Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Rapid Recovery 6.3 - User Guide

Introduction to Rapid Recovery The Core Console Repositories Core settings Managing privacy Encryption Protecting machines
About protecting machines with Rapid Recovery Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Enabling application support Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Credentials Vault Snapshots and recovery points Replication Events Reporting VM export Restoring data Bare metal restore
About bare metal restore BMR Windows and Linux Understanding boot CD creation for Windows machines Managing a Linux boot image Performing a bare metal restore using the Restore Machine Wizard Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Verifying a bare metal restore
Managing aging data Archiving Cloud accounts Core Console references REST APIs Glossary

Using credentials from the vault

Many actions in the Rapid Recovery Core Console require you to enter account credentials.

After accounts have been added to the Credentials Vault, when prompted to authenticate, you can view the list of accounts and select an account with one click, rather than manually entering your account user name and password.

Follow this procedure to use an account from the Credentials Vault.

  1. From a location on the Rapid Recovery Core Console in which you are asked for credentials, click the downward-facing arrow in the User name field to expand the view.

    The Credentials Vault drop-down grid appears. Each row shows the user name and description associated with an account held in the vault.

  2. If necessary, scroll through the list to identify the account for which you want to enter credentials. Then click on the row for the appropriate account.

    The grid closes, and the account information is passed to the window or dialog box. Since passwords are hidden, the password field is not shown.

  3. Complete the function requiring credentials.

Snapshots and recovery points

This section describes how to use and manage the snapshots and recovery points generated by Rapid Recovery. It includes information about mounting, viewing, and forcing, as well as migrating and deleting recovery points.

Topics include:

Managing snapshots and recovery points

A recovery point is a collection of snapshots taken of individual disk volumes and stored in the repository. Snapshots capture and store the state of a disk volume at a given point in time while the applications that generate the data are still in use. In Rapid Recovery, you can force a snapshot, temporarily pause snapshots, and view lists of current recovery points in the repository as well as delete them if needed. Recovery points are used to restore protected machines or to mount to a local file system.

The snapshots that are captured by Rapid Recovery are done so at the block level and are application aware. This means that all open transactions and rolling transaction logs are completed and caches are flushed to disk before creating the snapshot.

Rapid Recovery uses a low-level volume filter driver, which attaches to the mounted volumes and then tracks all block-level changes for the next impending snapshot. Microsoft Volume Shadow Services (VSS) is used to facilitate application crash consistent snapshots.

Viewing the recovery points page of a protected machine

Complete the steps in the following procedure to view the full list of recovery points for a protected machine. For more information on viewing specific recovery points, see Viewing recovery points for a machine

NOTE: If you are protecting data from a DAG or CCR server cluster, the associated recovery points do not appear at the cluster level. They are only visible at the node or machine level.

  1. In the Rapid Recovery Core Console, navigate to the protected machine for which you want to view recovery points.
  2. From the menu at the top of the page, click Recovery Points.

    The Recovery Points page appears, showing a Recovery Points Summary pane and a Recovery Points pane.

    You can view summary information about the recovery points for the machine as described in the following table.

    Table 76: Recovery point summary information
    Info Description
    Total recovery points Lists the total number of recovery points saved to the repository for this machine.
    Total protected data Indicates the amount of storage space used in the repository for these recovery points.
    Repository Lists the name of the repository in which these recovery points are stored.
    Repository status Graphically displays the amount of space consumed by the recovery points. Shows percentage of the repository used, the amount of space, and the total space of the repository. Click on the graph to see the amount of space remaining.

    You can view information about the recovery points for the machine as described in the following table.

    Table 77: Recovery point information
    Info Description
    Icon Graphic depiction of either a recovery point [Recovery Point or, if expanded, a volume [Volume] within the recovery point. Recovery points show an arrow [Expand arrow] indicating that detail can be expanded (or, if expanded, an arrow [Contract arrow] showing that the menu can be contracted).
    Encrypted Indicates if the recovery point is encrypted.
    Status Indicates current status of the recovery point.
    Contents and More Information

    Lists the volumes included in the recovery point. For Exchange servers, click [Information]
        to display information about the server.
    Hover over the [More Info] More Information icon to see the space usage and the file system in the recovery point or volume displayed.

    Type Defines a recovery point as either a base image or an incremental (differential) snapshot.
    Creation Date Displays the date when the recovery point was created.
    Size Displays the amount of space that the recovery point consumes in the repository.
        The [More] drop-down menu lets you perform certain functions for the selected recovery point.
  3. Optionally, expand a recovery point to view the protected volumes.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating