Microsoft Office Tutorials and References
In Depth Information
DPM SQL instance
DPM SQL instance
DPM contains a SQL database as part of its architecture. This SQL database contains
all of the DPM settings and the configuration information. DPM 2007 could use an
instance on SQL server 2005 for its database. It is important to note that DPM 2010
requires an instance on SQL server 2008 SP1, Standard or Enterprise Edition. When
you install DPM you have the option to use a SQL instance that DPM will install
locally on the same server as DPM. This local instance runs on top of SQL Server
2008 Standard Edition. DPM uses a special version that was built specifically for it
and is a full SQL server that does not require a license.
You will also get the option to place the DPM database on a remote SQL 2008
instance. This would be a SQL 2008 server that is separate from the DPM server.
You would need a full SQL server license on the remote SQL server. DPM requires
that your remote SQL instance should have the SQL Server Database Engine and
Reporting Services components installed.
DPM security
DPM can be a serious security risk if it is compromised. Think about all the data
running through your DPM server, e-mail, HR data, financial data, and customer
data. If someone were to get their hands on any of this data that could mean big
problems for you. DPM functions on a high-privileged level in the network. One
of the easy ways to compromise a DPM server is to start installing unnecessary
software and changing the default security settings. These are things you do not
want to do. The best action is to keep the default DPM security architecture. During
your installation of DPM you will want to accept all security defaults and if you run
your DPM database on a remote SQL instance, do not run the instance as the local
system and do not modify SQL Server 2008 settings, Internet Information Services
(IIS) settings, DCOM settings, or settings of local users and groups that are created
during the DPM installation. DPMs security architecture is built upon the security
features of Windows Server 2008, Active Directory Domain Services, SQL Server
2008, and SQL Server Reporting Services. DPM will configure the settings it needs in
those areas during the installation.
The other part of DPM security is to know about user privileges needed to install
and operate DPM. In small IT environments that have a couple of administrators that
wear many hats this won't matter as the administrators will typically all have the full
access they need to install and operate DPM. Here are the different types of access
you will need to install DPM and for performing certain tasks in DPM:
Search JabSto ::

Custom Search