Dell PowerVault DP600 User Manual

Page 44

Advertising
background image

44

the Computer name list, click Add, and then click Next.

If you know the name of a specific computer on which you want to install the protection

agent, you can quickly find and select the computer by typing the name of the computer

in the Computer name box, and then clicking Add. DPM will query Active Directory for

the computer, and then add it to the Selected computers list. If you do not know the

name of the computer, browse the list to find the computer.

To find a computer across a trusted domain, you must type the fully qualified domain

name of the computer you want to protect (for

example, Computer1.Domain1.corp.microsoft.com, where Computer1 is the name of

the target computer that you want to protect, and Domain1.corp.microsoft.com is the

domain to which the target computer belongs.

Note

The Advanced button on the Select Computers page is enabled only when

there is more than one version of a protection agent available for installation on

the computers. If it is enabled, you can use this option to install a previous

version of the protection agent that existed before you updated to the most

recent version.

4. On the Enter Credentials page, type the user name and password for a domain account

that is a member of the local administrators group on all selected servers.

5. In the Domain box, accept or type the domain name of the user account that you are

using to install the protection agent on the target computer. This account may belong to

the current or trusted domain.

If you are installing a protection agent on a computer across a trusted domain, you enter

your current domain user credentials. You can be a member of any trusted domain, and

you must be an administrator on the target server that you want to protect.

If you selected a node in a server cluster, DPM detects the additional nodes in the cluster

and displays the Select Cluster Nodes page.

• On the Select Cluster Nodes page, in the Cluster node selection section, select

the option that you want DPM to use for selecting the remaining nodes in the cluster,

and then click Next.

6. On the Choose Restart Method page, select the method you will use to restart the

computers after the protection agent is installed. The computer must be restarted before

you can start protecting data. This restart is necessary to load the volume filter that DPM

uses to track and transfer block level changes between DPM and the computers it

protects.

If you select No. I will restart the selected computers later, after the restart is complete

and if the protection agent installation status is not refreshed on the unprotected server,

in the Management task area on the Agents tab, click Refresh Information.

Note

You do not need to restart the computer if you are installing protection agents on

Advertising