Solved

Secondary DPM Configuration

Posted on 2013-01-06
2
758 Views
Last Modified: 2013-06-12
Hello All,

I am currently trying to configure a secondary DPM (both are 2012) to protect our primary server.

I am not receiving any errors but am not sure what configuration decisions to make.

Currently our Primary DPM is configured to protect itself. With the addition of a Secondary DPM, should I stop that?

When I attempt to protect the PDPM's C: from SDPM, It discovers the mount points for all of the replicas protected by PDPM, and asks to add these, should I?

After passing those messages, I am advised that the source (C:) cannot be protected because it is protected on the primary server.

my PDPM currently protects its own C: and system state.

Should I unprotect C: on the primary so I can do it from the Secondary, and do I need to add those mount points?

I have been unable to find a good configuration guide online, other than paraphrasing of  "protect the bits you want", which is not technical enough!

Thanks.
0
Comment
Question by:FCAustralia
  • 2
2 Comments
 
LVL 9

Assisted Solution

by:Sandeep Gupta
Sandeep Gupta earned 500 total points
ID: 38754865
0
 
LVL 9

Accepted Solution

by:
Sandeep Gupta earned 500 total points
ID: 38754874
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now