Step Three: Design the Protection Groups

The third step in the DPM planning process is to map out a logical design for the membership and configuration of the protection groups. To complete this step, the first task you need to complete is to take the data sources that DPM will be protecting (identified in step two) and then group them together (protection groups), for example:

• The System State for a certain collection of servers

• A collection of ERP databases that resides on a SQL Server cluster

• An Exchange Server 2010 DAG

• File data that resides on a collection of Windows 7 and Windows Vista machines

• File data that resides in a DFS namespace

• A SharePoint 2010 farm

Once you have outlined your protection groups, your next task is to ...

Get Microsoft® System Center 2012 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.