Protection policy, See also, Auto discovery process – Dell PowerVault DP600 User Manual
Page 24

24
Protection Policy
DPM configures the protection policy, or schedule of jobs, for each protection group based on the
recovery goals that you specify for that protection group. Examples of recovery goals are as
follows:
• “Lose no more than 1 hour of production data”
• “Provide me with a retention range of 30 days”
• “Make data available for recovery for 7 years”
Your recovery goals quantify your organization's data protection requirements. In DPM, the
recovery goals are defined by retention range, data loss tolerance, recovery point schedule, and,
for database applications, the express full backup schedule.
The retention range is how long you need the backed-up data available. For example, do you
need data from today to be available a week from now? Two weeks from now? A year from now?
Data loss tolerance is the maximum amount of data loss, measured in time, that is acceptable to
business requirements, and it will determine how often DPM should synchronize with the
protected server by collecting data changes from the protected server. You can change the
synchronization frequency to any interval between 15 minutes and 24 hours. You can also select
to synchronize just before a recovery point is created, rather than on a specified time schedule.
The recovery point schedule establishes how many recovery points of this protection group
should be created. For file protection, you select the days and times for which you want recovery
points created. For data protection of applications that support incremental backups, the
synchronization frequency determines the recovery point schedule. For data protection of
applications that do not support incremental backups, the express full backup schedule
determines the recovery point schedule.
Note
When you create a protection group, DPM identifies the type of data being protected and
offers only the protection options available for the data.
See Also
Auto Discovery Process
Auto discovery is the daily process by which DPM automatically detects new or removed
computers on the network. Once a day, at a time that you can schedule, DPM sends a small
packet (less than 10 kilobytes) to the closest domain controller. The domain controller responds
to the LDAP request with the computers in that domain, and DPM identifies new and removed
computers. The network traffic created by the auto discovery process is minimal.