Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Set up the protection agent


Updated: September 30, 2015

Applies To: System Center 2012 SP1 - Data Protection Manager, System Center 2012 - Data Protection Manager, System Center 2012 R2 Data Protection Manager

After data backup storage is set up, you can configure protection. The first step is to install the DPM protection agent software on each computer or server that you want to protect with DPM. On the computer, the agent identifies data that DPM can protect and recover, tracks changes to that data, and transfers the changes from the protected computer to the DPM to synchronize the source data with the replica.

This section covers the following articles:

  1. Install the DPM protection agent—You can use any of the following methods:

    • Install the agent from the DPM console if the resource you want to protect isn’t behind a firewall.

    • Install the agent manually if the resource is behind a firewall.

    • Install the agent on a RODC.

    • Install the agent using a server image.

    • Install the agent using System Center Configuration Manager.

  2. Attach the DPM protection agent—You must manually attach the agent running on the computer to the DPM server if you installed the agent on:

    • A computer or server that is behind a firewall.

    • A computer that had the agent installed in the past.

    • A computer or server in a workgroup or untrusted domain.

  3. Update the DPM protection agent—You can update the agent on a computer even if it is not connected to a network.

  4. Configure firewall exceptions for the agent—If the protected computer or server is behind a firewall, you need to create exceptions for the DPM protection agent.

Next steps

After the DPM protection agents are installed, you can create protection groups containing the servers, computers, and workloads that you want to protect. For more information on planning and creating protection groups, see Plan for protection groups and Configure protection groups.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2015 Microsoft