Hi,
Best Practices
The following are best practices from this chapter:
Do not install DPM on domain controllers, Exchange servers, or Operations Manager management or Gateway servers.
For most enterprise deployments, the recommended protection method is to use D2D2T or D2D2C.
DPM can be deployed onto a virtual machine. However, when a virtual machine is used, the storage pool needs to be connected by using pass-through disks or iSCSI.
Although the DPM Installation Wizard attempts to install prerequisite software, it is always a best practice to understand what requirements need to be met before installing a server application.
Spend time mapping out your DPM deployment. Failure to fully understand the business requirements and then designing a DPM installation to meet those requirements might result in data loss or worse.
Note: Retention Period can be set upon your storage capacity & organization demand.
http://www.networkworld.com/community/node/60218
http://technet.microsoft.com/en-us/library/hh315816.aspx