Monitoring DPM and Configuring Role-Based Access

In this chapter, we will cover the following recipes:

  • Monitoring DPM
  • Publishing the DPM logs
  • Monitoring DPM with SCOM
  • Monitoring DPM without SCOM
  • Installing the DPM Central Console
  • Using the DPM Scoped Console
  • Configuring remote administration
  • Configuring and using role-based access
  • Central reporting
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.136.236.231