beautypg.com
Tape-Based Protection Process .................................................................................................... 22
See Also ..................................................................................................................................... 22
Recovery Process ......................................................................................................................... 22
See Also ..................................................................................................................................... 23
Protection Policy ............................................................................................................................ 24
See Also ..................................................................................................................................... 24
Auto Discovery Process ................................................................................................................ 24
See Also ..................................................................................................................................... 25
DPM Directory Structure ................................................................................................................ 25
System Requirements ................................................................................................................... 25
DPM Licensing ............................................................................................................................... 25
Planning Protection Groups ........................................................................................................... 27
In This Section ............................................................................................................................ 27
What Do You Want to Protect? ..................................................................................................... 28
See Also ..................................................................................................................................... 28
File Data on Servers and Workstations ......................................................................................... 28
See Also ..................................................................................................................................... 29
File and Folder Exclusion .............................................................................................................. 29
See Also ..................................................................................................................................... 31
Protecting Data in DFS Namespaces ............................................................................................ 31
See Also ..................................................................................................................................... 32
Unsupported Data Types ............................................................................................................... 32
See Also ..................................................................................................................................... 33
Application Data............................................................................................................................. 33
See Also ..................................................................................................................................... 34
Clustered Resources ..................................................................................................................... 34
System State ................................................................................................................................. 35
Workstation and Member Server System State ......................................................................... 35
Domain Controller System State ................................................................................................ 35
Certificate Services System State .............................................................................................. 35
Cluster Server System State ...................................................................................................... 35
See Also ..................................................................................................................................... 35
What Are Your Goals for Recovery? ............................................................................................. 36