See Also ..................................................................................................................................... 53
Choosing a Replica Creation Method ............................................................................................ 53
Automatic Replica Creation ........................................................................................................ 54
Manual Replica Creation ............................................................................................................ 54
See Also ..................................................................................................................................... 55
Planning for DPM Deployment ...................................................................................................... 55
In This Section ............................................................................................................................ 55
Planning the DPM Server Configurations ...................................................................................... 55
In This Section ............................................................................................................................ 56
See Also ..................................................................................................................................... 56
Selecting the Number of DPM Servers ......................................................................................... 56
Snapshot Limit ............................................................................................................................ 57
See Also ..................................................................................................................................... 58
Locating the DPM Servers ............................................................................................................. 58
Selecting the Instance of SQL Server ........................................................................................... 59
See Also ..................................................................................................................................... 59
Planning the Storage Pool ............................................................................................................. 59
In This Section ............................................................................................................................ 60
See Also ..................................................................................................................................... 60
Calculating Capacity Requirements .............................................................................................. 60
Estimating Daily Recovery Point Size ........................................................................................ 61
Determining Retention Range Objectives .................................................................................. 61
See Also ..................................................................................................................................... 62
Planning the Disk Configuration .................................................................................................... 62
See Also ..................................................................................................................................... 63
Defining Custom Volumes ............................................................................................................. 63
Planning the Tape Libraries Configuration .................................................................................... 63
See Also ..................................................................................................................................... 64
End-User Recovery Considerations .............................................................................................. 64
Configuring Active Directory Domain Services .......................................................................... 64
Installing the Shadow Copy Client Software .............................................................................. 65
See Also ..................................................................................................................................... 65
Security Considerations ................................................................................................................. 65
In This Section ............................................................................................................................ 66