Installing and configuring software for application protection of Microsoft Exchange Server

To protect a guest virtual machine (VM) that hosts Microsoft Exchange Server data, you must complete installation and configuration steps on the Hyper-V host and the guest VM. Use the step-by-step instructions to help you get your environment up and running for in-guest application protection.

Before you begin

Review the software requirements in technote 2017347.

About this task

The following table lists the names that are used as examples in the tasks that follow. When you use the sample commands and options, replace the examples with the appropriate Hyper-V host and guest VM names from your environment.

Type of Name Example
Hyper-V host or cluster name Kingston5
Name of guest VM hosting Microsoft Exchange Server Kingston40

Complete the following steps to install, set up, and configure Data Protection for Microsoft Hyper-V and Data Protection for Microsoft Exchange Server to protect Microsoft Exchange Server data on VM guests.