In PowerShell we can use Get-Content (or its alias type) to get the same information:Īt this point, I was thinking that regular expressions might be an appropriate way to solve this challenge. This could be a function containing version information in addition to the name of the DPM server(s) an agent is attached to. Optimally, we would like to gather this information remotely via PowerShell remoting and get an object back with information about the DPM agent. This gives us the information we want, but not in a very convenient format. The beginning of the first line returned will be the FQDN in Unicode of the DPM Server owning the agent on the protected server/client Open an administrative command prompt, then run: C:\> type C:\Program Files\Microsoft Data Protection Manager\DPM\ActiveOwner* There aren`t any official references on this topic besides some guidance in a forum thread on the TechNet Forums: You might want to look at all the DPM servers, but the agent might be inactive and left over from a decommissioned DPM server. If there is a lot of DPM servers in the environment and you do not know what DPM server is protecting an agent, you need a way to find this information on the local machine where the DPM agent is installed on. ![]() In System Center Data Protection Manager (DPM), there is an agent installed on protected computers for managing backup and restore operations. In this article, we will look at how binary files can be interpreted in PowerShell by looking at a real world challenge as an example. This article is co-authored by Jan Egil Ring and Ø_yvind Kallstad
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |