Dell PowerVault DP600 User Manual
Page 44

44
the Computer name list, click Add, and then click Next.
If you know the name of a specific computer on which you want to install the protection
agent, you can quickly find and select the computer by typing the name of the computer
in the Computer name box, and then clicking Add. DPM will query Active Directory for
the computer, and then add it to the Selected computers list. If you do not know the
name of the computer, browse the list to find the computer.
To find a computer across a trusted domain, you must type the fully qualified domain
name of the computer you want to protect (for
example, Computer1.Domain1.corp.microsoft.com, where Computer1 is the name of
the target computer that you want to protect, and Domain1.corp.microsoft.com is the
domain to which the target computer belongs.
Note
The Advanced button on the Select Computers page is enabled only when
there is more than one version of a protection agent available for installation on
the computers. If it is enabled, you can use this option to install a previous
version of the protection agent that existed before you updated to the most
recent version.
4. On the Enter Credentials page, type the user name and password for a domain account
that is a member of the local administrators group on all selected servers.
5. In the Domain box, accept or type the domain name of the user account that you are
using to install the protection agent on the target computer. This account may belong to
the current or trusted domain.
If you are installing a protection agent on a computer across a trusted domain, you enter
your current domain user credentials. You can be a member of any trusted domain, and
you must be an administrator on the target server that you want to protect.
If you selected a node in a server cluster, DPM detects the additional nodes in the cluster
and displays the Select Cluster Nodes page.
• On the Select Cluster Nodes page, in the Cluster node selection section, select
the option that you want DPM to use for selecting the remaining nodes in the cluster,
and then click Next.
6. On the Choose Restart Method page, select the method you will use to restart the
computers after the protection agent is installed. The computer must be restarted before
you can start protecting data. This restart is necessary to load the volume filter that DPM
uses to track and transfer block level changes between DPM and the computers it
protects.
If you select No. I will restart the selected computers later, after the restart is complete
and if the protection agent installation status is not refreshed on the unprotected server,
in the Management task area on the Agents tab, click Refresh Information.
Note
You do not need to restart the computer if you are installing protection agents on