EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM



Similar documents
EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In

MS Exchange Server backup with eazybackup

BackupAssist v6 quickstart guide

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

Protecting Exchange 2010

EVault Software. Course 361 Protecting Linux and UNIX with EVault

BackupAssist v6 quickstart guide

Exchange Server Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore

MS Exchange Server backup with BackupAgent

MS Exchange Server backup with BackupAgent

EVault Software. Course 301 Server Protection with EVault File and System State

How To Backup An Entire Database With A Microsoft Sql Server On A Pcode (Windows) (Windows Xp) 2 (Windows 2000) 2-Year Old (Windows 2) 2Nd Generation (Windows 1

Integrating Data Protection Manager with StorTrends itx

Microsoft Office 365 online archive features and FAQs

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

Hosting Users Guide 2011

How To Install The Exchange Idataagent On A Windows (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X

Moving the TRITON Reporting Databases

Hyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010

Microsoft System Center: MS Data Protection 2007 Center Protection Manager Implementing 2012

User Guide - Exchange Public Folder idataagent

Installation and User Guide for Partners and Businesses

SQL Server Protection

Exchange Mailbox Protection Whitepaper

SQL Server Protection. User guide

Table of Contents. CHAPTER 1 About This Guide CHAPTER 2 Introduction CHAPTER 3 Database Backup and Restoration... 15

Support Document: Microsoft SQL Server - LiveVault 7.6X

Moving the Web Security Log Database

System Protection for Hyper-V Whitepaper

Technical Note P/N REV A02 May 07, 2010

How To Manage Your On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook

Exchange Granular Restore User Guide

COOK COUNTY OFFICE 365 MIGRATION USER GUIDE

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

SQL Server Protection Whitepaper

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack REV 01. January, 2015

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Lenovo Online Data Backup User Guide Version

ArCycle vmbackup. for VMware/Hyper-V. User Guide

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

Exchange 2013 mailbox setup guide

3 Setting up Databases on a Microsoft SQL 7.0 Server

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

GREEN HOUSE DATA. Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

Backup and Disaster Recovery Restoration Guide

BSDI Advanced Fitness & Wellness Software

4cast Client Specification and Installation

Hyper-V Protection. User guide

Colligo Manager 6.0. Connected Mode - User Guide

User Guide - Exchange Mailbox Archiver Agent

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Amicus Link Guide: Outlook/Exchange

NSi Mobile Installation Guide. Version 6.2

User Guide. Please visit the Helpdesk website for more information:

How To Restore Your From Backup On An Exchange Service Pack 1 On A Windows (Windows 7) On A Microsoft Powerbook (Windows) On An Ubuntu 2003 Power

Acronis Backup & Recovery 11

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE

Archiving - Outlook 2003

Technical Note P/N REV A05 September 20, 2010

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases

User Guide. CTERA Agent. August 2011 Version 3.0

Colligo Manager 5.1. User Guide

Colligo Manager 6.0. Offline Mode - User Guide

How to protect, restore and recover Exchange 2003 and Exchange 2007 databases

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Exchange Mailbox Protection

CTERA Agent for Windows

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

EMC NetWorker Module for Microsoft for Exchange Server VSS

Microsoft Outlook Setup With Exchange Server. Outlook

Exchange Granular Restore. User Guide

Using Virtual Drive for Exchange mailbox restore

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider

Outlook . Step 1: Open and Configure Outlook

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling

Exchange Granular Restore Instructional User Guide

BackupAssist Restore Console

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC , revision 2.029, May 2012.

Server Installation: ServerTools

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Hyper-V Protection. User guide

GO!NotifyLink. Database Maintenance. GO!NotifyLink Database Maintenance 1

Protecting SQL Server Databases Software Pursuits, Inc.

Kaspersky Lab Mobile Device Management Deployment Guide

Online Backup Client 3.9 Manual

RoomWizard Synchronization Software Manual Installation Instructions

Trial environment setup. Exchange Server Archiver - 3.0

User Guide - Exchange Database idataagent

Cisco TelePresence Management Suite Extension for Microsoft Exchange

educ Office Remove & create new Outlook profile

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

Online Backup Client User Manual Windows

Transcription:

EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM

Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing Windows Server Backup on Exchange Server... 4 Exercise 2 Installing DPM Agent on Exchange Server... 4 Exercise 3 For this Lab Only Create sample data... 6 Exercise 4 Creating an Exchange Protection Group... 8 Exercise 5 For this Lab Only Modify Mailbox Data... 14 Exercise 6 Creating a Recovery Database (Exchange 2010)... 14 Exercise 7 Recovering a Mailbox to a Recovery Database with DPM... 15 Exercise 8 Recovering a Mailbox using a Recovery Database... 16 Exercise 9 Recovering an Exchange Database with DPM Prep Exchange... 16 Exercise 10 Recovering an Exchange Database with DPM Performing Restore in DPM... 17 Conclusion... 18 2 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Objectives The purpose of this lab is to provide instructions on how to protect and restore Exchange 2010 mail data. All Protection Groups that are created in this lab only focus on Exchange application data (Databases). Normally you would need to protect all file data and system state data to protect this system from disaster. This is covered in Lab 201 Protecting File Data, System State, and Bare-Metal Recovery. Scenario Estimated Time to Complete This Lab We ll go through the process of installing Windows Server Backup feature, pushing the Agent out to the Exchange server, create a sample mailbox and email, create a Protection Group, delete some email, and then restore the email. 60 Minutes Requirements for This Lab IMPORTANT Windows Server Backup Feature must be installed on the Exchange server in order to allow for the required vss backups. This is a requirement for any Server 2008 machine. Exchange Server is joined to our domain Exchange Server is running on Server 2008 x64 On your productions machines, we recommend that all Windows Updates have been applied Computers Used in This Lab EDPM DC01 BAV1 EXCH01 3 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Exercise 1 Installing Windows Server Backup on Exchange Server In this lab, we ll install the Windows Server Backup feature onto our Exchange server. This is a requirement to enable backups on Server 2008. Windows Server Backup is the replacement of its predecessor, ntbackup. 1. Initial Logon EXCH01 2. Adding Windows Server Backup Feature a. Once the lab starts, within Surgient, click on the EXCH01_Server and choose RDP. b. Click the Start menu, right-click Computer, and choose Manage. c. In the Server Manager window, on the left-hand pane, click Features. d. On the right-hand pane, click Add Features. a. On the Add Features Wizard screen, check Windows Server Backup Features and expands its tree. b. Also check Command-line Tools. Now all of Windows Server Backup Features should have tick boxes next to them. c. Click Next >. d. On the Confirmation screen, click Install. e. Installation will take a minute or so. After which the Results screen should state that Installation succeeded. Click Close. Exercise 2 Installing DPM Agent on Exchange Server In this step, we will push the DPM Agent to an Exchange 2010 server that we wish to protect. This will allow us to further configure the protection of our Exchange server through DPM. 1. Switch Machines EDPM 2. DPM 2010 Administrator Console 3. Agent Installation Wizard a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. On the Desktop, open Microsoft System Center Data Protection Manager 2010. b. Within the DPM 2010 Administrator Console, click the Management tab. c. On this tab, click the Agents tab. d. Under Selected Items, click Install a. On the Select Agent Deployment Method, we ll choose Install agents. Choose Install Agent option if the server you intend to protect is part of the domain and not behind a firewall. Otherwise you would choose to manually install the Agent and then Attach agents. Attach agents is a method that can always be used to troubleshoot agent installation issues. 4 EVault for Data Protection Manager - 2010 i365, A Seagate Company

b. Click Next. c. Select EXCH01, and click Add >. d. Click Next >. e. We need to specify a user with Administrator privileges. This is because the user the backup uses this user to perform backups. User name: Administrator Password: I365password Domain: TrainingLab.com f. Click Next >. g. On the Choose Restart Method screen, we ll choose No. I will restart the selected computer later. This way, you can restart the server during off hours. h. Click Next >. i. On the Summary screen, click Install. j. DPM will now push the DPM Agent to the Exchange Server. Once it completes. Click Close. 5 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Exercise 3 For this Lab Only Create sample data In the next steps, we ll create some sample data to protect. In your production environment you would not normally follow these steps as you ll already have some Exchange data with your own proprietary data. 1. Switch Machines EXCH01 2. Exchange Management Console 3. Creating a Sample Mailbox 4. Populate Mailbox with Sample Emails through OWA b. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the Exchange server. b. In the Start menu, open Exchange Management Console. This is the management interface for Exchange where you can create and manage mailboxes. a. On the left-hand pane, click Microsoft Exchange On-Premises (exch01.traininglab.com). b. In the middle pane, you ll see the status say unavailable but then it will update with the number of databases and such. Click Manage databases. c. On the left-hand pane, expand Recipient Configuration. d. On the left-hand pane, highlight Mailbox, and on the right-hand pane choose New Mailbox a. On the Introduction section, choose User Mailbox and click Next >. b. On the User Type section, choose New user and select Next >. c. On the User Information section (any fields I don t specify, don t change) First name: Bob Last name: Jones User logon name (User Principal Name): Bob Password and Confirm Password: I365password Click Next > d. On the Mailbox Settings section, for the Alias, type Bob and click Next >. e. On the Archive Settings section, click Next >. f. On the New Mailbox section, click New. g. On the Completion section, click Finish. a. In the Start menu, open Internet Explorer (64-bit). b. In Internet Explorer s address bar, type https://localhost/owa. Otherwise, I ve made a favorite in the Favorite Bar. c. Because Outlook Web App (OWA) is intended to be protected via SSL (https), you will receive a message: There is a problem with this website s security certificate because I did apply a certificate to the installation. d. Click Continue to this website (not recommended). e. In Outlook Web App Domain\user name: TrainingLab\Bob Password: I365password Click Sign in You ll be prompted for Language and Time zone, click OK. f. For the sample emails, you ll be composing three new emails to yourself In OWA, click New. You ll get another message regarding There is a 6 EVault for Data Protection Manager - 2010 i365, A Seagate Company

problem with this website s security certificate. Click Continue to this website (not recommended). i. In the To field, type Bob. ii. Type whatever you want for the Subject and Body of the message. iii. Click Send. iv. Repeat so that you have a total of 3 emails in your Inbox. You might need to refresh your Inbox to see these. 7 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Exercise 4 Creating an Exchange Protection Group In this section, you ll learn how to protect your newly created Exchange data by creating a Protection Group within DPM. Exchange data can be backed up and recoverable within as little as 15 minute intervals. In this example, we ll just protect the Exchange databases. We typically recommend protecting the file data with a different protection group policy. This is because file data doesn t typically need to be protected on a 15 minute interval. Most users are more concerned about they re highly active data such as databases. 1. Switch Machines EDPM 2. DPM 2010 Administrator Console 3. Protection group wizard a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect back to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. Within the DPM 2010 Administrator Console, click the Protection tab. b. This is where we ll be creating a Protection Group. A Protection Group is a set of rules that can be applied to one or many servers. It s within this group that we can define schedules, retention, synchronization frequency, and various backup policies. Users might put several similar servers in a protection group so that they have similar policies. c. Under Selected Items, click Create Protection Group a. On the Welcome to the New Protection Group Wizard choose Next >. b. On the Select Protection Group Type screen, select Servers and choose Next >. 8 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Server Agents Includes server class operating systems such as Windows 2003 and 2008 along with application specific integration. File Data Allows for protection of file level data such as entire volumes on a system, individual files and folders, shares presented or even system state backups. Server 2008 also allows for possible additional recoverability by providing options to do Bare Metal Recovery. Application Data Allows for protection of application data such as SQL, Exchange, SharePoint, and Hyper-V data. Integration allows for seamless hot backups of these applications. Client Agents Allows for protection of workstation operating systems such as Windows XP, Vista, and Windows 7 c. On the Select Group Members screen, expand EXCH01. This will take a minute for DPM to collect EXCH01 s information. d. Check Exchange 2010 Databases. You ll notice that if you expand this field, you ll see both the Mailbox databases and Public Folder databases can be backed up, and these have been included in our Protection Set. e. Click Next >. f. On the Select Data Protection Method screen, we need to name our Protection Group. In this case name it, Exchange Servers. For short-term protection, we ll use Disk. Notice that long-term protection options is greyed out. This is because we do not have a tape library attached for long-term protection. Click Next >. g. On the Specify Exchange Protection Options screen, you have options to use ESEUTIL to check the integrity of your data. Click Next >. 9 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Enabling ESEUTIL Before you continue, you should know that ESEUTIL and the supporting DLL file are not automatically installed on the DPM 2010 server. Using ESEUTIL on the DPM server is recommended, but this will require you to install Exchange Management Tools on your DPM 2010 server. Note: The version of ESEUTIL that you deploy must match the highest version of Exchange Server that's deployed on your network. Keep in mind that ESEUTIL is updated with each service pack. Therefore, if the highest version of Exchange running on your network is Exchange Server 2003 SP2, you'll need to install the SP2 version of the Exchange Server 2003 management tools. This is also true with Exchange Server 2007, which is a 64-bit application. You must use the version that corresponds to the highest version of Exchange installed on your network. It's also important to remember that Exchange Management Tools must be kept current. If you install a new service pack for Exchange Server at a later date, you have to update the management tools on DPM 2007. After you've installed the Exchange Server Management Tools, copy the ESE.dll and ESEUTIL.exe files from c:\program Files\Microsoft\Exchange Server\Bin to c:\program Files\Microsoft DPM\DPM\bin\ h. On the Specify Exchange DAG protection screen, we will want to leave the defaults (Full Backups) because our Exchange environment is not setup in a Database Availability Group. Click Next >. i. We re now on the Specify Short-Term Goals screen. This is where we setup retentions and backup frequency. 10 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Retention Range This defines how many days back you can restore your data. Synchronization Frequency With application data such as SQL and Exchange, a synchronization with send over just transaction logs for SQL or Exchange to the DPM server. For application data, Synchronizations will create Recovery Points after each completion. This can happen in intervals as little as every 15 minutes. When scheduling a short frequency, you need to consider how much change is occurring on the application server and the bandwidth between the Agent and DPM server. If synchronizes are not completing in the 15 minute window, you can modify the synchronization rate to a longer window like every hour or every 2 hours. Initial Replica With application data, this will send over the entire database to the DPM server. With SQL, it will send over the mdf and ldf files. For Exchange, it will send over the.edb,.stm, and.logs. Express Full Backup With application data on the first Express Full Backup, it will send over the changed blocks since the last Initial Replica. On subsequent Express Full Backups, the Agent will send over the changed blocks since the last Express Full Backup. Each Express Full also generates a Recovery Point. As opposed to just sending over transaction logs, Express Fulls send over changes in the database itself. Recovery Point A point in time you can restore from. For the Retention range, we ll set it to 30 days. This allows us to restore from the last 30 days. The maximum value is 64 days. The more days of retentions, the more storage you ll need. For the Synchronization frequency, we ll leave the default to Synchronize every 15 minutes. This will allow us to restore our application data within intervals of every 15 minutes. For the Express Full Backup setting, we ll leave the default to backup 8:00 PM Everyday. However, you could Modify this. The schedule should be defined when people are generally not using the system. Typically during off hours. Click Next >. j. We re now on the Review Disk Allocation screen. In the Disk apace allocation of new members section, you ll notice 11 EVault for Data Protection Manager - 2010 i365, A Seagate Company

4. Protection Status that the Total data size and Disk space allocated in DPM values might seem large. DPM performs some calculations and factors in the most possible change that can occur on your system. You can change these values so that DPM will not dedicate so much space. We ll click on Modify later, but first I want to explain the following: i. Automatically grow the volumes DPM will automatically grow your volumes if they are nearing capacity. It will grow them by 25% or 10 GBs whichever is bigger. By choosing this, you can size your volumes smaller and let DPM grow the volumes on its own. DPM can only auto grow a volume once per every 15 minute window. Click Modify so that we can resize the volume allocation. i. Replica Volume is where DPM stores the current state of the server. The smallest size is 1 GB. If your server was 10 GBs, you can set this to 10 GB. Another example is when you re protecting a folder on the C: that s 5 GBs but you re actually using 100 GBs on the C: amongst all of its folders, DPM will display the Replica Volume as 100 GBs because DPM considers that you might want to protect other data on that volume. ii. Recovery Point Volume Is where DPM stores the incremental changes between backups. The Recovery Points are played back against the Replica Volume. The more recovery points made, the larger the Recovery Point Volume. The smallest value for this is 1.56 GB. iii. Set the each of the Replica Volumes to 1 GB. iv. Set the each of the Recovery Point Volumes to 1.56 GB. v. Click OK. Click Next >. k. On the Choose Replication Creation Method screen, we ll leave the Defaults which means we ll send the Replica Now. However, normally, we recommend waiting to send the Initial Replica until after hours. During time of the Initial Replica all files selected are sent to DPM server. This will take time depending on the size of the data. We want to avoid congesting the network at peak hours. Click Next >. l. On the Consistency check options screen, we ll choose to Run a consistency check if a replica becomes inconsistent. You can schedule this, but consistency checks can take time as they do a block for block comparison of the Replica that exists on the DPM server to the production data on the Agent machine. Click Next >. m. On the Summary screen, click Create Group. n. On the Status screen, wait for all the results to state Success and click Close. a. Back in the DPM 2010 Administrator Console, notice that the Protection Group Protection Status changes from Replica creation in progress to OK. b. Once all of the databases selected in the Protection Group have an OK Protection Status, your databases have been successfully backed up. 12 EVault for Data Protection Manager - 2010 i365, A Seagate Company

c. If you wanted to check on their progress, you can always switch to the Monitoring tab. Here you can switch to the Jobs tab to get a more detailed status. The Alerts tab will show you any problems that might have occurred. 13 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Exercise 5 For this Lab Only Modify Mailbox Data In the next steps, we ll simply delete some email and add some new email. 1. Switch Machines EXCH01 2. Delete a message and create a message in OWA a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. In Outlook Web App, right-click a message (it doesn t matter which one) and choose Delete. b. In OWA, click New. You ll get another message regarding There is a problem with this website s security certificate. Click Continue to this website (not recommended). In the To field, type Bob. Type whatever you want for the Subject and Body of the message. Click Send. Exercise 6 Creating a Recovery Database (Exchange 2010) In the next steps, create a Recovery Database. DPM requires this to restore the database to temporarily. From the Recovery Database, we can merge recovered mail data back into the production mailbox. 1. Switch Machines EXCH01 2. Create a Recovery Database a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. You cannot create a recovery database using the console. You need to use Exchange Management Shell. b. In the Start menu, open Exchange Management Shell. c. The syntax to create a Recovery Database is the following: New-MailboxDatabase Recovery Name RDB Server servername EdbFilePath Path LogFolderPath path d. For our lab we ll use the following: New-MailboxDatabase Recovery Name RDB Server EXCH01 EdbFilePath C:\temp\RDB.edb LogFolderPath C:\temp\ Click Enter and you should see that the RDB database has been created. 14 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Exercise 7 Recovering a Mailbox to a Recovery Database with DPM For this exercise, we ll restore our sample mailbox to the Recovery Database. The purpose of this is that we ll be able to use Exchange tools to merge data back into our live Mailbox Database. 1. Switch Machines EDPM 2. Recovering a Database within DPM 3. Recovery Wizard a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect back to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. Within the DPM 2010 Administrator Console, click the Recovery tab. b. Expand Recoverable data\traininglab.com\exch01\all Protected Exchange Data\Mailbox Database. Here you ll see the various mailboxes that we can recover from. c. In the middle pane, we see a calendar of dates that we can choose from. Any calendar date that is in bold means that at least one Recovery Point exists on that day. d. For the Recovery Time field, use the drop-down and choose the most recent time. Choosing Latest might cause the Recovery to fail due to problems replaying Transaction Logs. e. Highlight Bob mailboxes at the bottom under Recoverable Item. f. On the right hand pane under Selected Items, choose Recover. This will spawn the Recovery Wizard. a. On the Review Recovery Selection screen, click Next >. b. On the Select recovery type screen, select Recover mailbox to an Exchange server database c. On the Specify destination screen, click Browse a. Select the EXCH01 server. b. Click OK. d. For the Database name, type RDB. This is the Recovery Database we had created earlier. e. On the Specify recovery options screen, click Next >. f. On the Summary screen, click Recover. g. On the Recovery Status screen, wait for the Recovery Status to read Successful. h. Click Close. 15 EVault for Data Protection Manager - 2010 i365, A Seagate Company

Exercise 8 Recovering a Mailbox using a Recovery Database From the restore that we just completed, we ll switch back to our Exchange server and restore data from our Recovery Database back into our live Mailbox Database. This requires the use of the Exchange Management Shell as Microsoft has removed GUI based Exchange tools to do this operation. 1. Switch Machines EXCH01 2. Restore Data from Recovery Database to Live Database 3. Check OWA to Validate a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. You cannot recover data in the console. You need to use Exchange Management Shell. b. In the Start menu, open Exchange Management Shell. c. The syntax to see the contents of a database is the following: Get-MailboxStatistics Database <RecoveryDatabaseName> d. For our lab we ll use the following: Get-MailboxStatistics Database RDB Click Enter and you should see Bob Jones listed. e. To restore a mailbox, the syntax is: Restore-Mailbox Identity <Username> -RecoveryDatabase <RecoveryDatabaseName> f. For our lab we ll use the following: Restore-Mailbox Identity Bob -RecoveryDatabase RDB Click Enter and you will be prompted to Confirm. Click Enter again. a. Internet Explorer should still be open, but if it s not please open it. b. Our login to Outlook Web App might have timed out. If it has: a. Domain\user name: TrainingLab\Bob b. Password: I365password c. Click Sign in c. You should see that you have the original messages along (including the message you had deleted) along with the new message that was added. d. If you do not see any difference, remember that DPM backs up every 15 minutes. DPM might ve backed up your addition and deletion of a message, and that might be what you re seeing. If this is the case, you ll have to repeat the steps earlier in the lab and select an earlier time of recovery. Exercise 9 Recovering an Exchange Database with DPM Prep Exchange For this exercise, we ll restore our entire Mailbox Database back to the original Exchange server. Before we initiate the restore, we need to make sure that the database can be overwritten by a restores.in the previous exercise, we only restored one mailbox. In this procedure, we re recovering the entire database. This rolls the entire database back to a point in time. You would use this method if you had a corrupted database or were recovering from a disaster. 16 EVault for Data Protection Manager - 2010 i365, A Seagate Company

1. Switch Machines EXCH01 2. Access Properties of our Mailbox Database 3. Allow Database to be Overwritten by a Restore a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. In the Start menu, open Exchange Management Console. b. It will take a minute for it to connect to our Exchange server. c. Expand Microsoft Exchange On-Premises (exch01.traininglab.com). d. Expand Organization Configuration. e. Highlight Mailbox. f. On the Database Management tab, right-click Mailbox Database and choose Properties. a. Click the Maintenance tab. b. Check This database can be overwritten by a restore. c. Click OK. Exercise 10 Recovering an Exchange Database with DPM Performing Restore in DPM For this exercise, we ll restore our entire Mailbox Database back to the original Exchange server. In the previous restore exercise, we only restored one mailbox. In this procedure, we re recovering the entire database. This rolls the entire database back to a point in time. You would use this method if you had a corrupted database or were recovering from a disaster. 1. Switch Machines EDPM 2. Recovering a Database within DPM a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect back to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. Within the DPM 2010 Administrator Console, click the Recovery tab. b. Expand Recoverable data\traininglab.com\exch01\all Protected Exchange Data. Here you ll see the various databases that we can recover from. c. In the middle pane, we see a calendar of dates that we can choose from. Any calendar date that is in bold means that at least one Recovery Point exists on that day. d. For the Recovery Time field, use the drop-down and choose the most recent time. Choosing Latest might cause the Recovery to fail due to problems replaying Transaction Logs. 17 EVault for Data Protection Manager - 2010 i365, A Seagate Company

3. Recovery Wizard e. Highlight the Mailbox Database at the bottom under Recoverable Item. f. On the right hand pane under Selected Items, choose Recover. This will spawn the Recovery Wizard. a. On the Review Recovery Selection screen, click Next >. b. On the Select recovery type screen, select Recover to original Exchange Server location and click Next >. c. On the Specify recovery options screen, we ll leave the defaults to Mount the databases after they are recovered. Click Next >. d. On the Summary screen, click Recover. e. On the Recovery Status screen, wait for the Recovery Status to read Successful. f. Click Close. Conclusion In this lab you ve learned how to not only protect Exchange but also how to restore individual mailbox data and entire Exchange databases. Please feel free to do further testing in your training lab. For further information about DPM, you can always access their Technet site at http://technet.microsoft.com/en-us/library/ff399192.aspx. If this link is broken, goto http://technet.microsoft.com, navigate to Library, System Center, and choose System Center Data Protection Manager 2010. You can always send comments and suggestions for this training module to training@i365.com or for support related issues you can contact us at support@i365.com. 18 EVault for Data Protection Manager - 2010 i365, A Seagate Company