O'Reilly logo

Microsoft System Center Data Protection Manager 2012 SP1 by Steve Buchanan, Islam Gomaa, Flemming Riis, Robert Hedblom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring and protecting machines in workgroups and untrusted domains

There are many reasons why organizations can have more than one domain without a trust between them. When an organization has these types of domain setup, there is sometimes a need to protect computers across them. In this section, we will cover the steps it takes to configure this. We will go over more than what you see in the TechNet steps such as connection and what to do about DNS. The steps to protecting a computer in a non-trusted domain are entailed in the following sections.

Communication

The communication is initialized and this part will cover what and how the communication is made.

Host files

Both the DPM server and the protected server need to communicate. This can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required