Get ready to deploy DPM servers

There are a few planning steps to consider before you begin to deploy your System Center Data Protection Manager (DPM) servers:

Plan for DPM server deployment

First, determine how many servers you'll need:

  • DPM can protect up to 600 volumes. To protect this maximum size, DPM needs 120 TB per DPM server.

  • A single DPM server can protect up to 2000 databases (recommended disk size 80 TB).

  • A single DPM server can protect up to 3000 client computers and 100 servers.

    • For DPM server capacity planning, you can use the DPM storage calculators. These calculators are Excel sheets and are workload-specific. They guide about the number of DPM servers required, processor core, RAM, virtual memory recommendations, and required storage capacity. Because these calculators are workload-specific, you'll need to combine the recommended settings and consider them together with the system requirements and your specific business topology and requirements, including data source and storage locations, compliance and SLA requirements, and disaster recovery needs. Note that the calculators were released for DPM 2010 but remain relevant for later DPM versions.

Then figure out how to locate the servers:

  • DPM must be deployed in an Active Directory domain (Windows Server 2008 onwards).

  • When deciding where to locate your DPM server, consider the network bandwidth between the DPM server and the protected computers. If you are protecting data over a wide area network (WAN), there is a minimum network bandwidth requirement of 512 kilobits per second (Kbps).

  • DPM supports teamed network adapters (NICs). Teamed NICs are multiple physical adapters that are configured to be treated as a single adapter by the operating system. Teamed NICs provide increased bandwidth by combining the bandwidth available, using each adapter and failover to the remaining adapter when an adapter fails. DPM can use the increased bandwidth achieved by using a teamed adapter on the DPM server.

  • Another consideration for the location of your DPM servers is the need to manage tapes and tape libraries manually, such as adding new tapes to the library or removing tapes for an offsite archive.

  • A DPM server can protect resources within a domain or across domains within a forest that has a two-way trust relationship with the domain that the DPM server is located in. If there isn't a two-way trust across domains, you need a separate DPM server for each domain. A DPM server can protect data across forests if there's a forest-level two-way trust between the forests.

  • Consider the network bandwidth between the DPM server and the protected computers. If you are protecting data over a WAN, there's a minimum network bandwidth requirement of 512 Kbps. Note that DPM supports teamed NICs that provide increased bandwidth by combining bandwidth available for each network adapter and failover if an adapter fails.

Plan firewall settings and user permissions

Firewall settings

Firewall settings for DPM deployment are required on the DPM server, on machines you want to protect, and on the SQL Server used for the DPM database if you're running it remotely. If Windows Firewall is enabled when you install DPM, then the DPM setup automatically configures the firewall settings on the DPM server. The firewall settings are summarized in the following table.

Location Rule Details Protocol Port
DPM server System Center <version> Data Protection Manager DCOM Setting Used for DCOM communication between the DPM server and protected machines. DCOM 135/TCP Dynamic
DPM server System Center <version> Data Protection Manager Exception for Msdpm.exe (the DPM service). Runs on the DPM server. All protocols All ports
DPM server

Protected machines
System Center <version> Data Protection Management Replication Agent Exception for Dpmra.exe (protection agent service used to back up and restore data). Runs on the DPM server and protected machines. All protocols All ports
Protected machines Configure an incoming exception for sqserv.exe
Protected machines DPM issues command to the protection agent with DCOM calls to the agent. You'll need to open the upper ports (1024-65535) for DPM to communicate. DCOM 135/TCP Dynamic
Protected machines The DPM data channel is TCP. Both the DPM server and the protected machines initiate connections. DPM communicates with the agent coordinator on port 5718 and with the protection agent on port 5719. TCP 5718/TCP

5719/TCP
Protected machines Used for hostname resolution between DPM/protected machine, and the domain controller. DNS 53/UDP
Protected machines Used for authentication of the connection endpoint, between DPM/protected machine, and the domain controller. Kerberos 88/UDP

88/TCP
Protected machines Used for queries between the DPM server and the domain controller. LDAP 389/TCP

389/UDP
Protected machines Used for miscellaneous operations between 1) DPM and protected machines, 2) DPM and the domain controller 3) Protected machines and the domain controller. Also used for SMB directly hosted on TCP/IP for DPM functions. NetBIOS 137/UDP

138/UDP

139/TCP

445/TCP
Remote SQL Server Enable TCP/IP for the DPM instance of SQL Server with the following: default failure audit; enable password policy checking.
Remote SQL Server Enable incoming exception for sqservr.exe for DPM instance of SQL Server to allow TCP on port 80. The report server listens for HTTP requests on port 80.
Remote SQL Server Default instance of database engine listens on TCP port 1443. Can be modified.

To use the SQL Server Browser service to connect on a non-default port set UDP port 1434.
Remote SQL Server Named instance of SQL Server uses Dynamic ports by default. Can be modified.
Remote SQL Server Enable RPC

Grant user permissions

Before you begin a DPM deployment, verify that appropriate users have been granted the required privileges to perform the various tasks. These are summarized in the following table.

DPM task Permissions needed
Add the DPM server to a domain Domain admin account or user right to add a workstation to the domain
Install DPM Admin account on the DPM server
Install a DPM protection agent on a machine you want to protect Domain account that's in the local administrators' group on the machine
Extend AD schema to enable end user recovery Schema admin privileges for the domain
Create AD container to enable end user recovery Domain admin privileges
Grant DPM server permission to change container contents Domain admin privileges
Enable end user recovery on the DPM server Admin account on the DPM server
Install recovery point client software on the protected machine Admin account on the machine
Access previous versions of protected data from a protected machine User account with access to protected share
Recover SharePoint data SharePoint farm admin that's also an admin on the front-end Web server on which the protection agent is installed.

Note

DPM server and protected computer communicate using DCOM. During DPMRA installation, the DPM server’s account is added to the Distributed COM Users security group on the protected computer.

For domain controller protection, Active Directory security groups will be created for each of the protected domain controllers, with the names DPMRADCOMTRUSTEDMACHINES$DCNAME, DPMRADMTRUSTEDMACHINES$DCNAME, and DPMRATRUSTEDDPMRAS$DCNAME.