If you are installing a protection agent on a computer in an Active Directory domain that is behind a firewall, you must manually install the protection agent. This topic describes how to install a protection agent on a computer in an active directory domain that is behind a firewall.

To install an agent on a computer behind a firewall

  1. In DPM Administrator Console, on the navigation bar, click Management, and then click the Agents tab.

  2. In the Actions pane, click Install.

    The Protection Agent Installation Wizard starts.

  3. On the Select Agent Deployment Method page, select Attach agents, select Computer on an Active Directory domain, and then click Next.

    On the Select Computers page, DPM displays a list of available computers in the DPM server domain. If this is the first time you have used the wizard, DPM queries Active Directory to get a list of potential computers. After the first installation, DPM displays the list of computers in its database, which is updated once each day by the auto-discovery process.

  4. On the Select Computers page, select one or more computers (50 maximum), from the Computer name list, click Add, and then click Next.

    If you know the name of a specific computer on which you want to install the protection agent, you can quickly find and select the computer by typing the name of the computer in the Computer name box, and then clicking Add. DPM will query Active Directory for the computer, and then add it to the Selected computers list. If you do not know the name of the computer, browse the list to find the computer.

  5. On the Enter Credentials page, type the user name and password for a domain account that is a member of the local administrators group on all selected servers.

  6. In the Domain box, accept or type the domain name of the user account that you are using to install the protection agent on the target computer. This account may belong to the current or trusted domain.

    If you are installing a protection agent on a computer across a trusted domain, you enter your current domain user credentials. You can be a member of any trusted domain, and you must be an administrator on the target server that you want to protect.

  7. On the Summary page, click Attach.