Dell DL4300 Appliance Deployment Guide - Page 25

Preparing to protect your servers, Overview, Installing agents on clients

Page 25 highlights

4 Preparing to protect your servers Overview To protect your data using DL 4300, you need to add the workstations and servers for protection in the Core Console; for example, your Exchange server, SQL Server, your Linux server, and so on. In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a Microsoft Windows Storage Space, to protect. You can define the schedules for protection, add additional security measures such as encryption, and much more. For more information on how to access the Core Console to protect workstations and servers, see Protecting a machine. Installing agents on clients Each client that is backed up by the DL 4300 appliance must have the Rapid Recovery agent installed. The Rapid Recovery Core console enables you to deploy agents to machines. Deploying agents to machines requires pre-configuring settings to select a single type of agent to push to clients. This method works well if all clients are running the same operating system. However, if there are different versions of operating systems, you may find it easier to install the agents on the machines. You can also deploy the Agent software to the agent machine during the process of protecting a machine. This option is available for machines that do not already have the Agent software installed. For more information on deploying the Agent software while protecting a machine, see the Rapid Recovery on DL Appliance User's Guide at Dell.com/support/home. Deploying the agent software when protecting an agent You can download and deploy agents during the process of adding an agent for protection. NOTE: This procedure is not required if you have already installed the Agent software on a machine that you want to protect. If the Agent software is not installed prior to protecting a machine, you will not be able to select specific volumes for protection as part of this wizard. In this case, by default, all volumes on the agent machine will be included for protection. Rapid Recovery supports the protection and recovery of machines configured with EISA partitions. Support is also extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use Windows Recovery Environment (Windows RE). 1. Do one of the following: • If you are starting from the Protect Machine Wizard, proceed to Step 2 . . • If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect. The Protect Machine Wizard appears. 2. On the Welcome page, select the appropriate installation options: • If you do not need to define a repository or establish encryption, select Typical. • If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to establish encryption using the wizard, select Advanced (show optional steps). • Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens. 3. When you are satisfied with your choices on the Welcome page, then click Next. The Connection page appears. 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41

4
Preparing to protect your servers
Overview
To protect your data using DL 4300, you need to add the workstations and servers for protection in the Core Console; for example,
your Exchange server, SQL Server, your Linux server, and so on.
In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a
Microsoft Windows Storage Space, to protect. You can define the schedules for protection, add additional security measures such
as encryption, and much more. For more information on how to access the Core Console to protect workstations and servers, see
Protecting a machine
.
Installing agents on clients
Each client that is backed up by the DL 4300 appliance must have the Rapid Recovery agent installed. The Rapid Recovery Core
console enables you to deploy agents to machines. Deploying agents to machines requires pre-configuring settings to select a single
type of agent to push to clients. This method works well if all clients are running the same operating system. However, if there are
different versions of operating systems, you may find it easier to install the agents on the machines.
You can also deploy the Agent software to the agent machine during the process of protecting a machine. This option is available
for machines that do not already have the Agent software installed. For more information on deploying the Agent software while
protecting a machine, see the
Rapid Recovery on DL Appliance User’s Guide
at
Dell.com/support/home
.
Deploying the agent software when protecting an agent
You can download and deploy agents during the process of adding an agent for protection.
NOTE: This procedure is not required if you have already installed the Agent software on a machine that you want to
protect.
If the Agent software is not installed prior to protecting a machine, you will not be able to select specific volumes for
protection as part of this wizard. In this case, by default, all volumes on the agent machine will be included for
protection.
Rapid Recovery supports the protection and recovery of machines configured with EISA partitions. Support is also
extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use Windows Recovery Environment
(Windows RE).
1.
Do one of the following:
If you are starting from the Protect Machine Wizard, proceed to Step 2 . .
If you are starting from the Rapid Recovery Core Console, from the button bar, click
Protect
.
The
Protect Machine Wizard
appears.
2.
On the
Welcome
page, select the appropriate installation options:
If you do not need to define a repository or establish encryption, select
Typical
.
If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to
establish encryption using the wizard, select
Advanced (show optional steps)
.
Optionally, if you do not wish to see the
Welcome
page for the Protect Machine Wizard in the future, select the option
Skip this Welcome page the next time the wizard opens
.
3.
When you are satisfied with your choices on the Welcome page, then click
Next
.
The
Connection
page appears.
25