Table of Contents
- Installing and Upgrading DPM
- DPM Post-Installation and Management Tasks
- Protecting Hyper-V VMs
- Monitoring DPM and Configuring Role-Based Access
- Protecting Microsoft Workloads with DPM
- Securing Windows Client with DPM
- Protecting Microsoft Azure Stack with DPM
- Protecting Workgroups and Untrusted Domains
- Recovering data from Backup
- Integrating DPM with Azure Backup

