Dpm agent manual install 2012
Make sure that you have the required applications installed on the protected computers, then try to reinstall the protection agent. This occurs even you clear the automatically restart option. To do this, at the command prompt, type the following command to query the related registry entries:.
Both the DPM server and the computer to be protected must be connected to the network during installation of a protection agent. Is a firewall enabled on the computer to be protected that could be blocking requests from the DPM server? If a firewall is enabled, you must configure the firewall to allow communication between the DPM server and the computer to be protected.
For information about how to configure the firewall, see Set up firewall exceptions. If a firewall is enabled, you must configure the firewall to allow installation of a protection agent on the computer. The Remote Registry service must be running on both the DPM server and the computer before you can install a protection agent. In Administrative Tools, start the Remote Registry service and then install the protection agent. RPC must be available.
Was the protected computer renamed or moved to another Active Directory domain after the protection agent was installed?
To uninstall a protection agent, the protected computer must have the same name and be in the same domain as it was when the protection agent was installed. To determine whether an agent update is available, check the Agents tab in the Management view.
On the Summary page, click Install to begin the installation. If the EULA appears accept it for installation to start. On the Task tab of the Installation page you can see whether the installation is successful.
You can click Close before the wizard is finished and monitor the installation progress in Agents tab in the Management task area. If the installation is unsuccessful, you can view the alerts in the Monitoring task area on the Alerts tab. Note: After you install a protection agent on a computer that is part of a Windows SharePoint Services farm, each of the computers in the farm will not appear as protected computers on the Agents tab in the Management task area, only the computer that you selected.
However, if the Windows SharePoint Services farm has data on the selected computer, DPM protects the data on all of the computers in the farm, provided all of them have the protection agent installed.
If you install the agent on a computer behind a firewall, you need to make sure that the agent can be pushed out through the firewall. To configure the ports exception on the firewall, see Configure firewall exceptions for the agent.
On the computer that you want to protect, open an elevated Command Prompt window, and then run the following commands:. To install the protection agent open an elevated Command Prompt window, and then run one of the following commands:.
If you specify a DPM server name in the command line, it installs the protection agent, and automatically configures the security accounts, permissions, and firewall exceptions necessary for the agent to communicate with the specified DPM server.
If you didn't specify a server name, open an elevated Command Prompt on the targeted computer and do the following:. Type: SetDpmServer. This configure security accounts, permissions, and firewall exceptions for the agent to communicate with the server.
If you added the computer to the DPM server before you installed the agent, the server begins to create backups for the protected computer. If you installed the agent before you added the computer to the DPM server, you must attach the computer before the DPM server begins to create backups.
On the primary domain controller, create and then populate the following security groups, where the protected server name is the name of the RODC on which you plan to install the protection agent:. Ensure that the security groups that you created earlier have replicated on the RODC. Then, manually install the protection agent on the RODC. Click General , and then set the Authentication Level to Default. Click Location , and then ensure that only Run application on this computer is selected.
On the RODC, from an elevated command prompt, run the command setagentcfg. Attach the protection agent to the DPM server, as detailed in the following section. In the Actions pane, click Install. The Protection Agent Installation Wizard opens. If this is the first time you have used the wizard, DPM queries Active Directory to get a list of potential computers. After the first installation, DPM displays the list of computers in its database, which is updated once each day by the auto-discovery process.
You can post now and register later. If you have an account, sign in now to post with your account. Paste as plain text instead. Only 75 emoji are allowed. Display as a link instead. Clear editor. Upload or insert images from URL. Sign in to follow this Followers 1.
Recommended Posts.
0コメント