Überblick: System Center Data Protection Manager 2010 Training - Hyper-V Server Blog

Überblick: System Center Data Protection Manager 2010 Training

Willkommen zu einer weiteren Zusammenfassung eines Videotutorials von TrainSignal.

Diesmal geht es um den System Center Data Protection Manager, kurz DPM.

Der DPM ist eine umfangreiche und umfassende Backupsoftware aus der System Center Familie. Er stellt eine universelle Sicherungslösung im Microsoft Umfeld dar, und beinhaltet beispielsweise Backupkomponenten für SQL, Exchange und sogar für virtuelle Maschinen.

Nun zur Beschreibung des Trainings:

Das Tool:

Wie gewohnt befinden sich in dem Set zwei DVDs. Die Eine beinhaltet die Videos inklusive einem Wiedergabetool. Die Andere enthält weitere Ressourcen, beispielsweise den Kurs in MP3 Form oder als WMV für Unterwegs.

Die Software auf der Video-DVD ist sehr übersichtlich und intuitiv bedienbar. Sie besteht aus zwei Teilen. Zuerst erscheint das Fenster, aus dem die Videos ausgewählt werden (Es bietet einen Überblick über alle Videos):

trainsignal-tool

Nach dem Klick auf ein Video, öffnet sich ein weiteres Fenster im Browser. Von hier aus kann man dann die einzelnen Abschnitte einsehen und auswählen (Bietet Überblick über die Abschnitte in einem einzelnen Video):

dpm20101

 

Der Inhalt:

Der Kurstrainer ist in diesem Tutorial ist Scott Lowe. Er hat unter Anderem über 17 Jahre Erfahrung in der IT-Branche, ist Autor von drei Büchern und hat die Qualifizierung des MCSE (Microsoft Certified Systems Engineer).

Er erklärt umfangreich und verständlich in gutem Englisch die Installation und Konfiguration des DPM Servers. Jeder Schritt wird ausführlich erläutert und am Ende des Videos werden die besprochenen Inhalte noch einmal wiederholt.

Der Kurs beginnt mit dem Erstellen und Erklären des Netzwerks, in das der DPM implementiert werden soll. Im weiteren Verlauf erläutert Scott Lowe unter Anderem alle Anwendungsgebiete des DPM, wie z.B.:

Backup Exchange,

Backup SQL,

Backup Virtuelle Maschinen,

und geht auf die Verwaltung ein:

Überwachung des DPM,

Fehlerbehebung, usw.

Die dabei verwendeten Folien sind übersichtlich gestaltet und aufgrund vieler praktischer Vorführungen direkt am DPM wird es nie langweilig.

Ein weiterer wichtiger Punkt ist, dass die einzelnen Videos immer ein spezifisches Thema abhandeln, weshalb man auch später wieder zu dem grade benötigten Thema springen kann.

 

Die Übersicht:

Nun kommen wir zum eigentlichen Inhalt des Kurses. Den Aufbau und die einzelnen Themen sehen Sie im Folgenden aufgelistet:

Lesson 1 – Getting Started with System Center Data Protection Manager 2010 Training
In this lesson, we’ll look at what we’ll be building for our scenario company, Globomantics, talk about what this course will cover, meet your instructor and talk about how to best use this course.

  • What We’re Building
  • About Your Instructor
  • About the Course
  • Before You Begin
  • How to Use the Course
Lesson 2 – Lab Setup
This lesson introduces you to what the course scenario’s physical environment looks like and how to simulate it on your own equipment. Learn what hardware and software you need to follow along with this course.

  • Globomantics Corporate Network
  • Globomantics Locations
  • Headquarters Server Information
  • Utica Regional Office Servers
  • Physical Lab Configuration Lab Overview
Lesson 3 – The Course Scenario
In this lesson you will be introduced to the fictitious company that will be used throughout this course. Learn about the Globomantics company and its plan for using Data Protection Manager 2010.

  • About Globomantics
  • Current Backup Challenges
  • Globomantics Cost Structure
  • Immediate Needs
  • Globomantics Office Locations
  • Globomantics Office Locations Map Data Protection Manager 2010 Project Plan
Lesson 4 – Introduction to Data Protection Manager 2010
Data Protection Manager 2010 brings a number of features of interest to Globomantics. Learn about these features and the rest of the DPM basics.

  • What’s new in DPM 2010
  • Protected Workloads
  • Protection Agents
  • Protection Groups
  • Replicas
  • Synchronization
  • Storage Pool
  • Recovery Point (""Snapshot"")
  • Continuous Data Protection
  • Express Full Backups
  • Consistency CheckDPM Scalability Limits
Lesson 5 – Planning the DPM Deployment
This lesson discusses how an organization’s recovery goals affect the DPM plan that will be put in place. Learn different considerations and decision implications and then apply that knowledge to what the Globomantics company is planning to do.

  • DPM and Organizational Policies
  • Recovery Goals and Implications
  • Risk and Data Loss Tolerance
  • Data Loss Implications
  • End User Recovery
  • DPM Protection Methods and Limits
  • DPM Hardware Requirements
  • DPM Software Requirements
  • SQL Server Requirements
  • Tape Library Support
  • Hyper-V ConsiderationsThe Globomantics Implementation
Lesson 6 – Installing Data Protection Manager 2010
By the end of this lesson Globomantics will have a functioning DPM server! Also, during the course of this lesson, you will learn why Globomantics has decided to go the route of installing the DPM software and the SQL database on the same server. Instructor Scott also details what to do if your organization decides to use a remote SQL Server.

  • DPM Communication Diagram
  • Local vs. Remote SQL Server
  • Remote SQL Server Preparation
  • Installation RestrictionsDPM Server Installation
Lesson 7 – Data Protection Manager Initial Configuration Tasks
Get familiar with both the GUI and command line administration tools available in DPM 2010. Then, add disc and tape assets to the Globomantics infrastructure based on specific recovery goals.

  • Introduction to the DPM 2010 Administrator Console
  • Introduction to DPM 2010 PowerShell
  • Adding Disks to the DPM Storage Pool
  • Adding a Tape Library to the DPM Server
Lesson 8 – Installing and Managing Agents
In this lesson you will learn about DPM agent configuration options, agent client requirements for a variety of applications, and different methods for performing agent installation.

  • Common Protected System Requirements
  • File Server, SQL, Exchange, SharePoint and Hyper-V Protection Requirements
  • Computer Discovery
  • DPM Agent Installation Options
  • Automatic Installation Method
  • Manual Installation Method
  • Remote Agent Installation Tip
  • Throttling Agent Network Usage Enable, Disable and Refresh Agents
Lesson 9 – Creating and Configuring Protection Groups
Projection groups are where organizational policy and technical implementation intersect. In this lesson you will link scenario company Globomantics’ business needs to protection group configuration.

  • Protection Group Structure
  • Creating Multiple Protection Groups
  • Short-term and Long-term Protection Policies
  • Defining a Backup Retention Time/Range
  • Compress or Encrypt Tape Data
  • System State and Enabling Bare Metal Recovery
  • Consistency Check Options
  • About Express Full Backups
  • Protection Group Considerations
  • Optimizing Performance and on-the-wire CompressionCreate and Optimize a Sample Protection Group
Lesson 10 – Backing Up and Recovering File Servers
After watching this lesson you will understand the backup options available for file servers which are the most common kinds of servers. Learn file-based protection and how to recover volumes, folders and individual files.

  • Protecting a File Server
  • File Server Protection Considerations
  • Recovering Files and Folders
  • File-Based Recovery Gotchas
  • Creating a Manual Recovery Point
  • Configuring Notification Options
  • A Quick Look at SAN-Based Recovery
Lesson 11 – Additional Backup and Recovery Options
Look closer at important protection features. See demonstrations of creating a manual recovery point, setting synchronization start times, changing the system state storage location, recovering system state for a Server 2003 server, and the exciting streamlined bare metal recovery (BMR) process for DPM 2010.

  • Recovery Point Types
  • Recovery Point Scheduling Options
  • Manual Recovery Point Creation
  • Recovery Point Options
  • Protection Group Optimization
  • System State Protection/BMR Gotchas
  • System State Protection
  • Bare Metal Recovery
  • Disaster Scenario
Lesson 12 – Backing Up and Recovering Exchange Servers
After watching this lesson you will be able to backup and restore Exchange 2010 servers and mailboxes. You will also understand the differences and limitations that come in to play when protecting older versions of Exchange.

  • Exchange Scope of Backup and Recovery
  • Using the Exchange DPM Storage Calculator
  • Exchange Protection Considerations
  • Why Run ESEUTIL?
  • Recovering Exchange Data
  • Using Recovery Databases
  • Exchange 2010: Database Availability GroupsExchange 2007: Backup and High Availability
Lesson 13 – Backing Up and Recovering SharePoint Servers
There are some extra steps to protecting SharePoint with DPM. This lesson will take you step-by-step through backing up and recovering SharePoint 2010 as well as some extra information about using older SharePoint versions.

  • What’s New in DPM 2010
  • SharePoint Protection Requirements
  • Using the ConfigureSharePoint Utility
  • Other ConfigureSharepoint Options
  • ConfigureSharepoint Behind the Scenes
  • SharePoint and DPM watchouts
  • Creating the SharePoint Protection Group
  • What is a Recovery Farm?
  • Recovering SharePoint Information SharePoint, DPM and Tape
Lesson 14 – Backing Up and Recovering SQL Servers
This lesson talks about the backup and recovery options available for SQL Server and how to take interim database snapshots to keep protection levels closer to real-time. You will also learn how to allow database administrators to perform their own self-service recovery on the SQL Server.

  • DPM 2010 SQL Server Protection Features
  • Understanding DPM SQL Backup
  • Globomantics SQL Protection
  • SQL Server/DPM Best Practices
  • SQL Database RecoverySQL Server Self-Service Recovery
Lesson 15 – Backing Up and Recovering Hyper-V Virtual Machines
Watch this lesson to find out about the requirements and limitations of protecting and recovering virtual workloads with DPM.

  • DPM 2010/Hyper-V features
  • Hyper-V/DPM Storage Calculator
  • Hyper-V Backup Prerequisites
  • Hyper-V Needs
  • Backup Options
  • Unsupported Hyper-V Scenarios
  • Additional Recommendations
  • Creating the Hyper-V Protection Group
  • Recovering Hyper-V Hosted Data Single Item Recovery Information
Lesson 16 – Monitoring the Data Protection Manager Server
The DPM environment requires monitoring to ensure success. When something goes wrong an administrator needs to be notified so that action can be taken. In this lesson, learn how to use the built in monitoring tools and reports to ensure the best possible results.

  • Using the Monitoring Area
  • Monitoring in the Protection Area
  • Other Console-Based Monitoring Options
  • Scheduling and Running Reports
  • System Center Operations Manager
Lesson 17 – Troubleshooting Data Protection Manager
Even the best planned installations can run into trouble and will require troubleshooting. This lesson shows you where to look when DPM problems occur.

  • Basic Troubleshooting
  • Application Protection Troubleshooting
  • Obtaining Replica Information
  • Performing Consistency Checks
  • DPM-Related Performance Monitoring
Lesson 18 – Protecting the DPM Server
You must ensure that protection stays in place even when the primary DPM server itself fails. So, this lesson explains the options for protecting and recovering the DPM server and shows how to switch protection to a secondary DPM server in the event that the primary fails.

  • DPM Chaining and Secondary Protection
  • A Secondary DPM Server
  • DPM Protection Diagrams
  • DPM Protection Prerequisites
  • Creating the Protection Group
  • Switching Protection Roles
  • Recovery from a Secondary Server
  • Primary DPM Server Recovery Steps
Lesson 19 – Next Steps
We’ve reached the end of the course. In this lesson, we’ll look back at where we started with Globomantics and what we built for them. We’ll also discuss what further steps you can take to deepen your knowledge of Data Protection Manager.

  • Where You Started
  • Course Building Blocks
  • What You’ve Accomplished
  • Your Road Ahead
  • My Favorite Supporting Resources
  • We Value Your OpinionThank You and Good Luck!

 

Fazit:

Der Kurs ist sehr empfehlenswert, wenn man die vielfältigen Einsatzmöglichkeiten des DPMs kennenlernen oder sich auf eine Microsoft Zertifizierungsprüfung vorbereiten möchte.

Das Tutorial besticht durch den durchdachten Aufbau, die Erklärungen in verständlichen Schritten und diverse Feinheiten. Dazu zählt eine PDF Datei, in der sämtliche Präsentationsfolien mit einem nebenstehenden Bereich für Notizen aufgelistet sind.

Alles in allem: Wieder ein Training auf dem hervorragenden Niveau der TrainSignal Kurse.

Wenn Sie mehr über dieses Training erfahren möchten, kicken Sie HIER.

admin
 

>