Microsoft Office Tutorials and References
In Depth Information
End-user recovery requirements
Used between DPM and the protected computer,
between DPM and the domain controller, and between
the protected computer and the domain controller,
for miscellaneous operations. Used for SMB directly
hosted on TCP/IP for DPM functions.
( Source: DPM deployment and planning guide 2010)
There tends to be a lot of posts regarding what ports to open on client firewalls to
install the DPM agent. The note from the previous chart addresses these issues by
opening ports 1024-65535 on the computer you want to protect. After you open those
ports, the agent should be able to install through the firewall. The other option is to
disable the Windows firewall on the clients' computers you will be protecting. Note
that disabling the Windows firewall on the computers you want to protect is a
security risk.
End-user recovery requirements
DPM is capable of end-user recovery. This is great for administrators and end-users
alike. It gives power to end-users if they need to recover some data they have lost.
The end-users can only recover data that is within folders. When planning your DPM
deployment you should consider what data will be end-user recoverable so you can
specify this in DPM.
If you have shares on your servers that use shadow copies you can remove this and
get the space back that these shadow copies were using. With end-user recovery
you don't need to have shadow copies. End-user recovery essentially does the same
thing. It allows users to recover previous versions of their data. Later, in Chapter 8 we
will cover how to set up end-user recovery in DPM.
Search JabSto ::

Custom Search