How to do it...

The overall steps to set up DPM protection with CBA are as follows:

  1. Add HTTP CRL Distribution Point.
  2. Create the DPM Certificate Template.
  3. Configure the certificate on the DPM server.
  4. Install the DPM agents on the protected systems.
  1. Configure the certificate on the protected computer.
  2. Attach the computer to DPM.
  3. Test backing up the VMs.

For the remainder of this example, we are going to protect a Hyper-V host deployed in a different forest; there is no trust relationship between the two forests. Please note that the same concept will apply to SQL Server and File Server.

The process of configuring DPM protection with certificate-based authentication is a bit long, so please make sure to follow each of the following steps carefully.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.209.59