Prescriptive Guidance on BMR vs System State By Data Source
Mis à jour: avril 2010
S'applique à: System Center Data Protection Manager 2010
This section provides guidance on how you can effectively use System Center Data Protection Manager 2010 (DPM) to protect your system information. The information is grouped by data source, so you can decide when to use BMR protection and when to use System State protection.
Unified Backup Strategy
File Servers
File system backup for data protection.
BMR backup for system protection.
Recovery Strategy | |
---|---|
Lost file data |
File recovery using DPM |
Lost or damaged operating system |
System State recovery using BMR backup |
Lost server (data volumes intact) |
BMR recovery using BMR backup |
Lost server (data volumes also lost) |
BMR recovery followed by file recovery |
SharePoint Farm
SharePoint farm backup for farm data.
BMR backup on Web front-end server to protect IIS role.
BMR or System State backup for servers hosting content database.
Recovery Strategy | |
---|---|
Lost site, lists, list items, documents |
SharePoint recovery using DPM |
Lost or damaged operating system |
System State recovery using BMR backup |
Disaster recovery |
BMR recovery using BMR backup |
Hyper-V Virtual Machines
Hyper-V host-level backup to protect virtual machines.
BMR backup of host computer at least once a day.
Recovery Strategy | |
---|---|
Lost virtual machine |
Use Hyper-V recovery features |
Lost or damaged operating system |
System State recovery using BMR backup |
Lost Hyper-V host (virtual machine intact) |
BMR recovery using BMR backup |
Lost Hyper-V host (virtual machine also lost) |
BMR recovery followed by Hyper-V recovery |
SQL Server or Exchange Server
Application backup to protect data.
BMR backup for system protection.
Recovery Strategy | |
---|---|
Lost application data |
Application-specific recovery using DPM |
Lost or damaged operating system |
System State recovery using BMR backup |
Lost server (database and transaction log files intact) |
BMR recovery using BMR backup |
Lost server (database and transaction log files also lost) |
BMR recovery followed by application-specific recovery |