Installing the shadow copy client software, See also, Security considerations – Dell PowerVault DP600 User Manual
Page 65

65
2. Creating a container
3. Granting the DPM server permissions to change the contents of the container
4. Adding mappings between source shares and shares on the replicas
The schema is extended only once; however, you must configure the Active Directory schema
extension for each DPM server. When you enable end-user recovery for additional DPM servers
in the domain, the process performs steps 3 and 4 for each additional server. DPM will update the
share mapping (step 4) after each synchronization, if needed.
DPM administrators who are both schema and domain administrators in the Active Directory
Domain Services domain can complete these steps with a single click in DPM Administrator
Console. DPM administrators who are not schema and domain administrators can complete
these steps by directing a schema and domain administrator to run the DPMADSchemaExtension
tool.
The DPMADSchemaExtension tool is stored on the DPM server in the folder Microsoft Data
Protection Manager\2006\End User Recovery. A user who is both a schema and domain
administrator can run the tool on any computer running Windows Server 2003 that is a member of
the domain in which the DPM server is deployed. The administrator must specify the name of the
DPM server when running the tool.
If you use the DPMADSchemaExtension tool to enable end-user recovery, you must run it once
for each DPM server.
Installing the Shadow Copy Client Software
Before end users can begin independently recovering previous versions of their files, the DPM
recovery point client software must be installed on their computers. If a client for Shadow Copies
of Shared Folders is present on the computer, the client software must be updated to support
DPM.
The recovery point client software can be installed on computers running the Windows XP
operating system with Service Pack 2 (SP2) or later and Windows Server 2003 with or without
SP1.
See Also
Planning the DPM Server Configurations
Security Considerations
DPM operates as a high-privileged server on the network. To help ensure the security of the DPM
server, the DPM security architecture relies on the security features of Windows Server 2003 and
Active Directory Domain Services, SQL Server 2005, and SQL Server Reporting Services.