SlideShare une entreprise Scribd logo
1  sur  23
DPM 2010 Mauro Viglietti maurov@tisistemas.com.ar Leandro Sgallari leandros@tisistemas.com.ar TI Sistemas www.tisistemas.com.ar
Session Objectives and Takeaways Session Objective Understand what is coming in DPM v3 Best for Windows Servers – from Microsoft Huge client protection capability Enterprise ready
Agenda Vision of DPM v3 Server features, with special focus on HyperV Client features Scalability, Reliability, Manageability
SERVER features “Best for Windows Servers – from Microsoft”
DPM v3 – Enhanced Datasources
DPM & Hyper-V Roadmap
DPM v3 – Live Migration & CSV’s 2. The VM is Live Migrated from Cluster Node A to Cluster Node C LAN  3. DPM automatically performs next incremental backup of the Live Migrated VM from Cluster Node C 1. DPM performs incremental backup of VM from Cluster Node A
CLIENT features “Best of Breed protection for Windows” Client-DPML will be in E-CAL for FY10
Edge Network Internet Backup over VPN Backups outside corporate network LAN clients Remote clients
DPM v3 – Laptops Best in class laptop protection for Windows Clients Backup over VPN Support for XP, Vista, and W7 Scale to 1000 clients per DPM server “Unique user data” only Not the whole machine, so that the OS is not repeatedly backed up Integration with local Shadow Copies for Vista & W7 Centrally configured from DPM admin UI End User enabled restore from local copies offline and online, as well as DPM copies Admin enabled restore from DPM copies
Client backup - Challenges ,[object Object]
High value data but expensive to back it up
Need to empower users within corporate policies
User education requiredHow DPM helps ,[object Object]
Manage with aggregated alerts and reports
End user functionality as enabled by administrator
Backup with default policies without end-user action,[object Object]
DPM v3 – File protection rules Create a template of default includes and excludes for backup and identify any specific file types you want to exclude
Besides the familiar backup schedule options, you configure DPM to show alerts based on how many days backups have not happened DPM v3 – Frequency and Alerts
Define the disk space usage you want to allocate for all the client computers selected DPM v3 – storage allocation
End user data can be seamlessly backed up by default – no user action required Simple user interface, with quick access to common tasks DPM v3 – End user interface
More details and customizability for power users DPM v3 – End user interface

Contenu connexe

Similaire à [Run Reloaded] ¡No hay problema! Tenemos Data Protection Management 2010 (Leandro Sgallari + Mauro Viglietti)

System Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 OverviewSystem Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 OverviewAmit Gatenyo
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer Englishcynapspro GmbH
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesSaud Nazeer
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9githe26200
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint ProtectionScientia Groups
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vuvncson
 
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond finalId101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond finalSaurabh Calla
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Windows Debugging Tools - JavaOne 2013
Windows Debugging Tools - JavaOne 2013Windows Debugging Tools - JavaOne 2013
Windows Debugging Tools - JavaOne 2013MattKilner
 
Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...
Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...
Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...Agora Group
 
Managed Cloud Platform
Managed Cloud PlatformManaged Cloud Platform
Managed Cloud PlatformDavid Martin
 

Similaire à [Run Reloaded] ¡No hay problema! Tenemos Data Protection Management 2010 (Leandro Sgallari + Mauro Viglietti) (20)

System Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 OverviewSystem Center Data Protection Manager 2012 Overview
System Center Data Protection Manager 2012 Overview
 
DPM 2010 Overview
DPM 2010 OverviewDPM 2010 Overview
DPM 2010 Overview
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & Responsibilities
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Data Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son VuData Protection Manager 2007 Technical Overview Son Vu
Data Protection Manager 2007 Technical Overview Son Vu
 
SCOM Tips and Tricks
SCOM Tips and TricksSCOM Tips and Tricks
SCOM Tips and Tricks
 
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond finalId101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond final
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
IBM Notes in the Cloud
IBM Notes in the CloudIBM Notes in the Cloud
IBM Notes in the Cloud
 
AMANDA
AMANDAAMANDA
AMANDA
 
Windows Debugging Tools - JavaOne 2013
Windows Debugging Tools - JavaOne 2013Windows Debugging Tools - JavaOne 2013
Windows Debugging Tools - JavaOne 2013
 
Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...
Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...
Data Protection Manager: privire de ansamblu şi exemplu de implementare în me...
 
10215 A 10
10215 A 1010215 A 10
10215 A 10
 
Managed Cloud Platform
Managed Cloud PlatformManaged Cloud Platform
Managed Cloud Platform
 
INCPresentation
INCPresentationINCPresentation
INCPresentation
 

Plus de Microsoft Argentina y Uruguay [Official Space]

Plus de Microsoft Argentina y Uruguay [Official Space] (20)

CodeCamp 2010 | Diez formas de escribir código (in)seguro
CodeCamp 2010 | Diez formas de escribir código (in)seguroCodeCamp 2010 | Diez formas de escribir código (in)seguro
CodeCamp 2010 | Diez formas de escribir código (in)seguro
 
CodeCamp 2010 | Efectos especiales con Silverlight
CodeCamp 2010 | Efectos especiales con SilverlightCodeCamp 2010 | Efectos especiales con Silverlight
CodeCamp 2010 | Efectos especiales con Silverlight
 
CodeCamp 2010 | FBI- Fácil Business Intelligence
CodeCamp 2010 | FBI- Fácil Business IntelligenceCodeCamp 2010 | FBI- Fácil Business Intelligence
CodeCamp 2010 | FBI- Fácil Business Intelligence
 
CodeCamp 2010 | Hyper-V en Windows Server 2008 R2 e interoperabilidad con Linux
CodeCamp 2010 | Hyper-V en Windows  Server 2008 R2 e interoperabilidad con LinuxCodeCamp 2010 | Hyper-V en Windows  Server 2008 R2 e interoperabilidad con Linux
CodeCamp 2010 | Hyper-V en Windows Server 2008 R2 e interoperabilidad con Linux
 
CodeCamp 2010 | Productividad mas allá de la velocidad de tus dedos (cazzulin...
CodeCamp 2010 | Productividad mas allá de la velocidad de tus dedos (cazzulin...CodeCamp 2010 | Productividad mas allá de la velocidad de tus dedos (cazzulin...
CodeCamp 2010 | Productividad mas allá de la velocidad de tus dedos (cazzulin...
 
CodeCamp 2010 | Un paseo por WCF 4.0
CodeCamp 2010 | Un paseo por WCF 4.0CodeCamp 2010 | Un paseo por WCF 4.0
CodeCamp 2010 | Un paseo por WCF 4.0
 
CodeCamp 2010 | Desarrollo de videojuegos fuera de control
CodeCamp 2010 | Desarrollo de videojuegos fuera de controlCodeCamp 2010 | Desarrollo de videojuegos fuera de control
CodeCamp 2010 | Desarrollo de videojuegos fuera de control
 
CodeCamp 2010 | Recorriendo ocs 2010
CodeCamp 2010 | Recorriendo ocs 2010CodeCamp 2010 | Recorriendo ocs 2010
CodeCamp 2010 | Recorriendo ocs 2010
 
Novedades de vs 2010 y net 40
Novedades de vs 2010 y net 40Novedades de vs 2010 y net 40
Novedades de vs 2010 y net 40
 
Run 2 0 keynote azure
Run 2 0 keynote azureRun 2 0 keynote azure
Run 2 0 keynote azure
 
Run 20 Track SQL Server
Run 20 Track SQL ServerRun 20 Track SQL Server
Run 20 Track SQL Server
 
Run 20 programando sobre sharepoint 2010
Run 20 programando sobre sharepoint 2010Run 20 programando sobre sharepoint 2010
Run 20 programando sobre sharepoint 2010
 
(25.03) RUN 09 - Sesiones Desarrollo - SI 2.0
(25.03) RUN 09 - Sesiones Desarrollo - SI 2.0(25.03) RUN 09 - Sesiones Desarrollo - SI 2.0
(25.03) RUN 09 - Sesiones Desarrollo - SI 2.0
 
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Visión técnica
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Visión técnica(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Visión técnica
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Visión técnica
 
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Services 3
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Services 3(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Services 3
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Services 3
 
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Moss
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Moss(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Moss
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Moss
 
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Mapa De Ruta
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Mapa De Ruta(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Mapa De Ruta
(28.04) MOSSCA Invita - Bienvenidos a la casa de Sharepoint - Mapa De Ruta
 
(27.05) MOSSCA Invita - Búsqueda empresarial 2
(27.05) MOSSCA Invita - Búsqueda empresarial 2(27.05) MOSSCA Invita - Búsqueda empresarial 2
(27.05) MOSSCA Invita - Búsqueda empresarial 2
 
(27.05) MOSSCA Invita - Búsqueda empresarial 1
(27.05) MOSSCA Invita - Búsqueda empresarial 1(27.05) MOSSCA Invita - Búsqueda empresarial 1
(27.05) MOSSCA Invita - Búsqueda empresarial 1
 
(25.03) RUN 09 - Sesiones Desarrollo - Azure Live
(25.03) RUN 09 - Sesiones Desarrollo - Azure Live(25.03) RUN 09 - Sesiones Desarrollo - Azure Live
(25.03) RUN 09 - Sesiones Desarrollo - Azure Live
 

[Run Reloaded] ¡No hay problema! Tenemos Data Protection Management 2010 (Leandro Sgallari + Mauro Viglietti)

  • 1.
  • 2. DPM 2010 Mauro Viglietti maurov@tisistemas.com.ar Leandro Sgallari leandros@tisistemas.com.ar TI Sistemas www.tisistemas.com.ar
  • 3. Session Objectives and Takeaways Session Objective Understand what is coming in DPM v3 Best for Windows Servers – from Microsoft Huge client protection capability Enterprise ready
  • 4. Agenda Vision of DPM v3 Server features, with special focus on HyperV Client features Scalability, Reliability, Manageability
  • 5. SERVER features “Best for Windows Servers – from Microsoft”
  • 6. DPM v3 – Enhanced Datasources
  • 7. DPM & Hyper-V Roadmap
  • 8. DPM v3 – Live Migration & CSV’s 2. The VM is Live Migrated from Cluster Node A to Cluster Node C LAN 3. DPM automatically performs next incremental backup of the Live Migrated VM from Cluster Node C 1. DPM performs incremental backup of VM from Cluster Node A
  • 9. CLIENT features “Best of Breed protection for Windows” Client-DPML will be in E-CAL for FY10
  • 10. Edge Network Internet Backup over VPN Backups outside corporate network LAN clients Remote clients
  • 11. DPM v3 – Laptops Best in class laptop protection for Windows Clients Backup over VPN Support for XP, Vista, and W7 Scale to 1000 clients per DPM server “Unique user data” only Not the whole machine, so that the OS is not repeatedly backed up Integration with local Shadow Copies for Vista & W7 Centrally configured from DPM admin UI End User enabled restore from local copies offline and online, as well as DPM copies Admin enabled restore from DPM copies
  • 12.
  • 13. High value data but expensive to back it up
  • 14. Need to empower users within corporate policies
  • 15.
  • 16. Manage with aggregated alerts and reports
  • 17. End user functionality as enabled by administrator
  • 18.
  • 19. DPM v3 – File protection rules Create a template of default includes and excludes for backup and identify any specific file types you want to exclude
  • 20. Besides the familiar backup schedule options, you configure DPM to show alerts based on how many days backups have not happened DPM v3 – Frequency and Alerts
  • 21. Define the disk space usage you want to allocate for all the client computers selected DPM v3 – storage allocation
  • 22. End user data can be seamlessly backed up by default – no user action required Simple user interface, with quick access to common tasks DPM v3 – End user interface
  • 23. More details and customizability for power users DPM v3 – End user interface
  • 24. User recovery experience integrated with Windows Explorer DPM v3 – End user interface
  • 25. DPM v3 – Client feature summary IT admin benefits End user benefits Easy to deploy and configure SLA based alerting In the box reports for disk usage Efficient disk usage by storing only changed blocks for each client No action needed – backed up by default! Low overhead agent End user recovery from local backups even not connected Backup over VPN

Notes de l'éditeur

  1. We are most focused on what makes DPM unique – our core MS apps protectionBest of breed support, most supportable recovery
  2. BIG INVESTMENT – UNDENIABLY BEST SUPPORT AVAILABLE FOR WINDOWS CLIENTSNOTE : W7 direct access is not currently committed to RTM. When discussing VPN protection, discuss with customer what the timeline is for adopting DirectAccess. Planned for DPM v3 SP1 unless customer feedback is overwhelming.
  3. Select the laptops in your environment
  4. Specify folders to backupYou can specify generic folders like “My Documents” for all selected laptops.You can specify exceptions like – don’t backup “My Pictures” for all selected laptops.You can also specify exclusions based on file type like don’t backup *.mp3
  5. DPM admin can choose the alerting option on when should he be notified about failing backups for a client.
  6. This is in response to early DPM 2007 adopters – DPM servers need to protect more production servers each.