
The following table lists the protocols and ports required for communication between the DPM server and protected servers and clients. The report server listens for HTTP requests on port 80. If you don't have access through the firewall, the computer you want to protect is in a workgroup or untrusted domain, or you need to use a different installation method, you can Install the agent manually and then Attach the agent.įor a protection agent to communicate with the DPM server through a firewall, firewall exceptions are required.Ĭonfigure an incoming exception for sqlservr.exe for the DPM instance of the SQL Server to allow TCP on port 80. If the computer isn't behind a firewall or you've configured firewall exceptions to allow access, you can install the agent from the DPM console. If the computer containing the data you want to back up is behind a firewall, you'll need to set up firewall exceptions. It records any changes to the protected data in the change journal and transfers the journal from the protected computer to the DPM server so that DPM can synchronize the primary data with the replica. Identifies the data that DPM can protect and recover.Īllows the DPM server to browse the shares, volumes, and folders on the protected computer.Ĭreates a change journal for each protected volume and stores the journal in a hidden file on that volume. It consists of two components: the protection agent itself and an agent coordinator. The System Center Data Protection Manager (DPM) protection agent is the software you install on each computer that contains data you want to back up with DPM. This version of Data Protection Manager (DPM) has reached the end of support.
