Information Technology Reference
In-Depth Information
CHAPTER 2
Conigure System Center
infrastructure
After you have deployed System Center, you need to configure additional elements to
ensure that you can use System Center to manage your organization's private cloud.
You'll need to configure Data Protection Manager to ensure that the infrastructure is being
protected, and configure appropriate security roles and Run As accounts to ensure that
tasks can be performed with least privilege. You'll also have to configure and manage por-
tals and dashboards to grant access to users who are not directly responsible for managing
System Center products.
Objectives in this chapter:
Objective 2.1: Configure System Center components
Objective 2.2: Configure portals and dashboards
Objective 2.1: Conigure System Center components
This objective deals with several diverse elements of a System Center deployment, focusing
initially on data protection using Data Protection Manager, but also covering how role-
based permissions work through the use of roles, and how credentials work with Run As
accounts.
This objective covers the following topics:
DPM storage pools
DPM secondary servers
System Center agents
Run As accounts and profiles
User roles
Watcher nodes
Gateway servers
 
 
Search WWH ::




Custom Search