Set up the protection agent
After data storage is in place, you can configure protection. The first step is to install the DPM protection agent software on each computer or server you want to protect with DPM. On the computer the agent identifies data that DPM can protect and recover, tracks changes to that data, and transfers the changes from the protected computer to the DPM server to synchronize the source data with the replica.
Install the DPM protection agent—You can install the DPM protection agent using a couple of methods. Including from the DPM console if the resource you want to protect isn’t behind a firewall, manually if it is, or using a server image.
Attach the DPM protection agent—If you install the agent on a computer or server behind a firewall, on a computer that already had the agent installed, or on a computer or server in a workgroup or untrusted domain, you’ll need to attach the agent running on the computer manually to the DPM server.
Update the DPM protection agent—You can update the agent on a computer connected to the network, or one that’s unconnected.
Configure firewall exceptions for the agent—If the protected computer or server is behind a firewall you’ll need to create exceptions for the DPM protection agent.
After agents are installed you can create protection groups containing the servers, computers, and workloads you want to protect.