Information Technology Reference
In-Depth Information
CHAPTER 2
infrastructure
After you have deployed System Center, you need to configure additional elements to
ensure that you can use System Center to manage your organization's private cloud.
You'll need to configure Data Protection Manager to ensure that the infrastructure is being
protected, and configure appropriate security roles and Run As accounts to ensure that
tasks can be performed with least privilege. You'll also have to configure and manage por-
tals and dashboards to grant access to users who are not directly responsible for managing
System Center products.
Objectives in this chapter:
■
Objective 2.1: Configure System Center components
■
Objective 2.2: Configure portals and dashboards
This objective deals with several diverse elements of a System Center deployment, focusing
initially on data protection using Data Protection Manager, but also covering how role-
based permissions work through the use of roles, and how credentials work with Run As
accounts.
This objective covers the following topics:
■
DPM storage pools
■
DPM secondary servers
■
System Center agents
■
Run As accounts and profiles
■
User roles
■
Watcher nodes
■
Gateway servers