Installing the shadow copy client software, See also, Security considerations – Dell PowerVault DP600 User Manual

Page 65

Advertising
background image

65

2. Creating a container

3. Granting the DPM server permissions to change the contents of the container

4. Adding mappings between source shares and shares on the replicas

The schema is extended only once; however, you must configure the Active Directory schema

extension for each DPM server. When you enable end-user recovery for additional DPM servers

in the domain, the process performs steps 3 and 4 for each additional server. DPM will update the

share mapping (step 4) after each synchronization, if needed.

DPM administrators who are both schema and domain administrators in the Active Directory

Domain Services domain can complete these steps with a single click in DPM Administrator

Console. DPM administrators who are not schema and domain administrators can complete

these steps by directing a schema and domain administrator to run the DPMADSchemaExtension

tool.

The DPMADSchemaExtension tool is stored on the DPM server in the folder Microsoft Data

Protection Manager\2006\End User Recovery. A user who is both a schema and domain

administrator can run the tool on any computer running Windows Server 2003 that is a member of

the domain in which the DPM server is deployed. The administrator must specify the name of the

DPM server when running the tool.

If you use the DPMADSchemaExtension tool to enable end-user recovery, you must run it once

for each DPM server.

Installing the Shadow Copy Client Software

Before end users can begin independently recovering previous versions of their files, the DPM

recovery point client software must be installed on their computers. If a client for Shadow Copies

of Shared Folders is present on the computer, the client software must be updated to support

DPM.

The recovery point client software can be installed on computers running the Windows XP

operating system with Service Pack 2 (SP2) or later and Windows Server 2003 with or without

SP1.

See Also

Planning the DPM Server Configurations

Security Considerations

Security Considerations

DPM operates as a high-privileged server on the network. To help ensure the security of the DPM

server, the DPM security architecture relies on the security features of Windows Server 2003 and

Active Directory Domain Services, SQL Server 2005, and SQL Server Reporting Services.

Advertising