Installing and configuring Data Protection for Microsoft Exchange Server

You can quickly install and configure Data Protection for Exchange Server to start protecting your Exchange Server data.

Before you begin

Before you install and configure Data Protection for Exchange Server, verify that you satisfy the hardware and software requirements.
You can obtain the installation package from the product DVD or from an IBM® download site.
  • If you obtain the package from the product DVD, ensure that the installation files are visible on the DVD drive.
  • If you obtain the package from an IBM download site, you must extract the installation files.

About this task

Data Protection for Exchange Server is available in both licensed and maintenance packages. The installation process differs based on the package type.

Licensed package
Includes a license enablement file that is only available from your software distribution channel, such as Passport Advantage®, and includes the initial General Availability release of a product or component.
Maintenance update (fix pack or interim fix package)
Available from the maintenance delivery channel, and can sometimes be used to refresh the software distribution channel. Maintenance packages do not contain license enablement files and must be installed after a licensed package.

See the README.FTP file for information about how to install a fix pack or interim fix package. The README.FTP file is available in the same directory where the maintenance package is downloaded.

Installing Data Protection for Exchange Server

Procedure

  1. Log on to the system as an administrator.
  2. Download the appropriate package file from one of the following websites, or you can access the files from the product DVD:
  3. If you download the package from one of the download sites, complete the following steps:
    1. Verify that you have enough space to store the installation files when they are extracted from the product package.
    2. Change to the directory where you placed the executable file.
      Tip: In the next step, the files are extracted to the current directory. The path must contain no more than 128 characters. Extract the installation files to an empty directory. Do not extract the files to a directory that contains previously extracted files, or any other files.
    3. Either double-click the executable file, or enter the following command on the command line to extract the installation files. The files are extracted to the current directory.
      package_name.exe
      where package_name is like this example:
      7.1.2.0-TIV-TSMEXC-Win.exe
  4. Follow the installation instructions that are displayed.
  5. Click Finish.
  6. If you plan to use VSS operations, you must install the most recent version of the Tivoli Storage Manager backup-archive client. The backup-archive client is also the VSS Requestor and is available separately.

Completing the installation configuration

Procedure

  1. To start the MMC, click Start > All Programs > Tivoli Storage Manager > Data Protection for Microsoft Exchange Server > DP for Exchange Management Console. If you did not previously configure Data Protection for Exchange Server, the Tivoli Storage Manager configuration wizard starts automatically.
  2. If the Tivoli Storage Manager configuration wizard does not start automatically, click Manage > Configuration > Wizards in the tree view, select the wizard, and click Start in the Actions pane.
  3. Complete the following pages of the wizard:
    Data Protection Selection
    Select Exchange Server as the application to protect.
    Requirements Check
    Click any Failed or Warnings links to resolve errors.

    If you do not have all the user roles that are required for individual mailbox restore operations, click the Warnings link and follow the wizard prompts to add the missing Exchange Server roles. If you are a member of the Exchange Organization Management group and have sufficient role-based access control (RBAC) permissions, you can automatically add the missing roles. If you are not a member of the Exchange Organization Management group and have insufficient RBAC permissions, you must manually add the missing roles.

    TSM Node Names
    Specify the Tivoli Storage Manager node names to use for the applications that you want to protect.
    • In the VSS Requestor field, enter the node name that communicates with the VSS Service to access the Exchange data. This node name is the Tivoli Storage Manager client node name, also known as the DSM agent node name.
    • In the Data Protection for Exchange field, enter the node name where the Data Protection for Exchange Server application is installed. This node stores the Data Protection for Exchange Server backups. If you configure the DAG Node, the DAG database backups are not stored under the Data Protection node. The backups are stored under the DAG node. Regardless, the Data Protection node must be defined.
    • In the DAG Node field, enter the node name that you want to use to back up databases in an Exchange Server Database Availability Group. With this setting, all active and passive copies of the databases are backed up to the same file space on the Tivoli Storage Manager server. The database copies are managed as a single entity, regardless of which Database Availability Group member they were backed up from. This setting can prevent Data Protection for Exchange Server from making too many backups of the same database.
      Important: On the Tivoli Storage Manager server, ensure that you register the DAG node. All DAG members need proxy authority to run backups on behalf of the DAG node.
    TSM Server Settings
    Specify the Tivoli Storage Manager server address, and choose whether to have the wizard configure the Tivoli Storage Manager server. Alternatively, you can view and change the commands that the configuration wizard uses to configure the Tivoli Storage Manager server, or run manually run the commands.
    Custom Configuration
    Click Default in most situations, or click Custom to enter all service-related information.
    TSM Configuration
    Wait for all components to be provisioned and configured. Click Re-run if there are any problems. Click the Failed or Warnings link for more information if any problems remain.
    Completion
    The configuration status is displayed. Select the VSS Diagnostics check box to begin VSS verification.

    If you do not use the wizard to configure the Tivoli Storage Manager server, the Tivoli Storage Manager administrator must configure the server before verification can be completed. If the wizard does not configure the server, it provides a link to a macro that can be provided to the Tivoli Storage Manager administrator as an example of one way to configure the server.

Verifying the configuration

Procedure

  1. Verify that VSS is working correctly.

    If the VSS Diagnostics check box is selected at the completion of the configuration wizard, the VSS Diagnostics wizard is displayed. You can also start this wizard by clicking Manage > Diagnostics, and clicking VSS Diagnostics in the Actions pane.

    Do not run these tests if you are already using SAN Volume Controller or Storwize® V7000 space-efficient snapshots on your computer. Doing so can result in the removal of previously existing snapshots.

  2. Complete the following pages in the VSS Diagnostics wizard:
    Snapshot Volume Selection
    Select the volumes that you want to test and review the VSS provider and writer information.
    VSS Snapshot Tests
    Review event log entries that are logged as the persistent and non-persistent snapshots are taken, and resolve any errors.
    Completion
    Review the test status and click Finish.
  3. Verify that Data Protection for Exchange Server is configured properly:
    1. Click the Automate tab. An integrated command line is available in the task window. You can use the interface to enter PowerShell cmdlets or command-line interface commands. The output is displayed in the main window.
    2. Change PowerShell to Command Line.
    3. Click the folder icon, and select the verify_exc.txt file. Then, click Open. These commands are displayed in the command-line pane:
      query tdp
      query tsm
      query exchange
    4. With the cursor in the command-line pane, press Enter to run the commands to verify your configuration. The configuration is verified when these commands run without warnings or errors.
    5. When verification is complete, you can use Data Protection for Exchange Server to back up and restore Exchange Server data.
    6. Back up and restore a set of test data.

Customizing the configuration

Procedure

After you successfully configure Data Protection for Exchange Server, define your policy settings and scheduled operations to meet your business requirements.