Getting Started with Exchange 2010 Backup and Recovery
- 27m 1s
—Bio of Your Instructor
2m 53s
—In The Trenches: True Disaster Stories
4m 23s
—The Key to Disaster Recovery
2m 23s
—The Evolution of Data Resiliency
5m 45s
—What Has To Be Restorable?
5m 46s
—Become and Exchange Backup and Recovery Expert
2m 13s
—Are You Ready for This Course?
0m 55s
—The Course Building Blocks
1m 16s
—Closing Advice and Encouragement
1m 27s
The Course Scenario
- 9m 15s
—The Value of Scenario-Based Training
2m 27s
—Our Scenario: An Exchange Consulting Firm
1m 18s
—Scenario Structure
0m 40s
—Our Client Base
3m 11s
—Our Methodology
0m 53s
—What We Learned
0m 46s
—Ways to Set Up Your Lab
3m 53s
—The Course Lab Setup
7m 13s
—The VM Shell Process
6m 12s
—The OS and Domain Process
6m 15s
—Install Exchange 2010 SP1
4m 38s
—Reminders and Fine Points
3m 22s
—Adding Users and Mailboxes
3m 23s
—The Shoe-String Budget Lab
3m 1s
—What We Learned
0m 33s
An Overview of Disaster Recovery
- 38m 45s
—Scenario: DREC Launch Meeting at Headquaters
1m 39s
—Resiliency, Redundancy and Recovery
3m 44s
—Review of RAID Concepts (RAID 1)
0m 48s
—Review of RAID Concepts (RAID 5)
3m 19s
—Backup Types
6m 25s
—Backup Storage Concepts
7m 18s
—Backup Planning and Management
6m 27s
—Rotation Methods to Consider
4m 36s
—Software Solutions for Exchange
1m 57s
—Cloud-Based Solutions for Exchange
1m 50s
—What We Learned
0m 42s
Storage Architecture and Backup/Recovery Basics
- 53m 21s
—Scenario: Second Half of DREC Review Sessions
1m 36s
—Storage Architecture
3m 50s
—Database Best Practice Suggestions
4m 7s
—Deleted Retention Times and the AD Recycle Bin
4m 10s
—Backup and Recovery Basics
7m 4s
—Client Deleted Items
2m 6s
—Deleted Mailbox Retention and Active Directory Recycle Bin
16m 47s
—Windows Server Backup Review
3m 59s
—Database Portablility
2m 46s
—Using a Recovery Database (RDB)
2m 14s
—Dial Tone Portability
3m 12s
—What We Learned
1m 30s
Windows Server Backup
- 43m 59s
—Scenario: St. Giro's Golf Course
2m 12s
—Windows Server Backup Review
1m 43s
—Backing Up the System State
2m 44s
—Installing Windows Server Backup
1m 52s
—Performing a Backup with Windows Server Backup
7m 35s
—Performing a Restore with Windows Server Backup
8m 10s
—Restoring an Exchange Server
2m 17s
—Steps for Recovering an Exchange Server
1m 21s
—Recovering an Exchange Server Demonstration
5m 7s
—Clone an Edge Transport Server
1m 49s
—Cloning an Edge Transport Server Demonstration
8m 19s
—What We Learned
0m 50s
Item and Mailbox Recovery with Windows Server Backup
- 33m 58s
—Scenario: St Giro's Golf Course
6m 25s
—Creating the Database
1m 49s
—Deleted Items and Mailbox Retention Times
0m 44s
—Email Database Backup
2m 14s
—Deleting Emails from User Mailboxes
1m 46s
—Create a New Recovery Database
2m 24s
—Create a New Folder for Backup Data
2m 41s
—Check Database Health with ESEUTIL Tool
2m 49s
—Copy Database into Recovery Database Location
4m 9s
—Restore-Mailbox cmdlet
2m 18s
—New-MailboxRestoreRequest cmdlet
5m 57s
—What We Learned
0m 42s
Dial Tone Recovery with Windows Server Backup
- 30m 48s
—Scenario: Completing St. Giro's Training
1m 21s
—The Behind the Scenes View
1m 58s
—The Process
3m 36s
—Restoring to a New Database
4m 13s
—Create a New Dial Tone Database
2m 44s
—Rehome Mailboxes
1m 6s
—Mailbox Recovery from Outlook View
3m 9s
—ESEUTIL Recovery to Alternate Folder
2m 29s
—Create a New Recovery Database
1m 30s
—Copy Recovered Database into Recovery Database Location
0m 42s
—Swapping the Dial Tone Database with the Recovery Database
3m 49s
—Merging the Dial Tone and Recovery Databases
3m 28s
—What We Learned
0m 43s
Data Protection Manager Setup
- 24m 16s
—Scenario: Borough Crossing Ferry
1m 59s
—Borough Ferry Crossing (BFC) Mimic Diagram
1m 24s
—Database and DAG Group
2m 28s
—Why Data Protection Manager?
2m 34s
—Data Protection Manager Protection
0m 55s
—DPM Agents and Protection Groups
1m 18s
—DPM Replicas and Synchronization
1m 11s
—DPM Storage Pools
1m 19s
—DPM Hardware and Software Requirements
2m 7s
—SQL Server Requirements
1m 9s
—SQL Server 2008 SP1 Installation
0m 58s
—Configuring SQL Server 2008 SP1
2m 56s
—System Center Data Protection Manager 2010 Installation
3m 32s
—What We Learned
0m 26s
Working with Data Protection Manager
- 42m 5s
—Scenario: Borough Crossing Ferry
0m 59s
—A Look at the DPM Administrator Console
1m 2s
—Configuring DPM
1m 12s
—Adding Disks to the DPM Storage Pool
2m 35s
—DPM Agent Installation Options
1m 28s
—Installing Agents
3m 44s
—Creating Your Protection Group
15m 15s
—Recovery of Exchange Data
2m 29s
—Important Recovery Caveats
12m 38s
—What We Learned
0m 43s
Third Party Solutions: CommVault Simpana
- 35m 48s
—Scenario: Coney Island Hot Dogs Franchise
1m 25s
—Scenario: Presenting Options
1m 17s
—What We Learned
0m 38s
—About CommVault
1m 27s
—Today's Data Challenges
0m 50s
—Simpana Overview
1m 32s
—CommVault Simpana Software and Exchange Server 2010
1m 37s
—Simpana Capabilities for Managing Exchange Data
2m 21s
—Setting up a CommCell
0m 43s
—Exchange Database iDataAgent Backups
0m 46s
—Demo: Exchange Backup/Recovery with CommVault Simpana
23m 12s
Third Party Solutions: Asigra Cloud Backupâ„¢
- 13m 53s
—Scenario: Coney Island Hot Dogs Franchise
0m 53s
—Scenario: Presenting Options
0m 48s
—About Asigra
0m 42s
—The Asigra Business Model
2m 6s
—The Asigra Architecture
0m 50s
—Asigra Cloud Backup for Exchange
3m 52s
—Asigra Cloud Backup
2m 21s
—A Look at the Interface
1m 21s
—Summary
0m 25s
—What We Learned
0m 35s
Third Party Solutions: Actifio â„¢
- 14m 2s
—Scenario: Coney Island Hot Dogs Franchise
0m 50s
—Scenario: Presenting Options
1m 0s
—About Actifio
0m 48s
—The Traditional Approach
0m 38s
—Where the Traditional Approach Isn't Working
1m 26s
—What if (VirtualData Pipeline VDP)
1m 2s
—Actifio Changes the Paradigm
1m 36s
—The Actifio Software Suite
0m 45s
—Actifio Solutions
0m 32s
—The 'Actifio Effect'
2m 34s
—Actifio Summary
1m 1s
—What We Learned
1m 50s
Replacing Backup/Recovery with High Availability
- 31m 59s
—Scenario: Globomantics
1m 14s
—The Globomantics Environment
1m 29s
—Microsoft's Deployment of Exchange 2010
3m 13s
—Microsoft Servers for Exchange 2010
1m 48s
—Microsoft DAG Configuration
2m 37s
—What is High Availability
2m 56s
—Continuous Replication
1m 33s
—Database Availability Group (DAG) Features
2m 23s
—Globomantics Goal: Two By Two
0m 58s
—Hub Transport HA
0m 43s
—Edge Transport HA
0m 58s
—Client Access HA
2m 32s
—Unified Messaging HA
0m 39s
—Questions for Globomantics
2m 16s
—The Globomantics Side Elements for HA
0m 57s
—Globomantics HA Existing DAG
2m 7s
—Globomantics HA Increasing Replicas
1m 20s
—Globomantics HA Proposed Solution
1m 1s
—What We Learned
1m 15s
Exchange Recovery Best Practices
- 19m 46s
—Scenario: DREC Expansion
1m 3s
—Basic Focus Points
4m 4s
—Retention Times and Database Protection
2m 27s
—Backup and Recovery Options
5m 36s
—Storage Calculators
6m 8s
—What We Learned
0m 28s
—Where You Started
1m 31s
—Course Building Blocks
3m 40s
—What You've Accomplished
1m 25s
—Where to Go from Here?
1m 35s
—My Favorite Supporting Resources
0m 51s
—Other Mountains to Climb
0m 53s
—We Value Your Opinion
0m 31s