Installing Protection Agents on Computers Outside of a Firewall
Updated: November 1, 2013
Applies To: System Center 2012 - Data Protection Manager, System Center 2012 R2 Data Protection Manager, System Center 2012 SP1 - Data Protection Manager
Before you install protection agents on the computers that you want to protect, note the following:
If a firewall is enabled on a protected computer, you must install the protection agent manually. For information about installing protection agents on a computer that is behind a firewall, see Installing Protection Agents on Computers Behind a Firewall.
If the firewall is not enabled on a protected computer, or if there are exceptions in Windows Firewall that allow the protection agent to communicate with the DPM server, use the following procedure to install a protection agent. For more information about configuring Windows Firewall for DPM, see Configuring Windows Firewall on the DPM Server.
To install a protection agent on a computer outside of a firewall
In DPM Administrator Console, click Management, and then click Agents.
Click Install on the tool ribbon.
The Protection Agent Installation Wizard opens.
On the Select Agent Deployment Method page, click Install agents, and then click Next.
On the Select Computers page, DPM displays a list of available computers that are in the same domain as the DPM server. If this is the first time you have used the wizard, DPM queries Active Directory to get a list of available computers. After the first installation, DPM stores the list of computers in its database, which is updated once each day by the auto-discovery process.
If you know the name of a specific computer on which you want to install a protection agent, you can quickly locate the computer by typing all or part of its name in the Computer name box, and then clicking Add.
To find a computer in another domain that has a two-way trust relationship with the domain that the DPM server is located in, you must type the fully qualified domain name of the computer that you want to protect (for example, <Computer1>.Domain1.contoso.com, where Computer1 is the name of the computer that you want to protect, and Domain1.contosa.com is the domain to which the target computer belongs.
In the Computer name list, select one or more computers (up to a maximum of 50), click Add, and then click Next.
Note The Advanced button on the Select Computers page is enabled only when there is more than one version of a protection agent available for installation on the computers. If it is enabled, you can use this option to install a previous version of the protection agent that was installed before you upgraded DPM server to a more recent version.
On the Enter Credentials page, type the user name and password for a domain account that is a member of the local Administrators group on all selected computers.
In the Domain box, accept or type the domain name of the user account that you are using to install the protection agent on the target computer. This account may belong to the domain that the DPM server is located in or to a domain that has a two-way trust relationship with the domain that the DPM server is located in.
If you are installing a protection agent on a computer across a trusted domain, enter your current domain user credentials. You can be a member of any domain that has a two-way trust relationship with the domain that the DPM server and you must be member of the local Administrators group on all selected computers on which you want to install an agent.
If you select a node in a cluster, DPM detects all additional nodes in the cluster and displays the Select Cluster Nodes page.
On the Select Cluster Nodes page, in the Cluster node selection section, select an option that you want DPM to use for installing agents on additional nodes in the cluster, and then click Next.
On the Choose Restart Method page, select the method to use to restart the selected computers after the protection agent is installed. The computer must be restarted before you can start protecting data. A restart is necessary to load the volume filter that DPM uses to track and transfer block-level changes between DPM server and the protected computers.
If you select No. I will restart the selected computers later, after the computers restart, the protection agent installation status is not automatically refreshed on the Agents tab in the Management task area. To refresh the protection agent installation status, click one or more computers in the details pane, and then click Refresh Information.
Note You do not need to restart the computer if you are installing a protection agent on another DPM server.
If any of the computers that you selected are nodes in a cluster, an additional Choose Restart Method page appears that you can use to select the method to restart the clustered computers.
You must install a protection agent on all nodes in a cluster to successfully protect the clustered data. The computers must be restarted before you can start protecting data. Because of the time required to start services, it might take a few minutes after a restart before DPM can contact the agent on the cluster.
Note DPM will not automatically restart a computer that belongs to a Microsoft Cluster Server (MSCS) cluster. You must manually restart computers in an MSCS cluster.
On the Summary page, click Install to begin the installation.
On the Installation page, the results appear on the Task tab to indicate whether the installation is successful. You can click Close before the wizard is finished performing the tasks, and then monitor the installation progress in DPM Administrator Console on the Agents tab in the Management task area.
If the installation is unsuccessful, you can view the alerts in the Monitoring task area on the Alerts tab.
|After you install a protection agent on a computer that is part of a Windows SharePoint Services farm, each of the computers in the farm will not appear as protected computers on the Agents tab in the Management task area, only the computer that you selected. However, if the Windows SharePoint Services farm has data on the selected computer, DPM protects the data on all of the computers in the farm, provided all of them have the protection agent installed.|
For additional resources, see Information and Support for System Center 2012.
Tip: Use this query to find online documentation in the TechNet Library for System Center 2012. For instructions and examples, see Search the System Center 2012 Documentation Library.