Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B
    6
    99
    Protecting machines using the 
    AppAssure Core
    This chapter describes how to protect, configure, and manage the protected machines in your AppAssure 
    environment. It includes the following sections:
    •Dynamic and basic volumes support limitations
    •About the Agent Installer
    •Deploying the Agent (push install)
    •Understanding bulk deploy
    •Understanding protection schedules
    •Protecting a machine
    •Protecting multiple machines
    To protect your data using AppAssure, you need to add the workstations and servers for protection in the 
    AppAssure Core Console; for example, your Exchange server, SQL Server, Linux server, and so on.
    In the AppAssure Core Console, you can identify the machine on which the AppAssure Agent software is 
    installed, and specify which volumes, for example, a Microsoft Windows Storage Space, to protect. You can 
    define the schedules for protection, add additional security measures such as encryption, and much more. For 
    more information on how to access the AppAssure Core Console to protect workstations and servers, see 
    Protecting a machine.
    Dynamic and basic volumes support 
    limitations
    AppAssure supports taking snapshots of all dynamic and basic volumes. AppAssure also supports exporting 
    simple dynamic volumes that are on a single physical disk. As their name implies, simple dynamic volumes are 
    not striped, mirrored or spanned volumes.
    Dynamic disks (except simple dynamic disks as previously described) are not available for selection in the 
    Export Wizard. Non-simple, dynamic volumes have arbitrary disk geometries that cannot be fully interpreted. 
    AppAssure therefore does not support the export of complex or non-simple dynamic volumes.
    Notification appears in the user interface to alert you that exports are limited and restricted to simple dynamic 
    volumes. If you attempt to export anything other than a single dynamic volume, the export job will fail.
    CAUTION: AppAssure does not support bare metal restores (BMRs) of Linux machines with EXT2 boot 
    partitions. Any BMR performed on a machine with this type of partition results in a machine that does 
    not start. If you want to be able to perform a BMR on this machine in the future, you must convert any 
    EXT2 partitions to EXT3 or EXT4 before you begin protecting and backing up the machine. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B100
    About the Agent Installer
    AppAssure lets you download installers from the AppAssure Core. From the Tools tab, you can choose to 
    download the Agent Installer or the Local Mount Utility (LMU). For more information about the LMU, see 
    Understanding the Local Mount Utility.
    The Agent installer is used to install the AppAssure Agent application on machines that are intended to be 
    protected by the AppAssure Core. If you determine that you have a machine that requires the Agent Installer, 
    you can download the web installer from the Tools tab in the AppAssure Core.
    Downloading the Agent Installer
    You can download and deploy the AppAssure Agent Installer on any machine that will be protected by the 
    AppAssure Core. Complete the steps in this procedure to download the web installer.
    To download the AppAssure Agent installer
    1 Download the AppAssure Agent installer file from the Dell AppAssure License Portal or from the 
    AppAssure Core. For example:
    Agent-X64-5.2.1.xxxxx.exe
    2Click Save File.
    For more information about installing agents, see the Dell AppAssure Installation and Upgrade Guide.
    Deploying the Agent (push install)
    AppAssure lets you deploy the AppAssure Agent Installer to individual Windows machines for protection. 
    Complete the steps in the following procedure to push the installer to an agent.
    To deploy agents to multiple machines at the same time, see Deploying to multiple machines.
    To deploy the agent
    1 In the AppAssure Core Console in the left navigation area, click Protected Machines to open the Machines 
    page.
    2In the Actions drop-down menu, click Deploy Agent.
    The Deploy Agent dialog box appears.
    3 In the Deploy Agent dialog box, enter the logon settings as described in the following table.
    NOTE: For access to the Agent Installer, see Downloading the Agent Installer. For more information about 
    deploying the Agent Installer, see the Dell AppAssure Installation and Upgrade Guide.
    NOTE: Downloading of the Core is performed from the Dell AppAssure License Portal. For more 
    information or to download the AppAssure Core installer, visit https://licenseportal.com.
    NOTE: Agents must be configured with a security policy that makes remote installation possible.
    Table 47. Machine logon settings
    Te x t  B o x D e s c r i p t i o n
    Machine Enter the host name or IP address of the agent machine that you 
    want to deploy.
    User name Enter the user name to connect to this machine; for example, 
    Administrator or, if the machine is in a domain, [domain 
    name]\Administrator). 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B101 4Click Ve r i f y to validate the credentials you entered.
    The Deploy Agent dialog box displays a message to indicate that validation is being performed. Click 
    Abort if you want to cancel the verification process. After the verification process is complete, a 
    message indicating that verification has been completed displays.
    5Click Deploy.
    A message indicating that the deployment has started displays. You can view the progress in the Events 
    tab. Click Show details to view more information about the status of the agent deployment.
    6Click OK.
    Modifying deploy settings
    Complete the steps in this procedure to modify deploy settings.
    To modify deploy settings
    1 Navigate to the AppAssure Core Console and click the Configuration tab, and then Settings.
    2 In the Deploy Settings pane, click Change.
    The Deploy Settings dialog box displays.
    3 In the Agent Installer Name text box, enter the name of the agent executable file. The default is Agent-
    web.exe.
    4 In the Core Address text box, enter the address for the core.
    5 In the Failed Receive Timeout text box, enter the number of minutes to wait without activity to timeout.
    6 In the Max Parallel Installs text box, enter a number for the maximum installations that can be installed 
    in parallel.
    7 Select either or both of the following optional settings:
    • Automatic reboot after install
    • Protect After Deploy
    8Click OK.
    Understanding bulk deploy
    This topic describes the tasks that administrators perform to deploy the AppAssure Agent software 
    simultaneously to multiple Windows machines. This batch processing capability is known as the bulk deploy 
    feature.
    To deploy and protect multiple agents, perform the following tasks:
    1 Deploy AppAssure Agent to multiple machines. See Deploying to multiple machines.
    2 Monitor the activity of the batch deployment. See Verifying the deployment to multiple machines. Password Enter the password to connect to this machine
    Automatic reboot after install Select to specify whether the Core should start upon the 
    completion of the deployment and installation of the AppAssure 
    Agent Installer. Table 47. Machine logon settings
    Te x t  B o x D e s c r i p t i o n 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B102 3 Protect multiple machines. See Protecting multiple machines.
    4 Monitor the activity of the batch protection. See Monitoring the protection of multiple machines.
    Deploying to multiple machines
    You can simplify the task of deploying the AppAssure Agent software to multiple Windows machines by using the 
    bulk deploy feature of Dell AppAssure. From within the Core Console, you can specifically bulk deploy to:
    •Machines on an Active Directory domain
    •Machines on a VMware vCenter/ESX(i) virtual host
    •Machines on any other host
    The bulk deploy feature automatically detects machines on a host and allows you to select those to which you 
    want to deploy. Alternatively, you can manually enter host and machine information.
    Deploying to machines on an Active Directory domain
    Before starting this procedure, you must have the domain information and logon credentials for the Active 
    Directory server.
    To deploy to machines on an Active Directory domain
    1 On the AppAssure Core Console, click the Tools tab, and then click Bulk Deploy.
    2 On the Deploy Agent to Machines pane, click Active Directory.
    3 In the Connect to Active Directory dialog box, enter the domain information and logon credentials as 
    described in the following table.
    4Click Connect.
    5 On the Add Machines from Active Directory dialog box, select the machines to which you want to deploy 
    the AppAssure Agent software, and then click Add.
    The machines you added appear on the Deploy Agent to Machines pane. The system verifies each 
    machine you added automatically.
    6 Optionally, you can verify any machine by selecting the machine and then clicking Ve r i f y in the toolbar.
    NOTE: This step can be skipped if you selected the Protect Machine After Install option during 
    deployment.
    NOTE: You can use the bulk deploy feature to deploy the Agent software to as many as 50 agent machines. 
    The machines to which you are deploying must have access to the Internet to download and install bits, 
    since the AppAssure Core uses the Web version of the AppAssure Agent Installer to deploy the installation 
    components. If access to the Internet is not available, you will need to manually download the AppAssure 
    Agent Installer from the Dell AppAssure License Portal and deploy it to the individual machines that you 
    want to protect.
    
    For more information, see the Dell AppAssure License Portal User Guide.
    Table 48. Domain information and credentials
    Te x t  B o x D e s c r i p t i o n
    Host The host name or IP address of the Active Directory domain.
    User name The user name used to connect to the domain; for example, Administrator or, if the 
    machine is in a domain, [domain name]\Administrator).
    Password The secure password used to connect to the domain. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B103 7 Check the status icon and message for each machine on the Deploy Agents to Machines page. These 
    reflect the readiness of each machine for deployment, as follows:
    •Green icon - AppAssure is able to connect to the machine and it is ready to be deployed.
    •Yellow icon - AppAssure is able to connect to the machine; however, the AppAssure Agent on the 
    machine is already paired with an AppAssure Core.
    •Red icon - AppAssure cannot connect to the machine. This may be because the logon credentials 
    are incorrect, the machine is shut down, the firewall is blocking traffic, or another problem.
    •If the status message for each machine indicates that it is ready to deploy, skip to Step 9.
    •Optionally, if the status message shows a Details link, click on Details to determine if you can 
    correct the issue.
    8 To correct issues connecting to any machine showing a red status, or to enable automatic protection, 
    change port or authentication information, change the display name, specify a repository or establish an 
    encryption key, click Settings on the toolbar or click the Edit link next to the machine, and then do the 
    following:
    a In the Edit Settings dialog box, specify the settings as described in the following table.
    bClick Save.
    9 After machines are successfully verified, select each machine to which you want to deploy the AppAssure 
    Agent, and then click Deploy.
    If you proceed with protecting an agent that is already protected by another Core, that protection will 
    be stopped and the machine will now be protected by this Core.
    If you chose the Protect machine after install option, after deployment is successful, the machines 
    automatically reboot and protection is enabled.
    NOTE: The Agent software will not be deployed to any machine with a red status icon.
    Table 49. Active Directory settings
    Te x t  B o x D e s c r i p t i o n
    Host name
    Automatically provided from 
    Step 3.
    User name
    Automatically provided from 
    Step 3.
    Pa s sw or dEnter the password for the machine.
    Automatic reboot after 
    installMandatory. Reboots the machine after deployment, which is required before 
    protecting any agent machine.
    Protect machine after 
    installSelected by default. If selected, the system will automatically protect the 
    machine after deployment. (This allows you to skip Pr ote ct in g m ul ti ple  
    machines.)
    Display name
    Automatically assigned based on the host name provided in 
    Step 3.
    This is the name that appears in the Core Console for the selected machine.
    Port The port number on which the AppAssure Core communicates with the agent 
    on the machine.
    The default port is 8006.
    Repository Use the drop-down list to select the repository on the AppAssure Core where 
    the data from the specified machines should be stored.
    This option is only available when you select Protect machine after install.
    Encryption key (Optional) Use the drop-down list to specify whether encryption should be 
    applied to the data on the specified machine. The encryption key is assigned 
    to all machines that are being protected.
    NOTE: This option is only available when you select Protect machine after 
    install. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B104
    Deploying to machines on a VMware vCenter/ESX(i) 
    virtual host
    Before starting this procedure, you must have the host location information and logon credentials for the 
    VMware vCenter/ESX(i) virtual host.
    To deploy to machines on a vCenter/ESX(i) virtual host
    1 Navigate to the AppAssure Core Console, click the Tools tab, and then click Bulk Deploy.
    2 In the Deploy Agent to Machines window, click vCenter/ESX(i).
    3 In the Connect to vCenter Server/ESX(i) dialog box, enter the host information and logon credentials as 
    follows and click Connect.
    4 In the Add Machines from VMware vCenter Server/ESX(i) dialog box, or the following:
    a Under Options, enter the user name and password for the virtual machines you select.
    b Drill through the machines, expanding or collapsing through the clusters, resource pools, vApps 
    and virtual machines by clicking the arrows next to each node.
    c Select the machines to which you want to deploy and then click Add.
    The machines you added appear on the Deploy Agent to Machines window. The system verifies each 
    machine you added automatically.
    5 Optionally, you can verify any machine, check the status of the machine, or edit connection settings for 
    a machine, as described in Step 6 to Step 8 of the procedure Deploying to machines on an Active 
    Directory domain.
    6 After machines are verified successfully, check the box next to each machine to which you want to 
    deploy the AppAssure Agent, and then click Deploy.
    If you proceed with protecting an agent that is already protected by another Core, that protection will 
    be stopped and the machine will now be protected by this Core.
    If you chose the Protect machine after install option, after deployment is successful the machines are 
    rebooted automatically and protection is enabled.
    NOTE: All virtual machines must have VM Tools installed; otherwise, AppAssure cannot detect the host 
    name of the virtual machine to which to deploy. In lieu of the host name, AppAssure uses the virtual 
    machine name, which may cause issues if the host name is different from the virtual machine name.
    Table 50. vCenter/ESX(i) connection settings
    Te x t  B o x D e s c r i p t i o n
    Host The name or IP address of the VMware vCenter Server/ESX(i) virtual host.
    Port The port used to connect to the virtual host.
    The default setting is 443.
    User name The user name used to connect to the virtual host; for example, Administrator or, if 
    the machine is in a domain, [domain name]\Administrator).
    Password The secure password used to connect to this virtual host. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B105
    Deploying to machines on any other host
    Complete the following procedure to deploy the AppAssure Agent to multiple machines on any other type of 
    host.
    To deploy to machines on any other host
    1 Navigate to the AppAssure Core Console, click the Tools tab, and then click Bulk Deploy.
    2 On the Deploy Agent on Machines window, do one of the following:
    •Click New to enter a new machine host, logon credentials, optional display name, repository, 
    encryption key, and other information. For details on each setting, see Deploying to machines on 
    an Active Directory domain.
    After you enter this information, click OK to add it to the Deploy Agent on Machines list, or click 
    OK & New to add another machine.
    •To specify multiple machines in a list, click Manually, enter the machine details in the Add 
    Machines Manually dialog box, and click Add. For each machine, you will need to enter the IP 
    address or name for the machine, the user name, the password separated by a double-colon 
    delimiter, and port as shown in the following format:
    hostname::username::password::port
    For example:
    10.255.255.255::administrator::&11@yYz90z::8006
    abc-host-00-1::administrator::99!zU$o83r::168
    The machines you added appear on the Deploy Agent to Machines window. The system verifies each 
    machine you added automatically.
    3 Optionally, you can verify any machine, check the status of the machine, or edit connection settings for 
    a machine, as described in Step 6 to Step 8 of the procedure Deploying to machines on an Active 
    Directory domain.
    4 After machines are verified successfully, check the box next to each machine to which you want to 
    deploy the AppAssure Agent, and then click Deploy.
    If you proceed with protecting an agent that is already protected by another Core, that protection will 
    be stopped and the machine will now be protected by this Core.
    If you chose the Protect machine after install option, after deployment is successful the machines are 
    rebooted automatically and protection is enabled.
    Verifying the deployment to multiple machines
    Once you have bulk deployed the AppAssure Agent software to two or more machines, you can verify the 
    success by viewing each agent machine listed under the Protected Machines menu.
    You can also view information regarding the bulk deploy process from the Events tab. Complete the steps in this 
    procedure to verify the deployment.
    To verify the deployment to multiple machines
    1 Navigate to the AppAssure Core Console, click the Events tab, and click Alerts.
    2 Navigate to the AppAssure Core Home tab and then click the Events tab.
    NOTE: If you want to automatically protect the machine after deployment, check the 
    Protect Machine after Install box. If you check the box, the machine will be rebooted 
    automatically prior to enabling protection. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B106 Alert events appear in the list, showing the time the event initiated and a message. For each successful 
    deployment of the Agent software, you will see an alert indicating that the protected machine has been 
    added.
    3 Optionally, click on any link for a protected machine.
    The Summary tab for the selected machine appears, showing pertinent information including:
    •The host name of the protected machine
    •The last snapshot, if applicable
    •The scheduled time of the next snapshot, based on the protection schedule you selected
    •The encryption key, if any, used for this protected agent.
    •The version of the Agent software.
    Understanding protection schedules
    A protection schedule defines when backups are transferred from protected agent machines to the AppAssure 
    Core.
    Protection schedules are initially defined using the Protect Machine Wizard or the Protect Multiple Machines 
    Wizard. You can then modify the existing schedule at any time from the Summary tab for a specific agent 
    machine.
    AppAssure provides a default protection schedule, which includes a single period spanning all days of the week, 
    with a single time period defined (from 12:00 AM to 11:59 PM). The default interval (the time period between 
    snapshots) is 60 minutes.
    When protection is first enabled, the schedule is activated. Thus, using the default settings, regardless of the 
    current time of day, the first backup will occur every hour, on the hour (12:00 AM, 1:00 AM, 2:00 AM, and so on).
    The first backup transfer saved to the Core is called a base image snapshot. All data on all specified volumes 
    (including the operating system, applications, and settings), are saved to the Core. Thereafter, incremental 
    snapshots (smaller backups, consisting only of data changed on the protected machine since the last backup) 
    are saved to the core regularly, based on the interval defined (for example, every 60 minutes).
    You can create a custom schedule to change the frequency of backups. For example, a simple change you can 
    make is to change the interval for the weekday period to 20 minutes, resulting in three snapshots every hour. Or 
    you can increase the interval on weekends from 60 minutes to 180 minutes, resulting in snapshots once every 
    three hours when traffic is low.
    You can also define peak and off-peak times. For example, if your protected machines are mostly in use on 
    weekdays, you could define Period #1 to include only weekdays, by clearing the selections for Sunday and 
    Saturday in the Period #1 drop-down menu. Then, select Period #2, which automatically covers the time period 
    not included in Period #1 (in this case, Saturday and Sunday). You can then increase the interval for period two, 
    for example to 360 minutes, resulting in snapshots once every six hours on weekends, and once hourly on 
    weekdays.
    Alternatively, you can change the default schedule to define peak and off-peak times daily. To do this using the 
    Protection Schedule Wizard, change the default start and end time to a smaller range of time (for example, 
    12:00 AM to 4:59 PM), and set an appropriate interval (for example, 20 minutes). This represents frequent 
    backups during peak periods.
    Then, select Period#2, change the time range to the remaining period (5:00 pm to 11:59 pm) and set an 
    appropriate (presumably larger) interval (for example, 180 minutes). These settings define an off-peak period 
    NOTE: For information about protecting a single machine, see Protecting a machine. For information 
    about bulk protect (protecting multiple machines), see Protecting multiple machines. For information on 
    customizing protection periods when protecting an agent using either of these wizards, see Creating 
    custom protection schedules. For information about modifying an existing protection schedule, see 
    Modifying protection schedules. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B107 that includes 5:00 PM to midnight every day. This results in snapshots every 3 hours from 5:00 PM through 11:59 
    PM, and snapshots every 20 minutes from midnight to 4:59 PM.
    Other options in the Protection Schedule Wizard page include for a setting a daily protection time. This results 
    in a single backup daily at the period defined (the default setting is 12:00 PM).
    The option to initially pause protection prevents a base image from occurring (and in fact, prevents all backups) 
    until you explicitly resume protection. When you are ready to begin protecting your machines based on the 
    established protection schedule, you must explicitly resume protection. For more information on resuming 
    protection, see Pausing and resuming protection. Optionally, if you want to protect a machine immediately, you 
    can force a snapshot. For more information, see Forcing a snapshot.
    Protecting a machine
    This topic describes how to start protecting the data on a single machine that you specify using the Protect 
    Machine Wizard.
    To protect multiple machines using one process simultaneously, see Protecting multiple machines.
    When you add protection, you need to define connection information such as the IP address and port, and 
    provide credentials for the machine you want to protect. Optionally, you can provide a display name to appear 
    in the Core Console instead of the IP address. If you change this, you will not see the IP address for the 
    protected machine when you view details in the Core Console. You will also define the protection schedule for 
    the machine.
    This process includes optional steps you can access if you select an advanced configuration. Advanced options 
    include repository functions and encryption. For example, you can specify an existing AppAssure repository to 
    save snapshots, or create a new repository. You can also specify an existing encryption key (or add a new 
    encryption key) to apply to the data saved to the Core for this machine.
    The workflow of the wizard may differ slightly based on your environment. For example, if the AppAssure Agent 
    software is installed on the machine you want to protect, you will not be prompted to install it from the wizard. 
    Likewise, if a repository already exists on the Core, you will not be prompted to create one.
    To  p r o t e c t  a  m a c h i n e
    1 If you have already installed the AppAssure Agent software on the machine you want to protect, but 
    have not restarted it yet, restart the machine now.
    2 On the core machine, navigate to the AppAssure Core Console, and from the button bar, click Protect.
    The Protect Machine Wizard appears.
    NOTE: The machine must have the AppAssure Agent software installed in order to be protected. You can 
    choose to install the Agent software prior to this procedure, or you can deploy the software to the target 
    machine as a part of completing the Protect Machine Wizard. For more information on installing the Agent 
    software, see “Installing the AppAssure Agent software” in the Dell AppAssure Installation and Upgrade 
    Guide.
    
    If the Agent software is not installed prior to protecting a machine, you will not be able to select specific 
    volumes for protection as part of this wizard. In this case, by default, all volumes on the agent machine 
    will be included for protection.
    
    AppAssure supports the protection and recovery of machines configured with EISA partitions. Support is 
    also extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use Windows Recovery 
    Environment (Windows RE).
    CAUTION: AppAssure does not support bare metal restores (BMRs) of Linux machines with EXT2 boot 
    partitions. Any BMR performed on a machine with this type of partition results in a machine that does 
    not start. If you want to be able to perform a BMR on this machine in the future, you must convert any 
    EXT2 partitions to EXT3 or EXT4 before you begin protecting and backing up the machine. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B108 3 On the Welcome page, select the appropriate installation options:
    •If you do not need to define a repository or establish encryption, select Ty p i c a l.
    •If you need to create a repository, or define a different repository for backups for the selected 
    machine, or if you want to establish encryption using the wizard, select Advanced (show 
    optional steps).
    •Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the 
    future, select the Skip this Welcome page the next time the wizard opens option.
    4 When you are satisfied with your choices on the Welcome page, then click Next.
    The Connection page appears.
    5 On the Connection page, enter the information about the machine to which you want to connect as 
    described in the following table, and then click Next.
    6 If the Upgrade Agent page appears next in the Protect Machine Wizard, this means that an older version 
    of the AppAssure Agent software exists on the machine you want to protect. Do one of the following and 
    then click Next:
    •To deploy the new version of the Agent software (matching the version for the AppAssure Core), 
    select Upgrade the Agent to the latest version of the software.
    •To continue protecting the machine without updating the Agent software version, clear the 
    Upgrade the Agent to the latest version of the software option.
    7 If the Protection page appears next in the Protect Machine Wizard, skip to Step 8.
    If the Install Agent page appears next in the Protect Machine Wizard, this indicates that the Agent 
    software is not yet on installed on the designated machine. Click Next to install the Agent software.
    The Protection page appears.
    8 Optionally, if you want a name other than the IP address to display in the AppAssure Core console for this 
    protected machine, then in the Display Name field, type a name in the dialog box.
    You can enter up to 64 characters. Do not use the special characters described in the topic prohibited 
    characters. Additionally, do not begin the display name with any of the character combinations 
    described in the topic prohibited phrases. Table 51. Machine connection settings
    Te x t  B o x D e s c r i p t i o n
    Host The host name or IP address of the machine that you want to protect.
    Port The port number on which the AppAssure Core communicates with the Agent on the 
    machine.
    The default port number is 8006.
    User name The user name used to connect to this machine; for example, Administrator (or, if the 
    machine is in a domain, [domain name]\Administrator).
    Password The password used to connect to this machine.
    NOTE: The Agent software must be installed on the machine you want to protect, and that 
    machine must be restarted, before it can back up to the Core. To have the installer reboot the 
    protected machine, select the After installation, restart the machine automatically 
    (recommended) option before clicking Next. 
    						
    All Dell manuals Comments (0)