A protection schedule defines when backups are transferred from protected machines to the Rapid Recovery Core. Protection schedules are initially defined using the Protect Machine Wizard or the Protect Multiple Machines Wizard.
NOTE: For conceptual information about protection schedules, see Understanding protection schedules. For information about protecting a single machine, see Protecting a machine. For information about bulk protect (protecting multiple machines), see About protecting multiple machines. For information on customizing protection periods when protecting an agent using either of these wizards, see Creating a custom protection schedule from a wizard in Simple Mode. For information about modifying an existing protection schedule, see Creating multiple protection schedule periods in Advanced Mode. |
2. |
Initially, all volumes share a protection schedule.
To select all volumes at once, click in the checkbox in the header row. Click on (Protection Group) to expand the volumes being protected, so you can view all volumes and select one or more.
3. |
◦ |
◦ |
If you previously created a protection schedule template and want to apply it to this protected machine, click Advanced mode, select the template from the Templates drop-down list, click OK to confirm, and then go to Step 7. |
◦ |
◦ |
If you want to save a new protection schedule as a template, click Advanced mode, and then continue to Step 4. |
For example, use the arrows to show a time of 08:00 AM.
For example, use the arrows to show a time of 06:00 PM.
A blue bar provides a visual representation of this interval.
5. |
If you defined a period other than 12:00 AM to 11:59 PM in Step 7, and you want backups to occur in the remaining time ranges, you must add more periods to define protection by doing the following: |
a. |
For example, set a start time of 12:00 AM and an end time of 07:59 AM.
7. |
When you pause protection, you temporarily stop all transfers of data from the selected machine to the Rapid Recovery Core. When you resume protection, the Rapid Recovery Core follows the requirements in the protection schedule, backing up your data regularly based on that schedule.
You can pause protection for any Rapid Recovery protected machine:
• |
From the Protected Machines drop-down menu in the left navigation area of the Rapid Recovery Core (pausing protection for all protected machines). |
You can resume protection for any paused Rapid Recovery protected machine:
• |
From the Protected Machines drop-down menu in the left navigation area of the Rapid Recovery Core (resuming protection for all protected machines). |
Use the procedure below to pause or to resume protection, as appropriate.
1. |
In the Rapid Recovery Core Console, to pause protection for all machines, click the Protected Machines drop-down menu in the left navigation area, and then do the following: |
a. |
▪ |
If you want to pause protection until you explicitly resume it, select Pause until resumed. |
▪ |
If you want to pause protection for a specified period, select Pause for and then, in the Days, Hours, and Minutes controls, type or select the appropriate pause period as appropriate. |
a. |
a. |
▪ |
If you want to pause protection until you explicitly resume it, select Pause until resumed. |
▪ |
If you want to pause protection for a specified period, select Pause for and then, in the Days, Hours, and Minutes controls, type or select the appropriate pause period as appropriate. |
a. |
The Summary page displays for the selected machine.
a. |
▪ |
If you want to pause protection until you explicitly resume it, select Pause until resumed. |
▪ |
If you want to pause protection for a specified period, select Pause for and then, in the Days, Hours, and Minutes controls, type or select the appropriate pause period as appropriate. |
a. |
You can add two or more Windows machines for protection on the Rapid Recovery Core simultaneously using the Protect Multiple Machines Wizard. To protect your data using Rapid Recovery, you need to add the workstations and servers for protection in the Rapid Recovery Core Console; for example, your Exchange server, SQL Server, Linux server, and so on.
As with protecting individual machines, protecting multiple machines simultaneously requires you to install the Rapid Recovery Agent software on each machine you want to protect.
To connect to the machines, they must be powered on and accessible.
• |
You can install the Rapid Recovery Agent software to multiple machines using the Deploy Agent Software Wizard. For more information, see Using the Deploy Agent Software Wizard to deploy to one or more machines. |
• |
You can deploy the Rapid Recovery Agent software as part of Protect Multiple Machines Wizard. |
The process of protecting multiple machines includes optional steps that you can access if you select an advanced configuration. Advanced options include repository functions and encryption. For example, you can specify an existing Rapid Recovery repository to save snapshots, or you can create a new repository. You can also specify an existing encryption key (or add a new encryption key) to apply to the data saved to the Core for the machines you are protecting.
The workflow of the Protect Multiple Machines Wizard may differ slightly based on your environment. For example, if the Rapid Recovery Agent software is installed on the machines you want to protect, you are not prompted to install it from the wizard. Likewise, if a repository already exists on the Core, you are not prompted to create one.
Use this procedure to simultaneously protect one or more machines on an Active Directory domain.
1. |
On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Protect Multiple Machines. |
2. |
◦ |
3. |
4. |
6. |
7. |
8. |
9. |
Optionally, on the Warnings page of the wizard, you can verify any machine by selecting the machine and then clicking Verify in the toolbar. |
10. |
Optionally, on the Warnings page, select After Agent installation, restart the machines automatically. |
NOTE: Quest recommends this option. You must restart agent machines before they can be protected. |
11. |
If the status indicates that the machine is reachable, click Next to install the Rapid Recovery Agent software. |
12. |
On the Protection page of the wizard, select the appropriate protection schedule as described below. |
◦ |
If you want to use the default protection schedule, then in the Schedule Settings option, select Default protection (hourly snapshots of all volumes). |
◦ |
◦ |
If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, then click Finish to confirm your choices, close the wizard, and protect the machine you specified. |
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause protection.
◦ |
◦ |
If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and proceed to Step 15 to see repository and encryption options. |
◦ |
If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, click Next, to set up a custom protection schedule. For details on defining a custom protection schedule, see Creating a custom protection schedule from a wizard in Simple Mode. |
14. |
15. |
1. |
Select Use an existing repository. |
3. |
Click Next. |
The Encryption page appears. Skip to Step 19 to optionally define encryption.
◦ |
If you want to create a repository, select Create a Repository, and then complete the following steps. |
1. |
On the Repository, enter the information described in the following table. |
2. |
Click Add Storage Location to define the specific storage location or volume for the repository. This volume should be a primary storage location. |
CAUTION: Define a dedicated folder within the root for the storage location for your repository. Do not specify the root location. For example, use E:\Repository\, not E:\. If the repository that you are creating in this step is later removed, all files at the storage location of your repository are deleted. If you define your storage location at the root, all other files in the volume (e.g., E:\) are deleted, which could result in catastrophic data loss. |
3. |
Click Add Storage Location to define the specific storage location or volume for the repository. This volume should be a primary storage location. |
4. |
In the Storage Location area, specify how to add the file for the storage location. You can choose to add a locally attached storage volume (such as direct attached storage, a storage area network, or network attached storage). You could also specify a storage volume on a Common Internet File System (CIFS) shared location. |
▪ |
Select Add file on local disk to specify a local machine, and then enter the information as described in the following table. |
Enter the location for storing the protected data. For example, type X:\Repository\Data. | |
Enter the location for storing the protected metadata. For example, type X:\Repository\Metadata. |
▪ |
Or, select Add file on CIFS share to specify a network share location, and then enter the information as described in the following table. |
5. |
In the Storage Configuration area, click More Details and enter the details for the storage location as described in the following table. |
| |||||||||
Set the value to one of the following:
If set to Off, Rapid Recovery controls the caching. If set to Sync, Windows controls the caching as well as the synchronous input/output. | |||||||||
Specify the number of bytes you want each sector to include. The default value is 512. | |||||||||
Specify the average number of bytes per record. The default value is 8192. |
6. |
Click Next. |
16. |
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for this machine.
You can change the settings later from the Encryption Keys page in the Rapid Recovery Core Console.
For more information about encryption, see the topic Encryption keys. |
CAUTION: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. While using encryption is optional, Quest highly recommends that you establish an encryption key, and that you protect the passphrase you define. Store the passphrase in a secure location as it is critical for data recovery. Without a passphrase, data recovery is not possible. |
17. |
If you want to encrypt these protected machines using an encryption key that is already defined on this Rapid Recovery Core, select Encrypt data using an existing Encryption key, and select the appropriate key from the drop-down menu. |
Enter the passphrase used to control access. Best practice is to avoid special characters listed above. Record the passphrase in a secure location. Quest Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. | |
19. |
20. |
The Rapid Recovery Agent software is deployed to the specified machines, if necessary, and the machines are added to protection on the Core.
© 2023 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy