Protecting your Organisation’s Data with Microsoft Data Protection Manager (2007 and 2010).Tristan Self – Senior IT Infrastructure Engineer – Oaklands College
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Oaklands college: Protecting your data.
1. Wednesday 2 nd February 2011 Tristan Self – Senior IT Infrastructure Engineer – Oaklands College
2.
3.
4.
5. Typical Microsoft DPM Infrastructure A protection agent is installed on any server with data requiring protection such as a file server, Exchange or SQL server. When directed by the DPM server this agent is responsible for triggering the VSS snapshot and moving “Synchronising” the data from the protected server to the DPM server. Disk to Disk Disk to Disk to Tape Disk to Tape The data is stored in the DPM storage pool as a “replica” of the volume and a collection of “recovery points” (changed versions of the replica at a given point in time.) Aged recovery points are copied to tape based on the configuration of the retention. Storage Pool
6. The agent is installed on the protected server, the files and folders selected for backup, then DPM creates a replica of the data (full backup.) The agent then monitors the protected data (blocks) for changes and synchronises only the changed blocks to the DPM server at regular intervals. At specified time the DPM server generates a “recovery point” (a consistent full backup of the data) on the replica volume. Only the changed blocks between the new recovery point and the previous recovery point are stored (on the recovery point volume.) This is the basic principle to which DPM operates irrespective of data type being protected. Replica Volume Recovery Point Volume
7.
8.
9.
10.
11.
12. Restore Granularity For individual Exchange mail item restores the database can be mounted offline with an EDB file opening tool and then items exported to PST for Exmerging or importing back into the mailbox.