Nightly jobs can be configured at the Core level or at the machine level. When nightly jobs are set at the Core level, the changes are applied to all relevant machines protected by that Core. Changes made to the nightly jobs at the machine level supersede the changes made at the Core level, and apply only to the machines specified.
For a list of all nightly jobs, including descriptions and the scope available for each, see the topic Understanding nightly jobs.
Complete the steps in the following procedure to make changes to the nightly jobs for a single protected machine.
The Settings page appears, showing configuration settings for the selected machine.
The Nightly Jobs dialog box appears.
|
NOTE: Options may vary by machine. For example, a protected machine using Exchange Server may include Check checksum of Exchange databases and Truncate Exchange logs. |
|
NOTE: For information about the Rollup setting, including setting a custom retention policy, see Customizing retention policy settings for a protected machine. |
|
NOTE: The results of this procedure apply only to the selected protected machine. To apply elsewhere, repeat the procedure for each machine you want to customize. To change the nightly job settings for all machines protected by a Core, see Configuring nightly jobs for the Core. |
You can view system information about each machine protected in your Rapid Recovery Core. To see how to access this information, see Viewing system information for a protected machine
|
NOTE: This topic describes system information for a specific protected machine. For information about accessing system information for the Core, see Viewing system information for the Core. |
You can see the following information on the System Information page for each protected machine. Each of the following elements appears in its own pane, if applicable:
Topic | Description |
---|---|
System Information |
For the protected machine you are viewing, this pane includes the following information: Host name, OS version and architecture, physical memory, display name, domain name, and VM type. If available, click Summary on the bottom of this pane to return to the Summary page for this protected machine. |
Volumes |
This pane includes the volume name, device ID, file system, formatted capacity, and capacity used. |
Processors |
This pane includes the architecture, number of microprocessor cores and threads, clock speed, and description. |
Network Adapters |
This pane includes the physical or virtual network adapter type and speed. |
IP Addresses |
This pane includes the IP address and family. |
The Rapid Recovery Core Console provides you with easy access to system information about the machines protected on your Core. System information viewed at the machine level includes relevant information about the protected machine. For more information, see Understanding system information for a protected machine.
Complete the steps in this procedure to view detailed system information for a protected machine.
The System Information page appears.
This section describes a variety of tasks you can perform to manage your protected machines managing your machines.
Topics include:
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center