Hyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010

Size: px
Start display at page:

Download "Hyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010"

Transcription

1 Hyper-V Cloud Practice Builder Disaster Recovery Using DPM 2010

2 The Hyper-V Cloud Practice Builder from Microsoft Enterprise Services can help Microsoft partners by: Accelerating practice development by providing best practices for planning and delivering a Private Cloud solution based on Microsoft Virtualization technologies. Reducing training costs by providing methodologies for delivering Server Virtualization scenarios. Lowering risk by providing real-world examples of problems and solutions encountered by Microsoft architects and consultants. The Hyper-V Cloud Practice Builder is for: Consulting Services management, sales, and delivery roles. Software and Hardware vendors looking to understand how Private Cloud is delivered. Licensing and resellers interested in sizing and scoping Private Cloud engagements. Introduction Microsoft System Center Data Protection Manager 2010 is a server software application that enables disk-based and tape-based data protection and recovery for computers in and across Active Directory directory service domains. Data Protection Manager performs replication, synchronization, and recovery point creation to provide reliable protection and rapid recovery of data both by system administrators and by end-users. This Guide discusses the use of Microsoft System Center Data Protection Manager 2010 to backup and restore the virtualized environment in a Private Cloud. This Guide is part of the Hyper-V Cloud Practice Builder that is based on the framework that Microsoft Consulting Services has leveraged to deliver Server Virtualization for several years in over 82 countries. 2

3 Contents System Center Data Protection Manager and the Virtualized Environment... Prerequisites for protecting Hyper-V using Data Protection Manager Data Protection Manager Supported Scenarios 5 Data Protection Manager Unsupported Scenarios 5 Application Awareness 6 Planning Protection of Virtualized Workloads 8 Protection Groups 8 Planning Protection Groups 10 Planning Protection Group Storage 11 Planning Disaster Recovery 12 Installing and Configuring Data Protection Manager Hardware Requirements 14 Component 14 Minimum Requirement 14 System volume: 1 GB 14 Software Requirements 14 Installing Data Protection Manager Deploying Data Protection Manager Agents 18 Creating Protection Groups and Protecting VMs 20 Recovering Virtual Machines 23 Supported Scenarios 23 Recovering a Virtual Machine to Its Original Location 23 Recovering a Virtual Machine to an Alternate Location 23 Item-Level Recovery for Hyper-V 29 3

4 System Center Data Protection Manager and the Virtualized Environment Microsoft System Center Data Protection Manager 2010 (DPM) has extended the protection of Microsoft Hyper-V and now supports these configurations: Cluster Shared Volumes (CSV) Highly available virtual machines on a failover cluster Stand-alone hosts Windows Server/Server Core and Microsoft Hyper-V Server & Local Data Source Protection When recovering a virtual machine, Data Protection Manager 2010 supports the following options: Recovery to the original location Recovery to an alternate location Item-level recovery from a host-based virtual machine backup Recovery to network folder Copy to tape Before you install Data Protection Manager 2010, you need to ensure that the Data Protection Manager server and the computers and applications it is going to protect meet network and security requirements. You must also ensure that they are running on supported operating systems and that they meet the minimum hardware requirements and software prerequisites. The Data Protection Manager 2010 installation requires Windows Server 2008 R2 or the x64-bit version of Windows Server Data Protection Manager is designed to run on a dedicated, single-purpose server that cannot be an application server, a computer with cluster services enabled, or a management server for Microsoft System Center Operations Manager. You can, however, monitor the Data Protection Manager server and the computers that it protects using Operations Manager. 4

5 Data Protection Manager Supported Scenarios Data Protection Manager 2010 supports the following scenarios for Hyper-V: Online backup. Data Protection Manager 2010 supports online backups for guests running Windows Server 2008, Windows Server 2008 R2, and Windows Server Online backups ensure that Data Protection Manager does not bring down the protected virtual machine. By default, Data Protection Manager tries to protect virtual servers in the online mode. Offline backup. Data Protection Manager 2010 supports offline protection for guests running older operating systems such as Windows NT 4.0 and Windows Server 2000, and Linux. Offline backup requires Data Protection Manager to pause a virtual machine, take a snapshot of the virtual machine, bring the virtual machine online again, and then back up the snapshot. Failover Clustering. Data Protection Manager 2010 supports protection for clustered Hyper-V host servers, with full install or Server Core-based Hyper-V hosts. Data Protection Manager also supports Quick Migration and Live Migration. Data Protection Manager Unsupported Scenarios Data Protection Manager 2010 does not support the backup of virtual machines that do not have their storage on the host. However, if you have at least one virtual hard disk (VHD) of the virtual server on the local machine, Data Protection Manager protects the local VHD. Storage not on host means you either use iscsi to present volumes to the virtual machine or use a remote VHD. For such machines, we recommend that customers perform host-level backup of the VHD files using Data Protection Manager and install an agent into the virtual machine to back up data that is not visible on the host. Data Protection Manager 2010 does not support host-based backup of virtual machine pass-through disks. To backup pass-through disks, the Data Protection Manager agent must be installed in the virtual machine and the backup of pass-through disks must be performed from within the virtual machine. 5

6 Application Awareness Many existing backup solutions offer generic backup functionality that can sometimes be adapted to various applications. Instead of conforming to this model, Data Protection Manager was designed to leverage three fully supported Microsoft technologies to provide continuous data protection specifically for Hyper-V. The Data Protection Manager block-based synchronization engine is used to make the initial copy of a protected virtual machine, ensuring that a complete and consistent copy is made. The Data Protection Manager network transport ensures that the copied data is delivered intact to the Data Protection Manager server. After the initial copy is made, Data Protection Manager captures express full backups using the Hyper-V Volume Shadow Copy Service (VSS) writer. The Data Protection Manager agent monitors which disk blocks have changed in the protected virtual machines. The VSS writer, under Data Protection Manager instruction, provides a data-consistent set of disk-blocks to synchronize to the Data Protection Manager server. This provides the benefit of a full backup with the Data Protection Manager server having a complete and up-to-date copy of the data, without the penalty of transmitting everything across the network like a normal full. The Data Protection Manager agent on the Hyper-V host machine uses the existing Hyper-V APIs to determine whether a protected virtual machine is also capable of supporting VSS. By combining the Windows Server VSS functionality with block-level synchronization, Data Protection Manager can protect virtual machines while they are active. After the initial baseline copy of the virtual machines resources is synchronized to the Data Protection Manager server, any changes to the virtual machine can be continuously synchronized as often as every 30 minutes. The express full backup technology of Data Protection Manager identifies which blocks have changed on the host storage volumes. Those blocks, and only those blocks, are copied to the Data Protection Manager server, where they are applied to an active replica of the data, with previous iterations stored as a set of differences within the preceding backup. Data Protection Manager can maintain up to 512 of these differential backups. 6

7 The entire express full backup process usually takes only a few minutes to complete, depending on how much data has changed. After the express full backup is completed, the Data Protection Manager server has captured an exact duplicate of the virtual machine from the original Hyper-V host. To provide multiple recovery points, Data Protection Manager maintains a shadow copy of the changed blocks between the current express full backup and the previous one. These block level differences are stored; Data Protection Manager uses them to reconstitute the previous recovery point. In this manner, Data Protection Manager can maintain up to 512 recovery points per data source. If the virtual machine is running Windows Server 2003 or later and has the Hyper-V Integration Components installed, then the Hyper-V VSS writer will pass the VSS request through to all VSS-aware processes on the virtual machine without requiring the virtual machine to be running the Data Protection Manager agent. This recursive VSS request allows the VSS writer to ensure that all disk write operations are paused both for the workloads within the virtual machine as well as for the various files that comprise the virtual machine data set and permits the VSS snapshot to be captured with no data outage. This unique combination of features between Data Protection Manager and Hyper-V usually equals or surpasses all other backup methods for virtual environments. Data Protection Manager calls the Hyper-V VSS writer. The Hyper-V VSS writer determines that the virtual machine is VSScapable and calls the VSS writers within the virtual machine. Any VSS-capable applications such as Microsoft SQL Server 2005 invoke their VSS writers to ensure that their application data is in a consistent state. The Windows Server VSS functionality ensures that the NTFS volumes inside the virtual machine are also consistent. When these steps are complete and the internal contents of the virtual machine are known to be data consistent, the Data Protection Manager agent tracks changed blocks and transfers those to the Data Protection Manager server. 7

8 This process ensures that the virtual machine is internally consistent before securing the virtual machine files on the host, without requiring downtime. If the virtual machine does not support VSS, then the Hyper-V VSS writer will automatically use the Hyper-V APIs to put the virtual machine into hibernation before capturing the various data files. Once they have been protected, the machine is automatically restarted. This integration permits the seamless capture of any supported virtual machine configuration or operating system with as little downtime as possible between three to five minutes in most cases. Data Protection Manager also uses VSS to maintain shadow copies on the Data Protection Manager server between one express full and the next one. By storing only the differences between individual express full backups, Data Protection Manager is able to maintain up to 512 shadow copies of the complete virtual machine data set without requiring 512 times the space. Planning Protection of Virtualized Workloads Planning the backup and recovery of virtualized workloads requires careful consideration of a number of variables including all of the virtual machines, storage, and configuration data that comprise the workload as well as the Recovery Point and Recovery Time objectives described in previous sections. Data Protection Manager uses a concept called protection groups to manage the protection of related resources. Protection Groups A protection group is a collection of data sources, such as volumes, shares, or Virtual Machines, that have a common protection configuration. Data sources within a protection group are referred to as protection group members. The protection group configuration specifies the performance options that you want to enable, such as on-the-wire compression and daily consistency checks. The protection policy specifies how often to synchronize the replica with the live data on the protected computer and when to create recovery points of the replica. Some of the factors you should consider when deciding how to organize your data into protection groups are the business requirements of the organization, network performance, and the characteristics of the data. 8

9 Consider, for example, how often the data changes, how rapidly the data size increases, and how critical it is to be able to recover a very recent copy of lost data. You might also want to consider how frequently you need to back up the data to tape, which data needs to be encrypted or compressed, and the number of backup copies you need available. In most cases, you will want to group data with similar characteristics together. To efficiently make use of your storage and bandwidth, you must design a set of recovery goals that takes into account the nature of each protected data source. To define these goals, you must first determine your desired synchronization frequency, recovery point schedule, and retention range. The synchronization frequency determines how often the Data Protection Manager agent will capture snapshots of your data and transmit the changes to the Data Protection Manager server. This value reflects how much data you are willing to lose from this data source if there is an outage or disaster. Think of your synchronization frequency as how often you wish incremental backups of your data to happen. The recovery point schedule determines how often Data Protection Manager creates discrete recovery points for the protected data. The Data Protection Manager recovery point schedule determines the opportunities you have to recover your data. If you perform a weekly full backup and daily incremental backup in a traditional backup application, you have seven unique points of recovery. Data Protection Manager creates recovery points at every express full backup as well as when data is synchronized. A fifteen minute synchronization schedule provides 96 recovery points per day. The retention range determines how long you need Data Protection Manager to keep the protected data available for recovery. You may define both short-term and long-term protection policies to control recovery from both disk and tape. Short-term policies may use either disk or tape, while long-term policies are intended to provide control over your extended tape retention. o o Defining a short term to tape scenario implies using Data Protection Manager as a traditional tape backup solution, intending to replace one s existing backup solution. Defining short term to disk (only) is often used to provide a 9

10 robust backup and recovery solution for Hyper-V and other workloads through Data Protection Manager, and then allow a third party heterogeneous enterprise tape solution to back up the Data Protection Manager server for long term compliance. o Most Data Protection Manager users, however, will choose short term to disk plus long term to tape, enabling a complete solution that offers rapid and reliable disk-based protection and recovery, with a seamlessly integrated tape component for long-term retention of data. With the Data Protection Manager agents installed on all Hyper-V hosts, Data Protection Manager will be aware of all the Hyper-V hosts and the virtual machines running on them and they can be added to a protection group. Planning Protection Groups Protection Groups can be designed in multiple ways to achieve the desired Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Examples include: Create protection groups for all VMs comprising a particular workload (i.e. all the VMs that comprise a virtualized Microsoft Office SharePoint Services farm Create protection groups for all VMs comprising a particular enterprise service such as Web servers Create protection groups mapped to data priority (i.e. all VMs holding financial data) Create protection groups for only the application data inside the VM and not the entire VM itself by placing Data Protection Manager agents inside the VMs and backing up only the application data o o The entire guest can be protected as a VM, using the VSS Writer in the virtualization host Application data within the guest can be separately protected, using each application s VSS Writer For each workload that runs within a VM, determine whether it will be protected as part of the VM using a Data Protection Manager agent installed 10

11 on the host machine, or whether its data will be protected separately by a Data Protection Manager agent on the guest OS within the VM. If the data will be protected as part of a VM, there is no need to also separately protect it: VM Protection Options Data Protection Manager Agent Placement What Is Protected What Is Not Protected Recovery Granularity Protect entire VM On VM host Entire system: all applications, files, system state, and OS; VM configuration Pass-through disks that are attached to guest VMs; deploy a Data Protection Manager agent into the VM to protect these Entire VM can be recovered, or individual files, folders or volumes using ILR Protect application data within the VM On VM host and on each guest with data that requires protection Data types that Data Protection Manager supports. Data types that are not supported by Data Protection Manager Discrete application data may be separately recovered With the above decisions made per workload and VM, protection groups can be designed along the dimensions outlined above (workload, service, priority, etc.). Planning Protection Group Storage Once the decisions are made in terms of what aspects of the virtualized workload will be backed up and the design concept for storage groups has been selected, planning for the storage and protection policies for each protection group can begin. Planning for the storage required to protect virtual workloads is a challenging topic and is impacted by the decision of whether to protection the entire VM or just the data within the VM. Calculating storage requirements for protecting virtual workloads is challenging due the fact that the data is stored on VHD files and in cases where the entire VM is being backed up, the calculations must include the OS volumes and changes that may occur on the VM system volume VHD and thus backed up. Very early on in the Proof of Concept (PoC) or Pilot phases it is recommended 11

12 to start protecting a subset of the planned virtual workloads to gather real world metrics for the rate of data change to be used in planning the overall storage requirements. Due to the ease with which virtual machines can be commissioned as compared to physical servers, a higher storage growth rate assumption should be utilized that would otherwise be the case, particularly if the strategy of backing up the entire VM is being widely utilized. As an example, an administrator could very easily instantiate 10 new virtual machines, each with an OS volume of 20 GB which could result in a requirement for 400 GB (10*20*2) of Data Protection Manager storage. Planning Disaster Recovery A Data Protection Manager server can back up other Data Protection Manager servers. A Data Protection Manager server that protects data sources directly is called the primary Data Protection Manager server. A Data Protection Manager server that protects other Data Protection Manager servers is called the secondary Data Protection Manager server. In Data Protection Manager 2007 SP1, you can protect only the primary Data Protection Manager server with a secondary Data Protection Manager server. The Data Protection Manager 2010 allows more complex and cost-effective disaster recovery scenarios through cyclic protection and chaining. Cyclic protection enables two Data Protection Manager servers to protect each other, and is typically aimed at smaller architectures, such as in a branch office. Chaining allows you to create a chain of Data Protection Manager servers in 12

13 which each server protects the next server in the chain. In Data Protection Manager 2010, a secondary Data Protection Manager server can be used to protect the following: The databases in the instance of SQL Server on the primary Data Protection Manager server. All local volumes and application data on the primary Data Protection Manager server. All replicas on the primary Data Protection Manager server that are directly protected by primary Data Protection Manager server. Before you configure secondary protection for your servers, you must ensure that the Data Protection Manager server or selected Data Protection Manager servers are not being protected by other Data Protection Manager servers. Before you can protect the replicas and database of the primary Data Protection Manager server, you must start the Data Protection Manager Writer and SQL Server VSS Writer services on the primary Data Protection Manager server. Installing and Configuring Data Protection Manager 2010 A Data Protection Manager 2010 Beta installation comprises two primary tasks: 1. Installing the Data Protection Manager pre-requisite software 13

14 2. Installing the Data Protection Manager application. Hardware Requirements The following table shows the minimum recommended hardware requirements for a Data Protection Manager 2007 installation. In a production environment, greater hardware requirements might be required for your servers. Component Minimum Requirement Processor Memory Disk space for Data Protection Manager installation Disk space for storage pool 1 GHz or faster; 2.33 GHz quad-core CPU recommended Minimum 521 MB; 4 GB recommended System volume: 1 GB Data Protection Manager installation location: GB Database files drive: 900 MB 1.5 times the size of the protected data Software Requirements Operating System Requirements Windows Server 2008 (Standard and Enterprise x64-bit editions) Windows Server 2008 R2 (Standard and Enterprise editions) SQL Server Requirements SQL Server version SQL Server 2008 (Standard or Enterprise Edition) Software Prerequisites The Data Protection Manager 2010 installation will guide you through the installation of the following prerequisites: Windows PowerShell 2.0 Note Versions of PowerShell 1.0 and 2.0 cannot coexist on the same computer. You must remove PowerShell 1.0 before installing Data Protection Manager. The Data Protection Manager installation wizard will prompt you to install PowerShell 2.0. Microsoft.NET Framework 3.5 with Service Pack 1 (SP1) Windows Installer (MSI)

15 Windows Single Instance Store (SIS) Note: You must restart the computer to complete the installation of the prerequisite software. After restarting the computer, restart Data Protection Manager Setup. Installing Data Protection Manager 2010 Log on to the Data Protection Manager server using a domain user account that is a member of the local administrators group. If you are installing Data Protection Manager from a network share, browse to the installation share, and then double-click Setup.exe in the root folder of the share. 1. On the Microsoft System Center Data Protection Manager 2010 screen, click Install Data Protection Manager. 2. On the Microsoft Software License Terms page, review the license agreement. If you accept the terms, click I accept the license terms and conditions, and then click OK. After you click OK, Data Protection Manager installs the Visual C++ Redistributable 2008 package and Microsoft.NET Framework 3.5 SP1 if they have not already been installed. 3. On the Welcome page, click Next. Data Protection Manager begins a prerequisites check for all required hardware and software. 4. On the Prerequisites Check page, wait while Data Protection Manager Setup checks the system to verify that it meets the software and hardware requirements. If all required components are present, Data Protection Manager Setup displays a confirmation. Click Next to continue. If one or more required or recommended components are missing or noncompliant, Setup displays a warning or error message. On the Prerequisites Installation page, Data 15

16 Protection Manager setup installs any prerequisite software required for setup. The Data Protection Manager Setup Wizard will indicate if a restart is required to complete the installation. If a restart is required, restart the Data Protection Manager server and start Data Protection Manager Setup again. 5. On the Product Registration page, enter your registration information. 6. On the Installation Settings page, in the DPM Program Files section, accept the default folder, or click Change to browse to the folder to which you want to install Data Protection Manager. You can install Data Protection Manager only on a local drive, and you cannot install it in read-only folders, hidden folders, or directly to local Windows folders such as Documents and Settings or Program Files. (Data Protection Manager can, however, be installed to a subfolder of the Program Files folder.) 7. On the Installation Settings page, in the SQL Server settings section, specify whether you want to install the MSDPMV3Beta1Eval instance of SQL Server 8. On the Security Settings page, specify and confirm a strong password for the restricted MICROSOFT$DPM$Acct and DPMR$<computer name> local user accounts, and then click Next. For security purposes, Data Protection Manager runs SQL Server and the SQL Server Agent service under the MICROSOFT$DPM$Acct account, which Data Protection Manager Setup creates during the Data Protection Manager installation. To securely generate reports, Data Protection Manager creates the DPMR$<computer name> account. 9. On the Microsoft Update Opt-In page, specify if you want to sign up for the Microsoft Update service, and then click Next. 10. On the Summary of Settings page, review the summary of installation settings. To install Data Protection Manager using the specified settings, click Install. To change the settings, click Back. After the installation is complete, the Installation page displays the installation 16

17 status. 11. Click Close, and then restart the computer to incorporate all of the Data Protection Manager Setup changes. 12. Restart the Data Protection Manager Server. After you install Data Protection Manager 2010, you must perform the following tasks before you can start protecting your data. 1. Add a Disk to the Storage Pool. For information about installing disks to the Storage Pool, see Adding Disks to the Storage Pool ( 2. Install protection agents on the computers you want to protect. a. On the protected computer, if the firewall is turned on, click Attach Agents, and then install the agent manually. For information about installing the agent manually, see To install the protection agent manually on a target computer in this topic. b. On the protected computer, if the firewall is turned off, click Install Agents to install the agent on the protected computer. c. Create the protection groups. d. Upgrading an agent from Data Protection Manager 2007 SP1 to Data Protection Manager 2010 may show that a restart is required. Prerequisites for protecting Hyper-V using Data Protection Manager 2010 Before protecting Hyper-V virtual machines with Data Protection Manager, ensure that you have met the following prerequisites before protecting Windows Hyper-V: 1. On the Data Protection Manager server, you must do the following to enable item-level recovery (ILR): Install Windows 2008 Server SP2 or Windows Server 2008 R2 with the RTM version of Hyper-V 17

18 Install the Hyper-V role on the DPM server ( Note Data Protection Manager continues to protect Hyper-V virtual machines even if the Hyper-V role is not installed on the Data Protection Manager server. However, you cannot do an ILR unless the Hyper-V role is enabled. 2. On the Hyper-V host: Install the Microsoft Hyper-V prerequisites ( or Microsoft Windows Server 2008 SP2 or Windows Server 2008 R2. Install the Hyper-V updates ( These updates are cumulatively available in Hotfixes and Security Updates in Windows Server 2008 SP2 and Windows Vista SP2 ( For CSV deployment, install the VSS hardware provider on the host computer Install the integration components on the guests. For more information, see Install a Guest Operating System ( Deploying Data Protection Manager Agents Before you can start protecting data, you must install a protection agent on each computer that contains data that you want to protect. After the protection agent is installed on the computer, the computer is referred to as a protected computer in the Management task area. However, the data sources on the computer are not protected until you add them to a protection group. Agents can be deployed several different ways: Deploying protection agents behind a firewall Deploying directly from the Data Protection Manager Administrator Console 18

19 Deploying via standard software distribution methods (Microsoft Systems Management Server, System Center Configuration Manager, etc.) Deploying manually Deploying Data Protection Manager Agents Behind a Firewall If you want to install protection agents on computers that reside behind a firewall, such as servers with the Windows Firewall enabled, Data Protection Manager provides an executable file named DPMAgentInstaller.exe that performs the following: Installs the protection agent prerequisites and the Data Protection Manager protection agent. Configures the target computer to receive commands from the specified Data Protection Manager server name. Configures the firewall to allow communication to come in. To install a protection agent on a server behind a firewall: 1. On the computer on which you want to install the protection agent, from the Windows command prompt, from the Agents folder, type DpmAgentInstaller.exe <Data Protection Manager server name> 2. On the Data Protection Manager server, from the Data Protection Manager Management Shell prompt, type Attach- ProductionServer.ps1 <Data Protection Manager server name> <production server name> <user name> <password> <domain> The password parameter is not required and we recommend that you do not provide it. Data Protection Manager will prompt you for a password, which will not appear on the screen. However, you can provide the password if you want to use the script to install a protection agent on a large number of computers. Note If you are attaching the protected computer on a different domain, you must specify the fully qualified domain name. For example, Computer1.Domain1.corp.microsoft.com, where Computer1 is the name of the protected computer, and Domain1.corp.microsoft.com is the domain to 19

20 which you are attaching the computer. The required configurations to protect the server are created. Data Protection Manager Administrator Console will now display the protected server. To display the correct protection agent status, in the Monitoring task area, on the Jobs tab, click Refresh Job. Installing the protection agent manually To install a protection agent manually: 1. On the computer on which you want to install the protection agent, we recommend that you map a network drive to the Data Protection Manager server. For example, at the command prompt type net use Z:\\DPM1\c$. 2. On the protected computer, at the command prompt, perform the following steps: a. Change the directory to <drive letter>:\program Files\Microsoft DPM\DPM\ProtectionAgents\RA\3.0.<build number>.0\i386 If you have a 64-bit computer, replace i386 with AM64. b. Run DpmAgentInstaller.exe <Data Protection Manager server name>. For example, type: DPMAgentInstaller.exe DPM1.Fully.qualified.domain OR On a 64-bit computer, type: DPMAgentInstaller_x64.exe <DPM server name>. Creating Protection Groups and Protecting VMs This section illustrates how to create protection groups in Data Protection Manager 2010 and set the protection options for all of the resources included in the protection group. The procedure to protect virtual machines deployed on a CSV and regular shared disk in a failover cluster are the same. Screenshot Procedure 20

21 In Data Protection Manager Administrator Console, click Protection on the navigation bar. In the Actions pane, click Create protection group. The Create New Protection Group Wizard appears. Review the Welcome page, and then click Next. Expand the cluster node to see the virtual machines that are hosted on the failover cluster. Select the virtual machines that you want to include and then click Next. Enter a name for the protection group and select whether to protect the group on disk, tape, or both. Click Next. Select the retention range and set the application recovery points. Click Next. 21

22 Review the disk space allocations. Click Next. Choose the replica creation method. Click Next. Review the summary page then click Create Group. If you elected to have Data Protection Manager immediately create a replica, you can monitor the status of the replica creation by selecting the Monitoring tab and locating the running job. Upon completion, if you select the Protection tab, you should see the newly created protection group as well as the replicas that were created. If you elected not to immediately create replicas, you will see the protection group only until the replicas are created, according to the schedule you specified. 22

23 Recovering Virtual Machines Supported Scenarios Data Protection Manager 2010 supports the following recovery scenarios: Scenario Description Recovering a virtual machine to its original location. Recovering a virtual machine to an alternate location Item-level recovery (ILR) of Hyper-V virtual machines The original VHD is deleted. Data Protection Manager will recover the VHD and other configuration files on the original location by using the Hyper-V VSS writer. At the end of the recovery process, virtual machines will still be highly available. The resource group must be present for recovery to happen. If the resource group is not available, recover to an alternate location and then make the virtual machine highly available. Data Protection Manager supports alternate location recovery (ALR), which provides a seamless recovery of a protected Hyper-V virtual machine to a different Hyper-V host, independent of processor architecture. Hyper-V virtual machines that are recovered to a cluster node will not be highly available. For more information about how to make a virtual machine highly available, see Make the virtual machine highly available ( Data Protection Manager supports item-level recovery (ILR), which allows you to do granular recovery of files, folders, volumes, and virtual hard disks (VHDs) from a host-level backup of Hyper-V virtual machines to a network share or a volume on a Data Protection Manager protected server. The Data Protection Manager protection agent does not have to be installed inside the guest to perform item-level recovery. Recovering a Virtual Machine to Its Original Location The procedure to recover a virtual machine to its original location is the same as with any other data source. For more information, see Recovery Wizard ( Recovering a Virtual Machine to an Alternate Location In the event of disaster recovery, Data Protection Manager 2007 allows you to recover virtual machines as files to a network folder. You can then copy those 23

24 files to an alternate Hyper-V host server. However, to start a virtual machine on an alternate Hyper-V host server, you have to manually create and configure the virtual machine using the recovered files. Now, Data Protection Manager 2010 supports alternate location recovery (ALR), which allows you to recover a Hyper-V virtual machine to an alternate stand-alone Hyper-V host or to a cluster. The recovered virtual machine is already registered and configured on an alternate Hyper-V host server. Note When you recover to an alternate clustered host, Data Protection Manager will not make the virtual machine highly available. You must do that using the Failover Cluster Manager. Data Protection Manager 2010 also supports alternate location recovery of Hyper-V virtual machines to a cluster both in a Cluster Share Volume (CSV) and Non-CSV environment. Recovering a Hyper-V virtual machine in a Cluster Shared Volumes (CSV) environment 1. In Data Protection Manager Administrator Console, click Recovery on the navigation bar. 2. Browse or search for the virtual machine listed under the cluster node that you want to recover. 3. Available recovery points are indicated in bold on the calendar in the recovery points section. Select the bold date for the recovery point that you want to recover. 24

25 4. On the Recoverable Items pane, click to select the virtual machine item that you want to recover. 5. In the Actions pane, click Recover. Data Protection Manager starts the Recovery Wizard. Review your recovery selection, and then click Next. 6. Select the type of recovery you would like to perform: Recover to original instance. Recover to network folder. Recover to an alternate location. Type the alternate location, or click Browse and, in the Specify Alternate Recovery Destination dialog box, select a recovery location. Click OK. In this type of recovery, Hyper-V virtual machines recovered to a cluster will not be highly available. To make it highly available, do the following: 1. Ensure that you are recovering a virtual machine to a specific folder in a CSV. The folder should have the following path: %SystemDrive%\ClusterStorage\Volume<Number> 2. Make the Hyper-V virtual machines highly available. For more information about how to make a virtual machine highly available, see Make the virtual machine highly available 25

26 ( Copy to tape. 7. Specify your recovery options, and then click Next. 8. The summary section of the recovery wizard lists the virtual machine to be recovered. Review your recovery settings, and then click Recover. Recovering a Hyper-V virtual machine in a non-csv environment 1. In Data Protection Manager Administrator Console, click Recovery on the navigation bar. 2. Expand the cluster node to see the virtual machines that are hosted on the failover cluster. Select the virtual machines that you want to recover. 3. Available recovery points are indicated in bold on the calendar in the recovery points section. Select the bold date for the recovery point you want to recover. 26

27 4. In the Recoverable item pane, click to select the recoverable item you want to recover. a. If you select the virtual machine on the left pane, the Recoverable Item list will show you the list of VHDs. If you do a recovery at this point, you are recovering a VHD and not the virtual machine. 5. In the Actions pane, click Recover. Data Protection Manager starts the Recovery Wizard. For more information about the Recovery wizard, see Recovery Wizard ( a. In a non-csv environment, the destination will be a volume on available storage in the cluster. 6. Make the Hyper-V virtual machines recovered to a cluster highly available. For more information about how to make a virtual machine highly available, see Make the virtual machine highly available ( Recovering to an alternate stand-alone Hyper-V host Data Protection Manager 2010 allows you to recover a Hyper-V virtual machine to an alternate stand-alone Hyper-V host: 1. In Data Protection Manager Administrator Console, click Recovery on the navigation bar. 2. Browse or search for the Hyper-V virtual machine that you want to recover from the list of Hyper-V computers. 3. Available recovery points are indicated in bold on the calendar in the recovery points section. 27

28 4. Select the bold date, and then the time from the drop-down list, for the recovery point you want to recover. 5. In the Recoverable item pane, click to select the recoverable item you want to recover. a. If you select the virtual machine on the left pane, the Recoverable Item list will show you the list of VHDs. If you do a recovery at this point, you are recovering a VHD and not the virtual machine. 6. In the Actions pane, click Recover. Data Protection Manager starts the Recovery Wizard. For more information about the Recovery wizard, see Recovery Wizard ( 28

29 7. You can now close the Recovery Wizard and view the recovery status in the Monitoring task area. a. If the recovered virtual machine was backed up in an online state, and it is saved state after recovery, delete the saved state of that virtual machine from the Hyper-V Manager Console and start it. b. After alternate location recovery always check whether the virtual machine s network configuration is correct. Item-Level Recovery for Hyper-V Data Protection Manager 2007 provides both host-based and guest-based protection for Hyper-V virtual machines. Data Protection Manager 2010 supports item-level recovery (ILR), which allows you to do granular recovery of files, folders, volumes, and virtual hard disks (VHDs) from a host-level backup of Hyper-V virtual machines to a network share or a volume on a Data Protection Manager protected server. You must have the Hyper-V role enabled on the Data Protection Manager server to perform item-level recoveries. During item-level recovery, Data Protection Manager has to mount the VHDs of the protected virtual machines. 29

30 Note Item-level recovery does not support recovery of an item to its original location. The following table lists supported and unsupported scenarios when recovering files, folders, volumes, and VHDs using ILR in a Hyper-V virtual machine. Scenario Volumes or files/folders recovery Virtual Hard Disk (VHD) recovery From a virtual machine that has snapshots Yes (Only to Windows Server 2008 R2) Yes Yes From a secondary Data Yes Protection Manager server From tape backups No Yes From NTFS volumes only Yes Not applicable From non-ntfs volumes No Entire VHD only From a VHD that is partitioned using dynamic disk partitioning No Entire VHD only Mount points cannot be traversed or browsed when exploring a VHD for item-level recovery. Item-Level Recovery of files and folders 1. In Data Protection Manager Administrator Console, click Recovery on the Actions pane. 2. Browse or search for the virtual machine name that you want to recover, and then select the item (VHD) from the Results pane. 3. Select the date from which you want to perform a recovery. Dates in bold indicate available recovery points. 4. To view the list of files and folders: a. Double-click the item (VHD) you want to recover on the Recoverable Items list. 30

31 b. Double-click the items (volumes in VHD) you want to recover on the Recoverable Items list. 5. Select the item (files and folders) you want to recover. You can select and recover multiple files/folders from the list. 6. In the Actions pane, click Recover to start the Recovery Wizard. For more information about the Recovery wizard, see Recovery Wizard ( a. Data Protection Manager saves files and folders in a custom directory structure in the following format <Recovery destination selected by user>\<vm name>_<backup Time stamp> with the exact file-system hierarchy on a protected server that has the Data Protection Manager agent installed. 31

32 Item-Level Recovery of volumes 1. In Data Protection Manager Administrator Console, click Recovery on the navigation bar. 2. Browse or search for the virtual machine name that you want to recover, and then select the item (VHD) in the Results pane. 3. Select the date from which you want to perform a recovery. Dates in bold indicate available recovery points. 4. To view the list of volumes, follow these steps: a. Double-click the item (VHD) you want to recover on the Recoverable Items pane. b. Select the item (volume in VHD) you want to recover. i. The list pane will display the volume label or Virtual Machine Volume if no volume label is available. ii. You cannot select and recover multiple volumes at the same time. 5. In the Actions pane, click Recover to start the Recovery Wizard. For more information about the Recovery wizard, see Recovery Wizard ( Item-Level Recovery of VHDs 1. In Data Protection Manager Administrator Console, click Recovery on the navigation bar. 2. Browse or search for the virtual machine name that you want to recover, and then select the item (VHD) in the Results pane. 3. Select the date from which you want to perform a recovery. a. Dates in bold indicate available recovery points. 4. On the Recoverable Items pane, select the item (VHD file) you want to recover. a. The path of the VHD file on the protected server is displayed in the Recoverable Item pane 32

33 b. During recovery, you cannot select multiple VHDs. 5. In the Actions pane, click Recover to start the Recovery Wizard. For more information about the Recovery wizard, see Recovery Wizard ( Note: When you are recovering a VHD of a virtual machine that has Hyper-V snapshots, archive virtual hard disk (AVHD) files will not be displayed in the Recoverable Items pane, but Data Protection Manager will recover the parent VHD and all the associated AVHD files. Data Protection Manager saves VHDs in a custom directory structure of the format DPM_<backuptime>\DPM_Recovered_At_<RecoveryTime>\<Path of the VHD on the protected server> with the exact file-system hierarchy on a protected server that has Data Protection Manager agent installed. Troubleshooting Hyper-V Item-Level Recovery The following table provides guidance for troubleshooting issues that may occur when you during item-level recovery (ILR): Issue Possible Cause Resolution Alert ID: VHD parent locator fixup fails (3130) See the Alert Details pane for more information about the cause of this alert. Possible causes include: The Hyper-V role is not installed in the Data Protection Manager server. A Windows Management Instrumentation (WMI) call to fix the parent locator of the VHD has failed. The error conditions and recommended actions associated with the VHD parent locator fixup fails alert are provided in the alert details. You can recover a VHD and a virtual machine. However you cannot recover volume, files, or folders. Follow the recommended action in the alert to retry the job. Note: No action is required if you are not performing an ILR using the existing recovery point. 33

34 To resolve this alert: 1. Install the Hyper-V role on the Data Protection Manager server. 2. Create a new recovery point. 34

35 2010 Microsoft Corporation. All rights reserved. MICROSOFT CONFIDENTIAL. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and is subject to change at any time without notice to you. This document and its contents are provided AS IS without warranty of any kind, and should not be interpreted as an offer or commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented. The information in this document represents the current view of Microsoft on the content. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. The descriptions of other companies products in this document, if any, are provided only as a convenience to you. Any such references should not be considered an endorsement or support by Microsoft. Microsoft cannot guarantee their accuracy, and the products may change over time. Also, the descriptions are intended as brief highlights to aid understanding, rather than as thorough coverage. For authoritative descriptions of these products, please consult their respective manufacturers. 35

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012

Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 coursemonster.com/me Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 View training dates» Overview Elements of this syllabus may be subject to change

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

Administration Guide - Virtual Server idataagent (Microsoft Hyper-V)

Administration Guide - Virtual Server idataagent (Microsoft Hyper-V) Page 1 of 83 Administration Guide - Virtual Server idataagent (Microsoft Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine

More information

Windows Server8 2008. R2 Hyper-V. Microsoft's Hypervisor. Insiders Guide to. Wiley Publishing, Inc. John Kelbley. Mike Sterling WILEY

Windows Server8 2008. R2 Hyper-V. Microsoft's Hypervisor. Insiders Guide to. Wiley Publishing, Inc. John Kelbley. Mike Sterling WILEY Windows Server8 2008 R2 Hyper-V Insiders Guide to Microsoft's Hypervisor John Kelbley Mike Sterling WILEY Wiley Publishing, Inc. Contents Introduction xix Chapter l Introducing Hyper-V l Scenarios for

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3

More information

Protecting Miscrosoft Hyper-V Environments

Protecting Miscrosoft Hyper-V Environments Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

Hyper-V backup implementation guide

Hyper-V backup implementation guide Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Backup Exec 12.5 Agent for Microsoft Virtual Servers FAQ

Backup Exec 12.5 Agent for Microsoft Virtual Servers FAQ Backup Exec 12.5 Agent for Microsoft Virtual Servers FAQ Contents Overview... 1 Supported Configurations... 3 Backup... 5 Database and Application Protection... 7 Virtual Machine Recovery... 8 Licensing...

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

Introduction to Hyper-V High- Availability with Failover Clustering

Introduction to Hyper-V High- Availability with Failover Clustering Introduction to Hyper-V High- Availability with Failover Clustering Lab Guide This lab is for anyone who wants to learn about Windows Server 2012 R2 Failover Clustering, focusing on configuration for Hyper-V

More information

Integrating Data Protection Manager with StorTrends itx

Integrating Data Protection Manager with StorTrends itx Integrating Data Protection Manager with StorTrends itx INTEGRATING DATA PROTECTION MANAGER WITH STORTRENDS ITX 2 1. Introduction 2 2. Test Environment 2 Requirements 2 3. Setting up the Application Servers

More information

Release Notes. LiveVault. Contents. Version 7.65. Revision 0

Release Notes. LiveVault. Contents. Version 7.65. Revision 0 R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation

More information

Backup Exec 15: Protecting Microsoft Hyper-V

Backup Exec 15: Protecting Microsoft Hyper-V TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED

More information

BackupAssist v5 vs. v6

BackupAssist v5 vs. v6 COMPARISON www.backupassist.com 2 What s new in BackupAssist version 6? There are three main reasons why you should upgrade to BackupAssist v6: 1. To keep up with the latest best practice backup standards

More information

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

1. Introduction... 2. 2. About the BackupAssist Hyper-V solution... 2. Advantages... 2. Features... 2. Granular technology... 2

1. Introduction... 2. 2. About the BackupAssist Hyper-V solution... 2. Advantages... 2. Features... 2. Granular technology... 2 Contents 1. Introduction... 2 2. About the BackupAssist Hyper-V solution... 2 Advantages... 2 Features... 2 Granular technology... 2 The BackupAssist VM Granular Restore Console... 2 Limitations and requirements...

More information

EMC VIPR SRM: VAPP BACKUP AND RESTORE USING EMC NETWORKER

EMC VIPR SRM: VAPP BACKUP AND RESTORE USING EMC NETWORKER EMC VIPR SRM: VAPP BACKUP AND RESTORE USING EMC NETWORKER ABSTRACT This white paper provides a working example of how to back up and restore an EMC ViPR SRM vapp using EMC NetWorker. October 2015 WHITE

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 8.2 Service Pack 1 User Guide 302-001-235 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published

More information

Virtualizing your Datacenter

Virtualizing your Datacenter Virtualizing your Datacenter with Windows Server 2012 R2 & System Center 2012 R2 Part 2 Hands-On Lab Step-by-Step Guide For the VMs the following credentials: Username: Contoso\Administrator Password:

More information

Symantec NetBackup Blueprints

Symantec NetBackup Blueprints Symantec NetBackup Blueprints Blueprint for Microsoft Hyper-V Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This

More information

EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02

EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02 EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Altaro Hyper-V Backup V4 - User Guide

Altaro Hyper-V Backup V4 - User Guide Altaro Hyper-V Backup V4 - User Guide 1 / 161 Table of contents Introducing Altaro Hyper-V Backup... 5 Roles... 6 Sample Scenario... 7 Different Editions... 9 Getting Started... 11 System requirements...

More information

System Protection for Hyper-V User Guide

System Protection for Hyper-V User Guide User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Backup Manager Configuration and Deployment Guide. Version 9.1

Backup Manager Configuration and Deployment Guide. Version 9.1 Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring

More information

User Guide - Exchange Public Folder idataagent

User Guide - Exchange Public Folder idataagent Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT

More information

How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook

How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Compellent Storage Center

Compellent Storage Center Compellent Storage Center SAN-Based Backup and Recovery with Microsoft Data Protection Manager (2007/2010) and Compellent Storage Center Compellent Corporate Office Compellent Technologies 7625 Smetana

More information

Quick Start - Virtual Server idataagent (VMware)

Quick Start - Virtual Server idataagent (VMware) Page 1 of 24 Quick Start - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data Minimal

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 8.2 User Guide P/N 302-000-658 REV 01 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the USA.

More information

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009 Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X

How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT Page 1 of 44 Quick Start - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications

More information

Microsoft Corporation. Project Server 2010 Installation Guide

Microsoft Corporation. Project Server 2010 Installation Guide Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups

More information

Altaro Hyper-V Backup V4 - User Manual

Altaro Hyper-V Backup V4 - User Manual Altaro Hyper-V Backup V4 - User Manual 2009 2013 Altaro, Ltd. All Rights Reserved Table of contents Introducing Altaro Hyper-V Backup... 5 Add-Ons... 6 Sample Scenario... 7 Different Editions... 9 Getting

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS - EXCHANGE

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 9.0 User Guide 302-001-755 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published

More information

Symantec NetBackup for Hyper-V Administrator's Guide. Release 7.6

Symantec NetBackup for Hyper-V Administrator's Guide. Release 7.6 Symantec NetBackup for Hyper-V Administrator's Guide Release 7.6 Symantec NetBackup for Hyper-V Guide The software described in this book is furnished under a license agreement and may be used only in

More information

How To Use A Microsoft Networker Module For Windows 8.2.2 (Windows) And Windows 8 (Windows 8) (Windows 7) (For Windows) (Powerbook) (Msa) (Program) (Network

How To Use A Microsoft Networker Module For Windows 8.2.2 (Windows) And Windows 8 (Windows 8) (Windows 7) (For Windows) (Powerbook) (Msa) (Program) (Network EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A03 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Veeam Backup & Replication

Veeam Backup & Replication Veeam Backup & Replication Version 7.0 Evaluator s Guide Hyper-V Environments August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part

More information

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1 Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...

More information

Technical Notes. EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution

Technical Notes. EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution Release number 9.0 TECHNICAL NOTES 302-001-760 REV 01 September, 2015 These technical

More information

ArCycle vmbackup. for VMware/Hyper-V. User Guide

ArCycle vmbackup. for VMware/Hyper-V. User Guide ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015 Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

User Guide - Exchange Mailbox Archiver Agent

User Guide - Exchange Mailbox Archiver Agent Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Administration GUIDE. SQL Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 240

Administration GUIDE. SQL Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 240 Administration GUIDE SQL Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 240 User Guide - SQL Server idataagent Table of Contents Overview System Requirements Supported Features

More information

Administration Guide - OnePass Agent for Windows File System

Administration Guide - OnePass Agent for Windows File System Page 1 of 44 Administration Guide - OnePass Agent for Windows File System TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

EMC NetWorker Module for Microsoft for Hyper-V VSS

EMC NetWorker Module for Microsoft for Hyper-V VSS EMC NetWorker Module for Microsoft for Hyper-V VSS Version 8.2 Service Pack 1 User Guide 302-001-234 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published January,

More information

BACKING-UP HYPER-V VIRTUAL MACHINES WITH VICEVERSA PRO

BACKING-UP HYPER-V VIRTUAL MACHINES WITH VICEVERSA PRO BACKING-UP HYPER-V VIRTUAL MACHINES WITH VICEVERSA PRO ViceVersa PRO can backup Hyper-V virtual machines using the new Windows Hyper-V Volume Shadow Copy Service (VSS) Writer. There are two basic methods

More information

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Vembu VMBackup v3.1.0 BETA

Vembu VMBackup v3.1.0 BETA Vembu VMBackup v3.1.0 BETA Release Notes With enhanced features and fixes boosting stability and performance, Vembu VMBackup v3.1.0 BETA is now available for user evaluation. The all in one Vembu VMBackup

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Symantec NetBackup for Hyper-V Administrator's Guide. Release 7.5

Symantec NetBackup for Hyper-V Administrator's Guide. Release 7.5 Symantec NetBackup for Hyper-V Administrator's Guide Release 7.5 21220062 Symantec NetBackup for Hyper-V Guide The software described in this book is furnished under a license agreement and may be used

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

VMware Data Recovery. Administrator's Guide EN-000193-00

VMware Data Recovery. Administrator's Guide EN-000193-00 Administrator's Guide EN-000193-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone

More information

A review of BackupAssist within a Hyper-V Environment. By Brien Posey

A review of BackupAssist within a Hyper-V Environment. By Brien Posey A review of BackupAssist within a Hyper-V Environment By Brien Posey 2 Contents Introduction... 3 An Introduction to BackupAssist... 4 Testing Methodologies... 5 Test 1: Restore a Virtual Machine s Configuration...

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Exchange Granular Restore User Guide

Exchange Granular Restore User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Exchange VM Detection... 3 VSS Application backups... 3 Restore vs. Recovery... 3 Backup user identity... 3 3. Creating an Exchange backup...

More information

Restore Tab. User Guide

Restore Tab. User Guide Restore Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Tools menu... 3 3. Home page... 4 Selection screen... 4 Selection results screen... 5 Available backups...

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider System Configuration Guide November 2009 Fujitsu Limited Table of Contents 1. Executive Summary...

More information

AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE

AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE Copyright This document is provided "as-is." Information and views expressed in this document, including

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Symantec Backup Exec 2014 Icon List

Symantec Backup Exec 2014 Icon List Symantec Backup Exec 2014 Icon List Alerts Image Description Alert needs attention Alerts Alert needs attention Alert needs attention Alert needs attention Error Error Error Error Informational alert Informational

More information

SharePoint Server for Business Intelligence

SharePoint Server for Business Intelligence SharePoint Server for Business Intelligence SharePoint Business Intelligence Content Team Summary: Step-by-step, learn how to install and configure SharePoint Server 2010 and SQL Server 2008 to create

More information

A review of BackupAssist within a Hyper-V Environment

A review of BackupAssist within a Hyper-V Environment A review of BackupAssist within a Hyper-V Environment By Brien Posey Contents Introduction... 2 An Introduction to BackupAssist... 3 Testing Methodologies... 4 Test 1: Restore a Virtual Machine s Configuration...

More information

TABLE OF CONTENTS. User Guide - Windows File System idataagent. Page 1 of 379 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

TABLE OF CONTENTS. User Guide - Windows File System idataagent. Page 1 of 379 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT Page 1 of 379 User Guide - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications

More information

Backup Exec 15: Administration

Backup Exec 15: Administration Course Code: VERIDP0137 Vendor: Veritas Course Overview Duration: 5 RRP: 2,540 Backup Exec 15: Administration Overview The Symantec Backup Exec 15: Administration course is designed for the data protection

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Trial environment setup. Exchange Server Archiver - 3.0

Trial environment setup. Exchange Server Archiver - 3.0 Trial environment setup Exchange Server Archiver - 3.0 Introduction This document describes how you can set up a trial environment for using Exchange Server Archiver with Exchange Server 2007. You do not

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information