beautypg.com

Dell PowerVault DP600 User Manual

Page 4

background image

Tape-Based Protection Process .................................................................................................... 22

See Also ..................................................................................................................................... 22

Recovery Process ......................................................................................................................... 22

See Also ..................................................................................................................................... 23

Protection Policy ............................................................................................................................ 24

See Also ..................................................................................................................................... 24

Auto Discovery Process ................................................................................................................ 24

See Also ..................................................................................................................................... 25

DPM Directory Structure ................................................................................................................ 25

See Also ..................................................................................................................................... 25

System Requirements ................................................................................................................... 25

DPM Licensing ............................................................................................................................... 25

Planning Protection Groups ........................................................................................................... 27

In This Section ............................................................................................................................ 27

What Do You Want to Protect? ..................................................................................................... 28

See Also ..................................................................................................................................... 28

File Data on Servers and Workstations ......................................................................................... 28

See Also ..................................................................................................................................... 29

File and Folder Exclusion .............................................................................................................. 29

See Also ..................................................................................................................................... 31

Protecting Data in DFS Namespaces ............................................................................................ 31

See Also ..................................................................................................................................... 32

Unsupported Data Types ............................................................................................................... 32

See Also ..................................................................................................................................... 33

Application Data............................................................................................................................. 33

See Also ..................................................................................................................................... 34

Clustered Resources ..................................................................................................................... 34

See Also ..................................................................................................................................... 34

System State ................................................................................................................................. 35

Workstation and Member Server System State ......................................................................... 35

Domain Controller System State ................................................................................................ 35

Certificate Services System State .............................................................................................. 35

Cluster Server System State ...................................................................................................... 35

See Also ..................................................................................................................................... 35

What Are Your Goals for Recovery? ............................................................................................. 36