Man made mistakes nature revenge God too...
Wednesday, June 19, 2013
Games in Games
Solitaire: Instant Win
- Press Alt + Shift + 2 to instantly win
- Hold down Ctrl + Alt + Shift then click on unopen cards to draw.
- Hold down Ctrl + Shift + F10 while playing, then click Abort.
- Now move one card.
- Go to "Game" menu choose "Select Game"
- Here you can choose from game mode 1 to 1,000,000. But -1 and -2 will also work (hidden modes)
- Warning! this requires a modification on your registry. Be sure you
follow the steps carefully. Damage your registry might damage your
Windows.
- Open the "Registry Editor" by: "Start" >> "Run" then type "regedit" and press Enter
- Expand to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts
- Right-click on the right panel and create a new String value with the name "ZB"
- Double-click to open this key "ZB" to edit its value. Then enter "42" and close the Registry Editor.
- Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards
- When you start to play a new game, the timer is ticking...
- Press Windows Key + D to show desktop.
- Now come back to the game by selecting it from the taskbar. The timer is stopped.
- Unlimited Balls: Type bmax at a new game to get unlimited balls (no notification).
- Extra Balls: Type 1max at a new game to get extra balls.
- Gravity Well: Type gmax at a new game to activate Gravity Well.
- Promotion: Type rmax at a new game or while playing to get instant promotion and raising rank.
- Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you'll get 15,000 points, 2nd: 30,000,...
- Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you'll get 15,000 points, 2nd: 30,000,...
- Test Mode: Type hidden test with a new ball or new game. Now you can use your mouse to drag and move the ball where you want.
Tuesday, June 18, 2013
Fun in Command prompt
Watch Star Wars
Every one of us has
watched Star Wars on television, computer or in a theater. It is the
same movie with aliens fighting each other for galaxies and such stuff.
There is nothing new in it. But wait, have you watched an ASCII
(American Standard Code for Information Interchange) version of Star
Wars and that too in Windows using telnet? A network protocol known only to computer wizards. Well if you have not, then you must do it now!
There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in the Windows operating system (or any OS that supports telnet). The only thing required to watch it is an internet connection; speed does not matter.
To watch it on Windows XP, Mac OS X and Linux
On Windows 8, Windows 7 and Windows Vista
Telnet is turned off by default in the latest versions of Windows. So, in order to watch star wars, you must first enable telnet by going to Control Panel › Programs › Turn Windows Feature On or Off and ticking both the telnet check boxes. After doing that, follow the steps given below:-
A command prompt window like the one in the image will open with the movie being played in it. See the movie yourself. Did you enjoy watching this new version of Star Wars? Well, I did and know it for sure that you would have too.
There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in the Windows operating system (or any OS that supports telnet). The only thing required to watch it is an internet connection; speed does not matter.
To watch it on Windows XP, Mac OS X and Linux
- Go to Start, Run. (Only for Windows users)
- Now type "telnet towel.blinkenlights.nl" without the quotes and
press Enter. Users of Mac OS X and Linux can directly execute this code
in the terminal window.
On Windows 8, Windows 7 and Windows Vista
Telnet is turned off by default in the latest versions of Windows. So, in order to watch star wars, you must first enable telnet by going to Control Panel › Programs › Turn Windows Feature On or Off and ticking both the telnet check boxes. After doing that, follow the steps given below:-
- Go to Start, Search in Windows Vista and Windows 7. On Windows 8, open the main Start page.
- Type telnet and press Enter.
- In the following command prompt window, type "o" without quotes and press Enter.
- Now type "towel.blinkenlights.nl" without the quotes and press Enter.
A command prompt window like the one in the image will open with the movie being played in it. See the movie yourself. Did you enjoy watching this new version of Star Wars? Well, I did and know it for sure that you would have too.
Know if someone is hacking your computer/ Trace a Hacker
These tricks work on Windows 8, Windows 7, Windows Vista, Windows XP and all previous versions of Windows.
Fun with Notepad
Notepad tricks for Windows
Notepad, the text editor that comes bundled in Windows is an excellent tool for text editing. But that is not the only thing for which notepad is famous. It is also famous for its tricks and hacks. Here is a roundup of some of the best and coolest tricks that you can try using Notepad.Matrix Falling Code Effect - Notepad CMD (.BAT) Tricks
Inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites. Copy and paste the code given below in Notepad and save the file as "Matrix.bat" or *.bat.@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks
Matrix Falling Code Effect - Notepad Trick |
Upon running the bat file, you will see the "Matrix falling code" effect.
Make Your Keyboard Type (Any) Message Continuously-VBS Trick
This VBS trick can make any of your friend's keyboard type any message continuously. Open Notepad, copy the code given below and save the file as Tricks.vbs or *.vbs. You will need to restart your computer to stop this. Try this after closing all important programs.Set wshShell = wscript.CreateObject("WScript.Shell")Send this file to your friends as an email attachment to see the fun.
do
wscript.sleep 100
wshshell.sendkeys "This is a Virus. You have been infected."
loop
Create a Harmless Funny Virus with Notepad-Continuously eject CD/DVD drives
This VBS trick will create a code which will continuously eject all your connected Optical drives. If you put them back in, it will pop them out again. Copy this code and paste it in Notepad as Virus.vbs or *.vbs.Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Double click to open this file and you will be impressed by this awesome trick.
Make a Personal Diary(Log) with Notepad (Easter Eggs)
Notepad Diary |
All these Notepad tricks are totally harmless and would not harm your PC in any way. To close any of the VBS trick given, open task manager and close the wscript.exe process. These tricks work on Windows 8, Windows 7, Windows Vista and Windows XP.
ஒளிரும் கணணி விசைப்பலகை (Keybord)
Disco light on the keyboard
Keyboards usually
have small LEDs which indicate whether different types of locks are
activated or not. Here is a trick to use the lights of your keyboard in a
more creative manner in Windows.
This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard.
To make your own live disco, follow the steps given below:-
1. Open Notepad.
2. Copy paste the exact code given below:-
Double click on the Saved file to see the LED lights on your keyboard go crazy and make your own cool disco.
This trick has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8 and found to be working perfectly.
You can disable the keyboard disco by starting Task Manager and ending the wscript.exe process.
This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard.
To make your own live disco, follow the steps given below:-
1. Open Notepad.
2. Copy paste the exact code given below:-
Set wshShell =wscript.CreateObject("WScript.Shell")3. Save the file as Disco.vbs or "*.vbs".
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
Double click on the Saved file to see the LED lights on your keyboard go crazy and make your own cool disco.
This trick has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8 and found to be working perfectly.
You can disable the keyboard disco by starting Task Manager and ending the wscript.exe process.
உங்கள் கணணி ஆணா பெண்ணா?
Husky male voice, sensual female tone, or childish? You find out.
Open notepad, type bellow line
CreateObject("SAPI.SpVoice").Speak "hear my voice to find my gender"
Save as visualbasic script (.vbs instead of .txt or .doc). Example gender.vbs
Run the script
Another way
Now your Computer will speak / talk what you typed in Step 4. Try it yourself.
Here is what You need to do.
Step 1: Open Notepad and Copy paste the Below code.
CreateObject("SAPI.SpVoice").Speak"I am a Computer Freak"
Step 2 : Now click on File and save it As Computergender.vbs.
Step 3: Thats it, now Double click on That saved file and boom, you will hear a voice saying "I am a Computer Freak"
If you hear a Male voice Then you computer is a Male, And if you hear a Female voice then Your Pc is Female.
isn't it a funny Trick. Try it - See more at: http://www.geekofreak.com/2013/02/find-your-computers-gender.html#sthash.FwHue1Uc.dpufHusky male voice, sensual female tone, or childish pitch? You find out.
Open notepad, or whatever document type program you use.
Input:
CreateObject("SAPI.SpVoice").Speak "I love you"
(You may replace I love you with any other excerpt you wish to hear)
Save as visualbasic script (.vbs instead of .txt or .doc).
Run the script
Open notepad, type bellow line
CreateObject("SAPI.SpVoice").Speak "hear my voice to find my gender"
Save as visualbasic script (.vbs instead of .txt or .doc). Example gender.vbs
Run the script
Another way
- Open Notepad.
- Copy and paste the exact code given below.
Dim Message, Speak
Message=InputBox("Enter text","Speak")
Set Speak=CreateObject("sapi.spvoice")
Speak.Speak Message
3. Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Speak.vbs or "*.vbs".
4. Double click on the saved file, a window will open like the one in
the image. Enter some text in enter text column and click OK.
Its a Funny Trick and easy too. so you Will definately Try it.
Here is what You need to do.
Step 1: Open Notepad and Copy paste the Below code.
CreateObject("SAPI.SpVoice").Speak"I am a Computer Freak"
Step 2 : Now click on File and save it As Computergender.vbs.
Step 3: Thats it, now Double click on That saved file and boom, you will hear a voice saying "I am a Computer Freak"
If you hear a Male voice Then you computer is a Male, And if you hear a Female voice then Your Pc is Female. - See more at: http://www.geekofreak.com/2013/02/find-your-computers-gender.html#sthash.MZUT2lUC.dpuf
Its a Funny Trick and easy too. so you Will definately Try it.Here is what You need to do.
Step 1: Open Notepad and Copy paste the Below code.
CreateObject("SAPI.SpVoice").Speak"I am a Computer Freak"
Step 2 : Now click on File and save it As Computergender.vbs.
Step 3: Thats it, now Double click on That saved file and boom, you will hear a voice saying "I am a Computer Freak"
If you hear a Male voice Then you computer is a Male, And if you hear a Female voice then Your Pc is Female. - See more at: http://www.geekofreak.com/2013/02/find-your-computers-gender.html#sthash.MZUT2lUC.dpuf
Here is what You need to do.
Step 1: Open Notepad and Copy paste the Below code.
CreateObject("SAPI.SpVoice").Speak"I am a Computer Freak"
Step 2 : Now click on File and save it As Computergender.vbs.
Step 3: Thats it, now Double click on That saved file and boom, you will hear a voice saying "I am a Computer Freak"
If you hear a Male voice Then you computer is a Male, And if you hear a Female voice then Your Pc is Female.
isn't it a funny Trick. Try it - See more at: http://www.geekofreak.com/2013/02/find-your-computers-gender.html#sthash.FwHue1Uc.dpufHusky male voice, sensual female tone, or childish pitch? You find out.
Open notepad, or whatever document type program you use.
Input:
CreateObject("SAPI.SpVoice").Speak "I love you"
(You may replace I love you with any other excerpt you wish to hear)
Save as visualbasic script (.vbs instead of .txt or .doc).
Run the script
எப்படி கணனியில் பெயரில்லா கோப்புகளை உருவாக்குதல்?
Create Folder Without Name
How to Create a Nameless Folder Computer Tricks
How to Create a Nameless Folder Computer Tricks
Before attempting this trick, try to make a folder with no name
and you will fail to do so. This is what this trick will let you do.
- Make a Newfolder on desktop or where ever you want.
- Right click on this newly created folder and select Rename.
- Erase the text showing “New Folder”.
- Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
- After that leave alt key and Press enter.
- Done you just created nameless folder.
பனிப்புகை உண்ணும் ஓடுகள்
BoralPure Smog-Eating Tile
Using some creative chemistry, Boral Roofing has turned a standard building material into a formidable weapon—not just against sun and rain, but also air pollution. The tile's coating contains TiO2 (titanium dioxide), which reacts with and neutralizes NOX (nitrogen oxide) particles in smog. The byproduct is a harmless precipitate that accumulates on the roof and washes away in the rain. That's pollution removal at its best. No machinery. No moving parts. No energy input other than sunlight. Just a clever, air-cleansing chemical reaction. (Price: approximately $650 more than a standard 2500-sq.-ft. tile roof)
Thursday, June 13, 2013
Download offline installers
This bellow link is useful for the computer users who dont have internet connection but want to install programs.In this link there are some offline installers which may useful
http://offline-standalone-installer.blogspot.com
http://offline-standalone-installer.blogspot.com
Check your reliability of your Antivirus program
This is a funny but useful post for the computer users. As you all know there is no antivirus program which gives you 100% protection against viruses (spam and malwares). Here I am explain the way to check whether your anti virus program gives protection against viruses atleast some extend.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Copy and paste the above (red color) sentence in notepad. Then save the content as .exe file such as virus.exe. Then see the result. If your antivirus program is working correctly the saved file would be deleted soon and in some program you may get alert.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Copy and paste the above (red color) sentence in notepad. Then save the content as .exe file such as virus.exe. Then see the result. If your antivirus program is working correctly the saved file would be deleted soon and in some program you may get alert.
Free Softwares for windows
Bellow there is a link. By clicking this viewers can download upto 90 free softwares. Enjoy!!!
'
www.ninite.com
'
www.ninite.com
Dual Boot between Windows 7 and Server 2003
Windows no longer
starts after you install an earlier version of the Windows operating system in
a dual-boot configuration
Support for Windows Vista without any service
packs installed ended on April 13, 2010. To continue receiving security updates
for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2).
For more information, refer to this Microsoft web page:
Symptoms
After you install an earlier version of the Windows operating system on a Microsoft Windows Vista-based or Windows 7-based computer in a dual-boot configuration, you may experience one of the following issues:
·
If you install an
earlier version of the Windows operating system on a Windows Vista-based or
Windows 7-based computer, Windows Vista no longer starts. In this case, only
the earlier version of the Windows operating system starts.
·
If you install an
additional instance of Microsoft Windows XP on a computer where Windows XP and
Windows Vista are already installed in a dual-boot configuration, you may
receive the following error message:
Disk read error has occurred.
CauseThese issues occur because earlier versions of the Windows operating system are incompatible with the new Windows Vista startup method. Windows Vista uses a new Boot Configuration Database (BCD) store. This store contains a boot menu and all the information about operating systems that are installed on the computer. Therefore, a Boot.ini file that is from an earlier version of the Windows operating system cannot be used to start Windows Vista.
In earlier versions of the Windows operating system that run on a basic input/output system (BIOS)-based computer, such as Windows XP, the boot process starts with the system BIOS. The BIOS determines the boot device, and then loads the first physical sector. This physical sector is named the master boot record (MBR). The MBR contains the partition table and the necessary boot execution code. This code searches the partition table to find the active partition and passes control to the boot sector on the active partition. Then, the boot sector on the active partition loads the Ntldr program. The Ntldr program parses the Boot.ini file. This file is used to enumerate the operating systems that are installed.
When Windows Vista or Windows 7 starts on a BIOS-based computer, the BIOS loads the MBR and then loads the boot sector. However, boot code loads the new Windows Boot Manager program (Bootmgr). The Windows Boot Manager program parses the Boot Configuration Data file, enumerates the installed operating systems, and then displays the boot menu. If an earlier version of the Windows operating system is installed in a dual-boot configuration with Windows Vista or Windows 7, the Windows Boot Manager program transfers control to the Ntldr program for the earlier version of the Windows operating system. The Windows Boot Manager program does this when you select Windows Vista from the boot menu.
When you install an earlier version of the Windows operating system on a Windows Vista-based or Windows 7-based computer, Setup overwrites everything from the MBR, the boot sector, and the boot files. Therefore, the earlier version the Windows operating system loses forward compatibility with Windows Vista.
Resolution
To resolve these
issues, follow these steps.Note You can run the commands in the following procedure by using the command prompt. If you run these commands in Windows Vista, run them at a command prompt that has elevated user rights. To do this, click Start, click Accessories, right-click the command-prompt shortcut, and then click Run as Administrator.
1. Use Bootsect.exe to restore the Windows Vista
MBR and the boot code that transfers control to the Windows Boot Manager
program. To do this, type the following command at a command prompt: Drive:\boot\Bootsect.exe
/NT60 All
In this command, Drive is the drive where the Windows Vista installation media is located.
Note The boot folder for this step is on the DVD drive.
In this command, Drive is the drive where the Windows Vista installation media is located.
Note The boot folder for this step is on the DVD drive.
2. Use Bcdedit.exe to manually create an entry in
the BCD Boot.ini file for the earlier version of the Windows operating system.
To do this, type the following commands at a command prompt.
Note In these commands, Drive is the drive where Windows Vista is installed.
Note In these commands, Drive is the drive where Windows Vista is installed.
o
Drive:\Windows\system32\Bcdedit /create {ntldr} /d "Description
for earlier Windows version"
Note In this command, Description for earlier Windows version can be any text that you want. For example, Description for earlier Windows version can be "Windows XP" or "Windows Server 2003".
Note In this command, Description for earlier Windows version can be any text that you want. For example, Description for earlier Windows version can be "Windows XP" or "Windows Server 2003".
o
Drive:\Windows\system32\Bcdedit /set {ntldr} device partition=x:
Note In this command, x: is the drive letter for the active partition.
Note In this command, x: is the drive letter for the active partition.
o
Drive:\Windows\system32\Bcdedit /set {ntldr} path \ntldr
o
Drive:\Windows\system32\Bcdedit /displayorder {ntldr} /addlast
3. Restart the computer.
More
To start versions of
the Windows operating systems that are based on Microsoft Windows NT, you need
the following files:
·
Ntldr
·
Boot.ini
·
Bootfont.bin
Note You need to use this file when you install the Windows versions of the East Asian languages.
Note You need to use this file when you install the Windows versions of the East Asian languages.
·
NTDetect.com
In Windows XP, these
files reside on the system partition that is marked "active." By
default, these files are hidden system files in Windows XP. Users can replace
these files by using the Recovery Console, or users can start the operating
system by using a Windows NT boot disk. Windows Vista does not use these three
files. Windows Vista starts by using the hidden system file Bootmgr and other
required files that are located in the \Boot directory.
Creating a multi-boot configuration that
includes Windows Vista
To create a working
multi-boot configuration, install the oldest version of the Windows operating
system first. Then, install each newer version in order. Every new Windows
version preserves backward compatibility for starting earlier Windows versions.
To create a multi-boot configuration that includes Windows Vista, you must have at least one partition for each earlier Windows version that you install. Follow these general guidelines:
To create a multi-boot configuration that includes Windows Vista, you must have at least one partition for each earlier Windows version that you install. Follow these general guidelines:
·
Create at least two
partitions. Use one partition for the Windows Vista installation.
Note If the partition for Windows Vista is already formatted, make sure that it is formatted by using the NTFS file system. However, we recommend that you use one of the following methods:
Note If the partition for Windows Vista is already formatted, make sure that it is formatted by using the NTFS file system. However, we recommend that you use one of the following methods:
o
Create the second
unformatted partition.
o
Do not create the
second partition and leave the space as free space. Instead, create the second
partition during the Windows Vista installation.
·
If the computer does
not have an operating system installed, install the oldest Windows version
first.
Note Install Windows XP before you install Windows Server 2003.
Note Install Windows XP before you install Windows Server 2003.
·
Run the Windows Vista
Setup program. Install Windows Vista in the free space or in the existing
partition. You can run this Setup program in the earlier Windows version, or
you can start the computer when the Windows Vista disc is in the CD or DVD
drive.
After Windows Vista
Setup finishes, you will have a correctly-configured, multi-boot environment
that includes Windows Vista and the earlier versions of Windows. The Bootmgr
boot menu that appears resembles the following menu:
Microsoft Windows
Earlier Windows Operating System
Removing Windows Vista from a dual-boot
configuration
If you want to remove
Windows Vista from a dual-boot environment that includes an earlier version of
Windows, follow these steps.
Note You can follow these steps in the earlier version of Windows or in Windows Vista. If you follow these steps in Windows Vista, run the commands from a command-prompt that has elevated user rights. To do this, click Start, click Accessories, right-click the command-prompt shortcut, and then click Run as Administrator.
Note You can follow these steps in the earlier version of Windows or in Windows Vista. If you follow these steps in Windows Vista, run the commands from a command-prompt that has elevated user rights. To do this, click Start, click Accessories, right-click the command-prompt shortcut, and then click Run as Administrator.
1. Use Bootsect.exe to restore the Ntldr program.
To do this, type the following command: Drive:\Boot\Bootsect.exe
/NT52 All
Note In this command, Drive is the drive where the Windows Vista media is located.
After the computer restarts, it does not load the Windows Boot Manager program. Instead, Netldr.exe loads and Boot.ini loads.
Note In this command, Drive is the drive where the Windows Vista media is located.
After the computer restarts, it does not load the Windows Boot Manager program. Instead, Netldr.exe loads and Boot.ini loads.
2. Delete or remove the partition where Windows
Vista is installed.
Important You can only delete the partition where Windows Vista is installed if that partition is the non-active partition on the system. For example, consider the following scenario:
Important You can only delete the partition where Windows Vista is installed if that partition is the non-active partition on the system. For example, consider the following scenario:
o
Windows Vista is
installed on drive C. Drive C is partition 1 and is the active partition.
o
Windows XP is
installed on the drive D. Drive D is partition 2 and is the non-active
partition.
In
this scenario, you can run the bootsect command, but you cannot delete
the partition where Windows Vista is installed. If you delete this partition,
the computer is put into a non-bootable state because Windows XP boot files are
deleted.
Thanks: Microsoft
Deploying Data Protection Manager 2007
Deploying Data Protection Manager 2007
Microsoft System Center
Data Protection Manager (DPM) was designed to protect Microsoft applications
and Microsoft Servers in an Active Directory environment. DPM uses continuous
data protection. The DPM Server protects the servers, creating and maintaining
a replica of the information stored therein. We can define an interval period
in which to synchronize the data from the protected servers to DPM Server. DPM
captures only the data changes since the last operation and then moves the
changed data to DPM Server in order to synchronize the replica. The process
used to replicate data from protected servers to DPM Server will be explained
in detail in the last article of this series.
DPM also uses Disks to
protect data in the short-term period, which increases backup speed and
restores information when necessary, and it can be combined with tape
libraries. DPM integrates with Active Directory and allows end users to recover
their own file server data from DPM easily through the Previous Version tab in
a protected folder.
We can get an idea of how
DPM protects Microsoft Applications and Servers by taking a look at Figure 01.
Synchronization takes place on a regular basis and the protected information
will be stored on a disk for a configured amount of days and archived later in
a tape. The data synchronization and storage process will be covered in future
articles.
The current DPM version
allows us to protect the following Microsoft products:
Windows XP SP2 and all
editions of Windows Vista that can belong to a domain
Microsoft Exchange Server
2003 SP2 and Microsoft Exchange Server 2007 Storage Groups
Microsoft SQL Server 2000
SP4, SQL Server 2005 SP1 databases
Windows SharePoint
Services 3.0 and Microsoft Office SharePoint 2007 farms
System State of the
protected servers
Microsoft Virtual Server
2005 R2 SP1 host and guest configurations
File data, such as
volumes, folders and shares on file servers and workstations
To deploy DPM 2007 we must
consider the following points before starting the installation process:
DPM must not be a Domain
Controller
DPM should be run on a
dedicated server
DPM and the Protected
Server should be in the same domain, or a two way trust must exist
At least 1GB of RAM in the
DPM Server
DPM must be installed on a
Windows Server 2003 SP2, Windows Server 2003 R2 with SP2, Windows Storage
Server with SP2, Windows Storage Server R2 with SP2 or Windows 2008
The domain controllers
must be running Windows Server 2003 or Windows Server 2003 R2
DPM can protect either
32bit or x64 Operating Systems
Installing Data
Protection Manager 2007
DPM 2007 can be downloaded
at http://www.microsoft.com/systemcenter/dpm. After the extraction of the package content we can
run Setup.exe that can be found in the root directory at the extracted
location.
The DPM 2007 setup process
installs by default all the prerequisite software to support DPM Server
installation. In the current version of DPM 2007 (beta 2) the following
software will be installed during DPM Setup:
Windows Server 2003 OS
features
- ASP.Net
- Network COM+ Access
- Internet Information Service (IIS) 6.0
- Windows Deployment Services (WDS) on Windows 2003 Servers running SP2 or Single Instance Storage (SIS) on Windows Server Storage Server 2003 R2
- ASP.Net
- Network COM+ Access
- Internet Information Service (IIS) 6.0
- Windows Deployment Services (WDS) on Windows 2003 Servers running SP2 or Single Instance Storage (SIS) on Windows Server Storage Server 2003 R2
Windows PowerShell
Microsoft .Net Framework
Evaluation of SQL Server
2005 Enterprise Edition
SQL Server 2005 Service
Pack 2
SQL Server 2005 Tools and
workstation components
Note:
In this article we are going to install DPM using the default values (all the prerequisites and components will be installed as part of the DPM Setup. However we will be using an SQL Server on another server to provide the database and reporting services components required by DPM.
In this article we are going to install DPM using the default values (all the prerequisites and components will be installed as part of the DPM Setup. However we will be using an SQL Server on another server to provide the database and reporting services components required by DPM.
To install DPM 2007 Beta2
follow these steps:
Initial screen. Click on Install Data Protection Manager, as
shown in Figure 02. Now, some prerequisites will be installed automatically on
the system (Microsoft .Net Framework 2.0)
Figure 02: Initial installation screen
License. Check the option I accept the license terms and
condition and click on OK to continue.
Welcome. Initial wizard screen to install DPM, just click on
Next.
Prerequisites Check. The DPM Setup will analyze the server in three
different ways: basic components; required hardware and system attributes. We
can receive two kinds of error messages during the check procedure: Warning
which allows the setup to continue however one should fix anything displayed on
the message as soon as possible; Error which indicates that a required
component is missing or noncompliant. In this case we have to fix it before
continuing with the Setup process. In our article the prerequisite check was
executed and a single Warning message was displayed, as shown in Figure
03.
Tip:
Windows PowerShell is not installed during the DPM Installation Process and we need to install it manually. To do that we can download and install it from the PowerShell Download Page.
Windows PowerShell is not installed during the DPM Installation Process and we need to install it manually. To do that we can download and install it from the PowerShell Download Page.
Figure 03: Prerequisite Check process allows us to validate all prerequisites
Product Registration. Fill in the User Name and Company information and
click on Next.
Installation Settings. In this section we can define where the DPM will be
installed and choose between installing and using a local SQL Server 2005 (DPM
Setup will deploy this SQL version) or using a remote SQL Server 2005. In our
article we will be installing and using the SQL Server 2005 that will be
deployed by DPM Setup, as shown in Figure 04.
Note:
If a remote SQL Server 2005 was chosen, DPM will use the Reporting Services on that server. If that server does not have Reporting Services we must install it on that server before continuing the DPM Server installation process.
If a remote SQL Server 2005 was chosen, DPM will use the Reporting Services on that server. If that server does not have Reporting Services we must install it on that server before continuing the DPM Server installation process.
Figure 04: Choosing the SQL Server that will be utilized by DPM
Security Settings. We must define a password that will be utilized by
local accounts used by SQL Services. Click on Next.
Customer Experience
Improvement Program. Just click on Next.
Summary of Settings. A summary will be shown with all options that have
been defined. To confirm click on Install.
Installation. This process will take some time because setup is
installing all the required software components to deploy DPM 2007 properly. At
the end we will see a summary of all options installed on the DPM Server.
(Figure 05)
Note:
To install the required Windows components the DPM setup will request the required Windows Server 2003 media, unless the components have been installed beforehand.
To install the required Windows components the DPM setup will request the required Windows Server 2003 media, unless the components have been installed beforehand.
Figure 05: DPM 2007 was properly installed
Restart the DPM Server to
finish the installation.
Just to make sure
everything is fine, we can check the installation log files to validate. The
default location is C:\Documents and Settings\All Users\DPMLogs, as
shown in Figure 06.
Figure 06: The DPM Setup process creates log files that can be used to validate the installed components
Deploying Data Protection Manager 2007 (Part 2)
Continuing our DPM 2007
deployment…
We have just deployed the
DPM Server and before we start getting to know the DPM Administration
interfaces we have to configure three key points:
Understand where and how
DPM can use media to protect the data (disk, tape or both)
Add Disks to the Storage
Pool
Add Agents to protect
servers
After these three topics
above we will be taking a look at each of the key areas of DPM 2007.
Storing the backup data
in disks, tapes or both…
One of the nice features
of DPM 2007 is the possibility of storing the protected data in different ways,
such as disk-based storage (also know as D2D Disk-to-disk), tape-based storage
(also know as D2T Disk-to-tape) and both methods (also know as D2D2T,
disk-to-disk-to-tape), as shown in Figure 01.
Figure 01: The three methods to store the information (Disk, Tape or both)
This flexibility is set up
at Protection Group level. Using these methods we can configure short-term
periods of data to be stored on a disk because a restore from a disk is much
faster and easier than a tape restore. We can also define long-term periods of
data to be moved to a tape. All these options are defined when creating the
Protection Groups to protect the servers.
Adding disks to the
storage pool
DPM uses a set of disks
called the Storage Pool where it stores replicas and recovery points of the
protected data. We need at least one disk in the Storage Pool to start the
process of protecting the servers.
If we have a basic disk
DPM will convert it to a dynamic disk in order to add it to the Storage Pool.
In DPM Beta2 we can add any physical disk and it will use only the unallocated
space of the selected disk. We are going to add the disk shown in Figure 02 to
the DPM Storage Pool.
Figure 02: The disk that will be added to the Storage Pool
To add disk1 into the
Storage Pool follow these steps:
Open the Microsoft
System Center Data Protection Manager.
In the Navigation bar
click on the Management area.
In the Display Pane, click
on Disk tab.
In the Actions pane, click
on Add..
Add Disks to Storage
Pool. In the left frame all available
disks that may be used by DPM will appear. Click on the disk and click on the Add
-> button (Figure 03). The disk will be moved to the right frame and we
can see the disk name, capacity and if there is any data on the disk. Click on OK.
Figure 03: Selecting a disk to be added to the Storage Pool
Now we can see the disk
that has just been added to the Storage Pool (Figure 04). We can also see the
disk status, how much is allocated for protection, how much space is still unallocated
and which Protected volumes are on this specific disk.
Figure 04: Disk Management with a recently initialized disk that will be added to DPM Disk Storage Pool
Deploying the DPM
Agents
Let’s install the agents
on the DPM Protected Servers. Agent installation can be done manually or
through the DPM Administrator Console. The agent will be installed as a service
called DRMA on the Protected Servers.
Open the Microsoft
System Center Data Protection Manager.
In the Navigation bar
Click on the Management area.
In the Display Pane, click
on the Agents tab.
In the Actions pane, click
on Install…
Select one or more servers
on which to install the agent, as shown in Figure 05, and then click Next.
Figure 05: Selecting the Servers on which the DPM Agent will be installed
Enter Credentials. Specify a user name, password and domain as well with
Installation rights on the server that DPM Agent will be installed, and click Next.
Choose Restart Method. Install the Agent and automatically restart the
server or install the agent and restart the server manually. Click Next.
Summary. Validate which server or servers will receive the
Agent, and click on Install.
Now click on Close,
the status of the installation will be shown, as in Figure 06.
Figure 06: The newly installed agent - validate the agent’s version, status, and to which group it belongs
Using the DPM 2007
Administrator Console
We can work with DPM
through the Administrator Console or through the DPM Management Shell that
allows the use of PowerShell.
The DPM Administrator
Console has five distinct areas that can be managed. These areas are:
Monitoring, Protection, Recovery, Reporting and Management. We will go over
each of these areas to see what we can do in each.
DPM 2007 Administrator
Console
Monitoring
This area allows us to
monitor the status of DPM Operations, and is divided in two distinct tabs:
Alerts and Jobs.
Alerts: This tab displays messages about agents, backup and
restore procedures. We can group these alerts using the Group by combo
box (Figure 07).
Jobs: Show the status of jobs and the tasks associated
with them. We can also group the jobs using the Group by combo box and Filter
names. The jobs listed in this area are set up automatically during the
Protection Group creation process (Figure 08).
Figure 07: The Active and Inactive DPM alerts
Figure 08: Jobs
Protection
In this area we can manage
the Protection Groups, Protection Schedules, disk allocations, etc. We can also
synchronize and create a Recovery Point. We can see all the servers in the
Protection Groups. We can click on a specific item and validate some points,
such as: how many recovery points are available, the oldest and latest recovery
point and figure out how much disk space is being used to protect the specific
item, as shown in Figure 09.
Figure 09: Protection Groups
Recovery
In the Recovery Area we
can recover data that has been protected by the Protection Groups. We can see
all the servers and protected items in a single view, and we do not need to
move from the screen to do an Exchange, SharePoint, SQL or a Windows File
Server restore procedure. We can use the calendar to see the days and specific
times that we have a recovery point available. We can also see which media has
the selected recovery point (disk or tape), as shown in Figure 10.
We can use the Search Tab
to find available recovery points using variables, such as: file or folder
name, recovery point range and the original location
Figure 10: The Recovery area that allows us to recover data from the DPM Agents
Reporting
The Reporting Service has
some reports that allow administrators to measure some items, such as:
statistics, performance that might help with hardware resource capacity
planning. We have the following built in reports and they can be seen in Figure
11.
Disk Utilization
Protection
Recovery
Status
Tape Management
Tape Utilization
Figure 11: The available DPM reports
We can also configure the
reports to be generated on a regular basis and sent to a selected e-mail
address. Click on the Report, and on the Details Pane, we have two options:
Schedule and E-mail, both of them have an Edit links below.
In the Schedule (Figure
12), we can configure the frequency and report parameters. We can also define
how many version we will keep in the history.
Figure 12: Defining a schedule to generate the Disk Utilization Report
In the E-Mail tab, we can
define who will receive the scheduled report. To add more than one mailbox just
add a semi-colon between the e-mail address (Figure 13). We can also configure
the format of the attached file that will come with the message, such as HTML,
Excel or PDF.
Figure 13: Specifying the recipients that will receive this report
We can right-click on a
report and click view to see it. A sample report can be seen in Figure 14.
Figure 14: Report extracted based on DPM Activity - schedule report generation or see it in real time
Management
In the Management Area we
can play with the DPM Server components which interact with the servers and
store the data. These items are: Agents, Disks and Tape library
Management of disks and
agents has already been done in order to prepare DPM to be used.
In order to use a tape
library properly in DPM 2007 we must make sure that the device is configured in
the Device Management section. There is list with all hardware tested with DPM
Beta2: http://www.microsoft.com/systemcenter/dpm/partners/tapelib.mspx
DPM Management Shell
DPM 2007 can be managed
through Windows PowerShell using the DPM Management Shell. In the DPM
Management Shell some tasks that are not possible through DPM Administrator
Console can be accomplished. Scripts can also be created to facilitate daily
tasks. To see a list of all available DPM cmdlets use: get-DPMCommand.
Figure 15: Starting the DPM Management Shell
Deploying Data Protection Manager 2007 (Part 3)
What does DPM protect?
DPM protects several
Microsoft products. Table 01 lists the products that can be protected
and which items within the products that can be restored.
Microsoft Products
|
Item(s) that can be
protected
|
Recoverable Items
|
Exchange Server 2003
with SP2
Exchange Server 2007
|
Storage group
|
Storage group, Database,
or Mailbox
|
SQL Server 2000 with SP4
SQL Server 2005 with SP1 or higher |
Database
|
Database
|
Microsoft Office
SharePoint Server 2007
Windows SharePoint
Services 3.0
|
Farm
|
Farm, Database, Site,
File or list
|
Windows Server 2003
Windows Storage Server 2003
|
Volume, Share and
Folders
|
Volume, share, Folder or
File
|
Microsoft Virtual
Server 2005 R2 SP1
|
Virtual Server host or
Virtual Server machines
|
Virtual Server host or
Virtual Server machines
|
Protected servers
running Windows 2003 and XP
|
System state
|
System state
|
Windows XP with SP2
Windows Vista
|
File data
|
File data
|
Table 01
DPM also protects a
cluster environment of those applications (File Server, Exchange and SQL). To
restore entire machines DPM has an additional tool called DPM System
Recovery Tool that allows a bare metal recovery of the protected servers;
this tool does not come with the DPM 2007 DVD but can be found on a separate
disk.
Creating a Protection
Group
All DPM Protection is
based in the Protection Group; the protection group defines retention
range, how often synchronization will occur, how many recovery points will be
available, where the protection will be kept, etc. Understanding how to create
a Protection Group and its options is crucial in order to protect a network
using DPM.
When creating a Protection
Group we do not have to know where the application's files are located in the
file system. If we select an SQL or Exchange database, DPM will gather
information from the product and it will automatically find where the files are.
In order to create a Protection Group to protect two shared folders follow
these steps:
Open the Data Protection
Manager 2007 Console.
Click on the Protection
task area.
In Toolbox Actions, click
on Create Protection Group:
Welcome to the New
Protection Group Wizard page; there is an introductory text about the process
that will be used by DPM to protect the selected computers, click on Next.
In the Select Group Member
page, we can see all the servers that have been installed with the DPM Agent.
We can choose several items at the same time. In the Figure below we are able
to protect some items such as Exchange Server Cluster, Shares, Volumes, System
State and SQL as well. DPM is application aware, this means that we do not need
to specify the path of Exchange and SQL database and log files, just select the
component (SQL databases or Exchange Databases).
In this tutorial we are going to check two shares (Share01 and Share02) and they will show up in the Select members area (Figure 01).
In this tutorial we are going to check two shares (Share01 and Share02) and they will show up in the Select members area (Figure 01).
Figure 01: Selecting some items among the servers with the DPM Agent installed
We still have two options
in the Selected members frame that are: Excluded Folders and Excluded
file types.
Excluded File types: We can exclude file extensions, which will then not
be protected. To do that we just need to click on the Exclude Files:
link and type in the extensions required, as shown in Figure 02.
Figure 02: Excluding the extensions .mp3 and .tmp files to be protected
Exclude Folders: When a directory with several subdirectories is
selected, we can unselect the subdirectories that do not need to be protected.
This option will show all subdirectories that are unchecked. In the example
below the Inetpub folder was selected and the subdirectory AdminScripts was
unchecked. (Figure 03)
Figure 03: All directories that are not protected
In the Select Data
Protection Method page we can define the Protection Group name and we can
define which method we are going to use in this protection group: Disk
(short-term protection), Tape (long-term protection) or both. Only the
available options will be displayed, in our article a tape library is not
installed, so the Tape protection option is disabled. (Figure 04)
Figure 04: Defining the Protection Group name and the method that will be utilized
In the Specify
Short-Term Goals page, we will define the Disk Based protection plan for
the data and servers already selected. The options that we can define are how
many days of retention, synchronization frequency and how often a recovery
point will be created. At this point it is important to understand what the Synchronization
Process and Recovery Point are for.
Synchronization process
DPM maintains a replica of the synchronized protected server data. All the information is stored in the DPM Storage Pool or in a custom volume. The synchronization process depends on the data that we are working with, as follows:
DPM maintains a replica of the synchronized protected server data. All the information is stored in the DPM Storage Pool or in a custom volume. The synchronization process depends on the data that we are working with, as follows:
File data: the DPM agent uses a volume filter and the Operating
system change journal to track which files have been changed, created or
deleted since the last synchronization job.
Application data: the DPM Agent uses the VSS Application writer to
identify which disk blocks have changed. Those changes will be applied to the
DPM replica. If the application supports incremental backups a recovery point
will be created for each synchronization (Exchange and SQL).
To summarize, all changes
made in the Protected Servers will be transferred to DPM Server in order to
keep the replica updated on a regular basis.
Recovery points
A recovery point is a point-in-time version of the data protected by the DPM Server. We use recovery points to recover data. For file servers the recovery points allow the Administrator and users to recover data, for applications (such as Exchange and SQL) we are able to restore the data from recovery points and synchronize as well.
In Figure 05 we can see how often a file recovery will occur, the retention range for the data and how often the data will be synchronized.
Recovery points
A recovery point is a point-in-time version of the data protected by the DPM Server. We use recovery points to recover data. For file servers the recovery points allow the Administrator and users to recover data, for applications (such as Exchange and SQL) we are able to restore the data from recovery points and synchronize as well.
In Figure 05 we can see how often a file recovery will occur, the retention range for the data and how often the data will be synchronized.
Figure 05: Specifying short-term goals
By clicking on the Modify
button, we can define at which time and days we will be creating recovery
points. We have to plan the number of recovery points carefully. If we have a
higher number of recovery points per day it will decrease the retention range
because we cannot have more than 64 recovery points for file data. PS: This 64
limit is not applied for applications. We have to run a recovery point at least
once a week.
Review Disk Allocation page. We can define space for Replica and Recovery
Volumes, a graphical view of the current status of the Storage Pool will be
shown (Figure 06). We can click on the Modify button to change the
volume sizes; DPM uses the current volume information of the protected server
to calculate the proper size.
Important: We cannot shrink the size of a Disk Poll after definition; we must recreate the Protection Group, on other hand we can increase the current size without playing with the Protection Group.
Important: We cannot shrink the size of a Disk Poll after definition; we must recreate the Protection Group, on other hand we can increase the current size without playing with the Protection Group.
Figure 06: Defining the disk space allocation for the new Protection Group
Nowadays, there is a
storage calculator for Exchange (Data Protection Manager 2007
Storage Calculator) but in the future
a spreadsheet wil be available for the another products (SQL, SharePoint,
Virtual Server, etc).
In the Choose Replica
Creation Method page we can define how and when the initial replica of the
selected data will be created. The initial replica can be done manually,
immediately or at a scheduled time. (Figure 07)
Figure 07: Defining when the initial replica will be executed
Summary page. A list with
all the defined settings will be shown in this page. The information should fit
with the company requirements. In Figure 08 we can easily see that the
protected shared folders will be kept for 5 days, data synchronization will
occur every 30 minutes, and we will be able to recover the data 3 times in a
day. To create the Protection Group with the defined settings click on Create
Group.
Figure 08: Summary of the information that will be used to create the Protection Group
Status page. A final page
showing the tasks performed to create the Protection Group will appear, just
click on Close.
Now, we can open the Disk
Administrator and we will see two new volumes in the DPM Storage Pool disks,
those disks will be responsible for keeping the data of those shared folders in
the Protection Group.
Examining the Protection
task area
After creating the
Protection Group we can view information about the selected Protection Group in
the Details Pane. We can also tinker with the Protection Group through the
Actions Toolbox where we can modify the disk allocation, perform consistent
checks and create recovery points, as shown in Figure 09.
Figure 09: Additional information and the current status of the Protection Group
Deploying Data Protection Manager 2007 (Part 4)
Using
the Recover section of the DPM 2007 Administrator Console
Using the DPM 2007 Administrator
Console we can recover all sorts of protected data from a single point of view.
To start any recovery process we just need to click on the Recovery
item. We have two tabs: Browse and Search, the first tab allows
us to list all protected servers and their data that has been protected by DPM
server.
We can expand Data on Disks and
Tapes, domain name, server name and we will be able to see all components
that have been protected by DPM. In this article series we are protecting two
shared folders, and these folders can be accessed either by driver letter (in
our case C:\) or All Protected Shares. Let’s click on C:\ and on
the right hand side we have a calendar which shows, in bold, all dates that
have at least one recovery point of the selected item, beside this calendar we
have all the available recovery points for that day, and we also have an icon
indicating where the protected data is located (source or disk).
Figure 01
If you have a large environment with
several protected servers you can filter by server name. To do that, just fill
in the server name under the Server field and click on the Filter
button. Then only the server will be listed in the right hand side of the recovery
section.
Figure 01 shows all the shares, but we
might want to recover a single file that is under those folders, to do that
just double click on the directory folder and we will see all the files and
subfolders of that specific share.
Now, let’s click on the second tab
called Search (Figure 02). In this tab we can search the protected data
with queries using some variables. First of all we have three different types
of data to search, they are: Files and folders, Mailboxes and Sharepoint. Each
option has its own parameters to facilitate the search of the respective data.
Let’s create a file to find all the
.txt files (Folder or file name section) during a certain range of time,
(Recovery point range section) which might be in the server and path drive
specified in the Original location (required) section. After creating a
query to match our needs, we just need to click on the Search button. On
the right hand side we will have all the occurrences found and we have some
useful information such as: file name, path, last modified, size, Recovery
Point date and finally where the information is located (disk or tape).
Figure 02
Before starting our recovery process,
let’s go back to the Browse tab to validate the Show all recovery
points feature. We can use that feature to list all available recovery
points associated with the selected data in a single screen (Figure 03),
instead of having to change the days in the calendar to validate if the item is
there. In our example we are looking at all available recovery points for the
share02 folder. We can see that we have only two recovery points available to
recover that data from and all information is located on a Disk.
Figure 03
Recovering
data using DPM 2007
Now that we have just seen an overview
of the recovery section, let’s select a file to be recovered and let’s click on
the Recover… item in Toolbox Actions. Follow these steps to finish the
recovery process:
- Review Recovery Selection. After selecting the data and clicking on Recover… the first screen of the Recovery Wizard will contain the details of the data that will be recovered (Figure 04). Let’s just click on Next.
Figure 04
- Select Recovery Type. We can choose the original location, an alternate location or Copy to tape (where the entire volume where the data resides will be copied to tape). Let’s select Recover to the original location and click on Next. (Figure 05)
Figure 05
- Specify Recover Options. We can play with some options
(Figure 06), if the data to be restored already exists in the original
location (chose in the previous step) we can create a copy, skip or
overwrite. Let’s create a copy, we can also play with the security
permissions where we can choose to apply the original permissions (Apply
the security settings of the recovery point version) or use the
current source permission (Apply security settings of the destination
computer).
If the DPM has the SMTP server defined we can tick the option Send an e-mail when this recovery and fill out the user name that should be notified when the recovery data is available.
To continue our process, just click on Next.
Figure 06
- Summary. Just an overview of all our choices up to now, click on Next.
- Recovery Status. Final screen will appear displaying the operation result (Figure 07), how much time was spent in the operation and how much data was transferred from DPM server to the server.
Figure 07
Now that we have seen how to recover an
item using DPM 2007 we can use the same process to recover a mailbox, SQL
Database, Virtual Server, etc…
Controlling
network bandwidth
We can control the network bandwidth
used by a DPM server.
- Open DPM Administrator Console.
- In the Navigation Bar click on Management.
- In the Display Pane click on the designated server that you want to throttle.
- In the Action Pane click on Throttle
computer…
In the Work Schedule section we can configure the days of the week and the start and end time, everything outside of this is non-work hours. After configuring our work hours properly we can assign throttling in both cases, we can use kbps and Mbps. By default, when the Throttle feature is enabled the default value will be 128 Kbps for Work hours and 9999 Mbps for non-work hours (unlimited), as shown in Figure 08.
Figure 08
But before using this feature shown
above we must make sure that the QoS component is installed and enabled on DPM
Server and on the agents as well.
- Enter the properties of the network connection that DPM will use to protect the designated server.
- By default the QoS Packet Scheduler is not installed. Click on Install.
- In the Select Network component Type, click on Service and click Add.
- Click on QoS Packet Scheduler and click OK.
- In the Local Connection Properties, make sure that the QoS Packet Scheduler is checked, as shown in Figure 09.
Figure 09
- Repeat this process in all the agents that will use the throttle feature and in the DPM server as well.
http://www.petri.co.il/data-protection-manager-setup.htm
Exchange Server 2010: Data Protection Manager Setup
Overview
Looking
to learn how to set up Microsoft’s Data Protection Manager? You’ve come to the
right place. But before we show you how to set up DPM, we’d like to briefly go
over the underlying concepts and terms associated with DPM to make sure we’re
starting off on the same foot.
Let’s
begin.
DPM
Replicas and Synchronization and How They Provide Continuous Data Protection
There
are a number of backup solutions that can handle your Microsoft Exchange data.
But if you need a product that’s specifically designed for Exchange 2010 -
especially if you’re running a DAG
(Database Availability Group) - then Data Protection Manager (DPM)
is one of the highly recommended options. DPM can already provide continuous
data protection for Exchange, which is much better than what traditional backup
tools can offer.
Traditional
backup tools can restore data only up to the point when the last backup was
made. With DPM, a protection group member (more about protection groups below) can be fully recovered from just about any recovery point,
which is characteristic of continuous data protection. Much of this capability
relies on DPM’s block level replication and synchronization feature.
DPM
block level replication and synchronization starts with the creation of an
initial replica similar to what you have after a full backup. Then each time a
block undergoes a change, that block is synchronized with the replica.
Essentially, DPM can achieve the same outcome as a traditional full backup each
time a synchronization is made but with the advantage of having much shorter
backup windows.
Replicas
can be created either manually or automatically. Manual creation is ideal if
you have a slow network or if you have to create a replica of a large amount of
data. Automatic creation, on the other hand, is best for fast networks or small
amounts of data.
Data
Protection Manager Can Provide Protection Beyond Exchange
DPM
is not only built for MS Exchange. Actually, the System Center Data Protection
Manager can support the following:
● Windows Server 2003
through 2008 R2
● Essential Business Server 2008
● Small Business Server 2008
● SQL Server 2000 through 2008 R2
● Exchange Server 2003 through 2010
● SharePoint Server 2003 through 2010
● Dynamics AX 2009
● SAP Running on SQL Server
● Essential Business Server 2008
● Small Business Server 2008
● SQL Server 2000 through 2008 R2
● Exchange Server 2003 through 2010
● SharePoint Server 2003 through 2010
● Dynamics AX 2009
● SAP Running on SQL Server
DPM Agents
A
DPM Agent is a program that you need to deploy on each computer you want to
protect. This includes both servers and workstations. It enables your DPM
Server to browse the contents of those computers.
So
if you have a DAG and you want to backup its member servers using DPM, then you
need to deploy a DPM Agent on each DAG member. Deployment can be done either
manually or through the admin console.
Protection
Groups
Your
backup and recovery characteristics are usually influenced by factors such as
your organization’s business requirements, network performance, and the kind of
data you’re handling. If you have data sources having similar backup and
recovery characteristics, you can put them together into what are known as
Protection Groups.
All
members of each Protection Group will share a common set of protection
configurations. For instance, they will have the same back up targets (e.g.
disk or tape), schedules, recovery point (a.k.a. snapshot) intervals, and so
on. Typical members of a group include Exchange Server databases or mailboxes.
You can put different servers having different databases into one group.
DPM Storage Pools
A
DPM storage pool refers to the set of disks where information backed up from
other computers is stored. Always remember never leave important data on disks
you intend to use later on as storage pools. It wouldn’t matter how large the
free space on those disks are. Once DPM starts writing on those storage pool
disks, those previously stored data will be wiped out.
What
kind of disks are supported?
DPM
can support Direct Storage (SAS or SATA) or Networked block level storage
(Fibre Channel or iSCSI). However, it cannot support FireWire disks. Also,
although DPM can be installed on a virtual server, you cannot use VHD files
(virtual hard disk files) in your storage pools. If you have to install it on a
virtual server, then we suggest you go for a iSCSI disk.
System Requirements
Before
you can install Data Protection Manager, you need to have the following in
place:
Minimum requirements for the DPM Server
● Processor: 2.33 GHz quad
core CPU
● RAM: 8 GB
● Pagefile size: 1.5x system RAM
● Available disk space for the installation: 3 GB
● RAM: 8 GB
● Pagefile size: 1.5x system RAM
● Available disk space for the installation: 3 GB
Software prerequisites
● .NET Framework 3.5 with
SP1
● Visual C++ 2008 Redistributable
● PowerShell 2.0
● Windows Installer 4.5 or later
● Single Instance Store (SIS)
● Application Error Reporting
● Visual C++ 2008 Redistributable
● PowerShell 2.0
● Windows Installer 4.5 or later
● Single Instance Store (SIS)
● Application Error Reporting
SQL Server Requirements and Pre-DPM
Installation Configurations
In
addition to those hardware and software requirements mentioned, you will also
need either a 32-bit or 64-bit version of SQL Server. In particular, you need
SQL Server 2008 SP1 or higher. As of the moment, there is no support yet for
2008 R2.
To
achieve optimal performance and security, do not install SQL Server on a Domain
Controller.
SQL
Server can be installed either locally or remotely. A local installation means
SQL Server will be placed in the same server as Data Protection Manager. Most
admins prefer it this way because if you separate the two, you’ll end up with
two single points of failure. Thus, if the SQL Server goes down, the entire
system will suffer even if your DPM is still up and running.
Another
advantage of installing SQL Server locally is that you don’t have to perform
the actual SQL Server installation yourself. In the course of the DPM
installation, SQL Server will be installed automatically. You’ll see this later
on in this article when we walk you through the actual installation process.
During
the installation of SQL Server, make sure the following components are
included:
● Database Engine
● Reporting Services
● Management Tools
● SQL Client Connectivity SDK
● Reporting Services
● Management Tools
● SQL Client Connectivity SDK
Basically,
when you’re in the process of selecting features for a SQL Server installation,
select the checkboxes corresponding to each of the features mentioned earlier. After
installing SQL Server, you still have to configure some of its settings before
proceeding to the actual DPM installation.
To
begin, go to Start > All Programs > Microsoft SQL Server 2008 >
Configuration Tools > SQL Server Configuration Manager.
Once
inside the SQL Server Configuration Manager,
expand the SQL Server Network Configuration
node and select the Protocols for MSSQLServer.
Make sure that Named Pipes is
Enabled.
Next,
you have to install the DPM support files on SQL Server. Navigate to the
location of your DPM installation files. For example, if you have an
installation disk on drive D:, go to Start > Computer > D:, then explore
the disk (right-click the disk then select Open).
Note:
Don’t run the installation yet. If the installer’s splash screen appears, just
click Exit.
Find
the SQLPrepInstaller folder. Inside
that folder, you’ll find the SQLPrepInstaller files, SQLPrepInstaller_x64 and SQLPrepInstaller_x86. Execute
the SQLPrepInstaller file that that corresponds to the flavor of SQL Server you
installed earlier.
Finally,
navigate to the Services
window (Start > Administrative Tools > Services) and open the SQL Server Agent service. You
may have to scroll down to find it.
Make
sure the Startup type is set to Automatic.
After
all that, restart the SQL Server service. We also recommend that you reboot
your computer before starting the DPM installation.
Installing
Data Protection Manager
Navigate
again to the DPM installation disk. This time, when the splash screen appears,
click Install Data Protection Manager.
Go
through the License Terms and Conditions in the succeeding screen and click the
checkbox to affirm. After you click the OK button, a
small window with a progress bar appears. The Setup program will then perform
some preliminary tasks in preparation for the DPM installation. Once that’s
done, you’ll come face to face with the welcome screen of the Data Protection Manager Setup Wizard.
Just click Next.
The
wizard will then check if you’ve met all the prerequisites. If all goes well,
click the Next button.
In
the Product Registration window,
enter a User name and the name of your Company, then click Next.
Next
up is the Installation Settings window.
The
DPM Program Files section is
where you can specify where you want to place the DPM program files. Leave it
unchanged if you want to accept the default location.
In
the SQL server settings section,
you’ll be asked to choose between these two options:
● Use the dedicated
MSDPM2010 instance of SQL Server, or
● Use an existing instance of SQL Server 2008
● Use an existing instance of SQL Server 2008
In
our case, we are choosing the first option because, if you recall, we’re going
for a local installation of SQL Server on the same server as the DPM server. So
in effect, this will automatically install SQL Server as well. On the other
hand, if you’re opting for a remote installation of SQL Server, then you should
select the second option and enter the necessary information for that remote
server.
The third section contains
the space requirements for the installation as well as the space you have
available. Naturally, you’ll want the values on the right column to be greater
than the values on the left.
Click Next when you’re
ready to protect.
In the security settings
window, you’ll be asked to enter a password for a couple of restricted local
user accounts. Just enter a strong password twice (the second to confirm) and
click next.
You’ll then be asked
whether you want to use Microsoft Update. Select you’re preferred option and
click Next when you’re done choosing.
After that, you’ll also be
asked whether you want to participate in the Customer
Experience Improvement Program. Again, select whichever option
you prefer and click Next.
For the final step, the
wizard will show you a summary of the configurations you set earlier. Click Install if everything looks
fine.
Installation may take some
time, so you might want grab a cup of coffee and let the DPM Setup Wizard take
it from here.
Once the wizard reports
that the Data Protection Manager installation completed successfully, you can
then breathe a sigh of relief and click the Close
button.
After closing all open
windows, you’ll find a couple of icons on the desktop. Open the one named Microsoft System Center Data Protection Manager
2010. You’ll then see the user interface of the DPM 2010 Administrator Console
as shown below.
Subscribe to:
Posts (Atom)