Dell DL4300 Appliance Users Guide - Page 5

Managing SQL attachability, Managing retention policies

Page 5 highlights

Removing a protected machine from replication on the source Core 55 Removing a protected machine on the target Core 56 Removing a target Core from replication 56 Removing a source Core from replication 56 Recovering replicated data ...56 Roadmap for failover and failback ...57 Setting up an environment for failover 57 Performing failover on the target Core 57 Performing failback ...58 Managing events ...59 Configuring notification groups 59 Configuring an email server and email notification template 61 Configuring repetition reduction 62 Configuring event retention ...62 Managing recovery ...62 About system information ...63 Viewing system information ...63 Downloading installers ...63 About the agent installer ...63 Downloading and installing the agent installer 63 About the local mount utility ...64 Downloading and installing the local mount utility 64 Adding a core to the local mount utility 65 Mounting a recovery point by using the local mount utility 66 Dismounting a recovery point by using the local mount utility 66 About the local mount utility tray menu 67 Using Core and agent options...67 Managing retention policies ...68 Archiving to a cloud...68 About archiving ...68 Creating an archive ...68 Setting a scheduled archive ...69 Pausing or resuming scheduled archive 70 Editing a scheduled archive ...71 Checking an archive ...72 Importing an archive ...72 Managing SQL attachability ...73 Configuring SQL attachability settings 73 Configuring nightly SQL attachability checks and log truncation 74 Managing exchange database mountability checks and log truncation 74 Configuring exchange database mountability and log truncation 74 Forcing a mountability check ...75 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Removing a protected machine from replication on the source Core
......................................
55
Removing a protected machine on the target Core
...................................................................
56
Removing a target Core from replication
....................................................................................
56
Removing a source Core from replication
...................................................................................
56
Recovering replicated data
..........................................................................................................
56
Roadmap for failover and failback
.....................................................................................................
57
Setting up an environment for failover
........................................................................................
57
Performing failover on the target Core
.......................................................................................
57
Performing failback
......................................................................................................................
58
Managing events
................................................................................................................................
59
Configuring notification groups
..................................................................................................
59
Configuring an email server and email notification template
....................................................
61
Configuring repetition reduction
.................................................................................................
62
Configuring event retention
........................................................................................................
62
Managing recovery
.............................................................................................................................
62
About system information
.................................................................................................................
63
Viewing system information
........................................................................................................
63
Downloading installers
......................................................................................................................
63
About the agent installer
....................................................................................................................
63
Downloading and installing the agent installer
...........................................................................
63
About the local mount utility
.............................................................................................................
64
Downloading and installing the local mount utility
....................................................................
64
Adding a core to the local mount utility
......................................................................................
65
Mounting a recovery point by using the local mount utility
......................................................
66
Dismounting a recovery point by using the local mount utility
.................................................
66
About the local mount utility tray menu
.....................................................................................
67
Using Core and agent options
......................................................................................................
67
Managing retention policies
..............................................................................................................
68
Archiving to a cloud
............................................................................................................................
68
About archiving
..................................................................................................................................
68
Creating an archive
......................................................................................................................
68
Setting a scheduled archive
.........................................................................................................
69
Pausing or resuming scheduled archive
.....................................................................................
70
Editing a scheduled archive
..........................................................................................................
71
Checking an archive
.....................................................................................................................
72
Importing an archive
....................................................................................................................
72
Managing SQL attachability
...............................................................................................................
73
Configuring SQL attachability settings
........................................................................................
73
Configuring nightly SQL attachability checks and log truncation
.............................................
74
Managing exchange database mountability checks and log truncation
.........................................
74
Configuring exchange database mountability and log truncation
............................................
74
Forcing a mountability check
.......................................................................................................
75
5