AppAssure 5 User GuideVersion 5.3.6
10 | Contents
100 | Protecting Workstations and Servers Memory (Physical) Display Name Fully Qualified Domain NameDetailed information about the volumes conta
Protecting Workstations and Servers | 1012. From the Machines tab, perform one of the following: Click the hyperlink for the machine you want to modi
102 | Protecting Workstations and Servers Enable Events Select which events to share with this notification group. You can select All or select a sub
Protecting Workstations and Servers | 1037. Click OK to save your changes. 8. To edit an existing notification group, click Edit next to the notificat
104 | Protecting Workstations and Servers 7. Click OK. Enable Events Select which events to share with the notification group.You can select All or s
Protecting Workstations and Servers | 105Customizing Retention Policy SettingsThe retention policy for a machine specifies how long the recovery point
106 | Protecting Workstations and Servers 5. Select Enable Rollup, and specify the time intervals for retaining the backup data as needed. The retent
Protecting Workstations and Servers | 107The Newest Recovery Point text box displays the most recent recovery point. The oldest recovery point would b
108 | Protecting Workstations and Servers 3. Click the Configuration tab, and then click Licensing.The Status screen appears and presents the details
Protecting Workstations and Servers | 1094. In the Edit Protection Settings dialog box, click the Edit link next to the volume for which you want to c
What’s New in AppAssure 5 | 11This chapter lists new and changed features in this release of AppAssure 5.What’s New in AppAssure 5 User GuideThe follo
110 | Protecting Workstations and Servers 5. In the Protection Schedule dialog box, edit the following schedule options as needed for protecting your
Protecting Workstations and Servers | 111 Virtual Machine Export. Creates a virtual machine (VM) from a recovery point, containing all of the data fr
112 | Protecting Workstations and Servers To modify transfer settings1. On the AppAssure 5 Core Console, do one of the following: Click the Machine
Protecting Workstations and Servers | 1134. Enter the Transfer Settings options for the machine as described in the following table.Text Box Descripti
114 | Protecting Workstations and Servers 5. Click OK.Restarting a ServiceComplete the steps in this procedure to restart a service.To restart a serv
Protecting Workstations and Servers | 115Viewing Machine LogsIf you encounter any errors or issues with the machine, it may be useful to view the logs
116 | Protecting Workstations and Servers 4. Click Verify to validate the credentials you entered. The Deploy Agent dialog box displays a message to
Protecting Workstations and Servers | 1176. Click Protect.Managing MachinesThis section describes a variety of tasks you can perform in managing your
118 | Protecting Workstations and Servers 3. In the Actions drop-down menu, click Remove Machines, and then select one of the option described in the
Protecting Workstations and Servers | 119Setting Replication Priority for an AgentComplete the steps below to set the priority for when an agent repli
12 | What’s New in AppAssure 5 About the Local Mount Utility on page 75 Modified topic. It describes the Local Mount Utility (the LMU). Updated langu
120 | Protecting Workstations and Servers Viewing Machine Status and Other DetailsComplete the step in this procedure to view the status as well as o
Protecting Workstations and Servers | 121 Used Space Free spaceIf SQL Server is installed on the machine, detailed information about the server also
122 | Protecting Workstations and Servers Deploying to Multiple MachinesYou can simplify the task of deploying the AppAssure Agent software to multip
Protecting Workstations and Servers | 1235. On the Add Machines from Active Directory dialog box, select the machines to which you want to deploy the
124 | Protecting Workstations and Servers b. Click Save.7. To verify that AppAssure 5 can connect to each machine successfully, select each machine i
Protecting Workstations and Servers | 125Deploying to Machines on a VMware vCenter/ESX(i) Virtual HostBefore starting this procedure, you must have th
126 | Protecting Workstations and Servers 5. In the Deploy Agent on Machines window, you should see the machines that you added. If you want to selec
Protecting Workstations and Servers | 1272. On the Deploy Agent on Machines window, do one of the following: Click New to enter a new machine host, l
128 | Protecting Workstations and Servers 4. Verify that AppAssure 5 can connect to each machine successfully. To do this, select each machine in the
Protecting Workstations and Servers | 129Protecting Multiple MachinesAfter bulk deploying the AppAssure 5 Agent software to your Windows machines, you
What’s New in AppAssure 5 | 13Understanding Bare Metal Restore on page 156 Modified topic. Formerly titled About Bare Metal Restore for Windows Machin
130 | Protecting Workstations and Servers 3. Once you have added the machines for protection, in the Protect Machines window, you should see the newl
Protecting Workstations and Servers | 131Monitoring the Protection of Multiple MachinesYou can monitor the progress as AppAssure 5 applies the protect
132 | Protecting Workstations and Servers 2. Click the Events tab to view related tasks and alerts.The Events tab displays, showing Task and Alert ev
Protecting Workstations and Servers | 133 Progress Phase Failure Reason, if applicable2. Click Open in New window to launch a new window to view th
134 | Protecting Workstations and Servers To view recovery points In the left navigation area of the AppAssure Core Console, select the machine for
Protecting Workstations and Servers | 135To view a specific recovery point1. In the left navigation area of the AppAssure Core Console, select the mac
136 | Protecting Workstations and Servers 3. Click the right angle bracket > symbol next to a volume in the selected recovery point to expand the
Protecting Workstations and Servers | 1372. In the Mount Recovery Point dialog box, edit the text boxes for mounting a recovery point as described in
138 | Protecting Workstations and Servers 2. From the Tools option, click System Info.3. In the Local Mounts section, click Dismount All.Mounting a R
Protecting Workstations and Servers | 1398. Enter the following command to select and mount the specified recovery point at the specified mount point/
14 | What’s New in AppAssure 5 Mapping Volumes for a Bare Metal Restore on page 166Modified topic. This topic, previously entitled “Mapping Volumes,”
140 | Protecting Workstations and Servers To remove recovery points 1. In the left navigation area of the AppAssure 5 Core Console, select the machin
Protecting Workstations and Servers | 141For more information about forcing a base image, see “Forcing a Snapshot” on page 141.To delete an orphaned r
142 | Protecting Workstations and Servers 2. Click the Actions drop-down menu for that machine, click Force Snapshot, and then select one of the opti
Protecting Workstations and Servers | 143The following diagram shows a typical deployment for exporting data to a virtual machine.Figure 23. Virtual
144 | Protecting Workstations and Servers Non-simple dynamic volumes have arbitrary disk geometries that cannot be fully interpreted and therefore Ap
Protecting Workstations and Servers | 145Performing a One-Time ESXi ExportYou can choose to perform a one-time export for ESXi. Complete the steps in
146 | Protecting Workstations and Servers 2. In the list of protected machines, select the machine or cluster with the recovery point that you want t
Protecting Workstations and Servers | 147Exporting Windows Data using VMware Workstation ExportIn AppAssure 5, you can choose to export data using VMw
148 | Protecting Workstations and Servers To define one-time settings for performing a VMware Workstation export1. From the Virtual Standby Recovery
Protecting Workstations and Servers | 149Performing a Continuous (Virtual Standby) VMware Workstation ExportYou can choose to perform a continuous exp
What’s New in AppAssure 5 | 15Transferring the Live DVD ISO Image to Media on page 174New topic. It describes burning the Live DVD boot ISO image to m
150 | Protecting Workstations and Servers 8. In the Options pane, enter the information for the virtual machine and memory usage as described in the
Protecting Workstations and Servers | 151Defining One-Time Settings for Performing a Hyper-V ExportComplete the steps in this procedure to define the
152 | Protecting Workstations and Servers Performing a Continuous (Virtual Standby) Hyper-V ExportYou can choose to perform a continuous export for H
Protecting Workstations and Servers | 1539. Select the Options tab and then enter the name for the virtual machine in the Virtual Machine Name text bo
154 | Protecting Workstations and Servers 3. Click Load Volumes.The Volume Mapping dialog box displays.NOTE: The Core console does not automatically
Protecting Workstations and Servers | 155To perform a rollback for a volume on a Linux machine1. Run the AppAssure aamount utility as root, for exampl
156 | Protecting Workstations and Servers 7. When prompted to proceed, enter y for Yes.Once the rollback proceeds, a series of messages will display
Protecting Workstations and Servers | 157Examples of performing a BMR for similar hardware include replacing the hard drive of the existing system, or
158 | Protecting Workstations and Servers In all cases, you will need to load the boot image into the destination server and start the server from
Protecting Workstations and Servers | 159 Storage space and partitions, as appropriate. Ensure that there is enough space on the hard drive to create
16 | What’s New in AppAssure 5 Additional ChangesThis version of the AppAssure 5 User Guide also includes the following general changes: Editorial c
160 | Protecting Workstations and Servers The boot CD ISO image that you create is tailored to the machine being restored; therefore, it must contain
Protecting Workstations and Servers | 161Naming the Boot CD File and Setting the Path Complete the following step to name the boot CD file and set the
162 | Protecting Workstations and Servers Data restored from the recovery point includes drivers for the hardware previously in place. If performing
Protecting Workstations and Servers | 163Accessing the ISO ImageComplete the following step to access the ISO image.To access the ISO image To access
164 | Protecting Workstations and Servers AppAssure 5 Agent softwareThe AppAssure Universal Recovery Console starts and displays the IP address and
Protecting Workstations and Servers | 165Selecting a Recovery Point and Initiating Rollback for BMR Once the Universal Recovery Console is accessible
166 | Protecting Workstations and Servers 6. Enter the information about the machine to which you want to connect as described in the following table
Protecting Workstations and Servers | 167To map volumes for a bare metal restore1. If you want to map volumes automatically, do the following. If you
168 | Protecting Workstations and Servers If you are unsure which drivers are required by your target server, click the System Info tab in the Univer
Protecting Workstations and Servers | 169Viewing the Recovery ProgressComplete the steps in this procedure to view the recovery progress of a rollback
Introduction to AppAssure 5 | 17This chapter provides an introduction and overview of AppAssure 5. It describes the features, functionality, and archi
170 | Protecting Workstations and Servers Troubleshooting Connections to the Universal Recovery Console The following are troubleshooting steps for c
Protecting Workstations and Servers | 171Roadmap for Performing a Bare Metal Restore on Linux MachinesIn AppAssure 5 you can perform a Bare Metal Rest
172 | Protecting Workstations and Servers Verifying a Bare Metal Restore. After starting the bare metal restore, you can verify and monitor your pr
Protecting Workstations and Servers | 173Managing a Linux Boot ImageA bare metal restore for Linux requires a Live DVD boot image, which you download
174 | Protecting Workstations and Servers This task is a step in “Roadmap for Performing a Bare Metal Restore for a Windows Machine” on page 157. It
Protecting Workstations and Servers | 175To load a Live DVD and start the target machine1. Navigate to the new server and load the Live DVD image from
176 | Protecting Workstations and Servers This task is a step in “Roadmap for Performing a Bare Metal Restore on Linux Machines” on page 171. It is p
Protecting Workstations and Servers | 177Mounting Partitions from the Command LineIf performing a BMR using the AppAssure 5 Core Console, you must fir
178 | Protecting Workstations and Servers “Selecting a Recovery Point and Initiating Rollback for BMR” on page 165 “Mapping Volumes for a Bare Met
Protecting Workstations and Servers | 179Launching a Bare Metal Restore for a Linux Machine using the Command LineOnce the Live DVD ISO image is acces
18 | Introduction to AppAssure 5 Today's legacy backup tools and first generation VM backup tools are inefficient and ineffective. The outdated
180 | Protecting Workstations and Servers 6. When prompted, enter the connection information for the AppAssure 5 Core as described in the following t
Protecting Workstations and Servers | 181 Size of the recovery point An ID number for the volume that includes a sequence number at the end, which i
182 | Protecting Workstations and Servers 9. When prompted to proceed, enter y for Yes and then press Enter.After the rollback begins, a series of me
Protecting Workstations and Servers | 183To perform a file system check on the restored volume1. From the command line in the Universal Recovery Conso
184 | Protecting Workstations and Servers To create bootable partitions on a Linux machine by using the command line1. From the command line in the U
Protecting Workstations and Servers | 1855. Now you must delete the existing bitmap store by typing the following command and then press Enter:rm -rf
186 | Protecting Workstations and Servers 13. Obtain the UUID of mount /etc/mtab and compare it to the UUIDs for the root (for Ubuntu and CentOS) an
Protecting Workstations and Servers | 187 To view events for all machines managed by a core, in the Core Console, click the Events tab. To view even
188 | Protecting Workstations and Servers This page is intentionally left blank.
Protecting Server Clusters | 189This chapter describes how to protect information on Microsoft SQL Server or Exchange Server clusters using AppAssure
Introduction to AppAssure 5 | 19Universal RecoveryUniversal Recovery technology gives you unlimited machine restoration flexibility. You can restore y
190 | Protecting Server Clusters You can easily configure an AppAssure 5 Core to protect and manage a cluster. In the Core Console, a cluster is orga
Protecting Server Clusters | 191Protecting a ClusterThis topic describes how to add a cluster for protection in AppAssure 5. When you add a cluster to
192 | Protecting Server Clusters b. In the Volumes dialog box, select the volume(s) to protect, and then click Edit. c. In the Protection Schedule di
Protecting Server Clusters | 1933. In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and then click Co
194 | Protecting Server Clusters 1. Do one of the following. Navigate to the cluster that contains the node you want to modify, click the Machines
Protecting Server Clusters | 195 In the Core Console, click the Machines tab, and then select the cluster you wish to modify. Or, in the left naviga
196 | Protecting Server Clusters 4. If you selected Custom alert settings, do the following:a. Click Add Group to add a new notification group for se
Protecting Server Clusters | 197 In the Core Console, click the Machines tab, and then select the cluster you wish to modify. Or, in the left naviga
198 | Protecting Server Clusters Rollback. Restores backup information for a protected cluster.To modify cluster transfer settings1. Do one of the
Protecting Server Clusters | 199 In the Core Console, click the Machines tab, and then select the cluster you wish to view. Or, in the left navigati
Notes, Cautions and WarningsInformation in this publication is subject to change without notice.© 2013 Dell Inc. All rights reserved.Reproduction of t
20 | Introduction to AppAssure 5 RepositoryThe AppAssure repository uses deduplication volume manager (DVM) to implement a volume manager that provid
200 | Protecting Server Clusters For information about viewing summary and status information for an individual machine or node in the cluster, see “
Protecting Server Clusters | 201Managing Snapshots for a ClusterIn AppAssure 5, you can manage snapshots by forcing a snapshot or by pausing current s
202 | Protecting Server Clusters 3. In the Pause Protection dialog box, select one of the options described in the following table.Dismounting Local
Protecting Server Clusters | 2032. Perform a rollback using the standard AppAssure procedure for the machine as described in “Performing a Rollback” o
204 | Protecting Server Clusters Removing a Cluster from ProtectionComplete the steps in the following procedure to remove a cluster from protection.
Protecting Server Clusters | 205Removing All Nodes in a Cluster from ProtectionComplete the steps in this procedure to remove all nodes in a cluster f
206 | Protecting Server Clusters 3. In the Start Time drop-down calendar, select a start date, and then enter a start time for the report.NOTE: No da
Reporting | 207This chapter provides an overview of reporting available in AppAssure 5. It consists of the following topics: About Reports on page 20
208 | Reporting About the Reports ToolbarThe toolbar available for all reports lets you print and save in two different ways. The following table des
Reporting | 209 Time Total WorkFor information about how to generate a report, see “Generating a Report for a Core or Agent” on page 210.About Error
Introduction to AppAssure 5 | 21The typical disk layout of a server consists of the operating system, application, and data. In most environments, the
210 | Reporting Details about the repositories are presented in a column view with the following categories: Name Data Path Metadata Path Allocat
Reporting | 2114. In the left navigation area, select the report you want to run. The reports available depend on the selection you made in Step 1 and
212 | Reporting To generate a report from the Central Management Console1. From the Central Management Console Welcome screen, click the drop-down me
Scripting | 213This appendix describes the scripts that can be used by administrators at designated occurrences in AppAssure 5 for Windows and Linux.
214 | Scripting About PowerShell Scripting in AppAssure 5Windows PowerShell is a Microsoft .NET Framework-connected environment designed for administ
Scripting | 215Testing PowerShell ScriptsIf you want to test the scripts you plan to run, you can do so by using the PowerShell graphical editor, powe
216 | Scripting AgentTransferConfiguration (namespace Replay.Common.Contracts.Transfer)The following table presents the available objects for the Age
Scripting | 217BackgroundJobRequest (namespace Replay.Core.Contracts.BackgroundJobs)The following table presents the available objects for the Backgro
218 | Scripting NightlyAttachabilityJobRequest (namespace Replay.Core.Contracts.Sql)Inherits its values from the parameter, BackgroundJobRequest.Roll
Scripting | 219TransferPrescriptParameter (namespace Replay.Common.Contracts.PowerShellExecution)The following table presents the available objects fo
22 | Introduction to AppAssure 5 EncryptionAppAssure 5 provides integrated encryption to protect backups and data-at-rest from unauthorized access an
220 | Scripting public AgentTransferConfiguration TransferConfiguration { get; set; } Gets or sets the transfer configuration.AgentTransferConfigurat
Scripting | 221public AgentTransferConfiguration TransferConfiguration { get; set; } (cont.)ExcludedWriterIds - collection of VSS writer IDs which s
222 | Scripting TransferPostscriptParameter (namespace Replay.Common.Contracts.PowerShellExecution)The following table presents the available objects
Scripting | 223public AgentTransferConfiguration TransferConfiguration { get; set; } Gets or sets the transfer configuration.AgentTransferConfiguratio
224 | Scripting public AgentTransferConfiguration TransferConfiguration { get; set; } (cont.)ExcludedWriterIds - collection of VSS writer IDs which
Scripting | 225VirtualMachineLocation (namespace Replay.Common.Contracts.Virtualization)The following table presents the available objects for the Vir
226 | Scripting VolumeNameCollection (namespace Replay.Common.Contracts.Metadata.Storage)Inherits its values from the parameter, System.Collections.O
Scripting | 227PreTransferScript.ps1The PreTransferScript is executed on the agent side prior to transferring a snapshot.Sample PreTransferScript# rec
228 | Scripting Sample PostTransferScript# receiving parameter from transfer jobparam([object] $TransferPostscriptParameter)# building path to Agent&
Scripting | 229PreExportScript.ps1The PreExportScript is executed on the Core side prior to any export job.Sample PreExportScript# receiving parameter
Introduction to AppAssure 5 | 23ReplicationReplication is the process of copying recovery points and transmitting them to a secondary location for the
230 | Scripting PostExportScript.ps1The PostExportScript is executed on the Core side after any export job.NOTE: There are no input parameters for th
Scripting | 231PreNightlyJobScript.ps1The PreNightlyJobScript is executed before every nighty job on Core side. It has $JobClassName parameter, that h
232 | Scripting echo 'AgentId:' $NightlyAttachabilityJobRequestObject.AgentId; echo 'IsNightlyJob:&apos
Scripting | 233# working with Checksum Check Job ChecksumCheckJob { $ChecksumCheckJobRequestObject = $ChecksumCheckJobRequest -as [Replay.Co
234 | Scripting }}PostNightlyJobScript.ps1The PostNightlyJobScript is executed after every nighty job on Core side. It has $JobClassName paramete
Scripting | 235 $NightlyAttachabilityJobRequestObject = $NightlyAttachabilityJobRequest -as [Replay.Core.Contracts.Sql.NightlyAttachabilityJobR
236 | Scripting echo 'Agents GUIDs:' foreach ($a in $AgentsCollection) { echo $a }
Scripting | 237 else { echo 'TransferConfiguration:' $TransferJobRequestObject.TransferConfiguration; e
238 | Scripting You can add available objects from the TransferPrescript parameter or add your own commands to the PreTransferScript.sh and PostTrans
Scripting | 239TransferPostscriptParameterThe following table presents the available objects for the TransferPostscript parameter.public string Key {
24 | Introduction to AppAssure 5 Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of the p
240 | Scripting Sample Bourne Shell ScriptsThe following sample scripts are provided to assist administrative users in executing Bourne Shell scripts
Scripting | 241TransferPrescriptParameter_ForceBaseImage=$TransferPrescriptParameter_ForceBaseImageTransferPrescriptParameter_IsLogTruncation=$Transfe
242 | Scripting This page is intentionally left blank.
Glossary | 243AgentAn agent is a machine or server that is protected or to be protected by AppAssure 5.AppAssure 5AppAssure 5 sets a new standard for
244 | Glossary CoreThe AppAssure 5 Core is the central component of the AppAssure architecture. The Core provides the essential services for backup,
Glossary | 245MachineA machine, sometimes referred to as an agent, is a physical or virtual machine or server that is protected by the AppAssure 5 Cor
246 | Glossary ReplicationReplication is self-optimizing with a unique read-match-write (RMW) algorithm that is tightly coupled with deduplication. I
Glossary | 247Target CoreThe target core, which is sometimes referred to as replica core, is the AppAssure 5 Core receiving the replicated data from t
248 | Glossary This page intentionally left blank.
Index | 1Aabout - 80, - 178Active Directorydeploying to multiple machines - 122agentdeploying when protecting an agent - 94replicating - 116reporting
Introduction to AppAssure 5 | 25Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) media. S
2 | IndexCentral Management Console Core Reportsgenerating - 211checksum checksforcing - 87cloudabout - 26clustersnapshot, forcing - 201snapshot, pau
Index | 3Llaunching, from command line - 179license informationviewing - 107license keychanging - 31licensesmanaging - 30live cdloading - 174Live DVD
4 | Indexprotection schedulesmodifying - 108modifying for clusters - 197Rrecoverymanaging - 73recovery pointmounting for Linux machines - 138mounting
Index | 5input parameters - 215, - 238NightlyAttachabilityJobRequest - 218powershell.exe.config - 214RollupJobRequest - 218TakeSnapshotResponse - 218
6 | Index
26 | Introduction to AppAssure 5 Virtualization and CloudThe AppAssure 5 Core is cloud-ready, which allows you to leverage the compute capacity of th
Introduction to AppAssure 5 | 27Service Management APIsAppAssure 5 comes bundled with a set of service management APIs and provides programmatic acces
28 | Introduction to AppAssure 5 This page is intentionally left blank.
Working with the AppAssure 5 Core | 29This chapter describes the various aspects of working with, configuring, and managing the AppAssure 5 Core. It i
Contents | 3Chapter 1: What’s New in AppAssure 5What’s New in AppAssure 5 User Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30 | Working with the AppAssure 5 Core Accessing the AppAssure 5 Core ConsoleComplete the following steps to access the AppAssure 5 Core Console.To a
Working with the AppAssure 5 Core | 31The Licensing page includes the following information: License type License status License pool size Number
32 | Working with the AppAssure 5 Core 2. Click Licensing.The Licensing page appears.3. From the License Server option, click Contact Now.Managing Ap
Working with the AppAssure 5 Core | 333. In the Start Time text box, enter a new start time.4. Click OK.Modifying the Transfer Queue SettingsTransfer
34 | Working with the AppAssure 5 Core Configuring Deduplication Cache SettingsComplete the steps in this procedure to configure deduplication cache
Working with the AppAssure 5 Core | 354. Click OK.Modifying Database Connection SettingsComplete the steps in this procedure to modify the database co
36 | Working with the AppAssure 5 Core 4. Click Test Connection to verify your settings.5. Click Save.About RepositoriesA repository is used to store
Working with the AppAssure 5 Core | 37When you create a repository, the Core pre-allocates the space required for storing data and metadata in the spe
38 | Working with the AppAssure 5 Core 4. Click Add Storage Location to define the specific storage location or volume for the repository. NOTE: AppA
Working with the AppAssure 5 Core | 396. In the Details pane, click Show/Hide Details and enter the details for the storage location as described in t
4 | ContentsManaging AppAssure 5 Core Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
40 | Working with the AppAssure 5 Core Viewing Details about a RepositoryComplete the following step to view the details for a repository.To view det
Working with the AppAssure 5 Core | 412. Click the right angle bracket > symbol next to the Status column of the repository that you want to modify
42 | Working with the AppAssure 5 Core Select Add file on local disk to specify a local machine and then enter the information as described in the
Working with the AppAssure 5 Core | 434. In the Details pane, click Show/Hide Details and enter the details for the storage location as described in t
44 | Working with the AppAssure 5 Core Checking a RepositoryAppAssure 5 provides the ability to perform a diagnostic check of a repository volume whe
Working with the AppAssure 5 Core | 45Key security concepts and considerations include: Encryption is performed using 256 Bit AES in Cipher Block Cha
46 | Working with the AppAssure 5 Core To edit an encryption key1. Navigate to the AppAssure 5 Core, and then click the Configuration tab.2. From the
Working with the AppAssure 5 Core | 473. Click the Actions drop-down menu, and then click Import.The Import Key dialog box displays.4. In the Import K
48 | Working with the AppAssure 5 Core Understanding ReplicationThis section provides conceptual and procedural information to help you understand an
Working with the AppAssure 5 Core | 49Possible replication configurations include: Point to Point. Replicates a single agent from a single source cor
Contents | 5Managing Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
50 | Working with the AppAssure 5 Core About SeedingReplication begins with seeding: the initial transfer of deduplicated base images and incremental
Working with the AppAssure 5 Core | 51About Failover and Failback in AppAssure 5In the case of a severe outage in which your source core and agents fa
52 | Working with the AppAssure 5 Core Performance Considerations for Replicated Data TransferIf the bandwidth between the source core and the target
Working with the AppAssure 5 Core | 53If a link fails during data transfer, replication resumes from the previous failure point of the transfer once l
54 | Working with the AppAssure 5 Core Configuring the Source Core to Replicate to a Self-Managed Target CoreComplete the steps in the following proc
Working with the AppAssure 5 Core | 559. In the Copy to Seed Drive dialog box, enter the information described in the following table.NOTE: Because la
56 | Working with the AppAssure 5 Core Configuring Replication to a Target Core Managed by a Third PartyComplete the steps in this procedure to confi
Working with the AppAssure 5 Core | 578. In the Copy to Seed Drive dialog box, enter the information for the seed drive as described in the table belo
58 | Working with the AppAssure 5 Core To deny a request without reviewing it, see “Ignoring a Replication Request” on page 58.To review a replicatio
Working with the AppAssure 5 Core | 593. Under Pending Replication Requests, click the drop-down menu next to the request you want to ignore, and then
6 | ContentsViewing and Modifying Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Viewing System Inf
60 | Working with the AppAssure 5 Core Abandoning an Outstanding Seed DriveIf you create a seed drive with the intent to consume it on the target cor
Working with the AppAssure 5 Core | 612. On this tab, you can view information about and monitor the status of replication tasks as described in the f
62 | Working with the AppAssure 5 Core Pausing and Resuming ReplicationYou can pause replication temporarily for the source (outgoing) or target (inc
Working with the AppAssure 5 Core | 63 “Removing a Target Core from Replication” on page 63 “Removing a Source Core from Replication” on page 64NOTE
64 | Working with the AppAssure 5 Core To remove a target core from replication1. On the source core, open the AppAssure 5 Core Console, and click to
Working with the AppAssure 5 Core | 65 Perform a virtual machine (VM) export. For more information, see “Exporting Backup Information for your Window
66 | Working with the AppAssure 5 Core Performing Failover on the Target CoreWhen you encounter a disaster situation in which your source core and as
Working with the AppAssure 5 Core | 673. On the Actions menu, click Failback. The Failback Warnings dialog box opens to describe the steps you need to
68 | Working with the AppAssure 5 Core Managing EventsManaging core events assists with the monitoring of the health and usage of the AppAssure 5 Cor
Working with the AppAssure 5 Core | 69 Enable Events Notification Options4. In the description area, enter basic information for the notification gr
Contents | 7Prerequisites for Performing a Bare Metal Restore for a Windows Machine . . . . . . . . . . . 158Managing a Windows Boot Image . . . .
70 | Working with the AppAssure 5 Core 6. In the Notification Options tab, specify how to handle the notification process. The following table descri
Working with the AppAssure 5 Core | 713. In the Email SMTP Settings pane, click Change.The Edit Email Notification Configuration dialog box appears.4.
72 | Working with the AppAssure 5 Core 5. Enter a subject for the email template. It is used to define the subject of the email notification template
Working with the AppAssure 5 Core | 734. In the Retain event and job history for: text box, enter the number of days that you want to retain informati
74 | Working with the AppAssure 5 Core About System InformationAppAssure 5 lets you view information about the AppAssure 5 Core that includes system
Working with the AppAssure 5 Core | 75Downloading the Agent InstallerYou can download and deploy the AppAssure 5 Agent Installer on any machine that w
76 | Working with the AppAssure 5 Core 5. From the Opening LocalMountUtility-Web.exe window, click Save File.The file saves to the local Downloads fo
Working with the AppAssure 5 Core | 773. In the upper-left corner of the AppAssure Local Mount Utility window, click Add Core.4. In the Add Core dialo
78 | Working with the AppAssure 5 Core 2. From the main AppAssure Local Mount Utility window, expand the Core in the navigation tree to reveal the pr
Working with the AppAssure 5 Core | 79ii. Click Mount.The LMU automatically opens the folder containing the mounted recovery point.NOTE: If you select
8 | ContentsModifying Cluster Transfer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Convertin
80 | Working with the AppAssure 5 Core 5. To minimize the LMU application, click the X in the upper-right corner of the Local Mount Utility window.6.
Working with the AppAssure 5 Core | 81Accessing Remote Core OptionsComplete the steps in this procedure to access remote core options.To access remote
82 | Working with the AppAssure 5 Core Creating an ArchiveComplete the steps in this procedure to create an archive.To create an archive1. Navigate t
Working with the AppAssure 5 Core | 833. In the Import Archive dialog box, enter the details for importing the archive as described in the following t
84 | Working with the AppAssure 5 Core Configuring SQL Attachability SettingsPrior to running attachability checks on protected SQL databases, you mu
Working with the AppAssure 5 Core | 85Configuring Nightly SQL Attachability Checks and Log TruncationComplete the steps in this procedure to have the
86 | Working with the AppAssure 5 Core Managing Exchange Database Mountability Checks and Log TruncationWhen using AppAssure 5 to back up Microsoft E
Working with the AppAssure 5 Core | 87Forcing a Mountability CheckComplete the steps in this procedure to force the system to perform a mountability c
88 | Working with the AppAssure 5 Core Forcing Log TruncationComplete the steps in this procedure to force log truncation.To force log truncation1. N
Working with the AppAssure 5 Core | 89Recovery Status Point Colors for Exchange DatabasesThe following table lists the status indicators that display
Contents | 9PreExportScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
90 | Working with the AppAssure 5 Core This page intentionally left blank.
Protecting Workstations and Servers | 91This chapter describes how to protect, configure, and manage the agent machines in your AppAssure environment.
92 | Protecting Workstations and Servers About Protecting Workstations and ServersTo protect your data using AppAssure 5, you need to add the worksta
Protecting Workstations and Servers | 93 Select the Machines tab, and in the Actions drop-down menu, click Protect Machine.The Connect dialog box dis
94 | Protecting Workstations and Servers 7. Click Protect.The first time protection is added for a machine, a base image (that is, a snapshot of all
Protecting Workstations and Servers | 95To deploy agents when protecting an agent.1. From the Connect dialog box, after entering the appropriate conne
96 | Protecting Workstations and Servers The Deploy Agent dialog box closes. There may be a slight delay before you see the selected agent appear in
Protecting Workstations and Servers | 97Modifying Exchange Server SettingsIf you are protecting data from a Microsoft Exchange server, you need to con
98 | Protecting Workstations and Servers 4. You can also modify the logon credentials for SQL Server. To do so, scroll down to the SQL Server Informa
Protecting Workstations and Servers | 993. Click Change to modify the machine settings as described in the following table.Viewing System Information
Comments to this Manuals