Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

scheduling deployment of dpm protection agent

Posted on 2011-03-08
2
Medium Priority
?
823 Views
Last Modified: 2012-05-11
Does anyone know how to schedule deployment of the Microsoft Data Protection Manager (DPM) 2010 Protection Agent on to the servers to be protected?

Since installing the agent requires a reboot and brief interruption to the network connection, we would like to deploy it out of hours.
0
Comment
Question by:jpguillebaud
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
PowerToTheUsers earned 375 total points
ID: 35083990
You can deploy the agent during office-hours from the DPM-console, but uncheck the "reboot now" checkbox. Then you can schedule a reboot off-hours.

If you want to install the agent manually or with another deployment software (SCCM for instance), take the client from \\yourDPMserver\c$\Program Files\Microsoft DPM\DPM\agents\RA\3.0.7706.0\amd64\1033 and deploy using following commands: DPMAgentInstaller_AMD64.exe /q yourdpmserver.fqdn as described in http://technet.microsoft.com/en-us/library/ff399459.aspx and http://technet.microsoft.com/en-us/library/bb870935.aspx
0
 

Author Closing Comment

by:jpguillebaud
ID: 35088763
These are things I had already thought about trying. I was asking the question to see if there was an easier way to do it.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Employees depend heavily on their PCs, and new threats like ransomware make it even more critical to protect their important data.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question