Data Protection Manager – Rescue data like a hero! INF313 Level 300 Data Protection Manager – Rescue data like a hero! Amit Gatenyo Infrastructure & Security.

Slides:



Advertisements
Similar presentations
Christian Schwartz-Sørensen
Advertisements

How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
Microsoft System Center Data Protection Manager Mat Young – Storage Technology Architect, Microsoft EMEA Justin Alderson – Storage Specialists Manager,
ClearCube Data Failover 3.0 Overview and Demonstration Rev
The System Center Family Microsoft. Mobile Device Manager 2008.
Tag line, tag line Protection Manager 4.0 Customer Strategic Presentation March 2010.
Ivo Pekař ELBACOM CZ Ivo Pekař ELBACOM CZ
Which server is right for you? Get in Contact with us
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
2 Industry Waves Backup and recovery evolution Version 1.0 Majority of companies use tape Tape one size fits all Backup once per day Tape recoveries slow.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
NetBackup 6.0 What’s New. What’s New in NetBackup 6.0 Management and Reporting Core Product Enhancements Disk Management and Optimization Additional NetApp.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Disaster Recovery Solutions
Introduction to: System Center Data Protection Manager Raj Natarajan Infrastructure Architect Enterprise Group Microsoft Australia BI206.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Microsoft Confidential Anthony TylerAnthony Tyler Storage & Branch Office Technology SpecialistStorage & Branch Office Technology Specialist.
Calvin Keaton Product Planner- Storage Solutions Microsoft Corporation Microsoft Confidential – NDA Use only.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Data Protection Manager - From The Customer Perspective Jason Buffington Sr. Product Manager Data Protection Manager Microsoft Corporation.
Maintaining Windows Server 2008 File Services
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Introduction to Data Protection Manager Damir Bersinic IT Pro Advisor Microsoft Canada
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Data Deduplication in Virtualized Environments Marc Crespi, ExaGrid Systems
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
November 2009 Network Disaster Recovery October 2014.
Module 10 Configuring and Managing Storage Technologies.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
Module 13: Configuring Availability of Network Resources and Content.
Implementing File and Print Services
EMC ITEMPOINT FOR MICROSOFT EXCHANGE SERVER
STEALTH Content Store for SharePoint using Caringo CAStor  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
EarthLink Cloud Server Backup. Typical Business Challenges Does my tape back system provide the instantaneous access and rapid recovery that I need? How.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Meeting the Data Protection Demands of a 24x7 Economy Steve Morihiro VP, Programs & Technology Quantum Storage Solutions Group
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
4/23/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Selling the Storage Edition for Oracle November 2000.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Protecting SharePoint with System Center Data Protection Manager 2007 Chris Whitehead Premier Field Engineer Microsoft UK.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Storage Netværk Mød Microsoft Feb 2005, Agenda Data Protection Server (opdatering) Microsoft og iSCSI Demo.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
Solving Today’s Data Protection Challenges with NSB 1.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
PHD Virtual Technologies “Reader’s Choice” Preferred product.
Barracuda Backup Easy Cloud-Connected Backup Version 5.4 | July 2014.
Open-E Data Storage Software (DSS V6)
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
InGenius Connector Enterprise Microsoft Dynamics CRM
Maintaining Windows Server 2008 File Services
Agenda Statistics & Customer Pains that Microsoft is focused on
Storage Virtualization
Prepared by Jaroslav makovski
Using the Cloud for Backup, Archiving & Disaster Recovery
Hyper-V backup -Free Edition
Presentation transcript:

Data Protection Manager – Rescue data like a hero! INF313 Level 300 Data Protection Manager – Rescue data like a hero! Amit Gatenyo Infrastructure & Security Team Lead, Dario TOP Consultant, Microsoft

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Backup And Recovery Is… Business necessity Information is most valuable asset Comprehensive backup strategy is essential infrastructure component Attractive target for cost reduction ~ 70% of total cost is manual labor Respond to backup market shift from tape to disk Becoming more and more painful Storage requirements growing at an exponential rate Regulation and Compliance Opportunity to improve customer satisfaction with the Windows Server platform

Industry Waves Backup and recovery evolution Majority of companies use tape Tape one size fits all Backup once per day Tape recoveries slow & unreliable Administrators do all recoveries Today Disk based backup becoming cost effective Recovery in minutes or seconds Continuous backup End user recovery Self healing backups Future

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

What does DPM do? Near continuous (hourly) protection DPM agent on file servers Byte-level changes transmitted to DPM server Multiple scheduled snapshots per day Easy IT or End-User restore – fast from disk

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Rapid and Reliable Recovery Recovery is unreliable and painful Too slow and expensive to recover files Typical recovery takes hours or days (slow, expensive) Recoveries are unreliable 42% of companies had failed recovery in past year 50% of customers wish for online backup verification Data protection is labor intensive All recoveries go through the server admin Solution with DPM Designed for fast recovery Enables a whole new recovery scenario: End users - Files Admins - Servers Snapshots enable multiple recovery points Recoveries are assured through verification Customer Data Protection Pain Points Customer Needs: Faster Recovery

Continuous and efficient protection Backup is too complex, slow, and inefficient Shrinking backup window Growth in data makes it too difficult and time consuming to back up Backups too slow/lots of manual scheduling Mandated disaster recovery plans 24 hours of data loss assumed with tape Tape as one size fits all (file and server recovery, offsite protection and long term archive) Tape inconvenience and unreliability is #1 challenge Solution with DPM Faster and More Efficient Backup Never do a full backup from a production server again Avoid the shrinking backup window Customer Needs: Eliminating Backup Window Customer Data Protection Pain Points

Current backup products are too complex, costly Companies spend too much time and money on backup Labor is the majority of backup cost Branch office data protection is cumbersome Massive data growth increases costs Too many tapes Most disk-based backup solution are cost prohibitive Operational Simplicity Solution with DPM Allows end users to easily recover their own files Usability and easier management Integration into existing environment Industry standard hardware and software Customer Needs: Simpler Solution, Lower costs Customer Data Protection Pain Points

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Ideal Customers DPM is a solution for customers of all sizes but the ideal customers are: Data centers Significant backup window issues Frequent file recoveries from tape Few IT staff Have a Recovery Point Objective (RPO) of approximately one hour Have a faster Recovery Time Objective (RTO) than tape can provide Lots of branch offices Many distributed branch office file servers Few or no dedicated IT staff in the branch Likely to currently use existing tape infrastructure High backup costs 

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

ActiveDirectory Data Centers - Disk to Disk to Tape Active Directory Scheduled auto-discovery job Queries AD for new servers Maintains ACL’s Redirects shadow copies Clients

Agents Protects Win2000, Win2003, WSS2003 (non-clustered) Agents track / synchronize data from production servers to DPM All agent communication initiated from DPM Each protected volume has sync log (10% of volume size) Agent overhead 3-5% Deployed via DPM UI Clients ActiveDirectory File Servers Data Centers - Disk to Disk to Tape

DPM Server Windows Server 2003 SP1 or Storage Server 2003 SP1 IIS, SQL, Reporting Services Lots of disks (2 to 3 times the size of the protected data) Clients ActiveDirectory File Servers DPM Servers Data Centers - Disk to Disk to Tape

Clients ActiveDirectory File Servers DPM Servers Snapshots Snapshots created for quick recovery Multiple, schedule driven point-in-time copies User-friendly, wizard driven set up and restore Data Centers - Disk to Disk to Tape

Tape Library Allows for restore of DPM server itself (System State, Replicas) Enables restore of any file object on production servers from tape Solutions available: Yosemite, Veritas, CommVault, Windows Backup Clients ActiveDirectory File Servers Tape Library DPM Servers Data Centers - Disk to Disk to Tape

Backup process Agent deployed to branch office servers Agent captures data and replicates to DPM server in HQ DPM takes snapshots to enable recovery at multiple points in time Benefits Rapid & reliable recovery including end user recovery Less potential data loss Easy and efficient scheduling and management No trained staff needed in branch Reduce tape equipment requirements in the branch Corporate WAN Haifa Jerusalem Gaza Clients Headquarters DPM Server Branch Office Data Protection

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Configuring File Server Protection

 Easy-to-use graphical interface, all Wizard driven  Create Protection Group to apply back up policies to servers in group  Create a comprehensive data protection plan in minutes

DPM Admin Recovery Screen  Easily find data to restore through simple browsing or searching  Restore data to any location with 2 clicks

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

DPM can only be installed on Windows 2003 SP1 or greater DPM cannot be installed on a domain controller Must be in the same Active Directory domain as the servers that it is protecting Only protects: Windows 2000 SP4 or greater Windows 2003 SP1 or greater On each protected volume on a Production Server, a minimum of 500 MB of free space is required for the synchronization log DPM “Under The Hood” So much prerequisites

All application state and configuration data stored in a SQL Server database Protected data stored in the following places Replica Area is a mounted volume that is made up of replica of protected volume and the diff area Transfer Area is an unmounted volume that contains the spill log. Spill log holds data transferred from protected server but yet to be applied to replica. DPM “Under The Hood” DPM Server DPM Server File Servers Active DirectoryClients

Acts as a controller of job scheduling and launching SQL Server Standard Edition w/ Reporting Services Included with DPM license, limited to this use Setup “hardens” server to be secure but to only enable DPM required services Local Management Console Configuration, monitoring, reporting, recovery Footprint of MB under normal operations Footprint of up to 400 MB under specific operations Overhead 5-15% expected DPM “Under The Hood” DPM Server: DPM Engine

Synchronously replicates synchronization logs to DPM server using two channels of communication: Control channel uses DCOM protocol TCP port 135 is the DCE endpoint resolution point used by DCOM By default, DCOM assigns ports dynamically from the TCP port range of 1024 through Data channel uses proprietary protocol and runs on port 3148/3149 All communications initiated by DPM Server DPM “Under The Hood” DPM Server: Replica Agent

Requires reboot of file server before operating due to legacy (non-mini filters) to assure correct ordering Each volume with protected object has synchronization log in hidden “System Volume Information” directory Synchronization log is by default 10% of volume size but can be adjusted Agent puts overhead of 3-5% on protected server File Servers Active DirectoryClients DPM Server DPM “Under The Hood” Agent

Same channels of communication as the DPM Server All communications initiated by DPM Server Max footprint of 15 MB, not persistent Overhead of 3-5% expected during normal operations Overhead similar to A/V filters Overhead of 80% expected during verification DPM “Under The Hood” Agent

“Pull” model, all synchronizations instigated by DPM server All file operations are replicated (rename, delete, copy) along with all changed blocks, this is most similar to “byte level replication” DPM “Under The Hood” Synchronization File Servers Active DirectoryClients DPM Server

Various unexpected events create need to resync replica with source data (hard reboot of protected server, synchronization log overflow) Sync with Consistency Check does two things Checks file by file for more recent modified times then on replica If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server All open files are check summed irregardless Rolling process that traverses the entire directory tree. DPM “Under The Hood” Synchronization with Consistency Check File Servers Active DirectoryClients DPM Server

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

End-User Restore from Windows Explorer

Original Files

Overwritten

Right-click on any file or directory

PVC Previous Versions Client is an applet that extends Windows Explorer and Office applications with this simple new tab. Available since Windows Server 2003 and VSS. Usually installed silently via Group Policy

Open document

Keep the new one AND Restore the old one

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Monitoring & Reporting

MonitorMonitor  Monitor the health and status of your DPM server easily  Set up automatic alerts via

ReportReport  Comprehensive reports show all data protection activity on the network

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Release Roadmap Broad application integration: Microsoft Exchange Microsoft SQL Server Microsoft SharePoint Server Longhorn Server Advanced data protection features Bare Metal Recovery High Availability SAN integration Increased scalability Centralized management 2007 and Beyond System Center Data Protection Manager 2006 File Protection and Recovery Efficient, continuous data protection Rapid and reliable disk-based data recovery Designed to work with current tape archive software Today

DPM Protection Options DPM v1 DPM v1-SP1 DPM v2 Protect File Servers & Shares YESYESYES Protect Exchange YESKB909644YESKB909644YES Native DPM Protect SQL Server YESKB910401YESKB910401YES Native DPM Protect System State YESTechNetYESTechNetYES Native DPM Protect R2 SIS Servers YES March QFE YESYES Protect x64 Windows --YESYES Protect Clusters --YESYES Beta Q2-06

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Pricing and Availability Data Protection Manager Server License Data Protection Management License (Agent) Pricing FPP Full Packaged Product $950 = Server + 3 agents $559 = 3 agents Open & Select Approx $424 = Server $147 = Agent Available through all channels OEM, Volume FPP, SA

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

Software Industry Partners Hardware

Featured OEM Partners FibreCAT ® N40-DPM Based on market leading PRIMERGY server hardware, the FibreCAT N40-DPM is a fully pre- installed and pre-configured device that is designed to be easy to deploy. It is prepared for Back End integration in the data center, with Fujitsu Siemens Computers’ unique Virtual Tape Appliance CentricStor. N40-DPM is based on windows storage server and offers market leading price efficiency. Extremely scalable. Designed for 0,9 TB / 6 fileservers Expandable to 50 TB / 99 fileservers A family of pre-configured and easy to deploy disk-based backup solutions built on the reliable ProLiant Storage Server NAS platform and powered by Microsoft DPM. These NAS appliances are designed to have customers up and running in minutes and include full hardware, O/S, and DPM support from HP. Available in SATA and SCSI configurations ranging from 1TB to 9TB with SCSI HBA support to connect to HP StorageWorks tape drives and FC support for SAN connection. Learn more at Cost effective and easy to deploy Includes one full year of support for Microsoft DPM. Complemented by other HP StorageWorks data protection products HP ProLiant Data Protection Storage Server

AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

DPM Shortcomings Allows no overwrite protection for backed-up data Each volume can only be in one protection group Allows a maximum of 64 shadow copies per volume (oldest shadow copies are overwritten) Allows a maximum of 8 shadow copies per volume per day A bit strict prerequisites Can’t protect the System State Can’t protect non-file servers Protects up to 6TB of data, from as many as 30 file servers

DPM Advantages Recover files in minutes instead of hours Eliminate the backup window of your production servers Shrink potential data loss down to 1 hour No more failed recoveries Get easy instant backup verification Enable end users to perform their own recoveries Setup and protect your file servers in minutes Advanced functionality at low cost Remove tapes from branch offices and centralize backups at datacenter Rich out-of-box reporting and monitoring functionality Return to the exact state (tracks deleted files)

Resources/ToolsResources/Tools Data Protection Manager Website Data sheet: Introduction to DPM whitepaper: Introduction to DPM webcast: Evaluation Download Evaluation Downloadhttp://go.microsoft.com/fwlink/?LinkId=52423

Have you seen Chip?

Amit Gatenyo Infrastructure & Security Team Lead, Dario TOP Consultant, Microsoft

New York! New York! איך ממלאים משוב? ב - בסוף כל יום ב -Beat Center מה מקבלים? חולצת Feel The Beat השתתפות בהגרלת כרטיסי טיסה מכשירי i-mate ועוד.. (לממלאים משוב כל יום)

202 Cafe 75 Ninth Ave. New York, NY הבראנץ' הכי טוב בעיר נקודה! ויש גם ארוחת בוקר אנגלית מצוינת.

DFS or DPM? DFS Replication in R2 Data Protection Manager Delivery In Windows OS Application Primary Solution Availability of File Shares Centralized Backup & Fast Restore Platform Support Windows Server R2 only Windows 2000, 2003 and R2 Data Frequency Every 15 minutes Up to Hourly - plus past iterations Data Granularity Byte-level differences Whatever application writes (bytes or whole file)

DPM = Backup & Restore (2000, 2003, and R2) Centralized Backup of branch offices Disk-based backup of recent data (7-30 days) prior to tape solution from ISV Fast restore from disk – by IT or End-User Separate purchased product DFS = Availability of Files (R2 only) Near current redundant copy available Transparent redirection / failover to alternate copy Part of Windows Server 2003 R2 DFS or DPM?

DPM Data Protection Manager Agent on file server, captures “whatever application writes” (bytes or whole-file) in real-time - Even open files are protected. Journals changes to file. Up to hourly transmits to DPM server Periodic snapshots End-User and IT restore Low CPU / Uses disk-journal DFS Replication & Namespaces Replicate (every 15 min) between copies of files RDC comparison algorithm actively compares changes within and between files to minimize bytes transferred over WAN Failover to alternate copy via DFS Namespaces Higher CPU for comparison logic DFS or DPM?

Storage Pool Sizing Protected data size + (Daily shadow copy size × # of Shadow Copies) Protected data size Sum (ReplicaA, ReplicaB, ….,ReplicaLast) Sum the capacity or expected size of all protected volumes (not the current size) Daily shadow copy size Size of diff area of Volume Shadow Copy Service Shadow Copies/snapshots Sum current incremental backup size as a very rough estimate # of Shadow copies Max # of Shadow Copies/Snapshots = 64 Choose either recovery range or recovery point objective as primary goal and backfill other to optimize equation No good reason for 64 limit but will be addressed in future versions

Synchronization Log Sizing Hourly Data Change Rate × Maximum Hours of DPM/Network Outage #1 sizing consideration is the impact of a log overflow Would a log overflow put you into a position you can’t catch up from? Verification is a high CPU impact operation on the protected server No Shadow Copies/Snapshots after log overflow and before completion of verification

Replica Creation What: Creation of replica seed that enables migration to delta only replication When: Now or Later How: Over the wire, media load, over the SAN Data Size Over the Wire Network Speed 100 Mbps 32 Mbps 8 Mbps 2 Mbps 512 Kbps 1 GB < GB GB GB Time in Hours

Replica Verification What: File by file check that brings replica in sync with source When: After initial creation of replica, server dirty shutdown, synchronization log overflow How: Checksum comparison of every file’s meta info, if difference found then checksum comparison of every file block Size of Daily Changes Over the Wire Network Speed 100 Mbps 32 Mbps 8 Mbps 2 Mbps 512 Kbps 100 MB < GB < GB GB Time in Hours

Protecting DPM with BackupExec