Information Technology Reference
In-Depth Information
Thought experiment
VMM user role configuration at Contoso
I n this thought experiment, apply what you've learned about this objective. You can
find answers to these questions in the “Answers” section at the end of this chapter.
You are the administrator of the VMM deployment at Contoso. The Contoso VMM
server manages two clouds, Contoso_Production, and Contoso_Test. You need to
assign user roles to three users. These users have the following requirements:
Rooslan should be able to perform any administrative task on the Contoso_Test
cloud, but should not have access to the Contoso_Production cloud.
Nestor should be able to view all settings for elements within the Contoso_Produc-
tion cloud, but should not be able to modify any settings.
Oksana should be able to create and deploy virtual machines with the Contoso_Pro-
duction cloud.
With the principle of least privilege in mind, answer the following questions:
1. Which role should you assign to Oksana?
2. Which role should you assign to Rooslan?
3. Which role should you assign to Nestor?
Objective summary
DPM storage pools store backed up data. You must have a DPM storage pool config-
ured before you can start protecting workloads with DPM.
DPM secondary servers are DPM servers that back up all workloads on the primary
server.
DPM chaining involves spreading protected workloads across two or more DPM
servers, with a separate DPM server providing a secondary backup location for each
workload protected by any DPM server in the chain.
Protection groups define which workloads are protected, the type of protection that is
configured, and the retention period for that protection.
Agents or clients are special software that some System Center products use to interact
with computers.
Operations Manager watcher nodes are used to perform synthetic transactions to
monitor availability.
 
Search WWH ::




Custom Search