintain a single replica for the mirror.
A mirror is broken
When the mirror is broken for a mirrored SQL Server database that is currently protected by
DPM, backups will fail with alerts. Remove protection (with retain data) for the SQL Server
database and reprotect it.
Principal partner in a mirror fails over and fails back before next
backup
This scenario does not affect protection in any manner since DPM is not informed about the fail
over, unless a backup of the mirror is in progress.
110
Principal partner fails and the mirror server takes over
DPM will detect that the mirror is now the principal partner, stops the backup job, and performs a
consistency check after 30 minutes on the database that failed over.
Note
If during these 30 minutes the database fails back to the original principal, DPM will
detect this and resume protection after performing a consistency check.
If you try to backup the mirrored database before the scheduled consistency check (after 30
minutes), an alert indicating that a consistency check is required will be created on the DPM
Monitor tab and the backup will not start until a consistency check is done. To start the backup
immediately, do a consistency check and retry the backup.
Unsupported Scenarios
The following scenarios for mirrored SQL Server databases are not supported by DPM:
The database is mirrored on the same server.
The SQL Server mirroring session uses an explicitly-configured IP address.
111
When you recover a SQL Server 2000 database to a different instance of SQL Server, the
recovery path on the new server must be the same as the path of the database when it was
protected on the source server. For example, DB1 on D:\sample on server1 can be recovered
only to D:\sample on server2. If you want to recover to a completely new path, then you will only
be able to recover express full backups (typically one copy per day).
When you recover a SQL Server 2005 database to a different instance of SQL Server, you can
recover the database to any chosen path on the new server. You can back up once every 15
minutes and recover to any point in time on the target SQL Server.
In both SQL Server 2000 and SQL Server 2005, you can rename the database and recover to the
original SQL instance.
You cannot recover a database from an instance of SQL Server on a computer running Windows
Server 2008 to an instance of SQL Server on a computer running Windows Server 2003.
You cannot recover a system database to a different instance of SQL Server.
In This Section
How to Recover a SQL Database to Its Original Location
How to Recover and Rename a SQL Database
How to Recover a Database to a Different Instance of SQL Server
How to Copy a SQL Database to a Network Folder
How to Copy a SQL Database to Tape
How to Recover a SQL Database and Allow Additional Log Backups
112
select Leave database operational.
9. Specify recovery options for network bandwidth usage throttling, SAN-based recovery,
and e-mail notifications, and then click Next.
10. On the Summary page, review the recovery settings, and then click Recover.
See Also
How to Recover and Rename a SQL Database
How to Recover a Database to a Different Instance of SQL Server
How to Copy a SQL Database to a Network Folder
How to Copy a SQL Database to Tape
How to Recover a SQL Database and Allow Additional Log Backups
113
See Also
How to Recover a SQL Database to Its Original Location
How to Recover a Database to a Different Instance of SQL Server
How to Copy a SQL Database to a Network Folder
How to Copy a SQL Database to Tape
How to Recover a SQL Database and Allow Additional Log Backups
Note
When recovering a databases to a different instance of SQL Server
You cannot recover a database from an instance of SQL Server on a computer running
Windows Server 2008 to an instance of SQL Server on a computer running Windows
Server 2003.
You cannot recover a SQL Server 2008 database to a SQL Server 2005 instance.
114
instance of SQL Server to which the database should be recovered. You can also
specify a path for the database that differs from the path that it used in its original
location.
9. Specify recovery options for network bandwidth usage throttling, SAN-based recovery,
and e-mail notifications, and then click Next.
10. On the Summary page, review the recovery settings, and then click Recover.
See Also
How to Recover a SQL Database to Its Original Location
How to Recover and Rename a SQL Database
How to Copy a SQL Database to a Network Folder
How to Copy a SQL Database to Tape
How to Recover a SQL Database and Allow Additional Log Backups
115
security settings of the target destination.
Send an e-mail when this recovery completes.
Select this option to specify an e-mail address or addresses to notify upon recovery
completion. If you select this option, you must enter the e-mail address to notify.
Multiple e-mail addresses must be separated by a comma.
10. On the Summary page, review the recovery settings, and then click Recover.
See Also
How to Recover a SQL Database to Its Original Location
How to Recover and Rename a SQL Database
How to Recover a Database to a Different Instance of SQL Server
How to Copy a SQL Database to Tape
How to Recover a SQL Database and Allow Additional Log Backups
116
copy the data to tape.
When the data is being copied from tape and the tape library has multiple tape
drives, the library you select in Primary library will read from the source tape and
copy the data to another tape.
When the data is being copied from tape and the tape library has only a single tape
drive, the library you select in Primary library will read from the source tape and the
library you select in Copy library will copy the data to tape.
9. Enter a label for the tape on which the storage group will be copied.
10. Specify if the data that is copied should be compressed or encrypted.
11. On the Set notification page, you can select Send an e-mail when this recovery
completes.
12. On the Summary page, review the recovery settings, and then click Recover.
Additional Resources
How to Copy a Tape (http://go.microsoft.com/fwlink/?LinkId=196785)
See Also
How to Recover a SQL Database to Its Original Location
How to Recover and Rename a SQL Database
How to Recover a Database to a Different Instance of SQL Server
How to Copy a SQL Database to a Network Folder
How to Recover a SQL Database and Allow Additional Log Backups
117
1. In DPM Administrator Console, click Recovery on the navigation bar.
2. Using the browse functionality, select the database to recover.
3. On the calendar, click any date in bold to obtain the recovery points available for that
date. The Recovery time menu lists the time for each available recovery point.
4. On the Recovery time menu, select the recovery point you want to use. You can select
any recovery point except Latest.
5. In the Actions pane, click Recover.
The Recovery Wizard starts.
6. On the Review recovery selection page, click Next.
7. Select Recover to original SQL Server location or Recover to any SQL instance, and
then click Next.
8. If you select Recover to any SQL instance, on the Specify recovery destination page,
specify the instance of SQL Server to which the database should be recovered.
9. On the Specify Database State page, select Leave database non-operational but
able to restore additional transaction logs.
10. Select Copy SQL transaction logs between the selected recovery point and latest
available recovery point, specify a copy destination for the transaction logs, and then
click Next.
DPM must have Write permission for the copy destination for the transaction logs.
11. Specify recovery options for network bandwidth usage throttling, SAN-based recovery,
and e-mail notifications, and then click Next.
12. On the Summary page, review the recovery settings, and then click Recover.
13. Use the Restore Transact-SQL command with the HeaderOnly argument to retrieve the
header information for the transaction logs. The header contains information that allows
the log backup sequences to be correctly ordered.
14. Use the Restore command with the Log argument to apply the desired logs to the
database in the right order.
For more information on the Restore command, see RESTORE Arguments (Transact-
SQL) (http://go.microsoft.com/fwlink/?LinkId=104665).
See Also
How to Recover a SQL Database to Its Original Location
How to Recover and Rename a SQL Database
How to Recover a Database to a Different Instance of SQL Server
How to Copy a SQL Database to a Network Folder
How to Copy a SQL Database to Tape
118
Managing Protected Servers Running
SharePoint
This section provides information about how System Center Data Protection Manager
(DPM) 2010 protects servers running SharePoint. All information in this section pertains to
Microsoft SharePoint 2010 products, Microsoft Office SharePoint Server (MOSS) 2007, and
Windows SharePoint Services 3.0 and Windows SharePoint Services 3.0 SP Search unless
otherwise specified.
In This Section
Configuring SharePoint Protection
Protecting a SharePoint Farm
Protecting SharePoint Front-End Web Server
Protecting SharePoint Search
Recovering SharePoint Data
Performing SharePoint Protection Management Tasks
Performing General Maintenance on Servers Running SharePoint
Troubleshooting SharePoint Protection and Recovery
In This Section
Configuring the DPM Server for SharePoint Protection
Configuring SharePoint Farm Servers
119
Configuring the DPM Server for SharePoint
Protection
Before protecting a SharePoint farm, you must ensure that the following prerequisites are
installed on the System Center Data Protection Manager (DPM) server.
In This Section
Configuring Data Source Groups
Configuring DataSourceGroups.xml
To configure the DatasourceGroupsSample.xml file, follow these steps:
1. Locate the DatasourceGroupsSample.xml file in the Config folder under the DPM installation
folder.
2. Make a copy of the DatasourceGroupsSample.xml file and rename it.
After you perform the preceding steps, when a new protection group is created or an existing
protection group is modified, DPM will load the DatasourceGroupsSample.xml file.
Note
Modifying an existing protection group leads to cancellation of all running jobs. To avoid
this, you can create a dummy protection group that contains a single data source and
modify it when you want to reload the XML file.
120
The DatasourceGroupsSample.xml file will contain a single group (for example, Group1) and all
the data sources protected by the DPM server will be present in that group. If you do not want to
control the backup of any particular data source, then that data source can be removed from the
XML file. The following is an example of a DatasourceGroupsSample.xml file.
Note
Each group must have its own unique name.
<Group GroupName="Group1"> <Datasource DatasourceName=<Database>
ProtectedServerName=<Protected Server> WriterId=<Writer ID /> </Group>
The following table describes the field names in the DatasourceGroupsSample.xml file.
Name Description
When running parallel backups, DPM selects only one database from each group.
If you have to back up two databases from the same spindle or disk, ensure that both the
databases are in the same group in the XML file. This helps to maximize the use of disk
throughput and also ensures that DPM does not back up both the databases in parallel.
You can create an unlimited number of groups. However, DPM can run backups for only eight
SharePoint databases from the same database instance in parallel. In SQL Server 2005, you can
run only one backup at a time from a given instance of SQL Server.
Unloading DatasourceGroups.xml
To unload the datasourcegroups.xml file, perform the following steps:
1. Save a copy of datasourcegroups.xml using a different name.
2. Empty datasourcegroups.xml and save it.
3. Run the Modify Protection Wizard for any protection group to complete the unload process.
121
Configuring SharePoint Farm Servers
Before protecting a SharePoint farm with DPM, you must perform series of configuration tasks on
the SharePoint farm servers.
In This Section
Configuring the Front-End Web Server
Configuring the SQL Backend Servers
At least 2 GB of space on the volume in which the DPM is installed for every 10 million items
in the farm. This is required for catalog generation. In DPM, to perform granular level
recovery of items (site collections, sites, lists, document libraries, folders, individual
documents and list items), catalog generation provides you a list of URLs contained within
each content database. This list of URLs is displayed on the recoverable item pane in the
DPM Administrator console.
If you are running Windows SharePoint Services 3.0 SP1 or MOSS 2007 SP1, then install
Knowledge Base article 941422, Update for Windows SharePoint Services 3.0
(http://go.microsoft.com/fwlink/?LinkId=100392).
122
Note
You must install Knowledge Base article 941422 on all protected servers on which
Windows SharePoint Services 3.0, Microsoft Office SharePoint Server 2007 with
SP1, and Microsoft Office SharePoint Server 2007 are installed.
Run ConfigureSharePoint.exe on the front-end Web server. For more information about using
ConfigureSharePoint, see Using ConfigureSharePoint.
Note
If the SharePoint VSS Writer service does not start on the front-end Web server then
you must manually start this service. For more information, see Starting and
Configuring the WSS VSS Writer Service in Configuring DPM 2010
(http://go.microsoft.com/fwlink/?LinkId=179157).
In the SharePoint farm, if you have SQL Server databases that are configured with SQL
Server aliases, then install the SQL Server client components on the front-end Web server
that DPM will protect. For information about installing SQL Server 2005 components, see
How to: Install SQL Server 2005 (http://go.microsoft.com/fwlink/?LinkId=147257).
Using ConfigureSharePoint
Before you begin to protect a SharePoint farm, you must configure protection for SharePoint by
using the ConfigureSharePoint.exe tool.
In DPM, ConfigureSharePoint.exe is a tool that is required to be run on the front-end Web server
from where you plan to protect SharePoint farm data. The ConfigureSharePoint.exe file can be
found in the <DPM Installation Path>\bin folder on the front-end Web server. This tool must be
run in the following scenarios:
Before you begin to protect a SharePoint farm
Change in SharePoint farm administrator password
Change in SharePoint farm administrator account
Permissions
To run the ConfigureSharePoint.exe tool, ensure that you meet the following prerequisites:
You must be a member of the Administrators group on the local computer to run this tool.
You must run this tool from an elevated command prompt.
The ConfigureSharePoint.exe tool provides the following permissions to the farm administrator on
the front-end Web server:
Read and Execute to all DPM directories: DPM has to load the DLLs from the DPM Bin
directory when WSSCmdletWrapper.exe runs.
123
Read, Execute, and Write (all) access on the Temp directory in the DPM directory: DPM has
to create a directory inside the DPM Temp directory where item-level catalog dumps are
created. DPM also creates a log file, WSSCmdletWrapperCurr.errlog, inside the DPM Temp
directory.
Read permissions to the DPM hive in the registry.
Syntax
ConfigureSharePoint [-EnableSharePointProtection] [-EnableSPSearchProtection] [-
ResolveAllSQLAliases] [-SetTempPath <path>]
Note
To run this command, you must be a local administrator on the front-end Web server. In
Windows Server 2008 and later versions, ensure that you run this command from an
elevated command prompt.
Parameters
Parameter Description
124
Parameter Description
plan to protect the Windows SharePoint
Services 3.0/MOSS 2007 Search service.
This server can be an indexing service or
any other front-end Web server.
Do not run this option on multiple servers.
If you want to run this option on multiple
servers, then delete the registry key
SharePointSearchEnumerationEnabled
under HKLM\Software\Microsoft\
Microsoft Data Protection
Manager\Agent\2.0\ on the front-end Web
server that is not used for protecting
SharePoint Search services.
Enables the protection of SP Search and
MOSS 2007 SSP by using the registry key
SharePointSearchEnumerationEnabled
under HKLM\Software\Microsoft\
Microsoft Data Protection
Manager\Agent\2.0\ on the front-end Web
Server.
Registers the identity of the DCOM
application WssCmdletsWrapper to run as
a user whose credentials are entered with
this option. If you are prompted to enter
your user credentials, then enter the
credentials of a farm administrator.
Note
This option can be run only after you
run the ConfigureSharePoint [-
EnableSharePointProtection] or
ConfigureSharePoint [-
EnableSPSearchProtection] command
on the front-end Web server.
125
Parameter Description
Note
DPM supports Standard, Enterprise, Workgroup, and Express Editions of SQL Server.
You must start the SQL Server VSS Writer Service on computers running SQL Server before you
can start protecting SQL Server data. The SQL Server VSS Writer Service is turned on by default
on computers running SQL Server. To start the SQL Server VSS Writer service, in the Services
console, right-click SQL Server VSS writer, and then click Start.
126
4. On the DPM server, run the Create New Protection Group Wizard to protect SharePoint data
that exists under a front-end Web server that is configured for protection. For more
information about how to create a protection group, see DPM Help.
In This Section
Protecting a SharePoint Farm by Using Mirrored Databases
Protecting a SharePoint Farm by Using Databases With SQL Server Aliases
Long-Term Protection for a SharePoint Farm on Tape
Prerequisites
Install the DPM protection agent on both the computers that are running the instance of SQL
Server and hosts the principal and mirror database.
Note
DPM does not support mirroring the database on the same instance of SQL Server.
Common Scenarios
A protected SharePoint database gets mirrored
At the time of the backup, DPM detects that the database has been mirrored and raises an alert
that farm configuration has been changed. DPM treats the mirrored database as a new database
in the farm and automatically protects it. Although the alert is not deactivated, all the content in
the SharePoint farm will continuously be protected. To inactivate this alert, you must stop
protection for the farm (with retain data) and re-protect it.
Note
Even if failovers between principal and mirrored copies of the database occur, DPM
maintains a single replica for the mirror.
127
Principal partner in a mirror fails over and fails back before next
backup
This scenario does not affect protection in any way unless a backup is in progress.
Note
If, during these 30 minutes, the database fails back to the original principal, DPM detects
this and resumes protection after performing a consistency check.
A mirror is broken
When the mirror is broken for a mirrored SQL Server database that is currently protected by
DPM, backups fail with alerts. This is similar to the behavior when the protected SharePoint
database gets mirrored.
Important
You can use only TCP/IP aliases.
Prerequisites
You must configure SQL Server aliases and define all SQL Server aliases in the farm on the
front-end Web Server. We recommend that you use one SQL Server alias per database.
The SQL Server client connectivity components must be installed on the front-end Web
Server.
Additional Resources
How to: Create a Server Alias for Use by a Client (SQL Server Configuration Manager)
(http://go.microsoft.com/fwlink/?LinkId=132909)
128
Long-Term Protection for a SharePoint Farm
on Tape
When protecting a SharePoint farm, DPM takes the disk backup for all the databases that are
online at that time. When DPM retries backup for failed databases, two different recovery points
are created for the farm.
If long-term backup is configured for a SharePoint farm, DPM needs to find databases across
multiple recovery points and ensure that the complete set of databases in the farm are backed up
on tape. To do this, DPM does the following:
Checks the list of databases present in the latest topology of the SharePoint farm. The latest
topology is stored in DPM.
Checks the latest recovery point on the disk and copies the databases on the disk to the tape.
Checks the previous recovery point for all the databases that were missing in the latest recovery
point.
Similarly, DPM traverses older recovery points one-by-one unless the recovery points of all the
databases are found.
If there is a database for which a recovery point was not created since the last successful
scheduled tape backup, then that database’s recovery point on the tape fails.
Note
Long-term protection for a SharePoint farm on tape is available only on the primary DPM
server.
129
Front-End Web Server Running on Physical
Computer
With DPM, you can perform backup and recovery of physical computers by using
Bare Metal Recovery (BMR). For more information, see Setting Up BMR Protection and
Recovering BMR.
In This Section
Protecting Windows SharePoint Services 3.0 SP Search Service Data
Protecting MOSS 2007 Shared Services Provider (SSP) Search
130
If the backup schedule for the Search database overlaps with the schedule for other
databases on the same server but belonging to another protection group, it results in a longer
pause of the crawl. We recommend that you schedule backups to minimize the pause of the
crawl.
DPM performs express full backups for the Search database, but on index files it performs
consistency checks only.
Note
During the backup process, DPM pauses index crawling and all background processes.
After the backup process is complete, DPM automatically resumes these processes. This
does not affect the search function.
Caution
131
Do not directly recover the Central Administration content database or the
configuration database because this could cause data corruption in the SharePoint
farm.
The recovery point time for SharePoint data displayed on the Browse tab may differ from the
time displayed on the Search tab. The Browse tab displays the backup time for the farm,
while the Search tab lists the correct recovery point time for sites, documents, and folders.
In This Section
Recovering SharePoint Front-End Web Server
Recovering SharePoint Farm Content
Recovering SharePoint Web Application
Recovering SharePoint Content Database
Recovering SharePoint Content Database
Recovering SharePoint Items
Recovering SharePoint Search
132
The front-end Web servers are configured the same as they were when the recovery point
was created.
The farm structure must be created on the front-end Web server; the farm data will be
recovered to the existing structure.
The instances of SQL Server are configured with the same names as when the recovery
point was created.
The instances of SQL Server are configured with the same drive configuration as when the
recovery point was created.
The recovery farm must have all service packs, language packs, and patches installed on the
primary farm.
Caution
You cannot perform a full farm recovery to a new location.
You can encounter two situations when restoring a complete farm:
A farm configuration exists as it did at the time of taking the backup. In this case, you will be
restoring to a functioning farm.
The Configuration database is corrupt and the servers in the farm are down.
133
6. In the Recoverable item pane, click the farm item.
7. In the Actions pane, click Recover.
8. Complete the wizard.
9. On the main front-end Web server for the server farm, run the SharePoint Products and
Technologies Configuration Wizard and disconnect the front-end Web server from the
farm.
Note
If the main front-end Web server for the server farm is not the front-end Web
server that DPM uses to protect the farm, you must also disconnect the front-end
Web server that DPM uses to protect the farm.
10. Open Internet Information Services (IIS) and delete all Web site and application pool
entries related to the farm.
11. Run the SharePoint Products and Technologies Configuration Wizard, select to connect
to an existing server farm, and specify the server name and database name for the farm
you created in step 1.
Note
Perform step 11 for all front-end Web servers for the server farm.
12. On the Completing the SharePoint Products and Technologies Configuration
Wizard page, click Advanced Settings, and then click Next.
13. On the Advanced Settings page, select the option Use this machine to host the web
site, and complete the wizard.
In This Section
Recovering a SharePoint Farm by Using Databases with SQL Server Aliases
Recovering a SharePoint Farm by Using Mirrored Databases
134
You can retrieve all the SQL Server aliases used using the following command in the DPM
Management Shell
$RecoveryPoint.GetSqlaliases()
To enumerate $RecoveryPoint, you must start by retrieving the protection groups. For more
information, refer to the DPM Management Shell Help using the following cmdlet
get-help get-recoverypoint -full
See Also
Recovering SharePoint Data
Name Description
135
Name Description
The SQL alias being used on the front-end
Web server points to the selected instance
of SQL Server.
The default selection is the partner from which the database was last backed up.
If you are using a SQL Server alias for the mirrored database, then before the recovery ensure
that aliases corresponding to the respective databases are configured such that they refer to the
SQL Server instance location selected on the Recovery Wizard page.
Otherwise the farm recovery fails at the end because it cannot attach the databases after
recovery. For more information, see Recovering a SharePoint Farm by Using Databases with
SQL Server Aliases.
See Also
Recovering SharePoint Data
Note
If you want to retain the same URL for the application, ensure that the host
header and port are the same as the original application.
2. Restore all the databases in that Web application to either the original location or to a
different SQL Server.
3. Attach each content database to the Web application by using the stsadm command or
from the Central Administrator site
Additional Resources
Addcontentdb: Stsadm operation (Office SharePoint Server)
(http://go.microsoft.com/fwlink/?LinkId=143331)
136
Recovering SharePoint Content Database
The procedure to recover a SharePoint database is similar to how to recover a SQL Server
database by using DPM. For more information about how to recover a SQL Server database, see
Recovering SQL Server Data.
Note
After a SharePoint database is recovered, it cannot be left in a recovering state.
Note
To recover a mirrored database to its original instance of SQL Server, select the Recover
to any SQL Instance option, and then, on the Specify Alternate Recovery Location
page, specify the recovery destination path of the original instance of SQL Server.
In This Section
Using a Recovery Farm
Recovering a SharePoint Site Collection
Recovering a SharePoint Site
Recovering a List, List Item, Document Library, or Document
DPM Cataloging to Recover SharePoint Items
137
Using a Recovery Farm
A recovery farm is a temporary staging SharePoint where the content database that contains the
item to be restored is temporarily hosted. The SharePoint APIs extract the item from the content
database in the recovery farm and then import the item into the target farm.
In This Section
Creating a Recovery Farm
Note
The version of SQL Server must be the same or higher than what was installed at the
time of backup.
SQL Server VSS Writer should be running on the recovery farm.
This computer must be separate from the DPM server, Active Directory, domain
controller, any server on which SharePoint data is protected by DPM and farm
computers.
Note
You can enable all the features and templates installed on the recovery farm and
use it for the different farms existing in your SharePoint environment.
5. If a service pack or update is installed on the protected farm, the recovery farm must
have the same service pack or update installed otherwise item-level restore operations
could fail.
6. Both the recovery and target farms must be in the same language and have the same
138
language packs installed.
7. Create a Web application and name it DPMRecoveryWebApplication. To create a new
Web application, see the instructions at Create or extend Web applications (Windows
SharePoint Services) (http://go.microsoft.com/fwlink/?LinkId=94374).
8. Ensure that no content database is already attached to the recovery web application
(DPMRecoveryWebApplication) as this will cause recoveries to fail. The web application
name DPMRecoveryWebApplication is a required name and it must be created for
DPM to be able to restore any SharePoint data.
When you restore a site, DPM restores the database to the recovery farm, extracts the site
from the recovery farm, and imports it into the target farm. During this process, DPM creates
a temporary file on the recovery farm at a location specified in the Recovery Wizard. You
should periodically delete the temporary files at that location.
Note
The recovery farm must have enough hard disk space to store the largest content
database in the environment. Best practice would dictate that an additional 10-20%
be allocated on the temporary storage volume to provide a cushion for growth and
reduce the risk of running out of space when trying to recover time-sensitive
SharePoint data.
See Also
Create a recovery farm (Office SharePoint Server 2007)
Note
If a content database contains only one site collection, you can chose to recover
the database directly, and then attach it to the farm using the stsadm command.
139
Additional Resources
Addcontentdb: Stsadm operation (Office SharePoint Server)
(http://go.microsoft.com/fwlink/?LinkId=143331)
Note
This recovery process does not work with lists. If you are trying to restore lists, you must
manually delete all lists under the site, and then restore the site.
Whether you recover a SharePoint site to its original location or to another location on the same
farm, the overall steps are the same. First, you create a recovery farm, and then you use DPM to
recover the site by using the recovery farm.
Note
You can use DPM to recover items (site collections, sites, document libraries, lists,
documents, and list items) from a Microsoft SharePoint Foundation 2010 or Microsoft
Office SharePoint Server 2010 farm both with and without a recovery farm.
140
The databases for the farm appear in the Recoverable Item pane.
5. Navigate to the recoverable item objects and locate the site that you want to recover.
6. Select a recovery point for the site that you want to recover, and then, in the Actions
pane, click Recover.
7. On the Review Recovery Selection page, confirm that the correct item is being
recovered based on Recovery Item.
8. On the Select Recovery Type page, select one of the following options:
Recover to original site
Recover to an alternate site
9. This step applies only to SharePoint 2010:
On the Select Recovery Process page, select one of the following options:
a. Recover without using a recovery farm. Select this option if the version of the
target Microsoft SharePoint 2010 farm is the same as the version at the time of the
selected recovery point, and then click Next.
i. On the Specify Temporary Server page, do the following:
In the SQL instance field, browse to the instance of SQL Server that can be
used temporarily to stage a copy of the SharePoint content database.
The temporary instance of SQL Server can be:
141
be used temporarily to stage a copy of the SharePoint content database
that contains the requested site before recovery.
3. In the Database file location field, browse to the instance of SQL Server
on that server and then select the temporary location where the
database files can be copied to a recovery farm.
10. This step applies only if you are recovering to an alternate location.
In the Recovery target site section, enter the URL for the alternate site. A site can be
restored to a different location within the same farm to which it belongs. Therefore,
specify a URL within the same SharePoint farm under which you want to recover the
selected SharePoint site.
Note
The target site URL must be based on the same site template as the site that is
being restored. For example, SharePoint will not allow a site that was created by
using a Wiki Site template to be restored onto a site that was created by using a
Team Site, Blank Site, Blog, or Document Workspace templates. A custom
template must reside on the recovery farm and be used to create the alternate
site to which the recovery is being made.
11. On the Specify Staging Location page, enter a directory where the SharePoint can be
temporarily stored pending recovery to the original or alternate site.
Note
Note the following:
Network bandwidth usage throttling is used when there are concerns about the
restore process using excessive bandwidth for bandwidth-sensitive applications.
The SAN Recovery option is only available if the attached SAN is capable of
snapping clones and splitting clones.
The Notification section is only to notify administrators and other personnel of the
completion of the recovery process.
12. On the Specify Recovery Options page, in the Restore Security section, specify
whether security settings and metadata from the recovery point or the original site will be
applied to the recovered site data.
Important
This is an important consideration if there have been any changes to the security
settings since the recovery point was taken.
13. On the Summary page, confirm all settings, and then click Recover to begin the
recovery process.
See Also
Recovering SharePoint Data
Recovering SharePoint Items
142
Recovering a List, List Item, Document
Library, or Document
System Center Data Protection Manager (DPM) allows you to recover items from a
SharePoint 2010 farm without a recovery farm. You can recover SharePoint items, such as sites,
site collections, documents, document libraries, lists and list items from a DPM recovery point to
the original site or to an alternate site.
When you restore an item, DPM restores the database to a temporary instance of SQL Server,
extracts the item from the content database and imports it into the target farm. During this
process, DPM creates a temporary file on the recovery farm at a location specified in the
Recovery Wizard. You should periodically delete the temporary files at that location.
Note
You can only select and recover one object at a time. If you want to recover more
than one object, consider recovering a higher level folder to an alternate location
and then recovering the individual objects from within the SharePoint Central
Administration website.
5. Click Recover in the Actions pane and confirm the recovery details on the Review
Recovery Selection page.
6. On the Select Recovery Type page, select Recover to original site.
7. The following steps apply to SharePoint 2010:
On the Select Recovery Process page select any one of the following two options that
are listed below:
a. Recover without using a recovery farm. Select this option if the version of the
target Microsoft SharePoint 2010 farm is same as at the time of the selected recovery
point. Click Next
i. On the Specify Temporary Server page
143
1. In the SQL instance field browse for the instance of SQL Server that can
be used temporarily to stage a copy of the SharePoint content database
that contains the requested item before recovery.
2. In the Database file location field, browse for the instance of SQL
Server on that server and then select the temporary location where the
database files can be copied
The temporary instance of SQL Server can be:
noteDXDOC112778PADS Note
If you are using DPM’s instance of SQL Server or any other instances of SQL Server then
make sure that its version is equal to or a has a later version than the version of the
production SQL Server. The selected instance of SQL Server can be a Microsoft Cluster
Server (MSCS).
b. Recover using a recovery farm. Select this option if the version of the target
Microsoft SharePoint 2010 farm has changed from the time, the selected recovery
point was created. Click Next
i. On the Specify Temporary Server page, enter the information for recovery
farm. For more information about how to create a recovery farm, see Creating a
Recovery Farm.
1. In the Front-end Web server field, browse for the recovery farm server
where DPMRecoveryWebApplication has been created to temporarily
stage data prior to recovery.
2. In the SQL instance field, browse for the instance of SQL Server that
can be used temporarily to stage a copy of the SharePoint content
database that contains the requested item before recovery.
3. In the Database file location field, browse for the instance of SQL
Server on that server and then select the temporary location where the
database files can be copied on to a recovery farm.
8. On the Specify Staging Location page, enter a directory where the SharePoint data will
be temporarily stored, pending recovery to the original site.
9. On the Specify Recovery Options page, specify whether the recovery point’s security
settings or the original site’s security settings will be applied to the recovered data object
in the Restore Security section.
This is an important consideration if there have been security settings changes since the
recovery point was taken.
144
Note
The network bandwidth usage throttling is used when there are concerns about
the restore process consuming excessive bandwidth.
The SAN Recovery option is only available if the attached SAN is capable of
snapping clones and splitting clones.
The Notification section is simply to notify administrators and other personnel of
the completion of the recovery process.
10. Confirm the settings on the Summary page and click Recover to begin the process.
1. Create a farm that DPM can use for the recovery. For more information, go Creating a
Recovery Farm.
2. In DPM Administrator Console, click Recovery on the Actions pane.
3. In the Protected data pane, expand the server that contains the farm you want to
recover, double-click All Protected SharePoint Data, and then double-click the server
farm name.
Content databases display in the Recoverable item pane.
4. Use the calendar and Recovery time menu to select a recovery point.
5. In the Recoverable item pane, select the content database and browse to the item you
wish to recover.
Note
You can only select and recover one object at a time. If you want to recover more
than one object, consider recovering a higher level folder to an alternate location
and then recovering the individual objects from within the SharePoint Central
Administration website.
6. Click Recover in the Actions pane and confirm the recovery details in the Review
Recovery Selection page.
7. On the Select Recovery Type page, select Recover to an alternate site.
8. The following steps apply to SharePoint 2010:
On the Select Recovery Process page select any one of the following two options that
are listed below:
a. Recover without using a recovery farm. Select this option if the version of the
145
target Microsoft SharePoint 2010 farm is same as at the time of the selected recovery
point. Click Next
i. On the Specify Temporary Server page
1. In the SQL instance field browse for the instance of SQL Server that can
be used temporarily to stage a copy of the SharePoint content database
that contains the requested item before recovery.
2. In the Database file location field, browse for the instance of SQL
Server on that server and then select the temporary location where the
database files can be copied
The temporary instance of SQL Server can be:
noteDXDOC112778PADS Note
If you are using DPM’s instance of SQL Server or any other instances of SQL Server then
make sure that its version is equal to or a has a later version than the version of the
production SQL Server. The selected instance of SQL Server can be a Microsoft Cluster
Server (MSCS).
b. Recover using a recovery farm. Select this option if the version of the target
Microsoft SharePoint 2010 farm has changed from the time, the selected recovery
point was created. Click Next
i. On the Specify Temporary Server page, enter the information for recovery
farm. For more information about how to create a recovery farm, see Creating a
Recovery Farm.
1. In the Front-end Web server field, browse for the recovery farm server
where DPMRecoveryWebApplication has been created to temporarily
stage data prior to recovery.
2. In the SQL instance field, browse for the instance of SQL Server that
can be used temporarily to stage a copy of the SharePoint content
database that contains the requested item before recovery.
3. In the Database file location field, browse for the instance of SQL
Server on that server and then select the temporary location where the
database files can be copied on to a recovery farm.
9. In the Recovery target site field, enter the URL for alternate site. An item can be restored
to a different location within the same farm to which it belongs to. Therefore specify a
URL within the same SharePoint farm under which you would want to recover the
selected SharePoint item.
146
Note
The site URL entered into the Target site URL field must be based on the same
site template as the site hosting the object which is being restored. For example,
SharePoint will not allow an object created in a site using a ‘Wiki Site’ template to
be restored onto a site created using the ‘Team Site’, ‘Blank Site’, ‘Blog’, or
‘Document Workspace’ templates. If custom templates have been used, those
same templates must reside on the recovery farm as well as having been used to
create the alternate site where the recovery is being made to.
10. On the Specify Staging Location page, enter a directory where the SharePoint data will
be temporarily stored, pending recovery to the original site.
11. On the Specify Recovery Options page, specify whether the recovery point’s security
settings for the object being recovered or the original site’s security settings will be
applied to the recovered data object in the Restore Security section. This is an important
consideration if there have been security settings changes since the recovery point was
taken.
Note
The network bandwidth usage throttling is used when there are concerns about
the restore process consuming excessive bandwidth from bandwidth sensitive
applications.
The SAN Recovery option is only available if the attached SAN is capable of
snapping clones and splitting clones.
The Notification section is simply to notify administrators and other personnel of
the completion of the recovery process.
12. Confirm the settings on the Summary page and click Recover to begin the process.
Note
See Also
Recovering SharePoint Data
Recovering a SharePoint Site
147
protection. SharePoint cataloging happens automatically only once a day, regardless of the
number of backups that are taken each day.
By default, the catalog task is scheduled to run three hours after the first scheduled backup of the
corresponding SharePoint farm in the day. To modify the default schedule, run the Set-
ProtectionJobStartTime cmdlet in DPM Management Shell on the DPM server.
In DPM 2010, creating a catalog of the farm (list of URLs within the farm) is tightly tied to the
backup of the SharePoint farm.
Syntax
Set-ProtectionJobStartTime–ProtectionGroup <ProtectionGroup Object> –CatalogOffset
<Offset in Minutes>
Parameters
Parameter Description
Note
The offset will change for all the
SharePoint farms in this protection
group.
For more information about the
ProtectionGroup object, type Get-help Get-
ProtectionGroup –Full in DPM Management
Shell.
When you change the offset for the catalog task, ensure that cataloging for the SharePoint farm
begins only after the recovery point prior to the task is completed.
148
Parameter
DataSource - Provides the DataSource object for the SharePoint farm for which the catalog
needs to be run. For more information about the DataSource object, type Get-Help Get-
DataSource –Full in DPM Management Shell.
In This Section
Recovering Windows SharePoint Services 3.0 SP Search Service Data
Recovering MOSS 2007 Shared Services Provider (SSP) Search
Important
The farm administrator should have administrator rights on the Indexing Service. If this is
not the case, DPM is not able to stop the search service to ensure a proper recovery.
Recovering to original location
The procedure to recover SP Search data is similar to the recovery of any data source. You begin
the recovery process from the DPM Administrator Console. This brings up the Recovery wizard
which guides you through the process. The recovery process automatically deletes existing index
files and resumes the SP Search service after the recovery is complete.
In the case of disaster recovery, you must configure SP Search with the original configuration of
the latest recovery point before performing a recovery.
149
Recovering as files
1. Stop the SP Search service.
2. Delete the index files at the original location.
3. Restore the individual components (Search database and index files).
4. Perform a manual attachment of the database in SQL Server.
5. Start the SP Search service.
Important
If you are recovering to the original location, you must delete the SSP and its
index files from the original location before proceeding with recovery. This must
be done even if it is the default SSP using the -Force parameter. The location
details of these files are available on the Summary page of the Recovery wizard.
3. After the recovery process is completed, you must run RestoreSSP on the protected
computer with the KeepIndex parameter to ensure that the index file is not reset during
the process of recreating the SSP.
150
1. Break the mirroring session of the mirrored SSP databases.
2. Start the Recovery wizard from DPM Administrator Console.
3. Select the point in time from which you want to recover data.
The Recovery wizard displays SSP components for the SharePoint farm.
4. Recover the individual items to a temporary location and then host the databases to the
instance of SQL Server manually.
5. Run RestoreSSP on the protected computer with the KeepIndex parameter to ensure
that the index file is not reset during the process of recreating the SSP.
Additional Resources
Restoressp: Stsadm operation (Office SharePoint Server)
(http://go.microsoft.com/fwlink/?LinkId=113889)
In This Section
Changing the SharePoint Farm Administrator Password
Adding a Database to a SharePoint Farm
Removing a Database from a SharePoint Farm
Adding or Removing Servers in SharePoint Farm
Switching the Front-End Web Server
Upgrading SharePoint
Moving SharePoint Servers Between Domains
Renaming SharePoint Server
Improving DPM Recovery Search for SharePoint Items
151
Changing the SharePoint Farm Administrator
Password
When the SharePoint farm administrator password is changed, you have to rerun the
ConfigureSharePoint.exe tool on the front-end Web server that is configured for SharePoint
protection in DPM. For more information about how to use ConfigureSharePoint.exe, see Using
ConfigureSharePoint.
If you do not rerun ConfigureSharePoint.exe after changing the farm administrator password,
SharePoint farm backups will continue with the following limitations:
DPM will be unable to discover any changes in the SharePoint farm topology (for example,
adding a new database or deleting an existing database).
In DPM, the list of URLs in the SharePoint farm cannot be updated. Therefore, granular
recovery for newly added items will not be available for protection.
Recovery of the complete farm content cannot be triggered from DPM. The databases must
be recovered one by one.
Databases in the farm cannot be recovered by using the Recover to original Instance of
SQL Server option in the DPM Recovery Wizard. You can recover the databases to the
original location by using the Recover to any SQL Instance option.
The alert “DPM Alert – BackupMetaDataEnumeration Failed” is generated in DPM. See the
Details pane for more information about the cause of this alert.
152
3. In the Actions pane, click Modify protection group. This starts the Modify Protection Group
Wizard.
4. On the Select Group Members page, ensure that the node that corresponds to the
SharePoint front-end Web server is marked for selection.
5. Complete the Modify Protection Group Wizard.
6. Run a consistency check for the SharePoint farm.
153
DPM uses a single front-end Web server to protect the server farm. When you add other front-
end Web servers or remove front-end Web servers other than the server used by DPM, there is
no impact on protection of the farm.
To remove the front-end Web server that DPM is using while continuing protection of the server
farm, see Switching the Front-End Web Server.
Note
If the front-end Web server that DPM uses to protect the farm is unavailable, use the
following procedure to change the front-end Web server by starting at step 4.
To change the front-end Web server that DPM uses to protect the farm
1. Stop the SharePoint VSS Writer service on Server1 by running the following command at
a command prompt:
stsadm -o unregisterwsswriter
2. On Server1, open the Registry Editor and navigate to the following key:
HKLM\System\CCS\Services\VSS\VssAccessControl
3. Check all values listed in the VssAccessControl subkey. If any entry has a value data of 0
and another VSS writer is running under the associated account credentials, change the
value data to 1.
4. Install a protection agent on Server2.
Caution
You can only switch Web front-end servers if both the servers are on the same
domain.
5. On Server2, at a command prompt, change the directory to DPM installation location\bin\
and run ConfigureSharepoint. For more information about ConfigureSharePoint, see
Using Using ConfigureSharePoint.
6. There is a known issue when the server farm is the only member of the protection group
and the protection group is configured to use tape-based protection. If your server farm is
the only member of the protection group using tape-based protection, to change the front-
end Web server that DPM uses to protect the farm, you must temporarily add another
154
member to the protection group by performing the following steps:
a. In DPM Administrator Console, click Protection on the navigation bar.
b. Select the protection group that the server farm belongs to, and then click Modify
protection group.
c. In the Modify Group Wizard, add a volume on any server to the protection group. You
can remove this volume from the protection after the procedure is completed.
d. If the protection group is configured for short-term disk-based protection and long-
term tape-based protection, select the manual replica creation option. This avoids
creating a replica for the volume that you are temporarily adding to the protection
group.
e. Complete the wizard.
7. Remove Server1 from the protection group, selecting to retain the replicas on disk and
tape.
8. Select the protection group that the server farm belongs to, and then click Modify
protection group.
9. In the Modify Group Wizard, on the Select Group Members page, expand Server2 and
select the server farm, and then complete the wizard.
A consistency check will start.
10. If you performed step 6, you can now remove the volume from the protection group.
Upgrading SharePoint
If you are moving from an earlier version of SharePoint to a later version of SharePoint 2010 (for
example, upgrading MOSS 2007 to SharePoint 2010), you must reconfigure protection of the
data.
The following are the two scenarios when a SharePoint farm is updated:
SQL Server hardware upgrade
When instances of SQL Server do not change
155
Note
DPM will automatically discover the moved databases in the new farm and start
protecting them. DPM generates a warning alert - Farm Configuration Changed for
the old SharePoint farm. You can ignore this alert.
4. When all the databases are moved to the new server, perform Stop protection of the old
SharePoint farm with the retain data option.
156
2. Uninstall the protection agent by using DPM Administrator Console on the DPM server.
3. Change the domain membership of the computer.
4. Install a protection agent by using DPM Administrator Console on the DPM server.
5. Add the data sources to protection groups on the DPM server.
For information about performing tasks involving protection agents and protection groups,
see DPM Help.
157
Improving DPM Recovery Search for
SharePoint Items
The time required for DPM Recoverable Object Search to return recovery points that meet the
specified criteria will increase over time as the number of recovery points grow and the DPMDB
gets more and more fragmented. You can improve the time taken by the search by carrying out
regular maintenance on the DPMDB.
The following table lists the set of tables for which indexes need to be rebuilt for a specific data
source. To improve the performance of the recovery point search for a data source, you need to
rebuild or reorganize the indexes related to that data source.
SharePoint tbl_RM_SharePointRecoverableObject
tbl_RM_RecoverySource
Rebuilding Indexes
Rebuilding an index drops the index and creates a new one. In doing this, fragmentation is
removed, disk space is reclaimed by compacting the pages using the specified or existing fill
factor setting, and the index rows are reordered in contiguous pages (allocating new pages as
needed). This can improve SQL query performance by reducing the number of page reads
required to obtain the requested data.
Query to rebuild indexes
USE DPMDB
GO
ALTER INDEX ALL ON <tableName> REBUILD
GO
Reorganizing Indexes
Reorganizing an index defragments the leaf level of clustered and nonclustered indexes on tables
and views by physically reordering the leaf-level pages to match the logical order (left to right) of
the leaf nodes. Having the pages in order improves index-scanning performance. The index is
reorganized within the existing pages allocated to it; no new pages are allocated. If an index
spans more than one file, the files are reorganized one at a time. Pages do not migrate between
files.
158
Reorganizing also compacts the index pages. Any empty pages created by this compaction are
removed providing additional available disk space.
In some cases, the gain might not be significant. It is also a longer running operation compared to
rebuilding the index.
Query to rebuild indexes
USE DPMDB
GO
ALTER INDEX ALL ON <tableName> REORGANIZE
GO
Takes the table whose indexes are being Keeps the table whose indexes are being
currently rebuilt offline. It should be done when currently reorganized online and working
it will least affect normal operations. normally. Does not affect normal operations.
Substantial performance gains in search and Moderate performance gains in search and
browse operations. browse operations.
Most effective when index is heavily Most effective when index is not heavily
fragmented. fragmented.
See Also
ALTER INDEX (Transact-SQL)
159
To disable a protection agent
1. In DPM Administrator Console, click Management on the navigation bar.
2. On the Agents tab, in the display pane, select the name of the computer with the
protection agent you want to disable.
3. In the Actions pane, click Disable protection agent.
4. In the dialog box, click OK to confirm that you want to proceed.
In This Section
Using Windows Maintenance Tools on SharePoint Servers
Performing SharePoint Protection Management Tasks
Applying Operating System Updates on SharePoint Servers
Running Antivirus Software on SharePoint Servers
See Also
Using Windows Maintenance Tools on the DPM Server
Using Windows Maintenance Tools on File Servers and Workstations
Using Windows Maintenance Tools on Exchange Servers
Using Windows Maintenance Tools on SQL Servers
Using Windows Maintenance Tools on Virtual Server
160
Applying Operating System Updates on
SharePoint Servers
An important part of computer maintenance is ensuring that operating systems and software are
up to date. Updates—known as "fixes," "patches," "service packs," and "security rollup
packages"—help to protect computers and data.
You can use your preferred method for deploying software updates, such as Automatic Updates
or Windows Server Update Services, on computers running Windows SharePoint Services that
are protected by DPM. Because some software updates require a computer restart, you should
schedule or perform the updates at times that have the least impact on protection operations.
161
ConfigureSharepoint.exe fails with error code 997
Note
To search list items, you must select only Contains as the search string.
Ensure that you have selected the correct SharePoint farm name.
162
secondary DPM server. To resolve this issue, you must identify all such databases, perform Stop
protection with the delete data option, and then re-protect the SharePoint farm.
163
SharePoint index backups fail during profile
import
Due to constraints in SharePoint, DPM cannot pause a profile import. Backups scheduled to run
when a profile import is taking place will fail. The backups fail with error code 32010.
Message: DPM was unable to get the Content Sources of the SSP <Name of data source>;
to a consistent state.
Recommended action:
Check to see that the protected SSP is online and running.
Check to see that the WSSCmdletWrapper DCOM component is configured correctly on the
front-end Web server hosting the protected farm.
Retry the operation and make sure no other application or process is trying to resume the
crawl of the SSP during backup.
In This Section
Performing General Maintenance on Servers Running Virtual Server
Performing Virtual Server Management Tasks
Recovering Virtual Server Data
164
Performing General Maintenance on Servers
Running Virtual Server
General maintenance includes tasks such as disk and file maintenance, updating operating
systems and applications, and protecting data by using antivirus software and performing regular
backups. Some special considerations apply when you are performing server maintenance on
computers running Virtual Server that are protected by System Center Data Protection
Manager 2010 (DPM).
When you need to perform maintenance on a protected server and do not want protection jobs to
continue for the duration of the maintenance, you can use the following procedure to disable the
protection agent.
Note
If you disable a protection agent for a server that is a cluster node, you should disable the
protection agent for every node of the cluster.
In This Section
Using Windows Maintenance Tools on Virtual Server
Applying Operating System Updates on Virtual Server
Running Antivirus Software on Virtual Server
See Also
Using Windows Maintenance Tools on the DPM Server
Using Windows Maintenance Tools on File Servers and Workstations
165
Using Windows Maintenance Tools on Exchange Servers
Using Windows Maintenance Tools on SQL Servers
Using Windows Maintenance Tools on SharePoint Servers
In This Section
Moving Virtual Servers Between Domains
How to Rename Virtual Servers
Renaming Virtual Machines
Moving a Virtual Machine or Virtual Hard Disk
Protecting Application Data on Virtual Machines
166
Moving Virtual Servers Between Domains
You cannot do the following for protected computers:
Change the domain of a protected computer and continue protection without disruption.
Change the domain of a protected computer and associate the existing replicas and recovery
points with the computer when it is re-protected.
We recommend that you do not change the domain of a protected computer. If you must change
the domain of a protected computer, you must complete two tasks:
Remove the data sources on the computer from protection while the computer retains its
original domain membership.
Protect the data source on the computer after it becomes a member of another domain.
167
To rename a protected computer
1. Remove all members from protection groups.
If you retain the replicas and recovery points, the data will remain accessible for
administrative recovery until you delete the replicas. However, it will not be accessible for
end-user recovery.
2. Uninstall the protection agent by using DPM Administrator Console on the DPM server.
3. Change the name of the computer.
4. Install a protection agent by using DPM Administrator Console on the DPM server.
5. Add the data sources to protection groups on the DPM server.
For information about tasks that involve protection agents and protection groups, see
DPM 2010 Help (http://go.microsoft.com/fwlink/?LinkId=196749).
168
Moving a Virtual Hard Disk
You might want to move a virtual hard disk to store a large amount of data or improve disk
performance. A virtual hard disk for a virtual machine is stored as a .vhd file. To continue
protection of a virtual hard disk that is moved to a new volume, run the Modify Group Wizard for
the protection group to which it belongs, and then run a consistency check.
In This Section
How to Recover the Virtual Server Host
How to Recover a Virtual Machine
How to Recover Virtual Machines as Files
169
How to Recover the Virtual Server Host
When you protect a Virtual Server host and its virtual machines, the recoverable items are the
Virtual Server configuration and each virtual machine. You should recover the Virtual Server
configuration before you recover the individual virtual machines.
See Also
How to Recover a Virtual Machine
How to Recover Virtual Machines as Files
See Also
How to Recover the Virtual Server Host
How to Recover Virtual Machines as Files
171
When you restore a virtual machine to a network folder and then copy the files to a new Virtual
Server host and start the virtual machine, you may see an error message that the server shut
down unexpectedly. This can occur because DPM cannot mark the recovery files as an expected
shutdown. The recovered files are otherwise application-consistent.
When the .vhd file for a virtual machine is stored in the root of a volume and you recover the
virtual machine to an alternate location as files, the .vhd file will be recovered with directory
attributes set to hidden and system. To view the recovered .vhd file, you must remove the
directory attributes.
See Also
How to Recover the Virtual Server Host
How to Recover a Virtual Machine
172
Protecting Hyper-V
System Center Data Protection Manager (DPM) 2010 extends DPM support to Microsoft Hyper-
V. DPM now supports both host-based protection for Hyper-V where the agent is installed on the
host computer, and guest-based where the agent is installed directly on the virtual machine.
Unsupported Scenarios
DPM 2010 does not support the backup of virtual machines that do not have storage on the host.
However, if you have at least one VHD of the virtual server on the local machine, DPM protects
the local VHD.
Storage not on host means you either use iSCSI to present volumes to the virtual machine or use
a remote VHD. For such machines, we recommend that customers perform host-level backup of
the VHD files using DPM and install an agent into the virtual machine to back up data that is not
visible on the host.
Caution
If you migrate your file server volume using DPM tools and want to continue backups to
the same replica volume, you cannot perform original location recovery for the recovery
points created before the migration. Recovery fails with the message - Couldn't find the
selected volume. You can, however, perform recovery to an alternate location.
173
See Also
Conditions When DPM Fails to Back up Hyper-V Virtual Machines in an Online State
174
You can confirm this in the Device Manager inside the guest VM. Under System Devices in
Device Manager, right-click the entry Hyper-V Volume Shadow Copy and choose Properties.
Check the version under the Driver tab. If the version does not match, insert the integration
services disk by choosing the option under the Action menu in the VM console. Install the
integration components and reboot the VM.
Known Issues
Issue Symptoms Cause Workaround Solution Recommendation
175
machine ID %2).
Recovery The Hyper-V Virtual This issue Restart the Download We recommend
of Hyper- Machine Management can occur if Hyper-V and install that you deploy
V virtual service stops when the virtual Virtual KB959962 this update on all
machine you are restoring a machine is Machine on the Hyper-V hosts
fails virtual machine. configured Management Hyper-V protected by
to use a service. host to DPM.
legacy solve this
network problem.
adapter. Then
recover
the data to
an
alternate
location.
176
retry the operation.
Note
If the errors persist, review the event log on the target server and on the guest installation
of the VM for which the backups failed for further troubleshooting. Please review errors
with source=VSS.
Note
During offline/online backups, the name of the data source remains unchanged even if
the VM configuration changes to support online backups or for any further backups.
177
DPM 2010 enables end users to perform their own recoveries by leveraging the Previous
Versions feature in Windows. For more information about using the Data Protection Manager
Client, see Data Protection Manager Client Help (http://go.microsoft.com/fwlink/?LinkId=197113).
Laptop and notebook computers will not be connected to the network at all times and the number
of protected client computers can be much larger than the number of protected file servers.
These scenarios have resulted in the following changes about how DPM manages client
computer protection.
The administrator can configure protection for the client computer that they want to protect
without being online. We recommend that administrators use software distribution
mechanisms such as Microsoft System Center Configuration Manager to install and configure
the DPM protection agent.
The client computer polls the DPM server at 15 minute intervals and obtains the backup
schedule that the administrator specifies for the protection group. The client computer starts
the backup according to the schedule, or by user demand. Alternatively, once the
administrator configures a protection group that allows the end user to specify their protected
data items, the end user can start a backup at any time from the Data Protection Manager
Client.
DPM will not show alerts for client computers that usually appear for protected servers.
These alerts pertain to failures of individual jobs. For example, a synchronization failure alert
will not appear for the DPM administrator to act upon for any of the failed synchronizations.
This is because client computers are designed to retry the synchronization in the event of a
failure. However, DPM allows you to configure DPM to alert the end user if a client computer
has not been backed up for a predefined number of days that the administrator defined when
they created the protection group.
In This Section
Configuring Client Computer Protection
Protecting Client Computer Data
Recovering Client Computer Data
Performing Client Computer Management Tasks
In This Section
Client Computer Operating System Requirements
178
Installing Protection Agents on Client Computers
Note
Recovery from previous versions of files and folders is not supported on computers
running Windows XP.
Windows Vista or Windows Vista with Service Pack 1 (SP1)
Windows 7 Client
Network Requirements
Following are the network requirements for DPM 2010 when working with the following types of
client computer connections:
179
Client computers over a VPN connection
DPM can perform backups of client computers that are using a virtual private network (VPN)
connection.
Note
For backups of client computers that are intermittently connected to the network, and that
are expected to connect over a VPN, we recommend that your Internet connection speed
be a minimum of 1 Megabit per second (Mbps).
DPM supports the following VPN protocols:
Point-to-Point Tunneling Protocol (PPTP)
Secure Socket Tunneling Protocol (SSTP)
Layer 2 Tunneling Protocol (L2TP)
Important
To perform backups over a VPN, you must enable Internet Control Message Protocol
(ICMP). For more information, see How to enable ICMP traffic from protected SecureNet
clients to external hosts in ISA Server 2006 and ISA Server 2004
(http://go.microsoft.com/fwlink/?LinkId=186982).
180
On the computer on which you want to install the protection agent, we recommend that
you map a network drive to the DPM server.
For example, at the command prompt type net use Z:\\DPM1\c$.
On the protected computer, from the command prompt change the directory (CD) for the
appropriate processor. For example:
For 32-bit computers, type CD \<drive letter>:\Program Files\Microsoft
DPM\DPM\Agents\RA\<build number>\i386
For 64-bit computers, type CD \<drive letter>:\Program Files\Microsoft
DPM\DPM\Agents\RA\<build number>\AM64
After you change the directory, type DPMAgentInstaller_<processor> <DPM server
name>. For example:
For 32-bit computers, type DPMAgentInstaller_x86.exe
DPM1.Fully.qualified.domain
For 64-bit computers, type DPMAgentInstaller_x64.exe <DPM server name>
Note
If you use the DPM server name in the command line, DPM installs the
protection agent and configures the security permissions for the DPM server.
You can perform a manual installation using the /q parameter after the
DpmAgentInstaller.exe command. For example, type:
DpmAgentInstaller.exe /q <DPM server name>.
If you run the DpmAgentInstaller.exe command from Step 2, to complete the protection
agent configuration for the appropriate DPM server and firewall settings, open an
elevated command prompt, and type:
<drive letter>:\Program Files\Microsoft Data Protection Manager\bin\
SetDpmServer.exe – dpmServerName <DPM server name>.
For example: SetDpmServer.exe –dpmServerName DPM01, where DPM01 is the
actual DPM server name.
If you have already configured protection for the selected clients on the DPM server, DPM will
automatically start the backup for these computers to the DPM server. If you have not yet
configured protection, you can start the Create New Protection Group Wizard, and then select the
Clients option.
To add a client computer using the Create New Protection Group Wizard
1. On the Welcome page, click Next.
2. On the Select Protection Group page, select Clients, and then click Next.
3. On the Select Group Members page, select the computers you want to protect from the
list box. Click Add to move the computers to the Selected computers list box, and then
click Next. When selecting the computers you want to protect, note the following:
If you want to add multiple computers, you can create a .txt file containing the
computers you want to add. To add the computers, click Add Multiple Computers.
You must enter each computer in the file on a new line. We recommend that you
provide the fully qualified domain name (FQDN) of the target computers. For
example, enter multiple computers in a .txt file as follows:
Comp1.abc.domain.com
Comp2.abc.domain.com
Comp3.abc.domain.com
If DPM cannot find any of the computers that you specified in the .txt file or that you
entered in the Text file location box, the failed set of computers is placed in a log
file. Click the Failed to add machines link at the bottom of the page to open the log
file.
4. On the Specify Inclusions and Exclusions page, specify the folders to include or
exclude for protection on the selected computers. To select from a list of well-known
folders, such as Documents, click the drop-down list.
When specifying inclusions and exclusions, note the following:
When you exclude a folder, and then specify a separate inclusion rule for a subfolder,
DPM does not backup the subfolder. The exclusion rule overrides the inclusion rule.
When you include a folder, and then specify a separate exclude rule for a subfolder,
DPM backs up the entire folder, except for the excluded subfolder.
When you include a well-known folder such as Documents, DPM locates the
Documents folder for all users on the computer, and then applies the rule. For
182
example, if the user profile for computer Comp1 contains the Documents folder for
both User1 and User2, DPM will back up both folders.
a. Type the folder names in the Folder column using variables such as programfiles, or
you can use the exact folder name. Select Include or Exclude for each entry in the
Rule column.
b. Select Allow users to specify protection members to give your end users the
choice to add more folders on the computer that they want to back up. However, the
files and folders you have explicitly excluded as an administrator cannot be selected
by the end user.
c. Under File type exclusions specify the file types to exclude using their file
extensions, and then click Next to continue.
Figure 1 shows an example of how you can use the Specify Inclusions and
Exclusions page to include and exclude specific folders. In this example the My
Documents folder is selected for protection and the Temporary Internet Files folder
is excluded from protection.
<Placeholder for graphic>
5. On the Select Data Protection Method page, in the Protection Group Name box, type
a name for the protection group.
6. In the Protection method section, select if you want to use short-term disk-based
protection or long-term tape-based protection. Click Next to continue.
Note
DPM supports short-term disk-based protection for desktop and laptop
computers, as well as long-term tape-based protection. DPM does not support
short-term tape-based backup for desktop and laptop computers.
7. On the Specify Goals page, specify your protection goals such as retention range and
synchronization frequency. Select the Alerting option to receive alerts when the
recovery points fails for the selected number of days, and then click Next.
8. On the Allocate Storage page, specify the size of data to be protected on the computer.
We recommend that you co-locate multiple data sources to one DPM replica volume.
Note
We recommend that you co-locate your data if you have a large number of client
computers. You will not be able to protect 1000 or more client computers with
one DPM server without co-locating your data. We recommend that you do not
co-locate if you have less than ten client computers in a protection group.
9. Select the Automatically grow the volumes check box to automatically grow volumes
when more disk space is required for protecting data on the client computers. Click Next
to continue.
10. On the Summary page, review your selections and then click Create Group to complete
the wizard.
183
Adding a Client Computer and Modifying
Disk Allocation
You can add a client computer by modifying the protection group to reduce the number of steps
required to add the client computer.
Warning
184
If a client computer is connected over a Virtual Private Network (VPN), the
recovery will fail. We recommend that you restore the data to an alternate
location (such as a share), and then provide that share to the end user so
they can copy their data.
b. Recover to an alternate location. Click Browse to browse for an alternate recovery
destination. On the Specify Alternate Recovery Destination dialog box, select the
recovery destination and click OK.
c. Copy to tape. This option copies the volume that contains the selected data to a
tape in a DPM library. Click Next, and on the Specify Library dialog box, select
library details and tape options. You can also choose to compress or encrypt the data
on tape.
8. Click Next after you have specified one of the preceding options.
9. Specify your recovery options:
a. Existing version recovery behavior. Select Create copy, Skip, or Overwrite. This
option is enabled only when you selected Recover to the original location in step 7.
b. Restore security. Select Apply settings of the destination computer or Apply the
security settings of the recovery point version.
c. Network bandwidth usage throttling. Click Modify to enable network bandwidth
usage throttling.
d. Enable SAN based recovery using hardware snapshots. Select this option to use
SAN-based hardware snapshots for quicker recovery.
This option is valid only when you have a SAN where hardware snapshot
functionality is enabled, the SAN has the capability to create a clone and to split a
clone to make it writable, and the protected computer and the DPM server are
connected to the same SAN.
e. Notification. Click Send an e-mail when the recovery completes, and specify the
recipients who will receive the notification. Separate the e-mail addresses with
commas.
10. Click Next after you have made your selections for the preceding options.
11. Review your recovery settings, and click Recover.
Note
Any synchronization job for the selected recovery item will be canceled while the
recovery is in progress.
185
Performing Client Computer Management
Tasks
This topic provides instructions and guidelines for managing a protected client computer and
making changes after the initial DPM configuration.
In This Section
Using the Disk Utilization Report
On some client computers, you may notice the computer running slow when a backup is in
progress. You can improve the computer’s responsiveness using the registry key DWORD
WaitInMSPerRequestForClientRead. This key is not created by default. You must create it at
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection
Manager\Agent\ClientProtection.
The default value for this DWORD is 50 (32H). You can increase it to 75 or 100 to improve
responsiveness. If you want to increase backup speed at the expense of responsiveness, reduce
the value to 40 or 30.
186
Managing Hyper-V Computers
This section provides information on how you can protect Hyper-V virtual machines that are on
cluster shared volumes (CSV).
In This Section
Prerequisites for Hyper-V Protection
Protecting Hyper-V Machines
Recovering Hyper-V Data
Understanding Protection for CSV
Note
DPM continues to protect Hyper-V virtual machines even if the Hyper-V role is not
installed on the DPM server. However, you cannot do item-level recovery (ILR) unless
the Hyper-V role is enabled.
Windows Server 2008 SP2 Install Microsoft Windows Server 2008 SP2.
Or
Install the Microsoft Hyper-V prerequisites
(http://go.microsoft.com/fwlink/?LinkID=133781).
187
Or
Information about Service Pack 2 for Windows
Vista and for Windows Server 2008
(http://go.microsoft.com/fwlink/?LinkId=184957)
Note
For a CSV deployment, install the VSS
hardware provider on the host
computer. Contact your SAN vendor for
the VSS hardware provider.
Things to Remember
You must turn on auto-mount on the host computer to enable virtual machine protection.
You must disable TCP Chimney Offload.
188
Caching
When you are protecting a large number (over 200 virtual machines) of virtual machines using
cluster shared volumes (CSV), it may take a long time (>15 min) to populate the inquiry screen in
the Create New Protection Group Wizard. You can avoid this by enabling caching on the primary
DPM server. After you enable caching, when you expand the data source on the inquiry screen,
DPM will refresh the resource groups under that node, but the virtual machines under each
resource group will be populated from the cache. The default time-out for the cache is 48 hours.
You can change this by editing the registry.
To enable caching, create a new registry key called CacheInquiryResults at
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection
Manager\Configuration. Under this key, create the DWORD InquiryResultsTimeoutInterval.
After you create the registry key, you will see the Clear Cache button on the inquiry page of the
Create New Protection Group Wizard. Click this button when you want to force DPM to refresh
the list of virtual machines.
Warning
When you click Clear Cache, DPM will refresh the entire cache, and not just the cache of
the selected resource group.
189
Parameter Description Example
Scenario Description
Recovering a virtual machine to an alternate The original VHD is deleted. DPM will recover
location the VHD and other configuration files on the
original location by using the Hyper-V VSS
190
Scenario Description
writer. At the end of the recovery process,
virtual machines will still be highly available.
Warning
The resource group must be present for
recovery to happen. If the resource
group is not available, recover to an
alternate location and then make the
virtual machine highly available.
Item-level recovery (ILR) of Hyper-V virtual DPM supports item-level recovery (ILR), which
machines allows you to do granular recovery of files,
folders, volumes, and virtual hard disks (VHDs)
from a host-level backup of Hyper-V virtual
machines to a network share or a volume on a
DPM protected server.
Tip
The DPM protection agent does not
have to be installed inside the guest to
perform item-level recovery.
In This Section
Recovering A Hyper-V Machine To Its Original Location
Recovering a Virtual Machine to an Alternate Location
Item-Level Recovery for Hyper-V
191
Recovering A Hyper-V Machine To Its
Original Location
The procedure to recover a Hyper-V virtual machine to its original location is the same as with
any other data source. For more information, in DPM 2010 Help, see Recovery Wizard
(http://go.microsoft.com/fwlink/?LinkID=164845).
Warning
When you recover to an alternate clustered host, DPM will not make the virtual machine
highly available. You must do that using the Failover Cluster Manager.
System Center Data Protection Manager (DPM) 2010 also supports alternate location recovery of
Hyper-V virtual machines to a cluster both in a Cluster Share Volume (CSV) and Non-CSV
environment.
In This Section
Procedure To Recover A Hyper-V Virtual Machine In A Non-CSV Environment
Procedure To Recover To An Alternate Stand-Alone Hyper-V Host
192
2. Expand the cluster node to see the virtual machines that are hosted on the failover cluster.
Select the virtual machines that you want to recover.
3. Available recovery points are indicated in bold on the calendar in the recovery points section.
Select the bold date for the recovery point you want to recover.
4. In the Recoverable item pane, click to select the recoverable item you want to recover.
Warning
If you select the virtual machine on the left pane, the Recoverable Item list will show
you the list of VHDs. If you do a recovery at this point, you are recovering a VHD and
not the virtual machine.
5. In the Actions pane, click Recover. DPM starts the Recovery Wizard.
For more information about the Recovery wizard, see Recovery Wizard.
Warning
In a non-CSV environment, the destination will be a volume on available storage in
the cluster.
6. Make the Hyper-V virtual machines recovered to a cluster highly available.
For more information about how to make a virtual machine highly available, see Make the
virtual machine highly available (http://go.microsoft.com/fwlink/?LinkID=160484).
Warning
If you select the virtual machine on the left pane, the Recoverable Item list will show
you the list of VHDs. If you do a recovery at this point, you are recovering a VHD and
not the virtual machine.
6. In the Actions pane, click Recover. DPM starts the Recovery Wizard.
For more information about the Recovery wizard, see Recovery Wizard.
193
7. You can now close the Recovery Wizard and view the recovery status in the Monitoring task
area.
Warning
If the recovered virtual machine was backed up in an online state, and it is saved state
after recovery, delete the saved state of that virtual machine from the Hyper-V Manager
Console and start it.
After alternate location recovery always check whether the virtual machine’s network
configuration is correct.
Important
Item-level recovery does not support recovery of an item to its original location.
You cannot do an item-level recovery from within a virtual machine.
The following table lists supported and unsupported scenarios when recovering files, folders,
volumes, and VHDs using ILR in a Hyper-V virtual machine.
194
Scenario Volumes or files/folders recovery Virtual Hard Disk (VHD)
recovery
partitioning
Important
Mount points cannot be traversed or browsed when exploring a VHD for item-level
recovery.
In This Section
Procedure for Item-Level Recovery of Files and Folders
Procedure for Item-Level Recovery of Volumes
Procedure for Item-Level Recovery of VHD
Note
Dates in bold indicate available recovery points.
4. To view the list of files and folders, in the Recoverable Items list, do the following:
a. Double-click the item (VHD) that you want to recover.
b. Double-click the items (volumes in VHD) that you want to recover.
5. Select the items (files and folders) that you want to recover.
Note
You can select and recover multiple files and folders from the list.
6. In the Actions pane, click Recover to start the Recovery Wizard.
For more information about the Recovery Wizard, see Recovery Wizard
(http://go.microsoft.com/fwlink/?LinkID=164845).
Note
195
DPM saves files and folders in a custom directory structure in the following
format: <Recovery destination selected by user>\<VM name>_<Backup Time
stamp> with the exact file system hierarchy that is used on a protected computer
with the DPM agent installed.
Note
The list pane displays the volume label or “Virtual Machine Volume” if no volume
label is available.
You cannot select and recover multiple volumes at the same time.
5. In the Actions pane, click Recover to start the Recovery Wizard.
For more information about the Recovery Wizard, see Recovery Wizard
(http://go.microsoft.com/fwlink/?LinkID=164845).
196
3. Select the date from which you want to perform a recovery.
Note
Dates in bold indicate available recovery points.
The path of the VHD file on the protected computer is displayed in the
Recoverable Items pane.
4. In the Recoverable Items pane, select the item (VHD file) that you want to recover.
Note
You cannot select and recover multiple VHDs at the same time.
5. In the Actions pane, click Recover to start the Recovery Wizard.
Note
When you are recovering a VHD of a virtual machine that has Hyper-V
snapshots, .AVHD files are not displayed in the Recoverable Items pane, but
DPM will recover the parent VHD and all the associated .AVHD files.
DPM saves VHDs in a custom directory structure in the following format:
DPM_<backup-time>\DPM_Recovered_At_<RecoveryTime>\<Path of the VHD
on the protected computerr> with the exact file system hierarchy that is used on a
protected computer with the DPM agent installed.
For more information about the Recovery Wizard, see Recovery Wizard
(http://go.microsoft.com/fwlink/?LinkID=164845).
197
In this example, when VM2 is being backed up, the CSV is made local to Node B. All I/O for VM1
is then routed over the network through the CSV filter on Node B. This affects the performance of
VM1 and it appears on the Failover Cluster Manager as being in “redirected I/O mode.”
To reduce the impact on VM1, we recommend that you use hardware snapshots, which enable
the CSV to resume direct I/O mode as soon as the hardware snapshot has been created. The
duration of this process is typically very short, about two minutes.
198
If you use software snapshots, the CSV will be in redirected I/O mode for all virtual machines on
this CSV, other than VM2, for the duration of the backup. The duration of this process depends
on the size of the VHDs being backed up by DPM, and can be significant. Therefore, using
software snapshots can decrease the performance of the virtual machines.
After the snapshot is created, DPM starts replicating the data from the snapshot to the DPM
server. After the replication is complete, the protection agent deletes the hardware snapshot.
In This Section
Considerations for Backing Up Virtual Machines on CSV with Hardware VSS Providers
Migrating from the System VSS Provider to a Hardware VSS Provider
Considerations for Backing Up Virtual Machines on CSV with the System VSS Provider
199
Key HKLM\Software\Microsoft\Microsoft Data Protection Manager\2.0\Configuration\MaxAllowedP
arallelBackups
Data 3
Type DWORD
This will enable a maximum of three backups to run concurrently on each node. For optimal
performance, we recommend that you do not use a value greater than 3.
Dat 3
a
Typ DWORD
e
4. To complete this process, you must run the Modify Protection Group Wizard for each of the
protection groups that protect the virtual machines on this cluster.
200
Considerations for Backing Up Virtual
Machines on CSV with the System VSS
Provider
If your SAN vendor does not have hardware VSS providers, you can use software snapshots to
back up your virtual machines.
We recommend that virtual machines deployed on CSV should be backed up serially.
There are two aspects to serialization of backup jobs in a CSV environment:
Serializing virtual machine backups on a per node basis.
Serializing virtual machine backups on a per CSV LUN basis.
Data 1
Typ DWORD
e
This ensures that only one backup job will run at a time on a Hyper-V host.
201
$infoText = "This script will generate the DatasourceGroups.xml file in the current path.
Once this file is created merge it with the same file name under %programfiles%\Microsoft
DPM\DPM\Config directory on the DPM server. Read the documentation for more details."
echo $infoText
$footer = "</DatasourceGroup>"
$dir = [guid]::NewGuid()
md $dir
$cluster = get-Cluster
echo $line >> $dir\$vol # File VolumeX will contain entries for all VMs hosted on CSV
VolumeX
202
$GroupEndString = "</Group>"
204
Resources.CSVSCALE.SCALEDPM01.LAB" WriterId="66841cd4-6ded-4f4b-
8f17-fd23f8ddc3de" />
</Group>
</DatasourceGroup>
3. Copy the <Group> tags from all the DataSourceGroup.xml files generated and add the text
between the <DataSourceGroup> tags. The DataSourceGroups.xml file will now contain one
<header> tag, one <DataSourceGroup> tag, and <Group> tags from all CSV clusters.
4. Close the DataSourceGroups.xml file on the DPM server. It is now ready to use.
Supported Scenarios
Workgroup Untrusted Domain
205
Workgroup Untrusted Domain
206
Security Settings On protected computer in untrusted domain
Important
Make sure IPSEC does not block communication between DPM server and workgroup
machines.
207
Protecting Workgroup Computers
To protect a computer that is not joined to a domain, you must follow the steps outlined in this
topic.
1. Installing Agents on Workgroup Computers
2. Attaching a Workgroup Computer to the DPM Server
Important
To protect a computer that is running Windows XP, you must first disable the ForceGuest
registry key otherwise NTLM authentication will fail while attaching the computer.
For more information about disabling the ForceGuest registry key, see How to Set
Security in Windows XP Professional That Is Installed in a Workgroup
(http://go.microsoft.com/fwlink/?LinkID=192212).
Parameter Description
208
Parameter Description
other using NETBIOS names.
This script registers the specified workgroup computer to be protected with this DPM server,
creates a local user account using the specified credentials, and configures DPM to use these
credentials to authenticate the workgroup computer.
Important
Before attaching the workgroup computer to the DPM server by using the DPM
Administrator Console or DPM Management Shell, you must install the DPM agent and
run SetDpmServer.exe on the workgroup computer.
Important
If you use the NetBIOS name of the DPM server in the SetDPMServer command, you
also must use the NetBIOS for the protected computer when you attach the computer.
This also applies if you use the fully qualified domain name (FQDN) of the DPM server.
Examples
Example 1
Configuring a workgroup computer for protection after agent is installed.
209
On the workgroup computer, run SetDpmServer.exe -DpmServerName Server01 -isNonDomainServer
-UserName mark.
Important
Because the workgroup computers are typically accessible only by using NetBIOS name,
the value for DPMServerName must be the NetBIOS name.
Example 2
Configuring a workgroup computer with conflicting NetBIOS names for protection after agent is
installed.
On the workgroup computer, run SetDpmServer.exe -dpmServerName Server01.corp.contoso.com -
isNonDomainServer -userName mark -productionServerDnsSuffix widgets.corp.com.
Parameter Description
210
Parameter Description
ProductionServerDnsSuffix represents the DNS
suffix which DPM server will use to
communicate with this server.
This script registers the specified computer to be protected with this DPM computer, creates a
local user account using the specified credentials and configures DPM to use these credentials to
authenticate to the computer.
Important
DPM agent must be installed and SetDpmServer.exe must be run on the computer,
before attaching the computer to DPM server using the DPM Administrator Console or
Management shell.
Important
211
If you use NetBIOS name of the DPM server in the SetDPMServer command, you must
use the NetBIOS for the protected computer also during attach and vice versa if you are
using FQDN.
Important
You must use the same naming convention (FQDN or NetBIOS) as you did when
configuring protection.
2. On the DPM server, run the Update-NonDomainServerInfo cmdlet and provide appropriate
information along with new password.
3. Refresh the agent information for the protected computer.
Examples
Example 1
Changing the password when the computer was protected using NetBIOS name.
On the protected computer, run SetDpmServer.exe -dpmServerName Server01 -isNonDomainServer
–UpdatePassword
When prompted, provide the same password as the one you provided in Step 1.
Example 2
Changing the password when the computer was protected using FQDN.
On the protected computer, run SetDpmServer.exe -dpmServerName Server01.corp.contoso.com -
isNonDomainServer -UpdatePassword
212
When prompted, provide the same password as the one you provided in Step 1.
Prerequisites
Windows Server Backup installed on the protected computer for BMR.
Windows Recovery Environment (WinRE) for BMR.
Unsupported Scenarios
The following scenarios are not supported for BMR:
Computers running Windows Server 2003.
Computers running client operating systems like Windows XP or Windows Vista or
Windows 7.
A DPM server cannot protect itself for BMR.
Disk-Tape protection is not supported for BMR. However, long-term to tape with short-term to
disk (D-D-T) is supported.
In This Section
Prescriptive Guidance on BMR vs System State By Data Source
Setting Up BMR Protection
Setting Up System State Protection
Recovering BMR
213
Recovering System State
Migrating Between System State and BMR Protection
File Servers
File system backup for data protection.
BMR backup for system protection.
Recovery Strategy
Lost or damaged operating system System State recovery using BMR backup
Lost server (data volumes intact) BMR recovery using BMR backup
Lost server (data volumes also lost) BMR recovery followed by file recovery
SharePoint Farm
SharePoint farm backup for farm data.
BMR backup on Web front-end server to protect IIS role.
BMR or System State backup for servers hosting content database.
Recovery Strategy
Lost site, lists, list items, documents SharePoint recovery using DPM
Lost or damaged operating system System State recovery using BMR backup
214
Hyper-V Virtual Machines
Hyper-V host-level backup to protect virtual machines.
BMR backup of host computer at least once a day.
Recovery Strategy
Lost or damaged operating system System State recovery using BMR backup
Lost Hyper-V host (virtual machine intact) BMR recovery using BMR backup
Lost Hyper-V host (virtual machine also lost) BMR recovery followed by Hyper-V recovery
Recovery Strategy
Lost or damaged operating system System State recovery using BMR backup
Lost server (database and transaction log files BMR recovery using BMR backup
intact)
Lost server (database and transaction log files BMR recovery followed by application-specific
also lost) recovery
Tip
If your application is installed on a critical volume, you will also be able to restore the
application as part of BMR. However, application data is not backed up as part of BMR.
You can set up BMR protection for a computer by using the Create New Protection Group
Wizard. You can select BMR protection from under the System Protection node on the Select
Group Members page of the wizard.
215
Space Requirements
Unlike System State protection, DPM does not have any space requirements on the protected
computer for BMR protection. WSB directly transfers the backups to the DPM server.
Warning
DPM will not show you the progress of this job in the Jobs view.
DPM reserves 30 GB of space on the replica volume for BMR. You can change this by using the
Disk Allocation page in the Modify Protection Group Wizard or the Get-
DatasourceDiskAllocation and Set-DatasourceDiskAllocation cmdlets.
On the recovery point volume, BMR protection requires about 6 GB for retention of five days.
Note
DPM does not calculate the size of BMR data source, but assumes 30 GB for all servers.
Admins should change the value as per the size of BMR backups expected on their
environments.
Size of BMR backup can be roughly calculated sum of used space on all critical volumes.
Critical volumes = Boot Volume + System Volume + Volume hosting system state data
such as AD DIT/log volumes.
Warning
When you stop protection for BMR, System State protection is not stopped automatically.
You must specifically clear the System State check box to stop System State protection.
Things to Remember
You cannot protect BMR and System State for the same computer on different protection
groups.
You cannot reduce the replica volume size to less than 15 GB.
See Also
Managing System Protection
216
Setting Up System State Protection
In DPM, System State protection covers protection for operating system files.
You can set up System State protection for a computer by using the Create New Protection
Group Wizard. You can select System State from under the System Protection node on the
Select Group Members page of the wizard.
Tip
We recommend that you protect BMR for complete protection of your computer.
Space Requirements
For System State protection, WSB first creates a local dump of the System State information and
then transfers it to the DPM server. The local dump will typically require 15 GB of space on the
computer. If there is insufficient space on the computer, WSB will fail the backup.
Warning
DPM will show the progress of this job in the Jobs view only when data transfer begins.
Things to Remember
You cannot protect System State and BMR for the same computer on different protection groups.
See Also
Managing System Protection
Recovering BMR
Warning
Computers in WinPE cannot connect to network shares that have IPsec enabled. The
computer should be an IPsec boundary computer so that a computer that is not
joined to the domain can access the network share by using a username and
password.
2. Start the protected computer using Windows Recovery Environment (WinRE) and go to the
command shell.
3. Using the command shell, enable networking - start /w wpeinit
4. Using the command shell, retrieve the version of the backup from the restored image -
Wbadmin get versions –backuptarget:\\<computername>\serverbackup$
5. Using the command shell, start system recovery - Wbadmin.exe start sysrecovery –
version:<version ID from Step 2> -backuptarget:\\<computername>\ServerBackup$ -
recreatedisks
See Also
Managing System Protection
Recover the Operating System or Full Server
Windows Server Backup 2008 Restore from Network Location
Warning
Start the computer that you want to recover.
2. Start Windows Server Backup.
3. Click Recover in the Actions pane.
218
4. Click This Server, and then click Next.
5. Click Another Server. On the Specify Location Type page, select Remote shared folder.
Provide the path to the folder that contains the recovery point. Click Next.
6. On the Select Recovery Type page, click System state, and then click Next.
7. On the Select Location for System State Recovery page, click Original Location, and
then click Next.
8. On the Confirmation page, click Recover.
See Also
Managing System Protection
Recover the System State
Warning
Disaster Replica will fail because of increased space needs. You must manually increase
the space allocation on the server.
219
You will require space on the protected computer because System State protection first
writes the replica to the local computer and then transfers it to the DPM server.
Important
Because of the increased space requirement on the replica volume, DPM may try to
automatically grow the volume. If there is insufficient space in the storage pool, you will
see an error indicating this.
Tip
If you are trying to remove BMR protection to free up disk space, you must stop
protection of BMR and System State.
See Also
Managing System Protection
Note
On the secondary DPM server, the wizard does not differentiate between BMR and
System State. If either is protected it will appear as System Protection.
Important
We strongly recommend that you protect the DPMDB on the secondary DPM server.
220
Warning
If your primary DPM server is protecting a SharePoint farm, you must make sure that you
give the secondary server enough time to back up the primary server before the next
back up is triggered. Using the Modify Protection Group Wizard, you can define when you
want your back up to start,
See Also
Specify Short-Term Goals
HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\TcpWindowSize\Tcp1323Opts
For example, using the following settings over a 100 Mbps link with 40 ms latency produces the
following results:
Settings
Results
221
c per job
Using DPMSync
DpmSync is a command-line tool that enables you to synchronize the DPM database with the
state of the disks in the storage pool and with the installed protection agents. The DpmSync tool
restores the DPM database, synchronizes the DPM database with the replicas in the storage
pool, restores the Report database, and reallocates missing replicas.
DpmSync Syntax
DpmSync –RestoreDb –DbLoc location –InstanceName server\instance]
DpmSync -Sync
DpmSync -ReallocateReplica
DpmSync -DataCopied
Parameters
Parameter Description
Example 1: To restore the DPM database from local backup media on the DPM server.
Run the following command:
222
DpmSync –RestoreDb -DbLoc G:\DPM\Backups\2005\November\DPMDB.bak
After you restore the DPM database, to synchronize the databases, you run the following
command:
DpmSync -Sync
After you restore and synchronize the DPM database and before you restore the replica, you run
the following command to reallocate disk space for the replica:
DpmSync -ReallocateReplica
223
dbloc <dbbackuplocation> –instancename
<instancename>, where dbbackuplocation is
the location of the backup taken in step 1 and
instancename is the name of the remote SQL
Server instance.
Managing Performance
The topics in this section define performance expectations and explain how to optimize Data
Protection Manager (DPM) performance. Network speed, the performance characteristics of the
protected computer, the size of your protected data, and the rate at which the protected data
changes will determine your actual results.
In This Section
How DPM Operations Affect Performance
DPM and Memory
Performance Counters
Improving Performance
Managing DPM Performance on a WAN
How Protection Group Changes Affect Jobs
See Also
Disaster Recovery
Managing DPM Servers
Managing Protected File Servers and Workstations
Managing Protected Servers Running Exchange
Managing Protected Servers Running SQL Server
Managing Protected Servers Running SharePoint
Managing Protected Virtual Servers
Managing Tapes
224
How DPM Operations Affect Performance
As an administrator, one of your concerns will be the impact of DPM data transfer operations on
system and network resources. The primary data transfer operations are:
Replica creation. This occurs once for each protection group member.
Change tracking. This is a continuous process on each protected computer.
Synchronization. This occurs on a regular schedule.
Consistency check. This occurs when a replica becomes inconsistent.
Express full backups. This occurs on a regular schedule.
Back up to tape. This occurs on a regular schedule.
Understanding these operations and DPM processes will help you establish reasonable
expectations for DPM performance.
In This Section
Replica Creation
Change Tracking
Synchronization
Consistency Check
Express Full Backup
Backup to Tape
DPM Processes
See Also
Managing Performance
Replica Creation
In DPM, a replica is a complete copy of the protected data on a single volume, database, or
storage group. The DPM protection agent on the protected computer sends the data selected for
protection to the DPM server. A replica of each member in the protection group is created.
Replica creation is one of the more resource-intensive DPM operations, with its greatest impact
being on network resources.
Typically, the performance of the replica creation will be limited by the speed of the network
connection between the DPM server and the protected computers. That is, the amount of time
that it takes to transfer a 1-gigabyte (GB) volume from a protected computer to the DPM server
will be determined by the amount of data per second that the network can transmit.
225
The following table shows the amount of time it would take, at different network speeds, to
transmit various amounts of data under optimal conditions. Times are given in hours, except
where specified as minutes.
Note
In the preceding table, Gbps = gigabits per second, Mbps = megabits per second, and
Kbps = kilobits per second. The figures for a network speed of 1 Gbps assume that the
disk speed on the DPM server and the protected computer are not a bottleneck.
Typically, the time to complete initial replica (IR) creation can be calculated as follows:
IR: hours = ((data size in MB) / (.8 x network speed in MB/s)) / 3600
Note 1: Convert network speed from bits to bytes by dividing by 8.
Note 2: The network speed is multiplied by .8 because the maximum network efficiency is
approximately 80%.
On an extremely fast network, such as a gigabit connection, the speed of replica creation will be
determined by the disk speed of the DPM server or that of the protected computer, whichever is
slower.
The impact of replica creation on network performance can be reduced by using network
bandwidth usage throttling. For more information, see Using Network Bandwidth Usage
Throttling.
To avoid the network load of replica creation, you can create replicas manually from tape or other
removable media when creating the initial replica, which can take from hours to days depending
on the amount of data to protect. For more information, see Creating Replicas Manually.
If the network goes down during synchronization, DPM will attempt to continue the
synchronization from the point where it left off last. If the network goes down during consistency
check, DPM will attempt to continue the check if the network comes back up in five minutes.
However, if the network remains down for longer than 5 minutes the replica is marked as
Inconsistent.
226
See Also
How DPM Operations Affect Performance
Managing Performance
Change Tracking
After the replica is created, the DPM protection agent on the computer begins tracking all
changes to protected data on that computer. Changes to files are passed through a filter before
being written to the volume. This process is similar to the filtering of files through antivirus
software, but the performance load of DPM tracking changes is less than the performance load of
antivirus software.
See Also
How DPM Operations Affect Performance
Managing Performance
Synchronization
Synchronization is the process by which DPM transfers data changes from the protected
computer to the DPM server and then applies the changes to the replica of the protected data.
For a file volume or share, the protection agent on the protected computer tracks changes to
blocks, using the volume filter and the change journal that is part of the operating system to
determine whether any protected files were modified. DPM also uses the volume filter and
change journal to track the creation of new files and the deletion or renaming of protected files.
For application data, after the replica is created, changes to volume blocks belonging to
application files are tracked by the volume filter.
How changes are transferred to the DPM server depends on the application and the type of
synchronization. For protected Microsoft Exchange data, synchronization transfers an
incremental Volume Shadow Copy Service (VSS) snapshot. For protected Microsoft SQL Server
data, synchronization transfers a transaction log backup.
DPM relies on synchronization to update replicas with the protected data. Each synchronization
job consumes network resources and can therefore affect network performance.
The impact of synchronization on network performance can be reduced by using network
bandwidth usage throttling and compression. For more information, see Using Network
Bandwidth Usage Throttling and Using On-the-Wire Compression.
227
See Also
How DPM Operations Affect Performance
Managing Performance
Consistency Check
A consistency check is the process by which DPM checks for and corrects inconsistencies
between a protected data source and its replica.
The performance of the protected computer, DPM server, and network will be affected while a
consistency check is running, but it is expected to be optimized because only the changes and
checksums are transferred.
The network impact from a consistency check is significantly lower than initial replica creation
after a successful replica creation. If the initial replica creation is interrupted or unsuccessful, the
first consistency check can have an impact similar to replica creation.
We recommend that consistency checks be performed during off-peak hours.
DPM automatically performs a consistency check in the following instances:
When you modify a protection group by changing the exclusion list.
When a daily consistency check is scheduled and the replica is inconsistent.
See Also
How DPM Operations Affect Performance
Managing Performance
See Also
How DPM Operations Affect Performance
Managing Performance
228
Backup to Tape
When DPM backs up data from the replica to tape, there is no network traffic and therefore no
performance impact on the protected computer.
When DPM backs up data from the protected computer directly to tape, there will be an impact on
the disk resources and performance on the protected computer. The impact on performance is
less when backing up file data than when backing up application data.
See Also
How DPM Operations Affect Performance
Managing Performance
DPM Processes
On the DPM server, three processes can impact performance:
DPM protection agent (MsDpmProtectionAgent.exe). DPM jobs affect both memory and
CPU usage by the DPM protection agent. It is normal for CPU usage by
MsDpmProtectionAgent.exe to increase during consistency checks.
DPM service (MsDpm.exe). The DPM service affects both memory and CPU usage.
DPM Administrator Console (an instance of Mmc.exe). DPM Administrator Console can
be a significant factor in high memory usage. You can close it when it is not in use.
Note
Memory usage for the DPM instance of the SQL Server service
(Microsoft$DPM$Acct.exe) is expected to be comparatively high. This does not indicate a
problem. The service normally uses a large amount of memory for caching, but it
releases memory when available memory is low.
See Also
How DPM Operations Affect Performance
Managing Performance
229
DPM requires a pagefile size that is 0.2 percent the size of all recovery point volumes combined,
in addition to the recommended size (generally, 1.5 times the amount of RAM on the computer).
For example, if the recovery point volumes on a DPM server total 3 TB, you should increase the
pagefile size by 6 GB.
For more information about modifying the pagefile size, see Change the size of the virtual
memory paging file (http://go.microsoft.com/fwlink/?LinkId=95116).
There is a Volume Shadow Copy Service (VSS) non-paged pool limitation on 32-bit operating
systems. Therefore, if you are protecting more than 10 TB of data, the DPM server must be
running on a 64-bit operating system.
See Also
Managing Performance
Performance Counters
One method you can use to monitor DPM server performance is Performance in Administrative
Tools. You can configure the monitored data to be saved as a log. You can also configure
Performance to generate alerts. For information about how to create and configure performance
alerts, see Microsoft Knowledge Base article 324752, How to create and configure performance
alerts in Windows Server 2003, (http://go.microsoft.com/fwlink/?LinkId=47881).
Note
You can use the DPM 2010 Management Pack for System Center Operations
Manager 2007 to centrally monitor the state, health, and performance of multiple DPM
servers from an Operations Management server. To download the DPM 2010
Management Pack, see System Center Data Protection Manager 2010 Management
Pack for Operations Manager 2007 (http://go.microsoft.com/fwlink/?LinkId=189616).
The Performance Counters for Monitoring DPM table lists counters that can be useful for
monitoring DPM server performance. For more information about specific performance counters,
see Performance Logs and Alerts Help. To open the Performance tool, click Start, point to
Administrative Tools, and then click Performance. On the Action menu, click Help.
230
Performance Object Description Value That Might Possible Causes
and Counter Indicate a Problem
Avail/MBytes value is server. are running
the sum of memory simultaneously.
assigned to the The DPM server
standby (cached), does not have
free, and zero-paged sufficient memory to
lists. handle the current
DPM workload.
Processor: % Measures the > 95% for more than Multiple DPM jobs
Processor Time percentage of time the 10 minutes. are running
processor was busy simultaneously.
Indicates very high
during the sampling Synchronization with
CPU usage on the
interval. consistency check
DPM server.
jobs are particularly
CPU-intensive.
On-the-wire
compression has
been enabled on the
DPM server. On-the-
wire compression
allows faster data
throughput without
negatively affecting
network
performance.
However, it places a
large processing
load on both the
protected computer
and the DPM server.
A runaway process
is exhausting
system resources.
The DPM server
does not have
sufficient processing
capacity to handle
the DPM workload.
Physical Disk: Current Measures the number > 80 requests for Multiple DPM jobs
Disk Queue Length of disk requests that more than 6 minutes. that are running
(for all instances) are currently waiting simultaneously are
Indicates possibly
and the requests placing a high
excessive disk
demand on disk
231
Performance Object Description Value That Might Possible Causes
and Counter Indicate a Problem
currently being queue length. resources.
serviced. Disk performance
needs tuning.
Disk resources on
the DPM server are
not sufficient for the
current DPM
workload.
See Also
Managing Performance
Improving Performance
Performance is determined by workload and capacity. A slow computer might perform adequately
when it has a very light workload. In contrast, the performance of an extremely powerful computer
might suffer when challenged by an excessive workload. In operations between two computers
on a network, the workload that can be handled effectively will be limited by the component with
the least capacity, whether it is one of the computers or the network connection itself.
As a general rule, you can improve performance by making changes to the workload, the
capacity, or both.
In This Section
Modifying Workloads
Increasing Capacity
See Also
Managing Performance
Modifying Workloads
DPM offers several methods that you can use to modify protection workloads to improve
performance. The following table lists the methods you can use and indicates what you can
expect from each method.
232
Methods for Modifying Protection Workloads
Method Impact
Network bandwidth usage throttling Causes jobs to use less bandwidth, but they
take longer to complete.
Scheduling consistency checks during off-peak Prevents DPM from interfering with regular
hours business use of protected computers.
In This Section
Using Network Bandwidth Usage Throttling
Using On-the-Wire Compression
Staggering Synchronization Start Times
Scheduling Consistency Checks
Creating Replicas Manually
See Also
Increasing Capacity
Managing Performance
233
bandwidth usage throttling is that it can lengthen the amount of time each synchronization job
takes to complete.
Network bandwidth usage throttling is configured for each protected computer. Set network
bandwidth usage throttling in terms of an absolute maximum amount of data to be transferred per
second.
Network bandwidth usage can be limited by Group Policy. The Group Policy reservable
bandwidth limit on the local computer determines the combined reservable bandwidth for all
programs that use the Packet Scheduler, including DPM. The DPM network bandwidth usage
limit determines the amount of network bandwidth that DPM can consume during replica creation,
synchronization, and consistency checks. If the DPM bandwidth usage limit, either by itself or in
combination with the limits of other programs, exceeds the Group Policy reservable bandwidth
limit, the DPM bandwidth usage limit might not be applied.
For example, if a DPM computer with a 1-gigabit-per-second (Gbps) network connection has a
Group Policy reservable bandwidth limit of 20 percent, 200 Mbps of bandwidth is reserved for all
programs that use the Packet Scheduler. If DPM bandwidth usage is then set to a maximum of
150 Mbps while Internet Information Services (IIS) bandwidth usage is set to a maximum of
100 Mbps, the combined bandwidth usage limits of DPM and IIS exceed the Group Policy
reservable bandwidth limit, and the DPM limit might not be applied.
To resolve this issue, reduce the DPM setting for network bandwidth usage throttling.
See Also
Improving Performance
Modifying Workloads
234
However, this option adds to the CPU load on both the DPM server and the protected computers.
The amount of compression and improvement on network performance depends on workload.
Compression is enabled for a protected computer and applies to replica creation,
synchronization, and consistency check operations. Recovery jobs also use compression.
See Also
Improving Performance
Modifying Workloads
235
The maximum allowed value for offset is the same as the synchronization frequency.
5. To apply your changes, click OK.
Changing the start time offsets recovery points for files by the equivalent amount of time.
You can choose between two modes of synchronization: at regular intervals or just before a
recovery point is created.
Synchronization at regular intervals distributes the load on the network throughout the day. In the
case of synchronization just before a recovery point is created, the network traffic is potentially
greater at the time of synchronization, but data is not sent throughout the day.
If an organization has limited network bandwidth between the protected computer and the DPM
server and this limited bandwidth is also expected to be shared by normal corporate usage,
consider using synchronization only before recovery point and schedule it during off-peak hours.
Although the impact on network traffic and performance is important, you must also consider how
the choice of synchronization mode affects your ability to recover data. If you synchronize only
once a day, the maximum loss window is 24 hours. However, if you choose to synchronize every
hour, your maximum loss window is 1 hour.
See Also
Improving Performance
Modifying Workloads
See Also
Improving Performance
236
Modifying Workloads
See Also
Improving Performance
Modifying Workloads
Increasing Capacity
You can also improve performance by increasing the capacity of the DPM server through
hardware upgrades:
Adding disks to the storage pool and reallocating the replicas across the storage pool can
help reduce disk queue length.
Using striped volumes can increase disk throughput to deal with disk bottlenecks.
Adding memory is a relatively inexpensive upgrade that can result in a noticeable
improvement in performance if the server frequently experiences low available memory.
Adding more processors or upgrading to faster processors can reduce CPU issues.
Also, consider your data protection requirements: you might need additional DPM servers to
balance the workload.
See Also
Improving Performance
Managing Performance
Modifying Workloads
237
Managing DPM Performance on a WAN
Performance is a serious consideration when the DPM server and the servers that it is protecting
are connected by low-speed wide area network (WAN) links, particularly for resource-intensive
jobs such as replica creation and consistency checks. For example, transferring a 20 GB volume
across a 512 Kbps link would take at least 120 hours.
In this network configuration, you should enable compression for all protection groups. For replica
creation of volumes larger than 5 GB, we recommend that you create the replica manually.
HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\TcpWindowSize\Tcp1323Opts
Example: The following settings over a 100 Mbps link with 40 ms latency, gives the following
results.
Settings
Results
238
How Protection Group Changes Affect Jobs
Changes to the configuration of a DPM protection group can result in the cancellation of some
active jobs. A change could affect replica jobs, archive jobs, or both. The following table lists the
jobs that are canceled in each category.
Job types
The following table lists how protection group changes can cause the cancelation of active jobs.
Jobs can be canceled for:
All members of the protection group ("protection group")
All data sources on the protected computer ("protected computer")
All protected computers in the same time zone as the computer hosting the data sources in
the protection group that is changed ("time zone")
Protection group changes and active jobs
Add disk-based protection Archive jobs for the protection group if tape-
based protection is configured
Remove disk-based protection Replica and archive jobs for the protection
group
Add or remove data sources Replica for the protected computer and archive
jobs for time zone
Change protected objects, including folder Replica and archive jobs for the protected
exclusion computer and time zone
Change file type exclusion Replica and archive jobs for the protection
group
Delete a protection group Replica and archive jobs for the protection
group
239
Change to protection group Job cancellations
Change the preferred server for clustered Replica and archive jobs for the protected
Exchange Server data computer and time zone
Change protection of a mounted volume to a Replica and archive jobs for the protected
different mount point computer and time zone
Stop protection and delete data on tape Archive jobs for the time zone
Stop protection and delete data on disk Replica and archive jobs for the protected
computer
Change the tape library that the protection Archive jobs for the protection group if data
group uses verification is enabled
Change the tape data verification selection Archive jobs for the protection group
Change to number of tape copies Archive jobs for the protection group
Add or remove tape-based protection Archive jobs for the protection group
Change data verification setting for tape-based Archive jobs for the protection group
protection
Change data verification setting for disk-based Replica jobs for the protection group
protection
Change compression setting for tape-based Archive jobs for the protection group
protection
Change encryption setting for tape-based Archive jobs for the protection group
protection
Change network bandwidth usage throttling Archive jobs for the protection group
setting for short-term tape-based protection
Change compression, encryption, or network Replica jobs for the protection group
bandwidth usage throttling for disk-based
protection
See Also
Managing Performance
240
Managing Tapes
Magnetic tape and similar storage media offer an inexpensive and portable form of data
protection that is particularly useful for long-term storage.
In DPM, you can back up data from a computer directly to tape. You can also back up data from
the disk-based replica. The advantage of creating your long-term backup on tape from the disk-
based replica is that the backup operation can occur at any time with no impact on the computer
being protected.
Additionally, a thorough disaster recovery plan will include offsite storage of critical information;
you want to be able to recover your organization's data, in a situation where your facility might be
damaged or destroyed. Tape is a popular medium for offsite storage.
For additional information on DPM tape management, in the DPM Operations Guide, see
Managing Tape (http://go.microsoft.com/fwlink/?LinkId=179397).
In This Section
Short Erase
How DPM Uses Stand-Alone Tape Drives
How DPM Uses Tape Libraries
Short Erase
By default, when you erase a tape by using System Center Data Protection Manager
(DPM) 2010, DPM performs a long erase. If your tape drive supports short erase, you can use
DPM to enable it to perform a short erase by following the instructions in this topic.
Important
Though short erase is much faster than long erase, it does not completely erase the data
from the tape. If you have a policy that all data from the tape must be erased and
unrecoverable, do not enable short erase.
241
How DPM Uses Stand-Alone Tape Drives
For stand-alone tape drives, DPM does the following for each protection group:
Appends all short-term backups to a single tape.
Appends all long-term backups to a single tape that is different from the short-term backup
tape.
When a tape fills up, DPM raises an alert to add a new free tape.
Short-term tape "full" option Backup jobs will require a free tape for each
scheduled job.
Short-term tape "full and incremental" option The full backup will require a free tape for each
scheduled job, and the incremental backup for
all data sources will be appended to a single
separate tape.
As tapes fill up, new free tapes will be
allocated.
When the next full backup occurs, it will require
another free tape, and subsequent incremental
backups will be appended to another free tape.
242
Example: If a full backup is scheduled weekly and incremental backups are scheduled daily, then
the first full backup will go to a new free tape and all subsequent incremental backups for six days
will be appended to another new free tape.
If a full backup job fails before it is completed, all the subsequent incremental jobs will use the
existing tape that has valid previous incremental backups.
Note
If the customer manually triggers two individual “create recovery point (tape)” actions for
two protection group members, DPM will create two tape backup jobs and will need two
tapes to store tape backup. However, if two protection group members are selected
(multi-select in Protection view) and “create recovery point (tape)” is triggered, DPM will
use a single tape. This is designed to co-locate the data for selected protection group
members for ad-hoc tape backups onto the same tape.
Note
Available free tapes will be decremented as tapes are allocated to either short-term or
long-term tape jobs. However, for short-term protection, creating a new recovery point will
succeed even when the "available free tapes = 0" because DPM will append the backup
job to the tape that is currently in use. Only long-term tape backups require a new tape
each time, and these backups will issue an alert if no tapes are available.
More Information
You cannot free or erase a tape that contains valid recovery points from any protected source.
Before you can free a tape, you must perform one of the following steps:
Remove the sources from the protection group and choose to expire recovery points on the
tape.
Change the protection group’s options and clear the tape protection options. Then, under
Inactive protection for previously protected data, right-click each data source and select
Remove inactive protection.
To restore data from an expired tape, mark the tape as free, then unmark the tape as free, and
then recatalog the tape.
243
Appendix A: Quick Reference to DPM Tasks
The following table matches administrative tasks with the object that you select to perform the
task.
Configure network bandwidth usage The protected computer on the Agents tab in
throttling the Management task area
Update, disable, enable, or uninstall a
protection agent
Lock or unlock the tape library door The tape library or stand-alone tape drive on
Rescan the tape library the Libraries tab in the Management task area
Clean a tape library drive The tape drive on the Libraries tab in the
Management task area
Run a fast or detailed inventory Any tape library, stand-alone tape drive, drive,
slot, or tape on the Libraries tab in the
Management task area
244
To perform this task Select
View the contents of a tape
Caution
It is recommended that you do not modify this class.
The following table provides a detailed description of the ms-SrvShareMapping class:
Attribute Value
objectClass Top
objectClass classSchema
instanceType 4
possSuperiors Container
possSuperiors organizationalUnit
subClassOf Top
governsID 1.2.840.113556.1.6.33.1.22
245
Attribute Value
mustContain ms-backupSrvShare
mustContain ms-productionSrvShare
rDNAttID Cn
showInAdvancedViewOnly TRUE
adminDisplayName ms-SrvShareMapping
lDAPDisplayName ms-SrvShareMapping
objectClassCategory 1
Attribute Description
ms-BackupSrv-Share Attribute
The following table provides a detailed description of the ms-BackupSrv-Share attribute:
Attribute Value
objectClass Top
objectClass attributeSchema
attributeID 1.2.840.113556.1.6.33.2.23
attributeSyntax 2.5.5.12
rangeUpper 260
isSingleValued TRUE
246
Attribute Value
showInAdvancedViewOnly TRUE
adminDisplayName ms-BackupSrv-Share
oMSyntax 64
IDAPDisplayName ms-backupSrvShare
objectCategory CN=Attribute-Schema,<SchemaContainerDN>
ms-ProductionSrv-Share Attribute
The following table provides a detailed description of the ms-ProductionSrv-Share attribute:
Attribute Value
objectClass Top
objectClass attributeSchema
attributeID 1.2.840.113556.1.6.33.2.24
attributeSyntax 2.5.5.12
rangeUpper 260
isSingleValued TRUE
showInAdvancedViewOnly TRUE
adminDisplayName ms-ProductionSrv-Share
oMSyntax 64
IDAPDisplayName ms-productionSrvShare
objectCategory CN=Attribute-Schema,<SchemaContainerDN>
247
You do not need in-depth knowledge of the entire database or the relationship between
tables and keys.
If the database structure changes in future versions of the product, the views can be updated
so that they behave the same.
For DPM installations that use a separate, dedicated computer for the SQL Server database, the
views are queried on the database computer, not the computer running DPM. This results in less
competition for resources when large numbers of views are queried over a short period of time.
The potential disadvantages of the SQL views include the following:
Because the view runs each time it is queried, server performance may be degraded if the
view is used too frequently.
The available supported views might not include all of the columns you need.
This appendix lists the views available in DPM.
Vw_DPM_Agents: Contains the list of computers on which a DPM protection agent from this
DPM server has been installed.
OccurredSince Date and time The first time this alert was
raised
248
Field Data type Description
See "Alert Types" in this
appendix
Vw_DPM_CurrentOnlineMedia: The tapes that are online in DPM owned libraries currently, as
of the last inventory.
249
Field Data type Description
1=Monthly
2=Quarterly
3=Yearly
Vw_DPM_DiskRecoveryPoints: Counts for disk recovery points available for each data source.
250
Vw_DPM_LongRecoveries: Provides historical information about recoveries that took longer
than 24 hours.
251
Field Data type Description
dismount).
MediaExpiryDate Date and time The time when all data sets on
this tape will expire.
Can have the date in the past
or NULL if the tape is free.
252
Field Data type Description
253
Field Data type Description
2=Succeeded
3=Failure
2=Succeeded
3=Failure
2=Succeeded
254
Field Data type Description
3=Failure
255
Field Data type Description
belongs
Vw_DPM_TapeRecoveryPoints: Counts for tape recovery points available for each data source.
1=LongTerm
256
Field Data type Description
time
257
Field Data type Description
2=Succeeded
3=Failure
Alert Types
-1 RestoreDBAlert
0 NullType
1 AgentIncompatibleAlert
258
2 AgentUnreachableAlert
5 MediaVerificationFailedAlert
6 MediaEraseFailedAlert
7 DetailedInventoryFailedAlert
8 MediaDecommissionedAlert
9 MediaDataEraseAlert
10 FreeMediaThresholdAlert
11 DataSetCopyFailedAlert
12 BackupToTapeFailedAlert
13 BackupToTapeCatalogFailedAlert
14 LibraryDriveAlert
15 LibraryNotAvailableAlert
16 LibraryNotWorkingEfficientlyAlert
17 MediaRequiredAlert
18 ReplicaInitializationInProgressAlert
19 SynchronizationFailedAlert
20 StopProtectionFailedAlert
21 RecoveryInProgressAlert
22 RecoveryPartiallySuccessfulAlert
23 RecoverySuccessfulAlert
24 RecoveryFailedAlert
25 ShadowCopyFailedAlert
26 ReplicaInMissingStateAlert
27 ReplicaInInvalidStateAlert
28 PartialDeployedClusterAlert
29 AgentTaskFailAlert
30 SqmOptInAlert
31 DiskThresholdCrossedAlert
32 VerificationInProgressAlert
259
33 DiskMissingAlert
34 CatalogThresholdCrossedAlert
35 DatasetDataVerificationFailed
36 SCDiskThresholdCrossedAlert
37 ConfigureProtectionFailedAlert
38 ReplicaManualLoadPendingAlert
39 ReplicaInitializationPendingAlert
40 CertificateExpiringAlert
41 EvalShareInquiryAlert
42 ShadowCopyConsolidationRequired
Warning
Editing the registry can produce unexpected results. Use extreme caution when changing
registry values.
Inbox Tracing
Value Name Value Allowed Values Notes/Remarks
Type
TRACE_ERROR =
0x2,
260
Value Name Value Allowed Values Notes/Remarks
Type
TRACE_DBG_ACTIVI
TY = 0x4,
TRACE_DBG_
= 0x8,
TRACE_PERF =
0x20,
TRACE_DBG_FATAL
= 0x200,
TRACE_DBG_CRITIC
AL = 0x400
};
261
Value Name Value Allowed Values Notes/Remarks
Type
save more files. extension .crash
On a critical error
logged by any
component, logs
will be saved.
Base Key:
HKLM\Software\Microsoft\Microsoft Data
Protection Manager
DPM UI DPMUI
HKCU\Software\Microsoft\Microsoft Data
Protection Manager
262
Process Binary Name
Custom Actions
For a list of custom actions that are checked during DPM Setup, see DPM Setup Custom Action
Details (http://go.microsoft.com/fwlink/?LinkId=189203). These checks are part of the DPM 2010
certification for the Windows Server logo program.
The following table lists the custom actions that are performed for the DPM Installer (.msi) files.
263
MSI Custom Action
Msdpm.msi InstallDPMFilter.
Dpmra.msi
Msdpm.msi SetRebootRequired.
Dpmra.msi
The following is a list of third-party binaries installed by DPM that do not have publisher
information for test case 2.8.2 for DPM certification for the Windows Server logo program.
Third-party binaries
c:\Program Files\Microsoft
DPM\SQL\90\DTS\Binn\Microsoft.SqlServer.ForEachFileEnumeratorWrap.dll
c:\Program Files\Microsoft
DPM\SQL\90\DTS\Binn\Microsoft.SQLServer.msxml6_interop.dll
264
Third-party binaries
c:\Program Files\Microsoft
DPM\SQL\90\DTS\Binn\Microsoft.SqlServer.SQLTaskConnectionsWrap.dll
265
266