beautypg.com

See also, Security considerations for end-user recovery, Granting appropriate user privileges – Dell PowerVault DP600 User Manual

Page 69

background image

69

firewall manually to permit communication between the DPM server and protected computers.

Configure Windows Firewall on a DPM server by opening port 135 to TCP traffic and specifying

the DPM service (Microsoft Data Protection Manager/DPM/bin/MsDPM.exe) and the protection

agent (Microsoft Data Protection Manager/DPM/bin/Dpmra.exe) as exceptions to the Windows

Firewall policy.

For instructions for configuring Windows Firewall, search on "Windows Firewall" in Windows Help

and Support for Windows Server 2003.

See Also

Security Considerations

Security Considerations for End-User
Recovery

You can enable end-user recovery for file data, but not for application data. Use only domain-

based security groups for permissions to files and folders on which you plan to enable end-user

recovery. DPM cannot guarantee consistency between end-user access to data on protected

computers and end-user access to recovery points of that data on the DPM server if you rely on

local security groups.

For example, if the set of users included in the protected computer's local Users group differs

from the set of users included in the DPM server’s local users group, different sets of users will

have access to the data on the protected computer and to the recovery points of that data.

See Also

Security Considerations

Granting Appropriate User Privileges

Before you begin a DPM deployment, verify that appropriate users have been granted required

privileges for performing the various tasks. The following table shows the user privileges that are

required to perform the major tasks associated with DPM.

User Privileges Required to Perform DPM Tasks

Task

Required Privileges

Adding a DPM server to an Active Directory

domain

Domain administrator account, or user right to

add a workstation to a domain