Chapter 8. Exchange Server Protection
In this chapter, we will cover the following recipes:
- Understanding the prerequisites of supported Exchange server protections
- Configuring Exchange server protection
- Understanding how to adapt DPM to Exchange server management tasks
- Understanding how to adapt DPM to Exchange server maintenance tasks
- Protecting a single Exchange mailbox database
- Understanding how DPM protects DAG configurations
- Understanding how DPM can verify data integrity using ESEUTIL
- Restoring an Exchange mailbox database to its original location
- Restoring an Exchange mailbox database to an alternative location
- Restoring an Exchange mailbox database to an Exchange Recovery Database
- Restoring an Exchange mailbox database to a network folder
- Copying the Exchange mailbox database to tape