SCDPM installation and configuration for newbie

Admission

This document presents the methodology to correctly install and configure System Center Data Protection Manager 2012 R2 , together with associated services .

The procedures contained herein assume that:

  • • System platform is Windows Server 2012 R2 Standard Edition
  • • It is planned to use a dedicated database based on MS SQL 2012 Standard
  • • It is planned D2D2T backup ,
  • • The server is in domain.

This document also assumes that the person using it has general knowledge of data security and ability to navigate Windows Server 2012 R2.

Installation

1. Initial screen

2. EULA

3. Start of setup

4. SQL database setup

5. SQL

7. Register information

8. Install location

9. Microsoft Update

10. CEIP options

11.Setup summary

12. Installation process

13. Finished installation

Summary

At this stage we completes the installation of DPM’a.

Configuration

After installation, we must first set up storage space for the backups. Then install the agent on servers that e want to protect with DPM, the last step is to create a Protection Group which in accordance with the options will back up different types of data from different data sources.

GUI description

DPM’s consists of 5 divided areas:

  1. Options for view C,
  2. Navigation after view C,
  3. General information from D view,
  4. Main bookmarks,
  5. Detailed information from C view.

Monitoring bookmark

14. DPM GUI

View from Picture 15 shows the “Monitoring” which contains all the information regarding the status of the DPM server and the individual tasks. In the pane A we have several buttons:

  • Subscribe and Options

    Here are options regarding basic configuration and notification.


15. What alerts should be send


16. Configuration for SCOM


17. CEIP option


18. Options for End user recovery


19. New computers discovery options


20. Mail configuration

  • Abaut DPM


21. DPM Information

  • Help


22. DPM’s help

Protection bookmark

View from picture 15 shows the “Protection” bookmark which contains all active and inactive backup copy group in DPM’e .

23. Protection bookmark view

    Expanding group in windows C will get a view like below.

24. Detailed information on one of the backup groups

By clicking on a specific group of backup we receive detailed information in the E area such as:

• The status of the group,

• Method protect,

• Length of keeping copies

• Configuration allocate space for backup purposes.

• Optimization options

25. Detailed information on selected data source

By clicking on a specific data source we receive detailed information in the area of E such as:

  • The status of the data source
  • Track the replica,
  • Latest backup repository ,
  • Last backup repository ,
  • The total number of recovery points ,
  • The amount of space allocated for backup (separately replica and separately on restore points) .

In A field are options for specifically selected group, server, or a data source, which at the moment is selected. These options are different depending on whether a group is selected , the server or data source.

26. Option for selected group

New – Create new group

Modify – modify existing group,

Delete – delete group,

Optimize – Network optimization options and express full backup,

Consistency Check – force consistency check,

Disk – resum disk backups,

Tape – resumes tape backups,

Self service recovery – self service recovery options,

Disk allocation – displays disk allocations for backups,

Tape catalog retention – options for time retentions of tape backups

Recovery point status – report generation for recovery points.

Remaining options

27. Options for selected server

New – adding new server to the group.

28. Options with data source selected

Recovery point – force recovery point creation,

Remove –     removal of selected data sources.

Recovery bookmark

    The most important part is in the area B where first we have to choose a domain from which you want to select the protected object and then the choice of protected servers. Expanding the list of domains see all the machines from different domains which any data sources are backups by DPM’a .

29. List

Similarly, when you expand the list of individual machines. The area is used to navigate the directory tree stored backups . However, in Area C, select the first of which date we are interested in the backup and then you can browse what is available from this period to be restored.

30. Possible data to recovery

Reporting bookmarks

In C field are available reports.

31. Reporting

Management bookmark

In area A is a button to install agents on the devices. In area B we can choose the ability to manage between agents , disks and tape libraries . When you select a specific agent on area C , under E there is information about the version of the agent or more detailed information on the causes of the problem with the agent on the machine.


32. Management

    Turning to manage disks in Area A there are options to add disks and refresh them . After you select the drive from Area C , under E appear information about the status of the disk such as:

  • The status of the drive,
  • Used place
  • Free space,
  • Protected data sources that are on it .

33. Disk management

    Moving in the management of libraries in area B will get the opportunity to its configuration.

34. Library

Disk space for backups

Configuration backup space is based on adding local disks. In the current configuration for backups are used VHDs hooked up to a machine running the DPM server then this disc is added in DPM’e .

35. Adding disk to the pool

Agent installation

We distinguish between two methods of connecting an agent to DPM’a.

Installation,

Attachment of already installed agent.

  • From trusted domain,
  • From untrusted domain or workgroup.

Agent installation files are located on the DPM server location:

C: \ Program Files \ Microsoft System Center 2012 \ DPM \ DPM \ ProtectionAgents \ RA \Version Number

Trusted domain

If the target device is in the trusted domain the most convenient method is simply installing a remote agent providing domain administrator privileges .

36. Choosing of installation method


37. Device selection

38. Privileges to add or install

39. Restart options

40. Summary

41. Installation

42. Success

    In case the installation failed next to ” TASK ” will show an additional tab which provides information to help with diagnosis of the problem. In the case of major problems with the installation of an agent in the trusted domain, you can install it manually on the target device and then plug it into the DPM server .

Untrusted domain or workgroup

In untrusted domain and workgroups agent can, not be installed remotely. On each server, you must install it manually taking into account whether you are using a 32bit or 64bit OS version

43. Agent installation files

44. Installation progress

45. Successful installation

    In the event of an unsuccessful installation additional information will be prompted here that can help to diagnose the issue.

Upon successful installation, you must manually specify to the agent with which DPM server and on what account is to be established communication . User account given in the command below is created locally on the device on which the DPM agent , and must be unique for each device. This procedure creates a local account and password. DPM server name must be FQDN.

46. Successful installation

    Due to the fact that the computer from an untrusted domain is unable to resolve the DNS name of DPM server , enter it rigidly in the host file and then check whether the name is properly resolved .

47. Adding DPM ip to host

The next step is to hook up the device with installed DPM agent to the DPM server . But first we must add on the DPM server in the host file information necessary to resolve the DNS name of the device from untrusted domain.


48. Host file on DPM server

    First now we can attach the agent to DPM server.

49. Options for agent attachment

Here we input the FQDN of the device you want to hook up to DPM’a . Username and password must be identical with that which we gave the command line on a device with an untrusted domain . This process also creates a local user with the same name and password.

50. Logon credentials.

51. We can attach several devices at once

52. Summary

53. Successful installation

In case the installation failed next to ” TASK ” will appear an additional tab which provides information to help with diagnosis of the problem.


54. Agent in DPM console

Types of DPM backups

Product

Protectable Data

Recoverable Data

Exchange Server 2003

Exchange Server 2007

  • Storage group
  • Storage group
  • Database
  • Mailbox
Exchange Server 2010
  • Stand-alone Exchange Server 2010 servers
  • Databases under a database availability group (DAG)
  • Mailbox
  • Mailbox databases under a DAG
SQL Server 2000

SQL Server 2005

SQL Server 2008

SQL Server 2008 R2

SQL Server 2012

  • Database
  • Database
Windows SharePoint Services 3.0

Microsoft Office SharePoint Server 2007

SharePoint Server 2012

  • Farm
  • SharePoint Search
  • Front-end Web server content
  • Farm
  • Database
  • Web Application
  • File or list item
  • SharePoint search
  • SharePoint Front-End Web Server
Windows Server 2003

Windows Server 2008

Windows Storage Server 2003

Windows Storage Server 2008

Windows Server 2008 R2

  • Volume
  • Share
  • Folder
  • Volume
  • Share
  • Folder
  • File
Microsoft Virtual Server 2005 R2 SP1
  • Virtual server host configuration
  • Virtual machines
  • Data for applications running on virtual machines1
  • Virtual server host configuration
  • Virtual machines
  • Data for applications running on virtual machines1
Hyper-V
  • Hyper-V computers
  • Cluster shared volumes
Item-level recovery of:

  • Files and folders
  • Volumes
  • Virtual Hard Drive (VHD)
All computers that can be protected by DPM except client computers.
  • System state
  • System state
Client computers
  • Windows XP Service Pack 2 (SP2) and later.
  • Windows Vista or Windows Vista Service Pack 1 (SP1).
  • Windows 7 Client
  • File data

Note
Recovery from previous versions of files and folders is not enabled on Windows XP computers.
Virtual Machine Manager Database Database

Creating backup tasks

First we choose whether we want to protect a server or desktop then add the source data from one or multiple devices that we want to protect with the same options and schedule.

55. Type of device

56. Available data sources

    DPM detects what can be backed up. In the case of servers, shared folders and SQL databases. In the case of Hyper-V clusters copies of entire virtual machines.

57. Data sources on cluster

For the purpose of the document we will create backup for a test server from which we want to make a backup of all shares and databases.

58. Adding data sources

59. Creating group

    We create a group and choose what type of backups we want to have

  • Short term backup on disk with retention period between 1 and 64 days,
  • Short term backup on tape with retention period between 1 and 12 weeks,
  • Long term backup on tape with retention period between 1 and 99 years.

60. Creating a schedule

    Here we setup following options:

  • Retention period,
  • How should be the synchronization made,
  • Schedule for recovery points based on files,
  • Schedule for application based recovery (SQL)

61. Consistency Check settings

62. Summary

63. Transmission optimization

64. Successful creation of protection group

    In case the installation failed next to ” TASK ” will show an additional tab which provides information to help with diagnosis of the problem.

Modification of backup job

Modifying backup job means going through the same configuration windows as when creating the backup job and changing it.

Deleting protection group

To delete a backup job , select it and click Delete.

65. Deleting backup job

It will ask whether you want to keep or erase the data that the job secured . If we decide to leave we will be able to recover data from an old backup job until you manually remove them . If we remove already at this point you release the disk space.

By clicking on the Stop Protection will begin the process of removing the backup job.

66. Acknowledge window

    In case the installation failed next to ” TASK ” will show an additional tab which provides information to help with diagnosis of the problem.

Recovering from backup

67. Recovery

Select the server from which you want to recover the data and from when to restore a copy, dates in bold indicate that at least one copy on that day (it can be more time to copy a given day , select the ” recovery time “). Only now you can search for a specific folder or file you want to recover.

68. Choosing of data to recovery

    We choose “Recovery” and follow the steps.

69. Selection Review


70. Choosing of recovery location

71. Additional options

72. Summary


73. Recovering

74. Successful recovery

75. Final effect

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s