O'Reilly logo

Microsoft System Center Data Protection Manager 2012 SP1 by Steve Buchanan, Islam Gomaa, Flemming Riis, Robert Hedblom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protecting Exchange with DPM

Mail conversations have been traditionally one of the most important functions for companies worldwide. To create and design an optimal protection that the DPM administrators can rely on is therefore crucial.

The design implementation for Exchange may also vary depending on the size of the Exchange environment and DPM needs to be designed in the correct matter according to the number of Database Availability Group(DAG) nodes or if the company uses just a single Exchange server installation.

Configure Exchange protection

The first step before you can start to protect anything with DPM is to deploy and attach a DPM agent to the Exchange server or all members of the cluster. Before and during the creation of the protection ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required