The protecting procedure requires the following tasks be completed before you begin:
Use this procedure to simultaneously protect one or more machines on an Active Directory domain.
The Protect Multiple Machines Wizard opens.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
Text Box | Description |
---|---|
Host | The host name or IP address of the Active Directory domain. |
User name | The user name used to connect to the domain; for example, Administrator or, if the machine is in a domain, [domain name]\Administrator). |
Password | The secure password used to connect to the domain. |
The system automatically verifies each machine you selected.
If the Protection page appears next in the Protect Multiple Machines Wizard, skip to step 12.
If the Agent software is not yet deployed to the machines you want to protect, or if any of the machines you specified cannot be protected for another reason, then the selected machines appear on the Warnings page.
|
NOTE: Quest recommends this option. You must restart agent machines before they can be protected. |
The Protection page appears.
You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
|
NOTE: It is best practice to protect, at minimum, the system reserved volume and the volume with the operating system (typically the C:/ drive). |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
NOTE: This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
The Rapid Recovery Agent software is deployed to the specified machines, if necessary, and the machines are added to protection on the Core.
While you can protect multiple machines simultaneously using this wizard, all the machines you protect in a single installation using the Protect Multiple Machines wizard must either use the Rapid Recovery Agent software, or use agentless protection. This process describes protection using the Agent software. For the procedure to protect multiple machines simultaneously using agentless protection, see Protecting vCenter/ESXi virtual machines using agentless protection.
The protecting procedure requires the following tasks be completed before you begin:
Use this procedure to simultaneously protect one or more machines on a VMware vCenter/ESXi virtual host using Rapid Recovery Agent.
The Protect Multiple Machines Wizard opens.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
Text Box | Description |
---|---|
Host | The name or IP address of the VMware vCenter Server/ESXi virtual host. |
Port | The port used to connect to the virtual host.
The default setting is 443. |
User name |
The user name used to connect to this machine; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator). Enter the user name or, to use a set of credentials saved to Credentials Vault, use the drop-down list and select a user name. Optionally, to save your credentials to Credentials Vault, click the plus sign next to the text box. For more information, see Credentials Vault. |
Password | The secure password used to connect to this virtual host. |
A notification appears if Rapid Recovery detects that a machine is offline or does not have VMware Tools installed.
hostname::username::password
.
|
NOTE: Enter one machine on each line. |
If the Protection page appears next in the Protect Multiple Machines Wizard, skip to step 15.
If the Agent software is not yet deployed to the machines you want to protect, or if any of the machines you specified cannot be protected for another reason, then the selected machines appear on the Warnings page.
|
NOTE: Quest recommends this option. You must restart agent machines before they can be protected. |
You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
|
NOTE: It is best practice to protect, at minimum, the system reserved volume and the volume with the operating system (typically the C:\ drive). |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
NOTE: This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
The Rapid Recovery Agent software is deployed to the specified machines, if necessary, and the machines are added to protection on the Core.
This procedure requires that you first create a repository that is accessible from the Rapid Recovery Core. For more information, see Understanding repositories.
Complete the following procedure to agentlessly protect one or more ESXi virtual machines (VMs).
|
NOTE: Quest recommends that VMware Tools be installed on virtual machines (VMs) you want to protect on vSphere or ESXi hosts. When VMware Tools are installed on a VM using a Windows operating system (OS), the backups that the Rapid Recovery Core captures use Microsoft Volume Shadow Services (VSS). For information on the behavior of agentless VMs with or without VMware Tools, see Benefits of installing hypervisor tools for agentless protection. |
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
Text Box | Description |
---|---|
Host | The name or IP address of the virtual host. |
Port | The port used to connect to the virtual host.
The default setting is 443. |
User name |
The user name used to connect to this machine; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator). Enter the user name or, to use a set of credentials saved to Credentials Vault, use the drop-down list and select a user name. Optionally, to save your credentials to Credentials Vault, click the plus sign next to the text box. For more information, see Credentials Vault. |
Password | The secure password used to connect to this virtual host. |
|
Caution: Quest recommends that you limit agentless protection to no more than 200 VMs at once. For example, do not select more than 200 VMs when using the Protect Multiple Machines Wizard. Protecting more than 200 VMs results in slow performance. There is no limit to how many VMs a Core can agentlessly protect over time. For example, you could protect 200 VMs today and another 200 VMs tomorrow. |
|
NOTE: VMware Changed Block Tracking (CBT) must be enabled on each of the VMs you want to protect. If it is not enabled, Rapid Recovery automatically enables CBT to ensure protection. |
NOTE: You may need to switch between views of Hosts and Clusters and VMs and Templates. |
Option | Description |
---|---|
Protect machine if it is orphaned by this Core |
Lets the Core protect a machine that was previously protected but was then removed from protection because the hypervisor became unreachable. This option is selected by default. |
Protect machine if it already has recovery points |
Shows existing recovery points alongside the new recovery points after protection. This option is selected by default. |
Protect machine agentlessly if it is already protected with the Rapid Recovery Agent |
If a Core detects that a machine is already protected by the Rapid Recovery Agent, this option permits duplicate protection (both agentlessly and with the Agent). The protected VM must be powered on and VMware Tools must be installed. This option is selected by default. |
Protect machine if it is paired with a different Core |
Protects the VM with this Core and discontinues protection from the other Core. |
Delete old VMware snapshots in order to enable Changed Block Tracking |
Lets the Core delete previous VMware snapshots, including snapshots created by a user or another program, if required to enable Changed Block Tracking (CBT). |
Save rules |
Saves the selected rules to use for future VM agentless protection on this hypervisor host. These rules apply to machines protected automatically or by using the Protect Multiple Machines wizard. |
With a default protection schedule, the Core takes snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
Option | Description | ||
---|---|---|---|
Enable Active Block Mapping | Lets you enable or disable the ABM feature. | ||
Enable swap file blocks exclusion |
Excludes the content of system files, such as pagefile.sys, hyberfill.sys, and swapfile.sys, from the backup. | ||
Exclude subdirectories |
Lets you exclude specific files by specifying '<file name>' or '<folder>\<subfolder>\<file name>'. Only the files will be excluded. The folders or subfolders that contained excluded files are included in the mount point, with no contents.
| ||
+ Add |
If you opted to exclude subdirectories, click Add and enter the location in the Path table for each item you want to exclude. |
For more information, see Understanding Active Block Mapping.
NOTE: Active Block Mapping only supports NTFS file systems. |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
The protecting procedure requires the following tasks be completed before you begin:
Use this procedure to simultaneously protect one or more machines on a Hyper-V virtual host.
|
Caution: If you use agentless protection, Quest recommends that you limit protection to no more than 200 VMs at once. For example, do not select more than 200 VMs when using the Protect Multiple Machines Wizard. Protecting more than 200 VMs results in slow performance. There is no limit to how many VMs a Core can agentlessly protect over time. For example, you could protect 200 VMs today and another 200 VMs tomorrow. |
The Protect Multiple Machines Wizard opens.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
Text Box | Description |
---|---|
Host | The name or IP address of the virtual host. |
Port | The port used to connect to the virtual host.
The default setting is 8006. |
User name | The user name used to connect to the virtual host; for example, Administrator or, if the machine is in a domain, [domain name]\Administrator. |
Password | The secure password used to connect to this virtual host. |
hostname::username::password
.
|
NOTE: Enter one machine on each line. |
|
NOTE: Quest recommends this option. You must restart agent machines before they can be protected. |
The Protection page appears.
You can enter up to 64 characters. Do not use prohibited characters. Additionally, do not begin the display name with any of these prohibited phrases.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
|
NOTE: It is best practice to protect, at minimum, the system reserved volume and the volume with the operating system (typically the C:\ drive). |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
NOTE: This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Nutzungsbedingungen Datenschutz Cookie Preference Center