{"id":474,"date":"2011-04-13T18:46:26","date_gmt":"2011-04-13T16:46:26","guid":{"rendered":"http:\/\/www.data-protector.org\/wordpress\/?p=474"},"modified":"2015-12-10T19:51:17","modified_gmt":"2015-12-10T18:51:17","slug":"data-protector-6-2-installation","status":"publish","type":"post","link":"https:\/\/www.data-protector.org\/wordpress\/2011\/04\/data-protector-6-2-installation\/","title":{"rendered":"Data Protector 6.2 Installation"},"content":{"rendered":"<p>For all already waiting for&#8230; the new version of HP Data Protector (6.2) will be installed as follows on a Windows 2008 box&#8230; Screens were manipulated to show all available options.<br \/>\nUAC may appear prior installation, depending on the configured settings<br \/>\n<img loading=\"lazy\" src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_01.png\" alt=\"DP62_Install\" width=\"511\" height=\"440\" \/><br \/>\nWelcome Screen<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_02.png\" alt=\"DP62_Install\" \/><br \/>\nWhen pressing Advanced you can define settings to be used during the installation<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_03.png\" alt=\"DP62_Install\" \/><br \/>\nLicense Agreement<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_04.png\" alt=\"DP62_Install\" \/><br \/>\nInstallation type, in this case, of course, we use cell server<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_05.png\" alt=\"DP62_Install\" \/><br \/>\nAccount information to be used for some of the services of Data Protector, the usage of an local account is possible but not recommended.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_06.png\" alt=\"DP62_Install\" \/><br \/>\nAn error message appear when the password is wrong<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_07.png\" alt=\"DP62_Install\" \/><br \/>\nDestination folder for Data Protector<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_08.png\" alt=\"DP62_Install\" \/><br \/>\nChange Destination folder, in case the server has a mapped LUN from SAN storage it is recommended to change both folders to SAN destination<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_09.png\" alt=\"DP62_Install\" \/><br \/>\nthe changed path&#8230;<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_10.png\" alt=\"DP62_Install\" \/><br \/>\nComponent selection, VSS, AutoDR, DA, UI, Docu should always be selected for the cell server, IS and MA can also be distributed to another client.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_11.png\" alt=\"DP62_Install\" \/><br \/>\nFirewall configuration<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_12.png\" alt=\"DP62_Install\" \/><br \/>\nReady to install screen<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_13.png\" alt=\"DP62_Install\" \/><br \/>\nInstallation is verified<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_14.png\" alt=\"DP62_Install\" \/><br \/>\nThe selected components are installed.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_15.png\" alt=\"DP62_Install\" \/><br \/>\nContinued&#8230;<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_16.png\" alt=\"DP62_Install\" \/><br \/>\nIf you used a local account at the end you may receive this warning message.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_17.png\" alt=\"DP62_Install\" \/><br \/>\n&#8230;otherwise installation will finish like this.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_18.png\" alt=\"DP62_Install\" \/><br \/>\nSetup completed, a text file will be opened including installation summary.<br \/>\n<img src=\"https:\/\/www.data-protector.org\/wordpress\/wp-content\/uploads\/2011\/04\/DP62_19.png\" alt=\"DP62_Install\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For all already waiting for&#8230; the new version of HP Data Protector (6.2) will be installed as follows on a Windows 2008 box&#8230; Screens were manipulated to show all available options. UAC may appear prior installation, depending on the configured settings Welcome Screen When pressing Advanced you can define settings to be used during the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"spay_email":""},"categories":[11],"tags":[102,103],"translation":{"provider":"WPGlobus","version":"2.8.8","language":"en","enabled_languages":["en","de"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"de":{"title":false,"content":true,"excerpt":false}}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p28cjj-7E","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":683,"url":"https:\/\/www.data-protector.org\/wordpress\/2011\/07\/advisory-c02928162\/","url_meta":{"origin":474,"position":0},"title":"Advisory c02928162","date":"26. July 2011","format":false,"excerpt":"{:en}With document ID c02928162 on 2010\/07\/22 an advisory for HP Data Protector 6.11 and Data Protector 6.2 was released, describing a problem when restoring files. There will be more files restored than selected, this may overwrite files not selected for the restore. There is a solution, installing current patches, for\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":834,"url":"https:\/\/www.data-protector.org\/wordpress\/2011\/12\/data-protector-6-21\/","url_meta":{"origin":474,"position":1},"title":"Data Protector 6 &#8211; Patch Bundle 6.21","date":"23. December 2011","format":false,"excerpt":"{:en}For coming christmas days HP delivers the next Data Protector version. Version 6.2 becomes 6.21 The new version 6.21 is a patch bundle you need to install on your existing DP 6.2 installation. Most important feature is deduplication, which might be known from the HP D2D systems or the StoreOnce\u2026","rel":"","context":"In &quot;DP A.06.00&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":671,"url":"https:\/\/www.data-protector.org\/wordpress\/2011\/07\/security-bulletin-c02872182\/","url_meta":{"origin":474,"position":2},"title":"Security Bulletin c02872182","date":"15. July 2011","format":false,"excerpt":"{:en}With document ID c02872182 on 2011\/06\/29 an advisory for HP Data Protector (6.0, 6.10, 6.11 and 6.20) was released, which describes a potential security problem when using Data Protector and in some circumstances a remote execution of arbitrary code may possible. There is a solution, installation of Data Protector 6.2\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":842,"url":"https:\/\/www.data-protector.org\/wordpress\/2012\/01\/advisory-data-protector-org\/","url_meta":{"origin":474,"position":3},"title":"Advisory Data-Protector.org","date":"11. January 2012","format":false,"excerpt":"{:en}Different customers reported about problems with multipath devices in DP 6.21. The configuration of the multipath devices is no longer possible. The problem is with the GUI only, as backups run as expected. Following workarounds are possible: - Open a call and request hotfix QCCR2A35525. - Downgrade to DP 6.2\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":766,"url":"https:\/\/www.data-protector.org\/wordpress\/2012\/04\/data-protector-whitepaper\/","url_meta":{"origin":474,"position":4},"title":"Data Protector Whitepaper","date":"22. April 2012","format":false,"excerpt":"{:de}Mit freundlicher Genehmigung von HP wurden unter https:\/\/www.data-protector.org\/wordpress\/whitepaper alle Whitepapers f\u00fcr Data Protector 6.11, 6.2 und 7.0 aufgelistet. Sollte ein Link nicht mehr funktionieren oder die Liste nicht vollst\u00e4ndig sein, bitte eine Mail an daniel-braun@data-protector.org senden; der Link wird dann umgehend aktualisiert oder vervollst\u00e4ndigt. F\u00fcr einige Whitepaper ist unter Umst\u00e4nden\u2026","rel":"","context":"In &quot;Common&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":513,"url":"https:\/\/www.data-protector.org\/wordpress\/2011\/05\/security-bulletin-c02810240\/","url_meta":{"origin":474,"position":5},"title":"Security Bulletin c02810240","date":"13. May 2011","format":false,"excerpt":"{:en}With document ID c02810240 on 2011\/04\/28 an advisory for HP Data Protector 6.11 (6.10 and 6.00) was released, which describes a potential security problem when using Data Protector and in some circumstances a remote execution of arbitrary code may possible. There is a solution, upgrade to Data Protector 6.2. Only\u2026","rel":"","context":"In &quot;Advisory&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/posts\/474"}],"collection":[{"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":9,"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"predecessor-version":[{"id":2850,"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/posts\/474\/revisions\/2850"}],"wp:attachment":[{"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.data-protector.org\/wordpress\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}