Document Naming Conventions
Applies To: System Center Data Protection Manager 2010
In general, product references in System Center Data Protection Manager (DPM) 2010 Help refer to abbreviated names of Microsoft products or components. The following table lists both the full names and the abbreviated versions of the names for each Microsoft product or component referenced in DPM 2010 Help.
Product or component name | Referred to in DPM Help as |
---|---|
DPM 2010 Administrator Console |
DPM Administrator Console or the console |
Microsoft ASP.NET 2.0 |
ASP.NET 2.0 |
Microsoft Internet Explorer |
Internet Explorer |
Microsoft Office Excel 2007 |
Excel 2007 or Excel |
Microsoft Office Professional Edition 2007 Microsoft Office Basic Edition 2007 Microsoft Office Small Business Edition 2007 Microsoft Office Standard Edition 2007 Microsoft Office Personal Edition 2007 |
Office 2007 |
Microsoft Office Word 2007 |
Word 2007 or Word |
Microsoft Operations Manager 2005 |
MOM 2005 or MOM |
System Center Operations Manager 2007 |
Operations Manager |
Microsoft SQL Server |
SQL Server |
Microsoft SQL Server Reporting Services |
SQL Server Reporting Services or Reporting Services |
Microsoft System Center Data Protection Manager 2010 |
Data Protection Manager 2010, DPM 2007, or DPM |
System Center Data Protection Manager 2010 Agent Coordinator |
DPM Agent Coordinator or agent coordinator |
System Center Data Protection Manager 2010 Protection Agent |
DPM Protection Agent, protection agent, or agent |
System Center Data Protection Manager 2010 Management Pack |
DPM 2010 Management Pack or DPM Management Pack |
Volume Shadow Copy Service |
VSS |
Document Naming Conventions
DPM Help contains a number of references to product documentation that is either integrated with the DPM product or available on the Web. The following table lists both the full names and the abbreviated versions of the names of each document referenced in DPM 2010 Help.
Document | Referred to in DPM Help as |
---|---|
System Center Data Protection Manager 2010 Planning Guide |
Planning a DPM 2010 Deployment |
System Center Data Protection Manager 2010 Deployment Guide |
Deploying DPM 2010 |
System Center Data Protection Manager 2010 Operations Guide |
DPM 2010 Operations Guide |
System Center Data Protection Manager 2010 Upgrade Guide |
Upgrading DPM 2006 to DPM 2010 |
System Center Data Protection Manager 2010 Troubleshooting Guide |
DPM 2010 Troubleshooting Guide |
System Center Data Protection Manager 2010 Getting Started Guide |
DPM 2010 Getting Started Guide |
System Center Data Protection Manager 2010 Walkthrough |
DPM 2010 Walkthrough |
System Center Data Protection Manager 2010 System Requirements |
DPM 2010 System Requirements |
System Center Data Protection Manager 2010 Management Pack Guide |
DPM 2010 Management Pack Guide |
System Center Data Protection Manager 2010 Release Notes |
DPM 2010 Release Notes |
System Center Data Protection Manager 2010 Release Notes |
DPM 2010 Known Issues |
Text Conventions
The conventions listed in the following table are used in DPM 2010 Help to distinguish elements of the text.
Convention | Use |
---|---|
Bold |
Represents user interface elements such as actions in the Actions pane, commands on menus and buttons, dialog box titles and options, and icon and menu names. Commands, command options, and syntax that must be typed exactly as shown are also bold. |
<text> |
In syntax statements or descriptive text, indicates variable names or placeholders for which you or DPM may supply a specific value. |
Italic |
Used to introduce new terms and for book titles. |
Title case |
Indicates dialog box names, column names, user names, computer names, directory names, and folder and file names, except when specifically referring to case-sensitive names. |
Reader Alert Conventions
Reader alerts are used throughout DPM Help to notify you of both supplementary and essential information. The following table explains the meaning of each alert.
Reader Alert | Meaning | ||
---|---|---|---|
|
Alerts you to supplementary information that is useful to the completion of a task. |
||
|
Alerts you to supplementary information that is essential to the completion of a task. |
||
|
Alerts you to possible data loss, security issues, or other more serious problems. |
||
|
Warns you that failure to take or avoid a specific action might result in a malfunction of the hardware or software. |