Best Practices

The following are best practices from this chapter:

• A computer that is protected by DPM can have multiple protection groups protecting data sources. However, all these protection groups must be from one DPM server.

• When protecting data in a DFS namespace, use DPM to only protect a single “copy” of the data located on a server-specific local path.

• Do not use DPM to protect a cluster’s quorum disk.

• Because System State data tends not to change very often, System State backups should be placed in their own protection groups.

• Always ensure that the Eseutil.exe and ese.dll versions on the DPM server are from the most recent edition of Exchange Server.

• Exchange Server databases should not be configured to use circular logging ...

Get Microsoft® System Center 2012 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.