• |
Flexibility. You can perform universal recovery to multiple platforms, including restoring from physical to virtual, virtual to physical, virtual to virtual, and physical to physical. |
• |
Cloud integration. You can export a VM, archive and replicate to the cloud, and perform bare metal restore from archives in the cloud. Compatible cloud services include Microsoft Azure, Amazon Web Services (AWS), any OpenStack-based provider (including Rackspace), and Google Cloud. US government-specific platforms include AWS GovCloud (US) and Azure Government. |
• |
Intelligent deduplication. You can reduce storage requirements by storing data once, and referencing it thereafter (once per repository or encryption domain). |
• |
Instant recovery. Our Live Recovery feature allows you to access critical data first, while remaining restore operations complete in parallel. |
• |
File-level recovery. You can recover data at the file level on-premises, from a remote location, or from the cloud. |
• |
File-level search. Using criteria you specify, you can search a range of recovery points for one or more files. From the search results, you can then select and restore the files you want to the local Core machine directly from the Core Console. |
• |
Virtual support. Rapid Recovery supports one-time virtual export, letting you generate a bootable VM from a recovery point; and virtual standby, in which the bootable VM you generate is continually updated after each backup. You can even perform virtual export to Microsoft Hyper-V cluster-shared volumes. |
• |
Rapid Snap for Virtual support. Enhanced support for virtualization includes agentless protection for vCenter/ESXi VMs and for Hyper-V VMs. Rapid Snap for Virtual includes protection and autodiscovery for VMware ESXi 5.5 and higher with no agent software installed. Host-based protection supports installing Rapid Recovery Agent on a Microsoft Hyper-V host only, letting you agentlessly protect all its guest VMs. |
• |
Application support. Rapid Recovery Agent is built with application support for Microsoft Exchange, SQL Server, and Oracle. When you protect these application servers in your Core, the backup snapshots are automatically application-aware; open transactions and rolling transaction logs are completed and caches are flushed to disk before creating snapshots. Specific application features are supported, including SQL attachability (for SQL Server) and database integrity DBVERIFY checks (for Oracle). Application awareness also extends to agentless protection for SQL Server and Exchange Server. |
See the following resources for more information about Rapid Recovery.
• |
This section describes the different elements of the Rapid Recovery Core Console user interface (UI).
Complete the following steps to access the Rapid Recovery Core Console.
• |
1. |
NOTE: Because the Rapid Recovery Core Console UI depends on JavaScript, the web browser you use to access the Core Console must have JavaScript enabled.
NOTE: If you have changed the default port for the Rapid Recovery service, update the port in the preceding URL accordingly. |
The Quick Start Guide is a feature that provides you with a guided flow of suggested tasks for configuring and using Rapid Recovery Core.
The Quick Start Guide appears automatically the first time you upgrade to or install the Rapid Recovery Core and navigate to the Core Console. Click Start Guide on the Welcome page of the guide to see the various suggested configuration tasks. Navigate through the guide using the Skip Step and Back options. When you have seen the last suggested task, click Finish to close the guide.
You can launch the Quick Start Guide again at any time from the Help menu in the Core Console. You can also choose to hide the Welcome page in the Quick Start Guide.
Unless you hide it, the Quick Start Guide reappears each time you log in to the Rapid Recovery Core Console and access the Home page. For more information, see Hiding the Quick Start Guide.
You are not required to perform the steps suggested by the guide. You can simply view the suggested tasks, navigating through them using the Skip Step and Back options. Optionally, to hide the guide at any point, click Exit Guide.
The Quick Start Guide addresses the following configuration tasks:
Click Protect or select Protect Machine from the drop-down menu to open the Protect Machine Wizard. For information on completing the Protect Machine Wizard, see Protecting a machine. Select Protect Cluster from the drop-down menu to open the Connect to Cluster dialog box. For more information on protecting a cluster, see Protecting a cluster. Select Bulk Protect from the drop-down menu to open the Protect Multiple Machines Wizard. For information on completing the Protect Multiple Machines Wizard, see About protecting multiple machines. | ||
Setting up replication from a primary (source) Core to a secondary (target) Core |
Click Replication to open the Replication page. Prompts you to add a target Core using the Replication Wizard. For information on using the Replication Wizard to set up replication on a self-managed Core, see Replicating to a self-managed target Core. For general information on replication, see Configuring replication. | |
Click Export to perform an export of data from your protected machine to a virtual machine. You can either perform a one-time export, or set up virtual standby for continual export to a VM. For information on virtual exports, see Exporting to virtual machines using Rapid Recovery. | ||
Allows you to set up additional configuration for the Rapid Recovery Core |
Click More to see additional functions you can manage or configure. Functions includes archives; mounts; boot CDs; repositories; encryption keys; cloud accounts; file search; retention policies; notifications; reports; logs; and more. | |
Adding or importing encryption keys that you can use for one or more protected machines |
Click Encryption keys to manage security for protected data by adding or importing encryption keys. You can apply encryption keys to one or more protected machines. Encryption is described in the topic Encryption. | |
Click Events to specify notification groups for events, warnings, and alerts. To send these by email, you must also establish SMTP server settings. For more information on managing events, see the topic Events, including the topics Configuring notification groups and Configuring an email server. | ||
Viewing or changing the default retention policy for the Core |
Click Retention Policy to open the Retention Policy page for the Core. From here you can define how long to keep a recovery point before rolling it up. For conceptual information about retention policies, see the topic Managing aging data. For procedural information, see Managing retention policies. | |
Click Restore to open the Restore Machine Wizard. For information on restoring data, see the topic About restoring volumes from a recovery point. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center