Planning A System Center Data Protection Manager 2010 Deployment
Planning A System Center Data Protection Manager 2010 Deployment
Manager 2010 Deployment
Microsoft Corporation
Published: July 2010
Feedback
Send suggestions and comments about this document to [email protected].
This document is provided “as-is”. Information and views expressed in this document, including
URL and other Internet Web site references, may change without notice. You bear the risk of
using it.
Some examples depicted herein are provided for illustration only and are fictitious. No real
association or connection is intended or should be inferred.
This document does not provide you with any legal rights to any intellectual property in any
Microsoft product. You may copy and use this document for your internal, reference purposes.
You may modify this document for your internal, reference purposes.
© 2010 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, SQL Server, Windows, Windows PowerShell, Windows
Server, and Windows Vista are trademarks of the Microsoft group of companies.
All other trademarks are property of their respective owners.
Contents
Planning a DPM 2010 Deployment................................................................................................. 8
In This Section............................................................................................................................. 8
DPM Features................................................................................................................................. 8
In This Section............................................................................................................................. 9
See Also...................................................................................................................................... 9
Management Tools........................................................................................................................ 15
DPM Administrator Console...................................................................................................... 15
Reports and Notifications.......................................................................................................... 16
DPM Management Packs.......................................................................................................... 16
Windows PowerShell Integration............................................................................................... 17
Remote Administration.............................................................................................................. 17
End-User Recovery................................................................................................................... 17
See Also.................................................................................................................................... 17
Recovery Process......................................................................................................................... 23
See Also.................................................................................................................................... 24
Protection Policy........................................................................................................................... 24
See Also.................................................................................................................................... 25
System Requirements................................................................................................................... 26
DPM Licensing.............................................................................................................................. 26
Application Data............................................................................................................................ 33
See Also.................................................................................................................................... 34
Clustered Resources.................................................................................................................... 34
See Also.................................................................................................................................... 34
System State................................................................................................................................ 35
Workstation and Member Server System State.........................................................................35
Domain Controller System State...............................................................................................35
Certificate Services System State............................................................................................. 35
Cluster Server System State..................................................................................................... 35
See Also.................................................................................................................................... 35
Security Considerations................................................................................................................ 66
In This Section........................................................................................................................... 66
See Also.................................................................................................................................... 66
Configuring Firewalls.................................................................................................................... 67
Protocols and Ports................................................................................................................... 67
Windows Firewall....................................................................................................................... 69
See Also.................................................................................................................................... 69
In This Section
Introducing Data Protection Manager 2010
Planning Protection Groups
Planning for DPM Deployment
Deployment Plan Checklist and Roadmap
In This Section
DPM Features
How DPM Works
System Requirements
DPM Licensing
DPM Features
Data protection is essential to a business or organization, and Microsoft System Center Data
Protection Manager (DPM) 2010 is an effective solution for providing that protection.
DPM 2010 includes the following features:
Disk-based data protection and recovery.
Command-line scripting using Windows PowerShell.
Enterprise deployment methods for distributing the System Center Data Protection Manager
agent.
Enterprise monitoring with Microsoft System Center Operations Manager.
Tape-based backup and archive solutions.
8
Disaster recovery solutions, which provides bare-metal recovery of servers and desktops
running Windows.
You can back up the DPM database to tape, or you can use a second DPM server in a
geographically separated location to protect the primary DPM server.
If you use a second DPM server, you can restore data to protected computers directly from the
secondary DPM server. The secondary DPM server can also protect computers until the primary
DPM server is brought back online.
DPM provides protection of the following items:
File data from volumes, shares, and folders.
Application data, such as Microsoft Exchange Server storage groups, Microsoft SQL
Server databases, Windows SharePoint Services farms, and Microsoft Virtual Server and
its virtual machines.
Files for workstations running Windows XP Professional SP2 and all Windows Vista
editions except Home.
Files and application data on clustered servers.
System state for protected file and application servers.
In This Section
Backup Solutions Combining Disk and Tape
Protection for Multiple Data Types
Protection for Clustered Servers
Management Tools
See Also
How DPM Works
9
To determine which storage method to use, you must consider the relative importance of your
organization's protection requirements.
How much data your organization can afford to lose. Realistically, not all data is equally
valuable. Organizations must weigh the impact of loss against the costs of protection.
How quickly recovered data must be available. Recovery of data that is critical to ongoing
operations is typically more urgent than routine data. On the other hand, organizations should
identify servers providing essential services during working hours that must not be disrupted
by recovery operations.
How long your organization must maintain data. Long-term storage might be necessary
for business operations, depending on the type and contents of the data. An organization
might also be subject to legal requirements for data retention, such as the Sarbanes-Oxley
Act and the Data Retention Directive.
How much your organization can spend on data protection. When considering how much
to invest in data protection, organizations must include the cost of hardware and media, as
well as the personnel costs for administration, management, and support.
You can use DPM to back up data to both disk and tape, giving you the flexibility to create
focused, detailed backup strategies that result in efficient and economic data protection. When
you need to restore a single file or an entire server, recovery is fast and simple: you identify the
data, and DPM locates the data and retrieves it (although your assistance might be needed if the
tape has been removed from the library).
10
Disk-Based Protection and Recovery
One advantage of disk-based data protection is the potential time savings. Disk-based data
protection requires none of the preparation time that tape-based protection does—locating the
specific tape required for a job, loading the tape, positioning the tape to the correct starting point.
The ease of using a disk encourages sending incremental data more frequently, which reduces
the impact on the computer being protected and on network resources.
Data recovery with disk-based data protection is more reliable than that of tape-based systems.
Disk drives typically have a much greater mean time between failure (MTBF) rating than tapes.
Recovery of data from disk is quicker and easier than recovery from tape. Recovering data from
disk is a simple matter of browsing through previous versions of the data on the DPM server and
copying selected versions directly to the protected computer. A typical file recovery from tape
takes hours and can be costly, and administrators in a medium-size data center can usually
expect to perform 10 to 20 or more of these recoveries each month.
Using DPM and disk-based data protection, data can be synchronized as frequently as every 15
minutes and maintained as long as 448 days.
See Also
Management Tools
Protection for Clustered Servers
Protection for Multiple Data Types
11
Protection for Multiple Data Types
The following table lists the types of data that DPM can protect and the level of data that you can
recover by using DPM.
Note
For information about the specific software requirements for protected computers, see
DPM System Requirements (http://go.microsoft.com/fwlink/?LinkId=108683).
Protectable and Recoverable Data
12
running on virtual machines1 on virtual machines1
Hyper-V Hyper-V computers Item-level recovery of:
Cluster shared volumes Files and folders
Volumes
Virtual Hard Drive (VHD)
All computers that can be System state System state
protected by DPM 2010
except computers running
Windows Vista
Client computers Windows XP Service Pack 2 File data
(SP2) and later.
Windows Vista or Windows Note
Vista Service Pack 1 (SP1). Recovery from
Windows 7 Client previous versions of
files and folders is
not enabled on
Windows XP
computers.
1
Data for applications running in virtual machines must be protected and recovered as an
application data source, not as a component of a protected virtual machine. For example, to
protect and recover data for an instance of SQL Server running on a virtual machine, you install
the DPM protection agent on the virtual machine and select the data source as a SQL Server
database. When you install the protection agent on the virtual host and protect a virtual machine
on the host, application data is also protected but can be recovered only by recovering the virtual
machine itself.
See Also
Managing Protected File Servers and Workstations
Managing Protected Servers Running Exchange
Managing Protected Servers Running SQL Server
Managing Protected Servers Running Windows SharePoint Services
Managing Protected Virtual Servers
13
Unsupported - General
The following is a list of data sources not supported by DPM.
Recycle Bin
System Volume Information folder
Non-NTFS volumes
DFS Links
CD-ROM
Quorum Disk (for clusters)
Removable Media
14
On planned failover, DPM continues protection. On unplanned failover, DPM issues an alert that a
consistency check is required.
See Also
Protection for Multiple Data Types
Management Tools
To facilitate the performance of key management tasks, DPM provides the following tools and
capabilities for IT administrators:
DPM Administrator Console
Reports and notifications
DPM Management Packs
Windows PowerShell integration
Remote administration
End-user recovery
15
Reports and Notifications
DPM provides a comprehensive set of reports that provide data about protection success and
failures, recovery success and failures, and disk and tape utilization. You can also identify
common errors and manage circulation of tapes. Summary reports aggregate information for all
protected computers and protection groups. Detailed reports provide information about individual
computers or protection groups. An administrator can use these reports to fine-tune protection
after the initial DPM deployment.
DPM notifications provide a convenient way to stay informed when critical, warning, or
informational alerts are generated. You choose the severity of alert that you want to be notified
about; for example, you can choose to receive only critical alerts. You can also choose to receive
notifications of the status of recovery jobs, and you can have scheduled DPM reports delivered as
e-mail attachments so that you can monitor data protection trends and analyze data protection
statistics at your convenience. You can also use the DPM Management Pack for System Center
Operations Manager to provide customized notifications.
For details about the reports available in DPM, see Managing DPM Servers
(http://go.microsoft.com/fwlink/?LinkId=187199). For instructions on subscribing to notifications,
see DPM 2010 Help (http://go.microsoft.com/fwlink/?LinkId=196749).
16
To manage tapes and disks
To manage protection groups
To protect and recover data
In addition, DPM cmdlets enable administrators to perform the following tasks, which cannot be
performed by using DPM Administrator Console:
To remove recovery points
To customize the start time for library maintenance jobs, such as detailed inventory and
cleaning
To specify the local area network (LAN) configuration to be used for a backup job
Remote Administration
You can establish a Remote Desktop connection to a DPM server to manage DPM operations
remotely.
DPM Management Shell can be installed on computers other than the DPM server, enabling you
to administer multiple DPM servers remotely. You can also install DPM Management Shell on
desktop computers running Windows XP or Windows Vista.
End-User Recovery
Microsoft System Center Data Protection Manager (DPM) 2010 allows you to protect your data
on client computers. Client computers include desktop computers that are connected to the
network, and laptop and notebook computers that are intermittently connected to your corporate
environment. Backup administrators can centrally configure data protection for the client
computers in their environment using the Data Protection Manager Client. Additionally,
administrators can give their end users the ability to define and manage their own backups.
DPM 2010 enables end users to perform their own recoveries by leveraging the Previous
Versions feature in Windows.
See Also
Protection for Clustered Servers
Protection for Multiple Data Types
In This Section
Disk-Based Protection Process
17
Tape-Based Protection Process
Recovery Process
Protection Policy
Auto Discovery Process
DPM Directory Structure
Whether you are protecting file data or application data, protection begins with the creation of the
replica of the data source.
The replica is synchronized, or updated, at regular intervals according to the settings that you
configure. The method that DPM uses to synchronize the replica depends on the type of data
being protected. For more information, see The File Data Synchronization Process and The
Application Data Synchronization Process. If a replica is identified as being inconsistent, DPM
performs a consistency check, which is a block-by-block verification of the replica against the
data source.
A simple example of a protection configuration consists of a DPM server and a protected
computer. The computer is protected when you install a DPM protection agent on the computer
and add its data to a protection group.
Protection agents track changes to protected data and transfer the changes to the DPM server.
The protection agent also identifies data on a computer that can be protected and is involved in
the recovery process. You must install a protection agent on each computer that you want to
protect by using DPM. Protection agents can be installed by DPM or you can install protection
agents manually using applications such as Systems Management Server (SMS).
Protection groups are used to manage the protection of data sources on computers. A protection
group is a collection of data sources that share the same protection configuration. The protection
configuration is the collection of settings that are common to a protection group, such as the
protection group name, protection policy, disk allocations, and replica creation method.
DPM stores a separate replica for each protection group member in the storage pool. A protection
group member can be any of the following data sources:
A volume, share, or folder on a desktop computer, file server, or server cluster
18
A storage group on an Exchange server or server cluster
A database of an instance of SQL Server or server cluster
See Also
The Application Data Synchronization Process
The Difference Between File Data and Application Data
The File Data Synchronization Process
If a replica becomes inconsistent with its data source, DPM generates an alert that specifies
which computer and which data sources are affected. To resolve the problem, the administrator
repairs the replica by initiating a synchronization with consistency check, also known as simply a
consistency check, on the replica. During a consistency check, DPM performs a block-by-block
verification and repairs the replica to bring it back into consistency with the data source.
You can schedule a daily consistency check for protection groups or initiate a consistency check
manually.
At regular intervals that you can configure, DPM creates a recovery point for the protection group
member. A recovery point is a version of the data from which data can be recovered. For files, a
recovery point consists of a shadow copy of the replica, which is created by using the Volume
Shadow Copy Service (VSS) functionality of the operating system on the DPM server.
See Also
The Application Data Synchronization Process
The Difference Between File Data and Application Data
19
Disk-Based Protection Process
20
check on the replica. During a consistency check, DPM performs a block-by-block verification and
repairs the replica to bring it back into consistency with the data sources.
You can schedule a daily consistency check for protection groups or initiate a consistency check
manually.
See Also
The Difference Between File Data and Application Data
Disk-Based Protection Process
The File Data Synchronization Process
See Also
The Application Data Synchronization Process
Disk-Based Protection Process
The File Data Synchronization Process
21
Tape-Based Protection Process
When you use short-term disk-based protection and long-term tape-based protection, DPM can
back up data from the replica volume to tape so that there is no impact on the protected
computer. When you use tape-based protection only, DPM backs up the data directly from the
protected computer to tape.
DPM protects data on tape through a combination of full and incremental backups from either the
protected data source (for short-term protection on tape or for long-term protection on tape when
DPM does not protect the data on disk) or from the DPM replica (for long-term protection on tape
when short-term protection is on disk).
Note
If a file was open when the replica was last synchronized, the backup of that file from the
replica will be in a crash consistent state. A crash consistent state of the file will contain
all data of the file that was persisted to disk at the time of last synchronization. This
applies only to file system backups. Application backups will always be consistent with
the application state.
For specific backup types and schedules, see Planning Protection Groups.
See Also
How DPM Works
Disk-Based Protection Process
Recovery Process
The method of data protection, disk-based or tape-based, makes no difference to the recovery
task. You select the recovery point of data that you want to recover, and DPM recovers the data
to the protected computer.
DPM can store a maximum of 64 recovery points for each file member of a protection group. For
application data sources, DPM can store up to 448 express full backups and up to 96 incremental
backups for each express full backup. When storage area limits have been reached and the
retention range for the existing recovery points is not met yet, protection jobs will fail.
Note
To support end-user recovery, the recovery points for files are limited to 64 by Volume
Shadow Copy Service (VSS).
As explained in The File Data Synchronization Process and The Application Data Synchronization
Process, the process for creating recovery points differs between file data and application data.
DPM creates recovery points for file data by taking a shadow copy of the replica on a schedule
22
that you configure. For application data, each synchronization and express full backup creates a
recovery point.
The following illustration shows how each protection group member is associated with its own
replica volume and recovery point volume.
Protection Group Members, Replicas, and Recovery Points
Administrators recover data from available recovery points by using the Recovery Wizard in DPM
Administrator Console. When you select a data source and point in time from which to recover,
DPM notifies you if the data is on tape, whether the tape is online or offline, and which tapes are
needed to complete the recovery.
DPM gives administrators the ability to enable their end users to perform their own recoveries by
leveraging the Previous Versions feature in Windows. If you do not want to provide this capability
to your end users, you recover the data for desktop computers using the using the Recovery
Wizard.
See Also
The Application Data Synchronization Process
The File Data Synchronization Process
Protection Policy
DPM configures the protection policy, or schedule of jobs, for each protection group based on the
recovery goals that you specify for that protection group. Examples of recovery goals are as
follows:
“Lose no more than 1 hour of production data”
23
“Provide me with a retention range of 30 days”
“Make data available for recovery for 7 years”
Your recovery goals quantify your organization's data protection requirements. In DPM, the
recovery goals are defined by retention range, data loss tolerance, recovery point schedule, and,
for database applications, the express full backup schedule.
The retention range is how long you need the backed-up data available. For example, do you
need data from today to be available a week from now? Two weeks from now? A year from now?
Data loss tolerance is the maximum amount of data loss, measured in time, that is acceptable to
business requirements, and it will determine how often DPM should synchronize with the
protected server by collecting data changes from the protected server. You can change the
synchronization frequency to any interval between 15 minutes and 24 hours. You can also select
to synchronize just before a recovery point is created, rather than on a specified time schedule.
The recovery point schedule establishes how many recovery points of this protection group
should be created. For file protection, you select the days and times for which you want recovery
points created. For data protection of applications that support incremental backups, the
synchronization frequency determines the recovery point schedule. For data protection of
applications that do not support incremental backups, the express full backup schedule
determines the recovery point schedule.
Note
When you create a protection group, DPM identifies the type of data being protected and
offers only the protection options available for the data.
See Also
How DPM Works
See Also
How DPM Works
24
DPM Directory Structure
When you begin protecting data with DPM, you will notice that the installation path of DPM
contains three folders in the Volumes directory:
\Microsoft DPM\DPM\Volumes\DiffArea
\Microsoft DPM\DPM\Volumes\Replica
\Microsoft DPM\DPM\Volumes\ShadowCopy
The DiffArea folder contains mounted shadow copy volumes that store the recovery points for a
data source.
The Replica folder contains mounted replica volumes.
The ShadowCopy folder contains local backup copies of the DPM database. In addition, when
you use DPMBackup.exe to create backup shadow copies of the replicas for archive by third-
party backup software, the backup shadow copies are stored in the ShadowCopy folder.
See Also
How DPM Works
System Requirements
To review the hardware and software requirements for DPM 2010 and protected computers, see
DPM 2010 System Requirements (http://go.microsoft.com/fwlink/?LinkID=179661).
DPM Licensing
You use a single license for each computer protected by DPM. License type correlates to the type
of data being protected.
DPM has two license types: standard and enterprise. The standard license entitles you to protect
volumes, shares, and folders, as well as computer system state. The enterprise license entitles
you to protect application data, such as mailboxes and databases on an Exchange Server, in
addition to files. On a server cluster, DPM installs an agent on each node of the cluster. A license
is used for each server node.
The following table lists the license applied for each data type.
DPM Licenses Used for Data Types
25
System state Enterprise
SQL Server (A DPM protection agent on a Enterprise
computer running SQL Server entitles you to
protect databases for all SQL instances on that
computer.)
Exchange Server Enterprise
Windows SharePoint Services (On a Windows Enterprise
SharePoint Services farm, a license is used for
each back-end server and one license is used
for the front-end Web server.)
Virtual Server (On a computer running Virtual Enterprise
Server, a single protection agent installed on
the computer enables you to protect any
number of virtual machines, or guests, on the
host computer. To protect specific application
data within a virtual machine, such as to
protect the databases for an instance of SQL
Server running on a virtual machine, you must
install a protection agent directly to the virtual
machine. When you protect data on a virtual
machine that has a protection agent installed,
the appropriate license is used for the type of
data being protected.)
Another DPM server Enterprise
Data for bare metal recovery using DPM Enterprise
System Recovery Tool
You do not use a license when you install a protection agent on a computer. The license is
applied only when data on a computer is added to a protection group. When you are no longer
protecting any data on a specific computer, you can reuse that license on another computer.
When the type of data being protected changes, DPM automatically updates the license usage.
For example, you are protecting an Exchange storage group and files on a single server, so you
have used an enterprise license to protect that server. Later, you stop protection of the Exchange
storage group. Because DPM is now protecting file data only on that server, your license use will
change to a standard license.
In a situation where you have only enterprise licenses available and you need to protect file data
on a new computer, an enterprise license can be used. For example, you have three standard
licenses and three enterprise licenses. You are protecting file data on three computers. You add
file data from a fourth computer to a protection group. Because all standard licenses have been
used already, DPM will apply an enterprise license.
During DPM installation, you enter the number of licenses that you have purchased. After
installation, to update the license information, in the Protection task area of DPM Administrator
Console, in the Actions pane, click View DPM licenses, and then change the number of
purchased licenses as appropriate.
26
You can purchase additional DPM licenses through the Microsoft Partner Network
(http://go.microsoft.com/fwlink/?LinkId=71663).
In This Section
What Do You Want to Protect?
What Are Your Goals for Recovery?
Planning Protection Configurations
27
Windows SharePoint Services 3.0 and Microsoft Office SharePoint Server 2007, at the level
of farms
Microsoft Virtual Server 2005 R2 SP1 host and guest configurations
System state
See Also
Application Data
Clustered Resources
File Data on Servers and Workstations
System State
Important
Although volumes on file servers are typically formatted as NTFS, which is required for
DPM protection, it is not uncommon for volumes on workstations to be formatted as FAT
or FAT32. To protect these volumes, you must convert them to NTFS. For instructions,
see How to Convert FAT Disks to NTFS (http://go.microsoft.com/fwlink/?LinkId=83022).
See Also
File and Folder Exclusion
Protecting Data in DFS Namespaces
Unsupported Data Types
What Do You Want to Protect?
28
File and Folder Exclusion
You can configure data protection to exclude specified folders and also file types by file name
extension.
When you select a volume or share for protection, you automatically select all protectable child
items in that volume or share, as shown in the following illustration.
All Child Items Automatically Selected
To exclude a folder from protection, you ensure that the parent of the folder that you do not want
protected is selected, and then you clear the check box of the folder that you do not want
protected, as shown in the following illustration.
Folder Excluded from Protection
When you finish selecting the members for your protection group, you can view the excluded
folders, as shown in the following illustration.
View Excluded Folders
29
You can also specify file name extensions to exclude from protection at the protection group level.
For example, a file server might contain music files or personal files that the business does not
want to use disk space or network bandwidth protecting. Exclusion by file name extension applies
to all members of the protection group.
The following illustration shows how to exclude files from protection by file name extension.
Exclusion by File Name Extension
See Also
Protecting Data in DFS Namespaces
30
Unsupported Data Types
When end-user recovery is enabled for a protected target, users can access previous versions of
files through the DFS Namespaces hierarchy. When end users attempt to access previous
versions of files on a share that has multiple targets, DPM transparently directs them to the
protected target.
See Also
File and Folder Exclusion
Unsupported Data Types
31
If DPM detects any of the following unsupported data types in a protected data source, the
affected data is not protected:
Hard links
Reparse points, including DFS links and junction points
Important
A protection group can contain data with mount points. When mount points are
included in a protection group, DPM protects the mounted volume that is the target of
the mount point, but it does not protect the mount point metadata. When you recover
data that contains mount points, you must manually re-create your mount point
hierarchy. DPM does not support protection of mounted volumes within mounted
volumes.
Recycle Bin
Paging files
System Volume Information folder
Note
The System Volume Information folder cannot be protected as a file data source. To
protect system information for a computer, you must select the computer's system
state as the protection group member in the Create New Protection Group Wizard.
Volumes that are not formatted with NTFS
If a file contains hard links or symbolic links from Windows Vista, DPM cannot replicate or recover
the files.
DPM cannot protect files that have any of the following combinations of file attributes:
Encryption and reparse
Encryption and Single Instance Storage (SIS)
Encryption and case sensitivity
Encryption and sparse
Case sensitivity and SIS
Sparse and reparse
Compression and SIS
See Also
File and Folder Exclusion
Protecting Data in DFS Namespaces
Application Data
You can use DPM to protect the following types of application data:
32
Exchange Server Storage Groups. DPM can protect storage groups for Microsoft Exchange
Server 2003 SP2 and Exchange Server 2007.
You cannot exclude from protection any database in the selected storage group.
All storage groups on a computer running Exchange Server 2003 must be members of
the same protection group or protection of these storage groups will fail.
You should disable circular logging for protected storage groups.
SQL Server Databases. DPM can protect databases for Microsoft SQL Server 2000 SP4,
SQL Server 2005 SP1, and SQL Server 2005 SP2.
Each database in an instance of SQL Server can belong to the same or a different
protection group.
You cannot exclude from protection any data in the selected database.
DPM does not support incremental backups for the following databases:
SQL Server 2000 and SQL Server 2005 master databases
SQL Server 2000 msdb database
SQL Server 2000 model database
Windows SharePoint Services Data. DPM can protect server farms for servers running
Windows SharePoint Services 3.0 or Office SharePoint Server 2007.
You cannot exclude from protection any data in the selected farm.
Virtual Server and Virtual Machines. DPM can protect a Virtual Server host (a computer
running Virtual Server 2005 R2 SP1) and the guests, or virtual machines, running in the
context of that host.
In addition, DPM can protect the data of applications running in the guest. However, data for
applications running on virtual machines must be protected and recovered as an application data
source, not as a component of a protected virtual machine. For example, to protect and recover
data for an instance of SQL Server running on a virtual machine, you select the data source as a
SQL Server database. When you protect a virtual machine, application data is also protected, but
it can be recovered only by recovering the virtual machine itself.
See Also
Clustered Resources
File Data on Servers and Workstations
System State
Clustered Resources
DPM can protect shared disk clusters for the following:
File servers
SQL Server 2000 with Service Pack 4 (SP4)
SQL Server 2005 with Service Pack 1 (SP1)
33
Exchange Server 2003 with Service Pack 2 (SP2)
Exchange Server 2007
DPM can protect non-shared disk clusters for Exchange Server 2007 (cluster continuous
replication). DPM can also protect Exchange Server 2007 configured for local continuous
replication.
See Also
Application Data
File Data on Servers and Workstations
System State
System State
DPM can protect the system state for any computer on which a DPM protection agent can be
installed, except computers running Windows Vista or Windows Server 2008.
34
Cluster Server System State
When DPM backs up the system state of a cluster server, the cluster service metadata is
protected in addition to the member server system state components.
See Also
Application Data
Clustered Resources
File Data on Servers and Workstations
See Also
Planning Protection Configurations
Recovery Goals for Disk-Based Protection
35
Recovery Goals for Tape-Based Protection
What Do You Want to Protect?
37
Note
You can modify the express full backup schedule for any protection group that contains
application data by using the Optimize performance action in the Protection task area
or by using the Modify Group Wizard.
See Also
Recovery Goals for Tape-Based Protection
Note
You can select disk or tape for short-term protection, but not both.
See Also
Recovery Goals for Disk-Based Protection
39
In This Section
Selecting Protection Group Members
Selecting a Data Protection Method
Defining Recovery Goals
Allocating Space for Protection Groups
Specifying Tape and Library Details
Choosing a Replica Creation Method
See Also
What Are Your Goals for Recovery?
What Do You Want to Protect?
41
How Important Is the Protection Group
Membership Decision?
Protection group members cannot be moved between protection groups. If you decide later that a
protection group member needs to be in a different protection group, you must remove the
member from its protection group and then add it to a different protection group.
If you determine that the members of a protection group no longer require protection, you can
stop protection of the protection group. When you stop protection, your options are to retain
protected data or to delete protected data.
Retain protected data option: Retains the replica on disk with associated recovery points
and tapes for the specified retention range.
Delete protected data option: Deletes the replica on disk and expires data on the tapes.
See Also
Planning Protection Configurations
42
intervention, such
as changing tapes.
Tape-based Can be stored Slower and more When data loss
protection only offsite for security cumbersome tolerance is
and as a recovery process. more generous.
contingency for Prone to errors. When recovery
disaster recovery. time objective is
Easy to increase generous.
capacity by adding For data that
more tapes. does not change
frequently and
does not require
backup as
frequently.
For lengthy
retention period.
Both disk-based and Combined
tape-based advantages of
protection above, while
balancing out each
method's
disadvantages.
A single point of
management.
See Also
Planning Protection Configurations
43
When a SQL server is configured to use the Simple Recovery Model or is the primary server in a
log shipping pair, the recovery points for any protected databases on that server are created
according to the schedule for express full backups.
The following topics in this section provide detailed information to help you plan your recovery
goals:
Recovery Goal Options for Each Protection Method
Recovery Point Schedules for Long-Term Protection
Scheduling Options for Long-Term Protection
Customizing Recovery Goals for Long-Term Protection
See Also
Planning Protection Configurations
44
However, DPM
reserves 64 recovery
points, so you can
only select up to 448
recovery points for
applications. This is
because DPM
assumes that file
protection could use
the same volume as
the applications you
are protection, so the
VSS shadow copies
apply to the same
volume. Therefore,
448 + 64 = 512
(which is the VSS
shadow copy
maximum per
volume).
Short-term on tape 1–12 weeks Select to back up: Instead of recovery
Every day points, you configure
one of the following
Every week backup types:
Every two weeks Full and
incremental
backups
Only full backup
When you select weekly
or every two weeks,
only full backup is
available. You specify
the day and time.
When you select daily
full backups, you
specify the time.
When you select daily
full and incremental,
you specify the day and
time for the full backup
and for the incremental
backup.
Long-term on tape Minimum: 1 week Select to back up: See Recovery Point
Maximum: 99 years Daily Schedules for Long-
Term Protection and
Weekly Customizing Recovery
Biweekly Goals for Long-Term
Monthly Protection.
45
Quarterly
Half-yearly
Yearly
See Also
Defining Recovery Goals
46
1 full backup each month after the initial 4
weeks, until the 12th month
1 full backup each year after the initial 11
months
Monthly, 1–11 months Full backup monthly
Monthly, 1–99 years 1 full backup each month, until the 12th month
1 full backup each year after the initial 11
months
Quarterly, 1–99 years 1 full backup every 3 months until the 12th
month
1 full backup each year after the initial 11
months
Half-yearly, 1–99 years 1 full backup every 6 months until the 12th
month
1 full backup each year after the initial 11
months
Yearly, 1–99 years Full backup yearly
See Also
Defining Recovery Goals
47
backup
Biweekly Time and day of week for biweekly backup
Specific day or day of week and time for
monthly backup
Specific day or date and time for yearly
backup
Monthly Specific day or day of week and time for
monthly backup
Specific day or date and time for yearly
backup
Quarterly Time and date for quarterly backup
(Quarterly backups are performed in
January, April, July, and October on the
specified day of the month.)
Specific day or date and time for yearly
backup
Half-yearly Time, specific day or date, and months for
half-yearly backup
Specific day or date and time for yearly
backup
Yearly Specific day or date and time for yearly
backup
See Also
Defining Recovery Goals
See Also
Planning Protection Configurations
49
For system state:
(Data source size x 3) / 2
Recovery point volume For files: DPM storage pool or custom
(Data source size x volume
retention range in days x
2) / 100 + 1600 MB
For Exchange data:
4.0 x retention range in
days x log change x data
source size + 1600 MB
For SQL Server data:
2.5 x retention range in
days x log change x data
source size + 1600 MB
For Windows SharePoint
Services data:
1.5 x retention range in
days x log change x total
size of all databases +
1600 MB
For Virtual Server data:
(Data source size x
retention range in days x
0.02) + 1600 MB
For system state:
(Data source size x
retention range in days
x 2) / 100 + 1600 MB
Change journal (for file 300 MB Protected volume on the file
protection only) server or workstation
50
formula to the actual size of the selected data source, click the Calculate link. DPM will
determine the size of the data source and recalculate the disk allocation for the recovery point
and replica volumes for that data source. This operation can take several minutes to perform.
We recommend that you accept the default space allocations unless you are certain that they do
not meet your needs. Overriding the default allocations can result in allocation of too little or too
much space.
Allocation of too little space for the recovery points can prevent DPM from storing enough
recovery points to meet your retention range objectives. Allocation of too much space wastes disk
capacity.
If, after you have created a protection group, you discover that you have allocated too little space
for a data source in the protection group, you can increase the allocations for the replica and
recovery point volumes for each data source.
If you discover that you have allocated too much space for the protection group, the only way to
decrease allocations for a data source is to remove the data source from the protection group,
delete the replica, and then add the data source back to the protection group with smaller
allocations.
To help you estimate your storage space needs, download the DPM storage calculator
(http://go.microsoft.com/fwlink/?LinkId=104370).
See Also
Planning Protection Configurations
51
Note
To enable encryption, a valid encryption certificate must be available on the DPM
server. For instructions, see How to Encrypt Data in a Protection Group
(http://go.microsoft.com/fwlink/?LinkId=196750) in DPM Help.
See Also
Planning Protection Configurations
Important
If you are deploying DPM to protect data over a WAN and your protection group includes
more than 5 GB of data, we recommend that you choose the manual method for creating
the replicas.
52
Automatic Replica Creation
For large replica creation jobs, you might want to schedule the job to run only during periods of
light network traffic.
See Also
Planning Protection Configurations
In This Section
Planning the DPM Server Configurations
End-User Recovery Considerations
Security Considerations
53
See Also
Planning Protection Groups
In This Section
Selecting the Number of DPM Servers
Locating the DPM Servers
Selecting the Instance of SQL Server
Planning the Storage Pool
Planning the Tape Libraries Configuration
See Also
End-User Recovery Considerations
Security Considerations
54
Selecting the Number of DPM Servers
As you consider the number of DPM servers that your organization requires, keep in mind that
there is no precise formula for determining the number of DPM servers. In practice, the number of
servers and amount of data that a single DPM server can protect varies based on the following
factors:
Change rate of the data sources to be protected
The amount of space available in the storage pool
How often the data will be synchronized
Available bandwidth at each protected computer
Aggregate bandwidth on the DPM server
To get an estimate of your data change rate, you can review an incremental backup for a recent,
average day. The percentage of your data included in an incremental backup is usually indicative
of your data change rate. For example, if you have a total of 100 GB of data and your incremental
backup is 10 GB; your data change rate is likely to be approximately 10 percent per day.
However, because the method that DPM uses to record changes to data is different from that of
most backup software, incremental backup size is not always a precise indicator of data change
rate. To refine your estimate of your data change rate, consider the characteristics of the data you
want to protect.
For example, while most backup software records data changes at the file level, DPM records
changes at the byte level. Depending on the type of data that you want to protect, this can
translate to a data change rate that is lower than the incremental backup might suggest.
The following table lists the data source limits that a DPM server that meets the minimum
hardware requirements can protect and the recommended disk space required per DPM server.
Note
For better performance, we recommend that you install DPM on a 64-bit computer.
55
spread across approximately
75 servers and 150 client
computers.
Snapshot Limit
A DPM server can store up to 9,000 disk-based snapshots on both 32-bit and 64-bit computers,
including those retained when you stop protection of a data source. The snapshot limit applies to
express full backups and file recovery points, but not to incremental synchronizations.
The snapshot limit applies per DPM server, regardless of storage pool size. When you configure
protection groups, the DPM server is provisioned for the number of snapshots to accommodate
the protection group configuration. You can use the following cmdlet in DPM Management Shell
to identify the number of snapshots for which the server is provisioned:
$server=Connect-DPMServer Name of the DPM server
$server.CurrentShadowCopyProvision
When planning your DPM deployment, consider the snapshot limit as part of the DPM server
capacity. The following table lists examples of the number of snapshots that result from different
protection policies.
See Also
Planning the DPM Server Configurations
56
DPM can protect servers and workstations across domains within a forest that has a two-way
trust relationship with the domain that the DPM server is located in. If there is not a two-way trust
across domains, you must have a separate DPM server for each domain. DPM supports data
protection across forests as long as you establish a forest-level, two-way trust between the
separate forests. To set up a forest-level trust relationship, both domains must be in Windows
Server 2008 forest mode.
When deciding where to locate your DPM server, consider the network bandwidth between the
DPM server and the protected computers.
Note
If you are protecting data over a wide area network (WAN), there is a minimum network
bandwidth requirement of 512 kilobits per second (Kbps).
DPM supports teamed network adapters, also called interface cards (NICs). Teamed NICs are
multiple physical NICs that are configured to be treated as a single NIC by the operating system.
Teamed NICs provide increased bandwidth by combining the bandwidth available using each NIC
and failover to the remaining NIC or NICs when a NIC fails. DPM can use the increased
bandwidth achieved by using teamed NICs on the DPM server.
Another consideration for the location of your DPM servers is the need to manage tapes and tape
libraries manually, such as adding new tapes to the library or removing tapes for offsite archive.
See Also
Planning the DPM Server Configurations
Note
If the remote instance of SQL Server is running as a domain account, you should enable
the named pipes protocol for communication with the DPM server. For instructions on
configuring the named pipes protocol, see Configuring Client Network Protocols
(http://go.microsoft.com/fwlink/?LinkId=87976).
57
The remote instance of SQL Server must be running SQL Server 2008 SP1, Standard or
Enterprise Edition, including the following components:
SQL Server Database Engine
Reporting Services
We recommend you use the following settings on the remote instance of SQL Server:
Use the default failure audit setting.
Use the default Windows Authentication mode.
Enable password policy checking.
Install only the SQL Server Database Engine and Reporting Services components.
A remote instance of SQL Server should not run as Local System.
Run SQL Server by using a low-privileged domain user account.
See Also
Planning the DPM Server Configurations
Important
58
Some original equipment manufacturers (OEMs) include a diagnostic partition that is
installed from media that they provide. The diagnostic partition might also be named the
OEM partition, or the EISA partition. EISA partitions must be removed from disks before
you can add the disk to the DPM storage pool.
In This Section
Calculating Capacity Requirements
Planning the Disk Configuration
Defining Custom Volumes
See Also
Planning the DPM Server Configurations
Note
The limit of 64 recovery points for files is a result of the limitations of the Volume Shadow
Copy Service (VSS), which is necessary for the end-user recovery functionality of DPM.
The recovery point limit does not apply to application data.
In general, we recommend making the storage pool two times the size of the protected data for
protection of files. This recommendation is based on an assumed daily recovery point size of
approximately 10 percent of the protected data size and a retention range of 10 days (two weeks,
excluding weekends).
If your daily recovery point size is larger or smaller than 10 percent of your protected data size, or
if your retention range objectives are longer or shorter than 10 days, you can adjust the capacity
requirements for your storage pool accordingly.
Regardless of how much capacity you decide to allow for the storage pool in your initial
deployment, we recommend that you use extensible hardware so that you have the option of
adding capacity should the need arise.
The sections that follow provide guidelines for determining your daily recovery point size and
retention range objectives.
59
Estimating Daily Recovery Point Size
Our recommendation to make the storage pool two times the size of the protected data assumes
a daily recovery point size of 10 percent of the protected data size. Daily recovery point size is
related to data change rate and refers to the total size of all recovery points created during a
single day. To get an estimate of the daily recovery point size for your protected data, you can
review an incremental backup for a recent, average day. The size of the incremental backup is
usually indicative of the daily recovery point size. For example, if the incremental backup for
100 GB of data includes 10 GB of data, your daily recovery point size will probably be
approximately 10 GB.
See Also
Defining Custom Volumes
Planning the Disk Configuration
Planning the DPM Server Configurations
60
For the typical DPM deployment, DPM recommends a RAID 5 configuration, which offers an
effective compromise between capacity, cost, reliability, and performance.
To help you evaluate options for configuring the disks in your storage pool, the following table
compares the trade-offs between JBOD and the various levels of RAID, on a scale from 4 (very
good) to 1 (acceptable).
Comparison of Configuration Options for Storage Pool Disks
JBOD 4 4 1 4
RAID 0 4 4 1 4
RAID 1 1 1 4 3
RAID 5 3 3 3 3
RAID 10 1 1 4 4
For more information about RAID, see Achieving Fault Tolerance by Using RAID
(http://go.microsoft.com/fwlink/?LinkId=46086).
See Also
Calculating Capacity Requirements
Defining Custom Volumes
Planning the DPM Server Configurations
61
DPM cannot manage the space in custom volumes. If DPM alerts you that a custom replica
volume or recovery point volume is running out of space, you must manually change the size of
the custom volume by using Disk Management.
You cannot change the selection of storage pool or custom volume for a protection group member
after the group is created. If you must change the storage location for a data source's replica or
recovery points, you can do so only by removing the data source from protection and then adding
it to a protection group as a new protection group member.
See Also
Calculating Capacity Requirements
Planning the Disk Configuration
Planning the DPM Server Configurations
Note
The term tape libraries refers to both multi-drive tape hardware and stand-alone tape
drives.
Consider the number of tape backup jobs and the size of the protected data when planning the
capacity of your tape library. You must also consider the hardware features: a tape library without
an autoloader requires manual tape rotations when jobs are being performed.
To plan for the number of tapes you will need for each protection group, multiply the backup
frequency by the retention range.
The tape labels for tapes used for long-term protection are assigned when you create a protection
group. DPM will assign a default tape label in this format: DPM - <ProtectionGroupName> -
long-term tape <number>. Before you begin creating protection groups, you should plan your
tape naming scheme if you do not want to use the default scheme.
For more information, see Managing Tape Libraries (http://go.microsoft.com/fwlink/?
LinkId=187445).
See Also
Planning the DPM Server Configurations
62
End-User Recovery Considerations
Your deployment plan should specify the data for which end-user recovery will be enabled and
the DPM servers that must be configured in Active Directory Domain Services to provide end-user
recovery.
End-user recovery enables end users to independently recover data by recovering previous
versions of their files. End users can recover previous versions through shares on file servers,
through DFS Namespaces, or by using a command on the Tools menu of Microsoft Office 2003
applications.
If you currently have Shadow Copies of Shared Folders enabled on a computer that you protect
with DPM, you can disable that feature and regain the disk space that it uses. End-users and
administrators will be able to recover files from the recovery points on the DPM server.
Enabling end-user recovery requires configuring the schema of Active Directory Domain Services,
enabling the end-user recovery feature on the DPM server, and installing the recovery point client
software on the client computers.
63
Installing the Shadow Copy Client Software
Before end users can begin independently recovering previous versions of their files, the DPM
recovery point client software must be installed on their computers. If a client for Shadow Copies
of Shared Folders is present on the computer, the client software must be updated to support
DPM.
The recovery point client software can be installed on computers running the Windows XP
operating system with Service Pack 2 (SP2) or later and Windows Server 2003 with or without
SP1.
See Also
Planning the DPM Server Configurations
Security Considerations
Security Considerations
DPM operates as a high-privileged server on the network. To help ensure the security of the DPM
server, the DPM security architecture relies on the security features of Windows Server 2008 and
Active Directory Domain Services, SQL Server 2008, and SQL Server Reporting Services.
To maintain the DPM security architecture:
Accept all default security settings.
Do not install unnecessary software on the DPM server.
Do not change security settings after DPM is deployed. In particular, do not change
SQL Server 2008 settings, Internet Information Services (IIS) settings, DCOM settings, or
settings for the local users and groups that DPM creates during product installation.
A remote instance of SQL Server should not run as Local System.
Installing unnecessary software and changing default security settings can seriously compromise
DPM security.
In This Section
Configuring Antivirus Software
Configuring Firewalls
Security Considerations for End-User Recovery
Granting Appropriate User Privileges
See Also
End-User Recovery Considerations
Planning the DPM Server Configurations
64
Configuring Antivirus Software
DPM is compatible with most popular antivirus software products. However, antivirus products
can affect DPM performance, and, if they are not configured properly, they can cause data
corruption of replicas and recovery points. This section provides instructions for mitigating such
problems.
See Also
Security Considerations
65
Configuring Firewalls
If the computers you want to protect reside behind a firewall, you must configure the firewall to
allow communication between the DPM server, the computers it protects, and the domain
controllers.
66
connections to enable DPM operations such
as synchronization and recovery.
DPM communicates with the agent
coordinator on port 5718 and with the
protection agent on port 5719.
DNS 53/UDP Used between DPM and the domain controller,
and between the protected computer and the
domain controller, for host name resolution.
Kerberos 88/UDP 88/TCP Used between DPM and the domain controller,
and between the protected computer and the
domain controller, for authentication of the
connection endpoint.
LDAP 389/TCP Used between DPM and the domain controller
389/UDP for queries.
NetBIOS 137/UDP Used between DPM and the protected
138/UDP computer, between DPM and the domain
139/TCP controller, and between the protected
445/TCP computer and the domain controller, for
miscellaneous operations. Used for SMB
directly hosted on TCP/IP for DPM functions.
Windows Firewall
Windows Firewall is included with Windows Server 2008 and Windows Server 2008 R2. If you
enable Windows Firewall on the DPM server before you install DPM, DPM Setup properly
configures the firewall for DPM.
If you enable Windows Firewall on the DPM server after you install DPM, you must configure the
firewall manually to permit communication between the DPM server and protected computers.
Configure Windows Firewall on a DPM server by opening port 135 to incoming TCP traffic and
specifying the DPM service (Microsoft DPM/bin/MsDPM.exe) and the protection agent (Microsoft
DPM/bin/Dpmra.exe) as exceptions to the Windows Firewall policy.
For instructions for configuring Windows Firewall, search on "Windows Firewall" in Windows Help
and Support for Windows Server 2008 or Windows Server 2008 R2.
See Also
Security Considerations
67
Security Considerations for End-User
Recovery
You can enable end-user recovery for file data, but not for application data. Use only domain-
based security groups for permissions to files and folders on which you plan to enable end-user
recovery. DPM cannot guarantee consistency between end-user access to data on protected
computers and end-user access to recovery points of that data on the DPM server if you rely on
local security groups.
For example, if the set of users included in the protected computer's local Users group differs
from the set of users included in the DPM server’s local users group, different sets of users will
have access to the data on the protected computer and to the recovery points of that data.
See Also
Security Considerations
68
client computer
Accessing previous versions of protected data User account with access to the protected
from a client computer share
Recovering Windows SharePoint Services data Windows SharePoint Services farm
administrator account that is also an
administrator account on the front-end Web
server that the protection agent is installed on
See Also
Security Considerations
Task Reference
69
goals for each data protection method that you Defining Recovery Goals
will use.
For short-term disk-based protection, identify
the following information:
Retention range
Synchronization frequency
Number of recovery points
For short-term tape-based protection, identify
the following information:
Retention range
Backup schedule
Type of backup
Number of backup copies
Tape labeling scheme
For long-term tape-based protection, identify
the following information:
Retention range
Backup schedule and scheduling options
Number of backup copies
Tape labeling scheme
Organize the data sources into protection Selecting Protection Group Members
groups.
Determine your storage needs, based on your Allocating Space for Protection Groups
information about the protected data sources
and recovery goals.
If you are using tape-based protection, decide Specifying Tape and Library Details
if you want to compress or encrypt the data on
tapes.
Decide which method of replica creation you Choosing a Replica Creation Method
will use for each protection group.
Identify the DPM server configurations Planning the DPM Server Configurations
necessary, including the following information:
The number of DPM servers
Where to locate each DPM server
Which instance of SQL Server each DPM
server will use
Determine the disk configurations each DPM Planning the Storage Pool
server will require to meet the storage needs of
the protection groups. Include any custom
volumes that specific data sources will use.
Identify the DPM servers that require tape Planning the Tape Libraries Configuration
70
libraries and the capacity of each library.
Identify the DPM servers for which end-user End-User Recovery Considerations
recovery will be enabled and which clients will
require installation of the recovery point client
software.
See Also
Introducing Data Protection Manager 2010
Planning for DPM Deployment
Planning Protection Groups
71