Dell PowerVault DL4000 Dell PowerVault DL4000 Backup To Disk Appliance - Power - Page 8

Protecting Server Clusters, Roadmap For Performing A Bare Metal Restore For A Windows Machine

Page 8 highlights

Restoring Data ...110 Exporting Backup Information For Your Windows Machine To A Virtual Machine 110 Exporting Windows Data Using ESXi Export 111 Exporting Windows Data Using VMware Workstation Export 112 Exporting Windows Data Using Hyper-V Export 114 Performing A Rollback For A Windows Machine 116 Performing A Rollback For A Linux Machine 117 About Bare Metal Restore For Windows Machines 118 Prerequisites For Performing A Bare Metal Restore For A Windows Machine 118 Roadmap For Performing A Bare Metal Restore For A Windows Machine 118 Creating A Bootable CD ISO Image...119 Loading A Boot CD ...120 Launching A Restore From The Appassure 5 Core 121 Mapping Volumes ...121 Viewing The Recovery Progress ...121 Starting A New Server ...122 Repairing Startup Problems ...122 Performing A Bare Metal Restore For A Linux Machine 122 Viewing Events And Alerts ...123 5 Protecting Server Clusters...125 About Server Cluster Protection In AppAssure 5 125 Supported Applications And Cluster Types 125 Protecting A Cluster ...126 Protecting Nodes In A Cluster ...127 Process Of Modifying Cluster Node Settings ...128 Roadmap For Configuring Cluster Settings ...128 Modifying Cluster Settings ...128 Configuring Cluster Event Notifications ...129 Modifying The Cluster Retention Policy ...130 Modifying Cluster Protection Schedules ...131 Modifying Cluster Transfer Settings ...131 Converting A Protected Cluster Node To An Agent 131 Viewing Server Cluster Information ...132 Viewing Cluster System Information ...132 Viewing Summary Information ...132 Working With Cluster Recovery Points ...133 Managing Snapshots For A Cluster ...133 Forcing A Snapshot For A Cluster ...133 Pausing And Resuming Cluster Snapshots 134 Dismounting Local Recovery Points ...134 Performing A Rollback For Clusters And Cluster Nodes 134

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

Restoring Data
.....................................................................................................................................................
110
Exporting Backup Information For Your Windows Machine To A Virtual Machine
......................................
110
Exporting Windows Data Using ESXi Export
.................................................................................................
111
Exporting Windows Data Using VMware Workstation Export
......................................................................
112
Exporting Windows Data Using Hyper-V Export
...........................................................................................
114
Performing A Rollback For A Windows Machine
..........................................................................................
116
Performing A Rollback For A Linux Machine
................................................................................................
117
About Bare Metal Restore For Windows Machines
............................................................................................
118
Prerequisites For Performing A Bare Metal Restore For A Windows Machine
...........................................
118
Roadmap For Performing A Bare Metal Restore For A Windows Machine
........................................................
118
Creating A Bootable CD ISO Image
................................................................................................................
119
Loading A Boot CD
........................................................................................................................................
120
Launching A Restore From The Appassure 5 Core
.......................................................................................
121
Mapping Volumes
..........................................................................................................................................
121
Viewing The Recovery Progress
...................................................................................................................
121
Starting A New Server
..................................................................................................................................
122
Repairing Startup Problems
..........................................................................................................................
122
Performing A Bare Metal Restore For A Linux Machine
...............................................................................
122
Viewing Events And Alerts
...................................................................................................................................
123
5 Protecting Server Clusters
....................................................................................................
125
About Server Cluster Protection In AppAssure 5
................................................................................................
125
Supported Applications And Cluster Types
..................................................................................................
125
Protecting A Cluster
.............................................................................................................................................
126
Protecting Nodes In A Cluster
.............................................................................................................................
127
Process Of Modifying Cluster Node Settings
......................................................................................................
128
Roadmap For Configuring Cluster Settings
..........................................................................................................
128
Modifying Cluster Settings
............................................................................................................................
128
Configuring Cluster Event Notifications
........................................................................................................
129
Modifying The Cluster Retention Policy
........................................................................................................
130
Modifying Cluster Protection Schedules
......................................................................................................
131
Modifying Cluster Transfer Settings
.............................................................................................................
131
Converting A Protected Cluster Node To An Agent
.............................................................................................
131
Viewing Server Cluster Information
.....................................................................................................................
132
Viewing Cluster System Information
.............................................................................................................
132
Viewing Summary Information
......................................................................................................................
132
Working With Cluster Recovery Points
...............................................................................................................
133
Managing Snapshots For A Cluster
.....................................................................................................................
133
Forcing A Snapshot For A Cluster
.................................................................................................................
133
Pausing And Resuming Cluster Snapshots
...................................................................................................
134
Dismounting Local Recovery Points
....................................................................................................................
134
Performing A Rollback For Clusters And Cluster Nodes
......................................................................................
134