Best Practices
The following are best practices from this chapter:
• A computer that is protected by DPM can have multiple protection groups protecting data sources. However, all these protection groups must be from one DPM server.
• When protecting data in a DFS namespace, use DPM to only protect a single “copy” of the data located on a server-specific local path.
• Do not use DPM to protect a cluster’s quorum disk.
• Because System State data tends not to change very often, System State backups should be placed in their own protection groups.
• Always ensure that the Eseutil.exe
and ese.dll
versions on the DPM server are from the most recent edition of Exchange Server.
• Exchange Server databases should not be configured to use circular logging ...
Get Microsoft® System Center 2012 Unleashed now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.