Recovering protected computers – Dell PowerVault DP600 User Manual

Page 135

Advertising
background image

135

Note

The SwitchProtection.ps1 script is available on the DPM 2007 product DVD. During DPM

setup, the script is installed to the installation path at \Microsoft DPM\DPM\bin.

See Also

Backing Up DPM by Using a Secondary DPM Server

Recovering Protected Computers

Recovering Protected Computers

This topic includes instructions for recovering system state to a protected computer and

recovering data to a protected computer from the secondary DPM server.

Recovering System State to Protected Computers

You can recover the system state to protected computers that are in a working state, meaning the

operating system and necessary applications are installed.

When you protect a computer's system state, DPM uses the Windows Backup utility on the

protected computer to back up the system state to a backup (.bkf) file, which is saved to the DPM

medium you specify for that protection group (disk, tape, or both). The restore of the system state

is a two-phase process:

1. Use the DPM Recovery Wizard to restore the .bkf file to the protected computer.

2. Use Backup to restore the system state from the .bkf file to the protected computer.

To recover the system state .bkf file

1. In DPM Administrator Console, click Recovery on the navigation bar.

2. Browse or search for the protected computer, and then, in the results pane, select the

data.

3. Available recovery points are indicated in bold on the calendar in the recovery points

section. Select the date for the recovery point you want to recover.

4. In the Recoverable item pane, click to select the .bkf file to recover.

5. In the Actions pane, click Recover. DPM starts the Recovery Wizard.

6. Review your recovery selection, and then click Next.

7. Specify to recover the .bkf file to an alternate location on the protected computer.

8. Click Next.

9. Specify your recovery options:

Existing version recovery behavior. Select Create copy, Skip, or Overwrite.
Restore security. Select Inherit security settings of target when overwriting or

of parent folder when creating copy or Apply the security settings of the

recovery point version.

Advertising