Data Protection Manager
Data Protection Manager
Overview
Data Protection Manager
How does DPM work?
What can DPM back up?
DPM-compatible tape libraries
Get Started
DPM build versions
DPM release notes
What's new in DPM
What DPM supports
How To
Plan Your DPM Environment
Get ready to deploy DPM servers
Prepare your environment for DPM
Prepare data storage
Identify compatible tape libraries
Identify data sources you want to protect
Install or Upgrade DPM
Install DPM
Upgrade your DPM installation
Add Modern Backup storage
Deduplicate DPM storage
Deploy DPM
Deploy the DPM protection agent
Deploy protection groups
Configure firewall settings
Protect Workloads
Back up Hyper-V virtual machines
Back up Exchange with DPM
Back up SharePoint with DPM
Back up SQL Server with DPM
Back up client computers with DPM
Back up file data with DPM
Back up system state and bare metal
Back up and restore VMware servers
Back up and restore VMM servers
Prepare to back up a generic data source
Prepare machines in workgroups and untrusted domains for backup
Back up the DPM server
Monitor and Manage
Monitor DPM
Set up DPM logging
Generate DPM reports
Use SCOM to manage and monitor DPM servers
Improve replication performance
Use central console to manage DPM servers
Data Protection Manager
2 minutes to read
Every organization needs a business continuity and disaster recovery (BCDR ) strategy to make sure resources are
available during planned and unplanned outages, and that you're able to recover to normal working conditions
when things go wrong. Your BCDR strategy requires keeping your data safe and recoverable, and keeping your
business workloads, applications, and services continuously available. System Center Data Protection Manager
(DPM ) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the
backup and recovery of enterprise data.
You can deploy System Center Data Protection Manager (DPM ) for:
Application-aware backup: Application-aware back up of Microsoft workloads, including SQL Server,
Exchange, and SharePoint.
File backup: Back up files, folders and volumes for computers running Windows server and Windows client
operating systems.
System backup: Back up system state or run full, bare-metal backups of physical computers running
Windows server or Windows client operating systems.
Hyper-V backup: Back up Hyper-V virtual machines (VM ) running Windows or Linux. You can back up an
entire VM, or run application-aware backups of Microsoft workloads on Hyper-V VMs running Windows.
Get a full list in What can DPM back up?
DPM can store backup data to:
Disk: For short-term storage DPM backs up data to disk pools.
Azure: For both short-term and long-term storage off-premises, DPM data stored in disk pools can be
backed up to the Microsoft Azure cloud using the Azure Backup service.
Tape: For long-term storage you can back up data to tape, which can then be stored offsite.
When outages occur and source data is unavailable, you can use DPM to easily restore data to the original source
or to an alternate location. That way, if the original data is unavailable because of planned or unexpected issues, you
can easily restore data from an alternate location. DPM uses SQL Server as its database and you protect the DPM
server itself for disaster recovery purposes. The following diagram provides an overview of DPM backup
functionality.
Next steps
Learn more in How does DPM work?
How does DPM work?
12 minutes to read
The method System Center Data Protection Manager (DPM ) uses to protect data varies according to the type of
data being protected, and the method of protection you select. This article serves as a primer for how DPM
functions. It is intended to educate those new to DPM, or those who may have basic questions about how DPM
works. This article covers Disk-Based protection processes, Tape-Based protection processes, recovery process, as
well as the protection policy.
Whether you are protecting file data or application data, protection begins with the creation of the replica of the
data source.
The replica is synchronized, or updated, at regular intervals according to the settings that you configure. The
method that DPM uses to synchronize the replica depends on the type of data being protected. For more
information, see The File Data Synchronization Process and The Application Data Synchronization Process. If a
replica is identified as being inconsistent, DPM performs a consistency check, which is a block-by-block verification
of the replica against the data source.
A simple example of a protection configuration consists of a DPM server and a protected computer. The computer
is protected when you install a DPM protection agent on the computer and add its data to a protection group.
Protection agents track changes to protected data and transfer the changes to the DPM server. The protection
agent also identifies data on a computer that can be protected and is involved in the recovery process. You must
install a protection agent on each computer that you want to protect by using DPM. Protection agents can be
installed by DPM or you can install protection agents manually using applications such as Systems Management
Server (SMS ).
Protection groups are used to manage the protection of data sources on computers. A protection group is a
collection of data sources that share the same protection configuration. The protection configuration is the
collection of settings that are common to a protection group, such as the protection group name, protection policy,
disk allocations, and replica creation method.
DPM stores a separate replica for each protection group member in the storage pool. A protection group member
can be any of the following data sources:
A volume, share, or folder on a desktop computer, file server, or server cluster.
A storage group on an Exchange server or server cluster
A database of an instance of SQL Server or server cluster
NOTE
DPM does not protect data stored in USB drives.
If a replica becomes inconsistent with its data source, DPM generates an alert that specifies which computer and
which data sources are affected. To resolve the problem, the administrator repairs the replica by initiating a
synchronization with consistency check, also known as simply a consistency check, on the replica. During a
consistency check, DPM performs a block-by-block verification and repairs the replica to bring it back into
consistency with the data source.
You can schedule a daily consistency check for protection groups or initiate a consistency check manually.
At regular intervals that you can configure, DPM creates a recovery point for the protection group member. A
recovery point is a version of the data from which data can be recovered.
The application data synchronization process
For application data, after the replica is created by DPM, changes to volume blocks that belong to application files
are tracked by the volume filter.
How changes are transferred to the DPM server depends on the application and the type of synchronization. The
operation that is labeled synchronization in DPM Administrator Console is analogous to an incremental backup,
and it creates an accurate reflection of the application data when combined with the replica.
During the type of synchronization that is labeled express full backup in DPM Administrator Console, a full
Volume Shadow Copy Service (VSS ) snapshot is created but only changed blocks are transferred to the DPM
server.
Each express full backup creates a recovery point for application data. If the application supports incremental
backups, each synchronization also creates a recovery point. The synchronization type supported by each type of
application data is summarized as follows:
For protected Exchange data, synchronization transfers an incremental VSS snapshot using the Exchange
VSS writer. Recovery points are created for each synchronization and express full backup.
SQL Server databases that are log-shipped, in read-only mode, or that use the simple recovery model do
not support incremental backup. Recovery points are created for each express full backup only. For all other
SQL Server databases, synchronization transfers a transaction log backup, and recovery points are created
for each incremental synchronization and express full backup. The transaction log is a serial record of all the
transactions that have been performed against the database since the transaction log was last backed up.
Windows SharePoint Services and Microsoft Virtual Server do not support incremental backup. Recovery
points are created for each express full backup only.
Incremental synchronizations require less time than performing an express full backup. However, the time required
to recover data increases as the number of synchronizations increases. This is because DPM must restore the last
full backup and then restore and apply all the incremental synchronizations up to the point in time selected for
recovery.
To enable faster recovery time, DPM regularly performs an express full backup, a type of synchronization that
updates the replica to include the changed blocks.
During the express full backup, DPM takes a snapshot of the replica before updating the replica with the changed
blocks. To enable more frequent recovery point objectives, as well as to reduce the data loss window, DPM also
performs incremental synchronizations in the time between two express full backups.
As with the protection of file data, if a replica becomes inconsistent with its data source, DPM generates an alert
that specifies which server and which data source are affected. To resolve the problem, the administrator repairs
the replica by initiating a synchronization with consistency check on the replica. During a consistency check, DPM
performs a block-by-block verification and repairs the replica to bring it back into consistency with the data
sources.
You can schedule a daily consistency check for protection groups or initiate a consistency check manually.
The difference between file data and application data
Data that exists on a file server and which needs to be protected as a flat file qualifies as file data, such as Microsoft
Office files, text files, batch files, and so forth.
Data that exists on an application server and which requires DPM to be aware of the application qualifies as
application data, such as Exchange storage groups, SQL Server databases, Windows SharePoint Services farms,
and Virtual Server.
Each data source is presented in DPM Administrator Console according to the type of protection that you can
select for that data source. For example, in the Create New Protection Group Wizard, when you expand a server
that contains files and is also running Virtual Server and an instance of SQL Server, the data sources are treated as
follows:
If you expand All Shares or All Volumes, DPM displays the shares and volumes on that server and will
protect any data source selected in either of those nodes as file data.
If you expand All SQL Servers, DPM displays the instances of SQL Server on that server and will protect
any data source selected in that node as application data.
If you expand Microsoft Virtual Server, DPM displays the host database and virtual machines on that server
and will protect any data source selected in that node as application data.
For specific backup types and schedules, see Planning Protection Groups
Recovery process
The method of data protection, disk-based or tape-based, makes no difference to the recovery task. You select the
recovery point of data that you want to recover, and DPM recovers the data to the protected computer.
DPM can store a maximum of 64 recovery points for each file member of a protection group. For application data
sources, DPM can store up to 448 express full backups and up to 96 incremental backups for each express full
backup. When storage area limits have been reached and the retention range for the existing recovery points is not
met yet, protection jobs will fail.
NOTE
To support end-user recovery, the recovery points for files are limited to 64 by Volume Shadow Copy Service (VSS).
As explained in The File Data Synchronization Process and The Application Data Synchronization Process, the
process for creating recovery points differs between file data and application data. DPM creates recovery points
for file data by taking a shadow copy of the replica on a schedule that you configure. For application data, each
synchronization and express full backup creates a recovery point.
The following illustration shows how each protection group member is associated with its own replica volume and
recovery point volume.
Administrators recover data from available recovery points by using the Recovery Wizard in DPM Administrator
Console. When you select a data source and point in time from which to recover, DPM notifies you if the data is on
tape, whether the tape is online or offline, and which tapes are needed to complete the recovery.
DPM gives administrators the ability to enable their end users to perform their own recoveries by leveraging the
Previous Versions feature in Windows. If you do not want to provide this capability to your end users, you recover
the data for desktop computers using the using the Recovery Wizard.
Protection policy
DPM configures the protection policy, or schedule of jobs, for each protection group based on the recovery goals
that you specify for that protection group. Examples of recovery goals are as follows:
"Lose no more than 1 hour of production data"
"Provide me with a retention range of 30 days"
"Make data available for recovery for 7 years"
Your recovery goals quantify your organization's data protection requirements. In DPM, the recovery goals are
defined by retention range, data loss tolerance, recovery point schedule, and, for database applications, the express
full backup schedule.
The retention range is how long you need the backed-up data available. For example, do you need data from today
to be available a week from now? Two weeks from now? A year from now?
Data loss tolerance is the maximum amount of data loss, measured in time, that is acceptable to business
requirements, and it will determine how often DPM should synchronize with the protected server by collecting
data changes from the protected server. You can change the synchronization frequency to any interval between 15
minutes and 24 hours. You can also select to synchronize just before a recovery point is created, rather than on a
specified time schedule.
The recovery point schedule establishes how many recovery points of this protection group should be created. For
file protection, you select the days and times for which you want recovery points created. For data protection of
applications that support incremental backups, the synchronization frequency determines the recovery point
schedule. For data protection of applications that do not support incremental backups, the express full backup
schedule determines the recovery point schedule.
NOTE
When you create a protection group, DPM identifies the type of data being protected and offers only the protection options
available for the data.
DPM Telemetry
DPM does not collect any telemetry. If you are sending the data to Azure, the information needed by Azure Backup
is sent to Microsoft. It does not contain any PII.
What can DPM back up?
15 minutes to read
This article details the workloads that DPM can back up.
Use the following matrix for DPM 2016 and Semi-Annual Channel releases: 1801 and 1807:
Workloads – The workload type of technology.
Version – Supported VMM version for the workloads.
DPM installation – The computer/location where you wish to install DPM.
Protection and recovery – List the detailed information about the workloads such as supported storage
container or supported deployment.
Use the following matrix for DPM 2019:
Workloads – The workload type of technology.
Version – Supported VMM version for the workloads.
DPM installation – The computer/location where you wish to install DPM.
Protection and recovery – List the detailed information about the workloads such as supported storage
container or supported deployment.
Client computers (64-bit) Windows 10 Physical server Volume, share, folder, files,
deduped volumes
Hyper-V virtual machine
Protected volumes must be
VMware virtual machine NTFS. FAT and FAT32 aren't
supported.
Servers (64-bit) Windows Server 2019, Azure virtual machine Volume, share, folder, file,
2016, 2012 R2, 2012 (when workload is running system state/bare metal),
as Azure virtual machine) deduped volumes
Physical server
On-premises Hyper-V
virtual machine
System Center VMM VMM 2019, 2016 Physical server All deployment scenarios:
Database
Hyper-V virtual machine
SQL Server SQL Server 2019, SQL Physical server All deployment scenarios:
Server 2017, 2016 and database
supported SPs, 2014 and On-premises Hyper-V
supported SPs virtual machine
SharePoint SharePoint 2019, 2016 with Physical server Protect (all deployment
latest SPs scenarios): Farm, frontend
On-premises Hyper-V web server content
virtual machine
Recover (all deployment
Azure virtual machine scenarios): Farm, database,
(when workload is running web application, file or list
as Azure virtual machine) item, SharePoint search,
frontend web server
Windows virtual machine in
VMWare (protects
workloads running in
Windows virtual machine in
VMWare)
VM Backup
WORKLOAD VERSION DPM INSTALLATION PROTECTION AND RECOVERY
Hyper-V host - DPM Windows Server 2019, Physical server Protect: Hyper-V
protection agent on Hyper- 2016, 2012 R2, 2012 computers, Hyper-V VMs
V host server, cluster, or VM On-premises Hyper-V hosted on (cluster shared
virtual machine volumes) CSVs
VMware VMs VMware server 6.0, or 6.5, On-premises Hyper-V VMware VMs on cluster-
6.7 virtual machine shared volumes (CSVs), NFS,
and SAN storage.
Item-level recovery of files
and folders available only
for Windows. VMware
vApps not supported.
Linux
WORKLOAD VERSION DPM INSTALLATION PROTECTION AND RECOVERY
Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
Protected
volumes must be
NTFS. FAT and
FAT32 aren't
supported.
Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
Physical server
On-premises
Hyper-V virtual
machine
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
SQL Server SQL Server 2017 Physical server Y Y (UR5 Onwards) All deployment
scenarios:
On-premises database
Hyper-V virtual
machine
Azure virtual
machine
Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
SQL Server SQL Server 2016 Physical server Y Y (UR4 onwards) All deployment
SP1 scenarios:
On-premises database
Hyper-V virtual
machine
Azure virtual
machine
Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)
SQL Server SQL Server 2016 Physical server Y Y (UR2 Onwards) All deployment
scenarios:
On-premises database
Hyper-V virtual
machine
Azure virtual
machine
Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)
Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG
Backup of
Exchange over
ReFS not
supported
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG
Backup of
Exchange over
ReFS not
supported
Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG
Backup of
Exchange over
ReFS not
supported
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG
Backup of
Exchange over
ReFS not
supported
Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG
Backup of
Exchange over
ReFS not
supported
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG
Backup of
Exchange over
ReFS not
supported
Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server
Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY
Recover: Entire
virtual machine
For a complete
list of supported
Linux
distributions and
versions, see the
article, Linux on
distributions
endorsed by
Azure.
Cluster support
DPM can protect data in the following clustered applications:
File servers
SQL Server
Hyper-V
NOTE
If you're protecting a Hyper-V cluster using scaled-out DPM protection, you can't add secondary protection for the
protected Hyper-V workloads.
Exchange Server - DPM can protect non-shared disk clusters for supported Exchange Server versions
(cluster continuous replication), and can also protect Exchange Server configured for local continuous
replication.
SQL Server
NOTE
DPM doesn't support the protection of SQL Server databases hosted on cluster-shared volumes (CSVs).
DPM can protect cluster workloads that are located in the same domain as the DPM server, and in a child or
trusted domain. If you want to protect data source in untrusted domains or workgroups you'll need to use NTLM
or certificate authentication for a single server, or certificate authentication only for a cluster.
Next steps
Get ready to deploy DPM servers
System Center DPM Compatible Tape Libraries
19 minutes to read
Data Protection Manager (DPM ) in System Center 2012 R2, 2016 and 2019 can be deployed using tape-based
backup for data protected by the DPM server. A tape library or stand-alone tape drive can be connected to DPM
servers. For more information see Planning the Tape Libraries Configuration. The following tables summarize tape
libraries that are compatible with DPM in System Center 2012 R2, 2016 and 2019.
NOTE
Tape libraries configured with a virtual Fibre Channel adapter are only supported when using certified tape library hardware
on the following configurations:
System Center Data Protection Manager 2012 R2 U3 (or later) running on Windows 2012 R2 (or later).
System Center Data Protection Manager 2016 running on Windows Server 2012 R2 (or later).
System Center Data Protection Manager 2019 running on Windows Server 2016 and Windows Server 2019.
Support Matrix
DPM 2012 R2 DPM 2016 DPM 2019
BDT
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION
FlexStor II 2008 R2 5.2.3790.7, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 06/06/2009 HH FC 10/29/2012
, signed , signed
FlexStor II 2012 8.0.0.1, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 07/05/2012 HH FC 10/29/2012
, signed , signed
FlexStor II 2008 R2 5.2.3790.7, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 06/06/2009 HH SAS 10/29/2012
, signed , signed
FlexStor II 2012 8.0.0.1, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 07/05/2012 HH SAS 10/29/2012
, signed , signed
Dell
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION
HP LTO4 FH
FC
MSL 6480 HP StoreEver 4.60 or later HPE LTO8 HH HPE StoreEver J4DB or later
Tape Drivers FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or HPE LTO8 HH v4.4.0.0 or
later SAS later FA17 or later
HP LTO5 HH
SAS
HP LTO4 FH
FC
HP LTO4 HH
SAS
MSL 3040 HP StoreEver 3210 or later HPE LTO8 HH HP StoreEver J4DB or later
Tape Drivers FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or HPE LTO8 HH v4.4.0.0 or
later SAS later
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION
HP LTO5 HH
SAS
HP LTO4 FH
FC
HP LTO4 HH
SAS
1/8 G2 HP StoreEver 4.30 or later HPE LTO8 HH HPE StoreEver J4DB or later
Autoloader Tape Drivers FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or HPE LTO8 HH v4.4.0.0 or
later SAS later FA17 or later
HP LTO5 HH
FC
HP LTO5 HH
SAS
HP LTO4 HH
SAS
IBM
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION
TIP
The following registry key needs to be added to enable support for TS 2900: DWORD “RSMCompatMode” under
“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent” and set it to 29 (decimal).
Quantum
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION
Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 IBM LTO5 lto.sys, A6SA
, 7.5.5.0 301 FC 6.1.7600.16
385
Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 IBM LTO5 lto.sys, B170
, 7.5.5.0 301 FC 6.1.7600.16
385
Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 IBM LTO4 lto.sys, A23D
, 7.5.5.0 301 FC 6.1.7600.16
385
Tandberg Data
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION
Oracle StorageTek
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION
This article describes how to determine your current Microsoft System Center – Data Protection Manager version
number and the corresponding update rollup. Each update rollup (UR ) release has a link to a support article
describing the UR changes as well as links to the package downloads.
NOTE
All System Center Data Protection Manager update rollups are cumulative. This means, you do not need to apply the URs in
order, you can always apply the latest update. If you have deployed System Center 2016 – Data Protection Manager and
never applied an update rollup, you can proceed to install the latest one available.
Build versions
The following table lists the build versions for Data Protection Manager 2016.
The following table lists the build versions for Data Protection Manager 1801.
The following table lists the build versions for Data Protection Manager 1807.
Next steps
What's New in DPM
System Center DPM Release Notes
18 minutes to read
This article lists the release notes for System Center 2019 - Data Protection Manager (DPM ).
This article lists the release notes for System Center 1807 - Data Protection Manager (DPM ).
This article lists the release notes for System Center 1801 - Data Protection Manager (DPM ).
This article lists the release notes for System Center 2016 - Data Protection Manager (DPM ).
4. If you have more than one row returned, take the resulting ScheduleID and JobDefinitionID of the older
entry and mark them as deleted.
update tbl_SCH_ScheduleDefinition
set IsDeleted = 1
where ScheduleId = ‘ScheduleID ' --- Replace with Your ScheduleID
update dbo.tbl_JM_JobDefinition
set IsDeleted = 1
where JobDefinitionId = ‘JobDefinitionID' --- Replace with Your JobDefinitionID
5. Delete the SQL job that is matching the ScheduleID under the SQL Server Agent – JOBS. Once deleted, the
crash at zero hours would be resolved.
ScheduleId is the SQL Jobs under SQL agent:
UPDATE MSDB.dbo.sysjobs
SET Enabled = 0
WHERE [Name] LIKE ‘ScheduleID’ --- Replace with Your ScheduleID
UpdatedDSSizeReport: Path to a file that stores the updated datasource sizes. When not passed sizes.csv,
a file is created in the execution directory. Use after UpdateSizeInfo in ManageStorageInfo .
FailedDSSizeUpdateFile: Path to a file to store the Datasource IDs for the datasources for which the
storage consumption couldn’t be calculated. This may happen due to reasons as ongoing backups. When
not passed failedDS.txt file is created in the execution directory. This file can be given as input to
“UpdateSizeForDS” to update the sizes of all the datasources. This should be used after using
UpdateSizeInfo in ManageStorageInfo .
UpdatedDSSizeReport: Path to a file that stores the updated datasource sizes. When not passed sizes.csv,
a file is created in the execution directory. Use after UpdateSizeInfo in ManageStorageInfo .
FailedDSSizeUpdateFile: Path to a file to store the Datasource IDs for the datasources for which the
storage consumption couldn’t be calculated. This may happen due to reasons as ongoing backups. When
not passed failedDS.txt file is created in the execution directory. This file can be given as input to
“UpdateSizeForDS” to update the sizes of all the datasources. This should be used after using
UpdateSizeInfo in ManageStorageInfo .
UpdatedDSSizeReport: Path to a file that stores the updated datasource sizes. When not passed sizes.csv,
a file is created in the execution directory. Use after UpdateSizeInfo in ManageStorageInfo .
FailedDSSizeUpdateFile: Path to a file to store the Datasource IDs for the datasources for which the
storage consumption couldn’t be calculated. This may happen due to reasons as ongoing backups. When
not passed failedDS.txt file is created in the execution directory. This file can be given as input to
“UpdateSizeForDS” to update the sizes of all the datasources. This should be used after using
UpdateSizeInfo in ManageStorageInfo .
Next steps
To install DPM, see the article, Install DPM.
If you would like to consult planning information for your environment, see Preparing your environment
for System Center Data Protection Manager.
See these KBs for ReFS specific issues - KB4016173, KB4035951.
What's new in System Center Data Protection
Manager
11 minutes to read
This article details the new features supported in System Center 2019 - Data Protection Manager (DPM ).
DPM 1807 is the latest release in the System Center Semi Annual Channel (SAC ). You can update to System
Center Data Protection Manager (DPM ) version 1807 only from DPM 1801. If you're upgrading to DPM 1807, see
the Release Notes for 1807.
System Center DPM 1801 provides the following new features:
System Center DPM 2016 adds improvements in three key areas: storage efficiency, performance, and security.
Modern Backup Storage takes advantage of improvements in Windows Server 2016, creating storage space
savings of 30-40%. In addition to space savings, you can create storage and performance efficiency by using MBS
to back up designated workloads to specific volumes. Improved DPM performance reduces I/O requirements up
to 70%, resulting in faster backups. DPM 2016 supports shielded VMs.
Update-VMVersion <vmname>
Next steps
Install DPM
Upgrade your DPM installation
What's supported and what isn't for DPM?
14 minutes to read
This topic summarizes some of the common support information you might need when deploying and
maintaining System Center - Data Protection Manager.
Storage issues
References to old tape libraries aren't removed from the DPM database
Issue: Obsolete tape library are still enumerated and listed in DPM PowerShell cmdlets such as get-dpmlibrary.
Workaround: None
Virtual tape library support
Issue: Are virtual tape libraries supported?
Workaround: Virtual tape libraries configured with a virtual fibre channel adapter are only supported if you're
running Data Protection Manager 2012 R2 UR3 or later with certified hardware. For a current list of supported
hardware see Compatible Tape Libraries for System Center DPM 2012 and later . To check if your tape library is
supported by the virtual fibre channel adapter, please contact your tape hardware vendor and ask them to Verify
tape library compatibility.
USB or removable drives can't be used in the DPM storage pool
Issue: USB and removable storage such as Firewire.
Workaround: None. This isn't supported due to a limitation with Windows dynamic disks.
Data on CSVs
Issue: DPM only supports the protection of Hyper-V virtual machines on Cluster Shared Volumes (CSVs).
Protecting other workloads hosted on CSVs isn't supported.
Workaround: None.
Deduplication issues
Deduplicated volumes support
Issue: Deduplication support for DPM depends on operating system support.
Windows 2012 Windows Server 2012 DPM 2012 with SP1, DPM Y
2012 R2
OPERATING SYSTEM OF OPERATING SYSTEM OF DPM
PROTECTED SERVER SERVER DPM VERSION DEDUP SUPPORT
Windows Server 2012 R2 Windows Server 2012 DPM 2012 with SP1, DPM N
2012 R2
DPM 2012, 2012 Not supported Not supported Supported Not supported
with SP1
There are a few planning steps to consider before you begin to deploy your System Center Data Protection
Manager (DPM ) servers:
Plan for DPM server deployment - Figure out how many DPM servers you'll need and where to place them.
Plan firewall settings - Get information about firewall, port and protocol settings on the DPM server,
protected machines, and a remote SQL Server if you're setting one up.
Grant user permissions - Specify who can interact with DPM.
DPM server System Center Data Used for DCOM DCOM 135/TCP Dynamic
Protection Manager communication
DCOM Setting between DPM server
and protected
machines
DPM server System Center Data Exception for All protocols All ports
Protection Manager Msdpm.exe (the DPM
service). Runs on the
DPM server
DPM server System Center Data Exception for All protocols All ports
Protection Dpmra.exe (protection
Protected machines Management agent service used to
Replication Agent back up and restore
data). Runs on the
DPM server and on
protected machines.
Add the DPM server to a domain Domain admin account, or user right to add workstation to
domain
Install DPM protection agent on machine you want to protect Domain account that's in the local administrators group on
the machine
Extend AD schema to enable end-user recovery Schema admin privileges for the domain
Grant DPM server permission to change container contents Domain admin privileges
Enable end-user recovery on DPM server Admin account on the DPM server
Install recovery point client software on protected machine Admin account on machine
Access previous versions of protected data from protected User account with access to protected share
machine
Recover SharePoint data SharePoint farm admin that's also an admin on the front-end
Web server on which the protection agent is installed.
Preparing your environment for System Center Data
Protection Manager
8 minutes to read
When deploying System Center - Data Protection Manager (DPM ) 2016 or later, use the following information to
plan your environment.
NOTE
For the supported versions of SQL, use the service packs that are currently in support by Microsoft.
For the below supported SQL versions, Standard, Enterprise and Datacenter (64-bit) editions are supported, based on
the availability.
DPM 2016 SQL Server 2014 SP2; SQL Server 2012 SP4.
DPM VERSION SQL VERSION
DPM 2016 UR2 and later SQL Server 2016 and SPs as detailed here
DPM 1807 and DPM 2019 - SQL Server 2016 and SPs as detailed here
REQUIREMENT DETAILS
Required features Database Engine Services, Reporting Services (for DPM 2019,
install SSRS with SQL 2017)
Note
Collations SQL_Latin1_General_CP1_CI_AS
Remote installation Install in the same domain and time zone as the DPM server.
When used to support DPM, a SQL Server can't share a
server with a domain controller.
Read about Setting up a remote SQL Server instance.
If you're deploying DPM as an Azure virtual machine, you can
specify an Azure virtual machine running SQL Server as a
remote SQL Server instance. You can't use an on-premises
SQL Server. Using an Azure SQL Database isn't currently
supported.
NOTE
If you are upgrading SQL Database to SQL 2017, ensure you install SQL SSRS post SQL upgrade.
DPM server
REQUIREMENT DETAILS
Disk for storage pool 1.5 times the size of the protected data 2-3 times the size of the protected data
Protected workloads
REQUIREMENT DETAILS
REQUIREMENT DETAILS
Protected workload size limits DPM 2016 and later with Modern Backup Storage do not
have LDM limits.
With DPM 2016 and later, you can protect more data per
DPM server. Up to 120 TB of storage limit per DPM server
has been tested. However, 120 TB is only a soft limit.
Validation is underway to test a higher limit. This guidance will
be updated post completion of the validation.
.NET framework All protected computers need at least .NET Framework 4.0
installed before you install the DPM protection agent.
Windows Management Framework (WMF) If you are protecting a server released prior to Windows
Server 2012, you must install the appropriate version of WMF
(Not applicable of DPM 2019) before installing the DPM agent:
Protected workloads Review the DPM protection support matrix for an up-to-date
list of protected workloads.
Networking
REQUIREMENT DETAILS
Domain trust DPM supports data protection across forests as long as you
establish a forest-level, two-way trust between the separate
forests.
Network configuration If you're protecting data over a wide area network (WAN),
you'll need a minimum bandwidth of 512 kilobits per second
(Kbps).
DPM doesn't support disjointed namespaces.
Remote management
REQUIREMENT DETAILS
Central Console Use the Central Console to administer multiple DPM servers
from a single location.
DPM Management Shell Install the DPM Management Shell on a client computer to
directly manage one or more DPM servers using Windows
PowerShell. Install it from the DPM Setup.
A major part of your System Center Data Protection Manager (DPM ) deployment will be figuring out how to
store data backed up by DPM. Learn about:
Add Modern Backup Storage
Short and long-term storage
Cloud storage with Azure Backup
Disk storage
Tape storage
Azure cloud Suitable for short-term Suitable for long-term - Efficient and cost-effective
storage storage offsite storage solution for
short and long-term
storage.
- Azure can be used as
storage for Hyper-V, SQL
Server, and file server data.
Azure can only be used to
back up data from servers
running Windows Server
2016, Windows Server 2012
R2, Windows Server 2012,
or Windows Server 2008 R2
with SP1.
- DPM must be running on
System Center 2012 SP1 or
later to use Azure Backup.
STORAGE SHORT-TERM LONG-TERM CHARACTERISTICS
Tape Some workloads can be All workloads can be backed - Short-term backup to tape
backed up directly to tape up to tape for long-term might be useful for data that
(D2T) for short-term offsite storage (D2D2T) doesn't change often and
storage. thus doesn't require
frequent backup.
These include file data - Long-term offsite tape
(volumes, shares, folders), storage is useful for data,
system state, SQL Server, which must be kept in order
Hyper-V, and Exchange to fulfill statutory
databases not configured on obligations
a DAG. - If you're using tape for
both long-term and short-
term protection, DPM
creates copies of the latest
short-term full backup in
order to generate the long-
term tape backup. We
recommend that you
schedule the short-term
protection backup to run a
day before the long-term
backup. That way you can
be sure you're using the
latest short-term backup in
order to create the long-
term backup.
- If you're using disk for
short-term backup and tape
for long-term, the long-term
backup will be taken from
the disk replica.
- Data recovery from tape
might be slow, and thus
better suited to data with a
high recovery point
objective (RPO) that doesn't
need to accessed and
recovered within a short
critical period after failure.
- You can't free up or erase a
tape that contains valid
recovery points. You'll need
to remove the sources from
a protection group and
expire the recovery points,
or modify the protection
group settings to clear tape
protection. To expiry a tape,
you mark it as free and then
unmark it and recatalog.
- Tape backup and recovery
might require manual
intervention such as tape
rotations.
- Long-term storage
capacity can be increased by
adding more tapes.
- A tape library or
standalone tape drive must
be physically attached to the
DPM server. The tape library
can be direct SCSI attached
or SAN.
or SAN.
STORAGE SHORT-TERM LONG-TERM CHARACTERISTICS
Disk All data backed up to DPM No long term storage to - Disks provide a quick
can be stored on disk for disk. method of data backup and
short-term storage (D2D) recovery. It's useful for data
that has a low RPO and thus
needs to be recovered
quickly after failure.
- Disks can provide
redundancy using disk
technologies such as RAID.
- Maximum disk retention is
448 days.
- Disk backup has no impact
on running workloads.
NOTE
We do not recommend NAS as a storage to prepare your DPM disk storage.
Disk limitations - The DPM server needs at least two disks installed. A
dedicated disk for the startup, system, and DPM installation
files; and one dedicated to the storage pool. In DPM, a disk is
defined as any disk device manifested as a disk in the
Windows Disk Management tool. DPM does not add any
disks containing startup files, system files, or any component
of the DPM installation to the storage pool.
- Disks added to the storage pool shouldn't have partitions.
To prepare disks, DPM reformats the disks and erases any
data.
- The storage pool supports most disk types, including IDE,
SATA and SCSI, and the storage pool supports both the
master boot record (MBR), and GUID partition table (GPT)
partition styles. Microsoft strongly recommends you use GPT
disks.
- If you use a SAN for the storage pool, Microsoft
recommends you create a separate zone for the disk and
tape. Don't mix devices in a single zone.
- DPM doesn't support USB/1394 disks in the storage pool.
- You can't use Storage Spaces for the disk storage pool.
- Some original equipment manufacturers (OEMs) include a
diagnostic partition installed from media they provide. The
diagnostic partition can also be named the OEM partition, or
the EISA partition. EISA partitions must be removed from
disks before you can add the disk to the storage pool.
- You can substitute custom volumes that you define in Disk
Management for volumes in the storage pool.
- We recommend you use extensible hardware so you can
add more capacity if you need to.
Dedup support DPM running as a Hyper-V virtual machine can store backup
data to VHDs in shared folders on a Windows File Server with
data deduplication enabled. For more information, see
Deduplicate DPM storage.
BEST PRACTICE DETAILS
Note that the longer your retention range, the fewer recovery
points you can create each day. For example, if your retention
range objective is 64 days, you can create just one recovery
point each day. If it's 8 days, you can create 8 recovery points
each day. With a retention range objective of 10 days, you
can create approximately 6 recovery points a day.
BEST PRACTICE DETAILS
Disk configuration If you're using direct-attached storage for the storage pool,
you can use any hardware-based configuration of redundant
array of independent disks (RAID), or you can use a "just a
bunch of disks" (JBOD) configuration. Don't create a software-
based RAID configuration on disks that you will add to the
storage pool.
Custom values In some cases you might want to use a custom volume,
where a custom volume isn't in the storage pool and is used
to store the replica and recovery points for a protection
group member. For example, you might want a greater
amount of control over storage for specific data sources or
critical data needs to be stored using a high-performance
LUN on a SAN.
PERFORMANCE/SCALAB
DISK CONFIGURATION CAPACITY COST RELIABILITY ILITY
JBOD 4 4 1 4
RAID 0 4 4 1 4
PERFORMANCE/SCALAB
DISK CONFIGURATION CAPACITY COST RELIABILITY ILITY
RAID 1 1 1 4 3
RAID 5 3 3 3 3
RAID 10 1 1 4 4
Next steps
After planning your storage, if you are considering tape storage, see the article, Identify compatible tape libraries.
If you are ready to install DPM, see the article, Install DPM.
Identify compatible tape libraries
4 minutes to read
Use the TechNet wiki to find the latest list of compatible tape libraries for System Center Data Protection Manager
(DPM ).
To certify a standalone tape drive, type DPMLibraryTest.exe /CERTIFY /TL <device name> /SA
Examples
The tool syntax is:
/LL List available tape libraries and drives DPMLibraryTest.exe /CERTIFY /LL
/AT Run all test cases Run test on the physical library:
DPMLibraryTest.exe /CERTIFY /TL
\\\\.\Changer0 /AT
SWITCH DETAILS EXAMPLE
To protect data sources with System Center Data Protection Manager (DPM ) you'll need to do the following:
Read What can DPM back up? to understand what's supported for DPM backup.
DPM applies backup settings to all data sources in a particular protection group. You'll need to figure out
how you want to gather data you want to protect into those groups. Examples include:
By computer - So that all data sources for a computer belonging to the same protection group. This
provides a single point of adjustment for the computer's performance loads. However, all data
sources will then have the same backup and recovery settings.
By workload - So that you separate files and each application data type into different protection
groups. This allows you to manage workloads as a group. However recovering a multi-application
server might require multiple tapes from different protection groups.
By RPO/RTO - Gather data sources with similar Recovery Point Objectives (RPOs) and Recovery
Time Objectives (RTOs). You control the RPO by setting the synchronization frequency for the
protection group which determines the amount of potential data loss (in time) in the case of
unexpected outages. The RTO measures the acceptable amount of time that data is unavailable and is
affected by the storage methods your select for the protection group.
By data characteristics - For example how often data changes, how rapidly it grows, or its storage
requirements.
Next steps
Deploy the DPM protection agent
Get DPM installed
17 minutes to read
Here's what you need to do to set up System Center Data Protection Manager (DPM ):
1. Read the Setup prerequisites
2. Verify the DPM operating system is compatible.
3. Set up a SQL Server database to store DPM settings and configuration information.
4. Set up DPM. You can Install DPM from the user interface, or Run an unattended install. Follow these
instructions if you want to Install DPM on a domain controller
Setup prerequisites
ENVIRONMENT DETAILS OR SPECIFICS FOR THE INSTALLATION
Basic DPM installation prerequisites A number of components are needed on the DPM server.
These are installed automatically during setup:
DPM database - Verify supported SQL Server versions for the DPM
database. - You can install SQL Server on the DPM server or
on a remote server.
- If you install the database remotely the machine running
the remote instance must be in the same domain and time
zone as the DPM server.
- If you're running a remote database, have it ready before
you install DPM
- You can't run SQL Server on a domain controller.
- If you're running a remote database, have it ready before
you install DPM. Make sure to run SQL Prep tool on remote
SQL computer.
- SQL Server can be standalone or running in a cluster.
- You can't use a SQL Server Always-On deployment.
- If you deploy DPM as an Azure virtual machine (VM) use an
Azure VM running SQL Server as a remote SQL Server
instance. You can't use an on-premises SQL Server in this
deployment, and using an Azure SQL Database isn't currently
supported.
- If SQL Server is clustered, Reporting Server and SQL Server
should be on different machines.
ENVIRONMENT DETAILS OR SPECIFICS FOR THE INSTALLATION
DPM installed as Hyper-V VM If you're installing DPM as a Hyper-V virtual machine note
that:
DPM as an Azure virtual machine DPM is supported on any Azure IaaS virtual machine
of size A2 or higher.
You can select a size for the DPM virtual machine
using the DPM Azure virtual machine size calculator.
When you set up the virtual machine create an
instance in the Standard compute tier because the
maximum IOPS per attached disk is higher in the
Standard tier than in the Basic tier.
DPM can protect the workloads as detailed here in
protection matrix.
DPM can protect workloads that run across multiple
Azure cloud services that have the same Azure virtual
network and Azure subscription.
DPM running as an Azure virtual machine can't
protect on-premises data.
Use a separate storage account for the DPM virtual
ENVIRONMENT DETAILS OR SPECIFICS FOR THE INSTALLATION
machine, because there are size and IOPS limits on a
storage account that might impact the performance
of the DPM virtual machine if shared with other
running virtual machines. The DPM virtual machine
and the protected workloads should be part of the
same Azure virtual network.
The number of disks that can be used for the target
storage (DPM storage pool) is limited by the size of
the virtual machine (maximum of 16). The Azure
Backup agent running on the DPM server needs
temporary storage for its own use (a cache location),
and for data restored from the cloud (local staging
area). Note that each Azure virtual machine comes
with some temporary disk storage. This is available to
the user as the volume D:\. The local staging area
needed by Azure Backup can be configured to reside
in D:\, and the cache location can be placed on C:\. In
this way, no space needs to be carved out from the
data disks attached to the DPM virtual machine.
You store data on Azure disks attached to the DPM
virtual machine. Once attached to the virtual
machine, the disks and the storage space are
managed from within DPM. The amount of data you
can back up depends on the number and size of disks
attached to the DPM virtual machine. There is a
maximum number of disks that can be attached to
each Azure virtual machine (4 disks for A2V2, A4V2,
A8V2), and maximum size of each disk (1 TB). This
determines the total backup storage pool available.
We recommend you retain data for one day on DPM-
attached Azure disk, and store data older than one
day in the Azure Backup service. This provides data
store for a longer retention range, and allows you to
protect a larger amount of data by offloading it to
Azure Backup.
If you want to scale your deployment you have the
following options:
Table A
NOTE
DPM 2016 requires SQL Server Management Studio (SSMS) version 16.5 or earlier. SSMS is no longer installed with SQL
Server; you must Download and install SQL Server Management Studio (SSMS) version 16.5.
SSMS version 17.0 or later is not supported with DPM 2016. For more information, see SQL Server Management
Studio 16.5 release.
With DPM 2019, you need to install SQL SSRS separately for SQL 2017. With SQL 2017 and later, SSRS does not get
installed as a part of SQL install. For more information, see Install SQL Server Reporting Services (2017 and later).
Install DPM
IMPORTANT
When installing DPM, use NetBIOS names for the domain name and SQL machine name. Do not use fully qualified domain
names (FQDN).
1. If required, extract the DPM 2016.exe (for DPM 2016)/DPM 2019.exe (for DPM 2019) file onto the
machine on which you want to run DPM. To do this, run the exe file and on the Welcome screen, click
Next. In Select Destination Location specify where you want to extract the installation files to. In
Ready to Extract click Extract.. After the extraction finishes go to the specified location and run
Setup.exe.
2. On the Welcome page of DPM Setup click Next. On the License Terms page accept the agreement >
OK.
3. On the Prerequisites Check page, wait for the check and resolve any issues before proceeding.
4. On the Product Registration page click Next. On the Microsoft Update Opt-In page, choose whether
you want to include DPM in your Microsoft Updates.
5. On Summary of Settings page check the settings and click Install. After install is complete click Close.
It will automatically launch Windows update to check for changes.
IMPORTANT
When installing DPM, use NetBIOS names for the domain name and SQL machine name. Do not use fully qualified
domain names (FQDN).
When creating DPMSetup.ini, replace the text inside <> with values from your own environment. Lines
beginning with the hash (#) are commented out, and DPM setup uses the default values. To specify your
own values, type the values within the <> and delete the hash (#).
[OPTIONS]
UserName = <A user with credentials to install DPM>
CompanyName = <Name of your company>
ProductKey = <The 25-character DPM product key in the format xxxxx-xxxxx-xxxxx-xxxxx-xxxxx>
# SqlAccountPassword = <The password to the DPM$ account>
# StandardAgentLicenses = <No. of standard agent licenses you have purchased>
# EnterpriseAgentLicenses = <No. of enterprise agent licenses you have purchased>
# ProgramFiles = C:\Program Files\Microsoft Data Protection Manager
# DatabaseFiles = C:\Program Files\Microsoft Data Protection Manager\DPM\DPMDB
# IntegratedInstallSource = <Location of the DPM setup files>
# ---For using a remote SQL Server instance ---
# SQLMachineName = <Name of the SQL Server computer> OR <SQL Cluster Name>
# SQLInstanceName = <Name of the instance of SQL Server that Setup must use>
# SQLMachineUserName = <User name that Setup must user>
# SQLMachinePassword = <Password for the user name Setup must use>
# SQLMachineDomainName = <Domain to which the SQL Server computer is attached>
# ---For using a reporting SQL Server instance in case of DPMDB in SQL Cluster ---
# ReportingMachineName = <Name of the SQL Server computer>
# ReportingInstanceName = <Name of the instance of SQL Server that Setup must use, SSRS in case of SQL
2017>
# ReportingMachineUserName = <User name that Setup must user>
# ReportingMachinePassword = <Password for the user name Setup must use>
# ReportingMachineDomainName = <Domain to which the SQL Server computer is attached>
6. After saving the file, at an elevated command prompt on the installation server, type:
start /wait [media location]\setup.exe /i /f <path>\DPMSetup.ini /l <path>\dpmlog.txt .
[media location] indicates where you'll run setup.exe from.
<path> is the location of the .ini file.
NOTE
Make a note of this account because you need to configure the SQL Server services during the installation of SQL
Server. You can name this user account anything that you want; however, for the purposes of easily identifying the
account's purpose, you might want to give it a significant name, such as DPMSQLSvcsAcct. For the purposes of
these procedures, this account is referred as the DPMSQLSvcsAcct account.
3. On the primary domain controller, create another domain user account with the lowest possible
credentials and name the account DPMR$MACHINENAME, assign it a strong password that does not
expire, and then add this account to the DPMDBReaders$<Computer Name> group.
4. Then create the security groups and user accounts needed for the SQL Server database with scope: global
and Group type: security. The group or account should be in this format
<grouporaccountnameComputerName>.
SQLServerSQL2005BrowserUser$<Computer Name>
SQLServerMSSQLServerADHelperUser$<Computer Name>
SQLServerReportServerUser$<Instance ID><Instance Name>
SQLServerMSASUser$<Computer Name><Instance Name>
SQLServerDTSUser$<Computer Name>
SQLServerFDHostUser<Computer Name><Instance Name>
where <Computer Name> is the computer name of the domain controller on which SQL Server
2008 will be installed.
<Instance Name> is the name of the instance of SQL Server that you plan to create on the
domain controller. The instance name can be any name other than the default DPM instance
name (MSDPM2010).
<Instance ID> by default is assigned by SQL Server Setup and indicates that the group applies
to Reporting Services (MSRS ) for the major version of the instance (10) of SQL Server. For this
release, this value is MSRS1A0_50.
5. On the primary domain controller, add the domain user account that you created earlier (the
DPMSQLSvcsAcct account) to the following groups:
SQLServerReportServerUser$<ComputerName>$MSRS10.<InstanceID>
SQLServerMSASUser$<ComputerName>$<InstanceID>
6. After you've complete these steps you can install SQL Server:
Log onto the domain controller on which you want to install DPM using the domain user account
that you created earlier. Let's refer to this account as DPMSQLSvcsAcct.
Start to install SQL Server. On the Server Configuration - Service Accounts page of Setup you
specify the login account for the SQL Server services (SQL Server Agent, SQL Server Database
Engine, SQL Server Reporting services) to run under the user account DPMSQLSvcsAcct.
After SQL Server is installed, open SQL Server Configuration Manager > SQL Server
Network Configuration > Protocols, right-click Named Pipes > Enable. You'll need to stop
and restart the SQL Server service.
7. Then you can install DPM:
On the SQL Server Settings page type the name of the instance of SQL Server that you installed
in procedure as localhost\<Instance Name>, and then type the credentials for the first domain user
account you created (the DPMSQLSvcsAcct account). This account must be a member of the local
Administrators group on the domain controller where the remote instance is installed. After setup
is complete, you can remove the user account from the local Administrators group.
On the Security Settings page you'll need to enter the same password that you used when you
created the DPMR$MACHINENAME user account earlier.
Open SQL Server Management Studio and connect to the instance of SQL Server that DPM is
configured to use. Click New Query, copy the text below to the right pane, and then press F5 to
run the query.
use DPMDB
declare @refresh_jobid uniqueidentifier
select @refresh_jobid = ScheduleId from tbl_SCH_ScheduleDefinition where JobDefinitionId in
(select JobDefinitionId from tbl_JM_TaskDefinition where TaskDefinitionId in (select distinct
TaskDefinitionID from tbl_TE_TaskTrail
where VerbID = '53603503-C4C8-4D0E-8F1E-D2F3868E51E3')) and IsDeleted=0
exec msdb.dbo.sp_update_job @job_name =@refresh_jobid, @enabled=0
update tbl_SCH_ScheduleDefinition
set IsDeleted=1
where ScheduleId = @refresh_jobid
NOTE
SQL 2017 is supported as a database with DPM 1801 in upgrade scenarios. With DPM 2019, SQL 2017 is supported as a
DPM database, in both new installation and upgrade scenarios of DPM.
This article provides the upgrade information for System Center 2019 - Data Protection Manager (DPM ).
4. After the backup is complete, copy the output file to the remote SQL Server. If this is a SQL Cluster, copy it
to the active node hosting the SQL instance you want to use in the DPM upgrade. Before you can restore
the DPM database, you must copy it to the Shared Cluster disk.
5. On the Remote SQL Server, start Microsoft SQL Management Studio and connect to the SQL instance
you want to use in the DPM upgrade. If this is a SQL Cluster, do this on the Active node that you copied the
DPM backup file to. The backup file should now be located on the shared cluster disk.
6. Right-click the Databases icon, then select the Restore Database… option. This starts the restore wizard.
7. Select Device under Source, and then locate the database backup file that was copied in the previous step
and select it. Verify the restore options and restore location, and then select OK to start the restore. Fix any
issue that arise until the restore is successful.
8. After the restore is complete, the restored database will be seen under Databases with the original name.
This database will be used during the upgrade. You can exit Microsoft SQL Management Studio and
start the upgrade process on the original DPM server.
9. If the new SQL server is a remote SQL server, install the SQL management tools on the DPM server. The
SQL management tools must be the same version matching the SQL server hosting the DPMDB.
Start upgrade to migrate DPMDB to a different SQL Server
NOTE
If sharing a SQL instance, run the DPM installations (or upgrades) sequentially. Parallel installations may cause errors.
1. After the pre-migration preparation steps are complete, start the DPM 2019 Installation process. DPM
Setup shows the information about current instance of SQL server pre-populated. This is where you can
select a different instance of SQL server, or change to a Clustered SQL instance used in the migration.
2. Change the SQL Settings to use the instance of SQL server you restored the DPM Database to. If it’s a SQL
cluster, you must also specify a separate instance of SQL Server used for SQL reporting. It's presumed that
firewall rules and SQLPrep are already ran. You have to enter correct credentials and then click the Check
and Install button.
3. Prerequisite check should succeed, click Next to continue with the upgrade.
4. Continue with the wizard options and complete the setup.
5. After the setup is complete, the corresponding database name on the instance specified will now be
DPMPB_DPMServerName. Because this may be shared with other DPM servers, the naming convention
for the DPM database will now be: DPM2016$DPMDB_DPMServerName
3. Create a new protection group that uses Modern Backup Storage, and include the unprotected data sources.
3. Add a backup destination and file name, and then select OK to start the backup.
4. After the backup is complete, copy the output file to the remote SQL Server. If this is a SQL Cluster, copy it
to the active node hosting the SQL instance you want to use in the DPM upgrade. Before you can restore
the DPM database, you must copy it to the Shared Cluster disk.
5. On the Remote SQL Server, start Microsoft SQL Management Studio and connect to the SQL instance
you want to use in the DPM upgrade. If this is a SQL Cluster, do this on the Active node that you copied the
DPM backup file to. The backup file should now be located on the shared cluster disk.
6. Right-click the Databases icon, then select the Restore Database… option. This starts the restore wizard.
7. Select Device under Source, and then locate the database backup file that was copied in the previous step
and select it. Verify the restore options and restore location, and then select OK to start the restore. Fix any
issue that arise until the restore is successful.
8. After the restore is complete, the restored database will be seen under the Databases with the original
name. This Database will be used during the upgrade. You can exit Microsoft SQL Management Studio
and start the upgrade process on the original DPM Server.
9. If the new SQL Server is a remote SQL server, install the SQL management tools on the DPM server. The
SQL management tools must be the same version matching the SQL server hosting the DPMDB.
Starting upgrade to migrate DPMDB to a different SQL Server
NOTE
If sharing a SQL instance, run the DPM installations (or upgrades) sequentially. Parallel installations may cause errors.
1. After the pre-migration preparation steps are complete, start the DPM 2016 Installation process. DPM
Setup shows the information about current instance of SQL Server pre-populated. This is where you can
select a different instance of SQL Server, or change to a Clustered SQL instance used in the migration.
2. Change the SQL Settings to use the instance of SQL Server you restored the DPM Database to. If it’s a
SQL cluster, you must also specify a separate instance of SQL Server used for SQL reporting. It's presumed
that firewall rules and SQLPrep are already ran. You have to enter correct credentials and then click the
Check and Install button.
3. Prerequisite check should succeed, press NEXT to continue with the upgrade.
4. Continue the wizard.
5. After setup is complete, the corresponding database name on the instance specified will now be
DPMPB_DPMServerName. Because this may be shared with other DPM servers, the naming convention
for the DPM database will now be: DPM2016$DPMDB_DPMServerName
5. On the Select Group Members screen, in the Available members pane, DPM lists the members with
protection agents. For the purposes of this example, select volume D:\ and E:\ to add them to the Selected
members pane. Once you have chosen the members for the protection group, click Next.
6. On the Select Data Protection Method screen, type a name for the Protection group, select the
protection method(s) and click Next. If you want short term protection, you must use Disk backup.
7. On the Specify Short-Term Goals screen specify the details for Retention Range and Synchronization
Frequency, and click Next. If desired, click Modify to change the schedule when recovery points are taken.
8. The Review Disk Storage Allocation screen provides details about the selected data sources, their size,
the Space to be Provisioned, and Target Storage Volume.
The storage volumes are determined based on the workload volume allocation (set using PowerShell) and
the available storage. You can change the storage volumes by selecting other volumes from the drop-down
menu. If you change the Target Storage, the Available disk storage dynamically changes to reflect the
Free Space and Underprovisioned Space.
The Underprovisioned Space column in Available disk storage, reflects the amount of additional
storage needed if the data sources grow as planned. Use this value to help plan your storage needs to
enable smooth backups. If the value is zero, then there are no potential problems with storage in the
foreseeable future. If the value is a number other than zero, then you do not have sufficient storage
allocated - based on your protection policy and the data size of your protected members.
The remainder of the New Protection Group wizard is unchanged from DPM 2012 R2. Continue through the
wizard to complete creation of your new protection group.
3. Create a new protection group that uses Modern Backup Storage, and include the unprotected data sources.
3. Add a backup destination and file name, and then select OK to start the backup.
4. After the backup is complete, copy the output file to the remote SQL Server. If this is a SQL Cluster, copy it
to the active node hosting the SQL instance you want to use in the DPM upgrade. You have to copy it to the
Shared Cluster disk before you can restore it.
5. On the Remote SQL Server, start Microsoft SQL Management Studio and connect to the SQL instance
you want to use in the DPM upgrade. If this is a SQL Cluster, do this on the Active node that you copied the
DPM backup file to. The backup file should now be located on the shared cluster disk.
6. Right-click the Databases icon, then select the Restore Database… option. This starts the restore wizard.
7. Select Device under Source, and then locate the database backup file that was copied in the previous step
and select it. Verify the restore options and restore location, and then select OK to start the restore. Fix any
issue that arise until the restore is successful.
8. After the restore is complete, the restored database will be seen under the Databases with the original
name. This Database will be used during the upgrade. You can exit Microsoft SQL Management Studio
and start the upgrade process on the original DPM Server.
9. If the new SQL Server is a remote SQL server, install the SQL management tools on the DPM server. The
SQL management tools must be the same version matching the SQL server hosting the DPMDB.
Starting upgrade to migrate DPMDB to a different SQL Server
NOTE
If sharing a SQL instance, run the DPM installations (or upgrades) sequentially. Parallel installations may cause errors.
1. After the pre-migration preparation steps are complete, start the DPM 2016 Installation process. DPM
Setup shows the information about current instance of SQL Server pre-populated. This is where you can
select a different instance of SQL Server, or change to a Clustered SQL instance used in the migration.
2. Change the SQL Settings to use the instance of SQL Server you restored the DPM Database to. If it’s a
SQL cluster, you must also specify a separate instance of SQL Server used for SQL reporting. It's presumed
that firewall rules and SQLPrep are already ran. You have to enter correct credentials and then click the
Check and Install button.
3. Prerequisite check should succeed, press NEXT to continue with the upgrade.
4. Continue the wizard.
5. After setup is complete, the corresponding database name on the instance specified will now be
DPMPB_DPMServerName. Because this may be shared with other DPM servers, the naming convention
for the DPM database will now be: DPM2016$DPMDB_DPMServerName
5. On the Select Group Members screen, in the Available members pane, DPM lists the members with
protection agents. For the purposes of this example, select volume D:\ and E:\ to add them to the Selected
members pane. Once you have chosen the members for the protection group, click Next.
6. On the Select Data Protection Method screen, type a name for the Protection group, select the
protection method(s) and click Next. If you want short term protection, you must use Disk backup.
7. On the Specify Short-Term Goals screen specify the details for Retention Range and Synchronization
Frequency, and click Next. If desired, click Modify to change the schedule when recovery points are taken.
8. The Review Disk Storage Allocation screen provides details about the selected data sources, their size,
the Space to be Provisioned, and Target Storage Volume.
The storage volumes are determined based on the workload volume allocation (set using PowerShell) and
the available storage. You can change the storage volumes by selecting other volumes from the drop-down
menu. If you change the Target Storage, the Available disk storage dynamically changes to reflect the
Free Space and Underprovisioned Space.
The Underprovisioned Space column in Available disk storage, reflects the amount of additional
storage needed if the data sources grow as planned. Use this value to help plan your storage needs to
enable smooth backups. If the value is zero, then there are no potential problems with storage in the
foreseeable future. If the value is a number other than zero, then you do not have sufficient storage
allocated - based on your protection policy and the data size of your protected members.
The remainder of the New Protection Group wizard is unchanged from DPM 2012 R2. Continue through the
wizard to complete creation of your new protection group.
3. Create a new protection group that uses Modern Backup Storage, and include the unprotected data sources.
Next steps
Learn how to add storage.
Add Modern Backup Storage to DPM
13 minutes to read
Modern Backup Storage (MBS ) was introduced in System Center Data Protection Manager (DPM ) 2016 to deliver
50% storage savings, 3X faster backups, and more efficient, workload-aware storage.
MBS is enabled automatically when you're running at least DPM 2016 on Windows Server 2016. If DPM is
running on a version of Windows Server older than Windows Server 2016, it doesn't use MBS.
MBS provides intelligent storage for short-term backup to disk. MBS provides faster disk backup, consuming
less disk space. Without MBS, each data source needs two volumes, one for the initial backup and the other for
delta changes.
MBS backups are stored on an ReFS disk. It uses ReFS block cloning, and VHDX technology, Learn more.
NOTE
DPM does not support deduplication on ReFS disk used for MBS backups.
DPM 2016 accepts volumes for storage. Once you add a volume, DPM formats the volume to ReFS to use the
new features of Modern Backup Storage. Volumes cannot reside on a dynamic disk. Use only a basic disk.
While you can directly give a volume to DPM, you may face issues in extending the volume if a need arises later. To
prepare DPM for future expansion, use the available disks to create a storage pool, then create volumes on the
storage pool, and expose the volumes to DPM. These virtual volumes can then be extended when needed.
The remainder of this article provides the detail on how to add a volume and to expand it later.
Setting up MBS
Setting up MBS consists of the following procedures. Note that you cannot attach locally created VHD (VHDX)
files, and use them as storage on a physical DPM server.
1. Make sure you're running DPM 2016 or later on a VM running Windows Server 2016 or later.
2. Create a volume. To create a volume on a virtual disk in a storage pool:
Add a disk to the storage pool
Create a virtual disk from the storage pool, with layout set to Simple. You can then add additional disks,
or extend the virtual disk.
Create volumes on the virtual disk.
3. Add the volumes to DPM.
4. Configure workload-aware storage.
Create a volume
1. Create a storage pool in the File and Storage Services of Server Manager.
2. Add the available physical disks to the storage pool.
Adding only one disk to the pool keeps the column count to 1. You can then add disks as needed
afterwards.
If multiple disks are added to the storage pool, the number of disks is stored as the number of
columns. When more disks are added, they can only be a multiple of the number of columns.
3. Create a virtual disk from the storage pool, with the layout set to Simple.
Volume Exclusion
DPM servers may be managed by a team of Administrators. While there are guidelines on storage that should be
used for backups, a wrong volume given to DPM as backup storage may lead to loss of critical data. Hence, with
DPM 2016 UR4 and later, you can prevent such scenarios by configuring those volumes to not be shown as
available for storage using PowerShell.
For Example, to exclude F:\ and C:\MountPoint1, here are the steps:
1. Run the Set0DPMGlobalPropery commandlet:
After removing volume exclusion, rescan the storage. All volumes and mount points, except System Volumes, are
available for DPM storage.
NOTE
We recommend you to deploy DPM 2019 (using tiered volumes) on Windows Server 2019 to achieve enhanced backup
performances.
MBS is enabled automatically when you're running at least DPM 2016 on Windows Server 2016. If DPM is
running on a version of Windows Server earlier than Windows Server 2016, it doesn't use MBS.
MBS provides intelligent storage for short-term backup to disk. MBS provides faster disk backup, consuming
less disk space. Without MBS, each data source needs two volumes, one for the initial backup and the other for
delta changes.
MBS backups are stored on an ReFS disk. It uses ReFS block cloning, and VHDX technology.Learn more.
With DPM 2019 and later, you can use tiered volumes for DPM native storage which delivers 50-70% faster
backups
NOTE
DPM does not support deduplication on ReFS disk used for MBS backups.
DPM 2019 accepts volumes/disks for storage. Once you add a volume, DPM formats the volume to ReFS to use
the new features of Modern Backup Storage. Volumes cannot reside on a dynamic disk, use only a basic disk.
You can directly give a volume to DPM, however, you may have issues in extending the volume if a need arises
later. You can create additional volumes using storage pools, which could be exposed to DPM and extended as
needed. The following sections provide the details on how to create a tiered volume, add a volume to DPM, and
expand it later
Follow the steps in the procedures below to set up MBS with tiered storage. Follow the procedures in sequence, as
listed below.
1. Configure DPM storage.
NOTE
Migrate your current backups to a temporary volume using Volume Migration, in case you wish to modify your
existing storage to tiered storage.
NOTE
Applicable only if you have migrated your earlier backups in Step 1.
7. Check the media type of the disk included. At least one of the disks should be SSD, required for SSD
Tiering.
Add all the disks including SSDs to the storage pool.
Add only one disk to the pool to keep the column count to 1. You can then add disks as needed
afterwards.
NOTE
If you add multiple disks to the storage pool at a go, the number of disks is stored as the number of
columns. When more disks are added, they can only be a multiple of the number of columns.
For DPM running on virtual machines, expose the VHDs carved out of physical SSDs & HDDs of required
size from the host computer to the VM, and use them as a tiered storage as explained above.
10. Check the options made, and click Create to create a new storage pool.
After successful creation of the storage pool, the newly created storage pool gets listed under STORAGE POOL .
PHYSICAL DISK displays the disks that are present in the selected pool.
Disable Write -Back Cache
Disable Write-Back Cache to disable auto caching at storage pool level (needed only for tiered storage).
To do this, go to PowerShell and execute the following commands:
NOTE
Tiered Storage is possible only when the storage pool contains a mixture of SSD and HDD.
5. Click Next and select Enable enclosure awareness (if required).
Create a volume
Follow these steps:
1. Select the virtual disk that you created and launch the New Volume Wizard.
2. In the New Volume Wizard, click Next, assign drive letter, and specify the size.
Note that you can skip this step if more than 10% of SSD is available. This can be disabled later if there is a
performance degradation in terms of backup speeds.
Now, add the newly created volumes to DPM storage using the procedure detailed below.
Changes made using the PowerShell cmdlet are reflected in the DPM Management console.
Volume Exclusion
DPM servers may be managed by a team of Administrators. While there are guidelines on storage that should be
used for backups, a wrong volume given to DPM as backup storage may lead to loss of critical data. Hence, with
DPM 2016 UR4 and later, you can prevent such scenarios by configuring those volumes to not be shown as
available for storage using PowerShell.
For Example, to exclude F:\ and C:\MountPoint1, use these steps:
1. Run the Set0DPMGlobalPropery commandlet:
After removing volume exclusion, rescan the storage. All volumes and mount points, except System Volumes, are
available for DPM storage.
System Center Data Protection Manager (DPM ) can use data deduplication.
Data deduplication (dedup) finds and removes duplicated data in a volume while ensuring data remains correct
and complete. Learn more about deduplication planning.
Dedup reduces storage consumption and although the amount of redundancy for a set of data will depend
on the workload and data type, typically backup data shows strong savings when dedup is used.
Data redundancy can be further reduced with dedup when backed up data of similar types and workloads is
processed together.
Dedup is designed to be installed on primary data volumes without additional dedicated hardware so that it
doesn't impact the primary workload on the server. The default settings are nonintrusive because they allow
data to age for five days before processing a particular file, and has a default minimum file size of 32 KB.
The implementation is designed for low memory and CPU usage.
Dedup can be implemented on the following workloads:
General file shares: Group content publication and sharing, user home folders, and Folder
Redirection/Offline Files
Software deployment shares: Software binaries, images, and updates
VHD libraries: Virtual hard disk (VHD ) file storage for provisioning to hypervisors
VDI Deployments (Windows Server 2012 R2 only): Virtual Desktop Infrastructure (VDI)
deployments using Hyper-V
Virtualized backup: Backup solutions (such as DPM running in a Hyper-V virtual machine) that save
backup data to VHD/VHDX files on a Windows File Server.
Recommended deployment
To deploy DPM as a virtual machine backing up data to a dedupl volume we recommend the following
deployment topology:
DPM running in a virtual machine in a Hyper-V host cluster.
DPM storage using VHD/VHDX files stored on an SMB 3.0 share on a file server.
For our test example we configured the file server as a scaled-out file server (SOFS ) deployed using
storage volumes configured from Storage Spaces pools built using directly connected SAS drives. Note that
this deployment ensures performance at scale.
Note that:
This deployment is supported for DPM 2012 R2, and for all workload data that can be backed up by DPM
2012 R2.
All the Windows File Server nodes on which DPM virtual hard disks reside and on which dedup will be
enabled must be running Windows Server 2012 R2 with at least Update Rollup November 2014.
We'll provide general recommendations and instructions for the scenario deployment. Whenever
hardware-specific examples are given, the hardware deployed in the Microsoft Cloud Platform System
(CPS ) is used for reference.
This example uses remote SMB 3.0 shares to store the backup data, so primary hardware requirements
center around the File Server nodes rather than the Hyper-V nodes. The following hardware configuration
is used in CPS for backup and production storage. Note that the overall hardware is used for both backup
and production storage, but the number of drives listed in the drive enclosures are only those used for
backup.
4 node Scale Out File Server cluster
Per node configuration
2x Intel(R ) Xeon(R ) CPU E5-2650 0 @ 2.00GHz, 2001 MHz, 8 cores, 16 logical processors
128GB 1333MHz RDIMM memory
Storage connections: 2 ports of SAS, 1 port of 10GbE iWarp/RDMA
4 JBOD drive enclosures
18 Disks in each JBOD - 16 x 4TB HDDs + 2 x 800GB SSDs
Dual path to each drive - Multipath I/O load balancing policy set to failover only
SSDs configured for write back cache (WBC ) and the rest for dedicated journal drives
This command also modifies the following volume level dedup settings:
Set UsageType to HyperV: This results in dedup processing open files, which is required
because the VHDX files used for backup storage by DPM remain open with DPM running in
its virtual machine.
Disable PartialFileOptimization: This causes dedup to optimize all sections of an open file
rather scan for changed sections with a minimum age.
Set MinFileAgeDays parameter to 0: With PartialFileOptimization disabled, MinFileAgeDays
changes its behavior so that dedup only considers files that haven't changed in that many
days. Since we want dedup to begin processing the backup data in all DPM VHDX files
without any delay, we need to set MinFileAgeDays to 0.
For more information on setting up deduplication see Install and Configure Data Duplication.
2. Then added the created virtual hard disks to the DPM server as follows:
Import-Module "DataProtectionManager"
Set-StorageSetting -NewDiskPolicy OnlineAll
$dpmdisks = @()
$dpmdisks = Get-DPMDisk -DPMServerName $env:computername | ? {$_.CanAddToStoragePool -
eq $true -and $_.IsInStoragePool -eq $false -and $_.HasData -eq $false}
Add-DPMDisk $dpmdisks
Note that this step configures a storage pool as the disk or disks on which DPM stores replicas and
recovery points for protected data. This pool is part of the DPM configuration and is separate from the
Storage Spaces pool used to create the data volumes described in the previous section. For more
information on DPM storage pools see Configure disk storage and storage pools.
2. Tune dedup processing for backup data files-Run the following PowerShell command to set to start
optimization without delay and not to optimize partial file writes. Note that by default Garbage Collection
(GC ) jobs are scheduled every week, and every fourth week the GC job runs in "deep GC" mode for a more
exhaustive and time intensive search for data to remove. For the DPM workload, this "deep GC" mode does
not result in any appreciative gains and reduces the amount of time in which dedup can optimize data. We
therefore disable this deep mode.
3. Tune performance for large scale operations-Run the following PowerShell script to:
Disable additional processing and I/O when deep garbage collection runs
Reserve additional memory for hash processing
Enable priority optimization to allow immediate defragmentation of large files
In this configuration, DPM is configured to back up virtual machines between 10 PM and 6 AM. Deduplication is
scheduled for the remaining 16 hours of the day. Note that the actual dedup time you configure will depend on the
volume size. See Sizing Volumes for Data Deduplication for more information. A 16 hour deduplication window
starting at 6 AM after the backup window ends would be configured as follows from any individual cluster node:
#disable default schedule
Set-DedupSchedule * -Enabled:$false
#Remainder of the day after an 8 hour backup window starting at 10pm $dedupDuration = 16
$dedupStart = "6:00am"
#On weekends GC and scrubbing start one hour earlier than optimization job.
# Once GC/scrubbing jobs complete, the remaining time is used for weekend
# optimization.
$shortenedDuration = $dedupDuration - 1
$dedupShortenedStart = "7:00am"
#if the previous command disabled priority optimization schedule
#reenable it
if ((Get-DedupSchedule -name PriorityOptimization -ErrorAction SilentlyContinue) -ne $null)
{
Set-DedupSchedule -Name PriorityOptimization -Enabled:$true
}
#set weekday and weekend optimization schedules
New-DedupSchedule -Name DailyOptimization -Type Optimization -DurationHours $dedupDuration -Memory 50 -
Priority Normal -InputOutputThrottleLevel None -Start $dedupStart -Days
Monday,Tuesday,Wednesday,Thursday,Friday
New-DedupSchedule -Name WeekendOptimization -Type Optimization -DurationHours $shortenedDuration -Memory 50 -
Priority Normal -InputOutputThrottleLevel None -Start $dedupShortenedStart -Days Saturday,Sunday
#re-enable and modify scrubbing and garbage collection schedules
Set-DedupSchedule -Name WeeklyScrubbing -Enabled:$true -Memory 50 -DurationHours $dedupDuration -Priority
Normal -InputOutputThrottleLevel None -Start $dedupStart -StopWhenSystemBusy:$false -Days Sunday
Set-DedupSchedule -Name WeeklyGarbageCollection -Enabled:$true -Memory 50 -DurationHours $dedupDuration -
Priority Normal -InputOutputThrottleLevel None -Start $dedupStart -StopWhenSystemBusy:$false -Days Saturday
#disable background optimization
if ((Get-DedupSchedule -name BackgroundOptimization -ErrorAction SilentlyContinue) -ne $null)
{
Set-DedupSchedule -Name BackgroundOptimization -Enabled:$false
}
Whenever the backup window is modified it's vital that the deduplication window is modified along with it so they
don't overlap. The deduplication and backup window don't have to fill up the full 24 hours of the day, but it's highly
recommended that they do to allow for variations in processing time due to expected daily changed in workloads
and data churn.
Monitoring
DPM and data deduplication can be monitored to ensure that:
Sufficient disk space is provisioned to store the backup data
DPM backup jobs are completing normally
Deduplication is enabled on the backup volumes
Deduplication schedules are set correctly
Deduplication processing is completing normally on a daily basis
Deduplication savings rate matches assumptions made for system configuration
The success of deduplication depends on the overall system hardware capabilities (including CPU processing
speed, I/O bandwidth, storage capacity), correct system configuration, the average system load, and the daily
amount of modified data.
You can monitor DPM using the DPM Central Console. See Install Central Console.
You can monitor dedup to check the dedup status, saving rate and schedule status using the following PowerShell
commands:
Get status:
PS C:\> Get-DedupStatus
FreeSpace SavedSpace OptimizedFiles InPolicyFiles Volume
-------------- ---------- -------------- ------------- ------
280.26 GB 529.94 GB 36124 36125 X:
151.26 GB 84.19 GB 43017 43017 Z:
Get savings:
PS C:\> Get-DedupVolume
Enabled SavedSpace SavingsRate Volume
------- ---------- ----------- ------
True 529.94 GB 74 % X:
Summary
The combination of deduplication and DPM provides substantial space savings. This allows higher retention rates,
more frequent backups, and better TCO for the DPM deployment. The guidance and recommendations in this
document should provide you with the tools and knowledge to configure deduplication for DPM storage and see
the benefits for yourself in your own deployment.
Common questions
Q: DPM VHDX files need to be 1TB of size. Does this mean DPM cannot backup a VM or SharePoint or SQL DB
or file volume of size > 1TB?
A: No. DPM aggregates multiple volumes into one to store backups. So, the 1TB file size doesn't have any
implications for data source sizes that DPM can backup.
Q: It looks as though DPM storage VHDX files must be deployed on remote SMB file shares only. What will
happen if I store the backup VHDX files on dedup-enabled volumes on the same system where the DPM virtual
machine is running?
A: As discussed above, DPM, Hyper-V and dedup are storage and compute intensive operations. Combining all
three of them in a single system can lead to I/O and process intensive operations that could starve Hyper-V and its
VMs. If you decide to experiment configuring DPM in a VM with the backup storage volumes on the same
machine, you should monitor performance carefully to ensure that there is enough I/O bandwidth and compute
capacity to maintain all three operations on the same machine.
Q: You recommend dedicated, separate deduplication and backup windows. Why can't I enable dedup while DPM
is backing up? I need to backup my SQL DB every 15 minutes.
A: Dedup and DPM are storage intensive operations and having both of them running at the same time can be
inefficient and lead to I/O starvation. Therefore, to protect workloads more than once a day (for example SQL
Server every 15 minutes) and to enable dedup at the same time, ensures there's enough I/O bandwith and
computer capacity to avoid resource starvation.
Q: Based on the configuration described, DPM needs to be running in a virtual machine. Why can't I enable dedup
on replica volume and shadow copy volumes directly rather than on VHDX files?
A: Dedup does deduplication per volume operating on individual files. Since dedup optimizes at the file level, it is
not designed to support the VolSnap technology that DPM leverages to store its backup data. By running DPM in
a VM, Hyper-V maps the DPM volume operations to the VHDX file level, allowing dedup to optimize backup data
and provide larger storage savings.
Q: The above sample configuration has created only 7.2TB volumes. Can I create bigger or smaller volumes?
A: Dedup runs one thread per volume. As the volume size becomes bigger, dedup requires more time to complete
its optimization. On the other hand with small volumes there is less data in which to find duplicate chunks, which
can result in reduced savings. So, it is advisable to fine tune the volume size based on total churn and system
hardware capabilities for optimal savings. More detailed information on determining volume sizes used with
deduplication can be found in Sizing volumes for Deduplication in Windows Server. For more detailed
information on determining volume sizes used with deduplication see Sizing Volumes for Data Deduplication.
Deploy the DPM protection agent
10 minutes to read
The System Center Data Protection Manager (DPM ) protection agent is software that you install on each
computer that contains data you want to back up with DPM. It consists of two components - the protection agent
itself and an agent coordinator. Here's what it does:
Identifies data that DPM can protect and recover.
Allows the DPM server to browse the shares, volumes, and folders on the protected computer.
Creates a change journal for each protected volume and stores the journal in a hidden file on that volume.
it records any changes to protected data in the change journal, and transfers the journal from the protected
computer to the DPM server so that DPM can synchronize the primary data with the replica.
You'll set up the agent as follows:
If the computer containing data you want to back up is behind a firewall you'll need to set up firewall
exceptions.
If the computer isn't behind a firewall, or you've configured firewall exceptions to allow access, you can
Install the agent from the DPM console.
Alternatively if you don't have access through the firewall, the computer you want to protect is in a
workgroup or untrusted domain, or you simply need to use a different installation method, you can Install
the agent manually and then Attach the agent.
A System Center Data Protection Manager (DPM ) protection group is a collection of data sources such as
volumes, shares, or application workloads, which have common backup and restore settings. The protection group
settings specify:
Data sources - The servers, computers, and workloads you want to protect.
Back-up storage - How the protected data should be backed up in the short-term and long-term.
Recovery points - The recovery points from which replicated data can be recovered.
Allocated disk space - The disk space allocated to data from the storage pool.
Initial replication - How the initial replication of data should be handled, using either over the network or
manually offline.
Consistency checks - How replicated data should be checked for consistency.
The topics in this section provide guidelines for making the decisions involved in creating a protection group.
DPM storage Data source size x (1 + log change x DPM storage pool or custom volume
Retention Range in Days x Number of
backups per day) x (1.05)
Change journal (for file-protection only) 300 MB Protected volume on the file server or
workstation
Log change - the change rate on the database or storage group in question. Log change varies, but for the
purposes of the default recommendation in DPM, log change is defined as 3%.
Retention range (RR) - The number of recovery points stored. The DPM default recommendation is five
recovery points.
When you create a protection group, in the Modify Disk Allocation dialog box, the Data Size column for each
data source displays a Calculate link. For the initial disk allocation, DPM applies the default formulas to the size
of the volume on which the data source is located. To apply the formula to the actual size of the selected data
source, click the Calculate link. DPM will determine the size of the data source and recalculate the disk allocation
for the recovery point and replica volumes for that data source. This operation can take several minutes to
perform.
Accept the default space allocations unless you are certain that they do not meet your needs. Overriding the
default allocations can result in allocation of too little or too much space.
Allocation of too little space for the recovery points can prevent DPM from storing enough recovery points to
meet your retention range objectives. Allocation of too much space wastes disk capacity.
After creating a protection group, if you allocated too little space for a data source, increase the allocations for the
replica and recovery point volumes for each data source.
If you allocated too much space for the protection group, remove the data source from the protection group and
delete the replica, Then, add the data source to the protection group with smaller allocations.
Set up protection groups
When you set up a protection group here's what you'll need to do:
Before you start
Some things to note when creating protection groups:
If you're backing up to tape and you have only a single stand-alone tape, use a single protection group to
minimize the effort to change tapes. Multiple protection groups require a separate tape for each protection
group.
Data sources on a computer must be protected by the same DPM server. In DPM a data source is a
volume, share, database, or storage group that is a member of a protection group.
You can include data sources from more than one computer in a protection group.
Protection group members cannot be moved between protection groups. If you decide later that a
protection group member needs to be in a different protection group, you must remove the member from
its protection group and then add it to a different protection group.
If the members of a protection group no longer require protection, stop protection of the protection group.
When you stop protection, your options are to retain protected data or to delete protected data.
Retain protected data option: Retains the replica on disk with associated recovery points and
tapes for the specified retention range.
Delete protected data option: Deletes the replica on disk and expires data on the tapes.
When you select a parent folder or share, its subfolders are automatically selected. You can designate
subfolders for exclusion and also exclude file types by extension.
Verify that you do not have more than a 100 protectable data sources on a single volume. If you do,
distribute your data sources across more volumes if possible.
When you select a data source that contains a reparse point, DPM asks whether to include the reparse
point target in the protection group. Mount points and junction points are data sources that contain reparse
points. If you include the reparse point, it is not replicated; you must manually re-create the reparse point
when you recover the data.
Protection groups are created with the Create New Protection Group wizard with the following settings:
Select Group Members: Specify the machines and sources you want to back up.
Select data protection method : Specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
Select short-term goals: Specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you
can check Just before a recovery point so that DPM will run an express full backup just before each
recovery point is scheduled.
Specify long-term goals: Indicate how long you want to keep tape data (1-99 years). In Frequency of
backup specify how often backups to tape should run. The frequency is based on the retention range you've
specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly,
or monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
You'll also need to specify the tape device/library you want to use, and whether data should be compressed
and encrypted on tape.
Review disk allocation: You review the storage pool disk space allocated for the protection group. DPM
provides a recommended size. You can select to Automatically grow the volumes to automatically
increase size when more disk space is required for backup.
Choose replica creation method: Specify how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
In Choose consistency check options: Select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time.
Specify online protection data: If you want to back up to the cloud with Azure Backup, specify the
workloads you want to back up.
Specify online backup schedule : If you're backing up to Azure specify how often incremental backups
to Azure should occur. You can schedule backups to run every day/week/month/year and the time/date at
which they should run. Backups can occur up to twice a day. Each time a back up runs a data recovery point
is created in Azure from the copy of the backed up data stored on the DPM disk.
Specify online retention policy: If you're backing up to Azure you can specify how the recovery points
created from the daily/weekly/monthly/yearly backups are retained in Azure.
Choose online replication: If you're backing up to Azure specify how the initial full replication of data will
occur. You can replicate over the network, or do an offline backup (offline seeding). Offline backup uses the
Azure Import feature. Read more.
50 GB 284 71 18 5 1.5
A common question that arises during System Center Data Protection Manager (DPM ) server deployment, and
DPM agent deployment, concerns which ports have to be opened on the firewall. This article introduces the
firewall ports and protocols that DPM uses for network traffic. For more information about firewall exceptions for
DPM clients, go to: Configure firewall exceptions for the agent.
Microsoft System Center Exception for Msdpm.exe All protocols All ports
2012 Data Protection (the DPM service). Runs on
Manager the DPM server.
RULE NAME DETAILS PROTOCOL PORT
Microsoft System Center Exception for Dpmra.exe All protocols All ports
2012 Data Protection (protection agent service
Manager Replication Agent that is used to back up and
restore data). Runs on the
DPM server and protected
computers.
System Center Data Protection Manager (DPM ) protects Hyper-V virtual machines by backing up virtual
machine's data. You can back data up at the Hyper-V host level to enable VM -level and file-level data recovery, or
back up at the guest-level to enable application-level recovery.
Supported scenarios
DPM can back up virtual machines running on Hyper-V host servers in the following scenarios:
Virtual machines with local or direct storage - Back up virtual machines hosted on Hyper-V host
standalone servers that have local or directly attached storage. For example a hard drive, a storage area
network (SAN ) device, or a network attached storage (NAS ) device. The DPM protection agent must be
installed on all hosts.
Virtual machines in a cluster with CSV storage - Back up virtual machines hosted on a Hyper-V cluster
with Cluster Shared Volume (CSV ) storage. DPM 2012 SP1 introduced express full backup, parallel
backups, and cluster query improvements for CSV backup. The DPM protection agent is installed on each
cluster node.
Virtual machines with SMB storage - Back up virtual machines hosted on a Hyper-V standalone server
or cluster with SMB 3.0 file server storage. SMB shares are supported on a standalone file server or on a file
server cluster. If you're using an external SMB 3.0 file server the DPM protection agent should be installed
on it. If the storage server is clustered, the agent should be installed on each cluster node. You'll need full-
share and folder-level permissions for the machine$ account of the application server on the SMB share.
Back up virtual machines configured for live migration - Live migration allows you to move virtual
machines from one location to while providing uniterrupted access. You can migrate virtual machines
between two standalone servers, within a single cluster, or between standalone and cluster nodes. Multiple
live migrations can run concurrently. You can also perform a live migration of virtual machine storage so
that virtual machines can be moved to new storage locations while they continue to run. DPM can back up
virtual machines that are configured for live migration. Read more.
Back up replica virtual machines - Back up replica virtual machines running on a secondary server (DPM
2012 R2 only)
Learn about supported DPM and Hyper-V versions in What can DPM back up? .
If you protect a Hyper-V server on Windows Server 2012, or if you use DPM 2012 R2 with UR1 or UR2, the
following section applies to your configuration:
DPM works seamlessly with the Hyper-V Volume Shadow Copy Services (VSS ) writer to ensure that consistent
versions of virtual machines are captured and protected without affecting virtual machine access. The ability to
back up open files is critical for business continuity. By default, DPM performs online backups that don't affect the
availability of virtual machines. To perform an online backup the following is required:
The Backup integration service must be enabled, so the operating system running on the virtual machine
running must support Hyper-V integration services.
The guest operating system must support VSS (Windows 2003 server or later). Online backup isn't
supported if virtual machines are running Linux.
There should be no dynamic disks on the virtual machine.
All volumes must be NTFS
The VSS storage assignment for the volumes shouldn't be modified.
The virtual machine must be running, and if the virtual machine is in a cluster the cluster resource group
should be online. A Shadow Storage assignment of a volume inside the virtual machine mustn't be explicitly
set to a different volume other than itself.
If these conditions aren't met DPM will perform an offline backup where the virtual machine is paused and placed
in a saved state while the snapshot is taken, and then the virtual machine is resumed. This means the virtual
machine is unavailable during the backup, usually a short period of less than a minute for many environments.
Backup prerequisites
These are the prerequisites for backing up Hyper-V virtual machines with DPM.
PREREQUISITE DETAILS
PREREQUISITE DETAILS
Linux prerequisites - You can backup Linux virtual machines using DPM 2012 R2.
Only file-consistent snapshots are supported.
PREREQUISITE DETAILS
Back up VMs with CSV storage - For CSV storage, install the Volume Shadow Copy Services
(VSS) hardware provider on the Hyper-V server. Contact your
storage area network (SAN) vendor for the VSS hardware
provider.
- If a single node shuts down unexpectedly in a CSV cluster,
DPM will perform a consistency check against the virtual
machines that were running on that node.
- If you need to restart a Hyper-V server that has BitLocker
Drive Encryption enabled on the CSV cluster, you must run a
consistency check for Hyper-V virtual machines.
Back up VMs with SMB storage - Turn on auto-mount on the server that is running Hyper-V
to enable virtual machine protection.
- Disable TCP Chimney Offload.
- Ensure that all Hyper-V machine$ accounts have full
permissions on the specific remote SMB file shares.
- Ensure that the file path for all virtual machine components
during recovery to alternate location is less than 260
characters. If not, recovery might succeed, but Hyper-V
cannot mount the virtual machine.
- The following scenarios are not supported:
Deployments where some components of the virtual machine
are on local volumes and some components are on remote
volumes; an IPv4 or IPv6 address for storage location file
server., and recovery of a virtual machine to a computer that
uses remote SMB shares.
- You'll need to enable the File Server VSS Agent service on
each SMB server - Add it in Add roles and features > Select
server roles > File and Storage Services > File Services >
File Service > File Server VSS Agent Service.
This query contains a property, called KnownVMMServer . This value should be the same value you
provided with the Set-DPMGlobalProperty cmdlet.
c. Run the following query to validate the VMMIdentifier parameter in the PhysicalPathXML for a
particular virtual machine. Replace VMName with the name of the virtual machine.
select cast(PhysicalPath as XML) from tbl_IM_ProtectedObject where DataSourceId in (select
datasourceid from tbl_IM_DataSource where DataSourceName like '%<VMName>%')
d. Open the .xml file that this query returns and validate that the VMMIdentifier field has a value.
Run manual migration
After you complete the steps in the previous sections, and the DPM Summary Manager job completes, migration is
enabled. By default, this job starts at midnight and runs every morning. If you want to run a manual migration, to
check everything is working as expected, do the following:
1. Open SQL Server Management Studio and connect to the instance that hosts the DPM database.
2. Run the following query:
select * from tbl_SCH_ScheduleDefinition where JobDefinitionID='9B30D213-B836-4B9E-97C2-DB03C3EB39D7' .
This query returns the ScheduleID. Note this ID as you will use it in the next step.
3. In the SQL Server Management Studio, expand SQL Server Agent, and then expand Jobs. Right-click
ScheduleID that you noted, and select Start Job at Step.
Note that backup performance is affected when the job runs. The size and scale of your deployment determines
how much time the job takes to finish.
System Center Data Protection Manager (DPM ) provides backup and recovery for Exchange 2013 and Exchange
2016. To ensure your entire Exchange deployment is protected, configure protection for volumes, system state, or
full bare metal recovery. This article provides the steps for configuring DPM so you can protect your Exchange
deployment. If you have a large Exchange deployment, use a database availability group (DAG ) to scale protection
for Exchange mailbox databases. In addition to backing up mail databases, to fully protect your Exchange
deployment you should back up Exchange Server roles such as the Client Access Server, or the transport service
on mailbox servers.
Install the latest Visual C++ Redistributable for Visual Studio 2012 Update.
To protect an Exchange 2013 and Exchange 2016 Database Availability Group (DAG ) node, install the DPM
protection agent on the node. Note that you can protect different DAG nodes from different DPM servers,
only one node can be protected by one DPM server only.
DPM 2012 (and later) have a storage pool size limit of 120 terabytes (TB ). There is an 80 TB limit for DPM
replica volumes, and 40 TB limit for recovery point volumes. When protecting a large Exchange deployment,
it is important to know the user mailbox size limit and the number of users or mailboxes. The number of
users or mailboxes, determines the maximum size of a mailbox. Provided the mailboxes stay within limits,
the number of mailboxes determine the number of Exchange databases a single DPM can protect. Use the
number of users assigned to a database, and their mailbox limits, to calculate the maximum size possible for
each Exchange database. For example, if the maximum size of a user's mailbox 8 GB, a single DPM server
can protect up to 10,000 mailboxes. If the maximum size of a user mailbox is greater than 8 GB, or if more
than 10,000 user mailboxes require protection, configure the Exchange server with a DAG. Use additional
DPM servers to provide full protection. An Exchange node can only be protected by a single DPM server.
Therefore, the number of Exchange nodes should be equal to, or greater than the number of DPM servers
required to protect all Exchange databases.
DPM functions with any database role. You can configure DPM to protect a server that hosts a collection of
active or passive mailbox databases.
Configure one full backup per day, and a synchronization frequency to suit your requirements for Exchange
log truncations. When protecting more than one copy of an Exchange mailbox database (for example, when
protecting members of a DAG ), configure one node for full backups and the rest for copy backups. Copy
backups do not truncate log files.
Protect at least two copies of each mailbox database. You can use inexpensive Serial Advanced Technology
Attachment (SATA) drives, or several JBOD disks for storage.
Set the minimum frequency to greater than 15 minutes for mailbox synchronization. Start by setting up your
current backup policy, and then gradually increase the number of recovery points. Performing one or two
express full backups per day, in addition to a synchronization frequency of two hours, is a sound approach.
For an optimal synchronization frequency, consider the volume of your data, the performance impact, and
the volume required to store the replicas.
Exchange 2013 and Exchange 2016 can support up to eight parallel backups. To accommodate parallel
Exchange database backups for an Exchange server, create multiple protection groups (up to eight), and add
Exchange databases to each protection group.
As you maintain your Exchange data note the following:
Add mailbox databases to the server. If you create or add new mailbox databases to a protected
storage group on an Exchange server, these databases are automatically added to the DPMreplication
and protection. You can add mailbox databases in incremental backups only after a full backup has
finished.
Change mailbox database file paths. If you move a protected database or log files to a volume
that contains data that is protected by DPM, protection continues. If you move a protected database
or log files to a volume that is not protected by DPM, an alert appears, and the protection jobs fail. To
resolve the alert, in the alert details, click the Modify protection job link, and then run a consistency
check.
Dismount mailbox databases. If you dismount a protected mailbox database, the protection job for
that particular database fails. The replica is marked inconsistent when DPM runs the next express full
backup.
Rename mailbox databases. If you need to change the name of the mailbox database, stop
protection, and protect the database again. Until you protect the database again, the backups continue
to work but mailbox enumeration fails.
Configure backup
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select Protection Group Type select Servers.
3. In Select Group Members select all the DAGs that store data you want to protect. For each Exchange
server you can also select to do a system state backup or full bare metal backup (which includes the system
state. This in useful if you want the ability to recover your entire server and not just data. Deploy protection
groups.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Specify Exchange Protection Options select Run Eseutil to check data integrity to check the integrity
of the Exchange Server databases. This moves the backup consistency checking from the Exchange Server to
the DPM server which means the I/O impact of running Eseutil.exe on the Exchange Server during the
backup itself is eliminated. To protect a DAG, be sure that you select Run for log files only (Recommended
for DAG servers). If you did not previously copy the .eseutil file an error will occur.
6. In Specify Exchange DAG Protection select the databases you want to copy for either a full backup or
copy backup from the Database copies selected for Full Backup or Database copies selected for
Copy Backup list boxes. For protecting multiple copies of the same database, you can select only one copy
for full backup, and then select the remaining copies for copy backup.
7. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a backup interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
8. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
9. In the Review disk allocation page, review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
10. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
11. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
12. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
13. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
14. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
15. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
16. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.
Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing the Exchange data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the Exchange data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent. The
address must be valid.
3. In Authenticated SMTP server, type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to whom
you want DPM to send copies of the notifications.
5. To test the SMTP server settings, click Send Test Notification > OK.
Publish alerts for Operations Manager
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. In Options click Alert Publishing > Publish Active Alerts.
3. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.
2. In the DPM Administrator Console, go to the Recovery view and navigate to the mailbox database you
want to recover (in the All Protectd Exchange Data node).
3. Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
select a recovery point in Recovery time > Recover.
Note that you won't be able to select Latest. This isn't available for individual mailboxes.
4. In the Recovery Wizard review your recovery selection, and click Next.
5. Specify the type of recovery you would like to perform and click Next.
6. In the Specify Recovery Options page do the following:
a. Mount the databases after they are recovered. Clear the check box if you don't want to mount the
databases.
b. Network bandwidth usage throttling. Click Modify to enable throttling.
c. Click Enable SAN -based recovery using hardware snapshots if applicable.
d. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
7. On the Summary page review your recovery settings, and click Recover. When the recovery finishes click
Close.
Any synchronization job for the selected recovery item is canceled while the recovery is in progress.
8. After the recovery process has finished, the required mailbox is not quite fully restored. The mailbox
database to which the mailbox belongs is only restored to the Recovery mailbox database. Restore the
mailbox by running this cmdlet:
You must add \-SkipMerging StorageProviderForSource to the command; otherwise an error occurs. For a
workaround, see Release Notes for Exchange 2013 and Exchange 2016.
When you now open the <mailbox name> mailbox, all its contents until 3:15 PM are located beneath the
Recovery folder.
9. After you finished the restore, you can dismount and delete the Recovery Mailbox database by running the
following Windows PowerShell cmdlet.
Install the latest Visual C++ Redistributable for Visual Studio 2012 Update.
To protect an Exchange 2016 and Exchange 2019 Database Availability Group (DAG ) node, install the DPM
protection agent on the node. Note that you can protect different DAG nodes from different DPM servers,
only one node can be protected by one DPM server only.
DPM 2012 (and later) have a storage pool size limit of 120 terabytes (TB ). There is an 80 TB limit for DPM
replica volumes, and 40 TB limit for recovery point volumes. When protecting a large Exchange deployment,
it is important to know the user mailbox size limit and the number of users or mailboxes. The number of
users or mailboxes, determines the maximum size of a mailbox. Provided the mailboxes stay within limits,
the number of mailboxes determine the number of Exchange databases a single DPM can protect. Use the
number of users assigned to a database, and their mailbox limits, to calculate the maximum size possible for
each Exchange database. For example, if the maximum size of a user's mailbox 8 GB, a single DPM server
can protect up to 10,000 mailboxes. If the maximum size of a user mailbox is greater than 8 GB, or if more
than 10,000 user mailboxes require protection, configure the Exchange server with a DAG. Use additional
DPM servers to provide full protection. An Exchange node can only be protected by a single DPM server.
Therefore, the number of Exchange nodes should be equal to, or greater than the number of DPM servers
required to protect all Exchange databases.
DPM functions with any database role. You can configure DPM to protect a server that hosts a collection of
active or passive mailbox databases.
Configure one full backup per day, and a synchronization frequency to suit your requirements for Exchange
log truncations. When protecting more than one copy of an Exchange mailbox database (for example, when
protecting members of a DAG ), configure one node for full backups and the rest for copy backups. Copy
backups do not truncate log files.
Protect at least two copies of each mailbox database. You can use inexpensive Serial Advanced Technology
Attachment (SATA) drives, or several JBOD disks for storage.
Set the minimum frequency to greater than 15 minutes for mailbox synchronization. Start by setting up your
current backup policy, and then gradually increase the number of recovery points. Performing one or two
express full backups per day, in addition to a synchronization frequency of two hours, is a sound approach.
For an optimal synchronization frequency, consider the volume of your data, the performance impact, and
the volume required to store the replicas.
Exchange 2016 and Exchange 2019 can support up to eight parallel backups. To accommodate parallel
Exchange database backups for an Exchange server, create multiple protection groups (up to eight), and add
Exchange databases to each protection group.
As you maintain your Exchange data note the following:
Add mailbox databases to the server. If you create or add new mailbox databases to a protected
storage group on an Exchange server, these databases are automatically added to the DPMreplication
and protection. You can add mailbox databases in incremental backups only after a full backup has
finished.
Change mailbox database file paths. If you move a protected database or log files to a volume
that contains data that is protected by DPM, protection continues. If you move a protected database
or log files to a volume that is not protected by DPM, an alert appears, and the protection jobs fail. To
resolve the alert, in the alert details, click the Modify protection job link, and then run a consistency
check.
Dismount mailbox databases. If you dismount a protected mailbox database, the protection job for
that particular database fails. The replica is marked inconsistent when DPM runs the next express full
backup.
Rename mailbox databases. If you need to change the name of the mailbox database, stop
protection, and protect the database again. Until you protect the database again, the backups continue
to work but mailbox enumeration fails.
Configure backup
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select Protection Group Type select Servers.
3. In Select Group Members select all the DAGs that store data you want to protect. For each Exchange
server you can also select to do a system state backup or full bare metal backup (which includes the system
state. This in useful if you want the ability to recover your entire server and not just data. Deploy protection
groups.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Specify Exchange Protection Options select Run Eseutil to check data integrity to check the integrity
of the Exchange Server databases. This moves the backup consistency checking from the Exchange Server to
the DPM server which means the I/O impact of running Eseutil.exe on the Exchange Server during the
backup itself is eliminated. To protect a DAG, be sure that you select Run for log files only (Recommended
for DAG servers). If you did not previously copy the .eseutil file an error will occur.
6. In Specify Exchange DAG Protection select the databases you want to copy for either a full backup or
copy backup from the Database copies selected for Full Backup or Database copies selected for
Copy Backup list boxes. For protecting multiple copies of the same database, you can select only one copy
for full backup, and then select the remaining copies for copy backup.
7. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a backup interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
8. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
9. In the Review disk allocation page, review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
10. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
11. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
12. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
13. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
14. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
15. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
16. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.
Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing the Exchange data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the Exchange data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent. The
address must be valid.
3. In Authenticated SMTP server, type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to whom
you want DPM to send copies of the notifications.
5. To test the SMTP server settings, click Send Test Notification > OK.
Publish alerts for Operations Manager
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. In Options click Alert Publishing > Publish Active Alerts.
3. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.
2. In the DPM Administrator Console, go to the Recovery view and navigate to the mailbox database you
want to recover (in the All Protectd Exchange Data node).
3. Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
select a recovery point in Recovery time > Recover.
Note that you won't be able to select Latest. This isn't available for individual mailboxes.
4. In the Recovery Wizard review your recovery selection, and click Next.
5. Specify the type of recovery you would like to perform and click Next.
6. In the Specify Recovery Options page do the following:
a. Mount the databases after they are recovered. Clear the check box if you don't want to mount the
databases.
b. Network bandwidth usage throttling. Click Modify to enable throttling.
c. Click Enable SAN -based recovery using hardware snapshots if applicable.
d. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
7. On the Summary page review your recovery settings, and click Recover. When the recovery finishes click
Close.
Any synchronization job for the selected recovery item is canceled while the recovery is in progress.
8. After the recovery process has finished, the required mailbox is not quite fully restored. The mailbox
database to which the mailbox belongs is only restored to the Recovery mailbox database. Restore the
mailbox by running this cmdlet:
You must add \-SkipMerging StorageProviderForSource to the command; otherwise an error occurs. For a
workaround, see Release Notes for Exchange 2016 and Exchange 2019.
When you now open the <mailbox name> mailbox, all its contents until 3:15 PM are located beneath the
Recovery folder.
9. After you finished the restore, you can dismount and delete the Recovery Mailbox database by running the
following Windows PowerShell cmdlet.
You can deploy System Center Data Protection Manager (DPM ) to protect SharePoint farms, external SQL Server
databases, and folders that include farm customizations. This articles describes the steps required to back up and
recover SharePoint data. In addition to this article these blog entries provide an in-depth walkthrough and
troubleshooting tips for this scenario:
Configure SharePoint protection in DPM
Backing up and troubleshooting SharePoint and DPM
Restoring SharePoint with DPM
Configure backup
To back up SharePoint farm you configure protection for SharePoint by using ConfigureSharePoint.exe and then
create a protection group in DPM.
1. Run ConfigureSharePoint.exe - This tool configures the SharePoint VSS Writer service (WSS ) and
provides the protection agent with credentials for the SharePoint farm. After you've deployed the protection
agent the ConfigureSharePoint.exe file can be found in the <DPM Installation Path>\bin folder on the front-
end Web server. If you have multiple WFE servers you only need to install it on one of them. Run as follows:
On the WFE server at a command prompt navigate to <DPM installation location>\bin\ and run
ConfigureSharePoint [-EnableSharePointProtection] [-EnableSPSearchProtection] [-
ResolveAllSQLAliases] [-SetTempPath ], where:
EnableSharePointProtection enables protection of the SharePoint farm, enables the VSS
writer, and registers the identify of the DCOM application WssCmdletsWrapper to run as a
user whose credentials are entered with this option. This account should be a farm admin and
also local admin on the front-end Web Server.
EnableSPSearchProtection enables the protection of WSS 3.0 SP Search by using the
registry key SharePointSearchEnumerationEnabled under HKLM\Software\Microsoft\
Microsoft Data Protection Manager\Agent\2.0\ on the front-end Web Server, and registers the
identity of the DCOM application WssCmdletsWrapper to run as a user whose credentials are
entered with this option. This account should be a farm admin and also local admin on the
front-end Web Server.
ResolveAllSQLAliases displays all the aliases reported by the SharePoint VSS writer and
resolves them to the corresponding SQL server. It also displays their resolved instance names.
If the servers are mirrored, it will also display the mirrored server. It reports all the aliases that
are not being resolved to a SQL Server.
SetTempPath sets the environment variable TEMP and TMP to the specified path. Item level
recovery fails if a large site collection, site, list or item is being recovered and there is
insufficient space in the farm admin Temporary folder. This option allows you to change the
folder path of the temporary files to a volume that has sufficient space to store the site
collection or site being recovered.
Enter the farm administrator credentials. This account should be a member of the local Administrator
group on the WFE server. If the farm administrator isn't a local admin grant the following
permissions on the WFE server:
Grant the WSS_Admin_WPG group full control to the DPM folder (%Program
Files%\Microsoft Data Protection Manager\DPM ). -A
Grant the WSS_Admin_WPG group read access to the DPM Registry key
(HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager).
Ater running ConfigureSharePoint.exe you'll need to rerun it if there's a change in the SharePoint
farm administrator credentials.
2. To create a protection group, click Protection > Actions > Create Protection Group to open the Create
New Protection Group wizard in the DPM console.
3. In Select Protection Group Type select Servers.
4. In Select Group Members expand the server that holds the WFE role. If there's more than one WFE server
select the one on which you installed ConfigureSharePoint.exe. Learn more in Deploy protection groups.
When you expand the SharePoint server DPM queries VSS to see what data DPM can protect. If the
SharePoint database is remote DPM connects to it. If SharePoint data sources don't appear, check that the
VSS writer is running on the SharePoint server and any remote SQL Server, and ensure that the DPM
agent is installed on both the SharePoint server and remote SQL Server. In addition ensure that SharePoint
databases aren't being protected elsewhere as SQL Server databases.
5. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
6. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
7. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
8. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
9. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
10. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
11. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
12. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
13. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
14. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
15. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.
Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing the Exchange data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the SharePoint data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent. The
address must be valid.
3. In Authenticated SMTP server , type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to whom
you want DPM to send copies of the notifications.
Publish Operations Manager alerts
1. In the DPM Administrator Console, click Monitoring > Action > Options > Alert Publishing > Publish
Active Alerts
2. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.
NOTE
If the front-end Web server that DPM uses to protect the farm is unavailable, use the following procedure to change the
front-end Web server by starting at step 4.
To change the front-end Web server that DPM uses to protect the farm
1. Stop the SharePoint VSS Writer service on Server1 by running the following command at a command
prompt:
stsadm -o unregisterwsswriter
2. On Server1, open the Registry Editor and navigate to the following key:
HKLM\System\CCS\Services\VSS\VssAccessControl
3. Check all values listed in the VssAccessControl subkey. If any entry has a value data of 0 and another VSS
writer is running under the associated account credentials, change the value data to 1.
4. Install a protection agent on Server2.
WARNING
You can only switch Web front-end servers if both the servers are on the same domain.
5. On Server2, at a command prompt, change the directory to DPM installation location\bin\ and run
ConfigureSharepoint. For more information about ConfigureSharePoint, see Configure backup.
6. There is a known issue when the server farm is the only member of the protection group and the protection
group is configured to use tape-based protection. If your server farm is the only member of the protection
group using tape-based protection, to change the front-end Web server that DPM uses to protect the farm,
you must temporarily add another member to the protection group by performing the following steps:
In DPM Administrator Console, click Protection on the navigation bar.
Select the protection group that the server farm belongs to, and then click Modify protection
group.
In the Modify Group Wizard, add a volume on any server to the protection group. You can remove
this volume from the protection after the procedure is completed.
If the protection group is configured for short-term disk-based protection and long-term tape-based
protection, select the manual replica creation option. This avoids creating a replica for the volume that
you are temporarily adding to the protection group.
Complete the wizard.
7. Remove Server1 from the protection group, selecting to retain the replicas on disk and tape.
8. Select the protection group that the server farm belongs to, and then click Modify protection group.
9. In the Modify Group Wizard, on the Select Group Members page, expand Server2 and select the server
farm, and then complete the wizard.
A consistency check will start.
10. If you performed step 6, you can now remove the volume from the protection group.
Back up SQL Server with DPM
15 minutes to read
System Center Data Protection Manager (DPM ) provides backup and recovery for SQL Server databases. In
addition to backing up SQL Server databases you can run a system backup or full bare-metal backup of the SQL
Server computer. Here's what DPM can protect:
A standalone SQL Server instance
A SQL Server Failover Cluster instance (FCI)
A SQL Server AlwaysOn availability group with theses preferences:
Secondary only
Primary
Any Replica
Configure backup
1. To create a protection group, click Protection > Actions > Create Protection Group to open the Create
New Protection Group wizard in the DPM console.
2. In Select Protection Group Type, select Servers.
3. In Select Group Members, select the SQL Server instances on the server you want to protect. Learn more
in Deploy protection groups. Note that:
You have the option of selecting protection at the instance level or protection of individual databases.
When you are protecting at the instance level, any database that is added to that instance of SQL
Server will automatically be added to DPM protection.
If you are using SQL Server AlwaysOn availability groups, you can create a protection group that
contains the availability groups. DPM detects the availability groups and will displays them under
Cluster Group. Select the whole group to protect it so that any databases that you add to the group
are protected automatically, or select individual databases. For each instance of SQL Server, you can
also run a system state backup or full bare metal backup. This in useful if you want to be able to
recover your whole server and not just data.
4. In Select data protection method, specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals, specify how you want to back up to short-term storage on disk. In Retention
range, you specify how long you want to keep the data on disk. In Synchronization frequency, you
specify how often you want to run an incremental backup to disk. If you don't want to set a back up interval,
you can select Just before a recovery point so that DPM will run an express full backup just before each
recovery point is scheduled.
6. If you want to store data on tape for long-term storage, in Specify long-term goals, indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details, page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based
on the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
8. In Choose replica creation method, select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule, specify how often incremental backups to Azure should occur. You
can schedule backups to run every day/week/month/year and the time/date at which they should run.
Backups can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure
from the copy of the backed up data stored on the DPM disk.
12. In Specify online retention policy, you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication, specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
For more information, see Offline-backup workflow in Azure Backup.
14. On the Summary page, review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.
Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing SQL Server data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the SQL Server data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent.
The address must be valid.
3. In Authenticated SMTP server , type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to
whom you want DPM to send copies of the notifications.
Set up alerts with Operations Manager
1. In the DPM Administrator Console, click Monitoring > Action > Options > Alert Publishing > Publish
Active Alerts
2. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.
You can deploy System Center Data Protection Manager (DPM ) to back up client computers. Depending on the
client operating system, you can back up volumes, shares, folders, files, bare metal and system state, and deduped
volumes.
You can use System Center Data Protection Manager (DPM ) to back up file data on server and client computers.
System Center Data Protection Manager (DPM ) can back up system state and provide bare metal recovery (BMR )
protection.
System state backup: Backs up operating system files, enabling you to recover when a machine starts but
you've lost system files and registry. A system state backup includes:
Domain member: Boot files, COM+ class registration database, registry
Domain controller: Active Directory (NTDS ), boot files, COM+ class registration database, registry,
system volume (SYSVOL )
Machine running cluster services: Additionally backs up cluster server metadata
Machine running certificate services: Additionally backs up certificate data
Bare metal backup: Backs up operating system files and all data except user data on critical volumes. By
definition a BMR backup includes a system state backup. Provides protection when a machine won't start
and you have to recover everything.
This table summarizes what you can back up and recover. You can see detailed information about app versions that
can be protected with system state and BMR in What can DPM back up?
BMR/system state
backup
BMR/system state
backup
BMR/system state
backup
RECOVER FROM DPM RECOVER FROM SYSTEM
BACKUP ISSUE BACKUP STATE BACKUP BMR
BMR/system state
backup
BMR/system state
backup
BMR/system state
backup
BMR/system state
backup
Hyper-V Lost VM Y N N
DPM backup of
Hyper-V host or
guest
BMR/system state
backup of host
BMR/system state
backup of host
BMR/system state
backup of host
RECOVER FROM DPM RECOVER FROM SYSTEM
BACKUP ISSUE BACKUP STATE BACKUP BMR
BMR/system state
backup of host
BMR/system state
backup
BMR/system state
backup
BMR/system state
backup
BMR backup
1. For BMR (including a system state backup) the backup job is performed directly to a share on the DPM
server and not to a folder on the protected server.
2. DPM server calls WSB and shares out the replica volume for that BMR backup. In this case it doesn't tell
WSB to use the drive with the most free space, but instead to use the share created for the job.
3. When the backup finishes the file is transferred to the DPM server. Logs are stored in
C:\Windows\Logs\WindowsServerBackup.
NOTE
The following limitations do NOT apply to Modern Backup Storage (MBS). The following limitations apply only when using
legacy storage, after upgrading DPM 2012 R2 to DPM 2016.
DPM reserves 30 GB of space on the replica volume for BMR. You can change this on the Disk Allocation
page in the Modify Protection Group Wizard or using the Get-DatasourceDiskAllocation and Set-
DatasourceDiskAllocation PowerShell cmdlets. On the recovery point volume, BMR protection requires
about 6 GB for retention of five days. Note that you can't reduce the replica volume size to less than 15 GB.
DPM doesn't calculate the size of BMR data source, but assumes 30 GB for all servers. Admins should
change the value as per the size of BMR backups expected on their environments. The size of a BMR backup
can be roughly calculated sum of used space on all critical volumes: Critical volumes = Boot Volume +
System Volume + Volume hosting system state data such as AD. Process System state backup
If you move from system state protection to BMR protection, BMR protection will require less space on the
recovery point volume. However, the extra space on the volume is not reclaimed. You can shrink the
volume size manually from the Modify Disk Allocation page of the Modify Protection Group Wizard
or using the Get-DatasourceDiskAllocation and Set-DatasourceDiskAllocation cmdlets.
If you move from system state protection to BMR protection , BMR protection will require more space on
the replica volume. The volume will be extended automatically. If you want to change the default space
allocations you can use Modify-DiskAllocation.
If you move from BMR protection to system state protection you'll need more space on the recovery point
volume. DPM might try to automatically grow the volume. If there is insufficient space in the storage pool,
an error will be issued.
If you move from BMR protection to system state protection you'll need space on the protected computer
because system state protection first writes the replica to the local computer and then transfers it to the
DPM server
This article explains how to use Data Protection Manager (DPM ) version 1801 and later, to back up virtual
machines running on the 5.5, 6.0, 6.5 or 6.7 versions of VMware vCenter and vSphere Hypervisor (ESXi).
NOTE
Backup to tape is supported from DPM 2019.
Agentless backup: DPM does not require an agent to be installed on the vCenter or ESXi server, to back up the
virtual machine. Instead, just provide the IP address or fully qualified domain name (FQDN ), and login
credentials used to authenticate the VMware server with DPM.
Cloud Integrated Backup: DPM protects workloads to disk, tape and cloud. DPM's backup and recovery
workflow helps you manage long-term retention and offsite backup.
Detect and protect VMs managed by vCenter: DPM detects and protects VMs deployed on a VMware server
(vCenter or ESXi server). As your deployment size grows, use vCenter to manage your VMware environment.
DPM also detects VMs managed by vCenter, allowing you to protect large deployments.
Folder level auto protection: vCenter lets you organize your VMs in VM folders. DPM detects these folders and
lets you protect VMs at the folder level and includes all subfolders. When protecting folders, DPM not only
protects the VMs in that folder, but also protects VMs added later. DPM detects new VMs on a daily basis and
protects them automatically. As you organize your VMs in recursive folders, DPM automatically detects and
protects the new VMs deployed in the recursive folders.
DPM protects VMs stored on a local disk, network file system (NFS ), or cluster storage.
DPM protects VMs migrated for load balancing: As VMs are migrated for load balancing, DPM automatically
detects and continues VM protection.
DPM can recover files/folders from a Windows VM without recovering the entire VM, which helps recover
necessary files faster.
2. Type your information in the Name, Description, User name, and Password fields. Once you've added
text in the required fields, the Add button becomes active.
Name is what appears in the Credential column of the Manage Credentials dialog. Name is a required
field and is the identifier for the credentials. This field cannot be edited later. If you want to change the
name of a credential, you must add a new credential.
Description is descriptive text or an alternate name so you can recognize or distinguish the credentials
in the Manage Credentials dialog. The Description text is an optional field and appears in the
Description column of the Manage Credentials dialog.
User name and Password are the user name and password for the user account used to access the
server. Both fields are required.
3. Click Add to save your new credentials. Once you have created credentials, you can use them to
authenticate with a VMware server.
Update VMware server credentials
Most organizations need to update credentials due to security reasons or personnel changes. When VMware
server credentials are changed, the credentials used by DPM also need to be updated. If a VMware server's
credentials (user name and password) have changed, you must add matching credentials in DPM.
Once you have matching credentials in DPM, update the VMware server credentials using the following steps:
1. In the DPM Administrator console, click Management.
2. In the list of assets to manage, click Production Servers.
3. In the list of computers, select the VMware server whose credentials need to be updated. In the example image,
demovcenter1.Contoso.com is the VMware server with broken credentials.
4. On the Administrator console tool ribbon, click Change Settings. The Change Settings dialog opens. It
displays all credentials on the DPM server. In the example image, demovcenter_002 is the DPM credential to
pair with demovcenter1.Contoso.com.
5. From the list, select the credential on the DPM server to match the VMware credential and click Update. In the
image, notice demovcenter_002 authenticates a production server, and demovcenter1.Contoso.com is now
protected.
If you are using Internet Explorer, and you don't have a valid certificate, you see this message when you access the
URL:
To fix the error, install a valid certificate on the DPM server and the VMware server. In the previous images, the
DPM server has a valid certificate, but the certificate is not in the trusted root certification authority store. To fix
this situation, add the certificate to the VMware server.
1. On the Certificate dialog, on the Certification Path tab, click View Certificate.
2. In the new Certificate dialog, click the Details tab, and then click Copy to File to open the Certificate
Export Wizard.
3. In the Certificate Export Wizard, click Next, and on the Export File Format screen, select DER
encoded binary X.509 (.CER), then click Next.
4. On the File to Export screen, type a name for your certificate and click Next.
5. Click Finish to complete the Certificate Export Wizard.
6. Locate the exported certificate. Right-click the certificate and select Install Certificate to open the
Certificate Import Wizard.
7. In the Certificate Import wizard, click Local Machine and then click Next.
8. To find the location where you want to place the certificateOn the Certificate Store screen, click Place all
certificates in the following store and click Browse.
9. In the Select Certificate Store dialog, select Trusted Root Authority Certificate and click OK.
10. Click Next and then click Finish to import the certificate successfully.
11. Once you have added the certificate, sign into your vCenter server to verify the connection is secure.
Add a new user account in VMware server
DPM uses your user name and password as credentials for communicating and authenticating with VMware
server. An authenticated user has, at least the following privileges, which are required for successfully protecting a
VM:
Global.ManageCustomFields
Network.Assign
Datastore.AllocateSpace
VirtualMachine.Config.ChangeTracking
VirtualMachine.State.RemoveSnapshot
VirtualMachine.State.CreateSnapshot
VirtualMachine.Provisioning.DiskRandomRead
VirtualMachine.Interact.PowerOff
VirtualMachine.Inventory.Create
VirtualMachine.Config.AddNewDisk
VirtualMachine.Config.HostUSBDevice
VirtualMachine.Config.AdvancedConfig
VirtualMachine.Config.SwapPlacement
The recommended steps for assigning these privileges:
Create a role, for example, BackupAdminRole
1. In the vSphere Web Client, from the Navigator menu, click Administration > Roles.
2. From the Roles provider drop-down menu, select the vCenter Server to which the role applies.
3. On the Roles pane, click '+' to open the Create Role dialog and create a role.
4. Name the role, BackupAdminRole.
5. Select the privileges (identified in the preceding bulleted list) for the role and click OK.
Create a new user, for example, BackupAdmin
When you create a user, that user must be in the same domain as the objects you want to protect.
1. In the vSphere Web Client, on the Navigator menu, click Administration.
2. In the Administration menu, click Users and Groups.
3. To create a new user, on the Users tab, click '+' to open the New User dialog.
4. Provide a User name and password for the role. Use BackupAdmin as the User name. Additional information
is optional.
Assign the role, BackupAdminRole, to the user, BackupAdmin
1. In the vSphere Web Client, on the Navigator menu, click Administration.
2. In the Administration menu, click Global Permissions.
3. On the Global Permissions pane, click the Manage tab.
4. On the Manage tab, click '+' to open the Add Permission dialog.
5. In the Add Permissions dialog, click Add.
6. In the Select Users/Groups dialog, choose the correct domain from the Domain menu, then in the
User/Group column select BackupAdmin, and click Add. The user name appears in the Users field in the
format: domain\BackupAdmin.
7. Click OK to return to the Add Permissions dialog.
8. In the Assigned Role area, from the drop-down menu, select the role, BackupAdminRole, and click OK. The
new user and role association appears in the Manage tab.
Add a VMware server to DPM
1. In the DPM Administrator Console, click Management > Production Servers > Add to open the
Production Server Addition Wizard.
2. On the Select Production Server type screen, select VMware Servers, and click Next.
"IgnoreCertificateValidation"=dword:00000001
2. Save the file with the name, DisableSecureAuthentication.reg, to your DPM server.
3. Double-click the file to activate the registry entry.
Configure Backup
Once you've added the VMware server(s) to DPM, you're almost ready to start protection in DPM. However,
before you begin protection, you need to allocate disk storage that DPM can use for short-term storage. For
guidance on adding storage, see Adding Storage to DPM. Once you have added storage, you are ready to use the
Create New Protection Group wizard to create a protection group for the VMware VMs.
Folder-level protection
VMware provides VM folders that let you organize VMs as you like.
DPM can protect individual VMs, as well as cascading levels of folders that contain VMs. Once you select a folder
for protection, all folders (and VMs) within this folder are automatically detected and protected. This is called
folder-level protection. DPM detects and configures protection for the VMs at 12 AM (based on the DPM server's
local timezone). When DPM detects that new VMs have been created, DPM configures protection by end of that
day.
Scale out protection of clustered VMware servers
In large VMware deployments, a single vCenter server can manage thousands of VMs. DPM supports scale-out
protection of VMware server clusters. The new scale-out feature removes the limit of a one-to-one relationship
between a VMware cluster and a DPM server. You can add a VM to a protection group on any of the recognized
DPM servers. Multiple DPM servers can be used to protect VMs managed by a single vCenter server. However,
only one DPM server can protect a VM or folder at any given time. VMs and folders that are already protected by
one DPM server cannot be selected by another DPM server. To deploy scale-out protection, there must be a
minimum of two DPM servers. In the following example graphic, D1 and D2 are visible to all virtual machines
hosted on nodes N1, N2, N3, and N4. When protection groups on D1 or D2 are created, any virtual machine can
be added.
NOTE
Applicable to DPM 2019
For long term retention on VMware backup data on-premises, you can now enable VMware backups to tape. The
backup frequency can be selected based on the retention range (which will vary from 1-99 years) on tape drives.
The data on tape drives could be both compressed and encrypted. DPM 2019 supports both OLR (Original
Location Recovery) & ALR (Alternate Location Recovery) for restoring the protected VM.
Use the following procedure:
1. In the DPM Administrator console, click Protection > Create protection group to open the Create New
Protection Group wizard.
2. On the Select Group Members page, select the VMWare VMs you want to protect.
3. On the Select Data Protection Method page, select I want long-term protection using tape.
4. In Specify Long-Term Goals > Retention range, specify how long you want to keep your tape data (1-99
years). In Frequency of backup, select the backup frequency that you want.
5. On the Select Tape and Library Details page, specify the tape and library that'll be used for back up of this
protection group. You can also specify whether to compress or encrypt the backup data.
Create a Protection Group for VMware VMs
1. In the Administrator Console, click Protection.
2. On the tool ribbon, click New to open the Create New Protection Group wizard.
3. In the Select Protection Group Type screen, select Servers and click Next.
4. In the Select Group Members screen, expand the Available members folders and select the folders to
protect and click Next. Once you select a folder, the member is added to the Selected members list. Items
already protected by a DPM server cannot be selected again. View the DPM server that protects an item by
hovering over the item in the Available members list.
5. On the Select Data Protection Method screen, type a Protection group name, and then select the
protection method. For protection method, you can choose: short-term protection to a hard drive, long term
backup to tape, or online protection to the cloud. Once you've selected your protection method, click Next.
If you have a standalone tape or tape library connected to the DPM server, you'll be able to select I want
long-term protection using tape.
6. On the Specify Short-Term Goals screen, for the Retention Range specify the number of days your data
is kept on disk. If you want to change the schedule when application recovery points are taken, click Modify.
On the Express Full Backup tab, choose a new schedule for the time(s) and days of the week when Express
Full Backups are taken. The default is daily at 8 PM, local time for the DPM server. When you have the
short-term goals you like, click Next.
7. If you want to store data on tape for long-term storage in Specify long-term goals, indicate how long you
want to keep tape data (1-99 years). In Frequency of backup, specify how often backups to tape should
run. The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until there is
insufficient space on the tape. You can also collocate data from different protection groups on tape.
On the Select Tape and Library Details page, specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
8. On the Review Disk Allocation screen, recommended disk allocations are displayed. Recommendations are
based on the retention range, the type of workload and the size of the protected data. Click Next.
9. On the Choose Replica Creation Method screen, specify how the initial replication of data in the protection
group is performed. If you choose to replicate over the network, we recommended you choose an off-peak
time. For large amounts of data or less than optimal network conditions, consider replicating the data offline
using removable media.
10. On the Consistency Check Options screen, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don’t
want to configure automatic consistency checking, you can run a manual check. To run a manual check, right-
click the protection group in the Protection area of the DPM console, and select Perform Consistency Check.
11. On the Specify Online Protection Data screen, select the data source(s) that you want to protect.
12. On the Specify Online Backup Schedule screen, specify how often you want to take a backup from the disk
backup to Azure. A recovery point is created each time a backup is taken.
13. On the Specify Online Retention Policy screen, specify how long you want to retain your data in Azure.
Read more about backing up DPM to Azure in the article, Backup DPM workloads with Azure Backup.
14. On the Choose Online Replication screen, choose your method for creating your initial backup copy. The
default choice is to send the initial backup copy of your data over the network. However, if you have a large
amount of data, it may be more timely to use the Offline Backup feature. See the Offline Backup article in
Azure for more information, including a step-by-step walkthrough.
15. On the Summary screen, review the settings. If you are interested in optimizing performance of the protection
group, see the article, Optimizing DPM operations that affect performance. Once you are satisfied with all
settings for the protection group, click Create Group to create the protection group and trigger the initial
backup copy.
The Status screen appears and gives you an update on the creation of your protection group, and the state of your
initial backup.
8. On the Summary screen, review your settings and click Recover to start the recovery process. The Recovery
status screen shows the progression of the recovery operation.
Restore an individual file from a VM
You can restore individual files from a protected VM recovery point. This feature is only available for Windows
Server VMs. Restoring individual files is similar to restoring the entire VM, except you browse into the VMDK and
find the file(s) you want, before starting the recovery process. To recover an individual file or select files from a
Windows Server VM:
1. In the DPM Administrator Console, click Recovery view.
2. Using the Browse pane, browse or filter to find the VM you want to recover. Once you select a VM or
folder, the Recovery points for pane displays the available recovery points.
3. In the Recovery Points for: pane, use the calendar to select the date that contains the desired recovery
point(s). Depending on how the backup policy has been configured, dates can have more than one recovery
point. Once you've selected the day when the recovery point was taken, make sure you've chosen the
correct Recovery time. If the selected date has multiple recovery points, choose your recovery point by
selecting it in the Recovery time drop-down menu. Once you chose the recovery point, the list of
recoverable items appears in the Path: pane.
4. To find the files you want to recover, in the Path pane, double-click the item in the Recoverable item
column to open it. Select the file, files, or folders you want to recover. To select multiple items, press the Ctrl
key while selecting each item. Use the Path pane to search the list of files or folders appearing in the
Recoverable Item column. Search list below does not search into subfolders. To search through
subfolders, double-click the folder. Use the Up button to move from a child folder into the parent folder.
You can select multiple items (files and folders), but they must be in the same parent folder. You cannot
recover items from multiple folders in the same recovery job.
5. When you have selected the item(s) for recovery, in the Administrator Console tool ribbon, click Recover to
open the Recovery Wizard. In the Recovery Wizard, the Review Recovery Selection screen shows the
selected items to be recovered.
6. On the Specify Recovery Options screen, if you want to enable network bandwidth throttling, click
Modify. To leave network throttling disabled, click Next. No other options on this wizard screen are
available for VMware VMs. If you choose to modify the network bandwidth throttle, in the Throttle dialog,
select Enable network bandwidth usage throttling to turn it on. Once enabled, configure the Settings
and Work Schedule.
7. On the Select Recovery Type screen, click Next. You can only recover your file(s) or folder(s) to a network
folder.
8. On the Specify Destination screen, click Browse to find a network location for your files or folders. DPM
creates a folder where all recovered items are copied. The folder name has the prefix, DPM_day-month-
year. When you select a location for the recovered files or folder, the details for that location (Destination,
Destination path, and available space) are provided.
9. On the Specify Recovery Options screen, choose which security setting to apply. You can opt to modify
the network bandwidth usage throttling, but throttling is disabled by default. Also, SAN Recovery and
Notification are not enabled.
10. On the Summary screen, review your settings and click Recover to start the recovery process. The
Recovery status screen shows the progression of the recovery operation.
NOTE
You can modify the number of jobs to a higher value. If you set the jobs number to 1, replication jobs run serially. To
increase the number to a higher value, you must consider the VMWare performance. Considering the number of
resources in use and additional usage required on VMWare vSphere Server, you should determine the number of
delta replication jobs to run in parallel. Also, this change will affect only the newly created Protection Groups. For
existing Protection groups you must temporarily add another VM to the protection group. This should update the
Protection Group configuration accordingly. You can remove this VM from the Protection Group after the procedure
is completed.
NOTE
VMWare 6.7 onwards had enabled TLS as communication protocol.
System Center Data Protection Manager (DPM ) can back up the SQL Server instances that are being used as the
System Center Virtual Machines Manager (VMM ) database in a couple of ways:
You can do a regular SQL Server backup.
You can back up the SQL Server database using the VMM Express Writer component that appears under
the VMM server in the DPM console. The main advantage to this method is that you don't need to set up
any special permissions on the SQL Server.
DPM can back up the VMM database using the VMM Express Writer component when VMM is running on
System Center 2012 onwards as a physical/virtual machine in the following deployment scenarios:
A standalone VMM host + standalone SQL Server (default and named, local and remote)
A standalone VMM host + clustered SQL Server (default and named, remote)
A clustered VMM host + standalone SQL Server (default and named, local and remote)
A clustered VMM host + clustered SQL Server (default and named, remote)
Back up VMM
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select protection group type click Clients. You only select clients if you want to back up data on a
Windows computer running a Windows client operating system. For all other workloads select server. Learn
more in Deploy protection groups.
3. In Select Group Members expand the VMM machine and select VMM Express Writer.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
6. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also co-locate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In Review disk allocation page review the storage pool disk space allocated for the protection group. Data
size shows the size of the data you want to back up, and Disk space shows the space that DPM
recommends for the protection group. Select Automatically grow the volumes to automatically increase
size when more disk space is required for backing up data.
8. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
12. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
14. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.
Prepare to back up a generic data source
2 minutes to read
System Center Data Protection Manager (DPM ) provides the Generic Data Source (GDS ) infrastructure so that
you can protect any Microsoft workload as long as it has a VSS writer.
Here's what you can do:
Complete backup using Express full backup
Recovery to the original location
Back up referential data sources
Back up data source with shared disk clusters
Back up in muliple domains
Back up to tape
Example 1
The Modify-RegisteredWriters command displays the list of writers that are currently registered with the local
DPM server.
Modify-RegisteredWriters -List
Example 2
The Modify-RegisteredWriters command adds the two new writer IDs to the list of registered writers on the local
DPM server.
Modify-RegisteredWriters -Add -Writers "46eef637-28ca-4223-8bb6-2e87bd945179,e1cdedc6-d9d2-4fc3-8af6-
5d0d0fe3e8af"
Example 3
The Modify-RegisteredWriters command removes the specified writer ID from the list of registered writers on
DPM server dpm1.contoso.com.
Modify-RegisteredWriters -DpmServerName dpm1.contoso.com -Remove -Writers 46eef637-28ca-4223-8bb6-2e87bd945179
Prepare machines in workgroups and untrusted
domains for backup
11 minutes to read
System Center Data Protection Manager (DPM ) can protect computers that are in untrusted domains or
workgroups. You can authenticate these computers using a local user account (NTLM authentication), or using
certificates. For both types of authentication you'll need to prepare the infrastructure before you can set up a
protection group that contains the sources you want to back up.
1. Install a certificate-If you want to use certificate authentication install a certificate on the DPM server and
on the computer you want to protect.
2. Install the agent-Install the agent on the computer you want to protect.
3. Recognize the DPM server-Configure the computer to recognize the DPM server for performing
backups. To do this you'll run the SetDPMServer command.
4. Attach the computer-Lastly you'll need to attach the protected computer to the DPM server.
Untrusted: Supported
Untrusted: Supported
Untrusted: Supported
Untrusted: Supported
Untrusted: Supported
Secondary DPM server (For backup of primary DPM server) Workgroup: Supported
Note: Both Primary and Secondary DPM Servers must be in Untrusted: Supported
same or trusted domain.
Certificate authentication only
Network settings
SETTINGS COMPUTER IN WORKGROUP OR UNTRUSTED DOMAIN
Authentication: NTLM/certificate
Authentication: NTLM/certificate
DPM account requirements Local account without admin rights on DPM server. Uses
NTLM v2 communication
SETTINGS COMPUTER IN WORKGROUP OR UNTRUSTED DOMAIN
Certificate requirements
You'll need to use the same naming convention (FQDN or NETBIOS ) that you did when you configured
protection. On the DPM server you'll need to run the Update -NonDomainServerInfo PowerShell cmdlet. Then
you'll need to refresh the agent information for the protected computer.
NetBIOS example: Protected computer:
SetDpmServer.exe -dpmServerName Server01 -isNonDomainServer -UpdatePassword DPM server:
Update-NonDomainServerInfo -PSName Finance01 -dpmServerName Server01
Because the workgroup computers are typically accessible only by using NetBIOS name, the value for
DPMServerName must be the NetBIOS name.
Example 2
Example to configure a workgroup computer with conflicting NetBIOS names after the agent is installed.
1. On the workgroup computer, run
SetDpmServer.exe -dpmServerName Server01.corp.contoso.com -isNonDomainServer -userName mark -
productionServerDnsSuffix widgets.corp.com
.
2. On the DPM server, run
Attach-NonDomainServer.ps1 -DPMServername Server01.corp.contoso.com -PSName Finance01.widgets.corp.com -
Username mark
.
To ensure that data can be recovered if System Center Data Protection Manager (DPM ) fails, you'll need a strategy
for backing up the DPM server. If it isn't backed up you'll need to rebuild it manually after a failure, and disk-based
recovery points won't be recoverable. You can back up DPM servers using a couple of methods:
Back up the DPM server - You can back up a primary DPM server with a secondary DPM server. The
secondary server will protect the primary server database and the data source replicas stored on the
primary server. If the primary server fails, the secondary server can continue to protect workloads that are
protected by the primary server, until the primary server is available again. If you need to rebuild the
primary server you can restore the databases and replicas to it from the secondary server. You can also
restore data to protected computers directly from the secondary server when the primary server isn't
available. You can set up two servers, one as primary and the another as secondary, or configure each server
to act as the primary for the other. You can also configure a chain of DPM servers that protect each other
according to the chain order.
Back up the DPM database - You can configure a DPM server to back up its own databases to its tape
library, or you can use non-Microsoft software to back up the databases to tape or removable media.
Back up DPM using third-party software - You can back up DPM servers using third-party software that
supports DPM and VSS.
2. Add the primary DPM server to an existing protection group, or create a new one. Select to protect the
following data sources:
The SQL Server databases configured for the primary server.
All volumes on the primary DPM server (Shares will not be visible separately)
All replicas on the primary DPM server.
At a minimum, you should select the databases, the \Program Files\Microsoft System
Center\DPM\DPM\Config folder, and the \Program Files\Microsoft System Center\DPM\Scripting
folder.
Note that you can't exclude file names from protection for a replica. In addition, all DPM servers must be running
the same version, updates etc. When setting up synchronization we recommend you synchronize every 24 hours.
Set up DPM chaining
Before you consider chaining note these limitations:
Each DPM server can only be protected once in the chain so verify that they're not protected by more than
one server.
Primary and secondary servers are established by the chain. So, for example if server DPM3 is actually
protecting server DPM1 because it's acting as the secondary server for DPM2, it can't act directly as a
secondary server for DPM1.
If a DPM server is configured to protect its own data source the chain will be broken. For example, if DPM1
protects its own database or system state, DPM2 can't protect DPM1.
Before you can protect the database of a primary DPM server you need to start the SQL Server VSS Writer
service on the primary server.
Chaining example 1
Scenario 1: Chained protection
Scenario 1 shows a scenario in which four DPM servers are chained:
DS4 DS3 -
Cyclic protection
If you don't want to use a secondary server then two DPM servers can protect each other.
Scenario 3: Cyclic protection
Scenario 3 shows a scenario using cyclic protection
Configure chaining
Set up chaining as follows:
1. Install the DPM protection agent on the DPM server that you want to protect from the DPM server you
want to protect it from.
2. Configure secondary protection for the data sources protected by the DPM server you are protecting. Note
in the DPM console you won't be able to configure protection for data sources that are already protected by
the agent. This prevents you from repeatedly protecting data.
3. As an example, if you have DPM1 and DPM2 you'd install the DPM protection agent from DPM1 to DPM2
and vice versa. Then configure secondary protection on DPM2 for servers that DPM1 protects, and
configure secondary protection on DPM1 for servers that DPM2 protects.
Recover the server
If a primary server fails you can switch protection to the secondary server. After you've switched protection, you
can perform recovery functions from the secondary server.
To switch protection to the secondary server in the DPM console right-click the protection group for which
you want to switch protection, and select Switch Disaster Protection. The replica will appear as
inconsistent until you run a consistency check.
To recover a primary DPM server you'll need to reestablish protection for all data sources previously
protected by it. Note that you can't restore recovery points, and when you recover database files you should
make sure the restore location on the DPM server is secure.
You should recover the DPM database and then recovery any replicas.
Then reestablish protection by running Setdpmserver.exe.
Back up to Azure Easily configured and monitored in Only available on DPM 2012 SP1 or
DPM. later.
Back up the database by backing up the Simple to configure and monitor. Not a good option for disaster recovery.
DPM storage pool It's online and recovery might not work
The backup is kept on the DPM storage as expected if the DPM server or
pool disks and is easy to access locally. storage pool disk fails.
DPM scheduled backups support 512 Not an option if the database is hosted
express full backups. If you back up locally and you want to enable
hourly you'll have 21 days of full secondary protection. A workaround
protection. would be to use a remote SQL Server to
host the database.
Back up to a secondary DPM server Easily configured and monitored in Additional DPM server and storage are
DPM. required. Both DPM servers must to be
running the same DPM version and
DPM scheduled backups support 512 update rollups.
express full backups. If done hourly, this
provides 21 days of short term
protection. If done every 30 minutes, it
provides 10 days of protection.
Back up to tape Easily configured and monitored in Not an option if the database is hosted
DPM. locally and you want to enable
secondary protection. A workaround
DPM scheduled tape backups support would be to use a remote SQL Server to
retention up to 99 years. host the database.
Tape backup can be taken offsite for Only one tape backup per day can be
disaster recovery. scheduled.
Tape backup can be restored from any You need a working DPM server with a
other DPM server that has a tape tape library to be able to read a DPM
drive/library attached that uses the backup tape that contains the copy of
same tape media type. the database you want to restore.
Tape can be encrypted for secure Some preparation and special steps are
storage. required to gain access to the tape
based recovery points.
Back up with native SQL Server backup Built-in to SQL Server. Not a good option for disaster recovery
to a local disk unless the backups are copied to a
The backup is kept on a local disk which remote location.
is easily accessible.
Requires local storage for backups
It can be scheduled to run as often as which may limit retention and
you like. frequency.
Back up with native SQL backup and Easily monitored in DPM. Only supports 64 recovery points.
DPM protection to a share protected by
DPM Multiple locations of the backup Not a good option for site disaster
database files. recovery. DPM server or DPM storage
pool disk failure may hinder recovery
Easily accessible from any Windows efforts.
machine on the network.
Not an option if the DPM DB is hosted
Potentially the fastest recovery method. locally and you want to enable
secondary protection. A workaround
would be to use a remote SQL Server to
host the DPMDB.
Back up to Azure Easily configured and monitored in Only available on DPM 2012 SP1 or
DPM. later.
Back up the database by backing up the Simple to configure and monitor. Not a good option for disaster recovery.
DPM storage pool It's online and recovery might not work
The backup is kept on the DPM storage as expected if the DPM server or
pool disks and is easy to access locally. storage pool disk fails.
DPM scheduled backups support 512 Not an option if the database is hosted
express full backups. If you back up locally and you want to enable
hourly you'll have 21 days of full secondary protection. A workaround
protection. would be to use a remote SQL Server to
host the database.
Back up to a secondary DPM server Easily configured and monitored in Additional DPM server and storage are
DPM. required. Both DPM servers must to be
running the same DPM version and
DPM scheduled backups support 512 update rollups.
express full backups. If done hourly, this
provides 21 days of short term
protection. If done every 30 minutes, it
provides 10 days of protection.
Back up to tape Easily configured and monitored in Not an option if the database is hosted
DPM. locally and you want to enable
secondary protection. A workaround
DPM scheduled tape backups support would be to use a remote SQL Server to
retention up to 99 years. host the database.
Tape backup can be taken offsite for Only one tape backup per day can be
disaster recovery. scheduled.
Tape backup can be restored from any You need a working DPM server with a
other DPM server that has a tape tape library to be able to read a DPM
drive/library attached that uses the backup tape that contains the copy of
same tape media type. the database you want to restore.
Tape can be encrypted for secure Some preparation and special steps are
storage. required to gain access to the tape
based recovery points.
Back up with native SQL Server backup Built-in to SQL Server. Not a good option for disaster recovery
to a local disk unless the backups are copied to a
The backup is kept on a local disk which remote location.
is easily accessible.
Requires local storage for backups
It can be scheduled to run as often as which may limit retention and
you like. frequency.
Back up with native SQL backup and Easily monitored in DPM. Only supports 64 recovery points.
DPM protection to a share protected by
DPM Multiple locations of the backup Not a good option for site disaster
database files. recovery. DPM server or DPM storage
pool disk failure may hinder recovery
Easily accessible from any Windows efforts.
machine on the network.
Not an option if the DPM DB is hosted
Potentially the fastest recovery method. locally and you want to enable
secondary protection. A workaround
would be to use a remote SQL Server to
host the DPMDB.
If you back up by using a DPM protection group, we recommend that you use a unique protection group for
the database.
As a best practice, if you're backing up to tape, make at least two copies of the backup tapes, and store each
of the backup tapes in a different remote location. This added protection guards against physical damage or
loss of the backup tape.
If the DPM SQL Server instance isn't running on the DPM server, install the DPM protection agent on the
SQL Server computer before you can protect the DPM databases on that server.
NOTE
For restore purposes, the DPM installation you want to restore with the DPM database must match the version of
the DPM database itself. For example, if the database you want to recover is from a DPM 2016 with Update Rollup 4
installation, the DPM server must be running the same version with Update Rollup 4. This means that you might
have to uninstall and reinstall DPM with a compatible version before you restore the database. To check the database
version you might have to mount it manually to a temporary database name and then run a SQL query against the
database to check the last installed rollup, based on the major and minor versions.
Make sure you have the passcode that was specified when the Azure Recovery Services Agent was installed
and the DPM server was registered in the Azure Backup vault. You'll need this passcode to restore the
backup.
2. Create an Azure Backup vault, download the Azure Backup Agent installation file and vault credentials. Run
the installation file to install the agent on the DPM server and use the vault credentials to register the DPM
server in the vault. Learn more.
3. After the vault is configured set up a DPM protection group that contains the DPM database, and select to
back it up to disk and to Azure.
Recover the DPM database from Azure
You can recover the database from Azure using any DPM server (must be running at least DPM 2012 R2 with
update rollup 7) that's registered in the Azure Backup vault, as follows:
1. in the DPM console click Recovery > Add External DPM.
2. Provide the vault credentials (download from the Azure Backup vault). Note that the credentials are only
valid for two days.
3. In Select External DPM for Recovery select the DPM server for which you want to recover the database,
type in the encryption passphrase, and click OK.
4. Select the recovery point you want to use from the list of available points. Click Clear External DPM to
return to the local DPM view.
NOTE
This option is applicable for DPM with legacy storage.
Before you start you'll need to run a script to retrieve the DPM replica volume mount point path so that you know
which recovery point contains the DPM backup. Do this after initial replication with Azure Backup. In the script
replace dplsqlservername% with the name of the SQL Server instance hosting the DPM database.
Select Path,ro.FileSpec,media.Label,media.BarcodeValue,pd.CreationDate,
pd.ExpiryDate,pd.LifeStatus as "1=valid, 2=expired"
from dbo.tbl_MM_MediaMap mm
join dbo.tbl_MM_PhysicalDataset pd on pd.datasetid = mm.datasetid
join dbo.tbl_MM_Media media on media.MediaId = mm.MediaId
join dbo.tbl_RM_RecoverableObjectFileSpec ro on ro.DatasetId = mm.DatasetId
where ro.filespec like '%DPMDB%'
order by CreationDate desc
1. Create a protection group and on the Select Group Members page select the SQL Server (if it's running
locally select DPMDB under the DPM server).
2. Select to do long-term protection with tape and specify the tape details on the Select Library and Tape
Details.
Recover the database
The restore process will depend on the tape hardware available and the current state of the DPM server that
took the tape-based backup. If you can't restore the tape from the DPM server that did the backup, you'll
need to restore it from another DPM server that has the same type of tape drive so that the tape can be
read. You might need to rebuild the DPM server if the only tape hardware available was the one attached to
the failed DPM server.
If you're using DPM tape encryption, you'll need the same certificate used to encrypt the tape installed on
the alternate DPM server.
To recover:
1. Locate the physical tape that contains the version/date/time of the DPM database you want to restore.
2. Insert the backup tape into the tape drive or library and perform a detailed inventory in the DPM console ->
Management ->Libraries. Note that If the DPM server you are restoring from is a different DPM server, or
it's a new installation of DPM on the original server, the tape will be shown as imported (not created by this
DPM server).
3. If necessary, re-catalog the imported tape.
4. On the Recovery tab, locate the database data source. If it was from an imported tape, the recovery point
will be under External DPM tapes.
5. Recover the database (DPMDB ) files. You can select to Recover to any instance of SQL Server or to Copy to
a network folder. After the files are restored from tape, continue with recovery steps using SQL
Management Studio or DPMSYNC -RESTOREDB.
5. Using Notepad, open the ScriptingConfig.xml file located under the ...\DPM\Scripting folder.
On a remote SQL Server: C:\Program Files\Microsoft Data Protection
Manager\DPM\Scripting
On a DPM server: C:\Program Files\Microsoft System Center\DPM\DPM\Scripting
6. Modify ScriptingConfig.xml and change DataSourceName= to be the drive letter that contains the
DPMDBBACKUP folder/share. Change the PreBackupScript entry to the full path and name of
thebkupdb.cmd saved in step 5.
Select ag.NetbiosName as
ServerName,ds.DataSourceName,vol.MountPointPath,vol.GuidName
from tbl_IM_DataSource as ds
join tbl_PRM_LogicalReplica as lr on ds.DataSourceId=lr.DataSourceId
join tbl_AM_Server as ag on ds.ServerId=ag.ServerId
join tbl_SPM_Volume as vol on lr.PhysicalReplicaId=vol.VolumeSetID
and vol.Usage =1
and lr.Validity in (1,2)
where ds.datasourcename like '%C:\%' -- volume drive letter for DPMBACKUP
and servername like '%dpmsqlservername%' --netbios name of server hosting DPMDB
4. If you need to recover after moving DPM storage pool disks or a DPM server rebuild:
a. You have the volume GUID, so should that volume need to be mounted on another Windows server
or after a DPM server rebuild, use mountvol.exe to assign it a drive letter using the volume GUID
from the SQL script output: C:\Mountvol X: \\?\Volume{d7a4fd76-a0a8-11e2-8fd3-
001c23cb7375}\.
b. Reshare the DPMBACKUP folder on the replica volume using the drive letter and portion of the
replica path representing the folder structure.
You can monitor a single System Center Data Protection Manager (DPM ) server from the DPM Administrator
console, multiple DPM servers from the Central Console, or monitor DPM activity with Operations Manager.
Central Monitoring
All DPM -A customers (customer connected to Azure) have the flexibility of using Central Monitoring, a monitoring
solution provided by Microsoft Azure Backup. You can monitor both on premise and cloud backups, using Log
Analytics with Central Monitoring. You can use this monitoring solution to monitor your key backup parameters
such as backups jobs, backup alerts, and cloud storage across all your recovery service vaults & subscriptions. You
can also create alert notifications and open tickets using webhooks or ITSM integration.
NOTE
You must have a valid Azure subscription to be able to centrally monitor.
NOTE
Choose the same workspace for all the vaults to get a centralized view in the workspace. Allow 24 hours for initial
data push to complete post completing the configuration.
Here is a sample backup report:
Sample 2:
3. You can also monitor active alerts, current data sources being backed up and cloud storage as shown below:
4. You can also specify the desired time range for monitoring the backup parameters.
System Center Data Protection Manager (DPM ) logs activity in log files (*.errlog). Log files are tab delimited and
can be opened in Excel for easy viewing. You can filter with specific levels and task IDs in order to find events that
interest you. Every log entry has a log task ID generated by DPM as a unique GUID for every DPM task. This helps
you to track down log entries for specific jobs. Log files are located as follows:
DPM installation information: Logged on the DPM server at %ProgramFiles%\Microsoft System
Center\DPM\DPMLogs.
DPM activity information: Logged on the DPM server at %ProgramFiles%\Microsoft System
Center\DPM\DPM\Temp.
Protected client activity: Logged on the client computer at %ProgramFiles%\Microsoft Data Protection
Manager\DPM\Temp Logs. Client-initiated activities such as self-service recovery are logged on the client
computer based on the user (%USERPROFILE%\AppData\Roaming\Microsoft\System Center Data
Protection Manager\).
You can tweak log file settings as follows:
TRACE_ERROR - Logs all errors and Can be overridden per binary. A valid
failures - default setting bitmask of allowed values is:
TRACE_DBG_CRITICAL = 0x400
};
1. In the registry, at
HKLM\Software\Microsoft\Microsoft
Data Protection Manager add a
DWORD value TraceLogLevel and set it
to 0x43e.
2. To apply immediately stop the DPM
services for which you want to enable
verbose logging and delete the old logs.
3. After you reproduce the issue and
finish troubleshooting, delete the
registry entry you created and restart
the stopped services so that non-
verbose logging works again.
5 MB by default
30 by default
DPM Engine (MSDPM) MSDPM MSDPM engine logs contain info about
engine API calls, jobs and task triggers,
housekeeping jobs and so on.
DPM Replication Agent (DPMRA) DPMRA Logs information about tape backups,
disk replication, restore, secondary DPM
replications. On DPM server and
protected client.
DPM Library Agent (DPMLA) LAAgent Logs library related activities. On DPM
server and shared library server.
Exchange Cmdlet Wrapper ExchangeCmdletsWrapper Logs for various cmdlets run by DPMRA
on Exchange client side
E14 Cmdlet Wrapper
DPM Backup Tool DpmBackup Logs for tool doing DPM backup
Install SQL Prep (Remote SQL) SQL Prep Bootstrapper Logs during installation of remote SQL
Server before Setup.
SERVICE/PROCESS BINARY NAME DETAILS
Logs at:
%USERPROFILE%\AppData\Roaming\Mi
crosoft\Microsoft System Center Data
ProtectionManager 2012\
Logs at:
%USERPROFILE%\AppData\Roaming\Mi
crosoft\Microsoft System Center Data
ProtectionManager 2012\
Logs at:
%USERPROFILE%\AppData\Roaming\Mi
crosoft\Microsoft System Center Data
ProtectionManager 2012\
Generate DPM reports
16 minutes to read
System Center Data Protection Manager (DPM ) uses SQL Server Reporting Services to create reports. In the
Reporting task area you can generate and view reports, schedule automation report generation, managing
settings, and subscribe to reports. Alternatively you can generate DPM reports from Operations Manager if you're
using it to monitor DPM.
DPM reports
DPM provides a number of different reports:
Status report: Provides the status of all recovery points for a specified time period. It lists recovery jobs,
and shows the total number of successes and failures for recovery points and recovery point creation. You
can use this report to track and verify recovery point metrics.
Protection report: Provides commonly used metrics for backup success rolled up over long periods of
time. Use this report to track how backups are doing and what's been backed up successfully.
Recovery report: Provides commonly used metrics for recovery success rolled up over long periods of
time. Use this report to track how recoveries are doing and how well you performed against your SLAs for
RTOs.
Disk utilization report: Summarizes disk capacity, disk allocation, and disk usage in the DPM storage pool.
Use this report to do the following: Identify trends in disk usage and make decisions about modifying space
allocations.
Tape management and tape utilization report: Use the tape management report to track information
about tape rotation and decommissioning, and to verify that the free media threshold hasn't been exceeded.
Use the tape utilization report to track trending of resource (disk/tape) usage over time to assist capacity
planning.
Predefined SQL reports
DPM includes several SQL Server views to help you create custom reports. SQL views provide a simpler method
that querying tables directly, by populating columns with data collected from multiple tables in the database. You
don't need in-depth knowledge of the entire database or the relationship between tables and keys.
Note though that SQL views can degrade performance if used too frequently because the view runs each time it's
queries. In addition the supported views might not include all the columns you need.
The following table summarizes the predefined SQL views.
2=Information
0 = Active
1 = Recommended action in
progress
2 = Resolved
Vw_DPM_Alerts OccurredSince Date and Time First time alert was raised
Vw_DPM_Media MediaExpiryDate Date and time The time when all data sets
on this tape will expire.
0/1=Progress
2=Succeeded
3=Failure
Vw_DPM_RecoveryPointDi Date and time The time at which the Date and time
sk recovery point creation job
was run
2=Succeeded 2=Succeeded
3=Failure 3=Failure
VIEW FIELD DATA TYPE DESCRIPTION
Vw_DPM_RecoveryPointT
ape
Vw_DPM_RecoveryPointT Date and time The time at which the Date and time
ape recovery point creation job
was run
2=Succeeded 2=Succeeded
3=Failure 3=Failure
Historical information on
tape usage counts.
0=Weekly
1=Monthly
2=Quarterly
3=Yearly
VIEW FIELD DATA TYPE DESCRIPTION
1=Monthly
2=Quarterly
3=Yearly
0=Weekly
1=Monthly
2=Quarterly
3=Yearly
2=Succeeded
3=Failure
Set up reports
Schedule reports
Reports aren't scheduled by default in DPM. To start creating and saving historical reports you create a report
schedule. Each report type has an independent schedule A report only has a single schedule. Schedule a report as
follows:
1. In DPM Administrator Console, go to the Reporting view. On the display pane, select the report and click
Schedule.
2. Select Run the according to the schedule options.
3. On the Schedule tab, select schedule options, including frequency, how to group, the time of the day to
generate, and the granularity. Granularity is limited by frequency. So, if the frequency is weekly, then so is
the granularity, the time period to be included in the report data, and the number of copies to retain in
history.
View reports
In the DPM Administrator Console you can display both new and historical reports in Internet Explorer. You can
use the Reporting Services Web toolbar at the top of report to customize, export or print it.
1. You can request a new report with the following settings:
Display - You can view a report groups by protected computer or protection group.
You can specify or exclude a specific time period. You can set report granularity as follows:
Week - Seven days - from Sunday through Saturday
Month - A full month from the first to the last day of the month
Quarterly - For three months starting from January (e.g January through March.
Annual - January 1 to December 31 of a particular year.
2. You can view an available report from the Available reports list. When the number of historical reports
saved equals the maximum number specified in the report schedule, the next report that is saved will
replace the oldest copy of the report, so you can retain the maximum number of copies at all times.
Print reports
Reports in DPM have been designed to print on A4 paper without horizontally splitting the information across
pages. The MHTML and PDF formats are not editable, so you can't modify the report to fit other paper sizes.
Note that if you experience any issues with reports on fitting on A4 paper try changing the dimensions of the
report page width 8.27in and the height to 11.69in. There are details of how to do that on Bob Cornelissen's BICTT
blog.
Pr i n t M HT M L r epo r t s
ErrorCode int Error code for job failure. Error code can
be ignored if job succeeded
View Name: vDPMSLATrend (Useful to show the percentage of instances where SLA was or wasn't met):
View Name: vDPMTapeManagement (Shows DPM information for tape libraries and tape identification):
Central Console is a System Center Operations Manager console that you can deploy to manage and monitor
multiple System Center Data Protection Manager (DPM ) servers from a single location. It provides:
Centralized monitoring of DPM servers from a single location - You can monitor different versions of DPM, and
track the status and health of servers, tasks, protected resources, tape libraries, available storage and disk space,
and backups.
Service-level agreement (SLA)-based alerting. Alerts are generated when an SLA is broken.
View the state of all roles on DPM servers
Monitor, identify, action, and troubleshoot alerts generated when an SLA breaks. You can consolidate alerts to
show:
only one instance for repeated alerts;
single alert for alerts with the same root cause, or if multiple backups fail for the same data source,
and generate only one ticket if a ticketing system is used
Remote corrective actions and remote recovery
Monitor DPM server memory, CPU, disk resources, database, and performance trends
Modify and manage settings, including disk allocation, recovery points, users, protect groups
Recover data
Next steps
After you import the Management Packs they discover and monitor data without requiring any additional
configuration. You can optionally tweak settings like monitors and rules for your environment. For example if you
find that performance-measuring rules that are enable degrade server performance with slow WAN links, you can
disable them. When you have everything configured as needed you can generate DPM reports from Operations
Manager.
Improve replication performance
3 minutes to read
There are a number of steps you can take to optimize the performance of System Center 2012 - Data Protection
Manager (DPM ) data replication and synchronization, including network throttling, data compression, staggering
synchronization, and optimizing express backups.
Network throttling
Network bandwidth usage throttling is configured at backed up machine level and you can specify different
network bandwidth usage throttling rates for work hours, non-work hours, and weekends, and you define the times
for each of those categories. Enable throttling as follows:
1. Open DPM console > Management > Agent, select the machine on which you want to throttle bandwidth
> Throttle.
2. Click Throttle > Enable network bandwidth usage.
3. Select Throttle Settings and Work Schedule for the machine and click OK.
NOTE
You can configure network bandwidth usage throttling separately for work hours and nonwork hours, and you can
define the work hours for the protected computer.
Central Console is a System Center Operations Manager console that you can deploy to manage and monitor
multiple System Center Data Protection Manager (DPM ) servers from a single location. It provides:
Centralized monitoring of DPM servers from a single location - You can monitor different versions of DPM,
and track the status of servers, tasks, protected resources, tape libraries, available storage, and disk space.
Role-based access control
Remote recovery and remote corrective actions
Service level agreement (SLA)-based alerting and alert consolidation - Alerts are generated when an SLA is
broken. You can consolidate alerts and work on high priority items, as follows:
Repeated alerts - Display only one alert for repeated alerts. For example if a job is scheduled to run
hourly and hasn't run for the last 10 hours, only one alert for the failed job is displayed.
Same root cause - If multiple alerts have the same root cause, or if multiple backups fail for the same
data source, only the alerts informing you of the failure is generated.
Ticket generation - If you are using a ticketing system, only one ticket is generated.
Scoped console - This is based on the DPM Administrator Console with a few minor differences.