beautypg.com

Dell PowerVault DP600 User Manual

Page 3

background image

Contents

Planning a DPM 2007 Deployment ................................................................................................. 9

In This Section .............................................................................................................................. 9

Introducing Data Protection Manager 2007 ..................................................................................... 9

In This Section .............................................................................................................................. 9

DPM Features .................................................................................................................................. 9

In This Section ............................................................................................................................ 10

See Also ..................................................................................................................................... 10

Backup Solutions Combining Disk and Tape ................................................................................ 10

Disk-Based Protection and Recovery ........................................................................................ 12

Tape-Based Backup and Archive ............................................................................................... 12

See Also ..................................................................................................................................... 12

Protection for Multiple Data Types ................................................................................................ 13

See Also ..................................................................................................................................... 14

Protection for Clustered Servers ................................................................................................... 14

See Also ..................................................................................................................................... 14

Management Tools ........................................................................................................................ 15

DPM Administrator Console ....................................................................................................... 15

Reports and Notifications ........................................................................................................... 15

DPM Management Packs .......................................................................................................... 16

Windows PowerShell Integration ............................................................................................... 16

Remote Administration ............................................................................................................... 17

End-User Recovery .................................................................................................................... 17

See Also ..................................................................................................................................... 17

How DPM Works ........................................................................................................................... 17

In This Section ............................................................................................................................ 17

Disk-Based Protection Process ..................................................................................................... 18

See Also ..................................................................................................................................... 18

The File Data Synchronization Process ........................................................................................ 19

See Also ..................................................................................................................................... 19

The Application Data Synchronization Process ............................................................................ 20

See Also ..................................................................................................................................... 21

The Difference Between File Data and Application Data .............................................................. 21

See Also ..................................................................................................................................... 21