After you enroll in the program, DPM will gather anonymous information on your hardware,software configurations and usage patterns of various DPM features and send it to Microsoft. Think of it as your chance to help design the next version of the DPM. We use the information to improve the quality, reliability and performance of Microsoft software and services.
Add more disks to the storage pool by using the Disks tab in the Management task area, or reduce the specified allocations ...
Adding data source failed as you have reached the limit on total number of data sources that can be protected on a single ...
After the tape mount operation, tape %MediaLabel; (Barcode- %MediaBarcode;) was not found in the %MediaLocationType; %MediaLocationInfo; ...
After you enroll in the program, DPM will gather anonymous information about your hardware and software configurations, and ...
After you enroll in the program, DPM will gather anonymous information on your hardware,software configurations and usage ...
Agent installation on %ChosenServerName; can continue. To successfully protect clustered resources, you must install the ...
Agent installation on %ServerName; can continue. To successfully protect clustered resources, you must install the DPM protection ...
Agent installation on above servers can continue. To successfully protect clustered resources, you must install the DPM protection ...
Agent installation on these computers can continue. To successfully protect clustered resources, you must install the DPM ...