售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Title Page
Copyright and Credits
Microsoft System Center Data Protection Manager Cookbook
Dedication
About Packt
Why subscribe?
Packt.com
Contributors
About the authors
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Get in touch
Reviews
Installing and Upgrading DPM
Introduction
Planning your DPM deployment
Getting ready
How to do it...
How it works...
See also
Preparing your DPM deployment
Getting ready
How to do it...
How it works...
There's more...
See also
Installing SQL Server for the DPM database
Getting ready
How to do it...
Option 1 – local SQL Server instance
Option 2 – remote SQL Server instance
How it works...
Enabling the Transport Layer Security 1.2 protocol for DPM
Getting ready
How to do it...
How it works...
There's more...
Using certificate-based authentication to protect servers in a workgroup or untrusted domain
Protecting workloads on the cloud using DPM
See also
Installing DPM
Getting ready
How to do it...
Option 1 – installing DPM using a local SQL Server
Option 2 – installing DPM using a remote SQL Server
How it works...
There's more...
Automating the installation of DPM
Getting ready
How to do it...
How it works...
See also
Upgrading to the latest release of DPM
Getting ready
How to do it...
How it works...
There's more...
See also
Migrating legacy storage to Modern Backup Storage
Getting ready
How to do it...
How it works...
Installing the DPM agents
Getting ready
How to do it...
Option 1 – installing the agent from the DPM console
Option 2 – installing the agent manually
How it works...
There's more...
Upgrading the DPM agents
Getting ready
How to do it...
How it works...
There's more...
DPM Post-Installation and Management Tasks
Introduction
Using the DPM UI
How to do it...
How it works...
Enabling Modern Backup Storage (MBS)
Getting ready
How to do it...
How it works...
There's more...
See also
Configuring DPM agent throttling
Getting ready
How to do it...
How it works...
Optimizing the protection group
Getting ready
How to do it...
How it works...
Working with filters
Getting ready
How to do it...
How it works...
Configuring email notifications
Getting ready
How to do it...
How it works...
Applying Update Rollups (UR) to the DPM server
Getting ready
How to do it...
How it works...
Configuring a dedicated backup network
Getting ready
How to do it...
How it works...
Configuring Workload-Aware Storage
Getting ready
How to do it...
How it works...
Backup Storage Migration
Getting ready
How to do it...
How it works...
See also
Preventing unexpected data loss
Getting ready
How to do it...
See also
Creating a manual initial replica
Getting ready
How to do it...
How it works...
Creating custom reports
Getting ready
How to do it...
How it works...
Protecting Hyper-V VMs
Introduction
Configuring Hyper-V protection with DPM
Getting ready
How to do it...
How it works...
There's more...
Protecting Hyper-V VMs with Resilient Change Tracking
Getting ready
How to do it...
How it works...
There's more...
See also
Protecting Hyper-V clusters over SMB and Hyper-V replica
Getting ready
How to do it...
How it works...
There's more...
See also
Protecting Hyper-V clusters over Clustered Shared Volumes
Getting ready
How to do it...
How it works...
There's more...
See also
Protecting Hyper-V shielded VMs
Getting ready
How to do it...
How it works...
See also
Enabling DPM for scale-out Hyper-V protection
Getting ready
How to do it...
How it works...
See also
Recovering a Hyper-V virtual machine
Getting ready
How to do it...
How it works...
There's more...
Recovering a Hyper-V virtual hard disk
Getting ready
How to do it...
How it works...
There's more...
Recovering a single file using Item-Level Recovery
Getting ready
How to do it...
How it works...
There's more...
Monitoring DPM and Configuring Role-Based Access
Introduction
Monitoring DPM
Getting ready
How to do it...
How it works...
Publishing the DPM logs
Getting ready
How to do it...
How it works...
Monitoring DPM with SCOM
Getting ready
How to do it...
How it works...
Monitoring DPM without SCOM
Getting ready
How to do it...
Monitoring DPM operations through Windows Event Viewer
Monitoring DPM operations through the DPM Administrator Console
Using DPM reports to view usage and health trends
Using Performance Monitor to monitor the standard built-in operating system performance counters
How it works...
Installing the DPM Central Console
Getting ready
How to do it...
How it works...
Using the DPM Scoped Console
Getting ready
How to do it...
How it works...
Configuring remote administration
Getting ready
How to do it...
How it works...
Configuring and using role-based access
Getting ready
How to do it...
How it works...
Central reporting
Getting ready
How to do it...
How it works...
Protecting Microsoft Workloads with DPM
Introduction
Enabling file server protection with DPM
Getting ready
How to do it...
How it works...
There's more...
Enabling SQL Server protection with DPM
Getting ready
How to do it...
How it works...
See also
Enable Windows bare metal protection with DPM
Getting ready
How to do it...
How it works...
There's more...
See also
Securing Windows Client with DPM
Introduction
Creating a plan for backing up end user data
Getting ready
How to do it...
How it works...
See also
Plan for off-site end user backup
Getting ready
How to do it...
How it works...
See also
Configuring DPM and Active Directory for end user protection
Getting ready
How to do it...
How it works...
See also
Installing the agent automatically and manually on a client computer
Getting ready
How to do it...
How it works...
Performing image-level backups of client computers with DPM
Getting ready
How to do it...
How it works...
Protecting Microsoft Azure Stack with DPM
Introduction
Preparing to back up Azure Stack with DPM
Getting ready
How to do it...
How it works...
There's more...
See also
Backing up the infrastructure layer
Getting ready
How to do it...
How it works...
There's more...
Backing up the Azure Stack tenant layer
Getting ready
How to do it...
How it works...
See also
Overview of cloud recovery
Getting ready
How to do it...
How it works...
Protecting Workgroups and Untrusted Domains
Introduction
Setting up DPM protection with NTLM authentication
Getting ready
How to do it...
How it works...
There's more...
See also
Setting up DPM protection with certificate authentication
Getting ready
How to do it...
Adding a HTTP CRL Distribution Point
Creating the DPM Certificate Template
Configuring the certificate on the DPM server
Installing the DPM agents on the protected systems
Configuring the certificate on the protected computer
Attaching the computer to the DPM server
Test backing up the VMs
How it works...
There's more...
Recovering Data from Backup
Introduction
Recovering file server data with PowerShell
Getting ready
How to do it...
How it works...
See also
Recovering SQL data using the Self-Service Recovery Tool (SSRT)
Getting ready
How to do it...
How it works...
Recovering a failed server using bare-metal recovery
Getting ready
How to do it...
How it works...
Recovering data from Azure Backup
Getting ready
How to do it...
How it works...
There's more...
Recovering data from an external DPM server
Getting ready
How to do it...
How it works...
There's more...
Recovering data from a secondary DPM server
Getting ready
How to do it...
How it works...
There's more...
Integrating DPM with Azure Backup
Introduction
Integrating DPM with Azure Backup
Getting ready
How to do it...
How it works...
There's more...
See also
Protecting data with Azure Backup
Getting ready
How to do it...
How it works...
There's more...
See also
Creating online recovery points
Getting ready
How to do it...
How it works...
Monitoring and centralized reporting
Getting ready
How to do it...
Configuring Azure Storage Account
Viewing reports in Power BI
How it works...
There's more...
See also
Other Books You May Enjoy
Leave a review - let other readers know what you think
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜