Best practices for disaster recovery, See also – Dell PowerVault DP600 User Manual
Page 120
120
organization's data should your facility be damaged or destroyed. Tape is a popular medium
for offsite storage.
3. Add a secondary DPM server. A secondary DPM server can protect and restore a primary
DPM server, which is a DPM server directly protecting file and application data sources. The
secondary server can protect the databases of the primary DPM server, as well as the data
source replicas that are stored on the primary DPM server. If the primary DPM server fails,
you can restore the databases and replicas to the rebuilt primary DPM server from the
secondary DPM server. You can restore data to protected computers directly from the
secondary DPM server when the primary DPM server is unavailable. The secondary DPM
server can also protect servers until the primary DPM server is available.
4. Back up DPM databases to tape. You can use a DPM server to back up its own databases
to its tape library, or you can use non-Microsoft software to back up the databases to tape or
removable media. Backup of the DPM databases enables you to recover the configuration of
protection groups after you reinstall DPM.
Important
Of these options, adding a secondary DPM server provides the greatest amount of
protection. At a minimum, we strongly recommend that you back up the DPM databases
regularly, either using DPM or non-Microsoft software.
In This Section
Best Practices for Disaster Recovery
Backup of Protected Computer System State
Backup for Bare Metal Recovery
See Also
Best Practices for Disaster Recovery
Backups of data, whether by DPM or third-party software, rely on the integrity of the data being
protected. To minimize the risk of data corruption, we recommend the following guidelines:
• Run tools that check application integrity regularly, such as DBCC in SQL Server.
• Monitor event logs on the protected computers and DPM server for hardware and file system
errors.
• Perform regular test recoveries of protected data.
• Perform frequent consistency checks on critical data.
• Use a secondary DPM server to provide additional protection and redundancy.