The Quick Start Guide is a feature that provides you with a guided flow of suggested tasks for configuring and using Rapid Recovery Core.
The Quick Start Guide appears automatically the first time you upgrade to or install the Rapid Recovery Core and navigate to the Core Console. Click Start Guide on the Welcome page of the guide to see the various suggested configuration tasks. Navigate through the guide using the Skip Step and Back options. When you have seen the last suggested task, click Finish to close the guide.
You can launch the Quick Start Guide again at any time. You can also choose to hide the Welcome page in the Quick Start Guide. For more information about these options, see Launching the Quick Start Guide.
Unless you hide it, the Quick Start Guide reappears each time you log in to the Rapid Recovery Core Console and access the Home page. For more information, see Hiding the Quick Start Guide.
You are not required to perform the steps suggested by the guide. You can simply view the suggested tasks, navigating through them using the Skip Step and Back options. Optionally, to hide the guide at any point, click Exit Guide.
If you choose to perform any configuration tasks suggested by the Quick Start Guide, follow the prompts indicated in any step of the guide, and the appropriate wizard or relevant area in the user interface appears. Procedures to complete each task suggested by the guide is described in this document, as indicated in the table below.
The Quick Start Guide addresses the following configuration tasks:
|Function||Short Description||Result of Selecting Task, Link to Procedure|
|Protection||Protecting an agent machine, protecting a server cluster, or protecting multiple machines using bulk protect||Click Protect or select Protect Machine from the drop-down menu to open the Protect Machine Wizard. For information on completing the Protect Machine Wizard, see Protecting a machine.
Select Protect Cluster from the drop-down menu to open the Connect to Cluster dialog box. For more information on protecting a cluster, see Protecting a cluster.
Select Bulk Protect from the drop-down menu to open the Protect Multiple Machines Wizard. For information on completing the Protect Multiple Machines Wizard, see About protecting multiple machines.
|Replication||Setting up replication from a primary (source) core to a secondary (target) core||Click Replication to open the Replication tab. Prompts you to add a target core using the Replication Wizard. For information on using the Replication Wizard to set up replication on a self-managed core, see Replicating to a self-managed target Core. For general information on replication, see Configuring replication.|
|Virtual Export||Performing a one-time or establishing continual export from a protected agent machine to a virtual machine||Click Export to perform an export of data from your protected machine to a virtual machine. You can either perform a one-time export, or set up virtual standby for continual export to a VM. For information on virtual exports, see Exporting data to a virtual machine.|
|Configuration||Allows you to set up additional configuration for the Rapid Recovery Core||Click Configuration to see prompts for security (setting up encryption keys), notifications (setting up event notification), and retention policies (establishing criteria for rollup of aging recovery points).|
|Configuration: Encryption||Setting up encryption key that you can use for one or more agents||Click Security to open the Security page on the Configuration tab. Prompts you to add an encryption key or import one. Once you do this, you may apply it to one or more agents. Encryption is described in the topic Working with encryption keys.|
|Configuration: Notifications||Setting up notifications for events, warnings and alerts||Click Events to specify notification groups for events, warnings, and alerts. To send these by email, you must also establish SMTP server settings. For more information on managing events, see the topic Managing events, including the topics Configuring notification groups and Configuring an email server.|
|Configuration: Retention||Viewing or changing the default retention policy for the Core||Click Retention Policy to open the Retention Policy page on the Configuration tab. From here you can define how long to keep a recovery point before rolling it up. For conceptual information about retention policies, see the topic Retention and archiving. For procedural information, see Managing retention policies.|
|Restore||Restoring data from a recovery point on the Core||Click Restore to open the Restore Machine Wizard. For information on restoring data, see the topic About restoring volumes from a recovery point.|
The Quick Start Guide appears automatically the first time you upgrade to or install the Rapid Recovery Core. Unless you hide it, the guide reappears each time you access the Home page on the Core Console.
Use the procedure below to open the Quick Start Guide at any time from the Core Console.
The Quick Start Guide appears automatically the first time you upgrade to or install the Rapid Recovery Core.
It also appears when you select Quick Start Guide from the Help drop-down menu, and each time you access the Home page on the Core Console.
Use the procedure below to hide the Quick Start Guide.
The Quick Start Guide closes. The next time you access the Home page on the Core Console, the Quick Start Guide reappears.
You can also open the Quick Start Guide from the Help menu, as described in Launching the Quick Start Guide.
The Quick Start Guide closes. If you select this option, you can still open the Quick Start Guide from the Help menu, as described in Launching the Quick Start Guide.
In the Rapid Recovery user interface, a Protected Machines menu appears in the left navigation area. As with all menu labels in the navigation area, the label for this menu appears in all upper-case letters. By default, this menu is fully expanded, and shows a list of any machines that are protected by this Core. If you have any server clusters protected, then they are included in this list.
You can collapse or expand the view for protected machines and server clusters in your Core by clicking the arrow on the left side of this menu.
The Protected Machines menu includes a drop-down menu on the right side which lists functions that can be performed on all protected machines. Click the arrow to the right of Protected Machines to see the menu and to perform any of the following:
Each machine listed under the Protected Machines menu also has a drop-down menu that controls functions only for that machine. From the drop-down menu for any machine, you can perform the following:
If you are managing server clusters from the Rapid Recovery Core, the cluster also appears in the left navigation menu. From the drop-down menu for any cluster, you can also:
If you click the arrow to the left of the Protected Machines menu, the list of protected machines and server clusters contracts, and no machines are listed. Clicking again on this arrow causes the list of machines to expand again.
Clicking any machine name in the Protected Machines menu opens the Summary page for that machine. For more information on what you can accomplish on the Summary page, see Viewing summary information for a protected machine.
Finally, clicking directly on the Protected Machines menu causes the Protected Machines page to appear in the main content area, with a single pane showing protected machines on this Core. For more information on what you can accomplish on the Protected Machines pane of the Protected Machines page, see Viewing the Protected Machines pane.