Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The DPM 2012 R2 software depends on both local security groups that are referred to when the DCOM
object that controls the DPMRA service is used to initiate a VSS Request for the protected data source."
Any command-line input or output is written as follows:
Set-ReplicaCreationMethod –ProtectionGroup $newpg –Now
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "In the Select protection group type step, choose Clients and click on Next > to continue."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.