Jaa


Attach the DPM protection agent

 

Updated: May 13, 2016

Applies To: System Center 2012 SP1 - Data Protection Manager, System Center 2012 - Data Protection Manager, System Center 2012 R2 Data Protection Manager

After you’ve installed the DPM agents, in some cases you’ll need to attach the agent to the DPM sever:

  • If you installed DPM on a computer behind a firewall

  • If you install the DPM agent on a computer on which the agent was already installed

  • If you install the agent on a computer in a workgroup or untrusted domain (no two-way trusted with the DPM server domain).

Attach the agent

  1. In DPM Administrator Console, on the navigation bar, click Management > Agents. In the Actions pane, click Install.

  2. On the Select Agent Deployment Method page, select Attach agents > Computer on a trusted domain > Next. The Protection Agent Installation Wizard opens.

  3. On the Select Computers page, DPM displays a list of available computers in the same domain as the DPM server. Select one or more computers (50 maximum), from the Computer name list >Add > Next.

    • If this is the first time you have used the wizard, DPM queries Active Directory to get a list of potential computers. After the first installation, DPM displays the list of computers in its database, which is updated once each day by the auto-discovery process.

    • To add multiple computers by using a text file, click the Add From File button, and in the Add From File dialog box, type the location of the text file or click Browse to navigate to its location.

  4. On the Enter Credentials page, type the user name and password for a domain account that is a member of the local Administrators group on all selected computers. In the Domain box, accept or type the domain name of the user account that you are using to install the protection agent on the target computer. This account may belong to the domain that the DPM server is located in or to a trusted domain. If you are installing a protection agent on a computer across a trusted domain, enter your current domain user credentials. You can be a member of any trusted domain, and you must be a member of the local Administrators group on all selected computers that you want to protect.

  5. On the Summary page, click Attach.