Planning for Security

Published : April 8, 2005 | Updated : August 17, 2005

DPM operates as a high-privileged server on the network. Because DPM can back up and recover any file on a protected file server, the importance of security cannot be overstated. To help ensure the security of the DPM server, the DPM security architecture relies on the security features of Windows Server 2003 and Active Directory, Microsoft® SQL Server™ 2000, and SQL Server Reporting Services.

To maintain the DPM security architecture:

  • Accept all default security settings.

  • Do not install unnecessary software on the DPM server.

  • Do not change security settings after DPM is deployed. In particular, do not change SQL Server 2000 settings, Internet Information Services (IIS) settings, DCOM settings, or settings for the local users and groups that DPM creates during product installation.

Installing unnecessary software and changing default security settings can seriously compromise DPM security. For a detailed description of the security architecture of DPM, see the DPM 2006 Operations Guide (https://go.microsoft.com/fwlink/?LinkId=46363).