0% found this document useful (0 votes)
569 views329 pages

Data Protection Manager

This document provides an overview of how System Center Data Protection Manager (DPM) works to protect data. DPM creates and maintains replicas of protected data sources that are stored on the DPM server's storage pool. Protection agents track changes to protected data and transfer them to the DPM server to synchronize the replicas. The method of synchronization depends on whether file data or application data is being protected. DPM regularly creates recovery points that can be used for data recovery. Protection is managed through protection groups that contain common protection settings for collections of protected data sources.

Uploaded by

tetkaC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
569 views329 pages

Data Protection Manager

This document provides an overview of how System Center Data Protection Manager (DPM) works to protect data. DPM creates and maintains replicas of protected data sources that are stored on the DPM server's storage pool. Protection agents track changes to protected data and transfer them to the DPM server to synchronize the replicas. The method of synchronization depends on whether file data or application data is being protected. DPM regularly creates recovery points that can be used for data recovery. Protection is managed through protection groups that contain common protection settings for collections of protected data sources.

Uploaded by

tetkaC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 329

Contents

Overview
Data Protection Manager
How does DPM work?
What can DPM back up?
DPM-compatible tape libraries
Get Started
DPM build versions
DPM release notes
What's new in DPM
What DPM supports
How To
Plan Your DPM Environment
Get ready to deploy DPM servers
Prepare your environment for DPM
Prepare data storage
Identify compatible tape libraries
Identify data sources you want to protect
Install or Upgrade DPM
Install DPM
Upgrade your DPM installation
Add Modern Backup storage
Deduplicate DPM storage
Deploy DPM
Deploy the DPM protection agent
Deploy protection groups
Configure firewall settings
Protect Workloads
Back up Hyper-V virtual machines
Back up Exchange with DPM
Back up SharePoint with DPM
Back up SQL Server with DPM
Back up client computers with DPM
Back up file data with DPM
Back up system state and bare metal
Back up and restore VMware servers
Back up and restore VMM servers
Prepare to back up a generic data source
Prepare machines in workgroups and untrusted domains for backup
Back up the DPM server
Monitor and Manage
Monitor DPM
Set up DPM logging
Generate DPM reports
Use SCOM to manage and monitor DPM servers
Improve replication performance
Use central console to manage DPM servers
Data Protection Manager
2 minutes to read

Every organization needs a business continuity and disaster recovery (BCDR ) strategy to make sure resources are
available during planned and unplanned outages, and that you're able to recover to normal working conditions
when things go wrong. Your BCDR strategy requires keeping your data safe and recoverable, and keeping your
business workloads, applications, and services continuously available. System Center Data Protection Manager
(DPM ) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the
backup and recovery of enterprise data.
You can deploy System Center Data Protection Manager (DPM ) for:
Application-aware backup: Application-aware back up of Microsoft workloads, including SQL Server,
Exchange, and SharePoint.
File backup: Back up files, folders and volumes for computers running Windows server and Windows client
operating systems.
System backup: Back up system state or run full, bare-metal backups of physical computers running
Windows server or Windows client operating systems.
Hyper-V backup: Back up Hyper-V virtual machines (VM ) running Windows or Linux. You can back up an
entire VM, or run application-aware backups of Microsoft workloads on Hyper-V VMs running Windows.
Get a full list in What can DPM back up?
DPM can store backup data to:
Disk: For short-term storage DPM backs up data to disk pools.
Azure: For both short-term and long-term storage off-premises, DPM data stored in disk pools can be
backed up to the Microsoft Azure cloud using the Azure Backup service.
Tape: For long-term storage you can back up data to tape, which can then be stored offsite.
When outages occur and source data is unavailable, you can use DPM to easily restore data to the original source
or to an alternate location. That way, if the original data is unavailable because of planned or unexpected issues, you
can easily restore data from an alternate location. DPM uses SQL Server as its database and you protect the DPM
server itself for disaster recovery purposes. The following diagram provides an overview of DPM backup
functionality.
Next steps
Learn more in How does DPM work?
How does DPM work?
12 minutes to read

The method System Center Data Protection Manager (DPM ) uses to protect data varies according to the type of
data being protected, and the method of protection you select. This article serves as a primer for how DPM
functions. It is intended to educate those new to DPM, or those who may have basic questions about how DPM
works. This article covers Disk-Based protection processes, Tape-Based protection processes, recovery process, as
well as the protection policy.

Disk-based protection process


To provide disk-based data protection, the DPM server creates and maintains a replica, or copy, of the data that is
on protected servers. The replicas are stored in the storage pool which consists of a set of disks on the DPM server,
or on a custom volume. The following illustration shows the basic relationship between a protected volume and its
replica.

Whether you are protecting file data or application data, protection begins with the creation of the replica of the
data source.
The replica is synchronized, or updated, at regular intervals according to the settings that you configure. The
method that DPM uses to synchronize the replica depends on the type of data being protected. For more
information, see The File Data Synchronization Process and The Application Data Synchronization Process. If a
replica is identified as being inconsistent, DPM performs a consistency check, which is a block-by-block verification
of the replica against the data source.
A simple example of a protection configuration consists of a DPM server and a protected computer. The computer
is protected when you install a DPM protection agent on the computer and add its data to a protection group.
Protection agents track changes to protected data and transfer the changes to the DPM server. The protection
agent also identifies data on a computer that can be protected and is involved in the recovery process. You must
install a protection agent on each computer that you want to protect by using DPM. Protection agents can be
installed by DPM or you can install protection agents manually using applications such as Systems Management
Server (SMS ).
Protection groups are used to manage the protection of data sources on computers. A protection group is a
collection of data sources that share the same protection configuration. The protection configuration is the
collection of settings that are common to a protection group, such as the protection group name, protection policy,
disk allocations, and replica creation method.
DPM stores a separate replica for each protection group member in the storage pool. A protection group member
can be any of the following data sources:
A volume, share, or folder on a desktop computer, file server, or server cluster.
A storage group on an Exchange server or server cluster
A database of an instance of SQL Server or server cluster
NOTE
DPM does not protect data stored in USB drives.

The file data synchronization process


In DPM, for a file volume or share on a server, the protection agent uses a volume filter and the change journal to
determine which files have changed and then performs a checksum procedure for these files to synchronize only
the changed blocks. During synchronization, these changes are transferred to the DPM server and then applied to
the replica to synchronize the replica with the data source. The following figure illustrates the file synchronization
process.

If a replica becomes inconsistent with its data source, DPM generates an alert that specifies which computer and
which data sources are affected. To resolve the problem, the administrator repairs the replica by initiating a
synchronization with consistency check, also known as simply a consistency check, on the replica. During a
consistency check, DPM performs a block-by-block verification and repairs the replica to bring it back into
consistency with the data source.
You can schedule a daily consistency check for protection groups or initiate a consistency check manually.
At regular intervals that you can configure, DPM creates a recovery point for the protection group member. A
recovery point is a version of the data from which data can be recovered.
The application data synchronization process
For application data, after the replica is created by DPM, changes to volume blocks that belong to application files
are tracked by the volume filter.
How changes are transferred to the DPM server depends on the application and the type of synchronization. The
operation that is labeled synchronization in DPM Administrator Console is analogous to an incremental backup,
and it creates an accurate reflection of the application data when combined with the replica.
During the type of synchronization that is labeled express full backup in DPM Administrator Console, a full
Volume Shadow Copy Service (VSS ) snapshot is created but only changed blocks are transferred to the DPM
server.
Each express full backup creates a recovery point for application data. If the application supports incremental
backups, each synchronization also creates a recovery point. The synchronization type supported by each type of
application data is summarized as follows:
For protected Exchange data, synchronization transfers an incremental VSS snapshot using the Exchange
VSS writer. Recovery points are created for each synchronization and express full backup.
SQL Server databases that are log-shipped, in read-only mode, or that use the simple recovery model do
not support incremental backup. Recovery points are created for each express full backup only. For all other
SQL Server databases, synchronization transfers a transaction log backup, and recovery points are created
for each incremental synchronization and express full backup. The transaction log is a serial record of all the
transactions that have been performed against the database since the transaction log was last backed up.
Windows SharePoint Services and Microsoft Virtual Server do not support incremental backup. Recovery
points are created for each express full backup only.
Incremental synchronizations require less time than performing an express full backup. However, the time required
to recover data increases as the number of synchronizations increases. This is because DPM must restore the last
full backup and then restore and apply all the incremental synchronizations up to the point in time selected for
recovery.
To enable faster recovery time, DPM regularly performs an express full backup, a type of synchronization that
updates the replica to include the changed blocks.
During the express full backup, DPM takes a snapshot of the replica before updating the replica with the changed
blocks. To enable more frequent recovery point objectives, as well as to reduce the data loss window, DPM also
performs incremental synchronizations in the time between two express full backups.
As with the protection of file data, if a replica becomes inconsistent with its data source, DPM generates an alert
that specifies which server and which data source are affected. To resolve the problem, the administrator repairs
the replica by initiating a synchronization with consistency check on the replica. During a consistency check, DPM
performs a block-by-block verification and repairs the replica to bring it back into consistency with the data
sources.
You can schedule a daily consistency check for protection groups or initiate a consistency check manually.
The difference between file data and application data
Data that exists on a file server and which needs to be protected as a flat file qualifies as file data, such as Microsoft
Office files, text files, batch files, and so forth.
Data that exists on an application server and which requires DPM to be aware of the application qualifies as
application data, such as Exchange storage groups, SQL Server databases, Windows SharePoint Services farms,
and Virtual Server.
Each data source is presented in DPM Administrator Console according to the type of protection that you can
select for that data source. For example, in the Create New Protection Group Wizard, when you expand a server
that contains files and is also running Virtual Server and an instance of SQL Server, the data sources are treated as
follows:
If you expand All Shares or All Volumes, DPM displays the shares and volumes on that server and will
protect any data source selected in either of those nodes as file data.
If you expand All SQL Servers, DPM displays the instances of SQL Server on that server and will protect
any data source selected in that node as application data.
If you expand Microsoft Virtual Server, DPM displays the host database and virtual machines on that server
and will protect any data source selected in that node as application data.

Tape-based protection process


When you use short-term disk-based protection and long-term tape-based protection, DPM can back up data from
the replica volume to tape so that there is no impact on the protected computer. When you use tape-based
protection only, DPM backs up the data directly from the protected computer to tape.
DPM protects data on tape through a combination of full and incremental backups from either the protected data
source (for short-term protection on tape or for long-term protection on tape when DPM does not protect the data
on disk) or from the DPM replica (for long-term protection on tape when short-term protection is on disk).
NOTE
If a file was open when the replica was last synchronized, the backup of that file from the replica will be in a crash consistent
state. A crash consistent state of the file will contain all data of the file that was persisted to disk at the time of last
synchronization. This applies only to file system backups. Application backups will always be consistent with the application
state.

For specific backup types and schedules, see Planning Protection Groups

Recovery process
The method of data protection, disk-based or tape-based, makes no difference to the recovery task. You select the
recovery point of data that you want to recover, and DPM recovers the data to the protected computer.
DPM can store a maximum of 64 recovery points for each file member of a protection group. For application data
sources, DPM can store up to 448 express full backups and up to 96 incremental backups for each express full
backup. When storage area limits have been reached and the retention range for the existing recovery points is not
met yet, protection jobs will fail.

NOTE
To support end-user recovery, the recovery points for files are limited to 64 by Volume Shadow Copy Service (VSS).

As explained in The File Data Synchronization Process and The Application Data Synchronization Process, the
process for creating recovery points differs between file data and application data. DPM creates recovery points
for file data by taking a shadow copy of the replica on a schedule that you configure. For application data, each
synchronization and express full backup creates a recovery point.
The following illustration shows how each protection group member is associated with its own replica volume and
recovery point volume.

Administrators recover data from available recovery points by using the Recovery Wizard in DPM Administrator
Console. When you select a data source and point in time from which to recover, DPM notifies you if the data is on
tape, whether the tape is online or offline, and which tapes are needed to complete the recovery.
DPM gives administrators the ability to enable their end users to perform their own recoveries by leveraging the
Previous Versions feature in Windows. If you do not want to provide this capability to your end users, you recover
the data for desktop computers using the using the Recovery Wizard.

Protection policy
DPM configures the protection policy, or schedule of jobs, for each protection group based on the recovery goals
that you specify for that protection group. Examples of recovery goals are as follows:
"Lose no more than 1 hour of production data"
"Provide me with a retention range of 30 days"
"Make data available for recovery for 7 years"
Your recovery goals quantify your organization's data protection requirements. In DPM, the recovery goals are
defined by retention range, data loss tolerance, recovery point schedule, and, for database applications, the express
full backup schedule.
The retention range is how long you need the backed-up data available. For example, do you need data from today
to be available a week from now? Two weeks from now? A year from now?
Data loss tolerance is the maximum amount of data loss, measured in time, that is acceptable to business
requirements, and it will determine how often DPM should synchronize with the protected server by collecting
data changes from the protected server. You can change the synchronization frequency to any interval between 15
minutes and 24 hours. You can also select to synchronize just before a recovery point is created, rather than on a
specified time schedule.
The recovery point schedule establishes how many recovery points of this protection group should be created. For
file protection, you select the days and times for which you want recovery points created. For data protection of
applications that support incremental backups, the synchronization frequency determines the recovery point
schedule. For data protection of applications that do not support incremental backups, the express full backup
schedule determines the recovery point schedule.

NOTE
When you create a protection group, DPM identifies the type of data being protected and offers only the protection options
available for the data.

Auto discovery process


Auto discovery is the daily process by which DPM automatically detects new or removed computers on the
network. Once a day, at a time that you can schedule, DPM sends a small packet (less than 10 kilobytes) to the
closest domain controller. The domain controller responds to the LDAP request with the computers in that domain,
and DPM identifies new and removed computers. The network traffic created by the auto discovery process is
minimal.
Auto discovery does not discover new and removed computers in other domains. To install a protection agent on a
computer in another domain, you must identify the computer by using its fully qualified domain name.

DPM directory structure


When you begin protecting data with DPM, you will notice that the installation path of DPM contains three folders
in the Volumes directory:
\Microsoft DPM\DPM\Volumes\DiffArea
\Microsoft DPM\DPM\Volumes\Replica
\Microsoft DPM\DPM\Volumes\ShadowCopy
The DiffArea folder contains mounted shadow copy volumes that store the recovery points for a data source.
The Replica folder contains mounted replica volumes.
The ShadowCopy folder contains local backup copies of the DPM database. In addition, when you use
DPMBackup.exe to create backup shadow copies of the replicas for archive by third-party backup software, the
backup shadow copies are stored in the ShadowCopy folder.

DPM Telemetry
DPM does not collect any telemetry. If you are sending the data to Azure, the information needed by Azure Backup
is sent to Microsoft. It does not contain any PII.
What can DPM back up?
15 minutes to read

This article details the workloads that DPM can back up.
Use the following matrix for DPM 2016 and Semi-Annual Channel releases: 1801 and 1807:
Workloads – The workload type of technology.
Version – Supported VMM version for the workloads.
DPM installation – The computer/location where you wish to install DPM.
Protection and recovery – List the detailed information about the workloads such as supported storage
container or supported deployment.
Use the following matrix for DPM 2019:
Workloads – The workload type of technology.
Version – Supported VMM version for the workloads.
DPM installation – The computer/location where you wish to install DPM.
Protection and recovery – List the detailed information about the workloads such as supported storage
container or supported deployment.

Protection support matrix


The following sections details the protection support matrix for DPM:
Applications Backup
VM Backup
Linux
Applications Backup
WORKLOAD VERSION DPM INSTALLATION PROTECTION AND RECOVERY

Client computers (64-bit) Windows 10 Physical server Volume, share, folder, files,
deduped volumes
Hyper-V virtual machine
Protected volumes must be
VMware virtual machine NTFS. FAT and FAT32 aren't
supported.

Volumes must be at least 1


GB. DPM uses Volume
Shadow Copy Service (VSS)
to take the data snapshot
and the snapshot only
works if the volume is at
least 1 GB.
WORKLOAD VERSION DPM INSTALLATION PROTECTION AND RECOVERY

Servers (64-bit) Windows Server 2019, Azure virtual machine Volume, share, folder, file,
2016, 2012 R2, 2012 (when workload is running system state/bare metal),
as Azure virtual machine) deduped volumes

Windows virtual machine in


VMWare (protects
workloads running in
Windows virtual machine in
VMWare)

Physical server

On-premises Hyper-V
virtual machine

System Center VMM VMM 2019, 2016 Physical server All deployment scenarios:
Database
Hyper-V virtual machine

SQL Server SQL Server 2019, SQL Physical server All deployment scenarios:
Server 2017, 2016 and database
supported SPs, 2014 and On-premises Hyper-V
supported SPs virtual machine

Azure virtual machine

Windows virtual machine in


VMWare (protects
workloads running in
Windows virtual machine in
VMWare)

Exchange Exchange 2019, 2016 Physical server Protect (all deployment


scenarios): Standalone
On-premises Hyper-V Exchange server, database
virtual machine under a database availability
group (DAG)

Recover (all deployment


scenarios): Mailbox, mailbox
databases under a DAG

Backup of Exchange over


ReFS not supported

SharePoint SharePoint 2019, 2016 with Physical server Protect (all deployment
latest SPs scenarios): Farm, frontend
On-premises Hyper-V web server content
virtual machine
Recover (all deployment
Azure virtual machine scenarios): Farm, database,
(when workload is running web application, file or list
as Azure virtual machine) item, SharePoint search,
frontend web server
Windows virtual machine in
VMWare (protects
workloads running in
Windows virtual machine in
VMWare)
VM Backup
WORKLOAD VERSION DPM INSTALLATION PROTECTION AND RECOVERY

Hyper-V host - DPM Windows Server 2019, Physical server Protect: Hyper-V
protection agent on Hyper- 2016, 2012 R2, 2012 computers, Hyper-V VMs
V host server, cluster, or VM On-premises Hyper-V hosted on (cluster shared
virtual machine volumes) CSVs

Recover: Virtual machine,


Item-level recovery of files
and folder, volumes, virtual
hard drives

VMware VMs VMware server 6.0, or 6.5, On-premises Hyper-V VMware VMs on cluster-
6.7 virtual machine shared volumes (CSVs), NFS,
and SAN storage.
Item-level recovery of files
and folders available only
for Windows. VMware
vApps not supported.

Linux
WORKLOAD VERSION DPM INSTALLATION PROTECTION AND RECOVERY

Linux Linux running as Hyper-V On-premises Hyper-V Hyper-V must be running


guest (Hyper-V running on virtual machine on Windows Server 2019,
Windows Server Windows Server 2016,
2016/2019/2012 R2/2012) Windows Server 2012 R2 or
Windows Server 2012.

Protect: Entire virtual


machine

Recover: Entire virtual


machine

For a complete list of


supported Linux
distributions and versions,
see the article, Linux on
distributions endorsed by
Azure.

Protection support matrix


DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

System Center VMM 2016, Physical server Y Y All deployment


VMM VMM 2012, SP1, scenarios:
R2 Hyper-V virtual Database
machine
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Client computers Windows 10 Physical server Y Y Volume, share,


(64-bit and 32- folder, files,
bit) Hyper-V virtual deduped
machine volumes

VMware virtual Protected


machine volumes must be
NTFS. FAT and
FAT32 aren't
supported.

Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.

Client computers Windows 8.1 Physical server Y Y Volume, share,


(64-bit and 32- folder, files,
bit) Hyper-V virtual deduped
machine volumes

Protected
volumes must be
NTFS. FAT and
FAT32 aren't
supported.

Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Client computers Windows 8.1 Windows virtual Y Y Volume, share,


(64-bit and 32- machine in folder, files,
bit) VMWare From Update deduped
(protects Rollup 5 onwards volumes
workloads
running in Protected
Windows virtual volumes must be
machine in NTFS. FAT and
VMWare) FAT32 aren't
supported.

Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.

Client computers Windows 8 Physical server Y Y Volume, share,


(64-bit and 32- folder, files,
bit) On-premises deduped
Hyper-V virtual volumes
machine
Protected
volumes must be
NTFS and at least
1 GB.

Client computers Windows 8 Windows virtual Y Y Volume, share,


(64-bit and 32- machine in folder, files,
bit) VMWare deduped
(protects volumes
workloads
running in Protected
Windows virtual volumes must be
machine in NTFS. FAT and
VMWare) FAT32 aren't
supported.

Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Client computers Windows 7 Physical server Y Y Volume, share,


(64-bit and 32- folder, files,
bit) On-premises deduped
Hyper-V virtual volumes
machine
Protected
volumes must be
NTFS and at least
1 GB.

Client computers Windows 7 Windows virtual Y Y Volume, share,


(64-bit and 32- machine in folder, files,
bit) VMWare deduped
(protects volumes
workloads
running in Protected
Windows virtual volumes must be
machine in NTFS. FAT and
VMWare) FAT32 aren't
supported.

Volumes must be
at least 1 GB.
DPM uses
Volume Shadow
Copy Service
(VSS) to take the
data snapshot
and the snapshot
only works if the
volume is at least
1 GB.

Servers (32-bit Windows Server Azure virtual Y Y Volume, share,


and 64-bit) 2016 machine (when Not Nano server folder, file,
workload is Not Nano server system
running as Azure state/bare metal),
virtual machine) deduped
volumes
Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)

Physical server

On-premises
Hyper-V virtual
machine
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Servers (32-bit Windows Server Azure virtual Y Y Volume, share,


and 64-bit) 2012 R2 - machine (when folder, file
Datacenter and workload is
Standard running as Azure DPM must be
virtual machine) running on at
least Windows
Server 2012 R2
to protect
Windows Server
2012 deduped
volumes.

Servers (32-bit Windows Server Windows virtual Y Y Volume, share,


and 64-bit) 2012 R2 - machine in folder, file,
Datacenter and VMWare system
Standard (protects state/bare metal)
workloads
running in DPM must be
Windows virtual running on
machine in Windows Server
VMWare) 2012 or 2012 R2
to protect
Windows Server
2012 deduped
volumes.

Servers (32-bit Windows Server Physical server Y Y Volume, share,


and 64-bit) 2012/2012 with folder, file,
SP1 - Datacenter On-premises system
and Standard Hyper-V virtual state/bare metal
machine
DPM must be
running on at
least Windows
Server 2012 R2
to protect
Windows Server
2012 deduped
volumes.

Servers (32-bit Windows Server Azure virtual Y Y Volume, share,


and 64-bit) 2012/2012 with machine (when folder, file
SP1 - Datacenter workload is
and Standard running as Azure DPM must be
virtual machine) running on at
least Windows
Server 2012 R2
to protect
Windows Server
2012 deduped
volumes.
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Servers (32-bit Windows Server Windows virtual Y Y Volume, share,


and 64-bit) 2012/2012 with machine in folder, file,
SP1 - Datacenter VMWare system
and Standard (protects state/bare metal
workloads
running in DPM must be
Windows virtual running on at
machine in least Windows
VMWare) Server 2012 R2
to protect
Windows Server
2012 deduped
volumes.

Servers (32-bit Windows Server Physical server Y Y Volume, share,


and 64-bit) 2008 R2 SP1 - folder, file,
Standard and On-premises You need to be You need to system
Enterprise Hyper-V virtual running SP1 and install Windows state/bare metal
machine install Windows Management
Management Frame 4.0
Frame 4.0

Servers (32-bit Windows Server Azure virtual Y Y Volume, share,


and 64-bit) 2008 R2 SP1 - machine (when folder, file
Standard and workload is You need to You need to be
Enterprise running as Azure install Windows running SP1 and
virtual machine) Management install Windows
Frame 4.0 Management
Frame 4.0

Servers (32-bit Windows Server Windows virtual Y Y Volume, share,


and 64-bit) 2008 R2 SP1 - machine in folder, file,
Standard and VMWare You need to You need to be system
Enterprise (protects install Windows running SP1 and state/bare metal
workloads Management install Windows
running in Frame 4.0 Management
Windows virtual Frame 4.0
machine in
VMWare)

Servers (32-bit Windows Server Physical server Y Y Volume, share,


and 64-bit) 2008 R2 folder, file,
On-premises system
Hyper-V virtual state/bare metal
machine

Servers (32-bit Windows Server Azure virtual N N Volume, share,


and 64-bit) 2008 R2 machine (when folder, file
workload is
running as Azure
virtual machine)
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Servers (32-bit Windows Server Windows virtual N N Volume, share,


and 64-bit) 2008 R2 machine in folder, file,
VMWare system
(protects state/bare metal
workloads
running in
Windows virtual
machine in
VMWare)

Servers (32-bit Windows Server Physical server N N Volume, share,


and 64-bit) 2008 SP2 folder, file,
On-premises system
Hyper-V virtual state/bare metal
machine

Servers (32-bit Windows Server Windows virtual Y Y Volume, share,


and 64-bit) 2008 SP2 machine in folder, file,
VMWare system
(protects state/bare metal
workloads
running in
Windows virtual
machine in
VMWare)

Servers (32-bit Windows Physical server Y Y Volume, share,


and 64-bit) Storage Server folder, file,
2008 SP2 On-premises system
Hyper-V virtual state/bare metal
machine

SQL Server SQL Server 2017 Physical server Y Y (UR5 Onwards) All deployment
scenarios:
On-premises database
Hyper-V virtual
machine

Azure virtual
machine

Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

SQL Server SQL Server 2016 Physical server Y Y (UR4 onwards) All deployment
SP1 scenarios:
On-premises database
Hyper-V virtual
machine

Azure virtual
machine

Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SQL Server SQL Server 2016 Physical server Y Y (UR2 Onwards) All deployment
scenarios:
On-premises database
Hyper-V virtual
machine

Azure virtual
machine

Windows virtual
machine in
VMWare
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SQL Server SQL Server 2014 Azure virtual Y Y All deployment


machine (when scenarios:
workload is database
running as Azure
virtual machine)

SQL Server SQL Server 2014 Windows virtual Y Y All deployment


machine in scenarios:
VMWare database
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SQL Server SQL Server 2012 Physical server Y Y All deployment


with SP2 scenarios:
On-premises database
Hyper-V virtual
machine
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

SQL Server SQL Server 2012 Azure virtual Y Y All deployment


with SP2 machine (when scenarios:
workload is database
running as Azure
virtual machine)

SQL Server SQL Server 2012 Windows virtual Y Y All deployment


with SP2 machine in scenarios:
VMWare database
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SQL Server SQL Server 2012, Physical server Y Y All deployment


SQL Server 2012 scenarios:
with SP1 On-premises database
Hyper-V virtual
machine

SQL Server SQL Server 2012, Azure virtual Y Y All deployment


SQL Server 2012 machine (when scenarios:
with SP1 workload is database
running as Azure
virtual machine)

SQL Server SQL Server 2012, Windows virtual Y Y All deployment


SQL Server 2012 machine in scenarios:
with SP1 VMWare database
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SQL Server SQL Server 2008 Physical server Y Y All deployment


R2 scenarios:
On-premises database
Hyper-V virtual
machine

SQL Server SQL Server 2008 Azure virtual Y Y All deployment


R2 machine (when scenarios:
workload is database
running as Azure
virtual machine)
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

SQL Server SQL Server 2008 Windows virtual Y Y All deployment


R2 machine in scenarios:
VMWare database
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SQL Server SQL Server 2008 Physical server Y Y All deployment


scenarios:
On-premises database
Hyper-V virtual
machine

SQL Server SQL Server 2008 Azure virtual Y Y All deployment


machine (when scenarios:
workload is database
running as Azure
virtual machine)

SQL Server SQL Server 2008 Windows virtual Y Y All deployment


machine in scenarios:
VMWare database
(protects
workloads
running in
Windows virtual
machine in
VMWare)

Exchange Exchange 2016 Physical server Y Y Protect (all


deployment
On-premises scenarios):
Hyper-V virtual Standalone
machine Exchange server,
database under a
database
availability group
(DAG)

Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG

Backup of
Exchange over
ReFS not
supported
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Exchange Exchange 2016 Windows virtual Y Y Protect (all


machine in deployment
VMWare scenarios):
(protects Standalone
workloads Exchange server,
running in database under a
Windows virtual database
machine in availability group
VMWare) (DAG)

Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG

Backup of
Exchange over
ReFS not
supported

Exchange Exchange 2013 Physical server Y Y Protect (all


deployment
On-premises scenarios):
Hyper-V virtual Standalone
machine Exchange server,
database under a
database
availability group
(DAG)

Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG

Backup of
Exchange over
ReFS not
supported
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Exchange Exchange 2013 Windows virtual Y Y Protect (all


machine in deployment
VMWare scenarios):
(protects Standalone
workloads Exchange server,
running in database under a
Windows virtual database
machine in availability group
VMWare) (DAG)

Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG

Backup of
Exchange over
ReFS not
supported

Exchange Exchange 2010 Physical server Y Y Protect (all


deployment
On-premises scenarios):
Hyper-V virtual Standalone
machine Exchange server,
database under a
database
availability group
(DAG)

Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG

Backup of
Exchange over
ReFS not
supported
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Exchange Exchange 2010 Windows virtual Y Y Protect (all


machine in deployment
VMWare scenarios):
(protects Standalone
workloads Exchange server,
running in database under a
Windows virtual database
machine in availability group
VMWare) (DAG)

Recover (all
deployment
scenarios):
Mailbox, mailbox
databases under
a DAG

Backup of
Exchange over
ReFS not
supported

SharePoint SharePoint 2016 Physical server Y Y (UR2 Onwards) Protect (all


deployment
On-premises scenarios): Farm,
Hyper-V virtual frontend web
machine server content

Azure virtual Recover (all


machine (when deployment
workload is scenarios): Farm,
running as Azure database, web
virtual machine) application, file or
list item,
Windows virtual SharePoint
machine in search, frontend
VMWare web server
(protects
workloads
running in
Windows virtual
machine in
VMWare)

SharePoint SharePoint 2013 Physical server Y Y Protect (all


deployment
On-premises scenarios): Farm,
Hyper-V virtual frontend web
machine server content

Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

SharePoint SharePoint 2013 Azure virtual Y Y Protect (all


machine (when deployment
workload is scenarios): Farm,
running as Azure SharePoint
virtual machine) search, frontend
- DPM 2012 R2 web server
Update Rollup 3 content
onwards
Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server

SharePoint SharePoint 2013 Windows virtual Y Y Protect (all


machine in deployment
VMWare scenarios): Farm,
(protects SharePoint
workloads search, frontend
running in web server
Windows virtual content
machine in
VMWare) Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server

SharePoint SharePoint 2010 Physical server Y Y Protect (all


deployment
On-premises scenarios): Farm,
Hyper-V virtual SharePoint
machine search, frontend
web server
content

Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

SharePoint SharePoint 2010 Azure virtual Y Y Protect (all


machine (when deployment
workload is scenarios): Farm,
running as Azure SharePoint
virtual machine) search, frontend
web server
content

Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server

SharePoint SharePoint 2010 Windows virtual Y Y Protect (all


machine in deployment
VMWare scenarios): Farm,
(protects SharePoint
workloads search, frontend
running in web server
Windows virtual content
machine in
VMWare) Recover (all
deployment
scenarios): Farm,
database, web
application, file or
list item,
SharePoint
search, frontend
web server

Hyper-V host - Windows Server Physical server Y Y Protect: Hyper-V


DPM protection 2016 computers,
agent on Hyper- On-premises Hyper-V VMs
V host server, Hyper-V virtual hosted on
cluster, or VM machine (cluster shared
volumes) CSVs

Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Hyper-V host - Windows Server Physical server Y Y Protect: Hyper-V


DPM protection 2012 R2 - computers,
agent on Hyper- Datacenter and On-premises Hyper-V VMs
V host server, Standard Hyper-V virtual hosted on
cluster, or VM machine (cluster shared
volumes) CSVs

Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives

Hyper-V host - Windows Server Physical server Y Y Protect: Hyper-V


DPM protection 2012 - computers,
agent on Hyper- Datacenter and On-premises Hyper-V VMs
V host server, Standard Hyper-V virtual hosted on
cluster, or VM machine (cluster shared
volumes) CSVs

Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives

Hyper-V host - Windows Server Physical server Y Y Protect: Hyper-V


DPM protection 2008 R2 SP1 - computers,
agent on Hyper- Enterprise and On-premises Hyper-V VMs
V host server, Standard Hyper-V virtual hosted on
cluster, or VM machine (cluster shared
volumes) CSVs

Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives

Hyper-V host - Windows Server Physical server N N Protect: Hyper-V


DPM protection 2008 SP2 computers,
agent on Hyper- On-premises Hyper-V VMs
V host server, Hyper-V virtual hosted on
cluster, or VM machine (cluster shared
volumes) CSVs

Recover: Virtual
machine, Item-
level recovery of
files and folder,
volumes, virtual
hard drives
DPM DPM - SYSTEM DPM - SYSTEM PROTECTION AND
WORKLOAD VERSION INSTALLATION CENTER SAC CENTER 2016 RECOVERY

Linux Linux running as On-premises Y Y Hyper-V must be


Hyper-V guest Hyper-V virtual running on
machine Windows Server
2012 R2 or
Windows Server
2016. Protect:
Entire virtual
machine

Recover: Entire
virtual machine

For a complete
list of supported
Linux
distributions and
versions, see the
article, Linux on
distributions
endorsed by
Azure.

VMware VMs VMware server On-premises Y N VMware VMs on


5.5, 6.0, or 6.5 Hyper-V virtual cluster-shared
machine volumes (CSVs),
NFS, and SAN
storage.
Item-level
recovery of files
and folders
available only for
Windows.
VMware vApps
not supported.

VMware VMs VMware vSphere On-premises Y (Applicable for N VMware VMs on


6.7 Hyper-V virtual DPM 1807 and cluster-shared
machine later) volumes (CSVs),
NFS, and SAN
storage.
Item-level
recovery of files
and folders
available only for
Windows.
VMware vApps
not supported.

Cluster support
DPM can protect data in the following clustered applications:
File servers
SQL Server
Hyper-V
NOTE
If you're protecting a Hyper-V cluster using scaled-out DPM protection, you can't add secondary protection for the
protected Hyper-V workloads.

Exchange Server - DPM can protect non-shared disk clusters for supported Exchange Server versions
(cluster continuous replication), and can also protect Exchange Server configured for local continuous
replication.
SQL Server

NOTE
DPM doesn't support the protection of SQL Server databases hosted on cluster-shared volumes (CSVs).

DPM can protect cluster workloads that are located in the same domain as the DPM server, and in a child or
trusted domain. If you want to protect data source in untrusted domains or workgroups you'll need to use NTLM
or certificate authentication for a single server, or certificate authentication only for a cluster.

Next steps
Get ready to deploy DPM servers
System Center DPM Compatible Tape Libraries
19 minutes to read

Data Protection Manager (DPM ) in System Center 2012 R2, 2016 and 2019 can be deployed using tape-based
backup for data protected by the DPM server. A tape library or stand-alone tape drive can be connected to DPM
servers. For more information see Planning the Tape Libraries Configuration. The following tables summarize tape
libraries that are compatible with DPM in System Center 2012 R2, 2016 and 2019.

NOTE
Tape libraries configured with a virtual Fibre Channel adapter are only supported when using certified tape library hardware
on the following configurations:
System Center Data Protection Manager 2012 R2 U3 (or later) running on Windows 2012 R2 (or later).
System Center Data Protection Manager 2016 running on Windows Server 2012 R2 (or later).
System Center Data Protection Manager 2019 running on Windows Server 2016 and Windows Server 2019.

Support Matrix
DPM 2012 R2 DPM 2016 DPM 2019

Windows Server 2012 R2 Y Y N

Windows Server 2016 Y Y Y

Windows Server 2019 N N Y

BDT
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

FlexStor II 5.2.3790.7, 2.4 2U, 4U, 8U HP LTO5 1.0.6.3, Y23B


1U 06/06/2009 HH FC 10/07/2010
, signed , signed

FlexStor II 5.2.3790.7, 2.4 2U, 4U, 8U HP LTO5 1.0.6.3, Z21B


1U 06/06/2009 HH SAS 10/07/2010
, signed , signed

FlexStor II 5.2.3790.7, 4.70/3.00e 2U, 8U HP LTO5 1.0.6.1, X22B


4U 06/06/2009 FH SAS 05/14/2009
, signed , signed

FlexStor II 5.2.3790.7, 4.70/3.00e 2U, 8U HP LTO5 1.0.6.3, I5BB


4U 06/06/2009 FH FC 10/07/2010
, signed , signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

FlexStor II 5.2.3790.7, 4.70/3.00e 2U, 8U IBM LTO5 6.2.1.5, A6S0


4U 06/06/2009 FH FC 01/13/2011
, signed , signed

FlexStor II 5.2.3790.7, 4.70/3.00e 2U, 8U IBM LTO5 6.2.1.5, A6S0


4U 06/06/2009 FH SAS 01/13/2011
, signed , signed

FlexStor II 5.2.3790.7, 4.70/3.00e 1U, 2U, 8U IBM LTO5 6.2.1.5, A6S1


4U 06/06/2009 HH FC 01/13/2011
, signed , signed

FlexStor II 5.2.3790.7, 4.70/3.00e 1U, 2U, 8U IBM LTO5 6.2.1.5, A6S1


4U 06/06/2009 HH SAS 01/13/2011
, signed , signed

FlexStor II 2008 R2 5.2.3790.7, 4.90/3.20e 1U, 2U, 8U HP LTO6 1.0.7.1, 22EB


4U 06/06/2009 HH FC 02/11/2013
, signed , signed

FlexStor II 2012 8.0.0.1, 4.90/3.20e 1U, 2U, 8U HP LTO6 1.0.7.1, 22EB


4U 07/05/2012 HH FC 02/11/2013
, signed , signed

FlexStor II 2008 R2 5.2.3790.7, 4.90/3.20e 1U, 2U, 8U HP LTO6 1.0.7.1, 32CB


4U 06/06/2009 HH SAS 02/11/2013
, signed , signed

FlexStor II 2012 8.0.0.1, 4.90/3.20e 1U, 2U, 8U HP LTO6 1.0.7.1, 32CB


4U 07/05/2012 HH SAS 02/11/2013
, signed , signed

FlexStor II 2008 R2 5.2.3790.7, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 06/06/2009 HH FC 10/29/2012
, signed , signed

FlexStor II 2012 8.0.0.1, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 07/05/2012 HH FC 10/29/2012
, signed , signed

FlexStor II 2008 R2 5.2.3790.7, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 06/06/2009 HH SAS 10/29/2012
, signed , signed

FlexStor II 2012 8.0.0.1, 4.90/3.20e 1U, 2U, 8U IBM LTO6 6.2.3.3, CBW5
4U 07/05/2012 HH SAS 10/29/2012
, signed , signed

FlexStor II 2012\2012 8.1.0.0, 5.03/3.20e 1U,2U IBM LTO7 6.2.5.5, FA11


4U R2 01/07/2014 HH FC 09/08/2015
, signed , signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

FlexStor II 2012\2012 8.1.0.0,01/0 5.03/3.20e 1U,2U IBM LTO7 6.2.5.5, FA11


4U R2 7/2014, HH SAS 09/08/2015
signed , signed

FlexStor II 2012/2012 8.1.0.0, 5.40/3.20e 1U, 2U IBM LTO8 6.2.6.6, HB81


4U R2 01/07/2014 HH FC 10/24/2017
, signed , signed

FlexStor II 2012/2012 8.1.0.0, 5.40/3.20e 1U, 2U IBM LTO8 6.2.6.6, HB81


4U R2 01/07/2014 HH SAS 10/24/2017
, signed , signed

FlexStor II 2016 8.3.0.2. 5.40/3.20e 1U, 2U IBM LT08 6.2.6.6, HB81


4U 07/03/2017 HH FC 10/24/2017
, signed , signed

FlexStor II 2016 8.3.0.2, 5.40/3.20e 1U, 2U IBM LTO8 6.2.6.6, HB81


4U 07/03/2017 HH SAS 10/24/2017
, signed , signed

MultiStor 2012/2012 8.1.0.0, 1.1.0-0012 IBM LTO6 6.2.6.6, H991


R2 01/07/2014 HH FC 10/24/2017
, signed , signed

MultiStor 2012/2012 8.1.0.0, 1.1.0-0012 IBM LT06 6.2.6.6, H991


R2 01/07/2014 HH SAS 10/24/2017
, signed , signed

MultiStor 2012/2012 8.1.0.0, 1.1.0-0012 IBM LT07 6.2.6.6, HB81


R2 01/07/2014 HH FC 10/24/2017
, signed , signed

MultiStor 2012/2012 8.1.0.0, 1.1.0-0012 IBM LT07 6.2.6.6, HB81


R2 01/07/2014 HH SAS 10/24/2017
, signed , signed

MultiStor 2012/2012 8.1.0.0, 1.1.0-0012 IBM LT08 6.2.6.6, HB81


R2 01/07/2014 HH FC 10/24/2017
, signed , signed

MultiStor 2012/2012 8.1.0.0, 1.1.0-0012 IBM LT08 6.2.6.6, HB81


R2 01/07/2014 HH SAS 10/24/2017
, signed signed

MultiStor 2016 8.3.0.2, 1.1.0-0012 IBM LT06 6.2.6.6. H991


07/03/2017 HH FC 10/24/2017
, signed , signed

MultiStor 2016 8.3.0.2, 1.1.0-0012 IBM LT06 6.2.6.6. H991


07/03/2017 HH SAS 10/24/2017
, signed , signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

MultiStor 2016 8.3.0.2, 1.1.0-0012 IBM LT07 6.2.6.6. HB81


07/03/2017 HH FC 10/24/2017
, signed , signed

MultiStor 2016 8.3.0.2, 1.1.0-0012 IBM LT07 6.2.6.6, HB81


07/03/2017 HH SAS 10/24/2017
, signed , signed

MultiStor 2016 8.3.0.2, 1.1.0-0012 IBM LT08 6.2.6.6., HB81


07/03/2017 HH FC 10/24/2017
, signed , signed

MultiStor 2016 8.3.0.2, 1.1.0-0012 IBM LT08 6.2.6.6, HB81


07/03/2017 HH SAS 10/24/2017
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - HP LTO5 1.0.7.1, Y64B


05/07/2014 HH FC 02/11/2013
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - HP LTO5 1.0.7.1, Y64B


01/07/2014 HH FC 02/11/2013
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - HP LTO5 1.0.7.1, Z64B


05/07/2014 HH SAS 02/11/2013
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - HP LTO5 1.0.7.1, Z64B


01/07/2014 HH SAS 02/11/2013
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - HP LTO6 1.0.7.1, 238B


05/07/2014 HH FC 02/11/2013
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - HP LTO6 1.0.7.1, 238B


01/07/2014 HH FC 02/11/2013
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - HP LTO6 1.0.7.1, 338B


05/07/2014 HH SAS 02/11/2013
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - HP LTO6 1.0.7.1, 338B


01/07/2014 HH SAS 02/11/2013
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - IBM LTO5 i6.2.3.3, E4J6


05/07/2014 HH FC 10/29/2012
, signed , signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

MULTISTAK 2012 R2 8.1.0.0, 1.7 - IBM LTO5 6.2.3.3, E4J6


01/07/2014 HH FC 10/29/2012
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - IBM LTO5 i6.2.3.3, E4J6


05/07/2014 HH SAS 10/29/2012
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - IBM LTO5 6.2.3.3, E4J6


01/07/2014 HH SAS 10/29/2012
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - IBM LTO6 6.2.3.3, E4J6


05/07/2014 HH FC 10/29/2012
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - IBM LTO6 6.2.3.3, E4J6


01/07/2014 HH FC 10/29/2012
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - IBM LTO6 6.2.3.3, E4J6


05/07/2014 HH SAS 10/29/2012
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - IBM LTO6 6.2.3.3, E4J6


01/07/2014 HH SAS 10/29/2012
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - HP LTO6 1.0.7.1, 238B


05/07/2014 HH FC 02/11/2013
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - HP LTO6 1.0.7.1, 238B


01/07/2014 HH FC 02/11/2013
, signed , signed

MULTISTAK 2012 8.3.0.0, 1.7 - HP LTO6 1.0.7.1, 338B


05/07/2014 HH SAS 02/11/2013
, signed , signed

MULTISTAK 2012 R2 8.1.0.0, 1.7 - HP LTO6 1.0.7.1, 338B


01/07/2014 HH SAS 02/11/2013
, signed , signed

MULTISTAK 2012\2012 8.3.0.0, 2.05 IBM LTO7 6.2.5.5, FA11


R2 05/07/2014 HH FC 09/08/2015
, signed , signed

MULTISTAK 2012\2012 8.3.0.0, 2.05 IBM LTO7 6.2.5.5, FA11


R2 05/07/2014 HH SAS 09/08/2015
, signed , signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

MULTISTAK 2012\2012 8.1.0.0, 2.60 IBM LTO8 6.2.6.6,10/2 HB81


R2 01/07/2014 HH FC 4/2017,
, signed signed

MULTISTAK 2012\2012 8.1.0.0, 2.60 IBM LTO8 6.2.6.6, HB81


R2 01/07/2014 HH SAS 10/24/2017
, signed , signed

MULTISTAK 2016 8.3.0.2, 2.60 IBM LTO8 6.2.6.6, HB81


07/03/2017 HH FC 10/24/2017
, signed , signed

MULTISTAK 2016 8.3.0.2, 2.60 IBM LTO8 6.2.6.6, HB81


07/03/2017 HH SAS 10/24/2017
, signed , signed

Dell
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

ML6000 Version 585G LTO5 FH 6.1.9.9 B6W0


v2.6.2.1, A09

ML6000 Version 670G LTO6 FH 6.3.9600.1638 F9A0


v2.6.2.1, A09 4

ML6000 Version 670G LTO7 FH 6.3.9600.1638 FA10


v2.6.2.1, A09 4

TL1000 6.2.1.8 34 LTO5 6.2.1.8 B6W1

TL1000 6.2.3.3 58 LTO6 6.2.3.3 F9A1

TL1000 6.2.5.6 58 LTO7 6.2.5.6 FA11

TL1000 6.2.5.6 0106 LTO8 6.2.5.6 H9Ex

TL2000/4000 6.2.1.5 A.50 LTO5 HH 6.2.1.5 B171

TL2000/4000 6.2.3.3 B,60 LTO6 HH 6.2.3.3 C9T5

TL2000/4000 6.2.5.6 D.10 LTO7 HH 6.2.5.6 FA11

ML3 6.2.6.5 1.1.1.0 LTO6 6.2.6.5 H99x

ML3 6.2.6.5 1.1.1.0 LTO7 6.2.6.5 H9Ex

ML3 6.2.6.5 1.1.1.0 LTO8 6.2.6.5 H9Ex


Fujitsu
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

ETERNUS 7.7600.163 4.51/3.00e LT40 HP LTO5 1.0.6.3, I24B


LT60 85.0, FH FC 10/07/2010
01/02/2010 , signed
, signed

ETERNUS 7.7600.163 4.51/3.00e LT40, LT20 HP LTO5 1.0.6.3, Y23B


LT60 85.0, HH FC 10/07/2010
01/02/2010 , signed
, signed

ETERNUS 7.7600.163 4.51/3.00e LT40 HP LTO5 1.0.6.3, X22B


LT60 85.0, FH SAS 10/07/2010
01/02/2010 , signed
, signed

ETERNUS 7.7600.163 4.51/3.00e LT40, LT20 HP LTO5 1.0.6.3, Z21B


LT60 85.0, HH SAS 10/07/2010
01/02/2010 , signed
, signed

ETERNUS 2008 R2 7.7600.163 4.81/3.20e LT40 S2 HP LTO4 1.0.7.1, H65B


LT60 S2 85.1, FH FC 02/11/2013
2/15/2011, , signed
signed

ETERNUS 2012 8.0.0.1, 4.81/3.20e LT40 S2 HP LTO4 1.0.7.1, H65B


LT60 S2 08/02/2012 FH FC 02/11/2013
, signed , signed

ETERNUS 2008 R2 7.7600.163 4.81/3.20e LT40 S2 HP LTO4 1.0.7.1, A62B


LT60 S2 85.1, FH SAS 02/11/2013
2/15/2011, , signed
signed

ETERNUS 2012 8.0.0.1, 4.81/3.20e LT40 S2 HP LTO4 1.0.7.1, A62B


LT60 S2 08/02/2012 FH SAS 02/11/2013
, signed , signed

ETERNUS 2008 R2 7.7600.163 4.81/3.20e LT40 S2, HP LTO4 1.0.7.1, V63B


LT60 S2 85.1, LT20 S2 HH FC 02/11/2013
2/15/2011, , signed
signed

ETERNUS 2012 8.0.0.1, 4.81/3.20e LT40 S2, HP LTO4 1.0.7.1, V63B


LT60 S2 08/02/2012 LT20 S2 HH FC 02/11/2013
, signed , signed

ETERNUS 2008 R2 7.7600.163 4.81/3.20e LT40 S2, HP LTO4 1.0.7.1, U64B


LT60 S2 85.1, LT20 S2 HH SAS 02/11/2013
2/15/2011, , signed
signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

ETERNUS 2012 8.0.0.1, 4.81/3.20e LT40 S2, HP LTO4 1.0.7.1, U64B


LT60 S2 08/02/2012 LT20 S2 HH SAS 02/11/2013
, signed , signed

ETERNUS 7.7600.163 4.60/3.10e LT40 S2 HP LTO5 1.0.6.3, I24B


LT60 S2 85.1, FH FC 10/07/2010
02/15/2011 , signed
, signed

ETERNUS 7.7600.163 4.60/3.10e LT40 S2, HP LTO5 1.0.6.3, Y34B


LT60 S2 85.1, LT20 S2 HH FC 10/07/2010
02/15/2011 , signed
, signed

ETERNUS 7.7600.163 4.60/3.10e LT40 S2 HP LTO5 1.0.6.3, X22B


LT60 S2 85.1, FH SAS 10/07/2010
02/15/2011 , signed
, signed

ETERNUS 7.7600.163 4.60/3.10e LT40 S2, HP LTO5 1.0.6.3, Z21B


LT60 S2 85.1, LT20 S2 HH SAS 10/07/2010
02/15/2011 , signed
, signed

ETERNUS 2008 R2 7.7600.163 4.81/3.20e LT40 S2, HP LTO6 1.0.7.1, 22EB


LT60 S2 85.1, LT20 S2 HH FC 02/11/2013
2/15/2011, , signed
signed

ETERNUS 2012 8.0.0.1, 4.81/3.20e LT40 S2, HP LTO6 1.0.7.1, 22EB


LT60 S2 08/02/2012 LT20 S2 HH FC 02/11/2013
, signed , signed

ETERNUS 2008 R2 7.7600.163 4.81/3.20e LT40 S2, HP LTO6 1.0.7.1, 32CB


LT60 S2 85.1, LT20 S2 HH SAS 02/11/2013
2/15/2011, , signed
signed

ETERNUS 2012 8.0.0.1, 4.81/3.20e LT40 S2, HP LTO6 1.0.7.1, 32CB


LT60 S2 08/02/2012 LT20 S2 HH SAS 02/11/2013
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 4.88/3.20e ETERNUS IBM LTO6 6.2.5.5, F9A1


LT60 S2 R2 05/22/2014 LT20 S2 HH FC 09/08/2015
, signed ETERNUS , signed
LT40 S2

ETERNUS 2012\2012 8.2.0.1, 4.88/3.20e ETERNUS IBM LTO6 6.2.5.5, F9A1


LT60 S2 R2 05/22/2014 LT20 S2 HH SAS 09/08/2015
, signed ETERNUS , signed
LT40 S2
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

ETERNUS 2012\2012 8.2.0.1, 4.88/3.20e ETERNUS IBM LTO7 6.2.5.5, FA11


LT60 S2 R2 05/22/2014 LT20 S2 HH FC 09/08/2015
, signed ETERNUS , signed
LT40 S2

ETERNUS 2012\2012 8.2.0.1, 4.88/3.20e ETERNUS IBM LTO7 6.2.5.5, FA11


LT60 S2 R2 05/22/2014 LT20 S2 HH SAS 09/08/2015
, signed ETERNUS , signed
LT40 S2

ETERNUS 2012/2012 8.2.0.1, 5.10/3.20e ETERNUS IBM LTO8 6.2.6.6,10/2 HB81


LT60 S2 R2 05/22/2014 LT20 S2 HH FC 4/2017,
, signed ETERNUS signed
LT40 S2

ETERNUS 2012\2012 8.2.0.1, 5.10/3.20e ETERNUS IBM LTO8 6.2.6.6, HB81


LT60 S2 R2 05/22/2014 LT20 S2 HH SAS 10/24/2017
, signed ETERNUS , signed
LT40 S2

ETERNUS 2016 8.2.0.6, 5.10/3.20e ETERNUS IBM LTO8 6.2.6.6, HB81


LT60 S2 07/03/2017 LT20 S2 HH FC 10/24/2017
, signed ETERNUS , signed
LT40 S2

ETERNUS 2016 8.2.0.6, 5.10/3.20e ETERNUS IBM LTO8 6.2.6.6, HB81


LT60 S2 07/03/2017 LT20 S2 HH SAS 10/24/2017
, signed ETERNUS , signed
LT40 S2

ETERNUS 2012R2 8.2.0.1, 1.0.0-A00 IBM LTO6 6.2.6.6, JAX1


LT140 05/22/2014 HH FC IBM 10/24/2017
, signed LTO6 HH , signed
SAS

ETERNUS 2012R2 8.2.0.1, 1.0.0-A00 IBM LTO7 6.2.6.6, JAY1


LT140 05/22/2014 HH FC IBM 10/24/2017
, signed LTO7 HH , signed
SAS

ETERNUS 2012R2 8.2.0.1, 1.0.0-A00 IBM LTO8 6.2.6.6, JAY1


LT140 05/22/2014 HH FC IBM 10/24/2017
, signed LTO8 HH , signed
SAS

ETERNUS 2016 8.2.0.6, 1.0.0-A00 IBM LTO6 6.2.6.6,10/2 JAX1


LT140 07/03/2017 HH FC IBM 4/2017,
, signed LTO6 HH signed
SAS

ETERNUS 2016 8.2.0.6, 1.0.0-A00 IBM LTO7 6.2.6.6,10/2 JAY1


LT140 07/03/2017 HH FC IBM 4/2017,
, signed LTO7 HH signed
SAS
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

ETERNUS 2016 8.2.0.6, 1.0.0-A00 IBM LTO8 6.2.6.6,10/2 JAY1


LT140 07/03/2017 HH FC IBM 4/2017,
, signed LTO HH signed
SAS

ETERNUS 2012 8.2.0.1, 6.1 HP LTO4 1.0.7.1, H66B


LT260 05/22/2014 FH FC 02/11/2013
, signed , signed

ETERNUS 2012 R2 8.2.0.1, 6.1 HP LTO4 1.0.7.1, H66B


LT260 05/22/2014 FH FC 02/11/2013
, signed , signed

ETERNUS 8.2.0.1, 6.1 HP LTO4 1.0.7.1, V64B


LT260 05/22/2014 FH FC 02/11/2013
, signed , signed

ETERNUS 2012 8.2.0.1, 6.1 HP LTO5FH 1.0.7.1, I66B


LT260 05/22/2014 FC 02/11/2013
, signed , signed

ETERNUS 2012 R2 8.2.0.1, 6.1 HP LTO5 1.0.7.1, I66B


LT260 05/22/2014 FH FC 02/11/2013
, signed , signed

ETERNUS 2012 8.2.0.1, 6.1 HP LTO5 1.0.7.1, Y67B


LT260 05/22/2014 HH FC 02/11/2013
, signed , signed

ETERNUS 2012 R2 8.2.0.1, 6.1 HP LTO5 1.0.7.1, Y67B


LT260 05/22/2014 HH FC 02/11/2013
, signed , signed

ETERNUS 2012 8.2.0.1, 6.1 HP LTO5 1.0.7.1, Z67B


LT260 05/22/2014 HH SAS 02/11/2013
, signed , signed

ETERNUS 2012 R2 8.2.0.1, 6.1 HP LTO5 1.0.7.1, Z67B


LT260 05/22/2014 HH SAS 02/11/2013
, signed , signed

ETERNUS 2012 8.2.0.1, 6.1 HP LTO6 1.0.7.1, 238B


LT260 05/22/2014 HH FC 02/11/2013
, signed , signed

ETERNUS 2012 R2 8.2.0.1, 6.1 HP LTO6 1.0.7.1, 238B


LT260 05/22/2014 HH FC 02/11/2013
, signed , signed

ETERNUS 2012 8.2.0.1, 6.1 HP LTO6 1.0.7.1, 338B


LT260 05/22/2014 HH SAS 02/11/2013
, signed , signed
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

ETERNUS 2012R2 8.2.0.1, 6.1 HP LTO6 1.0.7.1, 338B


LT260 05/22/2014 HH SAS 02/11/2013
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 6.71 IBMLTO6 6.2.5.5, FA91


LT260 R2 05/22/2014 HH FC 09/08/2015
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 6.71 IBMLTO6 6.2.5.5, FA91


LT260 R2 05/22/2014 HH SAS 09/08/2015
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 6.71 IBMLTO7 6.2.5.5, FA11


LT260 R2 05/22/2014 HH FC 09/08/2015
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 6.71 IBM LTO7 6.2.5.5, FA11


LT260 R2 05/22/2014 HH SAS 09/08/2015
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 7.50 IBM LTO8 6.2.6.6, HB81


LT260 R2 05/22/2014 HH FC 10/24/2017
, signed , signed

ETERNUS 2012\2012 8.2.0.1, 7.50 IBM LTO8 6.2.6.6, HB81


LT260 R2 05/22/2014 HH SAS 10/24/2017
, signed , signed

ETERNUS 2016 8.2.0.6, 7.50 IBM LTO8 6.2.6.6, HB81


LT260 07/03/2017 HH FC 10/24/2017
, signed , signed

ETERNUS 2016 8.2.0.6, 7.50 IBM LTO8 6.2.6.6,10/2 HB81


LT260 07/03/2017 HH SAS 4/2017,
, signed signed

Hewlett Packard Enterprise


CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

Standalone N/A N/A HPE LTO7 1.0.9.1 or later G9Q1 or later


Drive HPE LTO8 1.0.9.3 or later
J4DB or later

StoreOnce HP StoreEver 3.11.x or later HP LTO Drives HP StoreEver N/A


VTL Tape Drivers Tape Drivers
for Windows for Windows
v4.0.0.0 or v4.0.0.0 or
later later
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

ESL G3 HP StoreEver 680H.GS5050 HPE LTO7 FH HP StoreEver FA18 or later


Tape Drivers 1 MCB2 or FC Tape Drivers
for Windows later for Windows J3PW or later
v4.0.0.0 or 656H.GS1080 HP LTO6 FH v4.0.0.0 or
later 1 MCB1 or FC later I6GW or later
later
HP LTO5 FH H6HW or later
FC

HP LTO4 FH
FC

MSL 6480 HP StoreEver 4.60 or later HPE LTO8 HH HPE StoreEver J4DB or later
Tape Drivers FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or HPE LTO8 HH v4.4.0.0 or
later SAS later FA17 or later

HPE LTO7 HH FA17 or later


FC
252W or later
HPE LTO7 HH
SAS 352W or later

HP LTO6 HH I6GW or later


FCHP LTO6
HH SAS Y6DW or later

HP LTO5 FH Z6DW or later


FC
H6FW or later
HP LTO5 HH
FC U62W or later

HP LTO5 HH
SAS

HP LTO4 FH
FC

HP LTO4 HH
SAS

MSL 3040 HP StoreEver 3210 or later HPE LTO8 HH HP StoreEver J4DB or later
Tape Drivers FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or HPE LTO8 HH v4.4.0.0 or
later SAS later
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

MSL G3 HP StoreEver MSL8096- HPE LTO8 HH HPE StoreEver J4DB or later


Family Tape Drivers 1130 or later FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or MSL4048- HPE LTO8 HH v4.4.0.0 or
later 8.70 or later SAS later FA17 or later

MSL2024- HPE LTO7 HH FA17 or later


6.20 or later FC
252W or later
HPE LTO7 HH
SAS 352W or later

HP LTO6 HH I6GW or later


FC
Y6DW or later
HP LTO6 HH
SAS Z6DW or later

HP LTO5 FH H6FW or later


FC
U62W or later
HP LTO5 HH
FC

HP LTO5 HH
SAS

HP LTO4 FH
FC

HP LTO4 HH
SAS

1/8 G2 HP StoreEver 4.30 or later HPE LTO8 HH HPE StoreEver J4DB or later
Autoloader Tape Drivers FC Tape Drivers
for Windows for Windows J4DB or later
v4.4.0.0 or HPE LTO8 HH v4.4.0.0 or
later SAS later FA17 or later

HPE LTO7 HH FA17 or later


FC
252W or later
HPE LTO7 HH
SAS 352W or later

HP LTO6 HH Y6DW or later


FC
Z6DW or later
HP LTO6 HH
SAS U62W or later

HP LTO5 HH
FC

HP LTO5 HH
SAS

HP LTO4 HH
SAS
IBM
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

Standalone N/A N/A IBM LTO5 FH Inbox


Drive Standalone ltotape.sys

Total Storage ibmcg2k12, B.50 LTO6 HH SAS ibmcg2k12, CB21


3572 6.2.3.3 6.2.3.3
(TS2900)

Total Storage ibmcg2k8, 17 LTO5 HH SAS ibmtp2k8, B6W1


3572 6.2.1.8, x64 6.2.1.8, x64
(TS2900)

Total Storage ibmcg2k8, A.40 IBM LTO5 ibmtp2k8, B6W0


3573 6.2.1.8, x64 3580 6.2.1.8, x64

Total Storage ibmcg2k12, B.50 LTO6 FH FC ibmcg2k12, C9T4


3573 6.2.3.3 6.2.3.3
(TS3100/TS32
00)

Total Storage ibmcg2k8, A.40 LTO4 FH FC ibmcg2k8, A230


3573 6.2.1.8, x64 6.2.1.8, x64
(TS3100/TS32
00)

Total Storage ibmcg2k12, B.50 LTO6 HH SAS ibmcg2k12, C9T5


3573 6.2.3.3 6.2.3.3
(TS3100/TS32
00)

Total Storage ibmcg2k12, 630G LTO6 FH FC ibmcg2k12, CB20


3576 6.2.3.3 6.2.3.3
(TS3310)

Total Storage 2012/2012R2 6.2.5.6 F030 LTO6 FH FC 6.2.5.6 F9A0


3584
(TS3500/TS45
00)

Total Storage 2012/2012R2 6.2.5.6 58 LTO7 HH SAS 6.2.5.6 FA11


3572
(TS2900)

Total Storage 2012/2012R2 6.2.5.6 D.00 LTO7 FH FC 6.2.5.6 FA10


3573
(TS3100)

Total Storage 2012/2012R2 6.2.5.6 D.00 LTO7 HH 6.2.5.6 FA11


3573 FC/SAS
(TS3100)
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

Total Storage 2012/2012R2 6.2.5.6 D.00 LTO7 FH FC 6.2.5.6 FA10


3573
(TS3200)

Total Storage 2012/2012R2 6.2.5.6 D.00 LTO7 HH 6.2.5.6 FA11


3573 FC/SAS
(TS3200)

Total Storage 2012/2012R2 6.2.5.6 670G LTO7 FH FC 6.2.5.6 FA10


3576
(TS3310)

Total Storage 2012/2012R2 6.2.5.6 F030/1201 LTO7 FH FC 6.2.5.6 F980


3584
(TS3500/TS45
00)

Total Storage 6.2.6.6 1413/G060 LTO8 6.2.6.6 J4D0


3584
(TS4500/TS35
00)

Total Storage 6.2.6.6 1112/F00 LTO8 6.2.6.6 J4D0/J4D1


3573
(TS4300/TS32
00/TS3100)

Total Storage 6.2.6.6 0080 LTO8 6.2.6.6 HB83


3572
(TS2900)

TIP
The following registry key needs to be added to enable support for TS 2900: DWORD “RSMCompatMode” under
“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent” and set it to 29 (decimal).

Quantum
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

DXi6701 Qi2Kx64.sys V 2.1.1 DXi6702 HP LTO5 hplto.sys, I30Z


Scalar , 7.5.0.0 1.6.0.3
(emulating
i2000)

DXi6701 Qi2Kx64.sys V 2.1.1 DXi6702 IBM LTO5 ibmtp2k8.sy A5MO


Scalar , 7.5.0.0 s, 6.2.1.8
(emulating
i2000)
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

DXi8500 Qi2Kx64.sys V1.5.0_85 HP LTO4 hplto.sys, H44Z


2TB Scalar , 7.5.0.0 1.6.0.3
(emulating
i2000)

DXi8500 Qi2Kx64.sys V1.5.0_85 IBM LTO4 ibmtp2k8.sy A2FB


2TB Scalar , 7.5.0.0 s, 6.2.1.8
(emulating
i2000)

DXi8502 Qi500X64.s 2.0.2_85 HP LTO5 hplto.sys, I30Z


(VTL) ys, 7.5.0.0 1.6.0.3

DXi6902 Qi2kx64.sys 3.0 HP hplto.xyx,1. I6PZF990


(VTL) , 7.6.1.0 LTO5IBM 0.7.16.2.92
LTO5 00.16348

DXi6902 Windows QntmLib.sy 3.2.5 IBM LTO5 ibmtp2k16 A5M0


(VTL) 2016 s 1.0.0.1 6.2.6.1
emulating
Scalar i6000

DXi4701 Qi2kx64.sys 3.0 HP hplto.xyx,1. I6PZF990


(VTL) , 7.6.1.0 LTO5IBM 0.7.16.2.92
LTO5 00.16348

DXi4701 Windows QntmLib.sy 3.2.5 IBM LTO5 ibmtp2k16 A5M0


(VTL) 2016 s 1.0.0.1 6.2.6.1
emulating
Scalar i6000

Scalar i40 Qi40X64.sy 130G HP LTO5 hplto.sys, Y35Z


s, 7.5.2.0 1.6.0.2

Scalar i40 Qi40X64.sy 175G IBM LTO6 6.3.9600.16 F3JD


s, 7.6.0.0 384

Scalar i40 Qi40X64.sy 180B IBM LTO7 6.3.9600.16 FA17


s, 7.6.0.0 384

Scalar i80 Qi40X64.sy 130G HP LTO5 hplto.sys, Y35Z


s, 7.5.2.0 1.6.0.2

Scalar i80 Qi40X64.sy 175G IBM LTO6 6.3.9600.16 F3JD


s, 7.6.0.0 384

Scalar i80 Qi40X64.sy 180G IBM LTO7 6.3.9600.16 FA17


s, 7.6.0.0 384

Scalar i500 ad500x64.s 500G IBM LTO4 ibmtp2k3.sy 82FB


ys, 7.4.0.0 s, 6.1.8.9
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

Scalar i500 Qi500X64.s 607G HP LTO5 hplto.sys, I3EZ


ys, 7.5.0.0 1.6.0.2

Scalar i500 Qi500X64.s 607G IBM LTO5 ibmtp2k8.sy B170


ys, 7.5.0.0 s, 6.1.9.9

Scalar i500 Qi500X64.s 607G HP LTO4 hplto.sys, H58Z


ys, 7.5.0.0 1.6.0.2

Scalar i500 Qi500x64.s 670G IBM LTO6 6.3.9600.16 F9A0


ys, 7.6.0.0 384

Scalar i500 Qi500x64.s 670G IBM LTO7 6.3.9600.16 FA10


ys, 7.6.0.0 384

Scalar i500 Windows QtmLib 700G IBM LTO8 ltotape H7TF


2016 1.0.0.1 10.0.14393.
206

Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 HP LTO4 FC hplto.sys, H58Z


, 7.5.5.0 301 1.6.0.1

Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 HP LTO5 FC hplto.sys, I3AZ


, 7.5.5.0 301 1.6.0.1

Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 IBM LTO5 lto.sys, A6SA
, 7.5.5.0 301 FC 6.1.7600.16
385

Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 IBM LTO5 lto.sys, B170
, 7.5.5.0 301 FC 6.1.7600.16
385

Scalar i6000 Qi6Kx64.sys 606A.GS00 Scalar i2000 IBM LTO4 lto.sys, A23D
, 7.5.5.0 301 FC 6.1.7600.16
385

Scalar i6000 Qi6kx64.sys 720Q IBM LTO6 6.3.9600.16 F9A0


, 7.6.1.0 384

Scalar i6000 Qi6kx64.sys 720Q IBM LTO7 6.3.9600.16 FA10


, 7.6.1.0 384

Scalar i6000 Windows QntmLib 760Q IBM LTO8 ltotape H980


2016 1.0.0.1 10.0.14393.
206

Superloader QsmcX64.sy V61 Quantum QLTOx64.sy 2103


s, 2.5.1.0 LTO4 s, 3.4.0

Superloader QsmcX64.sy 75 Quantum QLTOx64.sy 3060


s, 2.6.2.0 LTO5 s, 3.4.0.0
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

Superloader QsmcX64.sy V91 IBM LTO5 6.3.9600.16 F3HB


s, 2.6.3.0 384

Superloader QsmcX64.sy V91 IBM LTO6 6.3.9600.16 F3JD


s, 2.6.3.0 384

Superloader QsmcX64.sy V92 IBM LTO7 6.3.9600.16 FA17


s, 2.6.3.0 384

Superloader Windows QntmLib,1. V94 IBM LTO8 ltotape H7TF


2016 0.0.1 10.0.14393.
206

Scalar i3 6.3.9600.16 110G IBM LTO6 6.3.9600.16 G9P1


384 HH 384

Scalar i3 6.3.9600.16 110G IBM LTO7 6.3.9600.16 G9Q1


384 HH 384

Scalar i3 Windows QntmLib 150G IBM LTO8 ltotape H7TF


2016 1.0.0.1 HH 10.0.14393.
206

Scalar i6 6.3.9600.16 110G IBM LTO6 6.3.9600.16 G9P0


384 384

Scalar i6 6.3.9600.16 110G IBM LTO7 6.3.9600.16 G9Q0


384 384

Scalar i6 Windows QntmLib 150G IBM LTO8 ltotape H7TF


2016 1.0.0.1 10.0.14393.
206

Tandberg Data
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

StorageLoa 1.8.0.11 3.47 HP 3000 1.0.6.1 Z21U


der LTO LTO 5 HH
SAS

StorageLoa 1.8.0.11 3.47 HP 3000 1.0.6.1 Z33U


der LTO LTO 5 HH
SAS

exbchgx64.s V1C270 LTO4 hplto.sys, D217


ys, 2.1.9.0, 1.0.5.2,
11/21/2008 12/10/2007
, signed, , signed,
64bit 64bit
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

exachgx64.s V1C270 LTO4 ibmtp2k8.sy 85V3


ys, 2.1.9.0, s, 6.1.8.9,
11/21/2008 3/19/2008,
, unsigned, signed,
64bit 64bit

exbchgx64.s V1D170 LTO4 ibmtp2k8.sy 85V3


ys, 2.1.9.0, s, 6.1.9.5,
11/21/2008 6/11/2008,
, signed, signed,
64bit 64bit

exachgx64.s V1D170 LTO4 ibmtp2k3.sy 85V3


ys, 2.1.9.0, s, 6.1.8.9,
11/21/2008 3/19/2008,
, unsigned, signed,
64bit 64bit

3.01.0009.0 V1C290 Magnum HP 3000 1.0.6.1 Z21U


224, LTO 5 HH
StorageLoa SAS
der 2U LTO

3.01.0009.0 V1C290 Magnum HP 3000 1.0.6.1 Z33U


224, LTO 5 HH
StorageLoa SAS
der 2U LTO

3.01.0009.0 V1C290 Magnum HP 3000 1.0.6.1 Y21U


224, LTO 5 HH
StorageLoa FC
der 2U LTO

3.01.0009.0 V1C290 Magnum HP 3000 1.0.6.1 Y31U


224, LTO 5 HH
StorageLoa FC
der 2U LTO

3.01.0009.0 V1C290 Magnum HP 3000 1.0.6.1 Y32U


224, LTO 5 HH
StorageLoa FC
der 2U LTO

3.01.0009.0 V1C290 Magnum HP 1760 1.0.6.1 V51U


224, LTO 4 HH
StorageLoa FC
der 2U LTO

3.01.0009.0 V1C290 Magnum HP 1760 1.0.6.1 U51U


224, LTO 4 HH
StorageLoa SAS
der 2U LTO
LIBRARY CHANGER LIBRARY ADDITIONAL TAPE DRIVE
MODEL OPERATING DRIVER FIRMWARE LIBRARIES IN TAPE DRIVE TAPE DRIVER FIRMWARE
NAME SYSTEM VERSION REVISION TEST TYPE VERSION REVISION

3.01.0009.0 V1C290 Magnum HP 1760 1.0.6.1 W51U


224, LTO 4 HH
StorageLoa SCSI
der 2U LTO

tdsafe.sys, 3.42 LTO4 hplto.sys, W22U


1.7.0.0, 1.0.5.2,
1/4/2008, 12/10/2007
signed, , signed,
64bit 64bit

tdsafe.sys, 3.8 LTO4 ltotape.sys, 85V3


1.7.0.0, 6.0.6001.18
1/4/2008, 000,
signed, 6/21/2006,
64bit signed,
64bit

tdsafe.sys, 3.63 LTO4 ibmtp2k8.sy 85V3


1.7.0.0, s, 6.1.8.9,
1/4/2008, 3/19/2008,
signed, signed,
64bit 64bit

1.8.0.11 3.47 HP 3000 1.0.6.1 Y21U


LTO 5 HH
FC

1.8.0.11 3.47 HP 3000 1.0.6.1 Y31U


LTO 5 HH
FC

1.8.0.11 3.47 HP 3000 1.0.6.1 Y32U


LTO 5 HH
FC

1.8.0.11 3.47 HP 1760 1.0.6.1 U51U


LTO 4 HH
SAS

Oracle StorageTek
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

SL150 2.50 HP LTO5 HH Y6IS


FC

SL150 2.50 HP LTO5 HH Z6FS


SAS

SL150 2.50 HP LTO6 HH 25FS


FC
CHANGER LIBRARY TAPE DRIVE
LIBRARY OPERATING DRIVER FIRMWARE TAPE DRIVE TAPE DRIVER FIRMWARE
MODEL NAME SYSTEM VERSION REVISION TYPE VERSION REVISION

SL150 2.50 HP LTO6 HH 35FS


SAS

SL150 2.50 IBM LTO7 HH G341


FC

SL150-Tested 2.50 IBM LTO7 HH G341


SAS
System Center – Data Protection Manager build
versions
2 minutes to read

This article describes how to determine your current Microsoft System Center – Data Protection Manager version
number and the corresponding update rollup. Each update rollup (UR ) release has a link to a support article
describing the UR changes as well as links to the package downloads.

NOTE
All System Center Data Protection Manager update rollups are cumulative. This means, you do not need to apply the URs in
order, you can always apply the latest update. If you have deployed System Center 2016 – Data Protection Manager and
never applied an update rollup, you can proceed to install the latest one available.

Build versions
The following table lists the build versions for Data Protection Manager 2016.

BUILD NUMBER KB DESCRIPTION

4.3.1012.0 n/a System Center 2016 Technical Preview


Data Protection Manager

4.3.1071.0 n/a System Center 2016 Technical Preview 2


Data Protection Manager

4.3.1043.0 n/a System Center 2016 Technical Preview 3


Data Protection Manager

5.0.46.0 n/a System Center 2016 Technical Preview 4


Data Protection Manager

5.0.58.0 n/a System Center 2016 Technical Preview 5


Data Protection Manager

5.0.158.0 n/a System Center 2016 Data Protection


Manager RTM

5.0.247.0 3190600 Update Rollup 1 for System Center


2016 Data Protection Manager

5.0.322.0 3209593 Update Rollup 2 for System Center


2016 Data Protection Manager

5.0.342.0 4043316 Update Rollup 4 for System Center


2016 Data Protection Manager

5.0.361.0 4090835 Update Rollup 5 for System Center


2016 Data Protection Manager
BUILD NUMBER KB DESCRIPTION

5.0.375.0 4456327 Update Rollup 6 for System Center


2016 Data Protection Manager

The following table lists the build versions for Data Protection Manager 1801.

BUILD NUMBER KB DESCRIPTION

5.1.363.0 n/a System Center 2016 1801

The following table lists the build versions for Data Protection Manager 1807.

BUILD NUMBER KB DESCRIPTION

5.1.378.0 KB4339950 System Center 2016 1807

Next steps
What's New in DPM
System Center DPM Release Notes
18 minutes to read

This article lists the release notes for System Center 2019 - Data Protection Manager (DPM ).
This article lists the release notes for System Center 1807 - Data Protection Manager (DPM ).
This article lists the release notes for System Center 1801 - Data Protection Manager (DPM ).
This article lists the release notes for System Center 2016 - Data Protection Manager (DPM ).

DPM 2019 Release Notes


The following sections summarize the release notes for DPM 2019 and include the following known issues and
workarounds.
DPM console crashes due to MSDPM Service crash
Description: Presence of duplicate summary management jobs, after DPM upgrade, might lead to failure of any
in-progress jobs at zero hours eventually leading to a crash. As a result, you might observe the following:
Replica is inconsistent.
Storage bloat caused due to non-deletions of recovery points.
Outdated DPM reports.
No clean-up for job history and garbage collection jobs.
Workaround:
1. Backup the current DPM database.
2. Open SQL management studio and connect to the SQL Instance hosting the DPMDB for this server.
3. Run the following query, and check if you have two or more summary manager jobs scheduled, and see
which the older schedule was:

SELECT SCH.ScheduleId, SCH.JobDefinitionId, jd.CreationTime


FROM tbl_JM_JobDefinition JD
JOIN tbl_SCH_ScheduleDefinition SCH
ON JD.JobDefinitionId = SCH.JobDefinitionId
WHERE JD.Type = '282faac6-e3cb-4015-8c6d-4276fcca11d4'
AND JD.IsDeleted = 0
AND SCH.IsDeleted = 0

4. If you have more than one row returned, take the resulting ScheduleID and JobDefinitionID of the older
entry and mark them as deleted.

update tbl_SCH_ScheduleDefinition
set IsDeleted = 1
where ScheduleId = ‘ScheduleID ' --- Replace with Your ScheduleID
update dbo.tbl_JM_JobDefinition
set IsDeleted = 1
where JobDefinitionId = ‘JobDefinitionID' --- Replace with Your JobDefinitionID

5. Delete the SQL job that is matching the ScheduleID under the SQL Server Agent – JOBS. Once deleted, the
crash at zero hours would be resolved.
ScheduleId is the SQL Jobs under SQL agent:

UPDATE MSDB.dbo.sysjobs
SET Enabled = 0
WHERE [Name] LIKE ‘ScheduleID’ --- Replace with Your ScheduleID

Hyper-V VMs are protected twice on VM upgrade


Description: When upgrading a Hyper-V VM from Windows Server 2012 R2 to Windows Server 2016, two
versions of the VM appear in the Create Protection Group wizard.
Workaround: For the protected VMs which are about to be upgraded, make sure to stop protection with retain
data before upgrading the VM. Then, upgrade the VM and reprotect it in a new protection group. While
configuring reprotection, do a refresh on the VM host for DPM to detect the VM upgrade and protect it as RCT
VM.
Restoration of a previous version for an upgraded Hyper-V VM causes future recovery points to fail
Description: When you upgrade a protected 2012 R2 Hyper-V VM to the 2016 version, then stop protecting the
VM (but retain data), and then re-enable protection, if you then recover a 2012 R2 copy at the original location,
further backups might fail.
Workaround: After recovery, change the VM version to 2016, then run a consistency check.
Bare Metal Recovery protection failures
Description: If you configure Bare Metal Recovery (BMR ) protection, the BMR protection job might fail with the
message that the replica size is not sufficiently large.
Workaround: Use the following registry path to change the default replica size for BMR data sources. Open the
registry editor and increase the replica size for the following key:
HKLM\Software\Microsoft\Microsoft Data Protection
Manager\ConfigurationReplicaSizeInGBForSystemProtectionWithBMR (DWORD )
DPM database protection stops in case of upgrade scenarios
Description: When you upgrade DPM, database name might change in some scenarios.
Workaround: If you are protecting a DPM database, ensure to enable the protection for the new DPM database.
Once the DPM upgrade is validated, you can remove protection for the previous DPM database.
Hyper-V RCT - recover as files for D-T backup fails
Description: Recovery of Hyper-V RCT VMs as files created directly on tape (D -T) fails. D -D -T backups does not
exhibit this issue.
Workaround: Use Alternate Location Recovery as a VM, and then transfer those files to the desired location.
DPM 2019 does not support file server end user recovery with Modern Backup Storage (MBS )
Description: DPM 2019 does not support end user recovery with Modern Backup Storage (MBS ).
Workaround: None. File Server EUR is not supported when using MBS.
DPM 1801/1807 servers cannot be managed by DPM 2019 central console
Description: With DPM 2019 central console you cannot manage any DPM 1801 or DPM 1807 servers.
Workaround: Upgrade your DPM server to version 2019.

DPM 1807 Release notes


To view the list of bugs that have been fixed in DPM 1807, refer to KB article 4339950.
The following issues exist in the 1807 release.
Hyper-V VMs are protected twice on VM upgrade
Description: When upgrading a Hyper-V VM from Windows Server 2012 R2 to Windows Server 2016, two
versions of the VM appear in the Create Protection Group Wizard.
Workaround: For the VMs that haven't been upgraded, stop protection with Retain Data. Upgrade the VM, and
create a new protection group. Then refresh the data sources, and protect the VMs. When you reapply protection,
the VMs are protected using Resilient Change Tracking (RCT).
Agent installation fails on Windows Server 2008, Windows Server 2008 R2
Description: When protecting Windows Server 2008, or Windows Server 2008 R2, installing the agent can fail.
Workaround: Upgrade the Windows Management Framework (WMF ) on the production server to 4.0. Download
the WMF from https://www.microsoft.com/download/details.aspx?id=40855. Install WMF and then install the
agent.
Restoring a previous version of an upgraded Hyper-V VM causes future recovery points to fail.
Description: If you upgrade a protected 2012 R2 Hyper-V VM to the 2016 version, then stop protecting the VM
(but retain data), and then re-enable protection, if you then recover a 2012 R2 copy at the original location, further
backups may fail.
Workaround: After recovery, change the VM Version to 2016, then run a Consistency Check.
Bare Metal Recovery protection failures
Description: If you configure Bare Metal Recovery (BMR ) protection, the BMR protection job may fail with the
message that the replica size is not sufficiently large.
Workaround: Use the following registry path to change the default replica size for BMR data sources. Open the
registry editor and increase the replica size for the following key:
HKLM\Software\Microsoft\Microsoft Data Protection
Manager\ConfigurationReplicaSizeInGBForSystemProtectionWithBMR (DWORD )
Reprotecting the DPM database after upgrading to DPM 2016 or 1801
Description: When you upgrade from System Center DPM 2012 R2 to System Center Data Protection Manager
2016 or 1801, the DPM database name can change in some scenarios.
Workaround: If you are protecting a DPM database, be sure to enable protection for the new DPM database.
Once the DPM upgrade is validated, you can remove protection for the old DPM database.
Recovery Points not being pruned, leading to an accumulation of Recovery Points
Description: DPM prunes recovery points older than the retention range. During the pruning process, DPM
calculates the storage consumed by those recovery points to be pruned. Storage calculation delays pruning.
Workaround: Configure DPM to skip calculating the size of recovery points to be pruned. As a result, the pruning
script runs faster, and prunes all recovery points older than the retention range, relieving any storage pressures.
The storage consumed per data source isn't updated until DPM finishes pruning. The storage consumption per
volume continues to reflect the correct values. Use a PowerShell script to turn on size calculation. The following
script runs complete size calculations.
Location: Program Files\Microsoft System Center 2016\DPM\DPM\bin\Manage-
DPMDSStorageSizeUpdate.ps1
Script:
Manage-DPMDSStorageSizeUpdate.ps1 -ManageStorageInfo [StopSizeAutoUpdate | StartSizeAutoUpdate |
GetSizeAutoUpdateStatus | UpdateSizeInfo ] [-UpdateSizeForDS <FilePath>] [-UpdatedDSSizeReport <FilePath>] [-
FailedDSSizeUpdateFile <FilePath>]
ManageStorageInfo: - Specifies the kind of operation needed.
StopSizeAutoUpdate: Stops the size calculations completely. Both UI and Powershell will not report
sizes.
StartSizeAutoUpdate: Resumes the size calculations. Immediately after enabling size calculations,
use UpdateSizeInfo (in the following options) to recalculate sizes for all the datasources, until which
sizes reported in PowerShell and UI may not be correct.
GetSizeAutoUpdateStatus: Tells whether size calculations are enabled or disabled.
UpdateSizeInfo: Triggers the size calculation and reports the size consumed by datasource. As this
can be a long-running operation, use it only when needed, for scenarios such as billing. During this
time, backups may fail with vhd mount errors.
UpdateSizeForDS: Path to a text file with a list of Datasource IDs for which size needs to be calculated,
with a datasourceID on each line. When not passed, size calculation is triggered for all the datasources. Use
after using UpdateSizeInfo in ManageStorageInfo . To get the Datasource IDs of specific datasources, use
Get-DPMProtectionGroup | Get-DPMDatasource | Format-table -Property Computer,name,ObjectType,Id .

UpdatedDSSizeReport: Path to a file that stores the updated datasource sizes. When not passed sizes.csv,
a file is created in the execution directory. Use after UpdateSizeInfo in ManageStorageInfo .
FailedDSSizeUpdateFile: Path to a file to store the Datasource IDs for the datasources for which the
storage consumption couldn’t be calculated. This may happen due to reasons as ongoing backups. When
not passed failedDS.txt file is created in the execution directory. This file can be given as input to
“UpdateSizeForDS” to update the sizes of all the datasources. This should be used after using
UpdateSizeInfo in ManageStorageInfo .

Hyper-V RCT - recover as files for D-T backup fails


Description: Recovery of Hyper-V RCT VMs as files created directly on tape (D -T) fails. D -D -T does not exhibit
this issue.
Workaround: Use Alternate Location Recovery as a VM, and then transfer those files to the desired location.
File Server end user recovery (EUR ) not available when using Modern Backup Storage (MBS )
Description: If you use Modern Backup Storage (MBS ) with DPM 2016, File Server end-user recovery is not
available.
Workaround: None. File Server EUR is not supported when using MBS.

DPM 1801 Release notes


The following bugs have been fixed in the DPM 1801 release:
Upgrading the DPM agent on the production server causes an unexpected reboot.
Consistency checks for Hyper-V VMs transferred more data than the size of the VMs.
The following issues exist in the 1801 release.
Silent Installation of System Center DPM with SQL Server 2008
Description: DPM 2016 RTM won't silently install on SQL Server 2008.
Workaround: Deploy DPM 2016 RTM on a version of SQL Server higher than 2008, or use the DPM 2016 Setup
user interface.

Remove-DPMDiskStorage cmdlet may delete volumes with active or


inactive backups
Description: If the volume's datasources are being backed up (actively or inactively), when the Remove-
DPMDiskStorage cmdlet is used to remove volumes from DPM, the datasources can be removed too.
Workaround: Before using the cmdlet to remove the volumes, make sure the volume's datasources aren't in use
(actively or inactively).
DPM 2016 on Windows Server 2016 hangs
Description: Memory consumption on the DPM Server increases continuously until it reaches 90%. Memory
consumption slows the DPM server.
Workaround: Upgrade DPM to DPM UR2 and install KB4013429 to fix this issue.
Hyper-V VMs are protected twice on VM upgrade
Description: When upgrading a Hyper-V VM from Windows Server 2012 R2 to Windows Server 2016, two
versions of the VM appear in the Create Protection Group Wizard.
Workaround: For the VMs that haven't been upgraded, stop protection with Retain Data. Upgrade the VM, and
create a new protection group. Then refresh the data sources, and protect the VMs. When you reapply protection,
the VMs are protected using Resilient Change Tracking (RCT).
Agent installation fails on Windows Server 2008, Windows Server 2008 R2
Description: When protecting Windows Server 2008, or Windows Server 2008 R2, installing the agent can fail.
Workaround: Upgrade the Windows Management Framework (WMF ) on the production server to 4.0. Download
the WMF from https://www.microsoft.com/download/details.aspx?id=40855. Install WMF and then install the
agent.
Restoring a previous version of an upgraded Hyper-V VM causes future recovery points to fail.
Description: If you upgrade a protected 2012 R2 Hyper-V VM to the 2016 version, then stop protecting the VM
(but retain data), and then re-enable protection, if you then recover a 2012 R2 copy at the original location, further
backups may fail.
Workaround: After recovery, change the VM Version to 2016, then run a Consistency Check.
Bare Metal Recovery protection failures
Description: If you configure Bare Metal Recovery (BMR ) protection, the BMR protection job may fail with the
message that the replica size is not sufficiently large.
Workaround: Use the following registry path to change the default replica size for BMR data sources. Open the
registry editor and increase the replica size for the following key:
HKLM\Software\Microsoft\Microsoft Data Protection
Manager\ConfigurationReplicaSizeInGBForSystemProtectionWithBMR (DWORD )
Reprotecting the DPM database after upgrading to DPM 2016
Description: When you upgrade from System Center DPM 2012 R2 to System Center Data Protection Manager
2016, the DPM database name can change in some scenarios.
Workaround: If you are protecting a DPM database, be sure to enable protection for the new DPM database.
Once the DPM upgrade is validated, you can remove protection for the old DPM database.
Recovery Points not being pruned, leading to an accumulation of Recovery Points
Description: DPM prunes recovery points older than the retention range. During the pruning process, DPM
calculates the storage consumed by those recovery points to be pruned. Storage calculation delays pruning.
Workaround: Configure DPM to skip calculating the size of recovery points to be pruned. As a result, the pruning
script runs faster, and prunes all recovery points older than the retention range, relieving any storage pressures.
The storage consumed per data source isn't updated until DPM finishes pruning. The storage consumption per
volume continues to reflect the correct values. Use a PowerShell script to turn on size calculation. The following
script runs complete size calculations.
Location: Program Files\Microsoft System Center 2016\DPM\DPM\bin\Manage-
DPMDSStorageSizeUpdate.ps1
Script:
Manage-DPMDSStorageSizeUpdate.ps1 -ManageStorageInfo [StopSizeAutoUpdate | StartSizeAutoUpdate |
GetSizeAutoUpdateStatus | UpdateSizeInfo ] [-UpdateSizeForDS <FilePath>] [-UpdatedDSSizeReport <FilePath>] [-
FailedDSSizeUpdateFile <FilePath>]

ManageStorageInfo: - Specifies the kind of operation needed.


StopSizeAutoUpdate: Stops the size calculations completely. Both UI and Powershell will not report
sizes.
StartSizeAutoUpdate: Resumes the size calculations. Immediately after enabling size calculations,
use UpdateSizeInfo (in the following options) to recalculate sizes for all the datasources, until which
sizes reported in PowerShell and UI may not be correct.
GetSizeAutoUpdateStatus: Tells whether size calculations are enabled or disabled.
UpdateSizeInfo: Triggers the size calculation and reports the size consumed by datasource. As this
can be a long-running operation, use it only when needed, for scenarios such as billing. During this
time, backups may fail with vhd mount errors.
UpdateSizeForDS: Path to a text file with a list of Datasource IDs for which size needs to be calculated,
with a datasourceID on each line. When not passed, size calculation is triggered for all the datasources. Use
after using UpdateSizeInfo in ManageStorageInfo . To get the Datasource IDs of specific datasources, use
Get-DPMProtectionGroup | Get-DPMDatasource | Format-table -Property Computer,name,ObjectType,Id .

UpdatedDSSizeReport: Path to a file that stores the updated datasource sizes. When not passed sizes.csv,
a file is created in the execution directory. Use after UpdateSizeInfo in ManageStorageInfo .
FailedDSSizeUpdateFile: Path to a file to store the Datasource IDs for the datasources for which the
storage consumption couldn’t be calculated. This may happen due to reasons as ongoing backups. When
not passed failedDS.txt file is created in the execution directory. This file can be given as input to
“UpdateSizeForDS” to update the sizes of all the datasources. This should be used after using
UpdateSizeInfo in ManageStorageInfo .

Hyper-V RCT - recover as files for D-T backup fails


Description: Recovery of Hyper-V RCT VMs as files created directly on tape (D -T) fails. D -D -T backups will not
exhibit this issue.
Workaround: Use Alternate Location Recovery as a VM, and then transfer those files to the desired location.
File Server end user recovery (EUR ) not available when using Modern Backup Storage (MBS )
Description: If you use Modern Backup Storage (MBS ) with DPM 2016, File Server end-user recovery is not
available.
Workaround: None. File Server EUR is not supported when using MBS.
Error 4387 might appear while installing DPM
Description: While installing the Data Protection Manager, when you enter an SQL instance in the Data
Protection Manager Setup > Prerequisites check> Instance of SQL server text box, error 4387 might
appear.
Workaround: Perform the required actions as detailed in this KB article and try the DPM setup again.

System Center DPM 2016 Release Notes


Silent Installation of System Center DPM with SQL Server 2008
Description: DPM 2016 RTM won't silently install on SQL Server 2008.
Workaround: Deploy DPM 2016 RTM on a version of SQL Server higher than 2008, or use the DPM 2016 Setup
user interface.

Remove-DPMDiskStorage cmdlet may delete volumes with active or


inactive backups
Description: If the volume's datasources are being backed up (actively or inactively), when the Remove-
DPMDiskStorage cmdlet is used to remove volumes from DPM, the datasources can be removed too.
Workaround: Before using the cmdlet to remove the volumes, make sure the volume's datasources aren't in use
(actively or inactively).
DPM 2016 on Windows Server 2016 hangs
Description: Memory consumption on the DPM Server increases continuously until it reaches 90%. Memory
consumption slows the DPM server.
Workaround: Upgrade DPM to DPM UR2 and install KB4013429 to fix this issue.
Hyper-V VMs are protected twice on VM upgrade
Description: When upgrading a Hyper-V VM from Windows Server 2012 R2 to Windows Server 2016, two
versions of the VM appear in the Create Protection Group Wizard.
Workaround: For the VMs that haven't been upgraded, stop protection with Retain Data. Upgrade the VM, and
create a new protection group. Then refresh the data sources, and protect the VMs. When you reapply protection,
the VMs are protected using Resilient Change Tracking (RCT).
Agent installation fails on Windows Server 2008, Windows Server 2008 R2
Description: When protecting Windows Server 2008, or Windows Server 2008 R2, installing the agent can fail.
Workaround: Upgrade the Windows Management Framework (WMF ) on the production server to 4.0. Download
the WMF from https://www.microsoft.com/download/details.aspx?id=40855. Install WMF and then install the
agent.
Restoring a previous version of an upgraded Hyper-V VM causes future recovery points to fail.
Description: If you upgrade a protected 2012 R2 Hyper-V VM to the 2016 version, then stop protecting the VM
(but retain data), and then re-enable protection, if you then recover a 2012 R2 copy at the original location, further
backups may fail.
Workaround: After recovery, change the VM Version to 2016, then run a Consistency Check.
Bare Metal Recovery protection failures
Description: If you configure Bare Metal Recovery (BMR ) protection, the BMR protection job may fail with the
message that the replica size is not sufficiently large.
Workaround: Use the following registry path to change the default replica size for BMR data sources. Open the
registry editor and increase the replica size for the following key:
HKLM\Software\Microsoft\Microsoft Data Protection
Manager\ConfigurationReplicaSizeInGBForSystemProtectionWithBMR (DWORD )
Reprotecting the DPM database after upgrading to DPM 2016
Description: When you upgrade from System Center DPM 2012 R2 to System Center Data Protection Manager
2016, the DPM database name can change in some scenarios.
Workaround: If you are protecting a DPM database, be sure to enable protection for the new DPM database.
Once the DPM upgrade is validated, you can remove protection for the old DPM database.
Recovery Points not being pruned, leading to an accumulation of Recovery Points
Description: DPM prunes recovery points older than the retention range. During the pruning process, DPM
calculates the storage consumed by those recovery points to be pruned. Storage calculation delays pruning.
Workaround: Configure DPM to skip calculating the size of recovery points to be pruned. As a result, the pruning
script runs faster, and prunes all recovery points older than the retention range, relieving any storage pressures.
The storage consumed per data source isn't updated until DPM finishes pruning. The storage consumption per
volume continues to reflect the correct values. Use a PowerShell script to turn on size calculation. The following
script runs complete size calculations.
Location: Program Files\Microsoft System Center 2016\DPM\DPM\bin\Manage-
DPMDSStorageSizeUpdate.ps1
Script:
Manage-DPMDSStorageSizeUpdate.ps1 -ManageStorageInfo [StopSizeAutoUpdate | StartSizeAutoUpdate |
GetSizeAutoUpdateStatus | UpdateSizeInfo ] [-UpdateSizeForDS <FilePath>] [-UpdatedDSSizeReport <FilePath>] [-
FailedDSSizeUpdateFile <FilePath>]

ManageStorageInfo: - Specifies the kind of operation needed.


StopSizeAutoUpdate: Stops the size calculations completely. Both UI and Powershell will not report
sizes.
StartSizeAutoUpdate: Resumes the size calculations. Immediately after enabling size calculations,
use UpdateSizeInfo (in the following options) to recalculate sizes for all the datasources, until which
sizes reported in PowerShell and UI may not be correct.
GetSizeAutoUpdateStatus: Tells whether size calculations are enabled or disabled.
UpdateSizeInfo: Triggers the size calculation and reports the size consumed by datasource. As this
can be a long-running operation, use it only when needed, for scenarios such as billing. During this
time, backups may fail with vhd mount errors.
UpdateSizeForDS: Path to a text file with a list of Datasource IDs for which size needs to be calculated,
with a datasourceID on each line. When not passed, size calculation is triggered for all the datasources. Use
after using UpdateSizeInfo in ManageStorageInfo . To get the Datasource IDs of specific datasources, use
Get-DPMProtectionGroup | Get-DPMDatasource | Format-table -Property Computer,name,ObjectType,Id .

UpdatedDSSizeReport: Path to a file that stores the updated datasource sizes. When not passed sizes.csv,
a file is created in the execution directory. Use after UpdateSizeInfo in ManageStorageInfo .
FailedDSSizeUpdateFile: Path to a file to store the Datasource IDs for the datasources for which the
storage consumption couldn’t be calculated. This may happen due to reasons as ongoing backups. When
not passed failedDS.txt file is created in the execution directory. This file can be given as input to
“UpdateSizeForDS” to update the sizes of all the datasources. This should be used after using
UpdateSizeInfo in ManageStorageInfo .

Hyper-V RCT - recover as files for D-T backup fails


Description: Recovery of Hyper-V RCT VMs as files created directly on tape (D -T) fails. D -D -T backups will not
exhibit this issue.
Workaround: Use Alternate Location Recovery as a VM, and then transfer those files to the desired location.
File Server end user recovery (EUR ) not available when using Modern Backup Storage (MBS )
Description: If you use Modern Backup Storage (MBS ) with DPM 2016, File Server end-user recovery is not
available.
Workaround: None. File Server EUR is not supported when using MBS.
Error 4387 might appear while installing DPM
Description: While installing the Data Protection Manager, when you enter an SQL instance in the Data
Protection Manager Setup > Prerequisites check> Instance of SQL server text box, error 4387 might
appear.
Workaround: Perform the required actions as detailed in this KB article and try the DPM setup again.

Next steps
To install DPM, see the article, Install DPM.
If you would like to consult planning information for your environment, see Preparing your environment
for System Center Data Protection Manager.
See these KBs for ReFS specific issues - KB4016173, KB4035951.
What's new in System Center Data Protection
Manager
11 minutes to read

This article details the new features supported in System Center 2019 - Data Protection Manager (DPM ).
DPM 1807 is the latest release in the System Center Semi Annual Channel (SAC ). You can update to System
Center Data Protection Manager (DPM ) version 1807 only from DPM 1801. If you're upgrading to DPM 1807, see
the Release Notes for 1807.
System Center DPM 1801 provides the following new features:
System Center DPM 2016 adds improvements in three key areas: storage efficiency, performance, and security.
Modern Backup Storage takes advantage of improvements in Windows Server 2016, creating storage space
savings of 30-40%. In addition to space savings, you can create storage and performance efficiency by using MBS
to back up designated workloads to specific volumes. Improved DPM performance reduces I/O requirements up
to 70%, resulting in faster backups. DPM 2016 supports shielded VMs.

New features in DPM 2019


See the following sections for detailed information about the new features/feature updates supported in DPM
2019.

Windows Server 2019 support


DPM 2019 can be installed on Windows Server 2019 and Windows Server 2016.

SQL 2017 support as DPM database


DPM 2019 support SQL 2017 as its database.
You can install SQL Server on a remote server, or on the DPM server. The database must be installed and running
before you install DPM.

Support for newer workloads backups


With DPM 2019, you can back up newer versions of workloads, listed below:
Hyper-V VMs 2019
Windows Server 2019
Exchange 2019
SharePoint 2019
VMWare vSphere 6.7
System Center Virtual Machine Manager 2019. Learn more.

Faster backups with Tiered storage using SSDs


DPM 2016 introduced Modern Backup Storage, improving storage utilization and performance. MBS uses ReFS
as underlying file system and is designed to make use of hybrid storage such as tiered storage.
To achieve the scale and performance by MBS, we recommend using a small percentage (4% of overall storage) of
flash storage (SSD ) with DPM 2019 as a tiered volume in combination with DPM HDD storage. DPM 2019 with
tiered storage delivers 50-70% faster backups. Learn more.

Support for Central Monitoring


With DPM 2019, all DPM -A customers (customer connected to Azure) have the flexibility of using Central
Monitoring, a monitoring solution provided by Microsoft Azure Backup.
You can monitor both on-premises and cloud backups, using Log Analytics with central monitoring capability.
Learn more.

VMware backup to tape


For long term retention on VMware backup data on-premises, you can now enable VMware backups to tape. The
backup frequency can be selected based on the retention range (which will vary from 1-99 years) on tape drives.
The data on tape drives could be both compressed and encrypted.
DPM 2019 supports both Original Location Recovery (OLR )) and Alternate Location Recovery (ALR )) for restoring
the protected VM. Learn more.

VMWare parallel backups


With DPM 2019, all your VMWare VMs backup within a single protection group would be parallel, leading to 25%
faster VM backups.
With earlier versions of DPM, parallel backups were performed only across protection groups. With DPM 2019,
VMWare delta replication jobs run in parallel. By default, number of jobs to run in parallel is set to 8. Learn more.

What's new in DPM 1807


DPM 1807 provides a number of bug fixes to improve the performance.
To view the list of bugs fixed and the installation instructions for DPM 1807, see KB article 4339950.

New features in DPM 1801


System Center DPM 1801 supports back up and restore of VMware virtual machines (VMs), and extends the
benefits of Modern Backup Storage to your VMware backups. For detailed information on how to back up
VMware VMs, see this article.
Up to 50% storage savings
Three times faster backups
Workload-volume affinity

New features in DPM 2016


The following features are either new to DPM, or are improved for DPM 2016.
Modern Backup Storage - Using Resilient File System (ReFS ) block-cloning technology to store
incremental backups, DPM 2016 improves storage utilization and performance. Backup storage grows and
shrinks with the production data source. There is no over-allocation of storage.
Resilient change tracking (RCT) - DPM uses RCT (the native change tracking in Hyper-V ), which
removes the need for time-consuming consistency checks. RCT provides better resiliency than the change
tracking provided by VSS snapshot-based backups. DPM also uses RCT for incremental backup. It identifies
VHD changes for virtual machines, and transfers only those blocks that are indicated by the change tracker.
Continued protection during cluster aware updates - Windows Server 2016 comes with the cluster OS
rolling update, where a cluster can be upgraded to Windows Server 2016 without bringing it down. DPM
2016 continues to protect VMs during the upgrade, maintaining the backup service level agreement (SLA).
Shielded VM Backups - Shielded VMs in Windows Server 2016 help protect sensitive VMs from
inspection, tampering, and data theft by malware and malicious administrators. DPM 2016 backups retain
the protections provided by shielded VMs to ensure they can be recovered seamlessly and securely.
Hyper-V with Storage Spaces Direct - DPM recognizes and protects Hyper-V VMs deployed on Storage
Spaces Direct, delivering seamless backup and recovery of VMs in disaggregated and hyper-converged
scenarios.
Hyper-V with ReFS SOFS Cluster - DPM 2016 can back up Hyper-V VMs deployed on ReFS -based SOFS
clusters. Backup and recovery of RCT-based VMs and non-RCT VMs is supported.
Upgrading a DPM production server to 2016 doesn't require a reboot - When you upgrade to DPM
2016, you are not required to reboot the production server. To avoid rebooting the production server,
upgrade to DPM 2016 and upgrade the DPM agent on the production servers. Backups continue and you
reboot the production server when you want.

Modern Backup Storage


Modern Backup Storage is a feature that provides several benefits including:
Improved storage savings
Modern Backup Storage achieves 30-40% storage savings using technologies such as Resilient File System (ReFS ).
Using ReFS volumes and storing backups on VHDXs means there are no Local Disk Manager (LDM ) limits or
storage over-allocations. DPM storage consumption is flexible: it grows and shrinks based on the production data
source’s storage changes.
Faster backups
DPM 2016 uses block cloning to store backups on ReFS volumes. Instead of using copy-on-write to store backups
(which was used by VolSnap in DPM 2012 R2), DPM 2016's block cloning uses allocate-on-write. This change
improves IOPS efficiency, making backups nearly 70% faster.
Choose the volumes for your data source to increase storage efficiency
DPM's workload-aware storage feature decreases costs by providing flexible storage choices for a given data
source. This means DPM can use expensive, high-performance disks for backing up high-IOPS workloads, such as
SQL or SharePoint. Low performant storage can be used for reduced-IOPS workloads.
Backup storage consumption in line with production data source
Without Logical Disk Manager (LDM ) limits, data sources grow and shrink as needed, without the need for manual
intervention. DPM doesn't need to allocate storage to data sources beforehand, and can dynamically allow the
backups to adjust as needed, thus achieving higher efficiency with less storage required.

Hyper-V protection improvements


The following information touches on the improvements to protecting VMs with DPM 2016.
Resilient Change Tracking (RCT )
In Windows Server 2016, Hyper-V virtual hard disks have built-in change tracking. As a result, in the case of a
Host outage, or VM migration, change-tracking is automatically preserved. With RCT, backups:
are more reliable: consistency checks aren't required after VM migration,
are scalable: more parallel backups and less storage overhead,
have improved performance: lower impact on the production fabric and faster backup.
Enabling RCT VM backup
Hyper-V VMs deployed on Windows Server 2016 and protected using DPM 2016 have RCT by default. VMs
deployed on Windows Server 2012 R2 or earlier do not support RCT. However, you can upgrade older VMs. To
upgrade older VMs to enable RCT:
1. In Hyper-V Manager, shut down the virtual machine.
2. In Hyper-V Manager, select Action > Upgrade Configuration Version.
If this option isn't available for the virtual machine, then it's already at the highest configuration version
supported by the Hyper-V host. For additional information about checking or upgrading the virtual
machine configuration version, see the article, upgrading virtual machine version to Windows Server 2016.
If you want to use Windows PowerShell to upgrade the virtual machine configuration, run the following
command where vmname is the name of the virtual machine.

Update-VMVersion <vmname>

3. On the DPM 2016 server:


Stop protection of the VM and select Retain Data.
In the DPM 2016 Administrator Console, click Protection > on the tool ribbon, click New to start the
Create Protection Wizard. Go through the wizard and select Refresh to update the data sources.
Select your VM and create a new protection group.
Delete the old VM's retained data once the retention range has expired.
This backs up RCT-enabled VMs deployed in various configurations. The following sections describe the
supported scenarios:
Meet backup SLA during cluster operating system rolling upgrade
Cluster OS rolling upgrade is a feature of Windows Server 2016 used to upgrade the cluster nodes' operating
system, from Windows Server 2012 R2 to Windows Server 2016, without stopping the Hyper-V or Scale-Out File
Server (SOFS ) workloads. Cluster OS rolling upgrade ensures protection is not interrupted during operating
system upgrades. This sustained protection meets the backup SLA, reinforces continuity, and provides peace of
mind for backup administrators. For detailed information on the cluster OS rolling upgrade process, see the article,
Cluster OS Rolling Upgrade Process.
To enable uninterrupted protection, run the following steps for each node:
1. Drain Roles on the node.
This puts the node in a paused state and automatically migrates any VM on that node to another cluster
node.
2. Restart the node.
3. Evict the node.
4. Install Windows Server 2016.
5. Install the DPM agent.
6. Add the node back to the cluster.
This allows backups to occur without consistency checks, while keeping the cluster alive.
Seamless protection and recovery of Shielded VMs (vTPM-enabled VMs )
Trusted Platform Modules (TPM ) are a chip in the motherboard of computers that help integrate cryptographic
keys. These keys are used by BitLocker to protect the computer even if it is stolen. Virtual TPM (vTPM ) is a feature
in Windows Server 2016. With vTPM, you can use BitLocker and a virtual TPM chip to encrypt a VM, thereby
protecting the VM. These VMs, called Shielded VMs, can only be run on healthy and approved hosts in the fabric.
DPM 2016 supports backup and recovery of Shielded VMs that have their VHDs/VHDXs protected with vTPM.
Note that Item Level Recovery (ILR ) and Alternate Location Recovery (ALR ) to a location outside the guarded
fabric is not available for this scenario.
Protecting VMs stored on Storage Spaces Direct
Storage Spaces Direct leverages the Storage Spaces feature introduced in Windows Server 2012 R2 which allows
you to deploy highly available (HA) storage systems using local storage. Storage Spaces Direct leverages the local
disks on hosts to provide a shared pool of clustered storage that can be used as primary storage for Hyper-V
virtual machine files, or for secondary storage for Hyper-V Replica virtual machines files. The primary use case for
Storage Spaces Direct is private cloud storage, either on-premises for enterprises, or in hosted private clouds for
service providers. For more information about Storage Spaces Direct, see the article on Storage Spaces Direct in
Windows Server 2016.
DPM protects Hyper-V VMs that use Storage Spaces Direct. Most configurations are supported, including the
backup of VMs using the Storage Spaces Direct hyper-converged scenario with the Hyper-V (compute) and
Storage Spaces Direct (storage) components on the same cluster. Note that backing up and restoring virtual
machines running on a Windows Nano Server isn't supported.
Protecting VMs stored on ReFS-based SOFS clusters
DPM 2016 can back up VMs deployed on ReFS -based SOFS clusters.
To protect VMs on SOFS clusters, add the following machine accounts to the backup operator groups and share
permissions.
If protecting a highly available (HA) VM, provide the machine account name of the host cluster and cluster
nodes, and DPM server.
If protecting a non-HA VM, provide the machine name of the Hyper-V host and the DPM server.
To add the machine accounts to the backup operator groups, run the following steps for each node in the SOFS
cluster:
1. Open the command prompt, and type, lusrmgr.msc to open Local Users and Groups.
2. In the Local Users and Groups dialog, click Groups.
3. In the list of groups, right-click Backup Operators and select Properties.
The Backup Operators Properties dialog opens.
4. In the Backup Operators Properties dialog, click Add.
5. In the Select Users, Computers, Services Accounts, or Groups dialog, click Object Types. The Object
Types dialog opens.
6. In the Object Types dialog, select Computers and click OK. The Object Types dialog closes.
7. In the Select Users, Computers, Service Accounts, or Groups dialog, enter the name of the server or
cluster, and click Check Names.
8. Once you have identified the computers, restart the node.
To give permissions to the share
1. On a server where the SOFS/SMB share is hosted, open Server Manager > File and Storage Services >
Shares.
2. Right click the VM storage share, and then click Properties.
3. In the Properties dialog, on the left navigation menu, click Permissions.
4. Click Customize permissions to open the Advanced Security Settings dialog.
5. On the Permissions tab, click Add.
6. Click Select a Principal.
7. In the Select User, Computer, Services Account, or Group dialog, click Object Types.
8. In the Object Types dialog, select Computers, and click OK.
9. In the Select User, Computer, Service Account, or Group dialog, enter the name of the Hyper-V node or
cluster name you want to have permission.
10. Click Check Names to resolve the name, and click OK.
11. In the Permission Entry for Share dialog, select Full Control, and click OK.
12. In the Advanced Security Settings for Share dialog, click the Share tab and repeat steps 6-11 for the
Share tab instead of the Permissions tab.
13. When you are finished adding permissions for the servers, click Apply.
This prepares the VMs on SOFS shares for the backup process.

Next steps
Install DPM
Upgrade your DPM installation
What's supported and what isn't for DPM?
14 minutes to read

This topic summarizes some of the common support information you might need when deploying and
maintaining System Center - Data Protection Manager.

Installation and deployment issues


DPM deployment options
Issue: DPM can be installed in physical and virtual environments.
More information: DPM can be installed as follows:
As a standalone physical server - DPM can't be deployed in a physical cluster, but you can manage multiple
DPM servers from a single location using Central Console in Operations Manager.
As an on-premises virtual machine - You can deploy DPM as a Hyper-V virtual machine as a single server
or virtual machine cluster. You install DPM in the same way as a physical installation. For detailed
information, see the row, DPM installed as Hyper-V VM in the Setup prerequisites table.
As an Azure virtual machine - From DPM 2012 R2 Update 3 onwards you can install DPM as an Azure
virtual machine. There are a number of restrictions in this deployment. For detailed information, see the
row DPM as an Azure virtual machine in the Setup prerequisites table.
As a Windows virtual machine in VMWare - From DPM 2012 R2 Update 5 onwards you can install DPM
on a Windows virtual machine in a VMWare environment. In this configuration DPM can protect
Microsoft workloads that are all running as Windows virtual machines in VMWare.
Sharing a library between different DPM versions isn't supported
Issue: Different versions of DPM (for example, DPM 2012 R2 and DPM 2016) can't function as clients sharing
the same library.
Workaround: None. All DPM servers sharing a library must be running the same version of DPM.
Upgrading System Center 2010 directly to System Center 2016 isn't supported
Issue: Upgrade isn't supported.
Workaround: You'll need to upgrade to DPM 2012 R2 first.
DPM doesn't run on the Turkish language version of Windows 2012 operating systems
Issue: No language support
Workaround: None
DPM 2010 and later versions can't run on a server running a 32-bit operating system
Issue: Operating system limitation.
Workaround: Install on 64-bit only. For a full list of system requirements, see Preparing your environment for
System Center Data Protection Manager.
Underscore not supported in SQL Server name
Issue: If you specify a remote SQL Server that has an underscore in the name during DPM installation, the
installation might fail.
Workaround: Specify a SQL Server name that doesn't include the underscore _ character.
NTFS compression isn't supported on DPM volumes
Issue: NTFS not supported.
Workaround: None
Renaming the DPM server isn't supported
Issue: Renaming not supported.
Workaround: None
Moving the DPM server domain isn't supported
Issue: Moving the DPM server to a different domain after deployment isn't supported.
Workaround: None
DPM on a domain controller can only protect local data sources
Issue: Deployment not supported.
Workaround: If you want to install the DPM protection agent on other computers in order to protect them, don't
install DPM on a domain controller.
DPM can't use SQL Server running on a domain controller
Issue: Database deployment not supported.
Workaround: If you want to use a remote instance of SQL Server as your DPM database, ensure that the SQL
Server instance isn't running on a domain controller.
You cannot install DPM 2016 on SQL 2016 SP1 (or later release )
Issue: Installation on SQL 2016 SP1 (or a later release) is not supported.
Workaround: None.
Moving protected servers with DPM secondary servers
Moving protected servers between DPM servers that are under secondary protection isn't supported. To illustrate
this we have the following:
Server1
Server2
DPM1 acting as primary DPM server
DPM2 acting as another primary DPM server
DPM3 acting as secondary server for DPM1 and DPM2
Where:
Server1 is protected by DPM1
Server2 is protected by DPM2
DPM3 is a secondary server for DPM1 and DPM2 (and thus protects Server1 and Server2.
The following occurs:
Scenario 1
DPM1 fails or is removed from the infrastructure.
You now want to protect Server1 with DPM2 (with DPM3 acting as the secondary server).
Scenario 2
DPM1 fails or is removed from the infrastructure.
You now want to protect Server1 with DPM3.
Both of these scenarios are unsupported. You can only select one of the following options:
Option 1 - Use the "Switch Protection" option on DPM3 for Server1, and leave DPM3 in this mode going
forward. Note that in this scenario you can't add secondary protection for Server1 on another DPM server
when you're using switched protection mode.
Option 2 - Rebuild DPM1 with the same name and restore the DPM database. This allows DPM to
resume primary protection.
Option 3 - Move protection for Server1 to a new DPM server (DPM4) that DPM3 doesn't know about.

Storage issues
References to old tape libraries aren't removed from the DPM database
Issue: Obsolete tape library are still enumerated and listed in DPM PowerShell cmdlets such as get-dpmlibrary.
Workaround: None
Virtual tape library support
Issue: Are virtual tape libraries supported?
Workaround: Virtual tape libraries configured with a virtual fibre channel adapter are only supported if you're
running Data Protection Manager 2012 R2 UR3 or later with certified hardware. For a current list of supported
hardware see Compatible Tape Libraries for System Center DPM 2012 and later . To check if your tape library is
supported by the virtual fibre channel adapter, please contact your tape hardware vendor and ask them to Verify
tape library compatibility.
USB or removable drives can't be used in the DPM storage pool
Issue: USB and removable storage such as Firewire.
Workaround: None. This isn't supported due to a limitation with Windows dynamic disks.
Data on CSVs
Issue: DPM only supports the protection of Hyper-V virtual machines on Cluster Shared Volumes (CSVs).
Protecting other workloads hosted on CSVs isn't supported.
Workaround: None.

Deduplication issues
Deduplicated volumes support
Issue: Deduplication support for DPM depends on operating system support.

OPERATING SYSTEM OF OPERATING SYSTEM OF DPM


PROTECTED SERVER SERVER DPM VERSION DEDUP SUPPORT

Windows 2012 Windows Server 2012 DPM 2012 with SP1, DPM Y
2012 R2
OPERATING SYSTEM OF OPERATING SYSTEM OF DPM
PROTECTED SERVER SERVER DPM VERSION DEDUP SUPPORT

Windows 2012 Windows Server 2012 R2 DPM 2012 R2 Y

Windows Server 2012 R2 Windows Server 2012 R2 DPM 2012 R2 Y

Windows Server 2012 R2 Windows Server 2012 DPM 2012 with SP1, DPM N
2012 R2

Workaround: Use within support limitations.


Windows deduplication isn't always supported on volumes hosting .VHD or .VHDX files
Issue: Dedupe support
Workaround: Deploy DPM as virtual machine.
You can enable deduplication for DPM storage when it runs in a Hyper-V virtual machine and stored backup data
to VHDs in shared folders on Windows File Servers with data deduplication enabled. For more information about
this scenario read Deduplicating DPM storage.
Dedup file system can't be protected to a secondary DPM server
Issue: After a dedup file system is protected by a primary DPM server, it can't be protected to a secondary DPM
server.
Workaround: None.
Item-level recovery not supported
Issue: If you're protecting virtual machines that contain deduped volumes, you can't perform Item level recovery
(ILR ) from those VHD/VHDX files.
Workaround: Restore the .VHD/VHDX file that contains the deduped volume to a Windows 2012 R2 server that
has the Data Deduplication role installed. Mount the .VHD file in disk management, and copy out the desired files.

Client and server protection issues


Support parameters for protecting computers running client operating systems with DPM
Issue: The following protection scenarios are supported:
Windows 8.1 clients can be protected with DPM 2012 R2, DPM 2016.
Windows 7 clients can be protected with DPM 2012 R2, DPM 2016.
Workaround: Ensure you're running the right version of DPM.
Support for protecting computers running server operating systems with DPM
Issue: The following protection scenarios are supported:
Windows Server 2012 R2 can be protected with DPM 2012 R2 and later.
Windows Server 2012 or 2012 with SP1 can be protected with DPM 2012 R2 and later.
Windows Server 2008 R2 with SP1, Windows Server 2008 R2 can be protected with DPM 2012 R2 and
DPM 2016.
Windows Server 2008 and Storage Server 2008 can be protected with DPM 2012 R2 running Update
Rollup 2 and DPM 2016.
Workaround: Ensure you're running the right version of DPM.
DPM can't protect SOFS shares
Issue: DPM can't protect shares on SOFS.
Workaround: Ensure shares you want to protect aren't located on SOFS.

File server issues


File Server end user recovery (EUR ) not available when using Modern Backup Storage (MBS )
Description: If you use Modern Backup Storage (MBS ) with DPM 2016 or later, File Server end-user recovery is
not available.
Workaround: None. File Server EUR is not supported when using MBS.

Data protection issues


DPM does not back up shared VHDX
Issue: DPM cannot backup VMs using shared drives (which are potentially attached to other VMs) as Hyper-V
VSS writer cannot back up volumes that are backed up by shared VHDs.
Workaround: To avoid potential data loss, use another method to back up data on the shareable VHD.
Protection might fail when changing the path of a data source
Issue: When you protect a shared folder, the path to the shared folder includes the logical path on the volume. If
you move the shared folder, protection will fail. In addition if you change the path of a protected data source on a
volume that uses the Encrypting File System (EFS ) and the new file path exceeds 5120 characters, data protection
will fail.
Workaround: If you must move a protected shared folder, remove it from its protection group and then add it to
protection after the move. For an encrypted volume ensure that the new file path of the protected data source
uses fewer than 5120 characters.
Change the domain of a protected resource
Issue: You can't change the domain of a protected computer and continue protection without disruption. In
addition, you can't change the domain of a protected computer and associate the existing replicas and recovery
points with the computer when it is re-protected.
Workaround: We recommend that you don't change the domain of a protected computer. If you must change the
domain of a protected computer, then first remove the data sources on the computer from protection. Then
protect the data source on the computer after it has a new domain.
Change the name of a protected resource
Issue: You can't change the name of a protected computer and continue protection without disruption. In
addition, you can't change the name of a protected computer and associate the existing replicas and recovery
points with the computer when it is re-protected.
Workaround: We recommend that you don't change the name of a protected computer. If you must change the
name of a protected computer, then first remove the data sources on the computer from protection. Then protect
the data source on the computer after it has a new name.
Change the time zone of a protected resource
Issue: Ensure you update the time zone correctly if you change it for a protected resource.
Workaround: DPM automatically identifies the time zone of a protected computer during installation of the
protection agent. If a protected computer is moved to a different time zone after protection is configured, ensure
that you change the computer time in Control Panel. Then update the time zone in the DPM database.
Some data types aren't supported
Issue: DPM doesn't support the following data types:
Hard links
Reparse points, including DFS links and junction points
Mount point metadata - A protection group can contain data with mount points. In this case DPM protects
the mounted volume that is the target of the mount point, but it doesn't protect the mount point metadata.
When you recover data containing mount points, you'll need to manually recreate your mount point
hierarchy.
Data in mounted volumes within mounted volumes
Recycle Bin
Paging files
System Volume Information folder. To protect system information for a computer you'll need to select the
computer's system state as the protect group member.
Non-NTFS volumes
Files containing hard links or symbolic links from Windows Vista.
Files with any of the following combinations of attributes:
Encryption and reparse
Encryption and Single Instance Storage (SIS )
Encryption and case-sensitivity
Encryption and sparse
Case-sensitivity and SIS
Compression and SIS
Workaround: None
Limitations on protecting computers in workgroups and untrusted domains
Issue: DPM can protect workloads in the same domain as the DPM server, or in child and trusted domains. You
can also protect the following workloads in workgroups and untrusted domains using NTLM or certificate
authentication:
SQL Server
File Server
Hyper-V
These workloads can be running on a single server or in a cluster configuration.
Workaround: If you want to protect a workload that isn't in a trusted domain, see Prepare computers in
workgroups and untrusted domains for exact details of what's supported and what authentication is required.
Short-term backup to tape isn't supported
Issue: DPM doesn't support short-term backup (incremental backup) to tape for workload data (Exchange, SQL
Server, SharePoint, Hyper-V ). Only file data (volumes, shares, folders) can be backed up incrementally.
Workaround: Use disk or a combination of disk and cloud storage (Azure Backup) for short-term backup of
these workloads.
Multiple long-term tape goals that use dataset-copy jobs fail if you only have a single tape drive
Issue: DPM doesn't support multiple long-term backup goals if you only have a single tape drive.
Workaround: Add a second tape drive to DPM or to the tape library.
Backing up data on UPDs (User Profile Disks) isn't supported
Issue: Data on file shares hosting UPDs (User Profile Disks) can't be protected by DPM.
Workaround: None.

Exchange protection issues


Disk-to -tape backup isn't supported for Exchange DAG
Issue: DPM doesn't support short-term or long-term disk-to-tape (D2T) backup for Exchange DAG workloads.
Workaround: Use disk-to-disk-to-tape (D2D2T) for Exchange DAG workload.

SharePoint protection issues


AlwaysOn not supported
Issue: From DPM 2012 R2 Update 5 onwards, DPM can protect SharePoint farm SQL Server databases that
have AlwaysOn enabled.
Workaround: None.

SQL Server protection issues


SQL Server 2014 support
Issue: You can protect SQL Server 2014 with DPM 2012 R2 Update rollup 4.
Workaround: Run the correct DPM version.
AlwaysOn support
Issue: AlwaysOn was introduced in SQL Server 2012. It's supported from DPM 2012 SP1 onwards in
accordance with the DPM protection support matrix.
Workaround: None.
AlwaysOn recovery to original location isn't supported
Issue: When DPM is protecting SQL Server with AlwaysOn enabled data recovery to the original location isn't
supported.
Workaround: None.
DPM can't protect SQL Server on scale -out file servers (SOFS )
Issue: DPM can't protect SQL Server databases hosted on Windows Server 2012 SOFS.
Workaround: Move the SQL Server databases off the SOFS.

Hyper-V and virtual machine protection issues


Linux virtual machines backed up with file -consistent snapshots only
Issue: You can backup Linux virtual machines using DPM 2012 R2 or later. Only file-consistent snapshots are
supported.
Workaround: None.
Backup of Hyper-V servers and clusters in trusted and untrusted domains
Issue: In order to backup Hyper-V server clusters they must be located in the same domain as the DPM server or
in a trusted or child domain. You can back up servers and clusters in an untrusted domain or workload using
NTLM or certificate authentication for a single server, or certificate authentication only for a cluster.
Workaround: None
Backing up virtual machine data on pass-through disks isn't supported
Issue: DPM doesn't support the backup of virtual machine data on pass-through disks that present volumes to
the virtual machine or that use a remote VHD.
Workaround: We recommend that in this scenario you use host-level backup of the VHD files using DPM, and
install and agent on the virtual machine to back up data that isn't visible on the host.
Secondary DPM protection of a Hyper-V cluster isn't supported for a scaled-out DPM server deployment
Issue: When protecting a Hyper-V cluster using scaled-out DPM protection, you can't add secondary protection
for the protected Hyper-V workloads.
Workaround: None
Backup on Hyper-V Replica servers
Issue: Support for backup up of primary and replica (secondary) virtual machines depends on the DPM version
as summarized in this table.

WINDOWS SERVER WINDOWS SERVER


2012 - HOST 2012 R2 - HOST WINDOWS SERVER WINDOWS SERVER
OPERATING SYSTEM OPERATING SYSTEM 2012 2012 R2
ON REPLICA ON REPLICA HOST OPERATING HOST OPERATING
(SECONDARY/TERTIARY (SECONDARY/TERTIARY SYSTEM ON PRIMARY SYSTEM ON PRIMARY
) SERVER ) SERVER SERVER SERVER

DPM 2012, 2012 Not supported Not supported Supported Not supported
with SP1

DPM 2012 R2 Not supported Supported Supported Supported

Workaround: Run a supported version of DPM for your scenario.

DPM and Azure


DPM as an Azure virtual machine
Issue: DPM can run as an Azure virtual machine, from DPM 2012 R2 Update 3 onwards. Be aware of these
limitations:
On-premise DPM servers can't protect Azure-based workloads.
DPM running as an Iaas virtual machine, in Azure, can protect some workloads running as Azure virtual
machines. For details see the DPM protection support matrix.
DPM running as an Azure virtual machine can't protect on-premise workloads.
Workaround: For more information about this scenario see Install DPM as an Azure virtual machine.
Get ready to deploy DPM servers
5 minutes to read

There are a few planning steps to consider before you begin to deploy your System Center Data Protection
Manager (DPM ) servers:
Plan for DPM server deployment - Figure out how many DPM servers you'll need and where to place them.
Plan firewall settings - Get information about firewall, port and protocol settings on the DPM server,
protected machines, and a remote SQL Server if you're setting one up.
Grant user permissions - Specify who can interact with DPM.

Plan for DPM server deployment


First determine how many servers you'll need:
DPM can protect up to 600 volumes. To protect this maximum size, DPM needs 120 TB per DPM server.
A single DPM server can protect up to 2000 databases (recommended disk size 80 TB ).
A single DPM server can protect up to 3000 client computers and 100 servers.
For DPM server capacity planning you can use the DPM storage calculators. These calculators are Excel
sheets and are workload specific. They provide guidance about the number of DPM servers required,
processor core, RAM, and virtual memory recommendations, and required storage capacity. Because
these calculators are workload-specific you'll need to combine the recommended settings and consider
them together with the system requirements, and your specific business topology and requirements,
including data source and storage locations, compliance and SLA requirements, and disaster recovery
needs. Note that the calculators were released for DPM 2010 but remain relevant for later DPM
versions.
Then figure out how to locate the servers:
DPM must be deployed in an Active Directory domain (Windows Server 2008 onwards).
When deciding where to locate your DPM server, consider the network bandwidth between the DPM server
and the protected computers. If you are protecting data over a wide area network (WAN ), there is a
minimum network bandwidth requirement of 512 kilobits per second (Kbps).
DPM supports teamed network adapters (NICs). Teamed NICs are multiple physical adapters that are
configured to be treated as a single adapter by the operating system. Teamed NICs provide increased
bandwidth by combining the bandwidth available using each adapter and failover to the remaining adapter
when an adapter fails. DPM can use the increased bandwidth achieved by using teamed adapter on the
DPM server.
Another consideration for the location of your DPM servers is the need to manage tapes and tape libraries
manually, such as adding new tapes to the library or removing tapes for offsite archive.
A DPM server can protect resources within a domain, or across domains within a forest that has a two-way
trust relationship with the domain that the DPM server is located in. If there isn't a two-way trust across
domains, you need a separate DPM server for each domain. A DPM server can protect data across forests if
there's a forest-level two-way trust between the forests.
Consider the network bandwidth between the DPM server and the protected computers. If you are
protecting data over a WAN there's a minimum network bandwidth requirement of 512 Kbps. Note that
DPM supports teamed NICs that provide increased bandwidth by combining bandwidth available for each
network adapter, and failover if an adapter fails.

Plan firewall settings and user permissions


Firewall settings
Firewall settings for DPM deployment are required on the DPM server, on machines you want to protect, and on
the SQL Server used for the DPM database if you're running it remotely. If Windows Firewall is enabled when you
install DPM then DPM setup automatically configures the firewall settings on the DPM server. The firewall settings
are summarized in the following table.

LOCATION RULE DETAILS PROTOCOL PORT

DPM server System Center Data Used for DCOM DCOM 135/TCP Dynamic
Protection Manager communication
DCOM Setting between DPM server
and protected
machines

DPM server System Center Data Exception for All protocols All ports
Protection Manager Msdpm.exe (the DPM
service). Runs on the
DPM server

DPM server System Center Data Exception for All protocols All ports
Protection Dpmra.exe (protection
Protected machines Management agent service used to
Replication Agent back up and restore
data). Runs on the
DPM server and on
protected machines.

Protected machines Configure incoming


exception for
sqserv.exe

Protected machines DPM issues DCOM 135/TCP Dynamic


commands to the
protection agent with
DCOM calls to the
agent. You'll need to
open the upper ports
(1024-65535) for
DPM to communicate

Protected machines The DPM data TCP 5718/TCP


channel is TCP. Both
the DPM server and 5719/TCP
the protected
machines initiate
connections. DPM
communicates with
the agent coordinator
on port 5718 and
with the protection
agent on port 5719
LOCATION RULE DETAILS PROTOCOL PORT

Protected machines Used for host name DNS 53/UDP


resolution between
DPM/protected
machine, and the
domain controller

Protected machines Used for Kerberos 88/UDP


authentication of the
connection endpoint, 88/TCP
between
DPM/protected
machine, and the
domain controller

Protected machines Used for queries LDAP 389/TCP


between the DPM
server and the 389/UDP
domain controller

Protected machines Used for NetBIOS 137/UDP


miscellaneous
operations between 138/UDP
1) DPM and
protected machines, 139/TCP
2) DPM and the
domain controller 3) 445/TCP
Protected machines
and the domain
controller. Also used
for SMB directly
hosted on TCP/IP for
DPM functions

Remote SQL Server Enable TCP/IP for the


DPM instance of SQL
Server with the
following: default
failure audit; enable
password policy
checking

Remote SQL Server Enable incoming


exception for
sqservr.exe for DPM
instance of SQL
Server to allow TCP
on port 80. The
report server listens
for HTTP requests on
port 80.
LOCATION RULE DETAILS PROTOCOL PORT

Remote SQL Server Default instance of


database engine
listens on TCP port
1443. Can be
modified

To use the SQL Server


Browser service to
connect on non-
default port set UDP
port 1434

Remote SQL Server Named instance of


SQL Server uses
Dynamic ports by
default. Can be
modified.

Remote SQL Server Enable RPC

Grant user permissions


Before you begin a DPM deployment, verify that appropriate users have been granted required privileges for
performing the various tasks. These are summarized in the following table.

DPM TASK PERMISSIONS NEEDED

Add the DPM server to a domain Domain admin account, or user right to add workstation to
domain

Install DPM Admin account on the DPM server

Install DPM protection agent on machine you want to protect Domain account that's in the local administrators group on
the machine

Extend AD schema to enable end-user recovery Schema admin privileges for the domain

Create AD container to enable end-user recovery Domain admin privileges

Grant DPM server permission to change container contents Domain admin privileges

Enable end-user recovery on DPM server Admin account on the DPM server

Install recovery point client software on protected machine Admin account on machine

Access previous versions of protected data from protected User account with access to protected share
machine

Recover SharePoint data SharePoint farm admin that's also an admin on the front-end
Web server on which the protection agent is installed.
Preparing your environment for System Center Data
Protection Manager
8 minutes to read

When deploying System Center - Data Protection Manager (DPM ) 2016 or later, use the following information to
plan your environment.

DPM deployment considerations


One of your first decisions is how to deploy DPM. You can deploy DPM:
As a physical standalone server—You can deploy DPM as a physical standalone server to back up on-
premises data. Physical DPM servers can’t be deployed in a cluster, but you can manage multiple physical
servers from a single console by installing Central Console on System Center Operations Manager.
As a Hyper-V virtual machine—You can run DPM as a virtual machine (hosted on an on-premises
Hyper-V host server), to back up on-premises data. For a list of considerations in this environment see
Install DPM as a virtual machine on an on-premises Hyper-V server.
As a Windows virtual machine in VMWare—You can deploy DPM to provide protection for Microsoft
workloads running on Windows virtual machines in VMWare. In this scenario DPM can be deployed as a
physical standalone server, as a Hyper-V virtual machine, or as a Windows virtual machine in VMWare.
As an Azure virtual machine—DPM can run as a virtual machine in Azure to back up cloud workloads
running as Azure virtual machines. For information about this deployment see Install DPM as an Azure
virtual machine.
In all deployments you’ll need:
A SQL Server instance, installed and running, to use for the DPM database. The instance can be collocated on
the DPM server or remote.
Disk to be used as dedicated space for DPM data storage.
DPM protection agent installed on computers and servers you want to protect using DPM.

SQL Server database


DPM uses SQL Server as a database to store backup information for workloads, servers, and computers it
protects. All SQL Server versions should be Standard or Enterprise 64-bit.

NOTE
For the supported versions of SQL, use the service packs that are currently in support by Microsoft.
For the below supported SQL versions, Standard, Enterprise and Datacenter (64-bit) editions are supported, based on
the availability.

SQL Server - supported versions

DPM VERSION SQL VERSION

DPM 2016 SQL Server 2014 SP2; SQL Server 2012 SP4.
DPM VERSION SQL VERSION

DPM 2016 UR2 and later SQL Server 2016 and SPs as detailed here

DPM 1801 SQL Server 2016 and SPs as detailed here

DPM 1807 and DPM 2019 - SQL Server 2016 and SPs as detailed here

- SQL Server 2017 as detailed here

SQL Server requirements

REQUIREMENT DETAILS

RAM 4 GB minimum, 8 GB recommended

Disk 1 GB minimum, 3 GB recommended

Required features Database Engine Services, Reporting Services (for DPM 2019,
install SSRS with SQL 2017)

Note

- For Remote SQL, database engine and reporting services


must be on the same computer. .

- For remote clustered SQL instance, Database Engine must


be on the cluster and SSRS must be on a separate computer,
which can be the DPM server or any other computer)

Collations SQL_Latin1_General_CP1_CI_AS

Dynamic ports Supported

AlwaysOn Not supported

Installation Install SQL Server on a remote server, or on the DPM server.


It must be installed and running before you install DPM.

Remote installation Install in the same domain and time zone as the DPM server.
When used to support DPM, a SQL Server can't share a
server with a domain controller.
Read about Setting up a remote SQL Server instance.
If you're deploying DPM as an Azure virtual machine, you can
specify an Azure virtual machine running SQL Server as a
remote SQL Server instance. You can't use an on-premises
SQL Server. Using an Azure SQL Database isn't currently
supported.

Clustered SQL Server Supported

NOTE
If you are upgrading SQL Database to SQL 2017, ensure you install SQL SSRS post SQL upgrade.
DPM server
REQUIREMENT DETAILS

Operating System Windows Server 2019, Datacenter, and Standard editions


Windows Server 2016, Datacenter, and Standard editions
Windows Server 2012 R2, Datacenter, and Standard editions
(Not applicable for DPM 2019)

Installation prerequisites Microsoft .NET Framework 4.5 or later (for 2019)


Microsoft .NET Framework 4.0
Windows Installer 4.5 or later versions
Windows PowerShell 3.0
Windows Single Instance Store (SIS)
Microsoft Application Error Reporting
SQL management tools (for DPM 2019)

Setup automatically installs the prerequisites if they aren't


already installed.

Limitations You can install DPM on the operation system volume or on a


different volume.
DPM is designed to run on a dedicated, single-purpose server.
Don't install DPM on:
- a server running Application Server role
- An Operations Manager Management server
- A server running Exchange
- A server running on a cluster node
DPM isn't supported on the Turkish language version of any
of the supported Windows Server versions.

Disks and storage


REQUIREMENT MINIMUM RECOMMENDED

Disk DPM requires:


- Disk for DPM installation including
system files, installation files,
prerequisite software, and database files
- Disk dedicated to the storages pool

DPM installation DPM installation location: 3 GB Each protected volume requires a


Database files drive: 900 MB minimum of 300 MB of free space for
System drive: 1 GB the change journal. Additionally, you'll
The system drive disk space is required need space for DPM to copy the file
if SQL Server is installed on the DPM catalog to a temporary DPM
server. If SQL Server is remote, you'll installation location, when archiving. 2-
need considerably less disk space for 3 GB of free space is recommended for
the system drive. the DPM installation volume.

Disk for storage pool 1.5 times the size of the protected data 2-3 times the size of the protected data

Logical unit number (LUN) Maximum of 17 TB for GUID partition


table (GPT) dynamic disks
Applies only to DPM 2016/2019 2 TB for master boot record (MBR)
servers upgraded from DPM 2012 R2, disks
that use legacy storage pool. Requirements are based on the
maximum size of the hard disk that
appears in the operating system.
REQUIREMENT MINIMUM RECOMMENDED

Limitations - DPM storage pools must be dynamic.


- You can't install DPM on the disk used
Applies only to DPM 2016/DPM 2019 for the storage pool.
servers upgraded from DPM 2012 R2 - You can attach or associate custom
that used legacy storage pool. volumes with protected data sources.
Custom volumes can be on basic or
dynamic disks but you can't manage
the space on these volumes in the DPM
Administrator console.
- You can back up to tape with iSCSI
attached tape libraries. We recommend
a separate adapter for that connection.
For additional information, see
Compatible tape libraries.

Virtualized DPM - DPM running on a virtual machine


can use the following storage types:
- .VHD disk that meets the
configuration requirements listed in
installing DPM in a virtual environment.
- Passthrough disk with host direct
attached storage (DAS)
- Passthrough iSCSI LUN attached to a
host.
- Passthrough Fibre Channel LUN
attached to a host.
- iSCSI target LUN connected directly to
the DPM virtual machine.
- Fibre Channel LUN connected to the
DPM virtual machine using a Windows
Server 2012 Virtual Fiber Channel (VFC)
controller.

Modern Backup Storage Uses basic volumes, cannot be on a


dynamic disk.
A single DPM server has a soft limit of
120 TB storage.

Storage recommendations for DPM


Sector Size should always be consistent across underlying storage (i.e. WS storage) to DPM native storage.
When storage spaces is used to carve out DPM storage, storage spaces is supported on iSCSI and FC
controllers as long as the virtual disks created on top of them are non-resilient (Simple with any number of
columns)
Write- Back cache should always be se to zero while using Storage Spaces for DPM storage.

Protected workloads
REQUIREMENT DETAILS
REQUIREMENT DETAILS

Protected workload size limits DPM 2016 and later with Modern Backup Storage do not
have LDM limits.

With DPM 2016 and later, you can protect more data per
DPM server. Up to 120 TB of storage limit per DPM server
has been tested. However, 120 TB is only a soft limit.
Validation is underway to test a higher limit. This guidance will
be updated post completion of the validation.

.NET framework All protected computers need at least .NET Framework 4.0
installed before you install the DPM protection agent.

Windows Management Framework (WMF) If you are protecting a server released prior to Windows
Server 2012, you must install the appropriate version of WMF
(Not applicable of DPM 2019) before installing the DPM agent:

- WMF 3.0 for Windows Server 2008 SP 2


- WMF 4.0 for Windows 7, Windows Embedded Standard 7,
Windows Server 2008 R2

Windows Server 2012 and later do not require a separate


installation of WMF.

Protected workloads Review the DPM protection support matrix for an up-to-date
list of protected workloads.

Prerequisites DPM protection agent must be installed on protected


computer. For more information, see Set up the protection
agent.

Protected volumes must be at least 1 GB in size with NTFS


formatting.

Server operating systems protected by DPM must be 64-bit.

Networking
REQUIREMENT DETAILS

Domain The DPM server should be in a Windows Server 2019,


Windows Server 2016, Windows Server 2012 R2, Windows
Server 2012

Domain trust DPM supports data protection across forests as long as you
establish a forest-level, two-way trust between the separate
forests.

DPM can protect servers and workstations across domains


within a forest that has a two-way trust relationship with the
DPM server domain. Without two-way trust, DPM can't
protect computers in workgroups or untrusted domains. For
more information, see Back up and restore workloads in
workgroups and untrusted domains.
REQUIREMENT DETAILS

Network configuration If you're protecting data over a wide area network (WAN),
you'll need a minimum bandwidth of 512 kilobits per second
(Kbps).
DPM doesn't support disjointed namespaces.

Remote management
REQUIREMENT DETAILS

Central Console Use the Central Console to administer multiple DPM servers
from a single location.

Install it on a server running System Center 2016/2019


Operations Manager. You'll also need to install the Operations
Management agent on the DPM server. See Install Central
Console.

DPM Management Shell Install the DPM Management Shell on a client computer to
directly manage one or more DPM servers using Windows
PowerShell. Install it from the DPM Setup.

The DPM Management Shell can be installed on computers


running:

DPM 2019 : Windows Server 2019, Windows Server 2016,


Windows 8.1, and Windows 10

DPM 2016 : Windows Server 2008 R2, Windows Server 2012,


Windows Server 2012 R2, Windows Server 2016, Windows 7,
Windows 8, Windows 8.1

Note: DPM 2019 supports x64 bit computers only.

Remote Administration Console Set up a Remote Administration Console to manage a single


DPM server.

The DPM Management Shell can be installed on computers


running Windows Server 2008 R2, Windows Server 2012,
Windows Server 2012 R2, Windows Server 2016, Windows 7,
Windows 8, Windows 8.1, and Windows 10. The computer
must be running at least .NET Framework 4.0.

Note: DPM 2019 supports X64 bit computers only.


Prepare data storage
15 minutes to read

A major part of your System Center Data Protection Manager (DPM ) deployment will be figuring out how to
store data backed up by DPM. Learn about:
Add Modern Backup Storage
Short and long-term storage
Cloud storage with Azure Backup
Disk storage
Tape storage

Short and long-term storage overview


In DPM, you'll need to select short and long-term storage for backed up data.

STORAGE SHORT-TERM LONG-TERM CHARACTERISTICS

Azure cloud Suitable for short-term Suitable for long-term - Efficient and cost-effective
storage storage offsite storage solution for
short and long-term
storage.
- Azure can be used as
storage for Hyper-V, SQL
Server, and file server data.
Azure can only be used to
back up data from servers
running Windows Server
2016, Windows Server 2012
R2, Windows Server 2012,
or Windows Server 2008 R2
with SP1.
- DPM must be running on
System Center 2012 SP1 or
later to use Azure Backup.
STORAGE SHORT-TERM LONG-TERM CHARACTERISTICS

Tape Some workloads can be All workloads can be backed - Short-term backup to tape
backed up directly to tape up to tape for long-term might be useful for data that
(D2T) for short-term offsite storage (D2D2T) doesn't change often and
storage. thus doesn't require
frequent backup.
These include file data - Long-term offsite tape
(volumes, shares, folders), storage is useful for data,
system state, SQL Server, which must be kept in order
Hyper-V, and Exchange to fulfill statutory
databases not configured on obligations
a DAG. - If you're using tape for
both long-term and short-
term protection, DPM
creates copies of the latest
short-term full backup in
order to generate the long-
term tape backup. We
recommend that you
schedule the short-term
protection backup to run a
day before the long-term
backup. That way you can
be sure you're using the
latest short-term backup in
order to create the long-
term backup.
- If you're using disk for
short-term backup and tape
for long-term, the long-term
backup will be taken from
the disk replica.
- Data recovery from tape
might be slow, and thus
better suited to data with a
high recovery point
objective (RPO) that doesn't
need to accessed and
recovered within a short
critical period after failure.
- You can't free up or erase a
tape that contains valid
recovery points. You'll need
to remove the sources from
a protection group and
expire the recovery points,
or modify the protection
group settings to clear tape
protection. To expiry a tape,
you mark it as free and then
unmark it and recatalog.
- Tape backup and recovery
might require manual
intervention such as tape
rotations.
- Long-term storage
capacity can be increased by
adding more tapes.
- A tape library or
standalone tape drive must
be physically attached to the
DPM server. The tape library
can be direct SCSI attached
or SAN.
or SAN.
STORAGE SHORT-TERM LONG-TERM CHARACTERISTICS
Disk All data backed up to DPM No long term storage to - Disks provide a quick
can be stored on disk for disk. method of data backup and
short-term storage (D2D) recovery. It's useful for data
that has a low RPO and thus
needs to be recovered
quickly after failure.
- Disks can provide
redundancy using disk
technologies such as RAID.
- Maximum disk retention is
448 days.
- Disk backup has no impact
on running workloads.

Prepare cloud storage (Azure Backup)


You can back up protected DPM data to Azure using the Azure Backup service. This is useful in a couple of
scenarios:
DPM is deployed on-premises as a physical server or virtual machine - If you deploy DPM as a
physical server or as an on-premises Hyper-V virtual machine you can back up data with Azure Backup in
addition to backing data up to disk and tape.
DPM is deployed as a virtual machine in Azure - If DPM is deployed as an Azure virtual machine
(possible from System Center 2012 R2 with Update 3) you can back up data to Azure disks attached to the
DPM Azure virtual machine and then offload data storage with backup to Azure Backup.
When you set up a protection group in DPM, you select disk for short-term storage and then you enable online
backup to Azure. Note that:
There are a number of prerequisites and limitations. Read more.
You'll need to set up Azure Backup before you enable backup to the cloud for a protection group in the
DPM console. Learn how to set up Azure Backup with DPM.

Prepare disk storage


DPM backs up data to disk for short-term storage by saving data to the DPM storage pool. The storage pool is
the set of disks and volumes on which the DPM server stores the recovery points for the protected data. Before
you can store data on disk, you'll need at least one disk or volume in a storage pool. You can use any of the
following for the storage pool:

NOTE
We do not recommend NAS as a storage to prepare your DPM disk storage.

Direct attached storage (DAS )


Fiber Channel storage area network (SAN )
iSCSI storage device or SAN

Best practices for the storage pool


BEST PRACTICE DETAILS

Disk limitations - The DPM server needs at least two disks installed. A
dedicated disk for the startup, system, and DPM installation
files; and one dedicated to the storage pool. In DPM, a disk is
defined as any disk device manifested as a disk in the
Windows Disk Management tool. DPM does not add any
disks containing startup files, system files, or any component
of the DPM installation to the storage pool.
- Disks added to the storage pool shouldn't have partitions.
To prepare disks, DPM reformats the disks and erases any
data.
- The storage pool supports most disk types, including IDE,
SATA and SCSI, and the storage pool supports both the
master boot record (MBR), and GUID partition table (GPT)
partition styles. Microsoft strongly recommends you use GPT
disks.
- If you use a SAN for the storage pool, Microsoft
recommends you create a separate zone for the disk and
tape. Don't mix devices in a single zone.
- DPM doesn't support USB/1394 disks in the storage pool.
- You can't use Storage Spaces for the disk storage pool.
- Some original equipment manufacturers (OEMs) include a
diagnostic partition installed from media they provide. The
diagnostic partition can also be named the OEM partition, or
the EISA partition. EISA partitions must be removed from
disks before you can add the disk to the storage pool.
- You can substitute custom volumes that you define in Disk
Management for volumes in the storage pool.
- We recommend you use extensible hardware so you can
add more capacity if you need to.

Dedup support DPM running as a Hyper-V virtual machine can store backup
data to VHDs in shared folders on a Windows File Server with
data deduplication enabled. For more information, see
Deduplicate DPM storage.
BEST PRACTICE DETAILS

Capacity requirements Capacity requirements depend primarily on the size of


protected data, the daily recovery point size, expected volume
data growth rate, and retention range objectives.

Daily recovery point size refers to the total size of changes


made to protected data during a single day. It is roughly
equivalent to the size of an incremental backup. Retention
range refers to the number of days for which you want to
store recovery points of protected data on disk. For files,
DPM can store a maximum of 64 recovery points for each
volume included in a protection group, and it can create a
maximum of 8 scheduled recovery points for each protection
group each day.

Retention range is the number of days you want to store


recovery points of protected data on disk. For files, DPM can
store a maximum of 64 recovery points for each volume
included in a protection group, and it can create a maximum
of 8 scheduled recovery points for each protection group
each day. The limit of 64 recovery points for files is a Volume
Shadow Copy Service (VSS) limitation. The recovery point limit
doesn't apply to application data.

We recommend you make the storage pool twice size of the


protected data. This assumes a daily recovery point size that's
10% of the protected data size and a 10 days retention range.
To get a good estimate of size, review an incremental backup
for an average day. For example, if the incremental backup for
100 GB of data includes 10 GB of data, your daily recovery
point size will probably be around 10 GB. Obviously you'll
need to adjust for the 10% and 10 day estimation doesn't
work for your organization.

Note that the longer your retention range, the fewer recovery
points you can create each day. For example, if your retention
range objective is 64 days, you can create just one recovery
point each day. If it's 8 days, you can create 8 recovery points
each day. With a retention range objective of 10 days, you
can create approximately 6 recovery points a day.
BEST PRACTICE DETAILS

Disk configuration If you're using direct-attached storage for the storage pool,
you can use any hardware-based configuration of redundant
array of independent disks (RAID), or you can use a "just a
bunch of disks" (JBOD) configuration. Don't create a software-
based RAID configuration on disks that you will add to the
storage pool.

To decide on disk configuration, consider the relative


importance of capacity, cost, reliability, and performance in
your environment. For example, because JBOD doesn't
consume disk space for storing parity data, it'll make
maximum use of storage capacity. For the same reason, the
reliability of JBOD configurations is poor; a single disk failure
inevitably results in data loss.

For a typical deployment, DPM recommends a RAID 5


configuration, which offers an effective compromise between
capacity, cost, reliability, and performance.

To help you evaluate options for configuring the disks in your


storage pool, the table below compares the trade-offs
between JBOD and the various levels of RAID, on a scale from
4 (very good) to 1 (acceptable).

Custom values In some cases you might want to use a custom volume,
where a custom volume isn't in the storage pool and is used
to store the replica and recovery points for a protection
group member. For example, you might want a greater
amount of control over storage for specific data sources or
critical data needs to be stored using a high-performance
LUN on a SAN.

Any volume that's attached to the DPM server can be


selected as a custom volume, except the volume that contains
the system and program files. To use custom volumes for a
protection group member, two custom volumes must be
available: one volume to store the replica and one volume to
store the recovery points.

DPM can't manage the space in custom volumes. If DPM


alerts you that a custom replica volume or recovery point
volume is running out of space, you'll need to manually
change the size of the custom volume by using Disk
Management.

You can't change the selection of storage pool or custom


volume for a protection group member after the group is
created. To do this you'll need to stop protecting the data
source and then add it again to a protection group.

Compare disk options


Disk

PERFORMANCE/SCALAB
DISK CONFIGURATION CAPACITY COST RELIABILITY ILITY

JBOD 4 4 1 4

RAID 0 4 4 1 4
PERFORMANCE/SCALAB
DISK CONFIGURATION CAPACITY COST RELIABILITY ILITY

RAID 1 1 1 4 3

RAID 5 3 3 3 3

RAID 10 1 1 4 4

Configure the storage pool


After you have at least one disk set up in accordance with the prerequisites, you can add it to the storage pool.
In DPM Administrator Console, click Management > Disks.
Click Add on the tool ribbon, and in Add Disks to Storage Pool select the disk you want to add from the
Available disks list.
After the storage pool is set up, when you create protection groups that include data sources you want to back up,
you'll be able to configure disk as short-term storage for that backed up data.

Prepare tape backup


DPM can back up to tape libraries or standalone tape drives.
You'll need to attach your tape libraries or standalone tape drives to the DPM server with SAN or SCSI.
Tape devices must be compatible with DPM. Read about Identify compatible tape libraries .
Get a list of Compatible Tape Libraries.
The tape capacity you need depends on the size of the protected data and the number of tape backup jobs
you'll run. To plan for the number of tapes required for a protection group, multiply the required backup
frequency by the retention range.
For standalone tape drives, DPM does the following for each protection group:
Appends all short-term backups to a single tape.
Appends all long-term backups to a single tape that is different from the short-term backup tape.
When a tape fills up, DPM raises an alert to add a new free tape.
For tape libraries:
DPM can allocate two or more tapes for each protection group. All the data sources in a protection
group will always append to the same tape for both short-term and long-term protection.
If the protection group settings specify the allocation of more than one drive the data sources will be
split across tape. For example, if there are five data sources and a drive with a maximum limit of two
sources, DPM might write three data sources on one tape and two on another. This might cause an
uneven distribution of data among tapes, depending on the data size, any other scheduled backup
tape jobs, and the number of tape drives available at the time.
Long-term backups to tape allocate a tape for each full backup job, so that each long-term backup recovery
point is always on a new tape.
Available free tapes are decremented as tapes are allocated to long-term or short-term backup. If no new
tape is available for a long-term backup an alert is issued.
If short-term backups are configured to use tape and the full backup option is used, each full backup job
will require a new free tape.
If you trigger two different "create recovery point (tape)" actions for two protection group members, DPM
create two tape backup jobs, and two tapes will be required. If you trigger a single "create recovery point
(tape)" action for two protection group members, a single tape it used. This ensures that data for selected
protection group members is collocated for ad-hoc backups to the same tape.
Install and configure tape devices
1. Attach tape drive - Follow the instructions provided with the tape device to attach and install it on the DPM
server.
2. Verify serial numbers - Check that the medium changer and tape drives have serial numbers. DPM uses
these for identification. Installed tape devices are listed in Device Manager.
3. Add firewall exceptions - Add firewall exceptions so that DPM can detect the tape:
C:\Program Files\Microsoft System Center
2012\DPM\SQL\SSQL10_50.MSDPMV4RC\MSSQL\Binn\sqlservr.exe C:\Program Files (x86)\Microsoft
SQL Server\90\Shared\sqlbrowser.exe C:\Program Files\Microsoft System Center
2012\DPM\DPM\bin\DPMLA.exe
4. Add firewall exceptions - Add firewall exceptions so that DPM can detect the tape:
C:\Program Files\Microsoft System Center
2012\DPM\SQL\SSQL10_50.MSDPMV4RC\MSSQL\Binn\sqlservr.exe C:\Program Files (x86)\Microsoft
SQL Server\90\Shared\sqlbrowser.exe C:\Program Files\Microsoft System Center
2012\DPM\DPM\bin\DPMLA.exe
5. Detect manually - DPM automatically detects tape devices that are physically attached to it and they're
displayed in the Libraries workspace of the Management view. If a device isn't displayed, you can detect it
manually with the Rescan button. This might take a few minutes. After you rescan, check that the details
displayed in Device Manager and in the tape library are the same
6. Set up tape sharing - Set up tape sharing if you want to share a single tape library across multiple DPM
servers. Note that:
The tape library is typically a collection of tape drives that automatically mount and dismount tape
media.
The tape library must be in a storage area network (SAN ) environment.
7. The library server is a computer on which DPM is installed, the library-sharing command has been run,
and the medium changer is enabled. A library client is a computer on which DPM is installed, the library-
sharing command has been run, and the medium changer is not enabled. We recommend that the system
configuration of the library server computer and all library client computers be as similar as possible, and
that you do not configure any protection groups on the library server.
8. All DPM servers using a shared library must use a similar SQL Server setup for hosting DPM databases.
For example, they should all use a local instance of the DPM database or all of them should use a remote
instance. You cannot have some DPM servers using local instance and others using a remote instance.
After you've set up tapes, when you create a protection group including data sources you want to protect, you'll be
able to select tape for long-term and short-term data storage.
If you want to use a shared library for multiple DPM servers continue to the next procedure.
Set up tape sharing
1. On the computer that will be the library server for the shared library, use Device Manager to enable the
medium changer.
On each library client computer, ensure that the medium changer is not enabled.
2. Enable the Named Pipes protocol for the SQL Server instances of the library server and library client
computers. Then restart the SQL service.
3. To configure the DPM servers to use a shared library, on each library client computer, open an elevated
Command Prompt window, and then run the following commands:
cd <system drive>:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\Setup

AddLibraryServerForDpm.exe -DpmServerWithLibrary <FQDN of library server> where '<FQDN of


library server>' is the fully qualified domain name of the library server.
4. On the library server computer, open an elevated Command Prompt window, and then run the following
commands one time for each library client. For example, if your library server supports three library
clients, you must run this command three times on the library server.
cd <system drive>:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\Setup

AddLibraryServerForDpm.exe - ShareLibraryWithDpm <FQDN of library client> where


<FQDN of library client> is the fully qualified domain name of the library client.
5. Before you run the following commands on all library client computers, ensure the SQL Server
(MSDPM2012) and SQL Server Agent (MSDPM2012) services use a domain user account as the logon
account. Also, ensure the domain account is a member of the local Administrator group on all computers
that share the library. Then, on each library client computer, open an elevated Command Prompt window
and run the following commands.
cd <system drive>:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\Setup

SetSharedDpmDatabase -DatabaseName <SqlServer\Instance\DatabaseName> [-DoNotMoveData] where


<SQLServer\Instance\Databasename> is the database name of the library server. You can find the name
in the About DPM window in the DPM Administrator console.
6. In DPM Administrator Console on the library server, perform a rescan. Then perform a rescan or refresh
on each of the library client computers.
The quickest way to see all media on all of the DPM servers is to perform a rescan on each, followed by a
detailed inventory. Next, on any one of the servers, mark a number of media as free, and then perform a
refresh on the other servers. After you've configured library sharing, you can use the shared tape library as
if it were attached to each DPM server.

Next steps
After planning your storage, if you are considering tape storage, see the article, Identify compatible tape libraries.
If you are ready to install DPM, see the article, Install DPM.
Identify compatible tape libraries
4 minutes to read

Use the TechNet wiki to find the latest list of compatible tape libraries for System Center Data Protection Manager
(DPM ).

Virtual tape library support


Virtual tape libraries configured with a virtual fibre channel adapter are supported with certified hardware listed
in the wiki. To check if your tape library is supported by the virtual fibre channel adapter, ask your tape hardware
vendor to verify tape library compatibility.

Verify tape library compatibility


If the tape is listed in the Windows Server Catalog in the Hardware, Storage section, and is shown as compatible
with Windows 2008 64-bit, or Windows 2008 R2 64-bit - it will probably work with DPM. Note that any driver
incompatibilities with Windows 2012 would need to be addressed by the vendor. If you already have a tape you
can run the DPM Tape Library Compatibility Test tool as described below.

Run the compatibility tool


Before you run the tool, do the following:
Check your target tape library and tape drives are visible in Device Manager.
Insert a read/write data tape in slot 0. The contents of this tape will be overwritten.
Insert a cleaning tape in slot 1. The tapes must be in consecutive slots, and there should be no tapes in the
slots between the tapes. The data tape's slot must precede the cleaning tape slot.
To acquire and run the compatibility tool:
1. Download the DPM Tape Library Compatibility Test Tool.
2. Extract the files. Open an elevated command prompt, and navigate to the folder to which you extracted the
tool.
3. To check that the tape is visible to the tool, type DPMLibraryTest.exe /CERTIFY /LL. Then certify as
follows:
To certify a tape library, type DPMLibraryTest.exe /CERTIFY /TL <tape library name> /AT

To certify a standalone tape drive, type DPMLibraryTest.exe /CERTIFY /TL <device name> /SA

4. The tool runs the following tests:


Test 1: Basic configuration - Scans the system for attached devices, and identifies standalone tape
drives and tape libraries. The tool provides a summary at the end of the test. For each device you'll
see a Device Name, Serial Number, Vendor Name, Product Name, Firmware Revision, and SCSI
properties. You should verify that the summary information is correct. If it isn't:
Check all devices are listed in Device Manager.
Ensure that device drivers are up-to-date.
If the drive mappings are incorrect, use the DPMDriveMapping.exe tool in the <DPM
installation folder>/bin folder to correct the mappings. If you don't have DPM installed on the
computer, copy the DPMLA.xml that DPMDriveMapping.exe creates to the folder to which
you extracted the Tape Library Certification tool.
Test 2: Mount/dismount - This test selects a tape from the first available slot and performs a
mount///dismount of the tape to and from a drive.
Test 3: Drive cleaning - This test performs a cleaning test using the cleaning tape. If you are using
Firestreamer to a VTL where you can't remove or change tapes, use the /ST flag syntax to skip this
test.
Test 4: I/E media - This test selects the first available tape and moves it to the I/E port and back. If
your library/VTL doesn't have I/E ports, the tool will automatically skip the test.
Test 5: I/O - This test selects the first writable tape, writes a few buffers to it, and then attempts to
read what's been written. This test only checks read/write capabilities. Any specific errors in the drive
should be inspected using the advanced mode.
5. After the tool completes the test, log information will be provided in the LibraryTestTool-*Curr.errlog files
which are located in the folder from which you ran the tool. If the tests successfully complete, then you can
assume your tape library should work with DPM.

Run the compatibility tool for Hyper-V fiber channel


Prepare two Hyper-V hosts running DPM.
Enable live migration on both the servers. A clustered deployment isn't required.
Run the compatibility tool on the first host server, as described in the section above, and verify that tests
complete successfully.
Initiate live migration to the second host server and wait for it to complete.
After DPM is running virtually on the second host server, run the compatibility tool on that host server, as
described above, and verify that tests complete successfully. If the tests pass you can assume that the tape
library will work with DPM.

Examples
The tool syntax is:

DPMLibraryTest.exe /CERTIFY /<switch_1> [/switch_2]

SWITCH DETAILS EXAMPLE

/LL List available tape libraries and drives DPMLibraryTest.exe /CERTIFY /LL

/LT List all test cases

/TL Test a library

/AT Run all test cases Run test on the physical library:
DPMLibraryTest.exe /CERTIFY /TL
\\\\.\Changer0 /AT
SWITCH DETAILS EXAMPLE

/ST Run specific tests Run tests 3 and 4 on a physical library:


DPMLibraryTest.exe /CERTIFY /TL
\\\\.\Changer0 /ST 3 4

Run all tests except cleaner:


DPMLibraryTest.exe /CERTIFY /TL
\\\\.\Changer0 /ST 1 2 4 5

/SA Run standalone drive test cases DPMLibraryTest.exe /CERTIFY /TL


\\\\.\Tape21745678 /SA

/EX Show examples

/Help or /? Show help


Identify data sources you want to protect
2 minutes to read

To protect data sources with System Center Data Protection Manager (DPM ) you'll need to do the following:
Read What can DPM back up? to understand what's supported for DPM backup.
DPM applies backup settings to all data sources in a particular protection group. You'll need to figure out
how you want to gather data you want to protect into those groups. Examples include:
By computer - So that all data sources for a computer belonging to the same protection group. This
provides a single point of adjustment for the computer's performance loads. However, all data
sources will then have the same backup and recovery settings.
By workload - So that you separate files and each application data type into different protection
groups. This allows you to manage workloads as a group. However recovering a multi-application
server might require multiple tapes from different protection groups.
By RPO/RTO - Gather data sources with similar Recovery Point Objectives (RPOs) and Recovery
Time Objectives (RTOs). You control the RPO by setting the synchronization frequency for the
protection group which determines the amount of potential data loss (in time) in the case of
unexpected outages. The RTO measures the acceptable amount of time that data is unavailable and is
affected by the storage methods your select for the protection group.
By data characteristics - For example how often data changes, how rapidly it grows, or its storage
requirements.

Next steps
Deploy the DPM protection agent
Get DPM installed
17 minutes to read

Here's what you need to do to set up System Center Data Protection Manager (DPM ):
1. Read the Setup prerequisites
2. Verify the DPM operating system is compatible.
3. Set up a SQL Server database to store DPM settings and configuration information.
4. Set up DPM. You can Install DPM from the user interface, or Run an unattended install. Follow these
instructions if you want to Install DPM on a domain controller

Setup prerequisites
ENVIRONMENT DETAILS OR SPECIFICS FOR THE INSTALLATION

Basic DPM installation prerequisites A number of components are needed on the DPM server.
These are installed automatically during setup:

- .NET Framework 4.0 or 4.5 (DPM 2016/2019); .NET


Framework 3.5 required for SQL installation (Before SQL
2016); .NET Framework 4.6 required for SQL installation (SQL
2016 onwards) . Install with Add Features in Server Manager
if it doesn't install automatically.
- Windows Installer 4.5 (or later). Installed as part of the
operating system but can also be installed as an
administrator from
DPM\setup\redist\WindowsInstaller\INSTMSI45.EXE.
- Microsoft Visual C++ 2012 Redistributable; Microsoft
Visual C++ 2010 Redistributable; Microsoft Visual C++ 2008
Redistributable.
- PowerShell 3.0 (included with Windows Server 2012 R2 or
2012)

DPM database - Verify supported SQL Server versions for the DPM
database. - You can install SQL Server on the DPM server or
on a remote server.
- If you install the database remotely the machine running
the remote instance must be in the same domain and time
zone as the DPM server.
- If you're running a remote database, have it ready before
you install DPM
- You can't run SQL Server on a domain controller.
- If you're running a remote database, have it ready before
you install DPM. Make sure to run SQL Prep tool on remote
SQL computer.
- SQL Server can be standalone or running in a cluster.
- You can't use a SQL Server Always-On deployment.
- If you deploy DPM as an Azure virtual machine (VM) use an
Azure VM running SQL Server as a remote SQL Server
instance. You can't use an on-premises SQL Server in this
deployment, and using an Azure SQL Database isn't currently
supported.
- If SQL Server is clustered, Reporting Server and SQL Server
should be on different machines.
ENVIRONMENT DETAILS OR SPECIFICS FOR THE INSTALLATION

DPM installed as Hyper-V VM If you're installing DPM as a Hyper-V virtual machine note
that:

Virtual DPM installation isn't for scaled up


environments. Instead, use direct attach/SAN-based
storage. Performance can suffer in scaled up (Hyper-V
on CSV) environments using VHDX files compared to
SAN. Therefore, for scaled up environments we don't
recommend using VHDX.
There's no size limit for VHDX.
Both fixed and dynamically expanding VHDX files are
supported.
Both VHD and VHDX files are supported in the DPM
storage pool.
A virtual DPM installation is required to support
adding virtual hard drives to the storage pool.
For dynamic and fixed virtual hard drives, VHD and
VHDX files are supported on remote SMB shares.
From DPM 2012 R2 with Update 3 onwards you can
run DPM as a Hyper-V virtual machine with support
for tape drives using synthetic FC.
For high availability DPM storage, virtual hard drives
should be placed on scaled-out file servers (SOFS).
SMB 3.0 is required for scaled-out file servers.
Virtual DPM installations don't support:

Windows 2012 Storage Spaces or virtual hard


drives built on top of storage spaces.
Local or remote hosting of VHDX files on
Windows 2012 storage space also isn't
supported.
Enabling Disk Dedupe on volumes hosting
virtual hard drives.
Windows 2012 iSCSI targets (which use virtual
hard drives) as a DPM storage pool.
NTFS compression for volumes hosting VHD
files used in the DPM storage pool.
BitLocker on volumes hosting VHD files used
for the storage pool.
A native 4K sector size of physical disks for
VHDX files in the DPM storage pool.
Virtual hard drives hosted on Windows 2008
servers.

DPM as an Azure virtual machine DPM is supported on any Azure IaaS virtual machine
of size A2 or higher.
You can select a size for the DPM virtual machine
using the DPM Azure virtual machine size calculator.
When you set up the virtual machine create an
instance in the Standard compute tier because the
maximum IOPS per attached disk is higher in the
Standard tier than in the Basic tier.
DPM can protect the workloads as detailed here in
protection matrix.
DPM can protect workloads that run across multiple
Azure cloud services that have the same Azure virtual
network and Azure subscription.
DPM running as an Azure virtual machine can't
protect on-premises data.
Use a separate storage account for the DPM virtual
ENVIRONMENT DETAILS OR SPECIFICS FOR THE INSTALLATION
machine, because there are size and IOPS limits on a
storage account that might impact the performance
of the DPM virtual machine if shared with other
running virtual machines. The DPM virtual machine
and the protected workloads should be part of the
same Azure virtual network.
The number of disks that can be used for the target
storage (DPM storage pool) is limited by the size of
the virtual machine (maximum of 16). The Azure
Backup agent running on the DPM server needs
temporary storage for its own use (a cache location),
and for data restored from the cloud (local staging
area). Note that each Azure virtual machine comes
with some temporary disk storage. This is available to
the user as the volume D:\. The local staging area
needed by Azure Backup can be configured to reside
in D:\, and the cache location can be placed on C:\. In
this way, no space needs to be carved out from the
data disks attached to the DPM virtual machine.
You store data on Azure disks attached to the DPM
virtual machine. Once attached to the virtual
machine, the disks and the storage space are
managed from within DPM. The amount of data you
can back up depends on the number and size of disks
attached to the DPM virtual machine. There is a
maximum number of disks that can be attached to
each Azure virtual machine (4 disks for A2V2, A4V2,
A8V2), and maximum size of each disk (1 TB). This
determines the total backup storage pool available.
We recommend you retain data for one day on DPM-
attached Azure disk, and store data older than one
day in the Azure Backup service. This provides data
store for a longer retention range, and allows you to
protect a larger amount of data by offloading it to
Azure Backup.
If you want to scale your deployment you have the
following options:

Option 1, Scale up: Increase the size of the


DPM virtual machine from A2V2, A4V2, A8V2,
and add more local storage.
Option 2, Offload data: Send older data to
Azure Backup, and retain only the newest data
on the storage attached to the DPM server.
Option 3, Scale out: Add more DPM servers to
protect the workloads.
The maximum number of protected workloads for
each DPM virtual machine size is summarized in Table
A below.

Table A

MAX PROTECTED AVG WORKLOAD CHURN


VM SIZE WORKLOADS AVG WORKLOAD SIZE (DAILY)

A2V2 20 100 GB Net 5% churn

A4V2 40 150 GB Net 10% churn

A8V2 60 200 GB Net 15% churn


Set up a SQL Server database
You'll need to set up a SQL Server database if:
You're running DPM 2019, 2016
To set up a SQL Server database:
1. Run SQL Server setup on the local server on which you'll install DPM, or on a remote server.
2. On the Installation tab, click New SQL Server stand-alone installation or add features to an
existing installation.
3. On the Product Key tab enter a valid license key. On the Setup Support Rules tab, correct any failures
before proceeding. On the Setup Role tab select SQL Server Feature Installation
4. On the Feature Selection tab select Database Engine Services. In Instance Features, select
Reporting Service - Native. On the Installation Rules tab review the rules.
5. On the Instance Configuration tab specify the name of SQL Server instance you'll use for DPM. Don't
use an underscore or localized characters in the name. In Disk Space Requirements review the
information.
6. In Server Configuration -> Service Accounts specify the domain accounts under which the SQL
Server services should run:
We recommend you use a single, dedicated domain user account to run SQL Server services, SQL
Server agent, SQL Server Database Engine, and SQL Server Reporting services.
If you're installing DPM on an RODC then use the DPMSQLSvcsAcctaccount you created there.
Note that the user account must be a member of the local Administrators group on the domain
controller where the remote instance is installed. After setup is complete, you can remove the user
account from the local Administrators group. In addition for installation on an RODC you'll need to
enter the password you selected when you set up RODC for DPM and crated the
DPMR$MACHINENAME account.
When you create a domain user account give it the lowest possible privileges, assign it a strong
password that does not expire, and give it a name that's easily identifiable. You'll add this account to
the local Administrators group and to the SQL Server Sysadmin fixed server role later in the
wizard.
All services except the SQL Full-text Filter Daemon Launcher should be set to Automatic.
7. On the Database Engine Configuration tab, accept the Windows authentication mode setting. DPM
admins need SQL Server administrator permissions. In Specify SQL Server administrators, add DPM
Admins. You can add additional accounts if you need to. Complete the rest of the wizard with the default
settings and click Ready to Install -> Install.
8. If you're installing SQL Server on a remote computer do the following:
Install the DPM support files (SQLPrep). To do this, on the SQL Server computer insert the DPM
DVD and start setup.exe. Follow the wizard to install the Microsoft Visual C++ 2012
redistributable. The DPM support files will be installed automatically.
Set up firewall rules so that the DPM server can communicate with the SQL Server computer:
Make sure TCP/IP is enabled with default failure audit and enable password policy
checking.
To allow TCP on port 80, configure an incoming exception for sqlservr.exe for the DPM
instance of SQL Server. The report server listens for HTTP requests on port 80.
Enable RPC on the remote SQL Server.
The default instance of the database engine listens on TCP port 1443. This setting can be
modified. To use the SQL Server Browser service to connect to instances that don't listen on
the default 1433 port, you'll need UDP port 1434.
Named instance of SQL Server uses Dynamic ports by default. This setting can be modified.
You can see the current port number used by the database engine in the SQL Server error
log. You can view the error logs by using SQL Server Management Studio and connecting to
the named instance. You can view the current log under the Management - SQL Server Logs
in the entry Server is listening on ['any' port_number].

NOTE
DPM 2016 requires SQL Server Management Studio (SSMS) version 16.5 or earlier. SSMS is no longer installed with SQL
Server; you must Download and install SQL Server Management Studio (SSMS) version 16.5.
SSMS version 17.0 or later is not supported with DPM 2016. For more information, see SQL Server Management
Studio 16.5 release.
With DPM 2019, you need to install SQL SSRS separately for SQL 2017. With SQL 2017 and later, SSRS does not get
installed as a part of SQL install. For more information, see Install SQL Server Reporting Services (2017 and later).

Install DPM
IMPORTANT
When installing DPM, use NetBIOS names for the domain name and SQL machine name. Do not use fully qualified domain
names (FQDN).

1. If required, extract the DPM 2016.exe (for DPM 2016)/DPM 2019.exe (for DPM 2019) file onto the
machine on which you want to run DPM. To do this, run the exe file and on the Welcome screen, click
Next. In Select Destination Location specify where you want to extract the installation files to. In
Ready to Extract click Extract.. After the extraction finishes go to the specified location and run
Setup.exe.
2. On the Welcome page of DPM Setup click Next. On the License Terms page accept the agreement >
OK.
3. On the Prerequisites Check page, wait for the check and resolve any issues before proceeding.
4. On the Product Registration page click Next. On the Microsoft Update Opt-In page, choose whether
you want to include DPM in your Microsoft Updates.
5. On Summary of Settings page check the settings and click Install. After install is complete click Close.
It will automatically launch Windows update to check for changes.

Run an unattended install


Run an unattended install as follows:
1. Make sure you have the prerequisites installed before you start.
2. On the remote SQL Server, make sure .NET Framework 3.5 (for SQL 2016) 4.0 or 4.5 (SQL 2017) is
installed on Windows server before installing SQL.
3. Use the following code to make sure the firewall is opened:

netsh advfirewall firewall add rule name=DPM_SqlServr.exe dir=in action=allow


program=\"%PROGRAMFILES%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqlservr.exe\"
profile=Domain
netsh advfirewall firewall add rule name=DPM_UDP_Port_1434 dir=in action=allow protocol=UDP
localport=1434 profile=Domain

4. Install SQL Server on the local or remote server.


5. Copy the following text into Notepad (or another text editor) and save the script on the DPM server as
DPMSetup.ini. You use the same script whether the SQL Server instance is installed on the DPM server or
on a remote server.

IMPORTANT
When installing DPM, use NetBIOS names for the domain name and SQL machine name. Do not use fully qualified
domain names (FQDN).

When creating DPMSetup.ini, replace the text inside <> with values from your own environment. Lines
beginning with the hash (#) are commented out, and DPM setup uses the default values. To specify your
own values, type the values within the <> and delete the hash (#).

[OPTIONS]
UserName = <A user with credentials to install DPM>
CompanyName = <Name of your company>
ProductKey = <The 25-character DPM product key in the format xxxxx-xxxxx-xxxxx-xxxxx-xxxxx>
# SqlAccountPassword = <The password to the DPM$ account>
# StandardAgentLicenses = <No. of standard agent licenses you have purchased>
# EnterpriseAgentLicenses = <No. of enterprise agent licenses you have purchased>
# ProgramFiles = C:\Program Files\Microsoft Data Protection Manager
# DatabaseFiles = C:\Program Files\Microsoft Data Protection Manager\DPM\DPMDB
# IntegratedInstallSource = <Location of the DPM setup files>
# ---For using a remote SQL Server instance ---
# SQLMachineName = <Name of the SQL Server computer> OR <SQL Cluster Name>
# SQLInstanceName = <Name of the instance of SQL Server that Setup must use>
# SQLMachineUserName = <User name that Setup must user>
# SQLMachinePassword = <Password for the user name Setup must use>
# SQLMachineDomainName = <Domain to which the SQL Server computer is attached>
# ---For using a reporting SQL Server instance in case of DPMDB in SQL Cluster ---
# ReportingMachineName = <Name of the SQL Server computer>
# ReportingInstanceName = <Name of the instance of SQL Server that Setup must use, SSRS in case of SQL
2017>
# ReportingMachineUserName = <User name that Setup must user>
# ReportingMachinePassword = <Password for the user name Setup must use>
# ReportingMachineDomainName = <Domain to which the SQL Server computer is attached>

6. After saving the file, at an elevated command prompt on the installation server, type:
start /wait [media location]\setup.exe /i /f <path>\DPMSetup.ini /l <path>\dpmlog.txt .
[media location] indicates where you'll run setup.exe from.
<path> is the location of the .ini file.

Install DPM on a domain controller


If you want to set up DPM on an RODC you'll need to do a couple of steps before you set up SQL Server and
install DPM.
1. Create the security groups and accounts needed for DPM. To do this click Start > Administrative Tools
> Active Directory Users and Computers > Domain/Builtin and create these security groups. For
each group use the default setting for Scope (Global) and Group type (Security):
DPMDBReaders$<Computer Name>;
MSDPMTrustedMachines$<Computer Name>;
DPMRADCOMTrustedMachines$<Computer Name>;
DPMRADmTrustedMachines$<Computer Name>;
DPMDBAdministrators$<Computer Name>;
MSDPMTrustedUsers$<Computer Name>;
DPMSCOM$<Computer Name>;
DPMRATrustedDPMRAs$<Computer Name>, where <Computer Name> is the name of the domain
controller.
2. Add the local machine account for the domain controller (<Computer Name>) to the
MSDPMTrustedMachines$<Computer Name> group. Then on the primary domain controller create a
domain user account with the lowest possible credentials. Assign it a strong password that doesn't expire
and add it to the local administrators group.

NOTE
Make a note of this account because you need to configure the SQL Server services during the installation of SQL
Server. You can name this user account anything that you want; however, for the purposes of easily identifying the
account's purpose, you might want to give it a significant name, such as DPMSQLSvcsAcct. For the purposes of
these procedures, this account is referred as the DPMSQLSvcsAcct account.

3. On the primary domain controller, create another domain user account with the lowest possible
credentials and name the account DPMR$MACHINENAME, assign it a strong password that does not
expire, and then add this account to the DPMDBReaders$<Computer Name> group.
4. Then create the security groups and user accounts needed for the SQL Server database with scope: global
and Group type: security. The group or account should be in this format
<grouporaccountnameComputerName>.
SQLServerSQL2005BrowserUser$<Computer Name>
SQLServerMSSQLServerADHelperUser$<Computer Name>
SQLServerReportServerUser$<Instance ID><Instance Name>
SQLServerMSASUser$<Computer Name><Instance Name>
SQLServerDTSUser$<Computer Name>
SQLServerFDHostUser<Computer Name><Instance Name>
where <Computer Name> is the computer name of the domain controller on which SQL Server
2008 will be installed.
<Instance Name> is the name of the instance of SQL Server that you plan to create on the
domain controller. The instance name can be any name other than the default DPM instance
name (MSDPM2010).
<Instance ID> by default is assigned by SQL Server Setup and indicates that the group applies
to Reporting Services (MSRS ) for the major version of the instance (10) of SQL Server. For this
release, this value is MSRS1A0_50.
5. On the primary domain controller, add the domain user account that you created earlier (the
DPMSQLSvcsAcct account) to the following groups:
SQLServerReportServerUser$<ComputerName>$MSRS10.<InstanceID>
SQLServerMSASUser$<ComputerName>$<InstanceID>
6. After you've complete these steps you can install SQL Server:
Log onto the domain controller on which you want to install DPM using the domain user account
that you created earlier. Let's refer to this account as DPMSQLSvcsAcct.
Start to install SQL Server. On the Server Configuration - Service Accounts page of Setup you
specify the login account for the SQL Server services (SQL Server Agent, SQL Server Database
Engine, SQL Server Reporting services) to run under the user account DPMSQLSvcsAcct.
After SQL Server is installed, open SQL Server Configuration Manager > SQL Server
Network Configuration > Protocols, right-click Named Pipes > Enable. You'll need to stop
and restart the SQL Server service.
7. Then you can install DPM:
On the SQL Server Settings page type the name of the instance of SQL Server that you installed
in procedure as localhost\<Instance Name>, and then type the credentials for the first domain user
account you created (the DPMSQLSvcsAcct account). This account must be a member of the local
Administrators group on the domain controller where the remote instance is installed. After setup
is complete, you can remove the user account from the local Administrators group.
On the Security Settings page you'll need to enter the same password that you used when you
created the DPMR$MACHINENAME user account earlier.
Open SQL Server Management Studio and connect to the instance of SQL Server that DPM is
configured to use. Click New Query, copy the text below to the right pane, and then press F5 to
run the query.

use DPMDB
declare @refresh_jobid uniqueidentifier
select @refresh_jobid = ScheduleId from tbl_SCH_ScheduleDefinition where JobDefinitionId in
(select JobDefinitionId from tbl_JM_TaskDefinition where TaskDefinitionId in (select distinct
TaskDefinitionID from tbl_TE_TaskTrail
where VerbID = '53603503-C4C8-4D0E-8F1E-D2F3868E51E3')) and IsDeleted=0
exec msdb.dbo.sp_update_job @job_name =@refresh_jobid, @enabled=0
update tbl_SCH_ScheduleDefinition
set IsDeleted=1
where ScheduleId = @refresh_jobid

Upgrade SQL 2016 to SQL 2017


If you want to use SQL 2017 with DPM Semi Annual Channel 1801 or later, you must upgrade SQL 2016 to
SQL 2017. You can upgrade SQL Server 2016, or SQL Server 2016 SP1 Enterprise or Standard, to SQL 2017.
The following procedure lists the steps to upgrade SQL 2016 to SQL 2017.

NOTE
SQL 2017 is supported as a database with DPM 1801 in upgrade scenarios. With DPM 2019, SQL 2017 is supported as a
DPM database, in both new installation and upgrade scenarios of DPM.

1. On the SQL Server, back up the Reporting database.


2. Back up the Encryption Keys.
3. Clean up the reporting folders on the local machine.
4. Install the Reporting service.
5. On the DPM server, change the following DPM registry key to the new reporting instance name.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection
Manager\DB<ReportingInstanceName>
6. Change the Reporting Service virtual directory name to ReportServer_SSRS.
7. Configure the Reporting Service, and restore the database and encryption keys.
Upgrade your DPM installation
30 minutes to read

This article provides the upgrade information for System Center 2019 - Data Protection Manager (DPM ).

Upgrade to DPM 2019


You can install System Center - 2019 Data Protection Manager (DPM ) on Windows Server 2016 or 2019. You can
upgrade to DPM 2019 from the following versions:
DPM 2016
DPM 1801
DPM 1807
Before you upgrade to or install DPM 2019, read the Installation prerequisites.

Upgrade path for DPM 2019


If you upgrade from DPM 2016 to DPM 2019, make sure your installation has the following necessary updates:
Upgrade the DPM server to DPM 2019.
Update the agents on the protected servers.
Upgrade the DPM Remote Administrator on all production servers.
Backups continue without rebooting your production server.
Upgrade steps for DPM
1. To install DPM, double-click Setup.exe to open the System Center 2019 wizard.
2. Under Install, click Data Protection Manager to start the setup wizard. Agree to the license terms and
conditions and follow the setup wizard.
For instructions on installing DPM, see the article, Installing DPM.

Migrate the DPM database during upgrade


You may want to move the DPM Database as part of an upgrade. For example:
You are merging instances of SQL Server.
You are moving to a remote more powerful SQL server.
You want to add fault tolerance by using a SQL Server cluster; or you want to move from a remote SQL server
to a local SQL server or vice versa.
DPM 2019 setup allows you to migrate the DPM database to different SQL Servers during an upgrade.
Possible database migration scenarios
The following scenarios exist when you are upgrading DPM 2016/1801/1807 to DPM 2019 using a:
1. Local instance and migrating to a remote instance of SQL Server during setup.
2. Remote instance and migrating to a local instance of SQL Server during setup.
3. Local instance and migrating to a remote SQL Server Cluster instance during setup.
4. Local instance and migrating to a different local instance of SQL Server during setup.
5. Remote instance and migrating to a different remote instance of SQL Server during setup.
6. Remote instance and migrating to a remote SQL Server Cluster instance during setup.
Prepare for a database migration
If you want to use a new SQL server to migrate the DPM database, before you upgrade DPM, be sure both SQL
Servers have the same:
SQL Server requirements
Setup configuration
Firewall rules
DPM Support files (sqlprep)
Once you have the new instance of SQL Server installed and prepared for DPM use, you must make a backup of
the current DPM database and restore it on the new SQL Server.
Pre -upgrade steps: Backup and restore DPM 2016/1801/1807 database to a new SQL instance
This example prepares a remote SQL Server cluster to use in a migration.
1. On the System Center Data Protection Manager server or on the remote SQL Server hosting the DPM
database, start Microsoft SQL Management Studio and connect to the SQL instance hosting the current
DPM DPMDB.
2. Right-click the DPM database, and under Tasks, select the Back Up… option.
3. Add a backup destination and file name, and then select OK to start the backup.

4. After the backup is complete, copy the output file to the remote SQL Server. If this is a SQL Cluster, copy it
to the active node hosting the SQL instance you want to use in the DPM upgrade. Before you can restore
the DPM database, you must copy it to the Shared Cluster disk.
5. On the Remote SQL Server, start Microsoft SQL Management Studio and connect to the SQL instance
you want to use in the DPM upgrade. If this is a SQL Cluster, do this on the Active node that you copied the
DPM backup file to. The backup file should now be located on the shared cluster disk.
6. Right-click the Databases icon, then select the Restore Database… option. This starts the restore wizard.
7. Select Device under Source, and then locate the database backup file that was copied in the previous step
and select it. Verify the restore options and restore location, and then select OK to start the restore. Fix any
issue that arise until the restore is successful.

8. After the restore is complete, the restored database will be seen under Databases with the original name.
This database will be used during the upgrade. You can exit Microsoft SQL Management Studio and
start the upgrade process on the original DPM server.
9. If the new SQL server is a remote SQL server, install the SQL management tools on the DPM server. The
SQL management tools must be the same version matching the SQL server hosting the DPMDB.
Start upgrade to migrate DPMDB to a different SQL Server

NOTE
If sharing a SQL instance, run the DPM installations (or upgrades) sequentially. Parallel installations may cause errors.

1. After the pre-migration preparation steps are complete, start the DPM 2019 Installation process. DPM
Setup shows the information about current instance of SQL server pre-populated. This is where you can
select a different instance of SQL server, or change to a Clustered SQL instance used in the migration.
2. Change the SQL Settings to use the instance of SQL server you restored the DPM Database to. If it’s a SQL
cluster, you must also specify a separate instance of SQL Server used for SQL reporting. It's presumed that
firewall rules and SQLPrep are already ran. You have to enter correct credentials and then click the Check
and Install button.

3. Prerequisite check should succeed, click Next to continue with the upgrade.
4. Continue with the wizard options and complete the setup.
5. After the setup is complete, the corresponding database name on the instance specified will now be
DPMPB_DPMServerName. Because this may be shared with other DPM servers, the naming convention
for the DPM database will now be: DPM2016$DPMDB_DPMServerName

Add storage for Modern Backup Storage


To store backups efficiently, DPM 2019 uses Volumes. Disks can also be used to continue storing backups.
Add volumes and disks
If you run DPM 2019 on Windows Server, you can use volumes to store backup data. Volumes provide storage
savings and faster backups. You can give the volume a friendly name, and you can change the name. You apply the
friendly name while adding the volume, or later by selecting the Friendly Name column of the desired volume.
You can also use PowerShell to add or change friendly names for volumes.
To add a volume in the administrator console:
1. In the DPM Administrator console, select the Management feature > Disk Storage > Add.
2. In the Add Disk Storage dialog, select an available volume > click Add > type a friendly name for the
volume > click OK.
If you want to add a disk, it must belong to a protection group with legacy storage. Those disks can only be used
for those protection groups. If the DPM server doesn't have sources with legacy protection, the disk won't appear.
See the topic, Adding disks to increase legacy storage, for more information on adding disks. You can't give disks a
friendly name.
Assign Workloads to Volumes
DPM 2019 allows you to specify the types of workloads to be assigned to specific volumes. For example, expensive
volumes that support high IOPS can be configured to store only the workloads that require frequent, high-volume
backups like SQL with Transaction logs.
To update the properties of a volume in the storage pool on a DPM server, use the PowerShell cmdlet, Update-
DPMDiskStorage.
Update-DPMDiskStorage
Syntax
Parameter Set: Volume

Update-DPMDiskStorage [-Volume] <Volume> [[-FriendlyName] <String> ] [[-DatasourceType] <VolumeTag[]> ] [-


Confirm] [-WhatIf] [ <CommonParameters>]

The changes made through PowerShell are reflected in the UI.

Migrate legacy storage to Modern Backup Storage


After upgrading to DPM 2019 and the operating system to Windows Server 2016/2019, you can update your
existing protection groups to the new DPM 2016 features. By default, protection groups are not changed, and
continue to function as they were configured in earlier version of your DPM. You can optionally update protection
groups to use Modern Backup Storage, is optional. To update the protection group, stop protection of all data
sources with Retain Data option, and add the data sources to a new protection group. DPM begins protecting
these data sources the new way.
Use the following steps:
1. In the Administrator Console, select the Protection feature, and in the Protection Group Member list,
right-click the member, and select Stop protection of member....
The Remove from Group dialog opens.
2. In the Remove from Group dialog, review the used disk space and the available free space in the storage
pool. The default is to leave the recovery points on the disk and allow them to expire per their associated
retention policy. Click OK.
If you want to immediately return the used disk space to the free storage pool, select Delete replica on
disk. This will delete the backup data (and recovery points) associated with that member.

3. Create a new protection group that uses Modern Backup Storage, and include the unprotected data sources.

Add Disks to increase legacy storage


If you want to use legacy storage with DPM 2019, it may become necessary to add disks to increase legacy
storage. To add disk storage:
1. On the Administrator Console, click Management.
2. Select Disk Storage.
3. On the tool ribbon click Add.
The Add Disk Storage dialog opens.

4. In the Add Disk Storage dialog, click Add disks.


DPM provides a list of available disks.
5. Select the disks, click Add to add the disks, and click OK.

Enable Cloud Protection


You can back up a DPM server to Azure. The high level steps are:
Create an Azure subscription,
Register the server with the Azure Backup service,
Download vault credentials and the Azure Backup Agent,
Configure the server's vault credentials and backup policy,
For more information on backing up DPM to the cloud, see the article, Preparing to backup workloads to Azure
with DPM.
This article provides the upgrade information for System Center 1807 - Data Protection Manager (DPM ).

Update to DPM 1807


You can update System Center Data Protection Manager (DPM ) version 1807 only from DPM 1801. DPM 1807 is
the second release in the System Center Semi-Annual Channel (SAC ). If you want to update to DPM 1807 from
DPM 2016, you must first install DPM 1801 using the steps in the article Upgrade your DPM installation.

Update steps for DPM 1807


1. To install DPM, double-click Setup.exe to open the System Center 1807 wizard.
2. Under Install, click Data Protection Manager to start the setup wizard. Agree to the license terms and
conditions and follow the setup wizard.
This article provides the upgrade information for System Center 1801 - Data Protection Manager (DPM ).

Upgrade to DPM 1801


You can install System Center Data Protection Manager (DPM ) version 1801 on Windows Server 2012 R2, or on
Windows Server 2016. DPM 1801 is the first release in the System Center Semi-Annual Channel (SAC ). You can
upgrade to DPM 1801 from either DPM 2012 R2 Update Rollup 14 (UR14), or from DPM 2016 Update Rollup 4
(UR4). Before you upgrade or install DPM 2016, read the Installation prerequisites.

Upgrade path for DPM 1801


If you are going to upgrade from DPM 2012 R2 or DPM 2016, to DPM 1801, make sure your installation has the
necessary updates:
Upgrade DPM 2012 R2 to DPM 2012 R2 Update Rollup 14. If you are upgrading from DPM 2016, then first
upgrade to DPM 2016 Update Rollup 4. You can download the Update Rollups from Windows Update.
Upgrade the DPM server to DPM 1801.
Update the agents on the protected servers.
Upgrade the DPM Remote Administrator on all production servers.
Backups continue without rebooting your production server.
Upgrade steps for DPM
1. To install DPM, double-click Setup.exe to open the System Center 1801 wizard.
2. Under Install, click Data Protection Manager to start the setup wizard. Agree to the license terms and
conditions and follow the setup wizard.
Some DPM 1801 features, such as Modern Backup Storage, require Windows Server 2016. You can run DPM
1801 on Windows Server 2012 R2 with UR14. However, to use features such as Modern Backup Storage or RCT-
based Hyper-V VM backup, you must use Windows Server 2016. For instructions on installing DPM, see the
article, Installing DPM.

Migrating the DPM database during upgrade


You may want to move the DPM Database as part of an upgrade. For example, you are merging instances of SQL
Server. You are moving to a remote more powerful SQL server. You want to add fault tolerance by using a SQL
Server cluster; or you want to move from a remote SQL server to a local SQL server or vice versa. DPM 1801
setup allows you to migrate the DPM database to different SQL Servers during an upgrade.
Possible database migration scenarios
The following scenarios exist when upgrading DPM 2012 R2 or DPM 2016 to DPM 1801 using a:
1. Local instance and migrating to a remote instance of SQL Server during setup.
2. Remote instance and migrating to a local instance of SQL Server during setup.
3. Local instance and migrating to a remote SQL Server Cluster instance during setup.
4. Local instance and migrating to a different local instance of SQL Server during setup.
5. Remote instance and migrating to a different remote instance of SQL Server during setup.
6. Remote instance and migrating to a remote SQL Server Cluster instance during setup.
Preparing for a database migration
If you want to use a new SQL server to migrate the DPM database, before you upgrade DPM, be sure both SQL
Servers have the same:
SQL Server requirements
Setup configuration
Firewall rules
DPM Support files (sqlprep)
Once you have the new instance of SQL Server installed and prepared for DPM use, you must make a backup of
the current DPM database and restore it on the new SQL Server.
Pre -upgrade steps: Backup and restore DPM 2012 R2 DPM database to a new SQL instance
This example prepares a remote SQL Server cluster to use in a migration.
1. On the System Center Data Protection Manager 2012 R2 server or on the remote SQL Server hosting the
DPM database, start Microsoft SQL Management Studio and connect to the SQL instance hosting the
current DPM 2012 R2 DPMDB.
2. Right-click the DPM database, and under Tasks, select the Back Up… option.

3. Add a backup destination and file name, and then select OK to start the backup.
4. After the backup is complete, copy the output file to the remote SQL Server. If this is a SQL Cluster, copy it
to the active node hosting the SQL instance you want to use in the DPM upgrade. Before you can restore
the DPM database, you must copy it to the Shared Cluster disk.
5. On the Remote SQL Server, start Microsoft SQL Management Studio and connect to the SQL instance
you want to use in the DPM upgrade. If this is a SQL Cluster, do this on the Active node that you copied the
DPM backup file to. The backup file should now be located on the shared cluster disk.
6. Right-click the Databases icon, then select the Restore Database… option. This starts the restore wizard.
7. Select Device under Source, and then locate the database backup file that was copied in the previous step
and select it. Verify the restore options and restore location, and then select OK to start the restore. Fix any
issue that arise until the restore is successful.

8. After the restore is complete, the restored database will be seen under the Databases with the original
name. This Database will be used during the upgrade. You can exit Microsoft SQL Management Studio
and start the upgrade process on the original DPM Server.

9. If the new SQL Server is a remote SQL server, install the SQL management tools on the DPM server. The
SQL management tools must be the same version matching the SQL server hosting the DPMDB.
Starting upgrade to migrate DPMDB to a different SQL Server
NOTE
If sharing a SQL instance, run the DPM installations (or upgrades) sequentially. Parallel installations may cause errors.

1. After the pre-migration preparation steps are complete, start the DPM 2016 Installation process. DPM
Setup shows the information about current instance of SQL Server pre-populated. This is where you can
select a different instance of SQL Server, or change to a Clustered SQL instance used in the migration.

2. Change the SQL Settings to use the instance of SQL Server you restored the DPM Database to. If it’s a
SQL cluster, you must also specify a separate instance of SQL Server used for SQL reporting. It's presumed
that firewall rules and SQLPrep are already ran. You have to enter correct credentials and then click the
Check and Install button.
3. Prerequisite check should succeed, press NEXT to continue with the upgrade.
4. Continue the wizard.
5. After setup is complete, the corresponding database name on the instance specified will now be
DPMPB_DPMServerName. Because this may be shared with other DPM servers, the naming convention
for the DPM database will now be: DPM2016$DPMDB_DPMServerName

Adding Storage for Modern Backup Storage


To store backups efficiently, DPM 2016 uses Volumes. Disks can also be used to continue storing backups like
DPM 2012 R2.
Add Volumes and Disks
If you run DPM 2016 on Windows Server, you can use volumes to store backup data. Volumes provide storage
savings and faster backups. You can give the volume a friendly name, and you can change the name. You apply the
friendly name while adding the volume, or later by clicking the Friendly Name column of the desired volume. You
can also use PowerShell to add or change friendly names for volumes.
To add a volume in the administrator console:
1. In the DPM Administrator console, select the Management feature > Disk Storage > Add.
2. In the Add Disk Storage dialog, select an available volume > click Add > type a friendly name for the
volume > click OK.
If you want to add a disk, it must belong to a protection group with legacy storage. Those disks can only be used
for those protection groups. If the DPM server doesn't have sources with legacy protection, the disk won't appear.
See the topic, Adding disks to increase legacy storage, for more information on adding disks. You can't give disks a
friendly name.
Assign Workloads to Volumes
DPM 2016 allows the user to specify which kinds of workloads should be assigned to which volumes. For example,
expensive volumes that support high IOPS can be configured to store only the workloads that require frequent,
high-volume backups like SQL with Transaction Logs. To update the properties of a volume in the storage pool on
a DPM server, use the PowerShell cmdlet, Update-DPMDiskStorage.
Update-DPMDiskStorage
Syntax
Parameter Set: Volume

Update-DPMDiskStorage [-Volume] <Volume> [[-FriendlyName] <String> ] [[-DatasourceType] <VolumeTag[]> ] [-


Confirm] [-WhatIf] [ <CommonParameters>]

The changes made through PowerShell are reflected in the UI.

Protecting Data Sources


To begin protecting data sources, create a Protection Group. The following procedure highlights changes or
additions to the New Protection Group wizard.
To create a Protection Group:
1. In the DPM Administrator Console, select the Protection feature.
2. On the tool ribbon, click New.
The Create new Protection Group wizard opens.
3. Click Next to advance the wizard to the Select Protection Group Type screen.
4. On the Select Protection Group Type screen, select the type of Protection Group to be created and then
click Next.

5. On the Select Group Members screen, in the Available members pane, DPM lists the members with
protection agents. For the purposes of this example, select volume D:\ and E:\ to add them to the Selected
members pane. Once you have chosen the members for the protection group, click Next.
6. On the Select Data Protection Method screen, type a name for the Protection group, select the
protection method(s) and click Next. If you want short term protection, you must use Disk backup.

7. On the Specify Short-Term Goals screen specify the details for Retention Range and Synchronization
Frequency, and click Next. If desired, click Modify to change the schedule when recovery points are taken.
8. The Review Disk Storage Allocation screen provides details about the selected data sources, their size,
the Space to be Provisioned, and Target Storage Volume.

The storage volumes are determined based on the workload volume allocation (set using PowerShell) and
the available storage. You can change the storage volumes by selecting other volumes from the drop-down
menu. If you change the Target Storage, the Available disk storage dynamically changes to reflect the
Free Space and Underprovisioned Space.
The Underprovisioned Space column in Available disk storage, reflects the amount of additional
storage needed if the data sources grow as planned. Use this value to help plan your storage needs to
enable smooth backups. If the value is zero, then there are no potential problems with storage in the
foreseeable future. If the value is a number other than zero, then you do not have sufficient storage
allocated - based on your protection policy and the data size of your protected members.
The remainder of the New Protection Group wizard is unchanged from DPM 2012 R2. Continue through the
wizard to complete creation of your new protection group.

Migrating legacy storage to Modern Backup Storage


After upgrading DPM 2012 R2 to DPM 2016 and the operating system to Windows Server 2016, you can update
your existing protection groups to the new DPM 2016 features. By default, protection groups are not changed, and
continue to function as they were configured in DPM 2012 R2. Updating protection groups to use Modern Backup
Storage is optional. To update the protection group, stop protection of all data sources with Retain Data, and add
the data sources to a new protection group. DPM begins protecting these data sources the new way.
1. In the Administrator Console, select the Protection feature, and in the Protection Group Member list,
right-click the member, and select Stop protection of member....

The Remove from Group dialog opens.


2. In the Remove from Group dialog, review the used disk space and the available free space in the storage
pool. The default is to leave the recovery points on the disk and allow them to expire per their associated
retention policy. Click OK.
If you want to immediately return the used disk space to the free storage pool, select Delete replica on
disk. This will delete the backup data (and recovery points) associated with that member.

3. Create a new protection group that uses Modern Backup Storage, and include the unprotected data sources.

Adding Disks to increase legacy storage


If you want to use legacy storage with DPM 2016, it may become necessary to add disks to increase legacy
storage. To add disk storage:
1. On the Administrator Console, click Management.
2. Select Disk Storage.
3. On the tool ribbon click Add.
The Add Disk Storage dialog opens.
4. In the Add Disk Storage dialog, click Add disks.
DPM provides a list of available disks.
5. Select the disks, click Add to add the disks, and click OK.

New PowerShell cmdlets


For DPM 2016, two new cmdlets: Mount-DPMRecoveryPoint and Dismount-DPMRecoveryPoint are available.
Click the cmdlet name to see its reference documentation.

Enable Cloud Protection


You can back up a DPM server to Azure. The high level steps are:
create an Azure subscription,
register the server with the Azure Backup service,
download vault credentials and the Azure Backup Agent,
configure the server's vault credentials and backup policy,
For more information on backing up DPM to the cloud, see the article, Preparing to backup workloads to Azure
with DPM.
This article provides the upgrade information for System Center 2016 - Data Protection Manager (DPM ).

Upgrade to DPM 2016


You can install DPM 2016 on Windows Server 2012 R2, or on Windows Server 2016. If you are installing DPM
2016 on Windows Server 2012 R2, you must upgrade an existing DPM installation from DPM 2012 R2 with
Update Rollup 10 or greater. Before you upgrade or install DPM 2016, please read the Installation prerequisites.

Upgrade path for DPM 2016


If you are going to upgrade from a previous version of DPM to DPM 2016, make sure your installation has the
necessary updates:
Upgrade DPM 2012 R2 to DPM 2012 R2 Update Rollup 10. You can obtain the Update Rollups from Windows
Update.
Upgrade DPM 2012 R2 Update Rollup 10 to DPM 2016.
Update the agents on the protected servers.
Upgrade Windows Server 2012 R2 to Windows Server 2016.
Upgrade DPM Remote Administrator on all production servers.
Backups will continue without rebooting your production server.
Upgrade steps for DPM
1. To install DPM, double-click Setup.exe to open the System Center 2016 Wizard.
2. Under Install, click Data Protection Manager. This starts Setup. Agree to the license terms and conditions and
follow the setup wizard.
Some DPM 2016 features, such as Modern Backup Storage, require the Windows Server 2016 RTM build. It is
possible to upgrade DPM 2016 from DPM 2012 R2, running on Windows Server 2012 R2. However, customers
receiving DPM 2016 will want the latest features, so Microsoft recommends installing DPM 2016 on a new
installation of Windows Server 2016 RTM. For instructions on installing DPM, see the article, Installing DPM
2016.

Migrating the DPM database during upgrade


You may want to move the DPM Database as part of an upgrade. For example, you are merging instances of SQL
Server. You are moving to a remote more powerful SQL server. You want to add fault tolerance by using a SQL
Server cluster; or you want to move from a remote SQL server to a local SQL server or vice versa. DPM 2016
setup allows you to migrate the DPM database to different SQL Servers during an upgrade.
Possible database migration scenarios
1. Upgrading DPM 2012 R2 using a local instance and migrating to a remote instance of SQL Server during
setup.
2. Upgrading DPM 2012 R2 using a remote instance and migrating to a local instance of SQL Server during
setup.
3. Upgrading DPM 2012 R2 using a local instance and migrating to a remote SQL Server Cluster instance during
setup.
4. Upgrading DPM 2012 R2 using a local instance and migrating to a different local instance of SQL Server
during setup.
5. Upgrading DPM 2012 R2 using a remote instance and migrating to a different remote instance of SQL Server
during setup.
6. Upgrading DPM 2012 R2 using a remote instance and migrating to a remote SQL Server Cluster instance
during setup.
Preparing for a database migration
The new SQL Server that you want to use to migrate the DPM database to must have the same SQL Server
requirements, setup configuration, firewall rules, and DPM Support files (sqlprep) installed before performing the
DPM Upgrade.
Once you have the new instance of SQL Server installed and prepped for being used by DPM, you must make a
backup of the current DPM 2012 R2 UR10 KB3143871 (4.2.1473.0) or a later database and restore it on the new
SQL Server.
Pre -upgrade steps: Backup and restore DPM 2012 R2 DPM database to a new SQL instance
In this example, we will prepare a remote SQL Server cluster to use for the migration.
1. On the System Center Data Protection Manager 2012 R2 server or on the remote SQL Server hosting the
DPM database, start Microsoft SQL Management Studio and connect to the SQL instance hosting the
current DPM 2012 R2 DPMDB.
2. Right-click the DPM database, and under Tasks, select the Back Up… option.

3. Add a backup destination and file name, and then select OK to start the backup.
4. After the backup is complete, copy the output file to the remote SQL Server. If this is a SQL Cluster, copy it
to the active node hosting the SQL instance you want to use in the DPM upgrade. You have to copy it to the
Shared Cluster disk before you can restore it.
5. On the Remote SQL Server, start Microsoft SQL Management Studio and connect to the SQL instance
you want to use in the DPM upgrade. If this is a SQL Cluster, do this on the Active node that you copied the
DPM backup file to. The backup file should now be located on the shared cluster disk.
6. Right-click the Databases icon, then select the Restore Database… option. This starts the restore wizard.
7. Select Device under Source, and then locate the database backup file that was copied in the previous step
and select it. Verify the restore options and restore location, and then select OK to start the restore. Fix any
issue that arise until the restore is successful.

8. After the restore is complete, the restored database will be seen under the Databases with the original
name. This Database will be used during the upgrade. You can exit Microsoft SQL Management Studio
and start the upgrade process on the original DPM Server.

9. If the new SQL Server is a remote SQL server, install the SQL management tools on the DPM server. The
SQL management tools must be the same version matching the SQL server hosting the DPMDB.
Starting upgrade to migrate DPMDB to a different SQL Server
NOTE
If sharing a SQL instance, run the DPM installations (or upgrades) sequentially. Parallel installations may cause errors.

1. After the pre-migration preparation steps are complete, start the DPM 2016 Installation process. DPM
Setup shows the information about current instance of SQL Server pre-populated. This is where you can
select a different instance of SQL Server, or change to a Clustered SQL instance used in the migration.

2. Change the SQL Settings to use the instance of SQL Server you restored the DPM Database to. If it’s a
SQL cluster, you must also specify a separate instance of SQL Server used for SQL reporting. It's presumed
that firewall rules and SQLPrep are already ran. You have to enter correct credentials and then click the
Check and Install button.
3. Prerequisite check should succeed, press NEXT to continue with the upgrade.
4. Continue the wizard.
5. After setup is complete, the corresponding database name on the instance specified will now be
DPMPB_DPMServerName. Because this may be shared with other DPM servers, the naming convention
for the DPM database will now be: DPM2016$DPMDB_DPMServerName

Adding Storage for Modern Backup Storage


To store backups efficiently, DPM 2016 uses Volumes. Disks can also be used to continue storing backups like
DPM 2012 R2.
Add Volumes and Disks
If you run DPM 2016 on Windows Server, you can use volumes to store backup data. Volumes provide storage
savings and faster backups. You can give the volume a friendly name, and you can change the name. You apply the
friendly name while adding the volume, or later by clicking the Friendly Name column of the desired volume. You
can also use PowerShell to add or change friendly names for volumes.
To add a volume in the administrator console:
1. In the DPM Administrator console, select the Management feature > Disk Storage > Add.
2. In the Add Disk Storage dialog, select an available volume > click Add > type a friendly name for the
volume > click OK.
If you want to add a disk, it must belong to a protection group with legacy storage. Those disks can only be used
for those protection groups. If the DPM server doesn't have sources with legacy protection, the disk won't appear.
See the topic, Adding disks to increase legacy storage, for more information on adding disks. You can't give disks a
friendly name.
Assign Workloads to Volumes
DPM 2016 allows the user to specify which kinds of workloads should be assigned to which volumes. For example,
expensive volumes that support high IOPS can be configured to store only the workloads that require frequent,
high-volume backups like SQL with Transaction Logs. To update the properties of a volume in the storage pool on
a DPM server, use the PowerShell cmdlet, Update-DPMDiskStorage.
Update-DPMDiskStorage
Syntax
Parameter Set: Volume

Update-DPMDiskStorage [-Volume] <Volume> [[-FriendlyName] <String> ] [[-DatasourceType] <VolumeTag[]> ] [-


Confirm] [-WhatIf] [ <CommonParameters>]

The changes made through PowerShell are reflected in the UI.

Protecting Data Sources


To begin protecting data sources, create a Protection Group. The following procedure highlights changes or
additions to the New Protection Group wizard.
To create a Protection Group:
1. In the DPM Administrator Console, select the Protection feature.
2. On the tool ribbon, click New.
The Create new Protection Group wizard opens.
3. Click Next to advance the wizard to the Select Protection Group Type screen.
4. On the Select Protection Group Type screen, select the type of Protection Group to be created and then
click Next.

5. On the Select Group Members screen, in the Available members pane, DPM lists the members with
protection agents. For the purposes of this example, select volume D:\ and E:\ to add them to the Selected
members pane. Once you have chosen the members for the protection group, click Next.
6. On the Select Data Protection Method screen, type a name for the Protection group, select the
protection method(s) and click Next. If you want short term protection, you must use Disk backup.

7. On the Specify Short-Term Goals screen specify the details for Retention Range and Synchronization
Frequency, and click Next. If desired, click Modify to change the schedule when recovery points are taken.
8. The Review Disk Storage Allocation screen provides details about the selected data sources, their size,
the Space to be Provisioned, and Target Storage Volume.

The storage volumes are determined based on the workload volume allocation (set using PowerShell) and
the available storage. You can change the storage volumes by selecting other volumes from the drop-down
menu. If you change the Target Storage, the Available disk storage dynamically changes to reflect the
Free Space and Underprovisioned Space.
The Underprovisioned Space column in Available disk storage, reflects the amount of additional
storage needed if the data sources grow as planned. Use this value to help plan your storage needs to
enable smooth backups. If the value is zero, then there are no potential problems with storage in the
foreseeable future. If the value is a number other than zero, then you do not have sufficient storage
allocated - based on your protection policy and the data size of your protected members.
The remainder of the New Protection Group wizard is unchanged from DPM 2012 R2. Continue through the
wizard to complete creation of your new protection group.

Migrating legacy storage to Modern Backup Storage


After upgrading DPM 2012 R2 to DPM 2016 and the operating system to Windows Server 2016, you can update
your existing protection groups to the new DPM 2016 features. By default, protection groups are not changed, and
continue to function as they were configured in DPM 2012 R2. Updating protection groups to use Modern Backup
Storage is optional. To update the protection group, stop protection of all data sources with Retain Data, and add
the data sources to a new protection group. DPM begins protecting these data sources the new way.
1. In the Administrator Console, select the Protection feature, and in the Protection Group Member list,
right-click the member, and select Stop protection of member....

The Remove from Group dialog opens.


2. In the Remove from Group dialog, review the used disk space and the available free space in the storage
pool. The default is to leave the recovery points on the disk and allow them to expire per their associated
retention policy. Click OK.
If you want to immediately return the used disk space to the free storage pool, select Delete replica on
disk. This will delete the backup data (and recovery points) associated with that member.

3. Create a new protection group that uses Modern Backup Storage, and include the unprotected data sources.

Adding Disks to increase legacy storage


If you want to use legacy storage with DPM 2016, it may become necessary to add disks to increase legacy
storage. To add disk storage:
1. On the Administrator Console, click Management.
2. Select Disk Storage.
3. On the tool ribbon click Add.
The Add Disk Storage dialog opens.
4. In the Add Disk Storage dialog, click Add disks.
DPM provides a list of available disks.
5. Select the disks, click Add to add the disks, and click OK.

New PowerShell cmdlets


For DPM 2016, two new cmdlets: Mount-DPMRecoveryPoint and Dismount-DPMRecoveryPoint are available.
Click the cmdlet name to see its reference documentation.

Enable Cloud Protection


You can back up a DPM server to Azure. The high level steps are:
create an Azure subscription,
register the server with the Azure Backup service,
download vault credentials and the Azure Backup Agent,
configure the server's vault credentials and backup policy,
For more information on backing up DPM to the cloud, see the article, Preparing to backup workloads to Azure
with DPM.

Next steps
Learn how to add storage.
Add Modern Backup Storage to DPM
13 minutes to read

Modern Backup Storage (MBS ) was introduced in System Center Data Protection Manager (DPM ) 2016 to deliver
50% storage savings, 3X faster backups, and more efficient, workload-aware storage.
MBS is enabled automatically when you're running at least DPM 2016 on Windows Server 2016. If DPM is
running on a version of Windows Server older than Windows Server 2016, it doesn't use MBS.
MBS provides intelligent storage for short-term backup to disk. MBS provides faster disk backup, consuming
less disk space. Without MBS, each data source needs two volumes, one for the initial backup and the other for
delta changes.
MBS backups are stored on an ReFS disk. It uses ReFS block cloning, and VHDX technology, Learn more.

NOTE
DPM does not support deduplication on ReFS disk used for MBS backups.

DPM 2016 accepts volumes for storage. Once you add a volume, DPM formats the volume to ReFS to use the
new features of Modern Backup Storage. Volumes cannot reside on a dynamic disk. Use only a basic disk.
While you can directly give a volume to DPM, you may face issues in extending the volume if a need arises later. To
prepare DPM for future expansion, use the available disks to create a storage pool, then create volumes on the
storage pool, and expose the volumes to DPM. These virtual volumes can then be extended when needed.
The remainder of this article provides the detail on how to add a volume and to expand it later.

Setting up MBS
Setting up MBS consists of the following procedures. Note that you cannot attach locally created VHD (VHDX)
files, and use them as storage on a physical DPM server.
1. Make sure you're running DPM 2016 or later on a VM running Windows Server 2016 or later.
2. Create a volume. To create a volume on a virtual disk in a storage pool:
Add a disk to the storage pool
Create a virtual disk from the storage pool, with layout set to Simple. You can then add additional disks,
or extend the virtual disk.
Create volumes on the virtual disk.
3. Add the volumes to DPM.
4. Configure workload-aware storage.

Create a volume
1. Create a storage pool in the File and Storage Services of Server Manager.
2. Add the available physical disks to the storage pool.
Adding only one disk to the pool keeps the column count to 1. You can then add disks as needed
afterwards.
If multiple disks are added to the storage pool, the number of disks is stored as the number of
columns. When more disks are added, they can only be a multiple of the number of columns.
3. Create a virtual disk from the storage pool, with the layout set to Simple.

4. Now add as many physical disks as needed.


5. Extend the virtual disk with the Simple layout, to reflect any physical disks you added.

6. Now, create volumes on the virtual disk.


Add volumes to DPM storage
1. In the DPM Management console > Disk Storage, click Rescan.
2. In Add Disk Storage, click Add.
3. After the volumes are added, you can give them a friendly name.
4. Click OK to format the volumes to ReFS, so that DPM can use them as MBS.
Configure workload-aware storage
Using workload-aware storage, the volumes can be selected to preferentially store specific workloads. For
example, expensive volumes that support high IOPS can be configured to store workloads that need frequent,
high-volume backups such as SQL Server with transaction logs. Workloads that are backed up less frequently,
such as VMs, can be backed up to low -cost volumes.
You configure workload-aware storage using Windows PowerShell cmdlets.
Update the volume properties
1. Run the Update-DPMDiskStorage to update the properties of a volume in the storage pool on a DPM
server. The syntax is Parameter Set: Volume.
2. Run the cmdlet with these parameters.

Update-DPMDiskStorage [-Volume] <Volume> [[-FriendlyName] <String> ] [[-DatasourceType] <VolumeTag[]> ]


[-Confirm] [-WhatIf] [ <CommonParameters>]
3. The changes made using the PowerShell cmdlet are reflected in the DPM Management console.

Volume Exclusion
DPM servers may be managed by a team of Administrators. While there are guidelines on storage that should be
used for backups, a wrong volume given to DPM as backup storage may lead to loss of critical data. Hence, with
DPM 2016 UR4 and later, you can prevent such scenarios by configuring those volumes to not be shown as
available for storage using PowerShell.
For Example, to exclude F:\ and C:\MountPoint1, here are the steps:
1. Run the Set0DPMGlobalPropery commandlet:

Set-DPMGlobalProperty -DPMStorageVolumeExclusion "F:,C:\MountPoint1"

2. Rescan the storage through UI, or use Start-DPMDiskRescan cmdlet.


The configured volumes and mountpoints are excluded.
3. To remove volume exclusion, run the following cmdlet:

Set-DPMGlobalProperty -DPMStorageVolumeExclusion ""

After removing volume exclusion, rescan the storage. All volumes and mount points, except System Volumes, are
available for DPM storage.

Backup Storage Migration


Once all your backups are on MBS, there may be a need to migrate certain datasources from one volume to
another. For example, scenarios where you need to upgrade storage, or when a volume is getting full. You can use
PowerShell or the user interface to migrate datasources. The details can be found in this blog entry.
The migrating datasource should have all recovery points on Modern Storage. Migrating datasources with
backups on disks and volumes (for example, DPM server upgrades when the disk backups haven't expired) is not
supported. Migration is similar to modification of a protection group. While migration is in progress, you cannot
trigger an ad hoc job. The scheduled jobs continue as configured. When the migration completes, any running jobs
in the protection group are pre-empted.

Custom Size Allocation


DPM 2016 consumes storage thinly, as needed. Once DPM is configured for protection, it calculates the size of the
data being backed up. If many files and folders are being backed up together, as in the case of a file server, size
calculation can take long time. With DPM, you can configure DPM to accept the volume size as default instead of
calculating the size of each file. The corresponding registry key is
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection
Manager\Configuration\DiskStorage" with the Key, "EnableCustomAllocationOnReFSStorage" as a String set to 1
to enable custom size allocation, set to 0 for default size allocation with DPM.
Modern Backup Storage (MBS ) was introduced in System Center Data Protection Manager (DPM ) 2016 to deliver
50% storage savings, 3X faster backups, and more efficient, workload-aware storage. DPM 2019 introduces
further performance improvements with MBS resulting in 50-70% faster backup with Windows Server 2019.

NOTE
We recommend you to deploy DPM 2019 (using tiered volumes) on Windows Server 2019 to achieve enhanced backup
performances.

MBS is enabled automatically when you're running at least DPM 2016 on Windows Server 2016. If DPM is
running on a version of Windows Server earlier than Windows Server 2016, it doesn't use MBS.
MBS provides intelligent storage for short-term backup to disk. MBS provides faster disk backup, consuming
less disk space. Without MBS, each data source needs two volumes, one for the initial backup and the other for
delta changes.
MBS backups are stored on an ReFS disk. It uses ReFS block cloning, and VHDX technology.Learn more.
With DPM 2019 and later, you can use tiered volumes for DPM native storage which delivers 50-70% faster
backups

NOTE
DPM does not support deduplication on ReFS disk used for MBS backups.

DPM 2019 accepts volumes/disks for storage. Once you add a volume, DPM formats the volume to ReFS to use
the new features of Modern Backup Storage. Volumes cannot reside on a dynamic disk, use only a basic disk.
You can directly give a volume to DPM, however, you may have issues in extending the volume if a need arises
later. You can create additional volumes using storage pools, which could be exposed to DPM and extended as
needed. The following sections provide the details on how to create a tiered volume, add a volume to DPM, and
expand it later

Set up MBS with Tiered Storage


DPM 2016 introduced Modern Backup Storage (MBS ), improving storage utilization and performance. MBS uses
ReFS as underlying filesystem. MBS is designed to make use of hybrid storage such as tiered storage. To achieve
the scale and performance claimed by MBS, we recommend using a small percentage (4% of overall storage) of
flash storage (SSD ) with DPM 2019 as a tiered volume in combination with HDD for DPM native storage.
NOTE
Tiering is recommended for faster backups. However, this is not a mandatory requirement to configure DPM storage.
You cannot attach locally created VHD (VHDX) files, and use them as storage on a physical DPM server. Make sure you
are running DPM 2019 or later deployed on a VM running on Windows Server 2016 or later.

Follow the steps in the procedures below to set up MBS with tiered storage. Follow the procedures in sequence, as
listed below.
1. Configure DPM storage.

NOTE
Migrate your current backups to a temporary volume using Volume Migration, in case you wish to modify your
existing storage to tiered storage.

Create a storage pool.


Create a virtual disk from the storage pool, with layout set to Simple. You can then add additional disks,
or extend the virtual disk.
Create tiered/simple volumes on the virtual disk.
2. Add the volumes to DPM.
3. Migrate your data back to the newly created volumes using Volume Migration performed in Step 1.

NOTE
Applicable only if you have migrated your earlier backups in Step 1.

4. Configure workload-aware storage.

Configure DPM Storage


Windows Storage Spaces allows you to pool multiple physical disks together into one logical drive. Storage
Spaces use thin provisioning which reserves the drive capacity as we store data to the drive. It provides an easy
way to create software-defined storage using a server's local storage resources.
Configure Storage spaces
Follow these steps: :
1. Open Server Manager.
2. Click File and Storage Services.
3. Click Storage Pools.
4. Select New Storage Pool option from TASKS.
5. Enter a name for the storage pool, click Next.
6. Include the physical disk to the storage pool. If a disk is missing from the primordial pool, you can add it by
selecting Add Physical Disk option from the TASKS drop-down menu.
NOTE
The primordial pool is created by default and is essentially a repository for disks that are available for use in a storage
pool that you create. A disk can only belong to a single storage pool.

7. Check the media type of the disk included. At least one of the disks should be SSD, required for SSD
Tiering.
Add all the disks including SSDs to the storage pool.
Add only one disk to the pool to keep the column count to 1. You can then add disks as needed
afterwards.

NOTE
If you add multiple disks to the storage pool at a go, the number of disks is stored as the number of
columns. When more disks are added, they can only be a multiple of the number of columns.
For DPM running on virtual machines, expose the VHDs carved out of physical SSDs & HDDs of required
size from the host computer to the VM, and use them as a tiered storage as explained above.

The following image shows the check for disk type:


8. If the media-type for HDD or SSD disk is not recognized correctly, use the following command:
Set-PhysicalDisk -UniqueId <UniqueId String> -MediaType <HDD|SSD>

9. For each of these disks, set the allocation as Automatic.

10. Check the options made, and click Create to create a new storage pool.
After successful creation of the storage pool, the newly created storage pool gets listed under STORAGE POOL .
PHYSICAL DISK displays the disks that are present in the selected pool.
Disable Write -Back Cache
Disable Write-Back Cache to disable auto caching at storage pool level (needed only for tiered storage).
To do this, go to PowerShell and execute the following commands:

Set-StoragePool -FriendlyName <String> [-WriteCacheSizeDefault <UInt64>]

Choose -WriteCacheSizeDefault value as 0.

Create virtual disks


Follow these steps:
1. In the VIRTUAL DISK pane, select New Virtual Disk from TASKS drop-down menu.
2. Choose the storage pool from which you want to create a virtual disk.

3. Provide a name for the virtual disk.


4. Select Create storage tiers on this virtual disk to create a tiered storage.

NOTE
Tiered Storage is possible only when the storage pool contains a mixture of SSD and HDD.
5. Click Next and select Enable enclosure awareness (if required).

6. Select Simple Layout and click Next.


7. Fixed Provisioning is the default selection. Click Next.
8. Provide the size for Faster Tier and Standard Tier. Faster Tier corresponds to SSD and Standard Tier
corresponds to HDD. The size of the Faster Tier should be 4% the size of Standard Tier (For E.g. If the total
requirement is 100 GB – if HDD is 96 GB, SDD should be 4 GB. Click Next.
9. Confirm the configurations and click Create.

Create a volume
Follow these steps:
1. Select the virtual disk that you created and launch the New Volume Wizard.
2. In the New Volume Wizard, click Next, assign drive letter, and specify the size.

3. Click Finish to create a new volume.


4. Format the volume that you created, from Disk Management console to ReFS.
Disable Auto -Caching at file system level
1. Go to PowerShell.
2. Use the following command:

fsutil behavior disableWriteAutoTiering

Usage: fsutil behavior set disableWriteAutoTiering <volume pathname> <1|0>) Values:


0 - Enable write auto tiering on the given volume (default)

1 - Disable write auto tiering on the given volume

Example: fsutil behavior set disableWriteAutoTiering C: 1

Note that you can skip this step if more than 10% of SSD is available. This can be disabled later if there is a
performance degradation in terms of backup speeds.
Now, add the newly created volumes to DPM storage using the procedure detailed below.

Add volumes to DPM storage


Follow these steps:
1. In the DPM Management console > Disk Storage, click Rescan.
2. In Add Disk Storage, click Add.
3. After the volumes are added, you can give them a friendly name.
4. Click OK to format the volumes to ReFS, so DPM can use them as MBS.

Migrate data to newly created volumes


In case you had upgraded your existing storage to a tiered storage, you can migrate your data by using Volume
Migration. You can use PowerShell or the user interface to migrate data sources. Learn more.
Migration of data source should have all recovery points on Modern Storage.
NOTE
Migration of data sources with backups on disks and volumes (for example, DPM server upgrades when the disk backups
haven't expired) is not supported.
Migration is similar to modification of a protection group. While migration is in progress, you cannot trigger an ad hoc
job. Scheduled jobs continue as configured. When the migration completes, current jobs in the protection group are pre-
empted.

Configure workload-aware storage


Using workload-aware storage, the volumes can be selected to preferentially store specific workloads. For
example, expensive volumes that support high IOPS can be configured to store workloads that need frequent,
high-volume backups such as SQL Server with transaction logs. Workloads that are backed up less frequently,
such as VMs, can be backed up to low -cost volumes.
You can configure workload-aware storage using Windows PowerShell cmdlets.
Update the volume properties
1. Run the Update-DPMDiskStorage to update the properties of a volume in the storage pool on a DPM
server. The syntax is Parameter Set: Volume.
2. Run the cmdlet with these parameters.

Update-DPMDiskStorage [-Volume] <Volume> [[-FriendlyName] <String> ] [[-DatasourceType] <VolumeTag[]> ]


[-Confirm] [-WhatIf] [ <CommonParameters>]

Changes made using the PowerShell cmdlet are reflected in the DPM Management console.
Volume Exclusion
DPM servers may be managed by a team of Administrators. While there are guidelines on storage that should be
used for backups, a wrong volume given to DPM as backup storage may lead to loss of critical data. Hence, with
DPM 2016 UR4 and later, you can prevent such scenarios by configuring those volumes to not be shown as
available for storage using PowerShell.
For Example, to exclude F:\ and C:\MountPoint1, use these steps:
1. Run the Set0DPMGlobalPropery commandlet:

Set-DPMGlobalProperty -DPMStorageVolumeExclusion "F:,C:\MountPoint1"

2. Rescan the storage through UI, or use Start-DPMDiskRescan cmdlet.


The configured volumes and mountpoints are excluded.
3. To remove volume exclusion, run the following cmdlet:

Set-DPMGlobalProperty -DPMStorageVolumeExclusion ""

After removing volume exclusion, rescan the storage. All volumes and mount points, except System Volumes, are
available for DPM storage.

Custom Size Allocation


DPM 2019 consumes storage thinly, as needed. Once DPM is configured for protection, it calculates the size of the
data being backed up. If many files and folders are being backed up together, as in the case of a file server, size
calculation can take long time.
With DPM 2016 and later, you can configure DPM to accept the volume size as default instead of calculating the
size of each file. The corresponding registry key is HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft
Data Protection Manager\Configuration\DiskStorage with the Key, EnableCustomAllocationOnReFSStorage as a
string set to 1 to enable custom size allocation, set to 0 for default size allocation with DPM.
Deduplicate DPM storage
17 minutes to read

System Center Data Protection Manager (DPM ) can use data deduplication.
Data deduplication (dedup) finds and removes duplicated data in a volume while ensuring data remains correct
and complete. Learn more about deduplication planning.
Dedup reduces storage consumption and although the amount of redundancy for a set of data will depend
on the workload and data type, typically backup data shows strong savings when dedup is used.
Data redundancy can be further reduced with dedup when backed up data of similar types and workloads is
processed together.
Dedup is designed to be installed on primary data volumes without additional dedicated hardware so that it
doesn't impact the primary workload on the server. The default settings are nonintrusive because they allow
data to age for five days before processing a particular file, and has a default minimum file size of 32 KB.
The implementation is designed for low memory and CPU usage.
Dedup can be implemented on the following workloads:
General file shares: Group content publication and sharing, user home folders, and Folder
Redirection/Offline Files
Software deployment shares: Software binaries, images, and updates
VHD libraries: Virtual hard disk (VHD ) file storage for provisioning to hypervisors
VDI Deployments (Windows Server 2012 R2 only): Virtual Desktop Infrastructure (VDI)
deployments using Hyper-V
Virtualized backup: Backup solutions (such as DPM running in a Hyper-V virtual machine) that save
backup data to VHD/VHDX files on a Windows File Server.

DPM and dedup


Using dedup with DPM can result in large savings. The amount of space saved by dedup when optimizing DPM
backup data varies depending on the type of data being backed up. For example, a backup of an encrypted
database server may result in minimal savings since any duplicate data is hidden by the encryption process.
However backup of a large Virtual Desktop Infrastructure (VDI) deployment can result in very large savings in the
range of 70-90+% range, since there is typically a large amount of data duplication between the virtual desktop
environments. In the configuration described in this topic we ran a variety of test workloads and saw savings
ranging between 50% and 90%.
To use dedup for DPM storage DPM should be running in a Hyper-V virtual machine and store backup data to
VHDs in shared folders with data dedup enabled.

Recommended deployment
To deploy DPM as a virtual machine backing up data to a dedupl volume we recommend the following
deployment topology:
DPM running in a virtual machine in a Hyper-V host cluster.
DPM storage using VHD/VHDX files stored on an SMB 3.0 share on a file server.
For our test example we configured the file server as a scaled-out file server (SOFS ) deployed using
storage volumes configured from Storage Spaces pools built using directly connected SAS drives. Note that
this deployment ensures performance at scale.
Note that:
This deployment is supported for DPM 2012 R2, and for all workload data that can be backed up by DPM
2012 R2.
All the Windows File Server nodes on which DPM virtual hard disks reside and on which dedup will be
enabled must be running Windows Server 2012 R2 with at least Update Rollup November 2014.
We'll provide general recommendations and instructions for the scenario deployment. Whenever
hardware-specific examples are given, the hardware deployed in the Microsoft Cloud Platform System
(CPS ) is used for reference.
This example uses remote SMB 3.0 shares to store the backup data, so primary hardware requirements
center around the File Server nodes rather than the Hyper-V nodes. The following hardware configuration
is used in CPS for backup and production storage. Note that the overall hardware is used for both backup
and production storage, but the number of drives listed in the drive enclosures are only those used for
backup.
4 node Scale Out File Server cluster
Per node configuration
2x Intel(R ) Xeon(R ) CPU E5-2650 0 @ 2.00GHz, 2001 MHz, 8 cores, 16 logical processors
128GB 1333MHz RDIMM memory
Storage connections: 2 ports of SAS, 1 port of 10GbE iWarp/RDMA
4 JBOD drive enclosures
18 Disks in each JBOD - 16 x 4TB HDDs + 2 x 800GB SSDs
Dual path to each drive - Multipath I/O load balancing policy set to failover only
SSDs configured for write back cache (WBC ) and the rest for dedicated journal drives

Set up dedup volumes


Let's consider how big volumes should be to support the deduplicated VHDX files containing DPM data. In CPS
we've created volumes of 7.2TB each. The optimum volume size depends primarily on how much and how
frequently the data on the volume changes, and on the data access throughput rates of the disk storage subsystem.
It's important to note that if the deduplication processing can't keep up with the rate of daily data changes (the
churn) the savings rate will drop until the processing can complete. For more detailed information see Sizing
Volumes for Data Deduplication. The following general guidelines are recommended for the dedup volumes:
Use Parity Storage Spaces with enclosure-awareness for resiliency and increased disk utilization.
Format NTFS with 64 KB allocation units and large file record segments to work better with dedup use of
sparse files.
In the hardware configuration above the recommended volume size is 7.2TB volumes and volumes will be
configured as follows:
Enclosure aware dual parity 7.2TB + 1GB Write back cache
ResiliencySettingName == Parity
PhysicalDiskRedundancy == 2
NumberOfColumns == 7
Interleave == 256KB (Dual parity performance at 64KB interleave is much lower than at the
default 256KB interleave)
IsEnclosureAware == $true
AllocationUnitSize=64KB
Large FRS
Set up a new virtual disk in the specified storage pool as follows:

New-VirtualDisk -Size 7.2TB -PhysicalDiskRedundancy 2 -ResiliencySettingName Parity -


StoragePoolFriendlyName BackupPool -FriendlyName BackupStorage -NumberOfColumns 7 -
IsEnclosureAware $true

Each of these volumes must then be formatted as:

Format-Volume -Partition <volume> -FileSystem NTFS -AllocationUnitSize 64KB -UseLargeFRS -Force

In the CPS deployment, these are then configured as CSVs.


Within these volumes DPM will store a series of VHDX files to hold the backup data. Enable
deduplication on the volume after formatting it, as follows:

Enable-DedupVolume -Volume <volume> -UsageType HyperV


Set-DedupVolume -Volume <volume> -MinimumFileAgeDays 0 -OptimizePartialFiles:$false

This command also modifies the following volume level dedup settings:
Set UsageType to HyperV: This results in dedup processing open files, which is required
because the VHDX files used for backup storage by DPM remain open with DPM running in
its virtual machine.
Disable PartialFileOptimization: This causes dedup to optimize all sections of an open file
rather scan for changed sections with a minimum age.
Set MinFileAgeDays parameter to 0: With PartialFileOptimization disabled, MinFileAgeDays
changes its behavior so that dedup only considers files that haven't changed in that many
days. Since we want dedup to begin processing the backup data in all DPM VHDX files
without any delay, we need to set MinFileAgeDays to 0.
For more information on setting up deduplication see Install and Configure Data Duplication.

Set up DPM storage


To avoid fragmentation issues and maintain efficiency, DPM storage is allocated using VHDX files residing on the
deduplicated volumes. 10 dynamic VHDX files of 1TB each are created on each volume and attached to DPM.
Note that 3TB of overprovisioning of storage is done to take advantage of the storage savings produced by dedup.
As dedup produces additional storage savings, new VHDX files can be created on these volumes to consume
saved space. We tested the DPM sever with up to 30 VHDX files attached to it.
1. Run the following command to create virtual hard disks that will be added later to the DPM server:
New-SCVirtualDiskDrive -Dynamic -SCSI -Bus $Bus -LUN $Lun -JobGroup $JobGroupId -VirtualHardDiskSizeMB
1048576 -Path $Using:Path -FileName <VHDName>

2. Then added the created virtual hard disks to the DPM server as follows:

Import-Module "DataProtectionManager"
Set-StorageSetting -NewDiskPolicy OnlineAll
$dpmdisks = @()
$dpmdisks = Get-DPMDisk -DPMServerName $env:computername | ? {$_.CanAddToStoragePool -
eq $true -and $_.IsInStoragePool -eq $false -and $_.HasData -eq $false}
Add-DPMDisk $dpmdisks

Note that this step configures a storage pool as the disk or disks on which DPM stores replicas and
recovery points for protected data. This pool is part of the DPM configuration and is separate from the
Storage Spaces pool used to create the data volumes described in the previous section. For more
information on DPM storage pools see Configure disk storage and storage pools.

Set up the Windows File Server cluster


Dedup requires a special set of configuration options to support virtualized DPM storage due to the scale of data
and size of individual files. These options are global to the cluster or the cluster node. Dedup must be enabled and
the cluster settings must be individually configured on each node of the cluster.
1. Enable dedup on Windows File Server storage- The Deduplication role must be installed on all nodes
of the Windows File Server cluster. To do this run the following PowerShell command on each node of the
cluster:

Install-WindowsFeature -Name FileAndStorage-Services,FS-Data-Deduplication -ComputerName <node name>

2. Tune dedup processing for backup data files-Run the following PowerShell command to set to start
optimization without delay and not to optimize partial file writes. Note that by default Garbage Collection
(GC ) jobs are scheduled every week, and every fourth week the GC job runs in "deep GC" mode for a more
exhaustive and time intensive search for data to remove. For the DPM workload, this "deep GC" mode does
not result in any appreciative gains and reduces the amount of time in which dedup can optimize data. We
therefore disable this deep mode.

Set-ItemProperty -Path HKLM:\Cluster\Dedup -Name DeepGCInterval -Value 0xFFFFFFFF

3. Tune performance for large scale operations-Run the following PowerShell script to:
Disable additional processing and I/O when deep garbage collection runs
Reserve additional memory for hash processing
Enable priority optimization to allow immediate defragmentation of large files

Set-ItemProperty -Path HKLM:\Cluster\Dedup -Name HashIndexFullKeyReservationPercent -Value 70


Set-ItemProperty -Path HKLM:\Cluster\Dedup -Name EnablePriorityOptimization -Value 1

These settings modify the following:


HashIndexFullKeyReservationPercent: This value controls how much of the optimization job memory
is used for existing chunk hashes, versus new chunk hashes. At high scale, 70% results in better
optimization throughput than the 50% default.
EnablePriorityOptimization: With files approaching 1TB, fragmentation of a single file can
accumulate enough fragments to approach the per file limit. Optimization processing consolidates
these fragments and prevents this limit from being reached. By setting this registry key, dedup will
add an additional process to deal with highly fragmented deduped files with high priority.

Set up DPM and dedup scheduling


Both backup and deduplication operations are I/O intensive. If they were to run at the same time, additional
overhead to switch between the operations could be costly and result in less data being backed up or deduplicated
on a daily basis. We recommended you configure dedicated and separate deduplication and backup windows. This
helps ensure that the I/O traffic for each of these operations is efficiently distributed during daily system operation.
The recommended guidelines for scheduling are:
Split days into non-overlapping backup and dedup windows.
Set up custom backup schedules.
Set up custom dedup schedules.
Schedule optimization in the daily dedup window.
Set up weekend dedup schedules separately, using that time for garbage collection and scrubbing jobs.
You can set up DPM schedules with the following PowerShell command:

Set-DPMConsistencyCheckWindow -ProtectionGroup $mpg -StartTime $startTime -


DurationInHours $duration
Set-DPMBackupWindow -ProtectionGroup $mpg -StartTime $startTime -DurationInHours
$duration

In this configuration, DPM is configured to back up virtual machines between 10 PM and 6 AM. Deduplication is
scheduled for the remaining 16 hours of the day. Note that the actual dedup time you configure will depend on the
volume size. See Sizing Volumes for Data Deduplication for more information. A 16 hour deduplication window
starting at 6 AM after the backup window ends would be configured as follows from any individual cluster node:
#disable default schedule
Set-DedupSchedule * -Enabled:$false
#Remainder of the day after an 8 hour backup window starting at 10pm $dedupDuration = 16
$dedupStart = "6:00am"
#On weekends GC and scrubbing start one hour earlier than optimization job.
# Once GC/scrubbing jobs complete, the remaining time is used for weekend
# optimization.
$shortenedDuration = $dedupDuration - 1
$dedupShortenedStart = "7:00am"
#if the previous command disabled priority optimization schedule
#reenable it
if ((Get-DedupSchedule -name PriorityOptimization -ErrorAction SilentlyContinue) -ne $null)
{
Set-DedupSchedule -Name PriorityOptimization -Enabled:$true
}
#set weekday and weekend optimization schedules
New-DedupSchedule -Name DailyOptimization -Type Optimization -DurationHours $dedupDuration -Memory 50 -
Priority Normal -InputOutputThrottleLevel None -Start $dedupStart -Days
Monday,Tuesday,Wednesday,Thursday,Friday
New-DedupSchedule -Name WeekendOptimization -Type Optimization -DurationHours $shortenedDuration -Memory 50 -
Priority Normal -InputOutputThrottleLevel None -Start $dedupShortenedStart -Days Saturday,Sunday
#re-enable and modify scrubbing and garbage collection schedules
Set-DedupSchedule -Name WeeklyScrubbing -Enabled:$true -Memory 50 -DurationHours $dedupDuration -Priority
Normal -InputOutputThrottleLevel None -Start $dedupStart -StopWhenSystemBusy:$false -Days Sunday
Set-DedupSchedule -Name WeeklyGarbageCollection -Enabled:$true -Memory 50 -DurationHours $dedupDuration -
Priority Normal -InputOutputThrottleLevel None -Start $dedupStart -StopWhenSystemBusy:$false -Days Saturday
#disable background optimization
if ((Get-DedupSchedule -name BackgroundOptimization -ErrorAction SilentlyContinue) -ne $null)
{
Set-DedupSchedule -Name BackgroundOptimization -Enabled:$false
}

Whenever the backup window is modified it's vital that the deduplication window is modified along with it so they
don't overlap. The deduplication and backup window don't have to fill up the full 24 hours of the day, but it's highly
recommended that they do to allow for variations in processing time due to expected daily changed in workloads
and data churn.

Implications for backup performance


After a set of files have been deduplicated there can be a slight performance cost when accessing the files. This is
due to the additional processing required to access the file format used by deduplicated files. In this scenario, the
files are a set of VHDX files that see continuous usage by DPM during the backup window. The impact of having
these files deduplicated means that the backup and recovery operations can be slightly slower than without
deduplication. As for any backup product, DPM is a write-heavy workload with read operations being most
important during restore operations. The recommendations for addressing the implications for backup
performance due to deduplication are:
Read/restore operations: Effects on read operations are typically negligible and don't require any special
considerations since the deduplication feature caches deduplicated chunks.
Write / backup operations: Plan for an increase in backup time of approximately 5% to 10 % when defining
the backup window. (This is an increase compared to the expected backup time when writing to non-
deduplicated volumes.)

Monitoring
DPM and data deduplication can be monitored to ensure that:
Sufficient disk space is provisioned to store the backup data
DPM backup jobs are completing normally
Deduplication is enabled on the backup volumes
Deduplication schedules are set correctly
Deduplication processing is completing normally on a daily basis
Deduplication savings rate matches assumptions made for system configuration
The success of deduplication depends on the overall system hardware capabilities (including CPU processing
speed, I/O bandwidth, storage capacity), correct system configuration, the average system load, and the daily
amount of modified data.
You can monitor DPM using the DPM Central Console. See Install Central Console.
You can monitor dedup to check the dedup status, saving rate and schedule status using the following PowerShell
commands:
Get status:

PS C:\> Get-DedupStatus
FreeSpace SavedSpace OptimizedFiles InPolicyFiles Volume
-------------- ---------- -------------- ------------- ------
280.26 GB 529.94 GB 36124 36125 X:
151.26 GB 84.19 GB 43017 43017 Z:

Get savings:

PS C:\> Get-DedupVolume
Enabled SavedSpace SavingsRate Volume
------- ---------- ----------- ------
True 529.94 GB 74 % X:

Get the schedule status using the Get-DedupSchedule cmdlet.


Monitor events
Monitoring the event log can help understand deduplication events and status.
To view deduplication events, in File Explorer, navigate to Applications and Services Logs > Microsoft
> Windows > Deduplication.
If the value LastOptimizationResult = 0x00000000 appears in the Get-DedupStatus |fl Windows
PowerShell results, the entire dataset was processed by the previous optimization job. If not then the
system was unable to complete the deduplication processing and you might want to check your
configuration settings, for example volume size.
For more detailed cmdlet examples, see Monitor and Report for Data Deduplication.
Monitor backup storage
In our configuration example the 7.2 TB volumes are filled with 10 TB of "logical" data (the size of the data when it
is not deduplicated) stored in 10 x 1 TB dynamic VHDX files. As these files accumulate additional backup data,
they'll slowly fill up the volume. If the savings percentage resulting from deduplication is high enough, all 10 files
will be able to reach their maximum logical size but still fit in the 7.2 TB volume (potentially there might even be
additional space to allocate additional VHDX files for DPM servers to use). But if the size savings from
deduplication aren't sufficient, the space on the volume might run out before the VHDX files reach their full logical
size, and the volume will be full. To prevent volumes becoming full we recommend the following:
Be conservative in volume size requirements and allow for some overprovisioning of storage. It is
recommended to allow for a buffer of at least 10% when planning for backup storage usage to allow for
expected variation in deduplication savings and data churn.
Monitor the volumes used for backup storage to ensure that space utilization and deduplication savings
rates are at expected levels.
If the volume becomes full the following symptoms result:
The DPM virtual machine will be put into a pause-critical state and no further backup jobs can be issued by
that VM.
All backup jobs that use the VHDX files on the full volume will fail.
To recover from this condition and restore the system to normal operation, additional storage can be provisioned
and a storage migration of the DPM virtual machine or its VHDX can be performed to free up space:
1. Stop the DPM Server that owns the VHDX files on the full backup share.
2. Create an additional volume and backup share using the same configuration and settings as used for the
existing shares, including settings for NTFS and deduplication.
3. Migrate Storage for the DPM Server virtual machine, and migrate at least one VHDX file from the full
backup share to the new backup share created in step 2.
4. Run a Data Deduplication garbage collection (GC ) job on the source backup share that was full. The GC job
should succeed and reclaim the free space.
5. Restart the DPM Server virtual machine.
6. A DPM consistency check job will be triggered during the next backup window for all data sources which
previously failed.
7. All backup jobs should now succeed.

Summary
The combination of deduplication and DPM provides substantial space savings. This allows higher retention rates,
more frequent backups, and better TCO for the DPM deployment. The guidance and recommendations in this
document should provide you with the tools and knowledge to configure deduplication for DPM storage and see
the benefits for yourself in your own deployment.

Common questions
Q: DPM VHDX files need to be 1TB of size. Does this mean DPM cannot backup a VM or SharePoint or SQL DB
or file volume of size > 1TB?
A: No. DPM aggregates multiple volumes into one to store backups. So, the 1TB file size doesn't have any
implications for data source sizes that DPM can backup.
Q: It looks as though DPM storage VHDX files must be deployed on remote SMB file shares only. What will
happen if I store the backup VHDX files on dedup-enabled volumes on the same system where the DPM virtual
machine is running?
A: As discussed above, DPM, Hyper-V and dedup are storage and compute intensive operations. Combining all
three of them in a single system can lead to I/O and process intensive operations that could starve Hyper-V and its
VMs. If you decide to experiment configuring DPM in a VM with the backup storage volumes on the same
machine, you should monitor performance carefully to ensure that there is enough I/O bandwidth and compute
capacity to maintain all three operations on the same machine.
Q: You recommend dedicated, separate deduplication and backup windows. Why can't I enable dedup while DPM
is backing up? I need to backup my SQL DB every 15 minutes.
A: Dedup and DPM are storage intensive operations and having both of them running at the same time can be
inefficient and lead to I/O starvation. Therefore, to protect workloads more than once a day (for example SQL
Server every 15 minutes) and to enable dedup at the same time, ensures there's enough I/O bandwith and
computer capacity to avoid resource starvation.
Q: Based on the configuration described, DPM needs to be running in a virtual machine. Why can't I enable dedup
on replica volume and shadow copy volumes directly rather than on VHDX files?
A: Dedup does deduplication per volume operating on individual files. Since dedup optimizes at the file level, it is
not designed to support the VolSnap technology that DPM leverages to store its backup data. By running DPM in
a VM, Hyper-V maps the DPM volume operations to the VHDX file level, allowing dedup to optimize backup data
and provide larger storage savings.
Q: The above sample configuration has created only 7.2TB volumes. Can I create bigger or smaller volumes?
A: Dedup runs one thread per volume. As the volume size becomes bigger, dedup requires more time to complete
its optimization. On the other hand with small volumes there is less data in which to find duplicate chunks, which
can result in reduced savings. So, it is advisable to fine tune the volume size based on total churn and system
hardware capabilities for optimal savings. More detailed information on determining volume sizes used with
deduplication can be found in Sizing volumes for Deduplication in Windows Server. For more detailed
information on determining volume sizes used with deduplication see Sizing Volumes for Data Deduplication.
Deploy the DPM protection agent
10 minutes to read

The System Center Data Protection Manager (DPM ) protection agent is software that you install on each
computer that contains data you want to back up with DPM. It consists of two components - the protection agent
itself and an agent coordinator. Here's what it does:
Identifies data that DPM can protect and recover.
Allows the DPM server to browse the shares, volumes, and folders on the protected computer.
Creates a change journal for each protected volume and stores the journal in a hidden file on that volume.
it records any changes to protected data in the change journal, and transfers the journal from the protected
computer to the DPM server so that DPM can synchronize the primary data with the replica.
You'll set up the agent as follows:
If the computer containing data you want to back up is behind a firewall you'll need to set up firewall
exceptions.
If the computer isn't behind a firewall, or you've configured firewall exceptions to allow access, you can
Install the agent from the DPM console.
Alternatively if you don't have access through the firewall, the computer you want to protect is in a
workgroup or untrusted domain, or you simply need to use a different installation method, you can Install
the agent manually and then Attach the agent.

Set up firewall exceptions


For a protection agent to communicate with the DPM server through a firewall, firewall exceptions are required.
Configure an incoming exception for sqlservr.exe for the DPM instance of SQL Server, to allow TCP on port
80.The report server listens for HTTP requests on port 80. The following table lists the protocols and ports
required for communication between the DPM server and protected servers and clients.

PROTOCOL PORT DETAILS


PROTOCOL PORT DETAILS

DCOM 135/TCP The DPM control protocol uses DCOM.


Dynamic DPM issues commands to the
protection agent by invoking DCOM
calls on the agent. The protection agent
responds by invoking DCOM calls on
the DPM server.

TCP port 135 is the DCE endpoint


resolution point used by DCOM.

By default, DCOM assigns ports


dynamically from the TCP port range of
1024 through 65535. However, you
can configure this range by using
Component Services.

Note that for DPM-Agent


communication you must open the
upper ports 1024-65535. To open the
ports, perform the following steps:

1. In IIS 7.0 Manager, in the


Connections pane, click the server-
level node in the tree.
2. Double-click the FTP Firewall
Support icon in the list of features.
3. Enter a range of values for the Data
Channel Port Range.
4. After you enter the port range for
your FTP service, in the Actions pane,
click Apply to save your configuration
settings.

TCP 5718/TCP The DPM data channel is based on TCP.


5719/TCP Both DPM and the protected computer
initiate connections to enable DPM
operations such as synchronization and
recovery.

DPM communicates with the agent


coordinator on port 5718 and with the
protection agent on port 5719.

DNS 53/UDP Used between DPM and the domain


controller, and between the protected
computer and the domain controller,
for host name resolution.

Kerberos 88/UDP 88/TCP Used between DPM and the domain


controller, and between the protected
computer and the domain controller,
for authentication of the connection
endpoint.

LDAP 389/TCP Used between DPM and the domain


389/UDP controller for queries.
PROTOCOL PORT DETAILS

NetBIOS 137/UDP Used between DPM and the protected


138/UDP computer, between DPM and the
139/TCP domain controller, and between the
445/TCP protected computer and the domain
controller, for miscellaneous operations.
Used for SMB directly hosted on TCP/IP
for DPM functions.

Install the agent from the DPM console


1. In DPM Administrator Console, click Management > Agents. Click Install on the tool ribbon to open the
Protection Agent Installation Wizard.
2. On the Select Agent Deployment Method page, click Install agents > Next.
3. On the Select Computers page, DPM displays a list of available computers that are in the same domain
as the DPM server. Add the required computer.
The first time you use the wizard DPM queries Active Directory to get a list of available computers.
After the first installation, DPM stores the list of computers in its database, which is updated once
each day by the auto-discovery process.
To find a computer in another domain that has a two-way trust relationship with the domain that the
DPM server is located in, you must type the fully qualified domain name of the computer that you
want to protect (for example, <Computer1>.Domain1.contoso.com, where Computer1 is the name
of the computer that you want to protect, and Domain1.contoso.com is the domain to which the
target computer belongs.
The Advanced button page is enabled only when there is more than one version of a protection
agent available for installation on the computers. You can use this option to install a previous
version of the protection agent that was installed before you upgraded DPM server to a more
recent version.
4. On the Enter Credentials page, type the user name and password for a domain account that is a member
of the local Administrators group on all selected computers.
In the Domain box, accept or type the domain name of the user account that you are using to install
the protection agent on the target computer. This account may belong to the domain that the DPM
server is located in or to a domain that has a two-way trust relationship with the domain that the
DPM server is located in.
If you're installing a protection agent on a computer across a trusted domain, enter your current
domain user credentials. You can be a member of any domain that has a two-way trust relationship
with the domain that the DPM server and you must be member of the local Administrators group
on all selected computers on which you want to install an agent.
If you select a node in a cluster, DPM detects all additional nodes in the cluster and displays the
Select Cluster Nodes page.
5. On the Select Cluster Nodes page, select an option that you want DPM to use for installing agents on
additional nodes in the cluster, and then click Next.
6. On the Choose Restart Method page, select the method to use to restart the selected computers after the
protection agent is installed. The computer must be restarted before you can start protecting data. A
restart is necessary to load the volume filter that DPM uses to track and transfer block-level changes
between the DPM server and the protected computers.
If you select to restart the computers later the protection agent installation status isn't refreshed
automatically on the Agents tab in the Management task area after the computer restart, and
you'll need to click Refresh Information.
Note that you don't need to restart the computer if you are installing a protection agent on another
DPM server.
If any of the computers that you selected are nodes in a cluster, an additional Choose Restart
Method page appears that you can use to select the method to restart the clustered computers.
You'll need to install a protection agent on all nodes in a cluster to successfully protect the clustered
data. The computers must be restarted before you can start protecting data. Because of the time
required to start services, it might take a few minutes after a restart before DPM can contact the
agent on the cluster.
DPM will not automatically restart a computer that belongs to a Microsoft Cluster Server (MSCS )
cluster. You must manually restart computers in an MSCS cluster.
7. On the Summary page, click Install to begin the installation. If the EULA appears accept it for installation
to start. On the Task tab of the Installation page you can see whether the installation is successful. You can
click Close before the wizard is finished and monitor the installation progress in Agents tab in the
Management task area. If the installation is unsuccessful, you can view the alerts in the Monitoring task
area on the Alerts tab.
Note: After you install a protection agent on a computer that is part of a Windows SharePoint Services
farm, each of the computers in the farm will not appear as protected computers on theAgents tab in the
Management task area, only the computer that you selected. However, if the Windows SharePoint
Services farm has data on the selected computer, DPM protects the data on all of the computers in the
farm, provided all of them have the protection agent installed.

Install the agent manually


1. If you install the agent on a computer behind a firewall, you need to make sure that the agent can be
pushed out through the firewall.
For example, you can run the following command on the computer to configure Windows Firewall: netsh
advfirewall firewall add rule name="Allow DPM Remote Agent Push" dir=in action=allow
service=any enable=yes profile=any remoteip=<IPAddress>, where IPAddress is the address of the
DPM server.
To configure the ports exception on the firewall, see Configure firewall exceptions for the agent.
2. On the computer that you want to protect, open an elevated Command Prompt window, and then run the
following commands:
To assign a drive letter, type: net use Z: \<DPMServerName>\c$ where Z is the local drive letter that
you want to assign and <DPMServerName> is the name of the DPM server that will protect the computer.
To change the directory, do the following:
For a 64-bit computer type cd /d <assigned drive letter>:\Program Files\Microsoft
DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\amd64 where <assigned drive
letter> is the drive letter that you assigned in the previous step and <build number> is the latest
DPM build number. For example: cd /d X:\Program Files\Microsoft
DPM\DPM\ProtectionAgents\RA\3.0.7696.0\amd64
For a 32-bit computer type: cd /d <assigned drive letter>:\Program Files\Microsoft
DPM\DPM\ProtectionAgents\RA\5.0.<build number&gtl;.0\i386 where <assigned drive
letter> is the drive that you mapped in the previous step and <build number> is the latest DPM
build number.
3. To install the protection agent open an elevated Command Prompt window, and then run one of the
following commands:
For a 64-bit computer type: DpmAgentInstaller_x64.exe <DPMServerName> where
<DPMServerName> is the fully qualified domain name (FQDN ) of the DPM server.For example:
DPMAgentInstaller_x64.exe DPMserver1.contoso.com
For a 32-bit computer type: DpmAgentInstaller_x86.exe where <DPMServerName> is the fully
qualified domain name of the DPM server.
Note:
To perform a silent installation, you can use the /q option after the DpmAgentInstaller_x64.exe
command.For example: DpmAgentInstaller_x64.exe /q <DPMServerName>
To accept the EULA manually in a silent installation use DpmAgentInstaller_x64.exe /q
<DPMServerName> /IAcceptEULA
If you specify a DPM server name in the command line, it installs the protection agent, and
automatically configures the security accounts, permissions, and firewall exceptions necessary for
the agent to communicate with the specified DPM server. If you didn't specify a server name, open
an elevated Command Prompt on the targeted computer and do the following:
a. To change the directory type: cd /d <system drive>:\Program Files\Microsoft Data
Protection Manager\DPM\bin
b. Type: SetDpmServer.exe -dpmServerName <DPMServerName>. This configure
security accounts, permissions, and firewall exceptions for the agent to communicate with the
server.
4. If you added the computer to the DPM server before you installed the agent, the server begins to create
backups for the protected computer. If you installed the agent before you added the computer to the DPM
server, you must attach the computer before the DPM server begins to create backups.

Attach the agent


After you've installed the DPM agent manually you'll need to attach the agent to the DPM server.
1. In DPM Administrator Console, on the navigation bar, click Management > Agents. In the Actions pane,
click Install.
2. On the Select Agent Deployment Method page, select Attach agents > Computer on a trusted
domain > Next. The Protection Agent Installation Wizard opens.
3. On the Select Computers page, DPM displays a list of available computers in the same domain as the
DPM server. Select one or more computers (50 maximum), from the Computer name list > Add > Next.
If this is the first time you have used the wizard, DPM queries Active Directory to get a list of
potential computers. After the first installation, DPM displays the list of computers in its database,
which is updated once each day by the auto-discovery process.
To add multiple computers by using a text file, click the Add From File button, and in the Add
From File dialog box, type the location of the text file or click Browse to navigate to its location.
4. On the Enter Credentials page, type the user name and password for a domain account that is a member
of the local Administrators group on all selected computers. In the Domain box, accept or type the domain
name of the user account that you are using to install the protection agent on the target computer. This
account may belong to the domain that the DPM server is located in or to a trusted domain. If you are
installing a protection agent on a computer across a trusted domain, enter your current domain user
credentials. You can be a member of any trusted domain, and you must be a member of the local
Administrators group on all selected computers that you want to protect.
5. On the Summary page, click Attach.
Deploy protection groups
11 minutes to read

A System Center Data Protection Manager (DPM ) protection group is a collection of data sources such as
volumes, shares, or application workloads, which have common backup and restore settings. The protection group
settings specify:
Data sources - The servers, computers, and workloads you want to protect.
Back-up storage - How the protected data should be backed up in the short-term and long-term.
Recovery points - The recovery points from which replicated data can be recovered.
Allocated disk space - The disk space allocated to data from the storage pool.
Initial replication - How the initial replication of data should be handled, using either over the network or
manually offline.
Consistency checks - How replicated data should be checked for consistency.
The topics in this section provide guidelines for making the decisions involved in creating a protection group.

Plan protection groups


You need to decide:
How to group resources you want to back up into protection groups.
How to store the protection group backup data?
How much storage space is required to store data for the protection group?
How to recover backup data for the protection group?
There are a few common ways to organize your protection groups:
By computer - All data sources for a computer belong to the same protection group. Organizing by
computer provides a single point of adjustment for the computer's performance loads. However, all data
sources have the same backup and recovery settings.
By workload - You separate files and each application data type into different protection groups.
Organizing by workload allows you to manage workloads as a group. However, recovering a multi-
application server might require multiple tapes from different protection groups.
By RPO/RTO - Gather data sources with similar Recovery Point Objectives (RPOs) and Recovery Time
Objectives (RTOs) in protection groups. You control the RPO by setting the synchronization frequency for
the protection group which determines the amount of potential data loss (in time) during unexpected
outages. The RTO is the acceptable amount of time that data is unavailable. The storage methods you select
for the protection group directly impacts the RTO.
By data characteristics - For example how often data changes, how rapidly it grows, or its storage
requirements.

Choosing a name for the protection group


When choosing a name for your Protection Group, the name should be meaningful. The name must be unique to
the DPM server. The Protection Group name can include any combination of alphanumeric characters and spaces,
but it cannot be longer than 64 characters. DPM does not support special characters such as | , / , ( , ) , or . .

Figure out how much storage space you need


When you create a protection group and select disk-based protection, you must allocate space on the storage pool
for the replicas and recovery points for each data source that you have selected for membership in the group, and
you must allocate space on protected file servers or workstations for the change journal.
To help you figure out storage capacity, use the Storage Calculator for DPM with Modern Backup Storage
DPM provides default space allocations for the members of the protection group. The following table shows how
DPM calculates the default allocations.

COMPONENT DEFAULT ALLOCATION LOCATION

DPM storage Data source size x (1 + log change x DPM storage pool or custom volume
Retention Range in Days x Number of
backups per day) x (1.05)

For SQL Server data:


- Data source size x (1 + log change x
Retention Range in Days x Number of
backups per day) x (1.05) + Transaction
Logs

DPM Database 2 GB DPM Server storage


(may increase for SharePoint backups)

Change journal (for file-protection only) 300 MB Protected volume on the file server or
workstation

Log change - the change rate on the database or storage group in question. Log change varies, but for the
purposes of the default recommendation in DPM, log change is defined as 3%.
Retention range (RR) - The number of recovery points stored. The DPM default recommendation is five
recovery points.
When you create a protection group, in the Modify Disk Allocation dialog box, the Data Size column for each
data source displays a Calculate link. For the initial disk allocation, DPM applies the default formulas to the size
of the volume on which the data source is located. To apply the formula to the actual size of the selected data
source, click the Calculate link. DPM will determine the size of the data source and recalculate the disk allocation
for the recovery point and replica volumes for that data source. This operation can take several minutes to
perform.
Accept the default space allocations unless you are certain that they do not meet your needs. Overriding the
default allocations can result in allocation of too little or too much space.
Allocation of too little space for the recovery points can prevent DPM from storing enough recovery points to
meet your retention range objectives. Allocation of too much space wastes disk capacity.
After creating a protection group, if you allocated too little space for a data source, increase the allocations for the
replica and recovery point volumes for each data source.
If you allocated too much space for the protection group, remove the data source from the protection group and
delete the replica, Then, add the data source to the protection group with smaller allocations.
Set up protection groups
When you set up a protection group here's what you'll need to do:
Before you start
Some things to note when creating protection groups:
If you're backing up to tape and you have only a single stand-alone tape, use a single protection group to
minimize the effort to change tapes. Multiple protection groups require a separate tape for each protection
group.
Data sources on a computer must be protected by the same DPM server. In DPM a data source is a
volume, share, database, or storage group that is a member of a protection group.
You can include data sources from more than one computer in a protection group.
Protection group members cannot be moved between protection groups. If you decide later that a
protection group member needs to be in a different protection group, you must remove the member from
its protection group and then add it to a different protection group.
If the members of a protection group no longer require protection, stop protection of the protection group.
When you stop protection, your options are to retain protected data or to delete protected data.
Retain protected data option: Retains the replica on disk with associated recovery points and
tapes for the specified retention range.
Delete protected data option: Deletes the replica on disk and expires data on the tapes.
When you select a parent folder or share, its subfolders are automatically selected. You can designate
subfolders for exclusion and also exclude file types by extension.
Verify that you do not have more than a 100 protectable data sources on a single volume. If you do,
distribute your data sources across more volumes if possible.
When you select a data source that contains a reparse point, DPM asks whether to include the reparse
point target in the protection group. Mount points and junction points are data sources that contain reparse
points. If you include the reparse point, it is not replicated; you must manually re-create the reparse point
when you recover the data.
Protection groups are created with the Create New Protection Group wizard with the following settings:
Select Group Members: Specify the machines and sources you want to back up.
Select data protection method : Specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
Select short-term goals: Specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you
can check Just before a recovery point so that DPM will run an express full backup just before each
recovery point is scheduled.
Specify long-term goals: Indicate how long you want to keep tape data (1-99 years). In Frequency of
backup specify how often backups to tape should run. The frequency is based on the retention range you've
specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly,
or monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
You'll also need to specify the tape device/library you want to use, and whether data should be compressed
and encrypted on tape.
Review disk allocation: You review the storage pool disk space allocated for the protection group. DPM
provides a recommended size. You can select to Automatically grow the volumes to automatically
increase size when more disk space is required for backup.
Choose replica creation method: Specify how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
In Choose consistency check options: Select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time.
Specify online protection data: If you want to back up to the cloud with Azure Backup, specify the
workloads you want to back up.
Specify online backup schedule : If you're backing up to Azure specify how often incremental backups
to Azure should occur. You can schedule backups to run every day/week/month/year and the time/date at
which they should run. Backups can occur up to twice a day. Each time a back up runs a data recovery point
is created in Azure from the copy of the backed up data stored on the DPM disk.
Specify online retention policy: If you're backing up to Azure you can specify how the recovery points
created from the daily/weekly/monthly/yearly backups are retained in Azure.
Choose online replication: If you're backing up to Azure specify how the initial full replication of data will
occur. You can replicate over the network, or do an offline backup (offline seeding). Offline backup uses the
Azure Import feature. Read more.

Initial replication options


When you create a protection group, you must choose a method for creating the initial replica, which copies all
the data selected for protection to the DPM server and then runs synchronization with consistency check for each
of the replicas.
Initial replication over the network
DPM can create the replicas automatically over the network, or you can create the replicas manually by restoring
the data from removable media such as tape. Automatic replica creation is easier, but, depending on the size of the
protected data and the speed of the network, manual replica creation can be faster.
To help you choose a replica creation method, the following table provides estimates for how long DPM takes to
create a replica automatically over the network given different protected data sizes and network speeds. The
estimates assume that the network is running at full speed and that other workloads are not competing for
bandwidth. Times are shown in hours.
Hours to Complete Automatic Replica Creation at Different Network Speeds
SIZE OF
PROTECTED DATA 512 KBPS 2 MBPS 8 MBPS 32 MBPS 100 MBPS

1 GB 6 1.5 <1 <1 <1

50 GB 284 71 18 5 1.5

200 GB 1137 284 71 18 6

500 GB 2844 711 178 45 15

Offline replication for Azure Backup


When you're backing up data from the DPM server to Azure you can do the initial replication over the network or
using offline seeding. Read more.
Initial replication manually
If you are deploying DPM to protect data over a WAN and your protection group includes more than 5 GB of
data, we recommend that you choose the manual method for creating the replicas.
If you choose manual replica creation, DPM specifies the precise locations on the DPM server where you must
create the replicas. Typically, you create the replicas by restoring your most recent backup of the data source from
removable media such as tape. After you restore the data, you complete the process by running synchronization
with consistency check for each of the replicas.
It is crucial that when you restore the data to the DPM server to create the replica, you retain the original
directory structure and properties of the data source, such as time stamps and security permissions. The more
discrepancies that exist between the replicas and the protected data source, the longer the consistency checking
part of the process takes. If you do not preserve the original directory structure and properties, manual replica
creation can take as long as automatic replica creation.

Naming a Protection Group


When you name the protection group, provide a unique, meaningful name for the group. The name can include
any combination of alphanumeric characters and can include spaces, but cannot exceed 64 characters.
Configure firewall settings in DPM
5 minutes to read

A common question that arises during System Center Data Protection Manager (DPM ) server deployment, and
DPM agent deployment, concerns which ports have to be opened on the firewall. This article introduces the
firewall ports and protocols that DPM uses for network traffic. For more information about firewall exceptions for
DPM clients, go to: Configure firewall exceptions for the agent.

PROTOCOL PORT DETAILS

DCOM 135/TCP Dynamic DCOM is used by the DPM server and


the DPM protection agent to issue
commands and responses. DPM issues
commands to the protection agent by
invoking DCOM calls on the agent. The
protection agent responds by invoking
DCOM calls on the DPM server.

TCP port 135 is the DCE endpoint


resolution point that is used by DCOM.
By default, DCOM assigns ports
dynamically from the TCP port range of
1024 through 65535. However, you can
use Component Services to adjust the
TCP port range. To do this, follow these
steps:

1. In IIS 7.0 Manager, in the


Connections pane, click the server-level
node in the tree.
2. In the list of features, double-click the
FTP Firewall Support icon.
3. Enter a range of values for the Data
Channel Port Range for your FTP
service.
4. In the Actions pane, click Apply to
save your configuration settings.

TCP 5718/TCP The DPM data channel is based on TCP.


Both DPM and the protected computer
5719/TCP initiate connections to enable DPM
operations such as synchronization and
recovery. DPM communicates with the
agent coordinator on port 5718 and
with the protection agent on port 5719.

TCP 6075/TCP Enabled when you create a protection


group to help protect client computers.
Required for end-user recovery.

An exception in Windows Firewall


(DPMAM_WCF_Service) is created for
the program Amscvhost.exe when you
enable Central Console for DPM in
Operations Manager.
PROTOCOL PORT DETAILS

DNS 53/UDP Used for host name resolution between


DPM and the domain controller, and
between the protected computer and
the domain controller.

Kerberos 88/UDP Used for authentication of the


connection endpoint between DPM and
88/TCP the domain controller, and between the
protected computer and the domain
controller.

LDAP 389/TCP Used for queries between DPM and the


domain controller.
389/UDP

NetBios 137/UDP Used for miscellaneous operations


between DPM and the protected
138/UDP computer, between DPM and the
domain controller, and between the
139/TCP protected computer and the domain
controller. Used for DPM functions for
445/TCP Server Message Block (SMB) when it is
directly hosted on TCP/IP.

Windows Firewall settings


If Windows Firewall is enabled when you install DPM, the DPM setup configures the Windows Firewall settings as
required together with the rules and exceptions. The settings are summarized in the following table.
Note:
If you’re looking for information about how to set up firewall exceptions for computers that DPM helps
protect, see Configure firewall exceptions for the agent.
If Windows Firewall wasn’t available when you installed DPM, see How to configure Windows Firewall
manually.
If you’re running the DPM database on a remote instance of SQL Server, you’ll have to set up several
firewall exceptions on the remote instance of SQL Server. See Set up Windows Firewall on the remote
instance of SQL Server.

RULE NAME DETAILS PROTOCOL PORT

Microsoft System Center Required for DCOM DCOM 135/TCP Dynamic


2012 Data Protection communications between
Manager DCOM Setting the DPM server and
protected computers.

Microsoft System Center Exception for Msdpm.exe All protocols All ports
2012 Data Protection (the DPM service). Runs on
Manager the DPM server.
RULE NAME DETAILS PROTOCOL PORT

Microsoft System Center Exception for Dpmra.exe All protocols All ports
2012 Data Protection (protection agent service
Manager Replication Agent that is used to back up and
restore data). Runs on the
DPM server and protected
computers.

How to configure Windows Firewall manually


1. In Server Manager, select Local Server > Tools > Windows Firewall with Advanced Security.
2. In the Windows Firewall with Advanced Security console, verify that Windows Firewall is on for all
profiles, and then click Inbound Rules.
3. To create an exception, in the Actions pane, click New Rule to open the New Inbound Rule Wizard.
On the Rule Type page, verify that Program is selected, and then click Next.
4. Configure exceptions to match the default rules that would have been created by DPM Setup if Windows
Firewall had been enabled when DPM was installed.
a. To manually create the exception that matches the default Microsoft System Center 2012 R2 Data
Protection Manager rule on the Program page, click Browse for the This program path box, and
then browse to <system drive letter>:\Program Files\Microsoft DPM\DPM\bin > Msdpm.exe
> Open> Next.
On the Action page leave the default setting of Allow the connection, or change the settings
according to your organization’s guidelines > Next.
On the Profile page, leave the default settings of Domain, Private, and Public, or change the
settings according to your organization’s guidelines > Next.
On the Name page, type a name for the rule and optionally a description > Finish.
b. Now follow the same steps to manually create the exception that matches the default Microsoft
System Center 2012 R2 Data Protection Replication Agent rule by browsing to <system drive
letter>:\Program Files\Microsoft DPM\DPM\bin, and selecting Dpmra.exe.
Be aware that if you’re running System Center 2012 R2 with SP1 the default rules will be named by
using Microsoft System Center 2012 Service Pack 1 Data Protection Manager.

Set up Windows Firewall on the remote instance of SQL Server


If you use a remote instance of SQL Server for your DPM database, as part of the process, you’ll have to
configure Windows Firewall on that remote instance of SQL Server.
After the SQL Server installation is complete, the TCP/IP protocol should be enabled for the DPM instance
of SQL Server together with the following settings:
Default failure audit
Enabled password policy checking
Configure an incoming exception for sqlservr.exe for the DPM instance of SQL Server to allow TCP on port
80. The report server listens for HTTP requests on port 80.
The default instance of the database engine listens on TCP port 1443. This setting can be changed. To use
the SQL Server Browser service to connect to instances that don’t listen on the default 1433 port, you’ll
need UDP port 1434.
By default, a named instance of SQL Server uses Dynamic ports. This setting can be changed.
You can see the current port number that is being used by the database engine in the SQL Server error log.
You can view error logs by using SQL Server Management Studio and connecting to the named instance.
You can view the current log under Management – SQL Server Logs in the entry “Server is listening on
[‘any’ <ipv4> port_number].”
You’ll have to enable remote procedure call (RPC ) on the remote instance of SQL Server.
Back up Hyper-V virtual machines
24 minutes to read

System Center Data Protection Manager (DPM ) protects Hyper-V virtual machines by backing up virtual
machine's data. You can back data up at the Hyper-V host level to enable VM -level and file-level data recovery, or
back up at the guest-level to enable application-level recovery.

Supported scenarios
DPM can back up virtual machines running on Hyper-V host servers in the following scenarios:
Virtual machines with local or direct storage - Back up virtual machines hosted on Hyper-V host
standalone servers that have local or directly attached storage. For example a hard drive, a storage area
network (SAN ) device, or a network attached storage (NAS ) device. The DPM protection agent must be
installed on all hosts.
Virtual machines in a cluster with CSV storage - Back up virtual machines hosted on a Hyper-V cluster
with Cluster Shared Volume (CSV ) storage. DPM 2012 SP1 introduced express full backup, parallel
backups, and cluster query improvements for CSV backup. The DPM protection agent is installed on each
cluster node.
Virtual machines with SMB storage - Back up virtual machines hosted on a Hyper-V standalone server
or cluster with SMB 3.0 file server storage. SMB shares are supported on a standalone file server or on a file
server cluster. If you're using an external SMB 3.0 file server the DPM protection agent should be installed
on it. If the storage server is clustered, the agent should be installed on each cluster node. You'll need full-
share and folder-level permissions for the machine$ account of the application server on the SMB share.
Back up virtual machines configured for live migration - Live migration allows you to move virtual
machines from one location to while providing uniterrupted access. You can migrate virtual machines
between two standalone servers, within a single cluster, or between standalone and cluster nodes. Multiple
live migrations can run concurrently. You can also perform a live migration of virtual machine storage so
that virtual machines can be moved to new storage locations while they continue to run. DPM can back up
virtual machines that are configured for live migration. Read more.
Back up replica virtual machines - Back up replica virtual machines running on a secondary server (DPM
2012 R2 only)
Learn about supported DPM and Hyper-V versions in What can DPM back up? .

Host vs Guest backup


DPM can perform a host or guest-level backup of Hyper-V VMs. At the host level the DPM protection agent is
installed on the Hyper-V host server or cluster and protects the entire VMs and data files running on that host. At
the guest level the agent is installed on each virtual machine and protects the workload present on that machine.
Both methods have pros and cons:
Host-level backups are flexible because they work regardless of the type of OS running on the guest
machines and don't require the installation of the DPM protection agent on each VM. If you deploy host
level back you'll be able to recover an entire virtual machine, or files and folders (item-level recovery).
Guest-level back is useful if you want to protect specific workloads running on a virtual machine. At host-
level you can recover an entire VM or specific files, but it won't provide recover in the context of a specific
application. For example to be able to recover specific SharePoint items from a backed up VM then you
should do guest-level backup of that VM. Note that you must use guest-level backup if you want to protect
data stored on passthrough disks. Passthrough allow the virtual machine to directly access the storage
device and don't store virtual volume data in a VHD file.

Online and offline backup


IMPORTANT
Depending on your DPM configuration, and what you are protecting, DPM's online and offline backup behavior differs. If you
use DPM 2012 R2 with UR3 (or later) to protect Hyper-V on Windows Server 2012 R2 (or later), the VMs continue running
during the backup process. In this case, the rest of this section does not apply.

If you protect a Hyper-V server on Windows Server 2012, or if you use DPM 2012 R2 with UR1 or UR2, the
following section applies to your configuration:
DPM works seamlessly with the Hyper-V Volume Shadow Copy Services (VSS ) writer to ensure that consistent
versions of virtual machines are captured and protected without affecting virtual machine access. The ability to
back up open files is critical for business continuity. By default, DPM performs online backups that don't affect the
availability of virtual machines. To perform an online backup the following is required:
The Backup integration service must be enabled, so the operating system running on the virtual machine
running must support Hyper-V integration services.
The guest operating system must support VSS (Windows 2003 server or later). Online backup isn't
supported if virtual machines are running Linux.
There should be no dynamic disks on the virtual machine.
All volumes must be NTFS
The VSS storage assignment for the volumes shouldn't be modified.
The virtual machine must be running, and if the virtual machine is in a cluster the cluster resource group
should be online. A Shadow Storage assignment of a volume inside the virtual machine mustn't be explicitly
set to a different volume other than itself.
If these conditions aren't met DPM will perform an offline backup where the virtual machine is paused and placed
in a saved state while the snapshot is taken, and then the virtual machine is resumed. This means the virtual
machine is unavailable during the backup, usually a short period of less than a minute for many environments.

How the Backup process works


DPM performs backup with VSS as follows. The steps in this description are numbered to help with clarity.
1. The DPM block-based synchronization engine makes an initial copy of the protected virtual machine and
ensures that the copy of the virtual machine is complete and consistent.
2. After the initial copy is made and verified, DPM uses the Hyper-V VSS writer to capture backups. The VSS
writer provides a data-consistent set of disk blocks that are synchronized with the DPM server. This
approach provides the benefit of a "full backup" with the DPM server, while minimizing the backup data that
must be transferred across the network.
3. The DPM protection agent on a server that is running Hyper-V, uses the existing Hyper-V APIs to
determine whether a protected virtual machine also supports VSS.
If a virtual machine complies with the requirements for online backup and has the Hyper-V
integration services component installed, then the Hyper-V VSS writer recursively forwards the VSS
request through to all VSS -aware processes on the virtual machine. This operation occurs without
the DPM protection agent being installed on the virtual machine. The recursive VSS request allows
the Hyper-V VSS writer to ensure that disk- write operations are synchronized so that a VSS
snapshot is captured without the loss of data.
The Hyper-V integration services component invokes the Hyper-V VSS writer in Volume Shadow
Copy Services (VSS ) on virtual machines to ensure that their application data is in a consistent state.
If the virtual machine doesn't comply with online backup requirements, DPM automatically uses the
Hyper-V APIs to pause the virtual machine before they capture data files.
4. After the initial baseline copy of the virtual machine synchronizes with the DPM server, all changes that are
made to the virtual machine resources are captured in a new recovery point. The recovery point represents
the consistent state of the virtual machine at a specific time. Recovery point captures can occur at least one
time a day. When a new recovery point is created, DPM uses block-level replication in conjunction with the
Hyper-V VSS writer to determine which blocks have been altered on the server that is running Hyper-V
after the last recovery point was created. These data blocks are then transferred to the DPM server and are
applied to the replica of the protected data.
5. The DPM server uses VSS on the volumes that host recovery data so that multiple shadow copies are
available. Each of these shadow copies provides a separate recovery. VSS recovery points are stored on the
DPM server. The temporary copy that is made on the server running Hyper-V, is only stored for the
duration of the DPM synchronization.

Backup prerequisites
These are the prerequisites for backing up Hyper-V virtual machines with DPM.

PREREQUISITE DETAILS
PREREQUISITE DETAILS

DPM prerequisites - If you want to perform item-level recovery for virtual


machines (recover files, folders, volumes) then you'll need to
install the Hyper-V role on the DPM server. If you only want
to recover the virtual machine and not item-level then the role
isn't required.
- You can protect up to 800 virtual machines of 100 GB each
on one DPM server and allows multiple DPM servers that
support larger clusters.
- DPM excludes the page file from incremental backups to
improve virtual machine backup performance.
- DPM can backup a Hyper-V server or cluster in the same
domain as the DPM server, or in a child or trusted domain. If
you want to backup Hyper-V in a workgroup or an untrusted
domain you'll need to set up authentication. For a single
Hyper-V server you can use NTLM or certificate
authentication. For a cluster you can use certificate
authentication only.
- Using host-level backup to back up virtual machine data on
passthrough disks isn't supported. In this scenario we
recommend you use host-level back to backup VHD files and
guest-level back to back up the other data that isn't visible on
the host.
- When protecting a Hyper-V cluster using scaled-out DPM
protection (multiple DPM server protecting a large Hyper-V
cluster) you can't add secondary protection for the protected
Hyper-V workloads.
- You can only backup replica virtual machines if DPM is
running System Center 2012 R2 and the Hyper-V host is
running on Windows Server 2012 R2.
- You can back up deduplicated volumes.

Hyper-V VM prerequisites - The version of Integration Components that is running on


the virtual machine should be the same as the version of
Hyper-V on the server that is running Hyper-V.
- For each virtual machine backup you'll need free space on
the volume hosting the virtual hard disk files to allow Hyper-V
enough room for differencing disks (AVHD's) during backup.
The space must be at least equal to the calculation Initial disk
size*Churn rate*Backup window time. If you're running
multiple backups on a cluster, you'll need enough storage
capacity to accommodate the AVHDs for each of the virtual
machines using this calculation.
- If you want to backup virtual machines located on a Hyper-V
host servers running Windows Server 2012 R2, the virtual
machine should have a SCSI controller specified, even if it's not
connected to anything. This is because for online backup in
Windows Server 2012 R2 the Hyper-V host mounts a new
VHD in the VM and then dismounts it later. Only the SCSI
controller can support this and thus is required for online
backup of the virtual machine. The SCSI controller doesn't it
became clear why we need this SCSI controller. Without this
setting, event ID 10103 will be issued when you try to back
up the virtual machine.

Linux prerequisites - You can backup Linux virtual machines using DPM 2012 R2.
Only file-consistent snapshots are supported.
PREREQUISITE DETAILS

Back up VMs with CSV storage - For CSV storage, install the Volume Shadow Copy Services
(VSS) hardware provider on the Hyper-V server. Contact your
storage area network (SAN) vendor for the VSS hardware
provider.
- If a single node shuts down unexpectedly in a CSV cluster,
DPM will perform a consistency check against the virtual
machines that were running on that node.
- If you need to restart a Hyper-V server that has BitLocker
Drive Encryption enabled on the CSV cluster, you must run a
consistency check for Hyper-V virtual machines.

Back up VMs with SMB storage - Turn on auto-mount on the server that is running Hyper-V
to enable virtual machine protection.
- Disable TCP Chimney Offload.
- Ensure that all Hyper-V machine$ accounts have full
permissions on the specific remote SMB file shares.
- Ensure that the file path for all virtual machine components
during recovery to alternate location is less than 260
characters. If not, recovery might succeed, but Hyper-V
cannot mount the virtual machine.
- The following scenarios are not supported:
Deployments where some components of the virtual machine
are on local volumes and some components are on remote
volumes; an IPv4 or IPv6 address for storage location file
server., and recovery of a virtual machine to a computer that
uses remote SMB shares.
- You'll need to enable the File Server VSS Agent service on
each SMB server - Add it in Add roles and features > Select
server roles > File and Storage Services > File Services >
File Service > File Server VSS Agent Service.

Back up virtual machines


1. Set up your DPM server and your storage. When setting up your storage, use these storage capacity
guidelines.
Average virtual machine size - 100 GB
Number of virtual machines per DPM server - 800
Total size of 800 VMs - 80 TB
Required space for backup storage - 80 TB
2. Set up the DPM protection agent on the Hyper-V server or Hyper-V cluster nodes. If you're doing guest-
level backup you'll install the agent on the VMs you want to back up at the guest-level.
3. In the DPM Administrator console click Protection > Create protection group to open the Create New
Protection Group wizard.
4. On the Select Group Members page, select the VMs you want to protect from the Hyper-V host servers
on which they're located. We recommend you put all VMs that will have the same protection policy into one
protection group. To make efficient use of space, enable colocation. Colocation allows you to locate data
from different protection groups on the same disk or tape storage, so that multiple data sources have a
single replica and recovery point volume.
5. On the Select Data Protection Method page, specify a protection group name. Select I want short-term
protection using Disk and select I want online protection if you want to back up data to Azure using the
Azure Backup service. If this option isn't available complete the wizard to create the group and then modify
the protection group settings to select this option. You can store data in Azure for up to 3360 days.
If you have a standalone tape or tape library connected to the DPM server you'll be able to select I want
long-term protection using tape.
6. In Specify Short-Term Goals > Retention range, specify how long you want to retain disk data. In
Synchronization frequency specify how often incremental backups of the data should run. Alternatively,
instead of selecting an interval for incremental backups you can enable Just before a recovery point. With
this setting enabled DPM will run an express full back just before each scheduled recovery point.
If you're protecting application workloads, recovery points are created in accordance with
Synchronization frequency, provided the application supports incremental backups. If it doesn't then
DPM runs an express full backup, instead of an incremental backup, and creates recovery points in
accordance with the express backup schedule.
If you enable long-term storage to tape, in Specify Long-Term Goals > Retention range, specify
how long you want to keep your tape data (1-99 years). In Frequency of backup select the backup
frequency that you want.
The backup frequency is based on the specified retention range. When the retention range is 1-99
years, you can select backups to occur daily, weekly, bi-weekly, monthly, quarterly, half-yearly, or
yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly. When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups
until there is insufficient space on the tape. If you enabled colocation, data resources are colocated on
the tape.
If you configured long-term storage to tape, on the Select Tape and Library Details page specify
the tape and library that'll be used for back up of this protection group. You can also specify whether
to compress or encrypt the backup data.
7. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
8. On the Choose Replica Creation Method page, specify how the initial replication of data in the protection
group will be performed. If you select to replicate over the network we recommended you choose an off-
peak time. For large amounts of data or less than optimal network conditions, consider replicating the data
offline using removable media.
9. On the Consistency Check Options page, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group and selecting Perform Consistency Check.
After you create the protection group, initial replication of the data occurs in accordance with the method
you selected. After initial replication, each backup takes place in line with the protection group settings. If
you need to recover backed up data note the following:

Back up virtual machines configured for live migration


When virtual machines are involved in live migration, DPM continues to protect the virtual machines as long as the
DPM protection agent is installed on the Hyper-V host. The way in which DPM protects the virtual machines
depends on the type of live migration involved.
Live migration within a cluster - When a virtual machine is migrated within a cluster DPM detects the
migration, and backs up the virtual machine from the new cluster node without any requirement for user
intervention. Because the storage location hasn't changed, DPM continues with express full backups. In a scaled
scenario with two DPM servers to protect the cluster, a virtual machine that is protected by DPM1 continues to be
protected by DPM1, no matter where the virtual machine is migrated.
Live migration outside the cluster - When a virtual machine is migrated between stand-alone servers, different
clusters, or between a stand-alone server and a cluster, DPM detects the migration, and can back up the virtual
machine without user intervention.
Requirements for maintaining protection
The following are requirements for maintaining protection during live migration:
The Hyper-V hosts for the virtual machines must be located in a System Center VMM cloud on a VMM
server running at least System Center 2012 with SP1.
The DPM protection agent must be installed on all Hyper-V hosts.
DPM servers must be connected to the VMM server. All Hyper-V host servers in the VMM cloud must also
be connected to the DPM servers. This allows DPM to communicate with the VMM server so DPM can find
out on which Hyper-V host server the virtual machine is currently running, and to create a new backup from
that Hyper-V server. If a connection can't be established to the Hyper-V server, the back up fails with a
message that the DPM protection agent is unreachable.
All DPM servers, VMM servers, and Hyper-V host servers must be in the same domain.
Details about live migration
Note the following for backup during live migration:
Live migration protection doesn't support backup to tape.
If a live migration transfers storage, DPM performs a full consistency check of the virtual machine, and then
continues with express full backups. When live migration of storage occurs, Hyper-V reorganizes the virtual
hard disk (VHD ) or VHDX which causes a one-time spike in the size of the DPM backup data.
On the virtual machine host, turn on auto-mount to enable virtual protection, and disable TCP Chimney
Offload.
DPM uses port 6070 as the default port for hosting the DPM -VMM Helper Service. To change the registry:
1. Navigate to HKLM\Software\Microsoft\Microsoft Data Protection Manager\Configuration.
2. Create a 32-bit DWORD value: DpmVmmHelperServicePort, and write the updated port number as part
of the registry key.
3. Open
<Install directory>\Microsoft System Center
2012\DPM\DPM\VmmHelperService\VmmHelperServiceHost.exe.config
, and change the port number from 6070 to the new port. For example:
<add baseAddress="net.tcp://localhost:6080/VmmHelperService/" />
4. Restart the DPM -VMM Helper service, and restart the DPM service.
Set up protection for live migration
To set up protection for live migration:
1. Set up the DPM server and its storage, and install the DPM protection agent on every Hyper-V host server
or cluster node in the VMM cloud. If you're using SMB storage in a cluster, install the DPM protection agent
on all cluster nodes.
2. Install the VMM console as a client component on the DPM server so that DPM can communicate with the
VMM server. The console should be the same version as the one running on the VMM server.
3. Assign the DPMMachineName$ account as a read-only administrator account on the VMM management
server.
4. Connect all Hyper-V host servers to all DPM servers with the Set-DPMGlobalProperty PowerShell cmdlet.
The cmdlet accepts multiple DPM server names. Use the format:
Set-DPMGlobalProperty -dpmservername <dpmservername> -knownvmmservers <vmmservername> . For more
information see Set-DPMGlobalProperty.
5. After all virtual machines running on the Hyper-V hosts in the VMM clouds are discovered in VMM, set up
a protection group and add the virtual machines you want to protect. Note that automatic consistency
checks should be enabled at the protection group level for protection under virtual machine mobility
scenarios.
6. After the settings are configured, when a virtual machine migrates from one cluster to another, all backups
continue as expected. You can verify live migration is enabled as expected as follows:
a. Check the DPM -VMM Helper Service is running. If it isn't start it.
b. Open Microsoft SQL Server Management Studio and connect to the instance that hosts the DPM
database (DPMDB ). On DPMDB run the following query:
SELECT TOP 1000 [PropertyName] ,[PropertyValue] FROM[DPMDB].[dbo].[tbl_DLS_GlobalSetting] .

This query contains a property, called KnownVMMServer . This value should be the same value you
provided with the Set-DPMGlobalProperty cmdlet.
c. Run the following query to validate the VMMIdentifier parameter in the PhysicalPathXML for a
particular virtual machine. Replace VMName with the name of the virtual machine.
select cast(PhysicalPath as XML) from tbl_IM_ProtectedObject where DataSourceId in (select
datasourceid from tbl_IM_DataSource where DataSourceName like '%<VMName>%')

d. Open the .xml file that this query returns and validate that the VMMIdentifier field has a value.
Run manual migration
After you complete the steps in the previous sections, and the DPM Summary Manager job completes, migration is
enabled. By default, this job starts at midnight and runs every morning. If you want to run a manual migration, to
check everything is working as expected, do the following:
1. Open SQL Server Management Studio and connect to the instance that hosts the DPM database.
2. Run the following query:
select * from tbl_SCH_ScheduleDefinition where JobDefinitionID='9B30D213-B836-4B9E-97C2-DB03C3EB39D7' .
This query returns the ScheduleID. Note this ID as you will use it in the next step.
3. In the SQL Server Management Studio, expand SQL Server Agent, and then expand Jobs. Right-click
ScheduleID that you noted, and select Start Job at Step.
Note that backup performance is affected when the job runs. The size and scale of your deployment determines
how much time the job takes to finish.

Back up replica virtual machines


If DPM is running on Windows Server 2012 R2 or greater, then you can back up replica virtual machines on a
secondary server. This is useful for several reasons:
Reduces the impact of backups on the running workload - Taking a backup of a virtual machine incurs some
overhead as a snapshot is created. By offloading the backup process to a secondary remote site, the running
workload is no longer impacted by the backup operation. This is applicable only to deployments where the backup
copy is stored on a remote site. For example, you might take daily backups and store data locally to ensure quick
restore times, but take monthly or quarterly backups from replica virtual machines stored remotely for long-term
retention.
Saves bandwidth - In a typical remote branch office/headquarters deployment you need an appropriate amount
of provisioned bandwidth to transfer backup data between sites. If you create a replication and failover strategy, in
addition to your data backup strategy, you can reduce the amount of redundant data sent over the network. By
backing up the replica virtual machine data rather than the primary, you save the overhead of sending the backed
up data over the network.
Enables hoster backup - You can use a hosted datacenter as a replica site, with no need for a secondary
datacenter. In this case the hoster SLA requires consistent backup of replica virtual machines.
A replica virtual machine is turned off until a failover is initiated, and VSS can't guarantee an application-consistent
backup for a replica virtual machine. Thus the backup of a replica virtual machine will be crash-consistent only. If
crash-consistency can't be guaranteed, then the backup will fail and this might occur in a number of conditions:
The replica virtual machine isn't healthy and is in a critical state.
The replica virtual machine is resynchronizing (in the Resynchronization in Progress or Resynchronization
Required state).
Initial replication between the primary and secondary site is in progress or pending for the virtual machine.
.hrl logs are being applied to the replica virtual machine, or a previous action to apply the .hrl logs on the
virtual disk failed, or was cancelled or interrupted.
Migration or failover of the replica virtual machine is in progress

Recover backed up virtual machines


When you can recover a backed up virtual machine, you use the Recovery wizard to select the virtual machine and
the specific recovery point. To open the Recovery Wizard and recover a virtual machine:
1. In the DPM Administrator console, type the name of the VM, or expand the list of protected items and select
the VM you want to recover.
2. In the Recovery points for pane, on the calendar, click any date to see the recovery points available. Then in
the Path pane, select the recovery point you want to use in the Recovery wizard.
3. From the Actions menu, click Recover to open the Recovery Wizard.
The VM and recovery point you selected appear in the Review Recovery Selection screen. Click Next.
4. On the Select Recovery Type screen, select where you want to restore the data and then click Next.
Recover to original instance: When you recover to the original instance, the original VHD is
deleted. DPM recovers the VHD and other configuration files to the original location using Hyper-V
VSS writer. At the end of the recovery process, virtual machines are still highly available. The
resource group must be present for recovery. If it isn't available, recover to an alternate location and
then make the virtual machine highly available.
Recover as virtual machine to any host: DPM supports alternate location recovery (ALR ), which
provides a seamless recovery of a protected Hyper-V virtual machine to a different Hyper-V host,
independent of processor architecture. Hyper-V virtual machines that are recovered to a cluster node
will not be highly available. If you choose this option, the Recovery Wizard presents you with an
additional screen for identifying the destination and destination path.
Copy to a network folder: DPM supports item-level recovery (ILR ), which allows you to do item-
level recovery of files, folders, volumes, and virtual hard disks (VHDs) from a host-level backup of
Hyper-V virtual machines to a network share or a volume on a DPM protected server. The DPM
protection agent doesn't have to be installed inside the guest to perform item-level recovery. If you
choose this option, the Recovery Wizard presents you with an additional screen for identifying the
destination and destination path.
5. In Specify Recovery Options configure the recovery options and click Next:
If you are recovering a VM over low bandwidth, click Modify to enable Network bandwidth usage
throttling. After turning on the throttling option, you can specify the amount of bandwidth you want to
make available and the time when that bandwidth is available.
Select Enable SAN based recovery using hardware snapshots if you have configured your network.
Select Send an e-mail when the recovery completes and then provide the email addresses, if you
want email notifications sent once the recovery process completes.
6. In the Summary screen, make sure all details are correct. If the details aren't correct, or you want to make a
change, click Back. If you are satisfied with the settings, click Recover to start the recovery process.
7. The Recovery Status screen provides information about the recovery job.
Back up Exchange with DPM
35 minutes to read

System Center Data Protection Manager (DPM ) provides backup and recovery for Exchange 2013 and Exchange
2016. To ensure your entire Exchange deployment is protected, configure protection for volumes, system state, or
full bare metal recovery. This article provides the steps for configuring DPM so you can protect your Exchange
deployment. If you have a large Exchange deployment, use a database availability group (DAG ) to scale protection
for Exchange mailbox databases. In addition to backing up mail databases, to fully protect your Exchange
deployment you should back up Exchange Server roles such as the Client Access Server, or the transport service
on mailbox servers.

Prerequisites and limitations


Before you deploy DPM to protect Exchange 2013 and Exchange 2016, verify the deployment prerequisites:
Review the DPM release notes
Review the article, What's supported and what isn't for DPM?, for any Exchange issues.
Make sure the same versions of Eseutil.exe and Ese.dll are installed on both the Exchange and the DPM
server. For example, if you're using the 64-bit version of DPM, you must have the 64-bit version of
eseutil.exe and ese.dll. If you update these files on the Exchange server, you must update the files on the
DPM server too. The .ese and .eseutil files are usually in the location,
C:\Program Files\Microsoft\Exchange Server\V15\Bin .

To maintain up-to-date copies:


1. At the command prompt, navigate to the <DPM installation folder>\Bin directory.
2. Type the fsutil command as follows to create a hard link for eseutil.exe:
fsutil hardlink create <link> <target>

For example, in a typical installation type:


fsutil hardlink create "c:\program files\microsoft\dpm\bin\eseutil.exe" "c:\program
files\microsoft\Exchange\bin\eseutil.exe"

Install the latest Visual C++ Redistributable for Visual Studio 2012 Update.
To protect an Exchange 2013 and Exchange 2016 Database Availability Group (DAG ) node, install the DPM
protection agent on the node. Note that you can protect different DAG nodes from different DPM servers,
only one node can be protected by one DPM server only.
DPM 2012 (and later) have a storage pool size limit of 120 terabytes (TB ). There is an 80 TB limit for DPM
replica volumes, and 40 TB limit for recovery point volumes. When protecting a large Exchange deployment,
it is important to know the user mailbox size limit and the number of users or mailboxes. The number of
users or mailboxes, determines the maximum size of a mailbox. Provided the mailboxes stay within limits,
the number of mailboxes determine the number of Exchange databases a single DPM can protect. Use the
number of users assigned to a database, and their mailbox limits, to calculate the maximum size possible for
each Exchange database. For example, if the maximum size of a user's mailbox 8 GB, a single DPM server
can protect up to 10,000 mailboxes. If the maximum size of a user mailbox is greater than 8 GB, or if more
than 10,000 user mailboxes require protection, configure the Exchange server with a DAG. Use additional
DPM servers to provide full protection. An Exchange node can only be protected by a single DPM server.
Therefore, the number of Exchange nodes should be equal to, or greater than the number of DPM servers
required to protect all Exchange databases.
DPM functions with any database role. You can configure DPM to protect a server that hosts a collection of
active or passive mailbox databases.
Configure one full backup per day, and a synchronization frequency to suit your requirements for Exchange
log truncations. When protecting more than one copy of an Exchange mailbox database (for example, when
protecting members of a DAG ), configure one node for full backups and the rest for copy backups. Copy
backups do not truncate log files.
Protect at least two copies of each mailbox database. You can use inexpensive Serial Advanced Technology
Attachment (SATA) drives, or several JBOD disks for storage.
Set the minimum frequency to greater than 15 minutes for mailbox synchronization. Start by setting up your
current backup policy, and then gradually increase the number of recovery points. Performing one or two
express full backups per day, in addition to a synchronization frequency of two hours, is a sound approach.
For an optimal synchronization frequency, consider the volume of your data, the performance impact, and
the volume required to store the replicas.
Exchange 2013 and Exchange 2016 can support up to eight parallel backups. To accommodate parallel
Exchange database backups for an Exchange server, create multiple protection groups (up to eight), and add
Exchange databases to each protection group.
As you maintain your Exchange data note the following:
Add mailbox databases to the server. If you create or add new mailbox databases to a protected
storage group on an Exchange server, these databases are automatically added to the DPMreplication
and protection. You can add mailbox databases in incremental backups only after a full backup has
finished.
Change mailbox database file paths. If you move a protected database or log files to a volume
that contains data that is protected by DPM, protection continues. If you move a protected database
or log files to a volume that is not protected by DPM, an alert appears, and the protection jobs fail. To
resolve the alert, in the alert details, click the Modify protection job link, and then run a consistency
check.
Dismount mailbox databases. If you dismount a protected mailbox database, the protection job for
that particular database fails. The replica is marked inconsistent when DPM runs the next express full
backup.
Rename mailbox databases. If you need to change the name of the mailbox database, stop
protection, and protect the database again. Until you protect the database again, the backups continue
to work but mailbox enumeration fails.

Why back up Exchange with DPM?


When deciding whether to back up Exchange data with Exchange 2013 and Exchange 2016 native data protection
or DPM, consider the following:
Native data protection provides:
Disaster recovery
Recovery of accidentally deleted items
Long-term data storage
Point-in-time database snapshots
However native protection might not be enough if application errors, corruptions, or security and malware
incidents occur. In these situations DPM provides a number of advantages:
Less DAGs are require - Native protection requires additional mailbox servers to host copies of active data.
There's no reliance on DAGs for backup with DPM protection.
Simpler restore - DPM provides simple and centralized data recovery from point-in-time backups.
Longer retention range - DPM provides longer retention times for backed up data. Native protection is
limited to 14 days.
Consistent backup of Microsoft workloads - DPM provides a centralized and simple backup and recovery
process across your Microsoft workloads, including, Exchange, file servers, SQL Server, Hyper-V, and
SharePoint.

Before you start


1. Deploy DPM - Verify that DPM is installed and deployed correctly. If you haven't see:
System requirements for DPM
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent - The agent must be installed on the Exchange server. Read Deploy the
DPM protection agent.

Configure backup
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select Protection Group Type select Servers.
3. In Select Group Members select all the DAGs that store data you want to protect. For each Exchange
server you can also select to do a system state backup or full bare metal backup (which includes the system
state. This in useful if you want the ability to recover your entire server and not just data. Deploy protection
groups.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Specify Exchange Protection Options select Run Eseutil to check data integrity to check the integrity
of the Exchange Server databases. This moves the backup consistency checking from the Exchange Server to
the DPM server which means the I/O impact of running Eseutil.exe on the Exchange Server during the
backup itself is eliminated. To protect a DAG, be sure that you select Run for log files only (Recommended
for DAG servers). If you did not previously copy the .eseutil file an error will occur.
6. In Specify Exchange DAG Protection select the databases you want to copy for either a full backup or
copy backup from the Database copies selected for Full Backup or Database copies selected for
Copy Backup list boxes. For protecting multiple copies of the same database, you can select only one copy
for full backup, and then select the remaining copies for copy backup.
7. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a backup interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
8. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
9. In the Review disk allocation page, review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
10. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
11. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
12. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
13. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
14. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
15. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
16. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing the Exchange data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the Exchange data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent. The
address must be valid.
3. In Authenticated SMTP server, type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to whom
you want DPM to send copies of the notifications.
5. To test the SMTP server settings, click Send Test Notification > OK.
Publish alerts for Operations Manager
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. In Options click Alert Publishing > Publish Active Alerts.
3. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.

Recover Exchange data


Recover a single mailbox
1. On the protected Exchange server, verify whether you have an existing recovery mailbox database. If you
don't, create one using the New -MailboxDatabase cmdlet. Configure the recovery database so it can be
overwritten by using the Set-MailboxDatabase cmdlet. For example:

New-MailboxDatabase -Recovery -Name RDB-CONTROL -Server E2K13-MBX1

Set-MailboxDatabase -Identity 'RDB-CONTROL' -AllowFileRestore $true

2. In the DPM Administrator Console, go to the Recovery view and navigate to the mailbox database you
want to recover (in the All Protectd Exchange Data node).
3. Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
select a recovery point in Recovery time > Recover.
Note that you won't be able to select Latest. This isn't available for individual mailboxes.
4. In the Recovery Wizard review your recovery selection, and click Next.
5. Specify the type of recovery you would like to perform and click Next.
6. In the Specify Recovery Options page do the following:
a. Mount the databases after they are recovered. Clear the check box if you don't want to mount the
databases.
b. Network bandwidth usage throttling. Click Modify to enable throttling.
c. Click Enable SAN -based recovery using hardware snapshots if applicable.
d. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
7. On the Summary page review your recovery settings, and click Recover. When the recovery finishes click
Close.
Any synchronization job for the selected recovery item is canceled while the recovery is in progress.
8. After the recovery process has finished, the required mailbox is not quite fully restored. The mailbox
database to which the mailbox belongs is only restored to the Recovery mailbox database. Restore the
mailbox by running this cmdlet:

New-MailboxRestoreRequest -SourceDatabase 'RDB-CONTROL' -SourceStoreMailbox 'mailbox name' -


TargetMailbox <name>@contoso.com -TargetRootFolder Recovery -SkipMerging StorageProviderForSource

You must add \-SkipMerging StorageProviderForSource to the command; otherwise an error occurs. For a
workaround, see Release Notes for Exchange 2013 and Exchange 2016.
When you now open the <mailbox name> mailbox, all its contents until 3:15 PM are located beneath the
Recovery folder.
9. After you finished the restore, you can dismount and delete the Recovery Mailbox database by running the
following Windows PowerShell cmdlet.

Remove-MailboxDatabase -Identity 'RDB-CONTROL'

Recover an Exchange database


In the DPM Administrator Console, go to the Recovery view and navigate to the mailbox database you
want to recover (in the All Protected Exchange Data node).
Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
and select Latest to get the newest backup and click Recover.
In the Recovery Wizard review your recovery selection, and click Next.
Specify the type of recovery you would like to perform and click Next.
In the Specify Recovery Options page do the following:
1. Mount the databases after they are recovered. Select this.
2. Network bandwidth usage throttling. Click Modify to enable throttling.
3. Click Enable SAN -based recovery using hardware snapshots if applicable.
4. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
You must now return to the Exchange server in order to enable the databases to be overwritten by the
restore. If you miss this step, the restore fails. To do this, open the Exchange admin center, navigate to
Servers> Databases, select the Exchange mailbox database that you want to be overwritten, and then click
Edit.
Click Maintenance > This database can be overwritten by a restore > Save.
Back in the Recovery Wizard on the Summary page review your recovery settings, and click Recover.
When the recovery finishes click Close.
Any synchronization job for the selected recovery item is canceled while the recovery is in progress.
Check your mailbox contents to verify the success of your restore operation. If the recovered mailbox
database was part of a Database Availability Group (DAG ), the passive copy shows the failed and suspended
status.
To resume normal DAG operations, select the failed database copy, and then click Resume. A dialog box
appears prompting you to reseed (or reset) the database. Click Yes.
Recover an entire Exchange server
In the DPM Administrator Console, go to the Recovery view and navigate to the server you want to
recover.
Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
and select a recovery point from the list. In the list, right-click Bare Metal Recovery (BMR ) and click
Recover.
In the Recovery Wizard review your recovery selection, and click Next.
In the Select Recovery Type page, select Copy to a network folder to restore the server to a separate
network location. Or you can select Copy to tape if you have one available.
In the Specify Destination page, select where you want to copy the database files. These files can be used
to perform the BMR.
In the Specify Recovery Options page do the following:
1. Mount the databases after they are recovered. Select this.
2. Network bandwidth usage throttling. Click Modify to enable throttling.
3. Click Enable SAN -based recovery using hardware snapshots if applicable.
4. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
You can monitor the process on the Monitoring tab. A 'recovery success' alert shows when recovery
finishes.
Open the folder where are located recovery files and rename it with a shorter name. This will make the
recovery process easier. Create a share in the recovery folder.
To run the bare metal recovery, insert the ISO of your operating system for boot purposes. Select the
Repair option and in Advanced Options, select System Image Recovery.
In the Re-image your computer wizard, you can ignore any warning about a system image not found.
In the Select a system image backup page, click Select a system image. Click Advanced to select
recovery files from a network share. Select Search for a system image on the network and click Yes if
asked if you're sure you want to connect to the network.
Specify the network folder, select the backup, and select the date and time of the image you want to restore.
Specify any additional driver and disk settings, and then click Finish to start the restore.
System Center Data Protection Manager (DPM ) provides backup and recovery for Exchange 2016 and Exchange
2019. To ensure your entire Exchange deployment is protected, configure protection for volumes, system state, or
full bare metal recovery. This article provides the steps for configuring DPM so you can protect your Exchange
deployment. If you have a large Exchange deployment, use a database availability group (DAG ) to scale protection
for Exchange mailbox databases. In addition to backing up mail databases, to fully protect your Exchange
deployment you should back up Exchange Server roles such as the Client Access Server, or the transport service
on mailbox servers.

Prerequisites and limitations


Before you deploy DPM to protect Exchange 2016 and Exchange 2019, verify the deployment prerequisites:
Review the DPM release notes
Review the article, What's supported and what isn't for DPM?, for any Exchange issues.
Make sure the same versions of Eseutil.exe and Ese.dll are installed on both the Exchange and the DPM
server. For example, if you're using the 64-bit version of DPM, you must have the 64-bit version of
eseutil.exe and ese.dll. If you update these files on the Exchange server, you must update the files on the
DPM server too. The .ese and .eseutil files are usually in the location,
C:\Program Files\Microsoft\Exchange Server\V15\Bin .

To maintain up-to-date copies:


1. At the command prompt, navigate to the <DPM installation folder>\Bin directory.
2. Type the fsutil command as follows to create a hard link for eseutil.exe:
fsutil hardlink create <link> <target>

For example, in a typical installation type:


fsutil hardlink create "c:\program files\microsoft\dpm\bin\eseutil.exe" "c:\program
files\microsoft\Exchange\bin\eseutil.exe"

Install the latest Visual C++ Redistributable for Visual Studio 2012 Update.
To protect an Exchange 2016 and Exchange 2019 Database Availability Group (DAG ) node, install the DPM
protection agent on the node. Note that you can protect different DAG nodes from different DPM servers,
only one node can be protected by one DPM server only.
DPM 2012 (and later) have a storage pool size limit of 120 terabytes (TB ). There is an 80 TB limit for DPM
replica volumes, and 40 TB limit for recovery point volumes. When protecting a large Exchange deployment,
it is important to know the user mailbox size limit and the number of users or mailboxes. The number of
users or mailboxes, determines the maximum size of a mailbox. Provided the mailboxes stay within limits,
the number of mailboxes determine the number of Exchange databases a single DPM can protect. Use the
number of users assigned to a database, and their mailbox limits, to calculate the maximum size possible for
each Exchange database. For example, if the maximum size of a user's mailbox 8 GB, a single DPM server
can protect up to 10,000 mailboxes. If the maximum size of a user mailbox is greater than 8 GB, or if more
than 10,000 user mailboxes require protection, configure the Exchange server with a DAG. Use additional
DPM servers to provide full protection. An Exchange node can only be protected by a single DPM server.
Therefore, the number of Exchange nodes should be equal to, or greater than the number of DPM servers
required to protect all Exchange databases.
DPM functions with any database role. You can configure DPM to protect a server that hosts a collection of
active or passive mailbox databases.
Configure one full backup per day, and a synchronization frequency to suit your requirements for Exchange
log truncations. When protecting more than one copy of an Exchange mailbox database (for example, when
protecting members of a DAG ), configure one node for full backups and the rest for copy backups. Copy
backups do not truncate log files.
Protect at least two copies of each mailbox database. You can use inexpensive Serial Advanced Technology
Attachment (SATA) drives, or several JBOD disks for storage.
Set the minimum frequency to greater than 15 minutes for mailbox synchronization. Start by setting up your
current backup policy, and then gradually increase the number of recovery points. Performing one or two
express full backups per day, in addition to a synchronization frequency of two hours, is a sound approach.
For an optimal synchronization frequency, consider the volume of your data, the performance impact, and
the volume required to store the replicas.
Exchange 2016 and Exchange 2019 can support up to eight parallel backups. To accommodate parallel
Exchange database backups for an Exchange server, create multiple protection groups (up to eight), and add
Exchange databases to each protection group.
As you maintain your Exchange data note the following:
Add mailbox databases to the server. If you create or add new mailbox databases to a protected
storage group on an Exchange server, these databases are automatically added to the DPMreplication
and protection. You can add mailbox databases in incremental backups only after a full backup has
finished.
Change mailbox database file paths. If you move a protected database or log files to a volume
that contains data that is protected by DPM, protection continues. If you move a protected database
or log files to a volume that is not protected by DPM, an alert appears, and the protection jobs fail. To
resolve the alert, in the alert details, click the Modify protection job link, and then run a consistency
check.
Dismount mailbox databases. If you dismount a protected mailbox database, the protection job for
that particular database fails. The replica is marked inconsistent when DPM runs the next express full
backup.
Rename mailbox databases. If you need to change the name of the mailbox database, stop
protection, and protect the database again. Until you protect the database again, the backups continue
to work but mailbox enumeration fails.

Why back up Exchange with DPM?


When deciding whether to back up Exchange data with Exchange 2016 and Exchange 2019 native data protection
or DPM, consider the following:
Native data protection provides:
Disaster recovery
Recovery of accidentally deleted items
Long-term data storage
Point-in-time database snapshots
However native protection might not be enough if application errors, corruptions, or security and malware
incidents occur. In these situations DPM provides a number of advantages:
Less DAGs are require - Native protection requires additional mailbox servers to host copies of active data.
There's no reliance on DAGs for backup with DPM protection.
Simpler restore - DPM provides simple and centralized data recovery from point-in-time backups.
Longer retention range - DPM provides longer retention times for backed up data. Native protection is
limited to 14 days.
Consistent backup of Microsoft workloads - DPM provides a centralized and simple backup and recovery
process across your Microsoft workloads, including, Exchange, file servers, SQL Server, Hyper-V, and
SharePoint.

Before you start


1. Deploy DPM - Verify that DPM is installed and deployed correctly. If you haven't see:
System requirements for DPM
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent - The agent must be installed on the Exchange server. Read Deploy the
DPM protection agent.

Configure backup
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select Protection Group Type select Servers.
3. In Select Group Members select all the DAGs that store data you want to protect. For each Exchange
server you can also select to do a system state backup or full bare metal backup (which includes the system
state. This in useful if you want the ability to recover your entire server and not just data. Deploy protection
groups.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Specify Exchange Protection Options select Run Eseutil to check data integrity to check the integrity
of the Exchange Server databases. This moves the backup consistency checking from the Exchange Server to
the DPM server which means the I/O impact of running Eseutil.exe on the Exchange Server during the
backup itself is eliminated. To protect a DAG, be sure that you select Run for log files only (Recommended
for DAG servers). If you did not previously copy the .eseutil file an error will occur.
6. In Specify Exchange DAG Protection select the databases you want to copy for either a full backup or
copy backup from the Database copies selected for Full Backup or Database copies selected for
Copy Backup list boxes. For protecting multiple copies of the same database, you can select only one copy
for full backup, and then select the remaining copies for copy backup.
7. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a backup interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
8. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
9. In the Review disk allocation page, review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
10. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
11. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
12. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
13. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
14. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
15. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
16. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing the Exchange data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the Exchange data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent. The
address must be valid.
3. In Authenticated SMTP server, type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to whom
you want DPM to send copies of the notifications.
5. To test the SMTP server settings, click Send Test Notification > OK.
Publish alerts for Operations Manager
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. In Options click Alert Publishing > Publish Active Alerts.
3. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.

Recover Exchange data


Recover a single mailbox
1. On the protected Exchange server, verify whether you have an existing recovery mailbox database. If you
don't, create one using the New -MailboxDatabase cmdlet. Configure the recovery database so it can be
overwritten by using the Set-MailboxDatabase cmdlet. For example:

New-MailboxDatabase -Recovery -Name RDB-CONTROL -Server E2K13-MBX1


Set-MailboxDatabase -Identity 'RDB-CONTROL' -AllowFileRestore $true

2. In the DPM Administrator Console, go to the Recovery view and navigate to the mailbox database you
want to recover (in the All Protectd Exchange Data node).
3. Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
select a recovery point in Recovery time > Recover.
Note that you won't be able to select Latest. This isn't available for individual mailboxes.
4. In the Recovery Wizard review your recovery selection, and click Next.
5. Specify the type of recovery you would like to perform and click Next.
6. In the Specify Recovery Options page do the following:
a. Mount the databases after they are recovered. Clear the check box if you don't want to mount the
databases.
b. Network bandwidth usage throttling. Click Modify to enable throttling.
c. Click Enable SAN -based recovery using hardware snapshots if applicable.
d. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
7. On the Summary page review your recovery settings, and click Recover. When the recovery finishes click
Close.
Any synchronization job for the selected recovery item is canceled while the recovery is in progress.
8. After the recovery process has finished, the required mailbox is not quite fully restored. The mailbox
database to which the mailbox belongs is only restored to the Recovery mailbox database. Restore the
mailbox by running this cmdlet:

New-MailboxRestoreRequest -SourceDatabase 'RDB-CONTROL' -SourceStoreMailbox 'mailbox name' -


TargetMailbox <name>@contoso.com -TargetRootFolder Recovery -SkipMerging StorageProviderForSource

You must add \-SkipMerging StorageProviderForSource to the command; otherwise an error occurs. For a
workaround, see Release Notes for Exchange 2016 and Exchange 2019.
When you now open the <mailbox name> mailbox, all its contents until 3:15 PM are located beneath the
Recovery folder.
9. After you finished the restore, you can dismount and delete the Recovery Mailbox database by running the
following Windows PowerShell cmdlet.

Remove-MailboxDatabase -Identity 'RDB-CONTROL'

Recover an Exchange database


In the DPM Administrator Console, go to the Recovery view and navigate to the mailbox database you
want to recover (in the All Protected Exchange Data node).
Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
and select Latest to get the newest backup and click Recover.
In the Recovery Wizard review your recovery selection, and click Next.
Specify the type of recovery you would like to perform and click Next.
In the Specify Recovery Options page do the following:
1. Mount the databases after they are recovered. Select this.
2. Network bandwidth usage throttling. Click Modify to enable throttling.
3. Click Enable SAN -based recovery using hardware snapshots if applicable.
4. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
You must now return to the Exchange server in order to enable the databases to be overwritten by the
restore. If you miss this step, the restore fails. To do this, open the Exchange admin center, navigate to
Servers> Databases, select the Exchange mailbox database that you want to be overwritten, and then click
Edit.
Click Maintenance > This database can be overwritten by a restore > Save.
Back in the Recovery Wizard on the Summary page review your recovery settings, and click Recover.
When the recovery finishes click Close.
Any synchronization job for the selected recovery item is canceled while the recovery is in progress.
Check your mailbox contents to verify the success of your restore operation. If the recovered mailbox
database was part of a Database Availability Group (DAG ), the passive copy shows the failed and suspended
status.
To resume normal DAG operations, select the failed database copy, and then click Resume. A dialog box
appears prompting you to reseed (or reset) the database. Click Yes.
Recover an entire Exchange server
In the DPM Administrator Console, go to the Recovery view and navigate to the server you want to
recover.
Available recovery points are indicated in bold on the calendar in the recovery points section. Click a date,
and select a recovery point from the list. In the list, right-click Bare Metal Recovery (BMR ) and click
Recover.
In the Recovery Wizard review your recovery selection, and click Next.
In the Select Recovery Type page, select Copy to a network folder to restore the server to a separate
network location. Or you can select Copy to tape if you have one available.
In the Specify Destination page, select where you want to copy the database files. These files can be used
to perform the BMR.
In the Specify Recovery Options page do the following:
1. Mount the databases after they are recovered. Select this.
2. Network bandwidth usage throttling. Click Modify to enable throttling.
3. Click Enable SAN -based recovery using hardware snapshots if applicable.
4. In Notification click Send an e-mail when the recovery completes, and specify the recipients.
Separate the e-mail addresses with commas.
You can monitor the process on the Monitoring tab. A 'recovery success' alert shows when recovery
finishes.
Open the folder where are located recovery files and rename it with a shorter name. This will make the
recovery process easier. Create a share in the recovery folder.
To run the bare metal recovery, insert the ISO of your operating system for boot purposes. Select the
Repair option and in Advanced Options, select System Image Recovery.
In the Re-image your computer wizard, you can ignore any warning about a system image not found.
In the Select a system image backup page, click Select a system image. Click Advanced to select
recovery files from a network share. Select Search for a system image on the network and click Yes if
asked if you're sure you want to connect to the network.
Specify the network folder, select the backup, and select the date and time of the image you want to restore.
Specify any additional driver and disk settings, and then click Finish to start the restore.
Back up SharePoint with DPM
17 minutes to read

You can deploy System Center Data Protection Manager (DPM ) to protect SharePoint farms, external SQL Server
databases, and folders that include farm customizations. This articles describes the steps required to back up and
recover SharePoint data. In addition to this article these blog entries provide an in-depth walkthrough and
troubleshooting tips for this scenario:
Configure SharePoint protection in DPM
Backing up and troubleshooting SharePoint and DPM
Restoring SharePoint with DPM

Prerequisites and limitations


For a list of supported SharePoint versions and the DPM versions required to back them up see What can
DPM back up?
By default when you protect SharePoint all content databases (and the SharePoint_Config and
SharePoint_AdminContent* databases) will be protected. If you want to add customizations such as search
indexes, templates or application service databases, or the user profile service you'll need to configure these
for protection separately. Be sure that you enable protection for all folders that include these types of
features or customization files.
SharePoint databases using AlwaysOn can be protected from DPM 2012 R2 with Update 5 onwards.
You can't protect SharePoint databases as a SQL Server data source. You can recover individual databases
from a farm backup.
Remember that for DPM runs as Local System and to backup SQL Server databases it needs sysadmin
privileges on that account for the SQL server. On the SQL Server you want to back up set NT
AUTHORITY\SYSTEM to sysadmin.
For every 10 million items in the farm, there must be at least 2 GB of space on the volume where the DPM
folder is located. This space is required for catalog generation. To enable you to use DPM to perform a
specific recovery of items (site collections, sites, lists, document libraries, folders, individual documents, and
list items), catalog generation creates a list of the URLs contained within each content database. You can
view the list of URLs in the recoverable item pane in the Recovery task area of DPM Administrator Console.
In the SharePoint farm, if you have SQL Server databases that are configured with SQL Server aliases,
install the SQL Server client components on the front-end Web server that DPM will protect.
Protecting application store items isn't supported with SharePoint 2013.
DPM doesn't support protecting remote FILESTREAM. The FILESTREAM should be part of the database.

Before you start


1. Deploy DPM - Verify that DPM is installed and deployed correctly. If you haven't see:
System requirements for DPM
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent - You'll need to install the DPM protection agent on every server in the
SharePoint farm, including SQL Servers. The only exception is that you only install it on a single Web Front
End (WFE ) server. For example if you have a single farm with two WFE servers, an index server and a two-
node SQL Server cluster you'd install the agent on the index server, both nodes in the SQL Server cluster,
and one of the WFE servers. Because WFE servers don't host content DPM only needs the agent on one of
them to serve as the entry point for protection. Read Deploy the DPM protection agent.
If the SharePoint SQL Server database is remote you'll need to configure the DPM agent on it. If it's
clustered then install the agent on all cluster nodes.

Configure backup
To back up SharePoint farm you configure protection for SharePoint by using ConfigureSharePoint.exe and then
create a protection group in DPM.
1. Run ConfigureSharePoint.exe - This tool configures the SharePoint VSS Writer service (WSS ) and
provides the protection agent with credentials for the SharePoint farm. After you've deployed the protection
agent the ConfigureSharePoint.exe file can be found in the <DPM Installation Path>\bin folder on the front-
end Web server. If you have multiple WFE servers you only need to install it on one of them. Run as follows:
On the WFE server at a command prompt navigate to <DPM installation location>\bin\ and run
ConfigureSharePoint [-EnableSharePointProtection] [-EnableSPSearchProtection] [-
ResolveAllSQLAliases] [-SetTempPath ], where:
EnableSharePointProtection enables protection of the SharePoint farm, enables the VSS
writer, and registers the identify of the DCOM application WssCmdletsWrapper to run as a
user whose credentials are entered with this option. This account should be a farm admin and
also local admin on the front-end Web Server.
EnableSPSearchProtection enables the protection of WSS 3.0 SP Search by using the
registry key SharePointSearchEnumerationEnabled under HKLM\Software\Microsoft\
Microsoft Data Protection Manager\Agent\2.0\ on the front-end Web Server, and registers the
identity of the DCOM application WssCmdletsWrapper to run as a user whose credentials are
entered with this option. This account should be a farm admin and also local admin on the
front-end Web Server.
ResolveAllSQLAliases displays all the aliases reported by the SharePoint VSS writer and
resolves them to the corresponding SQL server. It also displays their resolved instance names.
If the servers are mirrored, it will also display the mirrored server. It reports all the aliases that
are not being resolved to a SQL Server.
SetTempPath sets the environment variable TEMP and TMP to the specified path. Item level
recovery fails if a large site collection, site, list or item is being recovered and there is
insufficient space in the farm admin Temporary folder. This option allows you to change the
folder path of the temporary files to a volume that has sufficient space to store the site
collection or site being recovered.
Enter the farm administrator credentials. This account should be a member of the local Administrator
group on the WFE server. If the farm administrator isn't a local admin grant the following
permissions on the WFE server:
Grant the WSS_Admin_WPG group full control to the DPM folder (%Program
Files%\Microsoft Data Protection Manager\DPM ). -A
Grant the WSS_Admin_WPG group read access to the DPM Registry key
(HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager).
Ater running ConfigureSharePoint.exe you'll need to rerun it if there's a change in the SharePoint
farm administrator credentials.
2. To create a protection group, click Protection > Actions > Create Protection Group to open the Create
New Protection Group wizard in the DPM console.
3. In Select Protection Group Type select Servers.
4. In Select Group Members expand the server that holds the WFE role. If there's more than one WFE server
select the one on which you installed ConfigureSharePoint.exe. Learn more in Deploy protection groups.
When you expand the SharePoint server DPM queries VSS to see what data DPM can protect. If the
SharePoint database is remote DPM connects to it. If SharePoint data sources don't appear, check that the
VSS writer is running on the SharePoint server and any remote SQL Server, and ensure that the DPM
agent is installed on both the SharePoint server and remote SQL Server. In addition ensure that SharePoint
databases aren't being protected elsewhere as SQL Server databases.
5. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
6. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
7. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
8. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
9. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
10. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
11. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
12. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
13. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
14. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
15. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing the Exchange data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the SharePoint data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent. The
address must be valid.
3. In Authenticated SMTP server , type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to whom
you want DPM to send copies of the notifications.
Publish Operations Manager alerts
1. In the DPM Administrator Console, click Monitoring > Action > Options > Alert Publishing > Publish
Active Alerts
2. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.

Restore SharePoint data


You can recover SharePoint data as follows:
Recover to the original location
Recover to an alternate location. Note that you can't perform a full farm recovery to a new location.
Copy the data to a network folder
Copy the data to tape
Note that to recover a farm:
If you protected a SharePoint server as a SQL Server database, you can recover SharePoint data by
selecting the SQL Server database in the Recovery Wizard.
Note the following to recover a farm:
The front-end Web servers should be configured the same as they were when the recovery point was
created.
The farm structure must be created on the front-end Web server; the farm data will be recovered to
the existing structure.
The instances of SQL Server are configured with the same names as when the recovery point was
created.
The instances of SQL Server are configured with the same drive configuration as when the recovery
point was created.
The recovery farm must have all service packs, language packs, and patches installed on the primary
farm.
Don't directly try to recover the Central Administration content database or the configuration
database because this could cause data corruption in the SharePoint farm.
The recovery point time for SharePoint data displayed on the Browse tab may differ from the time
displayed on the Search tab. The Browse tab displays the backup time for the farm, while the Search
tab lists the correct recovery point time for sites, documents, and folders.
There a couple of possible scenarios for farm recovery:
A farm configuration exists as it did at the time of taking the backup. In this case, you will be restoring to a
functioning farm.
The configuration database is corrupt and the servers in the farm are down.
Restore data to a functioning farm
1. In DPM Administrator Console, click Recovery on the navigation bar.
2. In the Protected data pane, expand the server that contains the farm you want to recover, and then click All
Protected SharePoint Data.The farm displays in the Recoverable item pane as server name\farm name.
3. On the calendar, click any date in bold to obtain the recovery points available for that date. The Recovery
time menu lists the time for each available recovery point.
4. On the Recovery time menu, select the recovery point you want to use.
5. In the Actions pane, click Recover.
The Recovery Wizard starts.
6. On the Review recovery selection page, click Next.
7. Select where you want to recover the database. Note that:
You can't recover an entire farm to an alternate location.
If you select Copy to a network folder and the recovery point that you selected wasn't created from
an express full backup, you'll be presented with new recovery point choices.
If you select Copy to tape and the recovery point that you selected wasn't created from an express
full backup, you'll be presented with new recovery point choices. For the tape option you'll select the
tape library you want to use for recovery.
8. Specify recovery options for network bandwidth usage throttling, SAN -based recovery, and e-mail
notifications, and then click Next.
9. On the Summary page, review the recovery settings, and then click Recover.
Restore data to a non-functioning farm
1. Create a new farm that uses the same instance of SQL Server and the same front-end Web server as the
original protected farm.
2. On the front-end Web server that DPM uses to recover farm data, run the following command at the
command prompt: ConfigureSharePoint-EnableSharePointProtection
3. In the DPM Administrator Console, click Recovery on the navigation bar.
4. In the Protected data pane, expand the server that contains the farm you want to recover, and then click All
Protected SharePoint Data.The farm displays in the Recoverable item pane as server name\farm name.
5. On the calendar, click any date in bold to obtain the recovery points available for that date. The Recovery
time menu lists the time for each available recovery point.
6. On the Recovery time menu, select the recovery point you want to use.
7. In the Actions pane, click Recover.
The Recovery Wizard starts.
8. On the Review recovery selection page, click Next.
9. Select where you want to recover the database. Note that:
You can't recover an entire farm to an alternate location.
If you select Copy to a network folder and the recovery point that you selected wasn't created from
an express full backup, you'll be presented with new recovery point choices.
If you select Copy to tape and the recovery point that you selected wasn't created from an express
full backup, you'll be presented with new recovery point choices. For the tape option you'll select the
tape library you want to use for recovery.
10. Specify recovery options for network bandwidth usage throttling, SAN -based recovery, and e-mail
notifications, and then click Next.
11. On the Summary page, review the recovery settings, and then click Recover.
12. On the main front-end Web server for the server farm, run the SharePoint Products and Technologies
Configuration Wizard and disconnect the front-end Web server from the farm.

Switching the Front-End Web Server


The following procedure uses the example of a server farm with two front-end Web servers, Server1 and Server2.
DPM uses Server1 to protect the farm. You need to change the front-end Web server that DPM uses to Server2 so
that you can remove Server1 from the farm.

NOTE
If the front-end Web server that DPM uses to protect the farm is unavailable, use the following procedure to change the
front-end Web server by starting at step 4.

To change the front-end Web server that DPM uses to protect the farm
1. Stop the SharePoint VSS Writer service on Server1 by running the following command at a command
prompt:
stsadm -o unregisterwsswriter
2. On Server1, open the Registry Editor and navigate to the following key:
HKLM\System\CCS\Services\VSS\VssAccessControl
3. Check all values listed in the VssAccessControl subkey. If any entry has a value data of 0 and another VSS
writer is running under the associated account credentials, change the value data to 1.
4. Install a protection agent on Server2.

WARNING
You can only switch Web front-end servers if both the servers are on the same domain.

5. On Server2, at a command prompt, change the directory to DPM installation location\bin\ and run
ConfigureSharepoint. For more information about ConfigureSharePoint, see Configure backup.
6. There is a known issue when the server farm is the only member of the protection group and the protection
group is configured to use tape-based protection. If your server farm is the only member of the protection
group using tape-based protection, to change the front-end Web server that DPM uses to protect the farm,
you must temporarily add another member to the protection group by performing the following steps:
In DPM Administrator Console, click Protection on the navigation bar.
Select the protection group that the server farm belongs to, and then click Modify protection
group.
In the Modify Group Wizard, add a volume on any server to the protection group. You can remove
this volume from the protection after the procedure is completed.
If the protection group is configured for short-term disk-based protection and long-term tape-based
protection, select the manual replica creation option. This avoids creating a replica for the volume that
you are temporarily adding to the protection group.
Complete the wizard.
7. Remove Server1 from the protection group, selecting to retain the replicas on disk and tape.
8. Select the protection group that the server farm belongs to, and then click Modify protection group.
9. In the Modify Group Wizard, on the Select Group Members page, expand Server2 and select the server
farm, and then complete the wizard.
A consistency check will start.
10. If you performed step 6, you can now remove the volume from the protection group.
Back up SQL Server with DPM
15 minutes to read

System Center Data Protection Manager (DPM ) provides backup and recovery for SQL Server databases. In
addition to backing up SQL Server databases you can run a system backup or full bare-metal backup of the SQL
Server computer. Here's what DPM can protect:
A standalone SQL Server instance
A SQL Server Failover Cluster instance (FCI)
A SQL Server AlwaysOn availability group with theses preferences:
Secondary only
Primary
Any Replica

Why back up SQL Server with DPM?


DPM was designed to protect the advanced configurations of SQL Server.
DPM can be set to protect SQL Server as frequently as every 15 minutes.
DPM reduces potential conflicts between backup tools and SQL Server protection schedules.
DPM can protect SQL Server at the instance level or the database level. When protection at the instance
level is turned on, DPM detects new databases on that instance and automatically adds them to its
protection group.
DPM is an affordable option. It's a good fit for a small SQL Server footprint and can scale for organizations
that have a larger SQL Server footprint.
DPM has a Self-Service Recovery Tool (SSRT) that extends database administrators' options for self-service
recovery of SQL databases.
If you're upgrading to SQL Server 2014 DPM will continue to back up already protected databases after the
SQL Server upgrade. You should avoid backup jobs during the SQL Server upgrade.

Prerequisites and limitations


If you have a database with files on a remote file share, protection will fail with Error ID 104. DPM does not
support protection for SQL Server data on a remote file share.
DPM cannot protect databases that are stored on remote SMB shares.
Ensure that the availability group replicas are configured as read-only.
You must explicitly add the system account NTAuthority\System to the Sysadmin group on SQL Server.
When you perform an alternate location recovery for a partially contained database, you must ensure that
the target SQL instance has the Contained Databases feature enabled.
Protection for SQL Server AlwaysOn:
DPM detects Availability Groups when running inquiry at protection group creation.
DPM detects a failover and continues protection of the database.
DPM supports multi-site cluster configurations for an instance of SQL Server.
When you protect databases that use the AlwaysOn feature, DPM has the following limitations:
DPM will honor the backup policy for availability groups that is set in SQL Server based on the
backup preferences, as follows:
Prefer secondary - Backups should occur on a secondary replica except when the primary
replica is the only replica online. If there are multiple secondary replicas available then the
node with the highest backup priority will be selected for backup. In the case that only primary
replica is available then backup should occur on the primary replica.
Secondary only - Backup shouldn't be performed on the primary replica. If the primary replica
is the only one online, the backup shouldn't occur.
Primary - Backups should always occur on the primary replica.
Any Replica - Backups can happen on any of the availability replicas in the availability group.
The node to be backed up from will be based on the backup priorities for each of the nodes.
Note the following:
Backups can happen from any readable replica i.e. primary, synchronous secondary,
asynchronous secondary.
If any replica is excluded from backup, for example Exclude Replica is enabled or is marked as
not readable, then that replica will not be selected for backup under any of the options.
If multiple replicas are available and readable then the node with the highest backup priority
will be selected for backup.
If the backup fails on the selected node then the backup operation fails.
Recovery to the original location is not supported.
SQL Server 2014 backup issues:
SQL server 2014 added a new feature to create a database for on-premises SQL Server in Windows
Azure Blob storage. DPM cannot be used to protect this configuration.
There are some known issues with "Prefer secondary" backup preference for the SQL AlwaysOn
option, DPM always takes a backup from secondary; if no secondary can be found then the backup
fails.

Before you start


1. Deploy DPM - Verify that DPM is installed and deployed correctly. If you haven't see:
System requirements for DPM
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent - You'll need to install the DPM protection agent on every machine
you want to back up. Read Deploy the DPM protection agent.

Configure backup
1. To create a protection group, click Protection > Actions > Create Protection Group to open the Create
New Protection Group wizard in the DPM console.
2. In Select Protection Group Type, select Servers.
3. In Select Group Members, select the SQL Server instances on the server you want to protect. Learn more
in Deploy protection groups. Note that:
You have the option of selecting protection at the instance level or protection of individual databases.
When you are protecting at the instance level, any database that is added to that instance of SQL
Server will automatically be added to DPM protection.
If you are using SQL Server AlwaysOn availability groups, you can create a protection group that
contains the availability groups. DPM detects the availability groups and will displays them under
Cluster Group. Select the whole group to protect it so that any databases that you add to the group
are protected automatically, or select individual databases. For each instance of SQL Server, you can
also run a system state backup or full bare metal backup. This in useful if you want to be able to
recover your whole server and not just data.
4. In Select data protection method, specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals, specify how you want to back up to short-term storage on disk. In Retention
range, you specify how long you want to keep the data on disk. In Synchronization frequency, you
specify how often you want to run an incremental backup to disk. If you don't want to set a back up interval,
you can select Just before a recovery point so that DPM will run an express full backup just before each
recovery point is scheduled.
6. If you want to store data on tape for long-term storage, in Specify long-term goals, indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details, page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based
on the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
8. In Choose replica creation method, select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule, specify how often incremental backups to Azure should occur. You
can schedule backups to run every day/week/month/year and the time/date at which they should run.
Backups can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure
from the copy of the backed up data stored on the DPM disk.
12. In Specify online retention policy, you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication, specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
For more information, see Offline-backup workflow in Azure Backup.
14. On the Summary page, review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Monitoring
After the protection group's been created the initial replication occurs and DPM starts backing up and
synchronizing SQL Server data. DPM monitors the initial synchronization and subsequent backups. You can
monitor the SQL Server data in a couple of ways:
Using default DPM monitoring can set up notifications for proactive monitoring. by publishing alerts and
configuring notifications. You can send notifications by e-mail for critical, warning, or informational alerts,
and for the status of instantiated recoveries.
If you use Operations Manager you can centrally publish alerts.
Set up monitoring notifications
1. In the DPM Administrator Console, click Monitoring > Action > Options.
2. Click SMTP Server, type the server name, port, and email address from which notifications will be sent.
The address must be valid.
3. In Authenticated SMTP server , type a user name and password. The user name and password must be
the domain account name of the person whose "From" address is described in the previous step; otherwise,
notification delivery fails.
4. To test the SMTP server settings, click Send Test E -mail, type the e-mail address where you want DPM to
send the test message, and then click OK. Click Options > Notifications and select the types of alerts
about which recipients want to be notified. In Recipients type the e-mail address for each recipient to
whom you want DPM to send copies of the notifications.
Set up alerts with Operations Manager
1. In the DPM Administrator Console, click Monitoring > Action > Options > Alert Publishing > Publish
Active Alerts
2. After you enable Alert Publishing all existing DPM alerts that might require a user action are published to
the DPM Alerts event log. The Operations Manager agent that is installed on the DPM server then
publishes these alerts to the Operations Manager and continues to update the console as new alerts are
generated.

Allow SQL Server admins to restore data


DPM provides a self-service recovery feature to allow SQL Server administrators access to data protected by
DPM, so that they can restore a SQL Server database from backup to a network folder. You set up the DPM Self-
Service Recovery Configuration Tool to create and manage roles that specify which users can perform self-service
recovery. Then users use the DPM Self-Service Recovery Wizard to recover SQL Server databases.
Configure self-service SQL Server recovery as follows:
1. In the DPM console > Protection click Configure self service recovery.
2. In the DPM Self-Service Recovery Configuration Tool for SQL Server click Create Role.
3. On the Security Groups page, you'll create one or more groups that contain the users for whom you want
to enable self-service reocvery. Specify security groups in the format domain\security group, or an
individual user in the format domain\user name. You can add multiple groups and users to a DPM role.
4. On the Recovery Items page you specify protected SQL Server instances and databases for which you
want to allow self-service recovery. Specify instances in the format <computer name\instance name>. To
specify a database press the TAB key, and then type a database name. Alternatively, to enable role users to
recover all databases on the instance, press the TAB key, and then press the spacebar to clear the text in the
Database Name column.
Note that when you enable users of a DPM role to recover all SQL Server databases on an instance of SQL
Server, those users can also recover any SQL Server databases that are subsequently added to the instance.
When you enable access by using DPM roles, ensure that all members of the role have been granted
appropriate permission to view and access all databases.
5. On the Recovery Target Locations page, to restrict recovery locations for role users click Allow users to
recover the databases to another instance of SQL Server and specify one or more recovery target
locations and file paths that are allowed. If you want to allow any path on an instance then don't specify a
value in Recovered File Path. If you enable the setting users can recover database files to any location for
which they have write permission. However, users cannot overwrite the original database files, and the
DPM Self-Service Recovery Tool (SSRT) for SQL Server blocks them if they attempt to do so.
6. In addition on the computer from which self-service recovery will run make sure that at least .NET
framework 3.5 is installed, and that the DPM Self-Service Recovery Tool is installed. The tool is available in
the DPM product installation location, in the DpmSqlEURInstaller folder.

Restore SQL Server data


You can recover SharePoint data as follows:
Recover a database to the original location
Recover the database with a new name to its original location or to a different instance of SQL Server
Recover the database to a different instance of SQL Server
Copy the database to a network folder
Copy the database to tape
Note that you can't recover a system database to a different instance of SQL Server.
Recover a database from the DPM console as follows:
1. In the DPM Administrator Console click Recovery on the navigation bar. Using the browse functionality,
select the database you want to recover.
2. On the calendar, click any date in bold to obtain the recovery points available for that date. The Recovery
time menu lists the time for each available recovery point. On the Recovery time menu, select the
recovery point you want to use.
3. In the Actions pane, click Recover to start the Recovery Wizard.
4. On the Review recovery selection page, click Next. Note that:
Select where you want to recover the database. If you select Recover to any SQL instance enter the
recovery path. You can specify a new name for the recovered database. Note that this option isn't
available with the setting Latest recovery point.
You can't recover a newer version SQL Server database to an older version SQL Server instance.
If you select Copy to a network folder and the recovery point that you selected wasn't created from
an express full backup, you'll be presented with new recovery point choices.
If you select Copy to tape and the recovery point that you selected wasn't created from an express
full backup, you'll be presented with new recovery point choices. For the tape option you'll select the
tape library you want to use for recovery.
5. If you selected a recovery point other than Latest, on the Specify Database State page, select Leave
database operational.
6. Specify recovery options for network bandwidth usage throttling, SAN -based recovery, and e-mail
notifications, and then click Next.
7. On the Summary page, review the recovery settings, and then click Recover.
If you want to restore data to a non-functioning SharePoint farm you'll need to create a new farm that uses the
same SQL Server instance and same front-end web server as the original farm. Then you'll run this command on
the front-end web server that DPM uses to recover farm data: ConfigureSharePoint-EnableSharePointProtection .
Open the Recovery Wizard and in Protected Data expand the server that contains the farm you want to recovery
and click All Protected Farm Data. Select the recovery point date and time, and recover. Note that you can't
recover an entire farm to an alternate location. After recovery is finished, on the main front-end Web server for the
server farm, run the SharePoint Configuration Wizard and disconnect the front-end Web server from the farm.
Users with self-service recovery permissions should recover as follows:
1. The user should open the DPM Self-Service Recovery Tool, click Connect to DPM server, and specify the
DPM server name.
2. After a connection is established the user should click New Recovery Job to start the Recovery Wizard.
3. On the Specify Database Details page of the wizard, specify the SQL Server instance and database name
to recovery. If you're using availability groups specify the group name in the format:
AGNAME.ClusternameFQDN\AGNAME.
4. On the Specify Recovery Point page select the data and time of recovery point.
5. On the Select Recovery Type page select whether to recovery to any instance on the same SQL Server or
a different one. Specify whether to recover to a network folder. Note that only recovery points that will
created from full express backup can be recovered to a network folder.
6. If you're recovering to a database, on the Specify Database State page specify whether the database
should remain operational after recovery, and specify whether you want to copy SQL transaction logs.
7. On the Specify Recovery Options page specify whether you want to retain security settings from the
source server, or apply settings from the destination server. You can also specify that an email notification
should be sent when recovery finishes.
Back up client computers with DPM
11 minutes to read

You can deploy System Center Data Protection Manager (DPM ) to back up client computers. Depending on the
client operating system, you can back up volumes, shares, folders, files, bare metal and system state, and deduped
volumes.

Prerequisites and limitations


Before you deploy DPM to protect client computer data verify the deployment prerequisites:
Read about the client operating systems you can support in What can DPM back up?
Review the release notes and read about any client protection issues in What's supported and what isn't for
DPM?
Make sure that client machines you want to back up are in the DPM server domain, or in a domain with a
two-way trust relationship with the DPM domain.
To set up client machines for protection you install the DPM protection agent on them. If Windows Firewall
is configured on the client computer, the agent installation will set up the firewall exceptions it needs. If you
need to reset the firewall, you can reconfigure it by running SetDpmServer.exe. If you are using a firewall
other than Windows Firewall, you'll need to open the necessary ports. Learn more in Deploy the DPM
protection agent.
DPM can back up client computers that are physically or wirelessly connected to the local area network
(LAN )or back up over VPN. For VPN backup the ICMP should be enabled on the client computer.
Each DPM server can protect up to 3000 client computers. When protecting client computers at scale,
Microsoft recommends you create multiple protection groups, and stagger the recovery point times for
those protection groups. The more clients that belong to a protection group, the longer it takes to enumerate
the changes to the protection group.
You can tweak the performance of client data backup as follows:
If client data backup is slow you can set this key to a lower value:
HKLM\Software\Microsoft\Microsoft Data Protection
Manager\Agent\ClientProtection\WaitInMSPerRequestForClientRead to a lower value.
To scale up client performance you can tweak these registry keys:
Software\Microsoft\Microsoft Data Protection
Manager\Configuration\DPMTaskController\MaxRunningTasksThreshold. Value: 9037ebb9-
5c1b-4ab8-a446-052b13485f57
Software\Microsoft\Microsoft Data Protection
Manager\Configuration\DPMTaskController\MaxRunningTasksThreshold. Value: 3d859d8c-
d0bb-4142-8696-c0d215203e0d
Software\Microsoft\Microsoft Data Protection
Manager\Configuration\DPMTaskController\MaxRunningTasksThreshold. Value: c4cae2f7-
f068-4a37-914e-9f02991868da
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection
Manager\Collocation\Client. Value: DSCollocationFactor

Before you start


1. Deploy DPM - Verify that DPM is installed and deployed correctly. If you haven't see:
System requirements for DPM
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent - The agent needs to be installed on client computers you want to
protect. Read Deploy the DPM protection agent.

Back up client computers


1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select protection group type click Clients. You only select clients if you want to back up data on a
Windows computer running a Windows client operating system. For all other workloads select server. Learn
more in Deploy protection groups
3. In Select Group Members click Add Multiple Computers. You can add the client computers you want to
back up in a text file. In the file you'll need to enter each computer on a new line. We recommend that you
provide the FQDN target computers. For example, enter multiple computers in a .txt file as follows:
Comp1.abc.domain.com
Comp2.abc.domain.com
Comp3.abc.domain.com
Note that if DPM can't find the text file or any of the computers it will add them to the log file. Click Failed
to add machinesto open the log file. To add new client computers to an existing protection group you
right-click the group name and select Add client computers.
On the Specify Inclusions and Exclusions page, specify the folders to include or exclude for
protection on the selected computers. To select from a list of well-known folders, such as
Documents, click the drop-down list. Note that:
When you exclude a folder, and then specify a separate inclusion rule for a subfolder, DPM
doesn't back up the subfolder. The exclusion rule overrides the inclusion rule.
When you include a folder, and then specify a separate exclude rule for a subfolder, DPM backs
up the entire folder, except for the excluded subfolder.
When you include a well-known folder such as Documents, DPM locates the Documents
folder for all users on the computer, and then applies the rule. For example, if the user profile
for computer Comp1 contains the Documents folder for both User1 and User2, DPM will
back up both folders.
In the Folder column you type the folder names using variables such as programfiles, or you
can use the exact folder name. Select Include or Exclude for each entry in the Rule column.
You can select Allow users to specify protection members to give your end users the
choice to add more folders on the computer that they want to back up. However, the files and
folders you have explicitly excluded as an administrator cannot be selected by the end user.
Under File type exclusions you can specify the file types to exclude using their file
extensions.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
6. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
8. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
12. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
14. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Recover client data


You can recover client computer data using the Recovery Wizard. You can also set up end-user recovery so that
users can recover their own data.
Allow clients to recover their own data
End-user recovery enables users to independently recover file data by retrieving recovery points of their files. Note
that:
Users can only recover data stored on disk.
You'll need to modify the Active Directory schema to enable end-user recovery. DPM extends the schema,
creates a container (MS -ShareMapConfiguration), grants the DPM server permissions to change the
container contents, and adds mappings between source and replica shares. View a detailed list of classes and
attributes added to AD by DPM.
If you enable end-user recovery you can't specify on which file servers end-user recovery is enabled.
You can't control which Active Directory users or groups can perform end-user recovery.
To configure end-user recovery here's what you'll need to do:
1. Configure Active Directory to support end-user recovery:
a. In the DPM console click Options > End-user Recovery > Configure Active Directory.
b. In Configure Active Directory select Use current credentials or type in a user name and
password with schema and domain admin permissions. Confirm your settings.
c. If you don't have an account that has schedule and domain admin permissions you can ask another
user with those permissions to run <drive:>\Program Files\Microsoft Data Protection
Manager\DPM\End User Recovery\DPMADSchemaExtension.exe on a computer in the same
domain as the DPM server. When the app runs the user should specify the name of the computer on
which you want to enable end-user recovery and the DNS domain name of the DPM server.
Note that if the protected computer and DPM reside in different domains, the schema needs to be
extended by running the DPMADSchemaExtension.exe tool on the other domain.
2. After AD settings are complete in the End-user Recovery tab click Enable end-user recovery.
Recover data
Recover data from the DPM console as follows:
1. In DPM console click Recovery on the navigation bar. and browse for the data you want to recover. In the
results pane, select the data.
2. Available recovery points are indicated in bold on the calendar in the recovery points section. Select the bold
date for the recovery point you want to recover.
3. In the Recoverable item pane, click to select the recoverable item you want to recover.
4. In the Actions pane, click Recover. DPM starts the Recovery Wizard.
5. You can recover data as follows:
a. Recover to the original location. Note that this doesn't work if the client computer is connected
over VPN. In this case use an alternate location and then copy data from that location.
b. Recover to an alternate location.
c. Copy to tape. This option copies the volume that contains the selected data to a tape in a DPM
library. You can also choose to compress or encrypt the data on tape.
6. Specify your recovery options:
a. Existing version recovery behavior. Select Create copy, Skip, or Overwrite. This option is
enabled only when you're recovering to the original location.
b. Restore security. Select Apply settings of the destination computer or Apply the security
settings of the recovery point version.
c. Network bandwidth usage throttling. Click Modify to enable network bandwidth usage
throttling.
d. Enable SAN based recovery using hardware snapshots. Select this option to use SAN -based
hardware snapshots for quicker recovery.
This option is valid only when you have a SAN where hardware snapshot functionality is enabled, the
SAN has the capability to create a clone and to split a clone to make it writable, and the protected
computer and the DPM server are connected to the same SAN.
e. Notification. Click Send an e-mail when the recovery completes, and specify the recipients who
will receive the notification. Separate the e-mail addresses with commas.
7. Click Next after you have made your selections for the preceding options.
8. Review your recovery settings, and click Recover. Note that any synchronization job for the selected
recovery item will be canceled while the recovery is in progress.
End users should recover data as follows:
1. Navigate to the protected data file. Right-click the file name > Properties.
2. In Properties > Previous Versions select the version that you want to recover from.
Back up file data with DPM
7 minutes to read

You can use System Center Data Protection Manager (DPM ) to back up file data on server and client computers.

Before you start


1. Deploy DPM - Verify that DPM is installed and deployed correctly. We recommend that you review the
following articles:
System requirements
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent - You'll need to install the DPM protection agent on every machine you
want to back up. Read Deploy the DPM protection agent.

Back up file data


After you have your DPM infrastructure set up you can enable protection machines that have file data you want to
back up.
1. To create a protection group, click Protection > Actions > Create Protection Group to open the Create
New Protection Group wizard in the DPM console.
2. In Select Protection Group Type select Servers.
3. In Select Group Members you'll add the machines for which you want to back up file data to the
protection group. On those machines you select the locations, shares, and folders you want to protect.
Deploy protection groups. You can select different types of folders (such as Desktop) or different file types.
You can also exclude specific locations from protection.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
6. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also co-locate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
8. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
12. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
14. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Recover backed up file data


You recover data using the Recovery Wizard. When you double-click a protected volume on the Protected data
pane in the wizard, DPM displays the data that belongs to that volume in the results pane. You can filter protected
server names alphabetically by clicking Filter. After selecting a data source to recover in the tree view, you can
select a specific recovery point by clicking the bold dates in the calendar. When you click Recover in the Actions
pane, DPM starts the recovery job.
Recover data
Recover data from the DPM console as follows:
1. In DPM console click Recovery on the navigation bar. and browse for the data you want to recover. In the
results pane, select the data.
2. Available recovery points are indicated in bold on the calendar in the recovery points section. Select the bold
date for the recovery point you want to recover.
3. In the Recoverable item pane, click to select the recoverable item you want to recover.
4. In the Actions pane, click Recover to open the Recovery Wizard.
5. You can recover data as follows:
a. Recover to the original location. Note that this doesn't work if the client computer is connected
over VPN. In this case use an alternate location and then copy data from that location.
b. Recover to an alternate location.
c. Copy to tape. This option copies the volume that contains the selected data to a tape in a DPM
library. You can also choose to compress or encrypt the data on tape.
6. Specify your recovery options:
a. Existing version recovery behavior. Select Create copy, Skip, or Overwrite. This option is
enabled only when you're recovering to the original location.
b. Restore security. Select Apply settings of the destination computer or Apply the security
settings of the recovery point version.
c. Network bandwidth usage throttling. Click Modify to enable network bandwidth usage
throttling.
d. Enable SAN based recovery using hardware snapshots. Select this option to use SAN -based
hardware snapshots for quicker recovery.
This option is valid only when you have a SAN where hardware snapshot functionality is enabled, the
SAN has the capability to create a clone and to split a clone to make it writable, and the protected
computer and the DPM server are connected to the same SAN.
e. Notification. Click Send an e-mail when the recovery completes, and specify the recipients who
will receive the notification. Separate the e-mail addresses with commas.
7. Click Next after you have made your selections for the preceding options.
8. Review your recovery settings, and click Recover. Note that any synchronization job for the selected
recovery item will be canceled while the recovery is in progress.
When using Modern Backup Storage (MBS ), File Server end user recovery (EUR ) is not supported. File Server
EUR has a dependency on the Volume Shadow Copy Service (VSS ), which Modern Backup Storage does not use.
If end-user recovery is enabled, then recover data as follows:
1. Navigate to the protected data file. Right-click the file name > Properties.
2. In Properties > Previous Versions select the version that you want to recover.
Back up system state and bare metal
15 minutes to read

System Center Data Protection Manager (DPM ) can back up system state and provide bare metal recovery (BMR )
protection.
System state backup: Backs up operating system files, enabling you to recover when a machine starts but
you've lost system files and registry. A system state backup includes:
Domain member: Boot files, COM+ class registration database, registry
Domain controller: Active Directory (NTDS ), boot files, COM+ class registration database, registry,
system volume (SYSVOL )
Machine running cluster services: Additionally backs up cluster server metadata
Machine running certificate services: Additionally backs up certificate data
Bare metal backup: Backs up operating system files and all data except user data on critical volumes. By
definition a BMR backup includes a system state backup. Provides protection when a machine won't start
and you have to recover everything.
This table summarizes what you can back up and recover. You can see detailed information about app versions that
can be protected with system state and BMR in What can DPM back up?

RECOVER FROM DPM RECOVER FROM SYSTEM


BACKUP ISSUE BACKUP STATE BACKUP BMR

File data Lost file data Y N N

Regular data backup

BMR/system state
backup

File data Lost/damaged N Y Y


operating system
DPM backup of file
data

BMR/system state
backup

File data Lost server (data N N Y


volumes intact
DPM backup of file
data

BMR/system state
backup
RECOVER FROM DPM RECOVER FROM SYSTEM
BACKUP ISSUE BACKUP STATE BACKUP BMR

File data Lost server (data Y No Yes (BMR followed by


volumes lost) regular recovery of
DPM backup of file backed up file data)
data

BMR/system state
backup

SharePoint data: Lost site, lists, list Y N N


items. documents
DPM backup of farm
data

BMR/system state
backup

SharePoint data: Lost or damaged N Y Y


operating system
DPM backup of farm
data

BMR/system state
backup

SharePoint data: Disaster recovery N N N

DPM backup of farm


data

BMR/system state
backup

Hyper-V Lost VM Y N N

DPM backup of
Hyper-V host or
guest

BMR/system state
backup of host

Hyper-V Lost or damaged N Y Y


operating system
DPM backup of
Hyper-V host or
guest

BMR/system state
backup of host

Hyper-V Lost Hyper-V host N N Y


(VMs intact)
DPM backup of
Hyper-V host or
guest

BMR/system state
backup of host
RECOVER FROM DPM RECOVER FROM SYSTEM
BACKUP ISSUE BACKUP STATE BACKUP BMR

Hyper-V Lost Hyper-V host N N Y


(VMs lost)
DPM backup of BMR recovery
Hyper-V host or followed by regular
guest DPM recovery

BMR/system state
backup of host

SQL Server/Exchange Lost app data Y N N

DPM app backup

BMR/system state
backup

SQL Server/Exchange Lost or damaged N y Y


operating system
DPM app backup

BMR/system state
backup

SQL Server/Exchange Lost server N N Y


(database/transaction
DPM app backup logs intact)

BMR/system state
backup

SQL Server/Exchange Lost server N N Y


(database/transaction
DPM app backup logs lost) BMR recovery
followed by regular
BMR/system state DPM recovery
backup

How system state backup works


1. When a system state backup runs, DPM communicates with WSB request a backup of the server's system
state. By default DPM and WSB will use the drive with the most available free space, and information about
this drive is saved in the PSDataSourceConfig.XML file. This is the drive WSB will use to do backups to.
2. You can customize the drive that DPM uses for the system state backup. To do this on the protected server,
go to drive:\Program Files\Microsoft Data Protection Manager\DPM\Datasources. Open the
PSDataSourceConfig.XML file for editing. Change the <FilesToProtect> value for the drive letter. Save and
close the file. If a protection group protects the computer's system state, run a consistency check. If the
consistency check generates an alert, click Modify protection group link in the alert, and then step
through the wizard. After finishing, run another consistency check.
3. Note that if the protection server is in a cluster it's possible that a cluster drive will be selected as the drive
with the most free space. It's important to be aware of this because if that drive ownership has been
switched to another node and a system state backup runs, the drive won't be available and the backup will
fail. In this situation, you'll need to modify the PSDataSourceConfig.XML to point it to a local drive.
4. Windows Server Backup (WSB ) creates a folder called WindowsImageBackup on the root of the. As it
creates the backup, all data is placed in this folder. When the backup completes the file will then be
transferred over to the DPM server. Note that:
This folder and its contents do not get cleaned up after the backup or transfer is done. The best way
to think of this is that the space is being reserved for the next time a backup is done.
The folder gets created every time a backup is done. The time/date stamp will reflect the time of your
last system state backup..

BMR backup
1. For BMR (including a system state backup) the backup job is performed directly to a share on the DPM
server and not to a folder on the protected server.
2. DPM server calls WSB and shares out the replica volume for that BMR backup. In this case it doesn't tell
WSB to use the drive with the most free space, but instead to use the share created for the job.
3. When the backup finishes the file is transferred to the DPM server. Logs are stored in
C:\Windows\Logs\WindowsServerBackup.

Prerequisites and limitations


BMR isn't supported for computers running Windows Server 2003 or for computers running client
operating systems.
You can't protect BMR and system state for the same computer in different protection groups.
A DPM server can't protect itself for BMR.
Short-term protection to tape (D2T) isn't supported for BMR. Long-term storage to tape (D2D2T) is
supported.
Windows Server Backup must be installed on the protected computer for BMR.
For BMR protection (unlike system state protection) DPM doesn't have any space requirements on the
protected computer. WSB directly transfers the backups to the DPM server. Note that the job for this doesn't
appear in the DPM Jobs view.
If you use Modern Backup Storage and want to increase the BMR default replica size > 30 GB, use the
registry key: HKLM\Software\Microsoft\Microsoft Data Protection Manager\Configuration
ReplicaSizeInGBForSystemProtectionWithBMR (DWORD ).
If you use Modern Backup Storage, SystemState and BMR backups consume more storage (than legacy
storage) due to ReFS cloning. Each SystemState or BMR backup is a full recovery point. To mitigate this
storage consumption, you may want to:
schedule fewer System State or BMR recovery points,
use a smaller retention period for the recovery points,
increase the available storage for System State or BMR backups.

NOTE
The following limitations do NOT apply to Modern Backup Storage (MBS). The following limitations apply only when using
legacy storage, after upgrading DPM 2012 R2 to DPM 2016.

DPM reserves 30 GB of space on the replica volume for BMR. You can change this on the Disk Allocation
page in the Modify Protection Group Wizard or using the Get-DatasourceDiskAllocation and Set-
DatasourceDiskAllocation PowerShell cmdlets. On the recovery point volume, BMR protection requires
about 6 GB for retention of five days. Note that you can't reduce the replica volume size to less than 15 GB.
DPM doesn't calculate the size of BMR data source, but assumes 30 GB for all servers. Admins should
change the value as per the size of BMR backups expected on their environments. The size of a BMR backup
can be roughly calculated sum of used space on all critical volumes: Critical volumes = Boot Volume +
System Volume + Volume hosting system state data such as AD. Process System state backup
If you move from system state protection to BMR protection, BMR protection will require less space on the
recovery point volume. However, the extra space on the volume is not reclaimed. You can shrink the
volume size manually from the Modify Disk Allocation page of the Modify Protection Group Wizard
or using the Get-DatasourceDiskAllocation and Set-DatasourceDiskAllocation cmdlets.
If you move from system state protection to BMR protection , BMR protection will require more space on
the replica volume. The volume will be extended automatically. If you want to change the default space
allocations you can use Modify-DiskAllocation.
If you move from BMR protection to system state protection you'll need more space on the recovery point
volume. DPM might try to automatically grow the volume. If there is insufficient space in the storage pool,
an error will be issued.
If you move from BMR protection to system state protection you'll need space on the protected computer
because system state protection first writes the replica to the local computer and then transfers it to the
DPM server

Before you start


1. Deploy DPM: Verify DPM is deployed correctly. If you haven't see:
System requirements for DPM
What can DPM back up?
What's supported and what isn't for DPM?
Get DPM installed
2. Set up storage-You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
3. Set up the DPM protection agent-You'll need to install the DPM protection agent on machine you want
to back up. Read Deploy the DPM protection agent

Back up system state and bare metal


Set up a protection group as described in Deploy protection groups. Note that you can't protect BMR and system
state for the same machine in different groups, and that when you select BMR system state is automatically
enabled.
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select protection group type click Servers.
3. In Select Group Members expand the machine and select BMR or system state
Remember that you can't protect BMR and system state for the same machine in different groups, and that
when you select BMR system state is automatically enabled. Learn more in Deploy protection groups.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term backup is always to disk first, with the option of backing up from the disk to the Azure cloud with Azure
backup (for short or long-term). As an alternative to long-term backup to the cloud you can also configure
long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back-up interval, you
can check, just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
6. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also colocate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In the Review disk allocation page review the storage pool disk space allocated for the protection group.
Total Data size is the size of the data you want to back up, and Disk space to be provisioned on DPM is
the space that DPM recommends for the protection group. DPM chooses the ideal backup volume, based on
the settings. However, you can edit the backup volume choices in the Disk allocation details. For the
workloads, select the preferred storage in the dropdown menu. Your edits change the values for Total
Storage and Free Storage in the Available Disk Storage pane. Underprovisioned space is the amount of
storage DPM suggests you add to the volume, to continue with backups smoothly in the future.
8. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed-up data stored on the DPM disk.
12. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
14. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.

Recover system state or BMR


You can recover BMR or system state to a network location. If you've backed up BMR use the WIndows Recovery
Environment (WinRE ) to start up your system and connect it to the network. Then use Windows Server Backup to
recover from the network location. If you've backed up system state just use Windows Server Backup to recover
from the network location.
Restore BMR
Run recovery on the DPM server:
1. In the Recovery pane find the machine you want to recovery > Bare Metal Recovery.
2. Available recovery points are indicated in bold on the calendar. Select the date and time for the recovery
point you want to use.
3. In Select Recovery Type select Copy to a network folder.
4. In Specify Destination select where you want to copy the data to. Remember that the selected destination
will need enough room. We recommend a new folder.
5. In Specify Recovery Options select the security settings to apply and select whether you want to use
SAN -based hardware snapshots for quicker recovery (only an option if you have a SAN with this
functionality enabled and the ability to create and split a clone to make it writable. In addition the protected
machine and DPM server must be connected to the same network).
6. Set up notification options and click Recover on the Summary page.
Set up the share location:
1. In the restore location navigate to the folder that contains the backup.
2. Share the folder above WindowsImageBackup so that the root of the shared folder is the
WindowsImageBackup folder. If it isn't restore won't find the backup. To connect using WinRE you'll need a
share that you can access in WinRE with the correct IP address and credentials.
Restore the system:
1. Start the machine for which you want to restore the image to using the Windows DVD to match the system
you are restoring.
2. On the first screen verify language/locale settings. .On the Install screen select Repair your computer.
3. On the System Recovery Options page select Restore your computer using a system image that you
created earlier
4. On the Select a system image backup page select Select a system image > Advanced > Search for a
system image on the network. Select Yes if a warning appears. Navigate to the share path, input the
credentials, and select the recovery point. This scans for specific backups available in that recovery point.
Select the recovery point.
5. In Choose how to restore the backup select Format and repartition disks. In the next screen verify
settings and click Finish to begin the restore. Restart as required.
Restore system state
Run recovery on the DPM server:
1. In the Recovery pane find the machine you want to recovery > Bare Metal Recovery.
2. Available recovery points are indicated in bold on the calendar. Select the date and time for the recovery
point you want to use.
3. In Select Recovery Type select Copy to a network folder.
4. In Specify Destination select where you want to copy the data to. Remember that the selected destination
will need enough room. We recommend a new folder.
5. In Specify Recovery Options select the security settings to apply and select whether you want to use
SAN -based hardware snapshots for quicker recovery (only an option if you have a SAN with this
functionality enabled and the ability to create and split a clone to make it writable. In addition the protected
machine and DPM server must be connected to the same network).
6. Set up notification options and click Recover on the Summary page.
Run Windows Server Backup
1. Click Actions > Recover > This Server > Next.
2. Click Another Server > Specify Location Type page > Remote shared folder. Provide the path to the
folder that contains the recovery point.
3. In Select Recovery Type click System state. In Select Location for System State Recovery click
Original Location
4. In Confirmation click Recover. You'll need to restart the server after the restore.
5. You can also run a system state restore from the command-line. To do this start Windows Server Backup on
the machine you want to recover. From a command prompt type: wbadmin get versions -backuptarget
<servername\sharename> to get the version identifier.
Use the version identifier to start system state restore. At the command line type: wbadmin start
systemstaterecovery -version:<versionidentified> -backuptarget:<servername\sharename>
Confirm that you want to start the recovery. You can see the process in the command window. A restore log
is created. You'll need restart the server after the restore.
Use DPM to back up and restore VMware virtual
machines
25 minutes to read

This article explains how to use Data Protection Manager (DPM ) version 1801 and later, to back up virtual
machines running on the 5.5, 6.0, 6.5 or 6.7 versions of VMware vCenter and vSphere Hypervisor (ESXi).

Supported VMware features


DPM 1801 and later provides the following features when backing up VMware virtual machines:

NOTE
Backup to tape is supported from DPM 2019.

Agentless backup: DPM does not require an agent to be installed on the vCenter or ESXi server, to back up the
virtual machine. Instead, just provide the IP address or fully qualified domain name (FQDN ), and login
credentials used to authenticate the VMware server with DPM.
Cloud Integrated Backup: DPM protects workloads to disk, tape and cloud. DPM's backup and recovery
workflow helps you manage long-term retention and offsite backup.
Detect and protect VMs managed by vCenter: DPM detects and protects VMs deployed on a VMware server
(vCenter or ESXi server). As your deployment size grows, use vCenter to manage your VMware environment.
DPM also detects VMs managed by vCenter, allowing you to protect large deployments.
Folder level auto protection: vCenter lets you organize your VMs in VM folders. DPM detects these folders and
lets you protect VMs at the folder level and includes all subfolders. When protecting folders, DPM not only
protects the VMs in that folder, but also protects VMs added later. DPM detects new VMs on a daily basis and
protects them automatically. As you organize your VMs in recursive folders, DPM automatically detects and
protects the new VMs deployed in the recursive folders.
DPM protects VMs stored on a local disk, network file system (NFS ), or cluster storage.
DPM protects VMs migrated for load balancing: As VMs are migrated for load balancing, DPM automatically
detects and continues VM protection.
DPM can recover files/folders from a Windows VM without recovering the entire VM, which helps recover
necessary files faster.

Prerequisites and Limitations


Before you start backing up a VMware virtual machine, review the following list of limitations and prerequisites.
If you have been using DPM to protect a VMware server as a Windows Server, you cannot use the same fully
qualified domain name (FQDN ) or static IP. If you used a FQDN to identify your VMware VM, then use a static
IP address to identify your VMware server. If you used a static IP address to identify your VMware VM earlier,
then use a FQDN to identify your VMware VM. You cannot use a dynamic IP address. Note that DPM agent
should not be pushed on to Windows Server that is acting as VMWare vCenter Server.
If you use vCenter to manage ESXi servers in your environment, add vCenter (and not ESXi) to the DPM
protection group.
DPM cannot protect VMware VMs to a secondary DPM server.
You cannot back up user snapshots before the first DPM backup. Once DPM completes the first backup, then
you can back up user snapshots.
DPM cannot protect VMware VMs with pass-through disks and physical raw device mappings (pRDM ).
DPM cannot detect or protect VMware vApps.
DPM cannot protect VMware VMs with existing snapshots.

Configure DPM to protect VMware


The following information details how to configure VMware for DPM protection. To establish communication
between DPM and the VMware server, configure the VMware credentials and establish a secure connection
between DPM and the VMware vCenter Server or VMware vSphere Hypervisor (ESXi) server. If you use both
vCenter Server and ESXi server, configure only the vCenter Server to work with DPM. You don't need to add ESXi
servers to DPM. To manage a VMware server, DPM needs valid credentials to access VMware servers.
Credential management
DPM does not use an agent to communicate with a VMware server. Instead, DPM uses a user name and
password credential to authenticate its remote communication with the VMware server. Each time DPM
communicates with a VMware server, DPM must be authenticated. As it can be necessary to change credentials,
and a data center can have multiple vCenter servers requiring unique credentials, tracking these credentials can be
a problem. However, DPM has a Manage VMware Credentials feature to securely store and manage credentials.
Note the following details about credentials:
One credential can be used to authenticate multiple VMware servers.
Once credential details such as: Description, User name, and Password are updated, DPM uses these
credentials to communicate with all VMware servers.
A credential can be deleted only if it is not being used to authenticate a VMware server.
Open the Manage VMware Credentials feature
1. In the DPM Administrator Console, click Management.

2. In the list of assets to manage, click Production Servers.


3. In the tool ribbon, click Manage VMware Credentials. The Manage Credentials dialog opens. Using the
Manage Credentials dialog, you can add, update, or delete credentials.
See the following sections for detailed information on adding, updating, or deleting credentials.
Add VMware server credentials
You add a credential to the DPM server so you can pair it up with credential on the VMware server. Remember,
the credential on the DPM server must be identical to the credential on the VMware server. To add a credential, in
the Manage Credentials dialog:
1. Click Add to open the Add Credential dialog.

2. Type your information in the Name, Description, User name, and Password fields. Once you've added
text in the required fields, the Add button becomes active.
Name is what appears in the Credential column of the Manage Credentials dialog. Name is a required
field and is the identifier for the credentials. This field cannot be edited later. If you want to change the
name of a credential, you must add a new credential.
Description is descriptive text or an alternate name so you can recognize or distinguish the credentials
in the Manage Credentials dialog. The Description text is an optional field and appears in the
Description column of the Manage Credentials dialog.
User name and Password are the user name and password for the user account used to access the
server. Both fields are required.
3. Click Add to save your new credentials. Once you have created credentials, you can use them to
authenticate with a VMware server.
Update VMware server credentials
Most organizations need to update credentials due to security reasons or personnel changes. When VMware
server credentials are changed, the credentials used by DPM also need to be updated. If a VMware server's
credentials (user name and password) have changed, you must add matching credentials in DPM.
Once you have matching credentials in DPM, update the VMware server credentials using the following steps:
1. In the DPM Administrator console, click Management.
2. In the list of assets to manage, click Production Servers.
3. In the list of computers, select the VMware server whose credentials need to be updated. In the example image,
demovcenter1.Contoso.com is the VMware server with broken credentials.

4. On the Administrator console tool ribbon, click Change Settings. The Change Settings dialog opens. It
displays all credentials on the DPM server. In the example image, demovcenter_002 is the DPM credential to
pair with demovcenter1.Contoso.com.

5. From the list, select the credential on the DPM server to match the VMware credential and click Update. In the
image, notice demovcenter_002 authenticates a production server, and demovcenter1.Contoso.com is now
protected.

Delete VMware server credentials


When you delete credentials, you are removing the credential from the list on the DPM server. DPM doesn't allow
you to delete a credential that is used to authenticate a production server.
To delete a credential
1. In the DPM Administrator Console, click Management, click Production Servers, and in the tool ribbon, click
Manage VMware Credentials.
2. In the Manage Credentials dialog, select the credential. Make sure the credential is not associated with any
Production Servers.
3. Click Delete to remove the credential from the list.
Set up secure communication between DPM and a VMware server
DPM communicates with the VMware server securely over an HTTPS channel. To create the secure
communication, install a trusted certificate on both the VMware server and DPM server. If the connection to your
vCenter is not secure, you can secure it by installing a certificate on the DPM server. Use the same certificate to
make a secure connection with the VMware server.
To verify there is a secure communication channel between DPM and vCenter, open a browser on the DPM server
and access the VMware server. If you are using Chrome, and you do not have a valid certificate you see the
strikethrough in the URL, like this example:

If you are using Internet Explorer, and you don't have a valid certificate, you see this message when you access the
URL:

To fix the error, install a valid certificate on the DPM server and the VMware server. In the previous images, the
DPM server has a valid certificate, but the certificate is not in the trusted root certification authority store. To fix
this situation, add the certificate to the VMware server.
1. On the Certificate dialog, on the Certification Path tab, click View Certificate.
2. In the new Certificate dialog, click the Details tab, and then click Copy to File to open the Certificate
Export Wizard.

3. In the Certificate Export Wizard, click Next, and on the Export File Format screen, select DER
encoded binary X.509 (.CER), then click Next.
4. On the File to Export screen, type a name for your certificate and click Next.
5. Click Finish to complete the Certificate Export Wizard.
6. Locate the exported certificate. Right-click the certificate and select Install Certificate to open the
Certificate Import Wizard.
7. In the Certificate Import wizard, click Local Machine and then click Next.
8. To find the location where you want to place the certificateOn the Certificate Store screen, click Place all
certificates in the following store and click Browse.
9. In the Select Certificate Store dialog, select Trusted Root Authority Certificate and click OK.

10. Click Next and then click Finish to import the certificate successfully.
11. Once you have added the certificate, sign into your vCenter server to verify the connection is secure.
Add a new user account in VMware server
DPM uses your user name and password as credentials for communicating and authenticating with VMware
server. An authenticated user has, at least the following privileges, which are required for successfully protecting a
VM:
Global.ManageCustomFields
Network.Assign
Datastore.AllocateSpace
VirtualMachine.Config.ChangeTracking
VirtualMachine.State.RemoveSnapshot
VirtualMachine.State.CreateSnapshot
VirtualMachine.Provisioning.DiskRandomRead
VirtualMachine.Interact.PowerOff
VirtualMachine.Inventory.Create
VirtualMachine.Config.AddNewDisk
VirtualMachine.Config.HostUSBDevice
VirtualMachine.Config.AdvancedConfig
VirtualMachine.Config.SwapPlacement
The recommended steps for assigning these privileges:
Create a role, for example, BackupAdminRole
1. In the vSphere Web Client, from the Navigator menu, click Administration > Roles.
2. From the Roles provider drop-down menu, select the vCenter Server to which the role applies.
3. On the Roles pane, click '+' to open the Create Role dialog and create a role.
4. Name the role, BackupAdminRole.
5. Select the privileges (identified in the preceding bulleted list) for the role and click OK.
Create a new user, for example, BackupAdmin
When you create a user, that user must be in the same domain as the objects you want to protect.
1. In the vSphere Web Client, on the Navigator menu, click Administration.
2. In the Administration menu, click Users and Groups.
3. To create a new user, on the Users tab, click '+' to open the New User dialog.
4. Provide a User name and password for the role. Use BackupAdmin as the User name. Additional information
is optional.
Assign the role, BackupAdminRole, to the user, BackupAdmin
1. In the vSphere Web Client, on the Navigator menu, click Administration.
2. In the Administration menu, click Global Permissions.
3. On the Global Permissions pane, click the Manage tab.
4. On the Manage tab, click '+' to open the Add Permission dialog.
5. In the Add Permissions dialog, click Add.
6. In the Select Users/Groups dialog, choose the correct domain from the Domain menu, then in the
User/Group column select BackupAdmin, and click Add. The user name appears in the Users field in the
format: domain\BackupAdmin.
7. Click OK to return to the Add Permissions dialog.
8. In the Assigned Role area, from the drop-down menu, select the role, BackupAdminRole, and click OK. The
new user and role association appears in the Manage tab.
Add a VMware server to DPM
1. In the DPM Administrator Console, click Management > Production Servers > Add to open the
Production Server Addition Wizard.

2. On the Select Production Server type screen, select VMware Servers, and click Next.

3. On the Select Computers screen, provide the following information:


Server Name/IP Address: enter the VMware server fully qualified domain name (fQDN ) or IP
address.
SSL Port: select the SSL port number used to communicate with the VMware server. DPM uses Https
to communicate with VMware servers over a secured connection. To successfully communicate with
VMware servers, DPM requires the SSL port number configured for that VMware server. If the
VMware servers are not explicitly configured with different SSL ports, continue with default port, 443.
Specify Credential: Select the credential needed to authenticate with this VMware server. If the
required credential has not yet been added to DPM, choose Add New Credential. Then, provide the
Name, Description, User name, and Password for the credential. Once you have filled out the fields, click
Add to add the server to the list of VMware Servers. If you would like to add more VMware servers to
the list, repeat this step. If you are finished adding servers to the list, click Next.
4. On the Summary screen, select the server you want to add, and click Add. After adding the VMware
servers to DPM, see Configure Backup for information about the available methods of protection.
Disable secure communication protocol
If your organization does not want to use secure communication protocol (HTTPS ), you can create a registry key
to disable it. To create this registry key:
1. Copy and paste the following text into a .txt file.
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\VMWare]

"IgnoreCertificateValidation"=dword:00000001

2. Save the file with the name, DisableSecureAuthentication.reg, to your DPM server.
3. Double-click the file to activate the registry entry.

Configure Backup
Once you've added the VMware server(s) to DPM, you're almost ready to start protection in DPM. However,
before you begin protection, you need to allocate disk storage that DPM can use for short-term storage. For
guidance on adding storage, see Adding Storage to DPM. Once you have added storage, you are ready to use the
Create New Protection Group wizard to create a protection group for the VMware VMs.
Folder-level protection
VMware provides VM folders that let you organize VMs as you like.
DPM can protect individual VMs, as well as cascading levels of folders that contain VMs. Once you select a folder
for protection, all folders (and VMs) within this folder are automatically detected and protected. This is called
folder-level protection. DPM detects and configures protection for the VMs at 12 AM (based on the DPM server's
local timezone). When DPM detects that new VMs have been created, DPM configures protection by end of that
day.
Scale out protection of clustered VMware servers
In large VMware deployments, a single vCenter server can manage thousands of VMs. DPM supports scale-out
protection of VMware server clusters. The new scale-out feature removes the limit of a one-to-one relationship
between a VMware cluster and a DPM server. You can add a VM to a protection group on any of the recognized
DPM servers. Multiple DPM servers can be used to protect VMs managed by a single vCenter server. However,
only one DPM server can protect a VM or folder at any given time. VMs and folders that are already protected by
one DPM server cannot be selected by another DPM server. To deploy scale-out protection, there must be a
minimum of two DPM servers. In the following example graphic, D1 and D2 are visible to all virtual machines
hosted on nodes N1, N2, N3, and N4. When protection groups on D1 or D2 are created, any virtual machine can
be added.

Backing up virtual machines to a disk, tape or cloud


DPM can back up VMware VMs to disk, tape and to the Azure cloud. You specify the protection method while
creating the new Protection Group.
For all operational recovery scenarios like accidental deletion or corruption scenarios, back up to disk. For long-
term retention or offsite backup requirements, back up to tape or cloud.
DPM provides application-consistent backups of Windows VMs and file-consistent backups of Linux VMs
(provided you install VMware tools on the guest).
Back up virtual machine to Tape

NOTE
Applicable to DPM 2019

For long term retention on VMware backup data on-premises, you can now enable VMware backups to tape. The
backup frequency can be selected based on the retention range (which will vary from 1-99 years) on tape drives.
The data on tape drives could be both compressed and encrypted. DPM 2019 supports both OLR (Original
Location Recovery) & ALR (Alternate Location Recovery) for restoring the protected VM.
Use the following procedure:
1. In the DPM Administrator console, click Protection > Create protection group to open the Create New
Protection Group wizard.
2. On the Select Group Members page, select the VMWare VMs you want to protect.
3. On the Select Data Protection Method page, select I want long-term protection using tape.
4. In Specify Long-Term Goals > Retention range, specify how long you want to keep your tape data (1-99
years). In Frequency of backup, select the backup frequency that you want.
5. On the Select Tape and Library Details page, specify the tape and library that'll be used for back up of this
protection group. You can also specify whether to compress or encrypt the backup data.
Create a Protection Group for VMware VMs
1. In the Administrator Console, click Protection.
2. On the tool ribbon, click New to open the Create New Protection Group wizard.
3. In the Select Protection Group Type screen, select Servers and click Next.

4. In the Select Group Members screen, expand the Available members folders and select the folders to
protect and click Next. Once you select a folder, the member is added to the Selected members list. Items
already protected by a DPM server cannot be selected again. View the DPM server that protects an item by
hovering over the item in the Available members list.
5. On the Select Data Protection Method screen, type a Protection group name, and then select the
protection method. For protection method, you can choose: short-term protection to a hard drive, long term
backup to tape, or online protection to the cloud. Once you've selected your protection method, click Next.
If you have a standalone tape or tape library connected to the DPM server, you'll be able to select I want
long-term protection using tape.
6. On the Specify Short-Term Goals screen, for the Retention Range specify the number of days your data
is kept on disk. If you want to change the schedule when application recovery points are taken, click Modify.
On the Express Full Backup tab, choose a new schedule for the time(s) and days of the week when Express
Full Backups are taken. The default is daily at 8 PM, local time for the DPM server. When you have the
short-term goals you like, click Next.
7. If you want to store data on tape for long-term storage in Specify long-term goals, indicate how long you
want to keep tape data (1-99 years). In Frequency of backup, specify how often backups to tape should
run. The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until there is
insufficient space on the tape. You can also collocate data from different protection groups on tape.
On the Select Tape and Library Details page, specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
8. On the Review Disk Allocation screen, recommended disk allocations are displayed. Recommendations are
based on the retention range, the type of workload and the size of the protected data. Click Next.
9. On the Choose Replica Creation Method screen, specify how the initial replication of data in the protection
group is performed. If you choose to replicate over the network, we recommended you choose an off-peak
time. For large amounts of data or less than optimal network conditions, consider replicating the data offline
using removable media.
10. On the Consistency Check Options screen, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don’t
want to configure automatic consistency checking, you can run a manual check. To run a manual check, right-
click the protection group in the Protection area of the DPM console, and select Perform Consistency Check.
11. On the Specify Online Protection Data screen, select the data source(s) that you want to protect.
12. On the Specify Online Backup Schedule screen, specify how often you want to take a backup from the disk
backup to Azure. A recovery point is created each time a backup is taken.
13. On the Specify Online Retention Policy screen, specify how long you want to retain your data in Azure.
Read more about backing up DPM to Azure in the article, Backup DPM workloads with Azure Backup.
14. On the Choose Online Replication screen, choose your method for creating your initial backup copy. The
default choice is to send the initial backup copy of your data over the network. However, if you have a large
amount of data, it may be more timely to use the Offline Backup feature. See the Offline Backup article in
Azure for more information, including a step-by-step walkthrough.
15. On the Summary screen, review the settings. If you are interested in optimizing performance of the protection
group, see the article, Optimizing DPM operations that affect performance. Once you are satisfied with all
settings for the protection group, click Create Group to create the protection group and trigger the initial
backup copy.
The Status screen appears and gives you an update on the creation of your protection group, and the state of your
initial backup.

Restore VMware virtual machines


This section explains how to use DPM to restore VMware VM recovery points. For an overview on using DPM to
recover data, see Recover protected data. In the DPM Administrator Console, there are two ways to find
recoverable data - search or browse. When recovering data, you may, or may not want to restore data or a VM to
the same location. For this reason DPM supports three recovery options for VMware VM backups.
Original location recovery (OLR) - Use OLR to restore a protected VM to its original location. You can
restore a VM to its original location only if no disks have been added or deleted, since the back up occurred. If
disks have been added or deleted, you must use alternate location recovery.
Alternate location recovery (ALR) - When the original VM is missing, or you don't want to disturb the
original VM, recover the VM to an alternate location. To recover a VM to an alternate location, you must
provide the location of an ESXi host, resource pool, folder, and the storage datastore and path. To help
differentiate the restored VM from the original VM, DPM appends "-Recovered" to the name of the VM.
Individual file location recovery (ILR) - If the protected VM is a Windows Server VM, individual
files/folders inside the VM can be recovered using DPM’s ILR capability. To recover individual files, see the
procedure later in this article.
Restore a recovery point
1. In the DPM Administrator Console, click Recovery view.
2. Using the Browse pane, browse or filter to find the VM you want to recover. Once you select a VM or folder, the
Recovery points for pane displays the available recovery points.
3. In the Recovery points for field, use the calendar and drop-down menus to select a date when a recovery
point was taken. Calendar dates in bold have available recovery points.
4. On the tool ribbon, click Recover to open the Recovery Wizard.

5. Click Next to advance to the Specify Recovery Options screen.


6. On the Specify Recovery Options screen, if you want to enable network bandwidth throttling, click Modify.
To leave network throttling disabled, click Next. No other options on this wizard screen are available for
VMware VMs. If you choose to modify the network bandwidth throttle, in the Throttle dialog, select Enable
network bandwidth usage throttling to turn it on. Once enabled, configure the Settings and Work
Schedule.
7. On the Select Recovery Type screen, choose whether to recover to the original instance, or to a new location,
and click Next.
If you choose Recover to original instance, you don't need to make any more choices in the wizard.
The data for the original instance is used.
If you choose Recover as virtual machine on any host, then on the Specify Destination screen,
provide the information for ESXi Host, Resource Pool, Folder, and Path.

8. On the Summary screen, review your settings and click Recover to start the recovery process. The Recovery
status screen shows the progression of the recovery operation.
Restore an individual file from a VM
You can restore individual files from a protected VM recovery point. This feature is only available for Windows
Server VMs. Restoring individual files is similar to restoring the entire VM, except you browse into the VMDK and
find the file(s) you want, before starting the recovery process. To recover an individual file or select files from a
Windows Server VM:
1. In the DPM Administrator Console, click Recovery view.
2. Using the Browse pane, browse or filter to find the VM you want to recover. Once you select a VM or
folder, the Recovery points for pane displays the available recovery points.
3. In the Recovery Points for: pane, use the calendar to select the date that contains the desired recovery
point(s). Depending on how the backup policy has been configured, dates can have more than one recovery
point. Once you've selected the day when the recovery point was taken, make sure you've chosen the
correct Recovery time. If the selected date has multiple recovery points, choose your recovery point by
selecting it in the Recovery time drop-down menu. Once you chose the recovery point, the list of
recoverable items appears in the Path: pane.
4. To find the files you want to recover, in the Path pane, double-click the item in the Recoverable item
column to open it. Select the file, files, or folders you want to recover. To select multiple items, press the Ctrl
key while selecting each item. Use the Path pane to search the list of files or folders appearing in the
Recoverable Item column. Search list below does not search into subfolders. To search through
subfolders, double-click the folder. Use the Up button to move from a child folder into the parent folder.
You can select multiple items (files and folders), but they must be in the same parent folder. You cannot
recover items from multiple folders in the same recovery job.
5. When you have selected the item(s) for recovery, in the Administrator Console tool ribbon, click Recover to
open the Recovery Wizard. In the Recovery Wizard, the Review Recovery Selection screen shows the
selected items to be recovered.
6. On the Specify Recovery Options screen, if you want to enable network bandwidth throttling, click
Modify. To leave network throttling disabled, click Next. No other options on this wizard screen are
available for VMware VMs. If you choose to modify the network bandwidth throttle, in the Throttle dialog,
select Enable network bandwidth usage throttling to turn it on. Once enabled, configure the Settings
and Work Schedule.
7. On the Select Recovery Type screen, click Next. You can only recover your file(s) or folder(s) to a network
folder.
8. On the Specify Destination screen, click Browse to find a network location for your files or folders. DPM
creates a folder where all recovered items are copied. The folder name has the prefix, DPM_day-month-
year. When you select a location for the recovered files or folder, the details for that location (Destination,
Destination path, and available space) are provided.

9. On the Specify Recovery Options screen, choose which security setting to apply. You can opt to modify
the network bandwidth usage throttling, but throttling is disabled by default. Also, SAN Recovery and
Notification are not enabled.
10. On the Summary screen, review your settings and click Recover to start the recovery process. The
Recovery status screen shows the progression of the recovery operation.

VMware parallel backups


With earlier versions of DPM, parallel backups were performed only across protection groups. With DPM
2019, all your VMWare VMs backup within a single protection group would be parallel, leading to faster
VM backups. All VMWare delta replication jobs would run in parallel. By default, number of jobs to run in
parallel is set to 8.
You can modify the number of jobs by using the registry key as shown below (not present by default, you
need to add):
Key Path : Software\Microsoft\Microsoft Data Protection Manager\Configuration\
MaxParallelIncrementalJobs\VMWare Key Type : DWORD (32-bit) value.

NOTE
You can modify the number of jobs to a higher value. If you set the jobs number to 1, replication jobs run serially. To
increase the number to a higher value, you must consider the VMWare performance. Considering the number of
resources in use and additional usage required on VMWare vSphere Server, you should determine the number of
delta replication jobs to run in parallel. Also, this change will affect only the newly created Protection Groups. For
existing Protection groups you must temporarily add another VM to the protection group. This should update the
Protection Group configuration accordingly. You can remove this VM from the Protection Group after the procedure
is completed.

VMWare vSphere 6.7


To backup vSphere 6.7 do the following:
Enable TLS 1.2 on DPM Server

NOTE
VMWare 6.7 onwards had enabled TLS as communication protocol.

Set the registry keys as follows:


Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions"=dword:00000001 "SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions"=dword:00000001 "SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions"=dword:00000001 "SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions"=dword:00000001 s"SchUseStrongCrypto"=dword:00000001
Back up and restore VMM servers
6 minutes to read

System Center Data Protection Manager (DPM ) can back up the SQL Server instances that are being used as the
System Center Virtual Machines Manager (VMM ) database in a couple of ways:
You can do a regular SQL Server backup.
You can back up the SQL Server database using the VMM Express Writer component that appears under
the VMM server in the DPM console. The main advantage to this method is that you don't need to set up
any special permissions on the SQL Server.
DPM can back up the VMM database using the VMM Express Writer component when VMM is running on
System Center 2012 onwards as a physical/virtual machine in the following deployment scenarios:
A standalone VMM host + standalone SQL Server (default and named, local and remote)
A standalone VMM host + clustered SQL Server (default and named, remote)
A clustered VMM host + standalone SQL Server (default and named, local and remote)
A clustered VMM host + clustered SQL Server (default and named, remote)

Prerequisites and limitations


Before setting up a DPM backup for VMM using VMM Express Writer note the following:
DPM only backs up the DPM SQL Server database. It doesn't back up all configuration files in the VMM
library.
DPM supports initial replication and express full backups for VMM machines. Incremental backup isn't
supported.
DPM can't back up the VMM database if you specified a static IP address for the SQL Server when you set
up VMM. DPM also can't back up if you specified "localhost" for the database.
If you're using Distributed Key Management (DKM ) encryption (key stored in AD ) then DPM won't back up
the key. You'll need to protect that as part of your AD backup. If the key's stored locally it's backed up as part
of the database.
In case of a failover, DPM will continue backing up when the VMM node comes back online. This allows you
to perform scheduled failovers without losing protection. But if the node is lost, you have to configure
backup for the new one.
DPM supports recovery to original location for VMM hosts. Recovery to an alternate location isn't
supported.

Before you start


Review the release notes and read about any VMM backup issues in What's supported and what isn't for
DPM?
Make sure that the VMM machines you want to back up are in the DPM server domain, or in a domain with
a two-way trust relationship with the DPM domain.
Set up storage - You can store backed up data on disk, on tape, and in the cloud with Azure. Read more in
Prepare data storage.
You'll need to deploy the DPM protection agent on the VMM server. Learn more in Deploy the DPM
protection agent.

Back up VMM
1. Click Protection > Actions > Create Protection Group to open the Create New Protection Group
wizard in the DPM console.
2. In Select protection group type click Clients. You only select clients if you want to back up data on a
Windows computer running a Windows client operating system. For all other workloads select server. Learn
more in Deploy protection groups.
3. In Select Group Members expand the VMM machine and select VMM Express Writer.
4. In Select data protection method specify how you want to handle short and long-term backup. Short-
term back up is always to disk first, with the option of backing up from the disk to the Azure cloud with
Azure backup (for short or long-term). As an alternative to long-term backup to the cloud you can also
configure long-term back up to a standalone tape device or tape library connected to the DPM server.
5. In Select short-term goals specify how you want to back up to short-term storage on disk. In Retention
range you specify how long you want to keep the data on disk. In Synchronization frequency you specify
how often you want to run an incremental backup to disk. If you don't want to set a back up interval you can
check Just before a recovery point so that DPM will run an express full backup just before each recovery
point is scheduled.
6. If you want to store data on tape for long-term storage in Specify long-term goals indicate how long you
want to keep tape data (1-99 years). In Frequency of backup specify how often backups to tape should run.
The frequency is based on the retention range you've specified:
When the retention range is 1-99 years, you can select backups to occur daily, weekly, bi-weekly,
monthly, quarterly, half-yearly, or yearly.
When the retention range is 1-11 months, you can select backups to occur daily, weekly, bi-weekly, or
monthly.
When the retention range is 1-4 weeks, you can select backups to occur daily or weekly.
On a stand-alone tape drive, for a single protection group, DPM uses the same tape for daily backups until
there is insufficient space on the tape. You can also co-locate data from different protection groups on tape.
On the Select Tape and Library Details page specify the tape/library to use, and whether data should be
compressed and encrypted on tape.
7. In Review disk allocation page review the storage pool disk space allocated for the protection group. Data
size shows the size of the data you want to back up, and Disk space shows the space that DPM
recommends for the protection group. Select Automatically grow the volumes to automatically increase
size when more disk space is required for backing up data.
8. In Choose replica creation method select how you want to handle the initial full data replication. If you
select to replicate over the network we recommended you choose an off-peak time. For large amounts of
data or less than optimal network conditions, consider replicating the data offline using removable media.
9. In Choose consistency check options, select how you want to automate consistency checks. You can
enable a check to run only when replica data becomes inconsistent, or according to a schedule. If you don't
want to configure automatic consistency checking, you can run a manual check at any time by right-clicking
the protection group in the Protection area of the DPM console, and selecting Perform Consistency
Check.
10. If you've selected to back up to the cloud with Azure Backup, on the Specify online protection data page
make sure the workloads you want to back up to Azure are selected.
11. In Specify online backup schedule specify how often incremental backups to Azure should occur. You can
schedule backups to run every day/week/month/year and the time/date at which they should run. Backups
can occur up to twice a day. Each time a back up runs a data recovery point is created in Azure from the copy
of the backed up data stored on the DPM disk.
12. In Specify online retention policy you can specify how the recovery points created from the
daily/weekly/monthly/yearly backups are retained in Azure.
13. In Choose online replication specify how the initial full replication of data will occur. You can replicate
over the network, or do an offline backup (offline seeding). Offline backup uses the Azure Import feature.
Read more.
14. On the Summary page review your settings. After you click Create Group initial replication of the data
occurs. When it finishes the protection group status will show as OK on the Status page. Backup then takes
place in line with the protection group settings.
Prepare to back up a generic data source
2 minutes to read

System Center Data Protection Manager (DPM ) provides the Generic Data Source (GDS ) infrastructure so that
you can protect any Microsoft workload as long as it has a VSS writer.
Here's what you can do:
Complete backup using Express full backup
Recovery to the original location
Back up referential data sources
Back up data source with shared disk clusters
Back up in muliple domains
Back up to tape

Registering a new data source


You'll need to run the Modify-RegisteredWriters command to add, remove or modify the VSS writer ID for a data
source to the list that's registered with DPM.
Syntax
Modify-RegisteredWriters.ps1 [[-DpmServerName] <String>] [-List] [<CommonParameters>]
Modify-RegisteredWriters.ps1 [[-DpmServerName] <String>] [-Remove] [-Writers] [<CommonParameters>]
Modify-RegisteredWriters.ps1 [[-DpmServerName] <String>] [-Add] [-Writers] [<CommonParameters>]

PARAMETER TYPE DESCRIPTION

DPMServerNAme String Specifies the DPM server against which


this command should run. By default,
the command is run against the local
DPM server.

List SwitchParameter Indicates that the command should


display the list of registered writer IDs.

Add SwitchParameter Indicates that the command should add


the list of writer IDs to the list of the
writer IDs that is registered with DPM.

Remove SwitchParameter Indicates that the given list of writer IDs


must be removed from the list of the
writer IDs that is registered with DPM.

Writers String Comma-separated list of writer ID.

Example 1
The Modify-RegisteredWriters command displays the list of writers that are currently registered with the local
DPM server.
Modify-RegisteredWriters -List

Example 2
The Modify-RegisteredWriters command adds the two new writer IDs to the list of registered writers on the local
DPM server.
Modify-RegisteredWriters -Add -Writers "46eef637-28ca-4223-8bb6-2e87bd945179,e1cdedc6-d9d2-4fc3-8af6-
5d0d0fe3e8af"

Example 3
The Modify-RegisteredWriters command removes the specified writer ID from the list of registered writers on
DPM server dpm1.contoso.com.
Modify-RegisteredWriters -DpmServerName dpm1.contoso.com -Remove -Writers 46eef637-28ca-4223-8bb6-2e87bd945179
Prepare machines in workgroups and untrusted
domains for backup
11 minutes to read

System Center Data Protection Manager (DPM ) can protect computers that are in untrusted domains or
workgroups. You can authenticate these computers using a local user account (NTLM authentication), or using
certificates. For both types of authentication you'll need to prepare the infrastructure before you can set up a
protection group that contains the sources you want to back up.
1. Install a certificate-If you want to use certificate authentication install a certificate on the DPM server and
on the computer you want to protect.
2. Install the agent-Install the agent on the computer you want to protect.
3. Recognize the DPM server-Configure the computer to recognize the DPM server for performing
backups. To do this you'll run the SetDPMServer command.
4. Attach the computer-Lastly you'll need to attach the protected computer to the DPM server.

Before you start


Before you start, check the supported protection scenarios and required network settings.
Supported scenarios
WORKLOAD TYPE PROTECTED SERVER STATE AND SUPPORT

Files Workgroup: Supported

Untrusted: Supported

NTLM and certificate authentication for single server.


Certificate authentication only for cluster.

System State Workgroup: Supported

Untrusted: Supported

NTLM authentication only

SQL Server Workgroup: Supported

Untrusted: Supported

Mirroring not supported.

NTLM and certificate authentication for single server.


Certificate authentication only for cluster.

Hyper-V server Workgroup: Supported

Untrusted: Supported

NTLM and certificate authentication


WORKLOAD TYPE PROTECTED SERVER STATE AND SUPPORT

Hyper-V cluster Workgroup: Supported

Untrusted: Supported

CSV not supported.

Certificate authentication only

Exchange Server Workgroup: Not applicable

Untrusted: Supported for single server only. Cluster not


supported. CCR, SCR, DAG not supported. LCR supported.

NTLM authentication only

Secondary DPM server (For backup of primary DPM server) Workgroup: Supported

Note: Both Primary and Secondary DPM Servers must be in Untrusted: Supported
same or trusted domain.
Certificate authentication only

SharePoint Workgroup: Not supported

Untrusted: Not supported

Client computers Workgroup: Not supported

Untrusted: Not supported

Bare metal recovery (BMR) Workgroup: Not supported

Untrusted: Not supported

End-user recovery Workgroup: Not supported

Untrusted: Not supported

Network settings
SETTINGS COMPUTER IN WORKGROUP OR UNTRUSTED DOMAIN

Control data Protocol: DCOM

Default port: 135

Authentication: NTLM/certificate

File transfer Protocol: Winsock

Default port: 5718 and 5719

Authentication: NTLM/certificate

DPM account requirements Local account without admin rights on DPM server. Uses
NTLM v2 communication
SETTINGS COMPUTER IN WORKGROUP OR UNTRUSTED DOMAIN

Certificate requirements

Agent installation Agent installed on protected computer

Perimeter network Perimeter network protection not supported.

IPSEC Ensure IPSEC doesn't block communications.

Back up using NTLM authentication


Here's what you'll need to do:
1. Install the agent - Install the agent on the computer you want to protect.
2. Configure the agent - Configure the computer to recognize the DPM server for performing backups. To do
this you'll run the SetDPMServer command.
3. Attach the computer - Lastly you'll need to attach the protected computer to the DPM server.
Install and configure the agent
1. On the computer you want to protect, run DPMAgentInstaller_X64.exe from the DPM installation CD to
install the agent.
2. Configure the agent by running SetDpmServer as follows:

SetDpmServer.exe -dpmServerName <serverName> -isNonDomainServer -userName <userName> [-


productionServerDnsSuffix <DnsSuffix>]

3. Specify the parameters as follows:


-DpmServerName-Specify the name of the DPM server. Use either an FQDN if the server and
computer are accessible to each other using FQDNs, or a NETBIOS name.
-IsNonDomainServer-Use to indicate that the server is in a workgroup or untrusted domain in
relation to the computer you want to protect. Firewall exceptions are created for required ports.
-UserName-Specify the name of the account you want to use for NTLM authentication. To use this
option you should have the -isNonDomainServer flag specified. A local user account will be created
and the DPM protection agent will be configured to use this account for authentication.
-ProductionServerDnsSuffix-Use this switch if the server has multiple DNS suffixes configured.
This switch represents the DNS suffix that the server uses to connect to the computer you're
protecting.
4. When the command completes successfully open the DPM console.
Update the password
If at any point you want to update the password for the NTLM credentials, run the following on the protected
computer:

SetDpmServer.exe -dpmServerName <serverName> -isNonDomainServer -updatePassword

You'll need to use the same naming convention (FQDN or NETBIOS ) that you did when you configured
protection. On the DPM server you'll need to run the Update -NonDomainServerInfo PowerShell cmdlet. Then
you'll need to refresh the agent information for the protected computer.
NetBIOS example: Protected computer:
SetDpmServer.exe -dpmServerName Server01 -isNonDomainServer -UpdatePassword DPM server:
Update-NonDomainServerInfo -PSName Finance01 -dpmServerName Server01

FQDN example: Protected computer:


SetDpmServer.exe -dpmServerName Server01.corp.contoso.com -isNonDomainServer -UpdatePassword DPM server:
Update-NonDomainServerInfo -PSName Finance01.worlwideimporters.com -dpmServerName Server01.contoso.com

Attach the computer


1. In the DPM console, run the Protection Agent Installation wizard.
2. In Select agent deployment method, select Attach agents.
3. Enter the computer name, user name, and password for the computer that you want to attach to. These
should be the credentials you specified when you installed the agent.
4. Review the Summary page, and click Attach.
You can optionally run the Windows PowerShell Attach-NonDomainServer.ps1 command instead of running the
wizard. To do this take a look at the example in the next section.
Examples
Example 1
Example to configure a workgroup computer after the agent is installed:
1. On the computer, run SetDpmServer.exe -DpmServerName Server01 -isNonDomainServer -UserName mark .
2. On the DPM server, run
Attach-NonDomainServer.ps1 -DpmServername Server01 -PSName Finance01 -Username mark .

Because the workgroup computers are typically accessible only by using NetBIOS name, the value for
DPMServerName must be the NetBIOS name.
Example 2
Example to configure a workgroup computer with conflicting NetBIOS names after the agent is installed.
1. On the workgroup computer, run
SetDpmServer.exe -dpmServerName Server01.corp.contoso.com -isNonDomainServer -userName mark -
productionServerDnsSuffix widgets.corp.com
.
2. On the DPM server, run
Attach-NonDomainServer.ps1 -DPMServername Server01.corp.contoso.com -PSName Finance01.widgets.corp.com -
Username mark
.

Back up using certificate authentication


Here's how to set up protection with certificate authentication.
Each computer you want to protect should have at least .NET Framework 3.5 with SP1 installed.
The certificate you use for authentication must comply with the following:
X.509 V3 certificate
Enhanced Key Usage (EKU ) should have client authentication and server authentication.
Key length should be at least 1024 bits.
Key type should be exchange.
The subject name of the certificate and the root certificate should not be empty.
The revocation servers of the associated Certificate Authorities are online and accessible by both the
protected server and DPM server
The certificate should have associated private key
DPM doesn't support certificates with CNG Keys
DPM doesn't support self-signed certificates.
Each computer you want to protect (including virtual machines) must have its own certificate.
Set up protection
1. Create a DPM certificate template
2. Configure a certificate on the DPM server .
3. Install the agent
4. Configure a certificate on the protected computer
5. Attach the computer
Create a DPM certificate template
You can optionally set up a DPM template for web enrollment. If you do want to do this, select a template that has
Client Authentication and Server Authentication as its intended purpose. For example:
1. In the Certificate Templates MMC snap-in you could select the RAS and IAS Server template. Right-
click it and select Duplicate Template.
2. In Duplicate Template, leave the default setting Windows Server 2003 Enterprise.
3. In the General tab, change the template display name to something recognizable. For example DPM
Authentication. Make sure the setting Publish certificate in Active Directory is enabled.
4. In the Request Handling tab, make sure Allow private key to be exported is enabled.
5. After you've created the template make it available for use. Open the Certificate Authority snap-in. Right-
click Certificate Templates, select New, and choose Certificate Template to Issue. In Enable
Certificate Template select the template and click OK. Now the template will be available when you obtain
a certificate.
Enable enrollment or autoenrollment
If you want to optionally configure the template for enrollment or autoenrollment, click the Subject Name tab in
the template properties. When you configure enrollment the template can be selected in the MMC. If you
configure autoenrollment the certificate is automatically assigned to all computers in the domain.
For enrollment, in the Subject Name tab of the template properties, enable Select Build from this
Active Directory information. In Subject name format select Common Name and enable DNS name.
Then go to the Security tab and assign the Enroll permission to authenticated users.
For autoenrollment, go to the Security tab and assign the Autoenroll permission to authenticated users.
With this setting enabled the certificate will be automatically assigned to all computers in the domain.
If you've configured enrollment you'll be able to request a new certificate in the MMC, based on the
template. To do this, on the protected computer, in Certificates (Local Computer) > Personal, right-click
Certificates. Select All Tasks > Request New Certificate. In the Select Certificate Enrollment Policy
page of the wizard select Active Directory Enrollment Policy. In Request Certificates you'll see the
template. Expand Details and click Properties. Select the General tab and provide a friendly name. After
you apply the settings you should receive a message that the certificate was installed successfully.
Configure a certificate on the DPM server
1. Generate a certificate from a CA for the DPM server, via web enrollment or some other method. In web
enrollment, select advanced certificate required, and Create and Submit a request to this CA. Make
sure the key size is 1024 or higher, and that Mark key as exportable is selected.
2. The certificate is placed in the User store. We need to move it to the Local Computer store.
3. To do this export the certificate from the User store. Make sure you export it with the private key. You can
export it in the default .pfx format. Specify a password for the export.
4. In Local Computer\Personal\Certificate run the Certificate Import Wizard to imported the exported file
from its saved location. Specify the password you used to export it and make sure Mark this key as
exportable is selected. On the Certificate Store page leave the default setting Place all certificates in the
following store, and ensure Personal is displayed.
5. After the import set the DPM credentials to use the certificate, as follows:
a. Obtain the thumbprint for the certificate. In the Certificates store double-click on the certificate.
Select the Details tab and scroll down to the thumbprint. Click it, highlight and copy it. Paste the
thumbprint into Notepad and remove any spaces.
b. Run Set-DPMCredentials to configure the DPM server:

Set-DPMCredentials [-DPMServerName <String>] [-Type <AuthenticationType>] [Action <Action>] [-


OutputFilePath <String>] [-Thumbprint <String>] [-AuthCAThumbprint <String>]

-Type-Indicates the type of authentication. Value: certificate.


-Action-Specify whether you want to perform the command for the first time, or regenerate the
credentials. Possible values: regenerate or configure.
-OutputFilePath- Location of the output file used in Set-DPMServer on the protected computer.
-Thumbprint-Copy from the Notepad file.
-AuthCAThumbprint-Thumbprint of the CA in the trust chain of the certificate. Optional. If not
specified, Root will be used.
6. This generates a metadata file (.bin) that is required at the time of each agent install in untrusted domain.
Make sure that the C:\Temp folder exists before you run the command. Note that if the file is lost or deleted
you can recreate it by running the script with the -action regenerate option.
7. Retrieve the .bin file and copy it to the C:\Program Files\Microsoft Data Protection Manager\DPM\bin
folder on the computer you want to protect. You don't have to do this, but if you don't you'll need to specify
the full path of the file for the -DPMcredential parameter when you
8. Repeat these steps on every DPM server that will protect a computer in a workgroup or in an untrusted
domain.
Install the agent
1. On each computer you want to protect, run DPMAgentInstaller_X64.exe from the DPM installation CD to
install the agent.
Configure a certificate on the protected computer
1. Generate a certificate from a CA for the protected computer, via web enrollment or some other method. In
web enrollment, select advanced certificate required, and Create and Submit a request to this CA.
Make sure the key size is 1024 or higher, and that Mark key as exportable is selected.
2. The certificate is placed in the User store. We need to move it to the Local Computer store.
3. To do this export the certificate from the User store. Make sure you export it with the private key. You can
export it in the default .pfx format. Specify a password for the export.
4. In Local Computer\Personal\Certificate run the Certificate Import Wizard to imported the exported file
from its saved location. Specify the password you used to export it and make sure Mark this key as
exportable is selected. On the Certificate Store page leave the default setting Place all certificates in the
following store, and ensure Personal is displayed.
5. After the import configure the computer to recognize the DPM server as authorized to perform backups, as
follows
a. Obtain the thumbprint for the certificate. In the Certificates store double-click on the certificate.
Select the Details tab and scroll down to the thumbprint. Click it, highlight and copy it. Paste the
thumbprint into Notepad and remove any spaces.
b. Navigate to the C:\Program files\Microsoft Data Protection anager\DPM\bin folder. And run
setdpmserver as follows:

setdpmserver -dpmCredential CertificateConfiguration_DPM01.contoso.com.bin -OutputFilePath


c:\Temp -Thumbprint <ClientThumbprintWithNoSpaces

Where ClientThumbprintWithNoSpaces is copied from the Notepad file.


c. You should get output to confirm that the configuration was completed successfully.
6. Retrieve the .bin file and copy it to the DPM server. We suggest you copy it to the default location in which
the Attach process will check for the file (Windows\System32) so you can just specify the filename instead
of the full path when you run the Attach command.
Attach the computer
You attach the computer to the DPM server using the Attach-ProductionServerWithCertificate.ps1 PowerShell
script, using the syntax.

Attach-ProductionServerWithCertificate.ps1 [-DPMServerName <String>] [-PSCredential <String>]


[<CommonParameters>]

-DPMServerName-Name of the DPM server


PSCredential-Name of the .bin file. If you placed it in the Windows\System32 folder you can specify the file
name only. Be careful to specify the .bin file created o nthe protected server. If you specify the .bin file
created on the DPM server you'll remove all the protected computers that are configured for certificate-
based authentication.
After the attach process completes the protected computer should appear in the DPM console.
Examples
Example 1
Generates a file in c:\\CertMetaData\\ with name CertificateConfiguration\_<DPM SERVER FQDN>.bin
Set-DPMCredentials -DPMServerName dpmserver.contoso.com -Type Certificate -Action Configure -OutputFilePath
c:\CertMetaData\ -Thumbprint "cf822d9ba1c801ef40d4b31de0cfcb200a8a2496"

Where dpmserver.contoso.com is the name of the DPM server and


"cf822d9ba1c801ef40d4b31de0cfcb200a8a2496" is the thumbprint of the DPM server certificate.
Example 2
Regenerates a lost configuration file in the folder c:\CertMetaData\

Set-DPMCredentials -DPMServerName dpmserver.contoso.com -Type Certificate "-OutputFilePath c:\CertMetaData\ -


Action Regenerate
Back up the DPM server
32 minutes to read

To ensure that data can be recovered if System Center Data Protection Manager (DPM ) fails, you'll need a strategy
for backing up the DPM server. If it isn't backed up you'll need to rebuild it manually after a failure, and disk-based
recovery points won't be recoverable. You can back up DPM servers using a couple of methods:
Back up the DPM server - You can back up a primary DPM server with a secondary DPM server. The
secondary server will protect the primary server database and the data source replicas stored on the
primary server. If the primary server fails, the secondary server can continue to protect workloads that are
protected by the primary server, until the primary server is available again. If you need to rebuild the
primary server you can restore the databases and replicas to it from the secondary server. You can also
restore data to protected computers directly from the secondary server when the primary server isn't
available. You can set up two servers, one as primary and the another as secondary, or configure each server
to act as the primary for the other. You can also configure a chain of DPM servers that protect each other
according to the chain order.
Back up the DPM database - You can configure a DPM server to back up its own databases to its tape
library, or you can use non-Microsoft software to back up the databases to tape or removable media.
Back up DPM using third-party software - You can back up DPM servers using third-party software that
supports DPM and VSS.

Back up with a secondary DPM server


Information on a DPM server can be backed up and protected by another DPM server in any of the following
configurations:
Primary to secondary protection - The database and replicas stored on a primary DPM server can be
backed up to a secondary DPM server. If the primary server fails the secondary server continues to back up
protected workloads. If the primary server fails you can do either of the following: Rebuild the primary
server and restore its database and replicas from the secondary server. Then move the protected workloads
back to the primary server after the rebuild. Select to switch protection to the secondary DPM server. With
this setting you then restore to the protected computer directly from the secondary server when the need
arises. For instructions, see Set up secondary servers.
DPM chaining - A chain of DPM servers provide protection, and each server protects the next one in in the
chain. For example: DPM1 is protected by DPM2 (DPM1 is the primary and DPM2 is the secondary). DPM2
is protected by DPM3 (DPM2 is the primary and DPM3 is the secondary) For instructions, see Set up
chaining.
Cyclic protection - One DPM server is backed up by another DPM server, and vice versa. So that DPM1
protects DPM2, and likewise DPM2 protects DPM1. This is useful for small environments.
Set up primary and secondary protection
Back up a primary DPM server using a secondary DPM server:
1. Install the DPM protection agent on each primary DPM server that you want to protect. No restart is
required.
IMPORTANT
Major and minor versions of the Primary and Secondary DPM servers must match.

2. Add the primary DPM server to an existing protection group, or create a new one. Select to protect the
following data sources:
The SQL Server databases configured for the primary server.
All volumes on the primary DPM server (Shares will not be visible separately)
All replicas on the primary DPM server.
At a minimum, you should select the databases, the \Program Files\Microsoft System
Center\DPM\DPM\Config folder, and the \Program Files\Microsoft System Center\DPM\Scripting
folder.
Note that you can't exclude file names from protection for a replica. In addition, all DPM servers must be running
the same version, updates etc. When setting up synchronization we recommend you synchronize every 24 hours.
Set up DPM chaining
Before you consider chaining note these limitations:
Each DPM server can only be protected once in the chain so verify that they're not protected by more than
one server.
Primary and secondary servers are established by the chain. So, for example if server DPM3 is actually
protecting server DPM1 because it's acting as the secondary server for DPM2, it can't act directly as a
secondary server for DPM1.
If a DPM server is configured to protect its own data source the chain will be broken. For example, if DPM1
protects its own database or system state, DPM2 can't protect DPM1.
Before you can protect the database of a primary DPM server you need to start the SQL Server VSS Writer
service on the primary server.
Chaining example 1
Scenario 1: Chained protection
Scenario 1 shows a scenario in which four DPM servers are chained:

SERVER PROTECTING PROTECTED BY

DS1 (primary) PS1, PS2 DS3

DS2 (primary) PS3, PS4 DS3

DS3 (secondary) DS1, DS2 DS4

DS4 (secondary) DS3 -


Chaining example 2
Scenario 2: Chained protection
Scenario 2 shows a scenario in which four DPM servers are chained:

SERVER PROTECTING PROTECTED BY

DS1 (primary) PS1, PS2 DS2

DS2 (primary) PS3 DS3

DS2 (secondary) DS1 DS3

DS3 (primary) PS4 DS4

DS3 (secondary) DS2 DS4

DS4 DS3 -

Cyclic protection
If you don't want to use a secondary server then two DPM servers can protect each other.
Scenario 3: Cyclic protection
Scenario 3 shows a scenario using cyclic protection

SERVER PROTECTING PROTECTED BY

DS1 (primary) PS1, PS2 DS2

DS2 (primary) PS3 DS3

DS2 (secondary) DS1, DS3 DS3

DS3 (primary) PS4 DS2

DS3 (secondary) DS2 DS2

Configure chaining
Set up chaining as follows:
1. Install the DPM protection agent on the DPM server that you want to protect from the DPM server you
want to protect it from.
2. Configure secondary protection for the data sources protected by the DPM server you are protecting. Note
in the DPM console you won't be able to configure protection for data sources that are already protected by
the agent. This prevents you from repeatedly protecting data.
3. As an example, if you have DPM1 and DPM2 you'd install the DPM protection agent from DPM1 to DPM2
and vice versa. Then configure secondary protection on DPM2 for servers that DPM1 protects, and
configure secondary protection on DPM1 for servers that DPM2 protects.
Recover the server
If a primary server fails you can switch protection to the secondary server. After you've switched protection, you
can perform recovery functions from the secondary server.
To switch protection to the secondary server in the DPM console right-click the protection group for which
you want to switch protection, and select Switch Disaster Protection. The replica will appear as
inconsistent until you run a consistency check.
To recover a primary DPM server you'll need to reestablish protection for all data sources previously
protected by it. Note that you can't restore recovery points, and when you recover database files you should
make sure the restore location on the DPM server is secure.
You should recover the DPM database and then recovery any replicas.
Then reestablish protection by running Setdpmserver.exe.

Back up the DPM database


As part of your DPM backup strategy, you'll have to back up the DPM database. The DPM database is named
DPMDB. This database contains the DPM configuration together with data about DPM's backups. In case of
disaster, you can rebuild most of the functionality of a DPM server by using a recent backup of the database.
Assuming you can restore the database, tape- based backups are accessible, and they maintain all protection group
settings and backup schedules. If the DPM storage pool disks were not affected by the outage, disk-based backups
are also usable after a rebuild. You can back up the database by using several different methods.

DATABASE BACKUP METHOD ADVANTAGES DISADVANTAGES

Back up to Azure Easily configured and monitored in Only available on DPM 2012 SP1 or
DPM. later.

Multiple locations of the backup Requires Azure account and additional


database files. DPM configuration. Incurs some cost
for Azure storage.
Cloud storage provides a robust
solution for disaster recovery. - Requires a supported version of
Windows Server based system with the
Very secure storage for the database. Azure agent to gain access to DPM
backups stored in the Azure backup
Supports 120 online recovery points. vault. This can't be another DPM server.

Not an option if the database is hosted


locally and you want to enable
secondary protection. A workaround
would be to use a remote SQL Server to
host the database.

Some extra preparation and recovery


time is incurred.

Back up the database by backing up the Simple to configure and monitor. Not a good option for disaster recovery.
DPM storage pool It's online and recovery might not work
The backup is kept on the DPM storage as expected if the DPM server or
pool disks and is easy to access locally. storage pool disk fails.

DPM scheduled backups support 512 Not an option if the database is hosted
express full backups. If you back up locally and you want to enable
hourly you'll have 21 days of full secondary protection. A workaround
protection. would be to use a remote SQL Server to
host the database.

Some preparation and special steps are


required to gain access to the recovery
points if the DPM service or console
isn't running or working.
DATABASE BACKUP METHOD ADVANTAGES DISADVANTAGES

Back up to a secondary DPM server Easily configured and monitored in Additional DPM server and storage are
DPM. required. Both DPM servers must to be
running the same DPM version and
DPM scheduled backups support 512 update rollups.
express full backups. If done hourly, this
provides 21 days of short term
protection. If done every 30 minutes, it
provides 10 days of protection.

The backup is kept on the secondary


DPM server storage pool disks which
are locally accessible.

Provides a good disaster recovery


solution if secondary DPM server is
offsite.

Back up to tape Easily configured and monitored in Not an option if the database is hosted
DPM. locally and you want to enable
secondary protection. A workaround
DPM scheduled tape backups support would be to use a remote SQL Server to
retention up to 99 years. host the database.

Tape backup can be taken offsite for Only one tape backup per day can be
disaster recovery. scheduled.

Tape backup can be restored from any You need a working DPM server with a
other DPM server that has a tape tape library to be able to read a DPM
drive/library attached that uses the backup tape that contains the copy of
same tape media type. the database you want to restore.

Tape can be encrypted for secure Some preparation and special steps are
storage. required to gain access to the tape
based recovery points.

Back up with native SQL Server backup Built-in to SQL Server. Not a good option for disaster recovery
to a local disk unless the backups are copied to a
The backup is kept on a local disk which remote location.
is easily accessible.
Requires local storage for backups
It can be scheduled to run as often as which may limit retention and
you like. frequency.

Totally independent of DPM.

You can schedule a backup file cleanup.


DATABASE BACKUP METHOD ADVANTAGES DISADVANTAGES

Back up with native SQL backup and Easily monitored in DPM. Only supports 64 recovery points.
DPM protection to a share protected by
DPM Multiple locations of the backup Not a good option for site disaster
database files. recovery. DPM server or DPM storage
pool disk failure may hinder recovery
Easily accessible from any Windows efforts.
machine on the network.
Not an option if the DPM DB is hosted
Potentially the fastest recovery method. locally and you want to enable
secondary protection. A workaround
would be to use a remote SQL Server to
host the DPMDB.

Some extra preparation is needed to get


it configured and tested.

Some extra preparation and recovery


time is needed should the DPM server
itself be down but DPM storage pool
disks are fine.

DATABASE BACKUP METHOD ADVANTAGES DISADVANTAGES

Back up to Azure Easily configured and monitored in Only available on DPM 2012 SP1 or
DPM. later.

Multiple locations of the backup Requires Azure account and additional


database files. DPM configuration. Incurs some cost
for Azure storage.
Cloud storage provides a robust
solution for disaster recovery. - Requires a supported version of
Windows Server based system with the
Very secure storage for the database. Azure agent to gain access to DPM
backups stored in the Azure backup
Supports 120 online recovery points. vault. This can't be another DPM server.

Not an option if the database is hosted


locally and you want to enable
secondary protection. A workaround
would be to use a remote SQL Server to
host the database.

Some extra preparation and recovery


time is incurred.

Back up the database by backing up the Simple to configure and monitor. Not a good option for disaster recovery.
DPM storage pool It's online and recovery might not work
The backup is kept on the DPM storage as expected if the DPM server or
pool disks and is easy to access locally. storage pool disk fails.

DPM scheduled backups support 512 Not an option if the database is hosted
express full backups. If you back up locally and you want to enable
hourly you'll have 21 days of full secondary protection. A workaround
protection. would be to use a remote SQL Server to
host the database.

Some preparation and special steps are


required to gain access to the recovery
points if the DPM service or console
isn't running or working.
DATABASE BACKUP METHOD ADVANTAGES DISADVANTAGES

Back up to a secondary DPM server Easily configured and monitored in Additional DPM server and storage are
DPM. required. Both DPM servers must to be
running the same DPM version and
DPM scheduled backups support 512 update rollups.
express full backups. If done hourly, this
provides 21 days of short term
protection. If done every 30 minutes, it
provides 10 days of protection.

The backup is kept on the secondary


DPM server storage pool disks which
are locally accessible.

Provides a good disaster recovery


solution if secondary DPM server is
offsite.

Back up to tape Easily configured and monitored in Not an option if the database is hosted
DPM. locally and you want to enable
secondary protection. A workaround
DPM scheduled tape backups support would be to use a remote SQL Server to
retention up to 99 years. host the database.

Tape backup can be taken offsite for Only one tape backup per day can be
disaster recovery. scheduled.

Tape backup can be restored from any You need a working DPM server with a
other DPM server that has a tape tape library to be able to read a DPM
drive/library attached that uses the backup tape that contains the copy of
same tape media type. the database you want to restore.

Tape can be encrypted for secure Some preparation and special steps are
storage. required to gain access to the tape
based recovery points.

Back up with native SQL Server backup Built-in to SQL Server. Not a good option for disaster recovery
to a local disk unless the backups are copied to a
The backup is kept on a local disk which remote location.
is easily accessible.
Requires local storage for backups
It can be scheduled to run as often as which may limit retention and
you like. frequency.

Totally independent of DPM.

You can schedule a backup file cleanup.


DATABASE BACKUP METHOD ADVANTAGES DISADVANTAGES

Back up with native SQL backup and Easily monitored in DPM. Only supports 64 recovery points.
DPM protection to a share protected by
DPM Multiple locations of the backup Not a good option for site disaster
database files. recovery. DPM server or DPM storage
pool disk failure may hinder recovery
Easily accessible from any Windows efforts.
machine on the network.
Not an option if the DPM DB is hosted
Potentially the fastest recovery method. locally and you want to enable
secondary protection. A workaround
would be to use a remote SQL Server to
host the DPMDB.

Some extra preparation is needed to get


it configured and tested.

Some extra preparation and recovery


time is needed should the DPM server
itself be down but DPM storage pool
disks are fine.

If you back up by using a DPM protection group, we recommend that you use a unique protection group for
the database.
As a best practice, if you're backing up to tape, make at least two copies of the backup tapes, and store each
of the backup tapes in a different remote location. This added protection guards against physical damage or
loss of the backup tape.
If the DPM SQL Server instance isn't running on the DPM server, install the DPM protection agent on the
SQL Server computer before you can protect the DPM databases on that server.

NOTE
For restore purposes, the DPM installation you want to restore with the DPM database must match the version of
the DPM database itself. For example, if the database you want to recover is from a DPM 2016 with Update Rollup 4
installation, the DPM server must be running the same version with Update Rollup 4. This means that you might
have to uninstall and reinstall DPM with a compatible version before you restore the database. To check the database
version you might have to mount it manually to a temporary database name and then run a SQL query against the
database to check the last installed rollup, based on the major and minor versions.

To check the DPM database version, follow these steps:


1. To run the query, open SQL Management Studio, and then connect to the SQL instance that's
running the DPM database.
2. Select the DPM database, and then start a new query.
3. Paste the following SQL query into the query pane and run it:
Select distinct MajorVersionNumber,MinorVersionNumber ,BuildNumber, FileName FROM
dbo.tbl_AM_AgentPatch order byMajorVersionNumber,MinorVersionNumber,BuildNumber
If nothing is returned in the query results, or if the DPM server was upgraded from previous versions but no
new update rollup was installed since then, there won't be an entry for the major, minor for a base
installation of DPM. To check the DPM versions associated with update rollups see List of Build Numbers
for System Center Data Protection Manager (DPM ).
Back up to Azure
1. Before you start you'll need to run a script to retrieve the DPM replica volume mount point path so that you
know which recovery point contains the DPM backup. Do this after initial replication with Azure Backup. In
the script replace dplsqlservername% with the name of the SQL Server instance hosting the DPM database.

Select ag.NetbiosName as ServerName,ds.DataSourceName,vol.MountPointPath


from tbl_IM_DataSource as ds
join tbl_PRM_LogicalReplica as lr on ds.DataSourceId=lr.DataSourceId
join tbl_AM_Server as ag on ds.ServerId=ag.ServerId
join tbl_SPM_Volume as vol on lr.PhysicalReplicaId=vol.VolumeSetID
and vol.Usage =1
and lr.Validity in (1,2)
where ds.datasourcename like '%dpmdb%'
and servername like '%dpmsqlservername%' --netbios name of server hosting DPMDB

Make sure you have the passcode that was specified when the Azure Recovery Services Agent was installed
and the DPM server was registered in the Azure Backup vault. You'll need this passcode to restore the
backup.
2. Create an Azure Backup vault, download the Azure Backup Agent installation file and vault credentials. Run
the installation file to install the agent on the DPM server and use the vault credentials to register the DPM
server in the vault. Learn more.
3. After the vault is configured set up a DPM protection group that contains the DPM database, and select to
back it up to disk and to Azure.
Recover the DPM database from Azure
You can recover the database from Azure using any DPM server (must be running at least DPM 2012 R2 with
update rollup 7) that's registered in the Azure Backup vault, as follows:
1. in the DPM console click Recovery > Add External DPM.
2. Provide the vault credentials (download from the Azure Backup vault). Note that the credentials are only
valid for two days.
3. In Select External DPM for Recovery select the DPM server for which you want to recover the database,
type in the encryption passphrase, and click OK.
4. Select the recovery point you want to use from the list of available points. Click Clear External DPM to
return to the local DPM view.

Back up the DPM database to DPM storage pool


NOTE
This option is applicable for DPM with Modern Backup Storage.

1. In DPM console, click Protection > Create protection group.


2. On the Select Protection Group Type page, select Servers.
3. On the Select group members page, select DPM database . If you're running SQL Server remotely, select the
remote SQL Server installed and select DPM database. If SQL Server is running on the DPM server, expand the
DPM server and select DPMDB.
4. On the Select Data Protection Method page, select I want short-term protection using disk. Specify the
short-term protection policy options.
5. After initial replication of DPM database, run the following SQL script:
select AG.NetbiosName, DS.DatasourceName, V.AccessPath, LR.PhysicalReplicaId from tbl_IM_DataSource DS
join tbl_PRM_LogicalReplica as LR
on DS.DataSourceId = LR.DataSourceId
join tbl_AM_Server as AG
on DS.ServerId=AG.ServerId
join tbl_PRM_ReplicaVolume RV
on RV.ReplicaId = LR.PhysicalReplicaId
join tbl_STM_Volume V
on RV.StorageId = V.StorageId
where datasourcename like N'%dpmdb%' and ds.ProtectedGroupId is not null
and LR.Validity in (1,2)
and AG.ServerName like N'%<dpmsqlservername>%' -- <dpmsqlservername> is a placeholder, put netbios name of
server hosting DPMDB

Recover DPM database


To reconstruct your DPM with the same DB, you need to first recover the DPM database and sync it with the
freshly installed DPM.
Use the following steps
1. Open an administrative command prompt and run psexec.exe -s powershell.exe to start a PowerShell window in
system context.
2. Decide the location from where you want to recover the database:
To copy the database from the last backup
1. Navigate to replica VHD path <DPMServer FQDN><PhysicalReplicaId><PhysicalReplicaId>
2. Mount the disk0.vhdx present in it using mount-vhd disk0.vhdx command.
3. Once replica VHD is mounted, use mountvol.exe to assign a drive letter to the replica volume using the Physical
replica ID from the SQL script output. For example: mountvol X: ?\Volume{}\
To copy the database from a previous recovery point
1. Navigate to DPMDB container directory <DPMServer FQDN><PhysicalReplicaId>, you will see
multiple directories with some unique GUID identifiers under it corresponding recovery points taken for
DPM DB. Directories other than represents a PIT/recovery point.
2. Navigate to any PIT vhd path i.e. <DPMServer FQDN><PhysicalReplicaId><PITId> and mount the
disk0.vhdx present in it using mount-vhd disk0.vhdx command.
3. Once replica VHD is mounted, use mountvol.exe to assign a drive letter to the replica volume, using the
Physical replica ID from the SQL script output. For example: mountvol X: ?\Volume{}\
All of the following text with angular braces in the above steps are place holders, replace them with
appropriate values.
ReFSVolume - Access path from the SQL script output
DPMServer FQDN - Fully qualified name of DPM server
PhysicalReplicaId - Physical replica ID from the SQL script out
PITId - GUID identifier other than physical replica ID in the container directory.
4. Open another administrative command prompt and run psexec.exe -s cmd.exe to start a command prompt
in system context.
5. Change directory to the X: drive and navigate to the location of the DPM database files.
6. Copy them to a location that's easy to restore from. Exit the psexec cmd window after you copy.
7. Go to the psexec PowerShell window opened in step one, navigate to the VHDX path, and dismount the
VHDX by using the command dismount-vhd disk0.vhdx.
8. After reinstalling the DPM server, you can use the restored DPMDB to attach to the DPM server by running
DPMSYNC -RESTOREDB command.
9. Run DPMSYNC -SYNC once DPMSYNC -RESTOREDB is complete.
Back up the database by backing up the DPM storage pool

NOTE
This option is applicable for DPM with legacy storage.

Before you start you'll need to run a script to retrieve the DPM replica volume mount point path so that you know
which recovery point contains the DPM backup. Do this after initial replication with Azure Backup. In the script
replace dplsqlservername% with the name of the SQL Server instance hosting the DPM database.

Select ag.NetbiosName as ServerName,ds.DataSourceName,vol.MountPointPath


from tbl_IM_DataSource as ds
join tbl_PRM_LogicalReplica as lr on ds.DataSourceId=lr.DataSourceId
join tbl_AM_Server as ag on ds.ServerId=ag.ServerId
join tbl_SPM_Volume as vol on lr.PhysicalReplicaId=vol.VolumeSetID
and vol.Usage =1
and lr.Validity in (1,2)
where ds.datasourcename like '%dpmdb%'
and servername like '%dpmsqlservername%' --netbios name of server hosting DPMDB

1. In DPM console, click Protection > Create protection group


2. On the Select Protection Group Type page, select Servers.
3. On the Select group members page, select the DPM database. If you're running SQL Server remotely
select the remote SQL Server installed and select DPM database. If SQL Server is running on the DPM
server expand the DPM server item and select DPMDB.
4. On the Select Data Protection Method page, select I want short-term protection using disk. Specify
the short-term protection policy options. We recommend a retention range of two weeks for DPM
databases.
Recover the database
If the DPM server is still operational and the storage pool is intact (problems with the DPM service or console)
then copy the database from the replica volume or a shadow copy as follows:
1. Decide from when you want to recover the database.
If you want to copy the database from the last backup taken directly from the DPM replica volume,
use mountvol.exe to assign a drive letter to the replica volume using the GUID from the SQL script
output. For example: C:\Mountvol X: \\?\Volume{d7a4fd76-a0a8-11e2-8fd3-001c23cb7375}\
If you want to copy the database from a previous recovery point (shadow copy) then you need to list
all the shadow copies for the replica using the volume GUID from the SQL script output. This
command lists shadow copies for that volume: C:\>Vssadmin list shadows /for=\\?
\Volume{d7a4fd76-a0a8-11e2-8fd3-001c23cb7375}\. Note the creation time and the shadow copy
ID you want to recover from.
2. Then use diskshadow.exe to mount the shadow copy to an unused drive letter X: using the shadow copy ID
so that you can copy the database files.
3. Open an administrative command prompt and run psexec.exe -s cmd.exe to start a command prompt in
system context so that you have permission to navigate to the replica volume (X:) and copy the files.
4. CD to the X: drive and navigate to the location of the DPM database files. Copy them to a location that's
easy to restore from. After the copy is complete exist the psexec cmd window, and run diskshadow.exe and
unexpose the X: volume.
5. Now you can restore the database files by using SQL Management Studio or by running DPMSYNC -
RESTOREDB.
Back up the database to a secondary server
1. On the secondary DPM server push the protection agent to the server on which the DPM database is
installed - either on the primary DPM server or on a remote SQL Server. After installation the server will
appear in Unprotected server with protection agents and should show status OK when refreshed.
2. Create a new protection group. In Select group member choose the server hosting the DPM database. In
All SQL Servers select the database you want to protect. In the Select Data Protection Method page
select to use short-term protection to disk and online if required. On the Specify Short-Term Goals page
select how to you want configure backups to short-term storage. For disk storage you can have 512 express
full backups as often as every 30 minutes. Finish the wizard. Protection will start after the initial recovery
point is created
Recover the database
1. Rebuild the primary server as a DPM server if required.
2. To restore the database, in the DPM console on the secondary server, click Recovery and locate the
protected database.
3. Select the date for the recovery point you want to recover. Recover the database to the original location.
After recovering the database run the DPMSync tool.

Back up the database to tape


You'll need to know the barcode or tape labels of the tapes that contain a copy of the DPM database. The best way
to do this is to schedule a Status Report to be mailed on the same day that the DPM database is backed up. The
report will include the last backup date/time, the tape label and the barcode so that you can locate it for recovery.
Alternatively you can use this SQL script to extract the information from the current database so you can to store it
separately in case of disaster.

Select Path,ro.FileSpec,media.Label,media.BarcodeValue,pd.CreationDate,
pd.ExpiryDate,pd.LifeStatus as "1=valid, 2=expired"
from dbo.tbl_MM_MediaMap mm
join dbo.tbl_MM_PhysicalDataset pd on pd.datasetid = mm.datasetid
join dbo.tbl_MM_Media media on media.MediaId = mm.MediaId
join dbo.tbl_RM_RecoverableObjectFileSpec ro on ro.DatasetId = mm.DatasetId
where ro.filespec like '%DPMDB%'
order by CreationDate desc

1. Create a protection group and on the Select Group Members page select the SQL Server (if it's running
locally select DPMDB under the DPM server).
2. Select to do long-term protection with tape and specify the tape details on the Select Library and Tape
Details.
Recover the database
The restore process will depend on the tape hardware available and the current state of the DPM server that
took the tape-based backup. If you can't restore the tape from the DPM server that did the backup, you'll
need to restore it from another DPM server that has the same type of tape drive so that the tape can be
read. You might need to rebuild the DPM server if the only tape hardware available was the one attached to
the failed DPM server.
If you're using DPM tape encryption, you'll need the same certificate used to encrypt the tape installed on
the alternate DPM server.
To recover:
1. Locate the physical tape that contains the version/date/time of the DPM database you want to restore.
2. Insert the backup tape into the tape drive or library and perform a detailed inventory in the DPM console ->
Management ->Libraries. Note that If the DPM server you are restoring from is a different DPM server, or
it's a new installation of DPM on the original server, the tape will be shown as imported (not created by this
DPM server).
3. If necessary, re-catalog the imported tape.
4. On the Recovery tab, locate the database data source. If it was from an imported tape, the recovery point
will be under External DPM tapes.
5. Recover the database (DPMDB ) files. You can select to Recover to any instance of SQL Server or to Copy to
a network folder. After the files are restored from tape, continue with recovery steps using SQL
Management Studio or DPMSYNC -RESTOREDB.

Back up with native SQL Server backup to a local disk


You can simply back up the DPM database to a local disk with native SQL Server backup, independent of DPM.
1. Get an overview of SQL Server backup.
2. Learn more about backing up SQL Server to the cloud.

Back up with native SQL Server backup to a share protected by DPM


This backup option leverages native SQL to back up the DPM database to a share, protects the share with DPM,
and uses Windows VSS previous versions to facilitate the restore.
Before you start
1. If the DPM database is located on a remote SQL Server, install the DPM agent on that server.
2. On the SQL Server make a folder on a drive with enough free space to hold a single copy of a backup. For
example: C:\DPMBACKUP.
3. Share the folder. For example share C:\DPMBACKUP folder as DPMBACKUP.
4. Copy and paste the OSQL command below into Notepad and save it to a file named
C:\DPMBACKUP\bkupdb.cmd. Make sure there is no .txt extension. Modify the SQL_Instance_name
andDPMDB_NAME to match the instance and DPMDB name used by your DPM server.

OSQL -E -S localhost\SQL_INSTANCE_NAME -Q "BACKUP DATABASE DPMDB_NAME TO DISK='C:\DPMBACKUP\dpmdb.bak'


WITH FORMAT"

5. Using Notepad, open the ScriptingConfig.xml file located under the ...\DPM\Scripting folder.
On a remote SQL Server: C:\Program Files\Microsoft Data Protection
Manager\DPM\Scripting
On a DPM server: C:\Program Files\Microsoft System Center\DPM\DPM\Scripting
6. Modify ScriptingConfig.xml and change DataSourceName= to be the drive letter that contains the
DPMDBBACKUP folder/share. Change the PreBackupScript entry to the full path and name of
thebkupdb.cmd saved in step 5.

<?xml version="1.0" encoding="utf-8"?>


<ScriptConfiguration xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns="https://schemas.microsoft.com/2003/dls/ScriptingConfig.xsd">
<DatasourceScriptConfig DataSourceName="C:">
<PreBackupScript>C:\DPMDBBACKUP\bkupdb.cmd</PreBackupScript>
<TimeOut>120</TimeOut>
</DatasourceScriptConfig>
</ScriptConfiguration>

7. Save the changes to ScriptingConfig.xml.


8. Protect the C:\DPMBACKUP folder or the \\sqlservername\DPMBACKUP share using DPM and wait for
the initial replica to be created. There should be a dpmdb.bak in the C:\DPMBACKUPfolder as a result of the
pre-backup script running which was in turn copied to the DPM replica.
9. If you don't enable self-service recovery, you'll need some additional steps to share out the DPMBACKUP
folder on the replica:
a. In the DPM console > Protection, locate the DPMBACKUP data source and select it. In the details
section, click Click to view details on the link to the replica path and copy the path into Notepad.
Remove the source path and retain the destination path. The path should look similar to the
following: C:\Program Files\Microsoft System Center\DPM\DPM\Volumes\Replica\File
System\vol_c9aea05f-31e6-45e5-880c-92ce5fba0a58\454d81a0-0d9d-4e07-9617-
d49e3f2aa5de\Full\DPMBACKUP.
b. Make a share to that path using the share name DPMSERVERNAME -DPMDB. You can use the
Net Share command below from an administrative command prompt.

Net Share DPMSERVERNAME-dpmdb="C:\Program Files\Microsoft System


Center\DPM\DPM\Volumes\Replica\File System\vol_c9aea05f-31e6-45e5-880c-92ce5fba0a58\454d81a0-
0d9d-4e07-9617-d49e3f2aa5de\Full\DPMBACKUP"

Configure the backup


You can back up the DPM database as you would any other SQL Server database using SQL Server native backup.
Get an overview of SQL Server backup.
Learn more about backing up SQL Server to the cloud.
Recover the database
1. Connect to the \\DPMServer\DPMSERVERNAME -dpmdb share using Explorer from any Windows
computer.
2. Right-click the dpmdb.bak file to view properties. On the Previous Versions tab are all the backups that
you can select and copy. There is also the very last backup still located in the C:\DPMBACKUP folder which
is also easily accessible.
3. If you need to move a SAN attached DPM storage pool disk to another server to be able to read from the
replica volume, or to reinstall Windows to read locally attached disks, you'll need to know the DPM Replica
volume Mount point path or Volume GUID beforehand so you know what volume holds the database
backup. You can use the SQL script below to extract that information any time after initial protection but
before the need to restore. Replace the %dpmsqlservername% with the name of the SQL Server hosting the
database.

Select ag.NetbiosName as
ServerName,ds.DataSourceName,vol.MountPointPath,vol.GuidName
from tbl_IM_DataSource as ds
join tbl_PRM_LogicalReplica as lr on ds.DataSourceId=lr.DataSourceId
join tbl_AM_Server as ag on ds.ServerId=ag.ServerId
join tbl_SPM_Volume as vol on lr.PhysicalReplicaId=vol.VolumeSetID
and vol.Usage =1
and lr.Validity in (1,2)
where ds.datasourcename like '%C:\%' -- volume drive letter for DPMBACKUP
and servername like '%dpmsqlservername%' --netbios name of server hosting DPMDB

4. If you need to recover after moving DPM storage pool disks or a DPM server rebuild:
a. You have the volume GUID, so should that volume need to be mounted on another Windows server
or after a DPM server rebuild, use mountvol.exe to assign it a drive letter using the volume GUID
from the SQL script output: C:\Mountvol X: \\?\Volume{d7a4fd76-a0a8-11e2-8fd3-
001c23cb7375}\.
b. Reshare the DPMBACKUP folder on the replica volume using the drive letter and portion of the
replica path representing the folder structure.

net share SERVERNAME-DPMDB="X:\454d81a0-0d9d-4e07-9617-d49e3f2aa5de\Full\DPMBACKUP"

c. Connect to the \\SERVERNAME\DPMSERVERNAME -dpmdb share using Explorer from any


Windows computer
d. Right-click the dpmdb.bak file to view the Properties. On the Previous Versions tab are all the
backups that you can select and copy.

DPM disaster recovery management: Backup DPM DB


One of the ways to reconstruct your DPM server with the same DB is by backing up the DPM DB to local disks.
DPM database contains the DPM configuration together with data about DPM's backups. In case of a disaster, you
can rebuild the functionality of your DPM server by using a recent backup of the database to a local disk. If your
DPM server crashes or becomes un-operational, and you still have your storage pool intact containing your
backups, you can reconfigure the DPM server with the same DPM DB.
Ensure:
1. DPM DB backed up on to local disks
2. Storage pool should be intact and available.
Back up DPM database
1. In DPM console, click Protection > Create protection group.
2. On the Select Protection Group Type page, select Servers.
3. On the Select group members page, select DPM database . If you're running SQL Server remotely, select
the remote SQL Server installed and select DPM database. If SQL Server is running on the DPM server,
expand the DPM server and select DPMDB.
4. On the Select Data Protection Method page, select I want short-term protection using disk. Specify
the short-term protection policy options.
5. After initial replication of DPM database. run the following SQL script:

select AG.NetbiosName, DS.DatasourceName, V.AccessPath, LR.PhysicalReplicaId from tbl_IM_DataSource DS


join tbl_PRM_LogicalReplica as LR
on DS.DataSourceId = LR.DataSourceId
join tbl_AM_Server as AG
on DS.ServerId=AG.ServerId
join tbl_PRM_ReplicaVolume RV
on RV.ReplicaId = LR.PhysicalReplicaId
join tbl_STM_Volume V
on RV.StorageId = V.StorageId
where datasourcename like N'%dpmdb%' and ds.ProtectedGroupId is not null
and LR.Validity in (1,2)
and AG.ServerName like N'%<dpmsqlservername>%' -- <dpmsqlservername> is a placeholder, put netbios name
of server hosting DPMDB

Recover DPM database


To reconstruct your DPM with the same DB, you need to first recover the DPM database and sync it with the
freshly installed DPM.
Use the following steps:
1. Open an administrative command prompt and run psexec.exe -s powershell.exe to start a PowerShell window in
system context.
2. Decide from where you want to recover the database:
To copy the database from the last backup
1. Navigate to replica VHD path i.e. <DPMServer FQDN><PhysicalReplicaId><PhysicalReplicaId>
2. Mount the disk0.vhdx present in it using mount-vhd disk0.vhdx
3. Once replica VHD is mounted, use mountvol.exe to assign a drive letter to the replica volume using the Physical
replica ID from the SQL script output. For example: mountvol X: \?\Volume{<PhysicalReplicaId>}\
To copy the database from a previous recovery point
1. Navigate to DPMDB container directory i.e. <ReFSVolume><DPMServer FQDN><PhysicalReplicaId>,
you will see multiple directories with some unique GUID identifiers under it corresponding recovery points
taken for DPM DB. Directories other than represents a PIT/recovery point
2. Navigate to any PIT vhd path i.e. <ReFSVolume><DPMServer FQDN><PhysicalReplicaId><PITId> and
mount the disk0.vhdx present in it using mount-vhd disk0.vhdx.
3. Once replica VHD is mounted, use mountvol.exe to assign a drive letter to the replica volume using the
Physical replica id from the SQL script output. For example: mountvol X: \?\Volume{<PhysicalReplicaId>}\
All of the following text with angular braces in the above steps are place holders, replace them with
appropriate values.
ReFSVolume - Access path from the SQL script output
DPMServer FQDN - Fully qualified name of DPM server
PhysicalReplicaId - Physical replica ID from the SQL script out
PITId - GUID identifier other than physical replica ID in the container directory.
4. Open another administrative command prompt and run psexec.exe -s cmd.exe to start a command prompt
in system context.
5. Change directory to the X: drive and navigate to the location of the DPM database files.
6. Copy them to a location that's easy to restore from. Exit the psexec cmd window after you copy.
7. Go to the psexec PowerShell window opened in step one, navigate to the VHDX path, and dismount the
VHDX by using the command dismount-vhd disk0.vhdx.
8. After reinstalling the DPM server, you can use the restored DPMDB to attach to the DPM server by running
DPMSYNC -RESTOREDB.
9. Run DPMSYNC -SYNC once DPMSYNC -RESTOREDB is complete.
Monitor DPM
7 minutes to read

You can monitor a single System Center Data Protection Manager (DPM ) server from the DPM Administrator
console, multiple DPM servers from the Central Console, or monitor DPM activity with Operations Manager.

Monitor with the DPM console


To monitor DPM in the console, you should be logged on to the DPM server with a local admin account. Here's
what you can monitor:
On the Alerts tab you can monitor errors, warnings, and general information for a protection group, for a
specific protected computer, or by message severity. You can view active and inactive alerts and set up email
notifications
On the Jobs tab you can view jobs initiated by DPM for a specific protected computer or protection group.
You can follow job progress or check resources consumed by jobs.
In the Protection task area, you can check the status of volumes and shares in protection group, and check
configuration settings such as recovery settings, disk allocation, and backup schedule.
In the Management task area you can view the Disks,Agents, and Libraries tab to check the status of
disks in the storage pool, deployed DPM agent status, and the state of tapes and tape libraries.

Monitor DPM in the Central Console


Central Console is a System Center Operations Manager console that you can deploy to manage and monitor
multiple DPM servers from a single location. In the Central Console you can monitor and track the status of
multiple DPM servers, jobs, protection groups, tapes, storage, and disk space.
In View Jobs, you can get a list of jobs running on all DPM server monitored by Central Console.
In Alert View, you can get a list of all DPM alerts that require action. You can using the Troubleshoot
option to get more details for an alert.
You can consolidate alerts in the console. You can display a single alert for repeated alerts, or display a
single alert for multiple alerts that have the same root cause. If you're using a ticketing system, you can
generate a single ticket only for repeated alerts.
In State View, you can get information about the state of DPM objects.

Monitor DPM in the Azure console


You use the Dashboard to get a quick overview of the state of your System Center - Data Protection Manager
(DPM ) backups in Windows Azure Backup. The Dashboard provides a centralized gateway to view servers
protected by backup vaults, as follows:
Usage Overview shows how you are using the backup vault. You can select a vault and see how much
storage is being consumed by the vault, versus the amount of storage provided by your subscription. You
can also see the number of servers registered to the vault.
Quick Glance displays crucial configuration information about the backup vault. It tells you whether the
vault is online, which certificate is assigned to it, when the certificate expires, the geographic location of the
storage servers, and subscription details for the service.
From the dashboard you can download the Backup agent for installation on a server, modify settings for
certificates uploaded to the vault, and delete a vault if necessary.

Central Monitoring
All DPM -A customers (customer connected to Azure) have the flexibility of using Central Monitoring, a monitoring
solution provided by Microsoft Azure Backup. You can monitor both on premise and cloud backups, using Log
Analytics with Central Monitoring. You can use this monitoring solution to monitor your key backup parameters
such as backups jobs, backup alerts, and cloud storage across all your recovery service vaults & subscriptions. You
can also create alert notifications and open tickets using webhooks or ITSM integration.

NOTE
You must have a valid Azure subscription to be able to centrally monitor.

Enable central monitoring


1. Logon to Azure portal.
2. Create a Recovery Service vault, or if you already have one, select the same.

3. Select Diagnostic Settings under Monitoring section.


4. Click Turn on Diagnostic Settings.
5. In the Diagnostic settings window, give a valid setting name, select Send to Log Analytics, select the
relevant log analytics workspace or create one, select the relevant log, AzureBackupReport and click Save.

NOTE
Choose the same workspace for all the vaults to get a centralized view in the workspace. Allow 24 hours for initial
data push to complete post completing the configuration.
Here is a sample backup report:

Monitor Backup Data


1. Select your Log Analytics workspace.
2. Click OMS Portal. The solution dashboard is displayed and provides you with all the backup information as
shown below:
Sample 1:

Sample 2:
3. You can also monitor active alerts, current data sources being backed up and cloud storage as shown below:

4. You can also specify the desired time range for monitoring the backup parameters.

Create Custom Alerts


1. Click any values in the above graph to view more details in the Logs window.
2. Click Alert icon.
3. Select Take me to Azure Alerts.
4. In Log Analytics workspace, click New Alert Rule.
5. Define the alert condition, alert details and action group.
6. Learn more about how to configure new alerts.

Monitor DPM in Operations Manager


You can use monitor and report on the health and status of DPM servers using System Center Operations
Manager Management Packs for DPM. DPM provides the following management packs, use these as applicable
for the DPM version you are using:
Reporting management pack (Microsoft.SystemCenter.DataProtectionManager.Reporting.mp) - Collects
and displays reporting data from all DPM servers, and exposes a set of Operations Manager warehouse
views for DPM. You can query these views to generate custom reports.
Discovery and monitoring management pack
(Microsoft.SystemCenter.DataProtectionManager.Discovery.mp)
Library management pack - (Microsoft.SystemCenter.DataProtectionManager.Library)
Using these packs you can:
Centrally monitor the health and status of DPM servers, protected servers and computers, and backups.
View the state of all roles on DPM servers and protected data sources. Monitor, identify, action and
troubleshoot alerts.
Use Operations Manager alerts to monitor DPM server memory, CPU, and disk resources, and database.
Monitor resource usage and performance trends on DPM servers.
Prerequisites
To use the DPM Management Packs, you need a System Center Operations Manager server running. The
Operations Manager Data Warehouse must be up and running.
If you're running a previous version of the Discover and Library Management Packs obtained from the DPM
installation media, you should remove them from the DPM server and install the new versions from the
download page.
You can only run one language version of the Management Pack at one time. If you want to use the pack in a
different language uninstall the pack in the existing language and then install it with the new language.
If any previous versions of a DPM Management Pack are installed on the Operations Manager server,
remove them before installing the new pack.
Set up the Management Packs
Install the Operations Manager agent on each DPM server you want to monitor. Then obtain the Management
Packs, import the Discovery and Library Management Packs, install the DPM Central Console, and import the
Reporting Management Pack
Install the agent and obtain the Management Packs
1. For agent installation options read Operations Manager Installation Methods. If you need to obtain the
latest version of the agent see Microsoft Monitoring Agent in the Download Center.
2. Download the packs from the Download Center. The download places the Discovery and Library
Management Packs in the C:\Program Files\System Center Management Packs folder. The reporting
management pack is placed in a separate folder inside that folder.
Import the Management Packs
Import the Discovery and Library Management Packs Log on to the Operations Manager server with an account
that is a member of the Operations Manager Administrators role. Remember to remove any previous versions of
the Library or Discover Management Packs running on the server.
1. In the Operations console, click Administration. Right-click Management Packs > Import Management
Packs. Select Microsoft.SystemCenter.DataProtectionManagerDiscovery.MP > Open and then
Microsoft.SystemCenter.DataProtectionManagerLibrary.MP > Open
2. Follow the instructions in the Import Management Packs wizard. You can get more information about
running this wizard in How to Import an Operations Manager Management Pack.
Set up Central Console
You'll need to install the DPM Central Console on the Operations Manager server. This console is used to manage
multiple DPM servers in Operations Manager.
1. In the Setup screen of Operations Manager, select the following:
Select Install Central Console Server and Client side Components if you want to monitor DPM
servers with the Management Pack and you want to use the Central Console to manage settings and
configuration on the DPM servers.
Select Install Central Console Server side Components if you only want to monitor DPM servers
with the Management Pack, but don't want to use Central Console to manage settings and
configuration on the DPM servers.
2. DPM adds firewall exceptions for port 6075 for the console. You should also open ports for SQL Server.exe
and SQL browser.exe
Import the Reporting Manager Pack
1. Log on to the Operations Manager server with an account that is a member of the Operations Manager
Administrators role.
2. In the Operations console, click Administration. Right-click Management Packs > Import Management
Packs.
3. Select Microsoft.SystemCenter.DataProtectionManagerReporting.MP > Open. Follow the
instructions in the Import Management Packs wizard.
Tweaking Management Pack settings
After you import the Management Packs they discover and monitor data without requiring any additional
configuration. You can optionally tweak settings like monitors and rules for your environment. For example if you
find that performance-measuring rules that are enable degrade server performance with slow WAN links, you can
disable them. For instructions, see How to enable or disable a rule or monitor.
Set up DPM logging
3 minutes to read

System Center Data Protection Manager (DPM ) logs activity in log files (*.errlog). Log files are tab delimited and
can be opened in Excel for easy viewing. You can filter with specific levels and task IDs in order to find events that
interest you. Every log entry has a log task ID generated by DPM as a unique GUID for every DPM task. This helps
you to track down log entries for specific jobs. Log files are located as follows:
DPM installation information: Logged on the DPM server at %ProgramFiles%\Microsoft System
Center\DPM\DPMLogs.
DPM activity information: Logged on the DPM server at %ProgramFiles%\Microsoft System
Center\DPM\DPM\Temp.
Protected client activity: Logged on the client computer at %ProgramFiles%\Microsoft Data Protection
Manager\DPM\Temp Logs. Client-initiated activities such as self-service recovery are logged on the client
computer based on the user (%USERPROFILE%\AppData\Roaming\Microsoft\System Center Data
Protection Manager\).
You can tweak log file settings as follows:

VALUE NAME VALUE TYPE/ALLOWED VALUES DETAILS


VALUE NAME VALUE TYPE/ALLOWED VALUES DETAILS

TraceLogLevel DWORD Specifies the logging level.

TRACE_ERROR - Logs all errors and Can be overridden per binary. A valid
failures - default setting bitmask of allowed values is:

TRACE_DBG_ACTIVITY - Logs all enum TRACE_FLAG{


activities such as start, cancel, end
TRACE_ERROR = 0x2,
TRACE_DBG_NORMAL - Logs activities
considered important TRACE_DBG_ACTIVITY = 0x4,

TRACE_DBG_CRITICAL - Logs critical TRACE_DBG_ = 0x8,


errors only.
TRACE_PERF = 0x20,
TRACE_DBG_FATAL - Logs fatal errors
such as task or job failures TRACE_DBG_FATAL = 0x200,

TRACE_DBG_CRITICAL = 0x400
};

You can also enable full Verbose logging


but note that this affects performance.
If you need this for a limited time do
the following:

1. In the registry, at
HKLM\Software\Microsoft\Microsoft
Data Protection Manager add a
DWORD value TraceLogLevel and set it
to 0x43e.
2. To apply immediately stop the DPM
services for which you want to enable
verbose logging and delete the old logs.
3. After you reproduce the issue and
finish troubleshooting, delete the
registry entry you created and restart
the stopped services so that non-
verbose logging works again.

TraceLogPath REG_SZ Specifies the log location.

Requires a valid NTFS volume path with


3 GB of compressed space on DPM
server (no quotation marks required in
the name for paths that contain spaces).

Can be overridden per binary.

TraceLogMaxSize DWORD Specifies the size of the log file

5 MB by default

A file size (total disk space consumed for


this binary's log = size * number of files
to retain)
VALUE NAME VALUE TYPE/ALLOWED VALUES DETAILS

TraceLogMaxNum DWORD Maximum number of log files to retain

30 by default

The current number of log files is


tracked in
HKLM\Software\Microsoft\Microsoft
Data Protection Manager:
<binary>TraceLogNextNum (DWORD).
This is an internal registry key and we
recommend that you don't modify it.

Binary and service mapping


Mappings between some of the log binary names and services are summarized in the following table.

SERVICE/PROCESS BINARY NAME DETAILS

DPM Engine (MSDPM) MSDPM MSDPM engine logs contain info about
engine API calls, jobs and task triggers,
housekeeping jobs and so on.

DPM Replication Agent (DPMRA) DPMRA Logs information about tape backups,
disk replication, restore, secondary DPM
replications. On DPM server and
protected client.

DPM Library Agent (DPMLA) LAAgent Logs library related activities. On DPM
server and shared library server.

DPM UI DPMUI Logs UI activity such as monitoring,


protection, recovery, etc.

DPM PowerShell CLI DPMCLI Logs all cmdlet actions

DPM Access Manager DPMMAC Logs automatic behavior such as grow,


rerun jobs, and Access Control Manager
information.

Exchange Cmdlet Wrapper ExchangeCmdletsWrapper Logs for various cmdlets run by DPMRA
on Exchange client side
E14 Cmdlet Wrapper

Agent Coordinator AgentBootStrapper Logs during agent installation and


upgrade

DPM Client Service DPMClientProtection Logs by DPM client installed on laptops.


Used on laptop-side only.

DPM Backup Tool DpmBackup Logs for tool doing DPM backup

Install SQL Prep (Remote SQL) SQL Prep Bootstrapper Logs during installation of remote SQL
Server before Setup.
SERVICE/PROCESS BINARY NAME DETAILS

DPM Backup DpmBackup Logs for DPM backup tool

DPM Writer DPMWriter Logs during third party tape backups


and secondary server backup. On DPM
server only.

WSS Cmdlet wrapper WssCmdletsWrapper Logs when running WSS cmdlets on


SharePoint WFE. On protected client
only.

Logs at:
%USERPROFILE%\AppData\Roaming\Mi
crosoft\Microsoft System Center Data
ProtectionManager 2012\

SQL EUR Client EurClient Installed on machines where SQL EUR


client is installed. Logs information
about connecting to DPMserver,
triggering and canceling recovery etc.

Logs at:
%USERPROFILE%\AppData\Roaming\Mi
crosoft\Microsoft System Center Data
ProtectionManager 2012\

Laptop Client UI DPMClientUI Logs about various actions triggered


from DPM client UI and failures.

Logs at:
%USERPROFILE%\AppData\Roaming\Mi
crosoft\Microsoft System Center Data
ProtectionManager 2012\
Generate DPM reports
16 minutes to read

System Center Data Protection Manager (DPM ) uses SQL Server Reporting Services to create reports. In the
Reporting task area you can generate and view reports, schedule automation report generation, managing
settings, and subscribe to reports. Alternatively you can generate DPM reports from Operations Manager if you're
using it to monitor DPM.

DPM reports
DPM provides a number of different reports:
Status report: Provides the status of all recovery points for a specified time period. It lists recovery jobs,
and shows the total number of successes and failures for recovery points and recovery point creation. You
can use this report to track and verify recovery point metrics.
Protection report: Provides commonly used metrics for backup success rolled up over long periods of
time. Use this report to track how backups are doing and what's been backed up successfully.
Recovery report: Provides commonly used metrics for recovery success rolled up over long periods of
time. Use this report to track how recoveries are doing and how well you performed against your SLAs for
RTOs.
Disk utilization report: Summarizes disk capacity, disk allocation, and disk usage in the DPM storage pool.
Use this report to do the following: Identify trends in disk usage and make decisions about modifying space
allocations.
Tape management and tape utilization report: Use the tape management report to track information
about tape rotation and decommissioning, and to verify that the free media threshold hasn't been exceeded.
Use the tape utilization report to track trending of resource (disk/tape) usage over time to assist capacity
planning.
Predefined SQL reports
DPM includes several SQL Server views to help you create custom reports. SQL views provide a simpler method
that querying tables directly, by populating columns with data collected from multiple tables in the database. You
don't need in-depth knowledge of the entire database or the relationship between tables and keys.
Note though that SQL views can degrade performance if used too frequently because the view runs each time it's
queries. In addition the supported views might not include all the columns you need.
The following table summarizes the predefined SQL views.

VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_Agents ServerName String The name of the computer

Contains the list of


computers on which a DPM
protection agent from this
DPM server is installed.

Vw_DPM_Agents Version String DPM agent version on that


computer
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_Alerts Severity Integer Alert severity

List of alerts from last 30 0=Error


days
1=Warning

2=Information

Vw_DPM_Alerts Resolution Integer Alert state

0 = Active

1 = Recommended action in
progress

2 = Resolved

Vw_DPM_Alerts OccurredSince Date and Time First time alert was raised

Vw_DPM_Alerts ResolvedTime Date and Time Time when alert was


resolved

Vw_DPM_Alerts Type Integer Alert type

Vw_DPM_CurrentOnlineM UserFriendlyName String Library name


edia

Tapes currently online in


DPM owned libraries, as of
the last inventory.

Vw_DPM_CurrentOnlineM ImportPoolMediaCount Integer Tapes imported to the DPM


edia server

Vw_DPM_CurrentOnlineM FreePoolMediaCount Integer Tapes marked as free or


edia blank

Vw_DPM_CurrentOnlineM AdminPoolMediaCount Integer Tapes with active data


edia

Vw_DPM_Disk_Usage_Repl PhysicalPath String Protected data source name


ica

Disk usage statistics for


replicas in the storage pool.

Vw_DPM_Disk_Usage_Repl ReplicaId GUID Unique identifier for replica


ica

Vw_DPM_Disk_Usage_Repl PGId GUID Unique identifier for


ica protection group to which
the data source belongs

Vw_DPM_Disk_Usage_Repl ProductionServerName String Server on which data source


ica is located
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_Disk_Usage_Repl DiskAllocated Big Integer Total disk space allocated to


ica data source

Vw_DPM_Disk_Usage_Repl DiskUsed Big Integer Total disk space used by data


ica source

Vw_DPM_Disk_Usage_Repl FreeSpace Big Integer DiskAllocated - DiskUsed


ica

Vw_DPM_Disk_Usage_Repl ReplicaAllocated Big Integer Part of DiskAllocated


ica reserved for replica of data
source

Vw_DPM_Disk_Usage_Repl ReplicaUsed Big Integer Part of ReplicaAllocated


ica actually in use

Vw_DPM_Disk_Usage_Repl ShadowCopyAllocated Big Integer Part of DiskAllocated


ica reserved for recovery points
of data source

Vw_DPM_Disk_Usage_Repl ShadowCopyUsed Big Integer Part of


ica ShadowCopyAllocated
actually in use

Vw_DPM_Disk_Usage_Repl StartDateTime Date and time


ica

Vw_DPM_Disk_Usage_Repl EndDateTime Date and time


ica

Vw_DPM_Disk_Usage_Repl ScheduleType Integer


ica
0=weekly; 1=monthly;
2=quarterly; 3=yearly

Vw_DPM_DiskRecoveryPoi DataSourceName String Protected data source name


nts

Counts for disk recovery


points available for each
data source.

Vw_DPM_DiskRecoveryPoi PGId GUID Unique identifier for


nts protection group to which
data source belongs

Vw_DPM_DiskRecoveryPoi ServerId GUID Unique identifier for server


nts to which data source
belongs

Vw_DPM_DiskRecoveryPoi Frequency Integer Number of available


nts recovery points
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_LongRecoveries DataSourceName String The data source that was


recovered
Historical information about
recoveries that took longer
than 24 hours.

Vw_DPM_LongRecoveries TargetServerName String The name of the server to


which recovery was done

Vw_DPM_LongRecoveries WriterId GUID Identifies the type of the


data source that was
recovered

Vw_DPM_LongRecoveries StartTime Date and time The time at which the


recovery was started

Vw_DPM_LongRecoveries EndTime Date and time The time at which the


recovery ended

Vw_DPM_Media MediaLabel String The label on the tape

Information about state of


all tapes known to DPM.

Vw_DPM_Media MediaBarcode String The barcode for the tape

Vw_DPM_Media IsOnline Integer Whether the tape is online

Vw_DPM_Media LibraryName String The name of the library in


which the tape exists.

NULL if tape is offline

Vw_DPM_Media MediaSlotNumber Integer The slot number in which the


tape exists.

NULL if tape is offline

If in a drive, this represents


the home slot of the tape (to
which the tape returns on a
dismount).

Vw_DPM_Media PGName String The name of the protection


group in which the tape
exists

Vw_DPM_Media MediaExpiryDate Date and time The time when all data sets
on this tape will expire.

Can have the date in the


past or NULL if the tape is
free.
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_MediaPool_Medi LibraryName String The name of the library


a

Tape counts for a given


library.

Vw_DPM_MediaPool_Medi FreeMedia Integer Number of tapes that are


a free in this library

Vw_DPM_MediaPool_Medi FreeMediaThreshold Integer The threshold below which


a this library generates an
alert

Vw_DPM_ProtectedDataS ReplicaId GUID Identifier of the replica


ource

Current disk space usage by


various data sources.

Vw_DPM_ProtectedDataS PGId GUID Identifier of the protection


ource group to which the replica
belongs

Vw_DPM_ProtectedDataS AllocatedSize Big integer Disk space allocated to the


ource data source

Vw_DPM_ProtectedDataS UsedSize Big integer Disk space currently used by


ource the data source

Vw_DPM_ProtectedDataS ProductionServerName String The name of the computer


ource on which the data source
exists

Vw_DPM_ProtectedDataS StorageNode String Always set to the DPM


ource server

Vw_DPM_ProtectedGroup PGId GUID Unique identifier for the


protection group
Table with information about
all protection groups.

Vw_DPM_ProtectedGroup ProtectionGroupName String Protection group name

Vw_DPM_ProtectedGroup CreationTime Date and time Time protection group was


created

Vw_DPM_RecoveryDuratio StartDateTime Date and time The time at which the


n statistic was collected

History of counts for


recovery jobs in various time
durations.

Vw_DPM_RecoveryDuratio EndDateTime Date and time Internal


n
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_RecoveryDuratio ScheduleType Integer The frequency for which this


n particular statistic was
collected

Vw_DPM_RecoveryDuratio RecoveryDuration Integer Indicates if the recovery was


n less than 6 hours, between
6-24 hours, or greater than
24 hours

Vw_DPM_RecoveryDuratio RecoveryCount Integer Number of recoveries


n

Vw_DPM_RecoveryJob DataSourceName String The data source for which


recovery was run
Detailed information about
recent recovery jobs.

Vw_DPM_RecoveryJob ServerName String The server to which recovery


was performed

Vw_DPM_RecoveryJob CreationTime Date and time Time at which the recovery


job was run

Vw_DPM_RecoveryJob FailureCode Integer Error code in case of failure


of the recovery job

Vw_DPM_RecoveryJob Status Integer Status of the recovery job

0/1=Progress

2=Succeeded

3=Failure

Vw_DPM_RecoveryPointDi String The data source for which String


sk the backup was created

Status of recent recovery


point creation jobs on disk.

Vw_DPM_RecoveryPointDi String The server on which the data String


sk source exists

Vw_DPM_RecoveryPointDi Date and time The time at which the Date and time
sk recovery point creation job
was run

Vw_DPM_RecoveryPointDi Integer Status of the recovery point Integer


sk creation job
0/1=Progress 0/1=Progress

2=Succeeded 2=Succeeded

3=Failure 3=Failure
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_RecoveryPointDi Integer Zero if succeeded. Integer


sk
Else, set to a DPM error
code.

Vw_DPM_RecoveryPointT
ape

Status of recent recovery


point creation jobs on tape.

Vw_DPM_RecoveryPointT String The data source for which String


ape the backup was created

Vw_DPM_RecoveryPointT String The server on which the data String


ape source exists

Vw_DPM_RecoveryPointT Date and time The time at which the Date and time
ape recovery point creation job
was run

Vw_DPM_RecoveryPointT Integer Status of the recovery point Integer


ape creation job
0/1=Progress 0/1=Progress

2=Succeeded 2=Succeeded

3=Failure 3=Failure

Vw_DPM_Replica ReplicaId GUID Unique identifier generated


by DPM for the replica
Listing of all replicas volume
managed by DPM

Vw_DPM_Replica PhysicalPath String The name of the data source


on the replica

Vw_DPM_Replica ServerName String Name of the server to which


the data source belongs

Vw_DPM_Replica ValidFrom Date and time When the replica was


created

Vw_DPM_Replica ValidTo Date and time The date on which the


replica was made inactive

Vw_DPM_Replica PGId GUID Unique identifier generated


by DPM for the protection
group to which the data
source belongs

Vw_DPM_Replica StorageNode String Always set to the DPM


server
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_Server ServerId GUID Unique identifier generated


by DPM for the protected
List of all protected computer
computers.

Vw_DPM_Server ServerName String Fully qualified domain name


for the computer

Vw_DPM_Server NetBiosName String Name

Vw_DPM_Server DomainName String Domain in which the


computer belongs

Vw_DPM_Server IsRG Integer If this computer represents a


Resource Group

Vw_DPM_TapeRecoveryP DataSourceName String The name of the protected


oints data source

Counts for tape recovery


points available for each
data source.

Vw_DPM_TapeRecoveryP PGId GUID The unique identifierentifier


oints for the protection group to
which this data source
belongs

Vw_DPM_TapeRecoveryP ServerId GUID The unique identifierentifier


oints for the server to which this
data source belongs

Vw_DPM_TapeRecoveryP Frequency Integer The number of available


oints recovery points

Vw_DPM_TapeRecoveryP Term Integer The schedule to which the


oints recovery point corresponds
0=ShortTerm; 1=LongTerm

Vw_DPM_TapeStat StartDateTime Date and time

Historical information on
tape usage counts.

Vw_DPM_TapeStat EndDateTime Date and time

Vw_DPM_TapeStat ScheduleType Integer Integer

0=Weekly

1=Monthly

2=Quarterly

3=Yearly
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_TapeStat Free Integer Number of free tapes at


end-time

Vw_DPM_TapeStat Online Integer Number of online tapes at


end time

Vw_DPM_TapeUsagePerP StartDateTime Date and time Start time


G

Historical tape usage data


per protection group.

Vw_DPM_TapeUsagePerP EndDateTime Date and time End time


G

Vw_DPM_TapeUsagePerP PGName String Name of the protection


G group

Vw_DPM_TapeUsagePerP ScheduleType Integer Integer


G
0=Weekly

1=Monthly

2=Quarterly

3=Yearly

Vw_DPM_TapeUsagePerP Online Integer Number of online tapes at


G end time

Vw_DPM_TapeUsagePerP Offline Integer Number of offline tapes at


G end time

Vw_DPM_Total_Disk_Trend StartDateTime Date and time

Total disk space usage


historical trend.

Vw_DPM_Total_Disk_Trend EndDateTime Date and time

Vw_DPM_Total_Disk_Trend ScheduleType Integer Integer

0=Weekly

1=Monthly

2=Quarterly

3=Yearly

Vw_DPM_Total_Disk_Trend DiskSpaceCapacity Big integer The total storage in storage


pool at end-time
VIEW FIELD DATA TYPE DESCRIPTION

Vw_DPM_Total_Disk_Trend PreviousDiskSpaceCapacity Big integer Total storage in storage pool


in previous corresponding
period

Vw_DPM_Total_Disk_Trend DiskSpaceAllocated Big integer The disk space from storage


pool that has been allocated

Vw_DPM_Total_Disk_Trend PreviousDiskSpaceAllocated Big integer The disk space from storage


pool that was allocated in
the previous corresponding
period

Vw_DPM_Total_Disk_Trend DiskSpaceUsed Big integer The actual disk space usage

Vw_DPM_Total_Disk_Trend PreviousDiskSpaceUsed Big integer The used disk space in the


previous corresponding
period

Vw_DPM_Total_RecoveryP DataSourceName String The name of the protected


oint data source

Information about all recent


recovery point jobs.

Vw_DPM_Total_RecoveryP ServerName String The server to which the data


oint source belongs

Vw_DPM_Total_RecoveryP CreationTime Date and time The time at which the


oint recovery point creation job
was run

Vw_DPM_Total_RecoveryP Status Integer Status of the recovery point


oint creation job
0/1=Progress

2=Succeeded

3=Failure

Vw_DPM_Total_RecoveryP ErrorCode Integer Error code in recovery point


oint creation

Set up reports
Schedule reports
Reports aren't scheduled by default in DPM. To start creating and saving historical reports you create a report
schedule. Each report type has an independent schedule A report only has a single schedule. Schedule a report as
follows:
1. In DPM Administrator Console, go to the Reporting view. On the display pane, select the report and click
Schedule.
2. Select Run the according to the schedule options.
3. On the Schedule tab, select schedule options, including frequency, how to group, the time of the day to
generate, and the granularity. Granularity is limited by frequency. So, if the frequency is weekly, then so is
the granularity, the time period to be included in the report data, and the number of copies to retain in
history.
View reports
In the DPM Administrator Console you can display both new and historical reports in Internet Explorer. You can
use the Reporting Services Web toolbar at the top of report to customize, export or print it.
1. You can request a new report with the following settings:
Display - You can view a report groups by protected computer or protection group.
You can specify or exclude a specific time period. You can set report granularity as follows:
Week - Seven days - from Sunday through Saturday
Month - A full month from the first to the last day of the month
Quarterly - For three months starting from January (e.g January through March.
Annual - January 1 to December 31 of a particular year.
2. You can view an available report from the Available reports list. When the number of historical reports
saved equals the maximum number specified in the report schedule, the next report that is saved will
replace the oldest copy of the report, so you can retain the maximum number of copies at all times.
Print reports
Reports in DPM have been designed to print on A4 paper without horizontally splitting the information across
pages. The MHTML and PDF formats are not editable, so you can't modify the report to fit other paper sizes.
Note that if you experience any issues with reports on fitting on A4 paper try changing the dimensions of the
report page width 8.27in and the height to 11.69in. There are details of how to do that on Bob Cornelissen's BICTT
blog.
Pr i n t M HT M L r epo r t s

1. On the Internet Explorer File menu, click Page Setup.


2. Set paper size to A4 and select Orientation > Portrait.
3. Set Margins to values no greater than the following (in inches): Left: 0.11, Right: 0.11, Top: 0.11, Bottom:
0.11. Then print the report.
Pr i n t a P DF r epo r t

1. In Adobe Acrobat, open the Print dialog box.


2. Set Page Scaling to Shrink large pages (the default setting). Select Auto-Rotate and Center.
3. On the Advanced tab, set the orientation to Portrait and print the report.
P r i n t a r e p o r t u si n g M i c r o so ft Ex c e l

1. Open the file in Excel.


2. Click Page Layout > Orientation > Portrait.
3. Click Size > A4 .
4. Click Margins > Custom Margins. Set the Top, Left, Bottom, and Footer margins to 0.
5. In Scale to Fit set Scale to 80%.
6. In Sheet Options clear Print if it's selected. Then print the report.
Send reports
You can send reports to subscribers via email. Reports are sent as file attachments. To subscribe to reports do the
following:
1. Specify the SMTP server that DPM will use to send reports.
2. In the Reporting view, on the display pane right-click the report to which you want to subscribe and click
Schedule.
3. On the E -mail tab, in Recipients type the e-mail addresses of all the subscribers. Only add email addresses
that are relevant on the designed server, and separate addresses with a comma. Then select the format.

Generate DPM reports in Operations Manager


Operations Manager provides an Operations console and a web console that you can use to view and work with
the monitoring data for your environment. To retrieve information you can use predefined views, or search for data
and objects using searching and filtering. For more information, see Getting Information from Operations
Manager. DPM provides a number of predefined views that you can use to search more simply than defining your
own query or filter.
DPM provides a number of predefined views that you can use to search more simply than defining your own
query or filter.
View Name: vDPMBackupJob (Shows backup job details):

FIELD DATA TYPE DESCRIPTION

BackupJobRowId uniqueidentifier Index key

DPMServerName varchar(max) DPM server

TaskID uniqueidentifier Task identifier to uniquely identify job

VerbID uniqueidentifier Identifies the job type

ProtectionServer varchar(max) The protection server or cluster against


which the job ran

ProtectionGroupID uniqueidentifier The protection group ID for which the


job ran

ProtectionGroup varchar(max) Name of protection group

DataSourceID uniqueidentifie Date source ID for which the job ran

DataSourceName varchar(max) Data source name

StartedDateTime datetime Time job startedd

StoppedDateTime datetime Time job stopped

ExecutionState int 2 = Succeeded; 3 = Failed

ErrorCode int Error code for job failure. Error code can
be ignored if job succeeded

ErrorString varchar(max) Corresponding localized error string

TransferredBytes int Number of bytes transferred by the job


FIELD DATA TYPE DESCRIPTION

BackupType varchar(max) DiskBackup; TapeBackup; CloudBackUp

IsDPM bit Whether job ran again a DPM server


(indicating it ran on secondary DPM
server)

IsAdHoc bit Whether job is ad hoc or scheduled

View Name: vDPMRecoveryJob (Recovery job details):

FIELD DATA TYPE DESCRIPTION

RecoveryJobRowID uniqueidentifier Index key

DPMServerName varchar(max) DPM server

TaskID uniqueidentifier Task identifier to uniquely identify job

DatasourceID uniqueidentifier Data source ID for which the recovery


job ran

DataSourceName varchar(max) Data source for which the recovery job


ran

StartedDateTime datetime Job start time

StoppedDateTime datetime Job end time

ExecutionState Int 2=succeeded; 3=failed

ErorCode int Error code. If job succeeded ignore the


error.

ErrorString varchar(max) Corresponding localized error string

TransferredBytes int Number of bytes transferred by the job

RecoverySource int 0 = disk; 1 = Tape; 2 = Cloud

RecoveryType int Indicates recovery type

TargetServerName varchar(max) Target server on which the recovery


was performed

TargetLocation varchar(max) Folder path to which recovery was


performed

IsExternalSource int Indicates whether the data source is


external (for example from a tape
imported from another DPM server)

View Name: vDPMDiskManagement (Shows disk management information):


FIELD DATA TYPE DESCRIPTION

DiskManagementRowID uniqueidentifier Index key

DPMServerName varchar(max) DPM server

DiskID uniqueidentifier Unique ID to identify disk

DiskName varchar(max) Name of disk returned by VDS APIs (for


example "Microsoft Virtual Disk"

TotalSize bigint Total size of disk

FreeSize bigint Free size on disk

IsInStoragePool bit Indicates whether the disk belongs to


the DPM storage pool

DiskType smallint 0 = basic, 1 = dynamic; 2 = uninitialized

HealthStatus smallint 0 = healthy; 1 = failed

IsMissing bit Indicates whether the disk is missing

IsForeign bit Indicates whether the disk is foreign

CanAddToStoragePool bit Indicates whether the disk can be added


to the DPM storage pool

CreatedDateTime datatime Created time

View Name: vDPMDiskUtlization (Shows disk statistics):

FIELD DATA TYPE DESCRIPTION

DiskUtilizationRowID uniqueidentifier Index key

DPMServerName varchar(max) DPM server

SMStatsID uniqueidentifier Statistics identifier used inside DPM

DataSourceID uniqueidentifier Data source ID for which the job ran

DataSourceName varchar(max) Data source for which the job ran

ProductionServer varchar(max) Server or cluster to which the data


source belongs

ProtectionGroupID uniqueidentifier ID of protection group to which the


data source belongs

ProtectionGroup varchar(max) Name of protection group to which the


data source belongs
FIELD DATA TYPE DESCRIPTION

ReplicaSpaceAllocated bigint Total size of replica volume

ShadwoCopyAllocatedSize bigint Shadow copy volume size

ShadowCopyUsedSize bigint Used size of shadow copy volume

ReplicaUsedSize bigint Used size of the replica volume

FreeSpaceAvailable bigint Total free space on replica and shadow


copy volumes

IsCollocated int Indicates whether the volume is used


for a collocated protection group that
might have multiple data sources

View Name: vDPMSLATrend (Useful to show the percentage of instances where SLA was or wasn't met):

FIELD DATA TYPE DESCRIPTION

SLATrendRowId uniqueidentifier Index key

DPMServerName varchar(max) DPM server

SMStatsID uniqueidentifier Statistic identifier used in DPM

StartTime datetime Start time of specific SLA period

EndTime datetime End time of specific SLA period

DatasourceID uniqueidentifier ID of the data source for which the job


ran

DatasourceName varchar(max) Name of the data source for which the


job ran

ProtectionServer varchar(max) The server or cluster to which the data


source belongs

ProtectionGroupID uniqueidentifier The ID of the protection group to which


the data source belongs

ProtectionGroupName varchar(max) The protection group to which the data


source belongs

CreationTime datetime Time that the statistic was created

DiskRecoveryPointAvailable bit Indicates whether there's a disk


recovery point available in the SLA
period
FIELD DATA TYPE DESCRIPTION

TapeRecoveryPointAvailable bit Indicates whether there's a tape


recovery point available in the SLA
period

CloudRecoveryPointAvailable bit Indicates whether there's a cloud


recovery point available in the SLA
period

SLA int Indicates the SLA for the protection


group during this SLA period

View Name: vDPMTapeUtilization (Shows DPM Tape Utilization):

FIELD DATA TYPE DESCRIPTION

TapeUtilizationRowId uniqueidentifier Index key

DPMServerName varchar(max) DPM server

SMStatsID uniqueidentifier Unique statistics identifier in DPM

StartTime datetime Start time of statistics period

EndTime datetime End time of statistics period

FreeTapeCount int Number of free tapes attached to the


DPM server

OnlineTapeCount int Number of online tapes attached to the


DPM server

OfflineTapeCount int Number of offline tapes attached to the


DPM server

View Name: vDPMTapeManagement (Shows DPM information for tape libraries and tape identification):

FIELD DATA TYPE DESCRIPTION

TapeManagementRowID uniqueidentifier Index key

DPMServerName varchar(max) DPM server

MediaSlotNumber int) Slot number of the library on which the


media is present

MediaBarcode varchar(max) Barcode of the tape

MediaLabel varchar(max) Label of the tape

IsOnline bit Indicates whether the tape is online

LibraryName varchar(max) Name of the library


FIELD DATA TYPE DESCRIPTION

ProtectedGroupName varchar(max) Name of the protection group that


owns the tape

MediaExpiryDate datetime Expiry date of the tape


Manage and monitor DPM servers with Operations
Manager
3 minutes to read

Central Console is a System Center Operations Manager console that you can deploy to manage and monitor
multiple System Center Data Protection Manager (DPM ) servers from a single location. It provides:
Centralized monitoring of DPM servers from a single location - You can monitor different versions of DPM, and
track the status and health of servers, tasks, protected resources, tape libraries, available storage and disk space,
and backups.
Service-level agreement (SLA)-based alerting. Alerts are generated when an SLA is broken.
View the state of all roles on DPM servers
Monitor, identify, action, and troubleshoot alerts generated when an SLA breaks. You can consolidate alerts to
show:
only one instance for repeated alerts;
single alert for alerts with the same root cause, or if multiple backups fail for the same data source,
and generate only one ticket if a ticketing system is used
Remote corrective actions and remote recovery
Monitor DPM server memory, CPU, disk resources, database, and performance trends
Modify and manage settings, including disk allocation, recovery points, users, protect groups
Recover data

Setting up Central Console


What you need:
A System Center Operations Manager server running 2016. The Operations Manager Data Warehouse must be
up and running.
View the state of all roles on DPM servers
To install the Management Packs, the DPM server must be running at least DPM 2012 R2 with Update Rollup 5
or DPM 2016.
If you're running a previous version of the Discover and Library Management Packs obtained from the DPM
installation media you should remove them from the DPM server and install the new versions from the
download page.
You can only run one language version of the Management Pack at one time. If you want to use the pack in a
different language uninstall the pack in the existing language and then install it with the new language.
You deploy Central Console as follows:
1. Install the Operations Manager agent - Install the Operations Manager agent on each DPM server you want
to manage and monitor.
2. Import the DPM discovery and library management packs - Downloads the packs and install them on the
Operations Manager server.
3. Install Central Console - Install Central Console on the Operations Manager server.
4. Import the DPM reporting management pack - Downloads the pack and install it on the Operations
Manager server.
Install the Operations Manager agent
Install the agent as follows:
1. Install the agent on each DPM server you want to monitor.
2. Get the latest agent version.
Import the DPM discovery and library management packs
DPM provides the following management packs:
Reporting management pack (Microsoft.SystemCenter.DataProtectionManager.2012.Reporting.mp) -
Collects and displays reporting data from all DPM servers, and exposes a set of Operations Manager
warehouse views for DPM. You can query these views to generate custom reports.
Discovery and monitoring management pack
(Microsoft.SystemCenter.DataProtectionManager.2012.Discovery.mp)
Library management pack - (Microsoft.SystemCenter.DataProtectionManager.2012.Library)
1. On the Operations Manager server, remove any existing DPM management packs.
2. Download the DPM management packs.
By default, the download places the Discovery and Library Management Packs in the C:\Program
Files\System Center Management Packs folder. The Reporting Management Pack is placed in a separate
folder inside that folder.
3. Log on to the Operations Manager server with an account that is a member of the Operations Manager
Administrators role.
4. Remember to remove any previous versions of the Library or Discover Management Packs running on the
server.
5. In the Operations console, click Administration. Right-click Management Packs > Import Management
Packs.
6. Select Microsoft.SystemCenter.DataProtectionManagerDiscovery.MP > Open and then
Microsoft.SystemCenter.DataProtectionManagerLibrary.MP > Open.
7. Follow the instructions in the Import Management Packs wizard.
Install the Central Console
1. Select Install Central Console Server and Client side Components if you want to monitor DPM servers
that have the Operations Manager agent installed and run the DPM administrator console on the
Operations Manager server.
2. Select Install Central Console Server side Components if only want to monitor servers, without using
the scoped DPM Administrator console.
Note that:
DPM adds firewall exceptions for port 6075 to enable scoped Administrator console. Open ports for SQL
Server.exe and SQL browser.exe.
If you need to uninstall Operations Manager, see How to Uninstall Operations Manager.
Import the reporting management pack
1. Log on to the Operations Manager server with an account that is a member of the Operations Manager
Administrators role.
2. In the Operations console, click Administration. Right-click Management Packs > Import Management
Packs.
3. Select Microsoft.SystemCenter.DataProtectionManagerReporting.MP > Open.
4. Follow the instructions in the Import Management Packs wizard.

Next steps
After you import the Management Packs they discover and monitor data without requiring any additional
configuration. You can optionally tweak settings like monitors and rules for your environment. For example if you
find that performance-measuring rules that are enable degrade server performance with slow WAN links, you can
disable them. When you have everything configured as needed you can generate DPM reports from Operations
Manager.
Improve replication performance
3 minutes to read

There are a number of steps you can take to optimize the performance of System Center 2012 - Data Protection
Manager (DPM ) data replication and synchronization, including network throttling, data compression, staggering
synchronization, and optimizing express backups.

Network throttling
Network bandwidth usage throttling is configured at backed up machine level and you can specify different
network bandwidth usage throttling rates for work hours, non-work hours, and weekends, and you define the times
for each of those categories. Enable throttling as follows:
1. Open DPM console > Management > Agent, select the machine on which you want to throttle bandwidth
> Throttle.
2. Click Throttle > Enable network bandwidth usage.
3. Select Throttle Settings and Work Schedule for the machine and click OK.

NOTE
You can configure network bandwidth usage throttling separately for work hours and nonwork hours, and you can
define the work hours for the protected computer.

4. To apply your settings, click OK.


Note that network bandwidth usage can be also limited by Group Policy.
The Group Policy reservable bandwidth limit on the local computer determines the combined reservable
bandwidth for all programs that use the Packet Scheduler, including DPM. The DPM network bandwidth usage
limit determines the amount of network bandwidth that DPM can consume during replica creation,
synchronization, and consistency checks.
If the DPM bandwidth usage limit, either by itself or in combination with the limits of other programs, exceeds the
Group Policy reservable bandwidth limit, the DPM bandwidth usage limit might not be applied. For example, if a
DPM computer with a 1-gigabit-per-second (Gbps) network connection has a Group Policy reservable bandwidth
limit of 20 percent, 200 Mbps of bandwidth is reserved for all programs that use the Packet Scheduler. If DPM
bandwidth usage is then set to a maximum of 150 Mbps while Internet Information Services (IIS ) bandwidth usage
is set to a maximum of 100 Mbps, the combined bandwidth usage limits of DPM and IIS exceed the Group Policy
reservable bandwidth limit, and the DPM limit might not be applied. To resolve this issue, reduce the DPM setting
for network bandwidth usage throttling.

Enable data compression


On-the-wire compression is configured at the protection-group level for backup to tape. Compressing data reduces
the space needed on the tape and increases the number of backup jobs that can be stored on the same tape.
Compression doesn't significantly increase the time required to complete the backup job. Encryption increases data
security, and also doesn't significantly increase the time required for the backup job. Encryption requires a valid
certificate on the DPM server. Configure compression as follows:
1. Open DPM Administrator console > Protection view.
2. Click Optimize performance. On the Network tab, check Enable on-the-wire compression.

Stagger synchronization start times


To optimize performance, you can offset the start time of synchronization jobs across different protection groups
so that all of them do not start at the same time. Offsetting synchronization start times can also be used to
optimize secondary protection of another DPM server. Offset as follows:
1. Click DPM Administrator Console > Protection and select a protection group.
2. Click Optimize performance. On the Network tab, select the hours and minutes to offset the start of the
synchronization job in the Offset <time> start time by field.

Optimize express backups


To provide quick recovery of application data, DPM must create an express full backup periodically. The express full
backup operation typically increases the demand on the server's resources by 5 percent for several minutes. To
reduce the demand on the server's resources, you can schedule fewer express full backups, but this can increase
data recovery time. Modify the schedule as follows:
1. Click DPM Administrator Console > Protection and select the protection group for which you want to
modify the express full backup schedule.
2. Click Optimize performance and on the Express Full Backup tab, select the available times for the
express full backups and click Add. Select the days of the week for the express full backups.
Manage multiple DPM servers with Central Console
2 minutes to read

Central Console is a System Center Operations Manager console that you can deploy to manage and monitor
multiple System Center Data Protection Manager (DPM ) servers from a single location. It provides:
Centralized monitoring of DPM servers from a single location - You can monitor different versions of DPM,
and track the status of servers, tasks, protected resources, tape libraries, available storage, and disk space.
Role-based access control
Remote recovery and remote corrective actions
Service level agreement (SLA)-based alerting and alert consolidation - Alerts are generated when an SLA is
broken. You can consolidate alerts and work on high priority items, as follows:
Repeated alerts - Display only one alert for repeated alerts. For example if a job is scheduled to run
hourly and hasn't run for the last 10 hours, only one alert for the failed job is displayed.
Same root cause - If multiple alerts have the same root cause, or if multiple backups fail for the same
data source, only the alerts informing you of the failure is generated.
Ticket generation - If you are using a ticketing system, only one ticket is generated.
Scoped console - This is based on the DPM Administrator Console with a few minor differences.

Set up Central Console


You can install Central Console on a server computer running Windows Server 2008 R2 or later, or a client
computer running Windows 7 or later. It can't be installed on the DPM server. Set it up by installing the relevant
Operations Manager agent on each DPM server you want to manage, and then installing Central Console on the
Operations Manager server by importing the DPM management pack and then installing the console.
1. Deploy an Operations Manager agent to your DPM server. Read more.
2. The Central Console consists of two management packs -
Microsoft.SystemCenter.DataProtectionManager.2012.Discovery.mp and
Microsoft.SystemCenter.DataProtectionManager.2012.Library.mp. You'll need to import both of these and
they're located in <CDDrive:>\Management Packs. When you import the management pack, Windows
displays a warning about write actions. This is an expected warning, and you can click OK to continue.
Note that Central Console requires the version of the management pack that's available in the DPM
installation folder. However after you've installed this version you can then update to the latest management
pack version, available on the Download Center.
3. After importing the pack install Central Console. To do this in the Setup screen of Operations Manager
select Install Central Console Server and Client side Components if you want to monitor DPM servers
on which the Operations Manager agent is present and use the scoped DPM Administrator console. Select
Install Central Console if you want to use the scoped DPM Administrator console only, without server
monitoring. Select Install Central Console Server side Components if you want to monitor servers only,
without using the scoped DPM Administrator console.
4. DPM adds firewall exceptions for port 6075 and creates a default role-based access configuration.
5. After the Central Console is installed a view folder System Central 2012 Data Protection Manager is
created in the Operations Manager console. You can manage most tasks for managed DPM servers from
the Central Console.

You might also like