Installing the DPM agents
This recipe will cover the installation of a DPM agent from the DPM console as well as a manual-based installation.
Getting ready
Before you can start protecting a workload within your datacenter, you must install a DPM agent on the server hosting the workload that you would like to protect (that is, Hyper-V, SQL Server, Exchange, and so on).
You can install the DPM agent via the DPM Administrator Console in push mode; however, there are some scenarios where you will not able to perform a push installation of the DPM agent to the server hosting the workload that you would like to protect. On the DPM server, you can find two executables for the DPM agent that you can share or download to a removable media. Then, you can install the agent manually. The DPM agent is also available on the DPM installation media. There are two different executables here:
DpmAgentInstaller_x86.exe
is for 32-bit operating systemsDpmAgentInstaller_x64.exe
is for 64-bit operating systems
Both are applicable for Windows server and Windows client operating systems.
How to do it...
The following steps will illustrate the process of installing DPM agent in two different ways.
Option 1 – installing the agent from the DPM console
- Open the DPM Administrator Console and click
Management
|ÂAgents
. ClickInstall
on the tool ribbon to open theProtection Agent Installation Wizard
. - On the
Select Agent Deployment Method
page, clickInstall agents
|Next
. - On the
Select Computers
page, DPM will display a list of available computers that are in the same domain as the DPM server. Add the required computer.
- The
Advanced
button page is enabled only when there is more than one version of a protection agent available for installation on the computers. You can use this option to install a previous version of the protection agent that was installed before you upgraded DPM server to a more recent version. However, it's recommended that you always keep the protection agent updated. - Click
Next >
to continue. - On the
Enter Credentials
page, type the username and password for a domain account that is a member of the local administrators group on the selected computer(s). - If you select a node in a cluster, DPM detects all of the additional nodes in the cluster and displays the
Select Cluster Nodes
page. On theSelect Cluster Nodes
page, select an option that you want DPM to use for installing agents on additional nodes in the cluster. Then, clickNext
. - In the
Choose Restart Method
step, select the method that you want to use to restart the selected computers after the protection agent has been installed.
Note
For greenfield agent installation, the computer must be restarted before you can start protecting data. A restart is necessary to load the volume filter that DPM uses to track and transfer block-level changes between the DPM server and the protected computers.
- If any of the computers that you have selected are members of a cluster, an additional
Choose Restart Method
 page will appear that you can use so that you can select the method to restart the clustered computers.
Note
Please note that you need to install a protection agent on all of the nodes in a cluster to successfully protect the clustered data.
- Choose an appropriate option and click on
Next >
to continue. - In the
Summary
 page, you can verify the information you have chosen and then click onInstall
to initialize the installation and configuration process of the DPM agent. - After a short period of time, theÂ
Agent
 will appear in the DPM console and report back with statusOK
.
Â
Â
Â
Option 2 – installing the agent manually
You can perform a manual installation in two different ways:
- By providing the FQDN of the DPM server when running the
DpmAgentInstaller
executable - By providing the NetBIOS name of the DPM server using
setdpmserver.exe
if the DPM agent is already installed but not configured
Now follow these steps:
- On the computer that you want to protect, open an elevated command window, and then runÂ
net use Z: \\<DPMServerName>\d$
, whereÂZ
 is the local drive letter that you want to assign and<DPMServerName>
is the name of the DPM server that will protect the computer.Âd$
 is where DPM software is installed. - For a 64-bit computer, type the following:
cd /d <assigned drive letter>:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\amd64
Here, <assigned drive letter>
 is the drive letter that you assigned in the previous step and <build number>
is the latest DPM build number. For example:Â
cd /d "Z:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.158.0\amd64"
For a 32-bit computer, type the following:
cd /d <assigned drive letter>:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\i386
Here, <assigned drive letter>
is the drive that you mapped in the previous step and <build number>
is the latest DPM build number.
To install the protection agent for a 64-bit computer, run the following command:
DPMAgentInstaller_x64.exe <DPMServerName>
Here, <DPMServerName>
is the fully qualified domain name (FQDN) of the DPM server.
- To install the protection agent for a 32-bit computer, run the following command:
DPMAgentInstaller_x86.exe <DPMServerName>
Here, <DPMServerName>
is the FQDN of the DPM server.
- Select
I accept the license terms and conditions
for the Microsoft Software License Terms, and clickOK
. - The installation will start and you will receive a confirmation message that statesÂ
Agent installation completed successfully
. The DPM agent has now been configured and the appropriate firewall exceptions have been made in the domain profile of the Windows Firewall. Press Enter key to close the window.
Note
To perform a silent installation and to accept the EULA license in a silent installation , you can use the /q
and /IAcceptEULA
options after the command. For example: DPMAgentInstaller_x64.exe /q <DPMServerName> /IAcceptEULA
.
- If the DPM agent is already installed, you should run the
setdpmserver.exe
executable with the–dpmservername
switch to configure the DPM server that the DPM agent should report to as follows:
Setdpmserver –dpmservername DPM2019
Note
When using the SetDpmServer
executable, you only need the NetBIOS
name of the DPM server.
After installing the agent manually, you must attach the DPM agent to the DPM server. You can do this via the DPM Administrator console or via the DPM PowerShell cmdlet.
- Open the DPM console and go to
Management
. Click onProduction Servers
and, at the top-left corner of the console, click on theAdd
button to start theProduction Server Addition Wizard
.
- Under theÂ
Select Agent Deployment Method
 page, clickAttach agents
, followed byComputer on trusted domain
. Click theNext >
button to continue:
Note
If you want to attach a DPM agent in a workgroup or untrusted domain, please refer to Chapter 8, Protecting Workgroups and Untrusted Domains, for more information.
- In the
Select Computers
 page, choose the server that you would like to attach to the DPM server and click onNext >
to continue.
Â
Note
You can also provide a list of servers that you would like to have attached. The list should have all of the FQDN of every server per row in a simple text file. Click on the Add From File...
button to import the files' data.
- In the
Enter Credentials
page, enter the credentials that should be used to execute this process. Keep in mind that the credentials you provide must have administrative rights on the server that you are trying to attach. Provide the credentials and click onNext >
to continue. - In the
Summary
page, verify the configuration and click onAttach
to start. - Verify that the
Attach protected computer
 task has been successful. ClickClose
 to close theProtection Agent Installation Wizard
. - The
Agent
 will appear in the DPM console and report back with statusOK
.
How it works...
The DPM agent is the core component for the DPM so that it's able to provide restore capabilities for your data. The DPM relies on the DCOM object of the protected server which is mapped to the DPMRA service so that the SQL job on the DPM server starts. System Center Data Protection Manager stores all protection group configurations as SQL Jobs, and the SQL Server Agent initializes the DPM agent to start creating snapshots by using the underlying architecture of the Volume Shadow Copy Service (also known as Volume Snapshot Service or VSS) within the operating system.
The setdpmserver.exe
executable command has the ability to configure the DPM agent to set which DPM server the DPM agent reports to. It also provides the configuration needed for the local Windows Firewall so that the DPM agent can start reporting to the DPM server.
There's more...
System Center Data Protection Manager manages data replication and provides management of the DPM agents using two different TCP ports:
5718
5719
Â
TCP port 5718
is used for data replication and TCP port 5719
is used by the DPM agent coordinator. The coordinator is the function within the DPM agent architecture that manages the installation, uninstallation, and updates of the DPM agent. For more information regarding firewall ports and configuration, please read the Planning your DPM deployment recipe in this chapter.