本文件已封存並已停止維護。

Application Data

更新日期: 2010年4月

適用於: System Center Data Protection Manager 2010

You can use DPM to protect the following types of application data:

  • Exchange Server Storage Groups. DPM can protect storage groups for Microsoft Exchange Server 2003 SP2 and Exchange Server 2007.

    • You cannot exclude from protection any database in the selected storage group.

    • All storage groups on a computer running Exchange Server 2003 must be members of the same protection group or protection of these storage groups will fail.

    • You should disable circular logging for protected storage groups.

  • SQL Server Databases. DPM can protect databases for Microsoft SQL Server 2000 SP4, SQL Server 2005 SP1, and SQL Server 2005 SP2.

    • Each database in an instance of SQL Server can belong to the same or a different protection group.

    • You cannot exclude from protection any data in the selected database.

  • DPM does not support incremental backups for the following databases:

    • SQL Server 2000 and SQL Server 2005 master databases

    • SQL Server 2000 msdb database

    • SQL Server 2000 model database

  • Windows SharePoint Services Data. DPM can protect server farms for servers running Windows SharePoint Services 3.0 or Office SharePoint Server 2007.

    • You cannot exclude from protection any data in the selected farm.

  • Virtual Server and Virtual Machines. DPM can protect a Virtual Server host (a computer running Virtual Server 2005 R2 SP1) and the guests, or virtual machines, running in the context of that host.

In addition, DPM can protect the data of applications running in the guest. However, data for applications running on virtual machines must be protected and recovered as an application data source, not as a component of a protected virtual machine. For example, to protect and recover data for an instance of SQL Server running on a virtual machine, you select the data source as a SQL Server database. When you protect a virtual machine, application data is also protected, but it can be recovered only by recovering the virtual machine itself.

另請參閱

顯示: