You can add protected computers to a DPM server. On the protected computer, we recommend attaching protection agents to the DPM server for the following computers:
- Computers behind a firewall.
- Computers on which agents already exist.
- Computers in a workgroup or untrusted
For detailed information about adding your protected computers to a DPM server, see the following topics: