Information Technology Reference
In-Depth Information
9. Complete the wizard to finish creating the new protection group. Figure 5-59 shows
the protection group that protects the online VM with an OK protection state.
FIGURE 5-59 Protection workspace
MORE INFO DPM PROTECTION GROUPS
You can learn more about configuring DPM protection groups at http://technet.microsoft.
com/en-us/library/jj628070.aspx .
Performing recovery
You can use DPM to recover data from any available recovery point. A recovery point, also
termed a backup snapshot, is a consistent point-in-time copy of a DPM-protected item, be
that a file, folder, database, virtual machine, or an entire computer. The type of data be-
ing protected determines your options when it comes to performing recovery. For example,
you can recover a SQL Server database to another SQL Server as long as the destination SQL
Server has the DPM agent installed. Similarly, you can recover Exchange mailbox databases
or Hyper-V virtual machines if they are properly protected to a separate host, as long as the
destination host is running the same version of Exchange, SQL, or Hyper-V, and has the DPM
agent installed. You also have the option of performing recovery to an alternate location. For
 
 
Search WWH ::




Custom Search