Before you install protection agents on the computers you want to protect, note the following:

To install a protection agent outside a Firewall

  1. In DPM Administrator Console, on the navigation bar, click Management, and then click the Agents tab.

  2. In the Actions pane, click Install.

    The Protection Agent Installation Wizard starts.

  3. On the Select Agent Deployment Method page, select Install agents, and then click Next.

  4. On the Select Computers page, DPM displays a list of available computers in the DPM server domain. If this is the first time you have used the wizard, DPM queries Active Directory to get a list of potential computers. After the first installation, DPM displays the list of computers in its database, which is updated once each day by the auto-discovery process.

    If you know the name of a specific computer on which you want to install the protection agent, you can quickly find and select the computer by typing the name of the computer in the Computer name box, and then clicking Add. DPM will query Active Directory for the computer, and then add it to the Selected computers list. If you do not know the name of the computer, browse the list to find the computer.

    Note
    The Advanced button on the Select Computers page is enabled only when there is more than one version of a protection agent available for installation on the computers. If it is enabled, you can use this option to install a previous version of the protection agent that existed before you updated to the most recent version.
  5. Select one or more computers (50 maximum) from the Computer name list, click Add, and then click Next.

    Note
    To find a computer across a trusted domain, you must type the fully qualified domain name of the computer you want to protect (for example, Computer1.Domain1.corp.microsoft.com, where Computer1 is the name of the target computer that you want to protect, and Domain1.corp.microsoft.com is the domain to which the target computer belongs.
  6. On the Enter Credentials page, type the user name and password for a domain account that is a member of the local administrators group on all selected servers.

  7. In the Domain box, accept or type the domain name of the user account that you are using to install the protection agent on the target computer. This account may belong to the current or trusted domain.

    If you are installing a protection agent on a computer across a trusted domain, you enter your current domain user credentials. You can be a member of any trusted domain, and you must be an administrator on the target server that you want to protect.

    If you selected a node in a server cluster, DPM detects the additional nodes in the cluster and displays the Select Cluster Nodes page.

  8. On the Select Cluster Nodes page, in the Cluster node selection section, select the option that you want DPM to use for selecting the remaining nodes in the cluster, and then click Next.

  9. On the Choose Restart Method page, select the method you will use to restart the computers after the protection agent is installed. The computer must be restarted before you can start protecting data. This restart is necessary to load the volume filter that DPM uses to track and transfer block level changes between DPM and the computers it protects.

    If you select No. I will restart the selected computers later, after the restart is complete and if the protection agent installation status is not refreshed on the unprotected server, in the Management task area on the Agents tab, click Refresh Information.

    Note
    You do not need to restart the computer if you are installing protection agents on a DPM server.

    If any of the servers you selected are clustered servers, an additional Choose Restart Method page appears that allows you to select the method you will use to restart the clustered servers.

    You must install the protection agent on all nodes of the server cluster to successfully protect the clustered data. The servers must be restarted before you can start protecting data. Because of the time required to start services, it might take a few minutes after a restart is complete before DPM can contact the server.

    Note
    DPM will not restart a server that belongs to Microsoft Cluster Server (MSCS). You must manually restart a server in an MSCS cluster.
  10. On the Summary page, click Install to begin the installation.

  11. On the Installation page, the results appear on the Task tab to indicate whether the installation is successful. You can click Close before the wizard is finished performing the tasks, and then monitor the installation progress in DPM Administrator Console on the Agents tab in the Management task area.

If the installation is unsuccessful, you can view the alerts in the Monitoring task area on the Alerts tab.

Note
After you install a protection agent on a backend server to protect a Windows SharePoint Services farm, the server will not appear as protected in the Management task area on the Agents tab. However, DPM protects the back end server internally if the Windows SharePoint Services farm has data on the server.