System Center 2012 Self-Study Guide ( Data Protection Manager and Endpoint Protection)

Microsoft’s very own Scott Rachui put together another great self-study guide for System Center 2012, this time focusing exclusively on Data Protection Manager and Endpoint Protection. If you’re wanting a head start in mastering these technologies then these are a great place to start. ===== In part 4 of this series, I turn to Data… Read more

How to use SAN recovery option and mapping data source volumes to Windows disks

Say you want to use the DPM “SAN recovery” option. This requires storage management steps for which it is useful to know which Windows disks (LUN’s) hold the associated DPM volumes for a given data source. First a generic recap of the potential ‘DPM SAN recovery’ advantages and steps; ‘SAN recovery’ is only beneficial when… Read more

Exchange 2010 clusters can be protected by multiple DPM servers

I like to draw attention to something that may not be well known and surprise some. You probably are familiar with the ‘rule’ that all protected hosts within a cluster must be protected by the same DPM server! This is does not apply to Exchange 2010 and is formally documented here: http://technet.microsoft.com/en-us/library/ff399324.aspx. You still get… Read more

System Center Data Protection Manager 2010 Hyper-V protection: Configuring cluster networks for CSV redirected access

Just a quick heads up on a new System Center Data Protection Manager KB article we published this morning.  This one talks about configuring cluster networks for Cluster Shared Volume (CSV) redirected access: ===== Summary When System Center Data Protection Manager 2010 (DPM) is protecting Hyper-V guests using the Microsoft Software Shadow Copy provider (the… Read more

New video: TMG Setup for DPM Communication

This video covers troubleshooting DPM communication to and from a TMG server.  In the video we verify that we have connectivity, then we break the communication between the two and walk through the steps needed to be performed on the TMG server in order to allow successful communication once again to the TMG server. We… Read more

Protect, Unprotect, Protect, Unprotect – Understanding how DPM 2010 retention works

UPDATE 11/20/2013: The script below has been updated to work with all current versions of DPM 2012. ===== With special thanks to Fahd Kamal for the backgrounder content. Imagine that you are experimenting with DPM 2010.  You protect some data, and then you remove that protection group.  Then, showing DPM to one of your friends,… Read more

About defining DPM protection from CLI

Those with interest in modifying and creating DPM protection from CLI probably appreciate this otherwise there is little sense in reading further I guess. Those that seek to save and recreate protection configurations are up for a task that proved to be a daunting one, you may want to look into a twin script called… Read more

Why is recovery point consumption smaller than transferred data?

There are people that understand and monitor what’s happening in their environment, I’m sure you are one of those and may observe strange looking statistics. On the 10.000ft level and a per job basis, not all data that gets transferred is also stored!? Are we losing information? No, of course not! DPM is a CDP… Read more

Take caution when reintroducing old storage pool disk space

Assume we have some sort of scenario where protection is continued on new storage pool and are left with old storage pool that contains data but is no longer relevant. You could develop the idea to re-use old storage pool disk space to enlarge the new storage pool and may even be part of a… Read more

Performing a Bare Metal Restore with DPM 2010

So, you’ve protected your server with BMR using DPM and now you need to restore. What’s next? Well, I’ve been playing with the new BMR functionality on DPM 2010 for a while now and while it is very slick in how it operates, it seems like there might be some confusion on exactly how to… Read more