Recovering protected computers – Dell PowerVault DP600 User Manual
Page 135
135
Note
The SwitchProtection.ps1 script is available on the DPM 2007 product DVD. During DPM
setup, the script is installed to the installation path at \Microsoft DPM\DPM\bin.
See Also
Backing Up DPM by Using a Secondary DPM Server
Recovering Protected Computers
Recovering Protected Computers
This topic includes instructions for recovering system state to a protected computer and
recovering data to a protected computer from the secondary DPM server.
Recovering System State to Protected Computers
You can recover the system state to protected computers that are in a working state, meaning the
operating system and necessary applications are installed.
When you protect a computer's system state, DPM uses the Windows Backup utility on the
protected computer to back up the system state to a backup (.bkf) file, which is saved to the DPM
medium you specify for that protection group (disk, tape, or both). The restore of the system state
is a two-phase process:
1. Use the DPM Recovery Wizard to restore the .bkf file to the protected computer.
2. Use Backup to restore the system state from the .bkf file to the protected computer.
To recover the system state .bkf file
1. In DPM Administrator Console, click Recovery on the navigation bar.
2. Browse or search for the protected computer, and then, in the results pane, select the
data.
3. Available recovery points are indicated in bold on the calendar in the recovery points
section. Select the date for the recovery point you want to recover.
4. In the Recoverable item pane, click to select the .bkf file to recover.
5. In the Actions pane, click Recover. DPM starts the Recovery Wizard.
6. Review your recovery selection, and then click Next.
7. Specify to recover the .bkf file to an alternate location on the protected computer.
8. Click Next.
9. Specify your recovery options:
• Existing version recovery behavior. Select Create copy, Skip, or Overwrite.
• Restore security. Select Inherit security settings of target when overwriting or
of parent folder when creating copy or Apply the security settings of the
recovery point version.