Dell PowerVault DL4000 Dell PowerVault DL4000 Backup To Disk Appliance - Power - Page 85

Protecting Workstations And Servers, Configuring Machine Settings

Page 85 highlights

4 Protecting Workstations And Servers About Protecting Workstations And Servers To protect your data using AppAssure 5, you need to add the workstations and servers for protection in the AppAssure 5 Core Console. For example, your Exchange server, SQL Server, your Linux server, and so on. NOTE: In this chapter, generally the word machine also refers to the AppAssure Agent software installed on that machine. In the AppAssure 5 Core Console, you can identify the machine on which an AppAssure agent is installed and specify which volumes to protect, define schedules for protection, add additional security measures such as encryption, and more. For more information on how to access the AppAssure 5 Core Console to protect workstations and servers, see Protecting A Machine. Configuring Machine Settings After you add protection for machines in AppAssure, you can easily modify basic machine configuration settings (name, host name, and so on), protection settings (changing the protection schedule for volumes on the machine, adding or removing volumes, or pausing protection), and more. Viewing And Modifying Configuration Settings To view and modify configuration settings: 1. After you have added a protected machine, perform one of the following: - From the AppAssure 5 Core Console, click the Machines tab and then click the hyperlink for the machine you want to modify. - Or, from the Navigation pane, select the machine you want to modify. 2. Click the Configuration tab. The Settings page is displayed. 3. Click Edit to modify the machine settings as described in the following table. Text Box Display Name Description Enter a display name for the machine. A name for this machine to be displayed in the AppAssure 5 Core Console. By default, this is the host name of the machine. You can change this to something more user-friendly if needed. Host Name Port Enter a host name for the machine. Enter a port number for the machine. The port is used by the Core to communicate with this machine. 85

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

4
Protecting Workstations And Servers
About Protecting Workstations And Servers
To protect your data using AppAssure 5, you need to add the workstations and servers for protection in the AppAssure 5
Core Console. For example, your Exchange server, SQL Server, your Linux server, and so on.
NOTE:
In this chapter, generally the word machine also refers to the AppAssure Agent software installed on that
machine.
In the AppAssure 5 Core Console, you can identify the machine on which an AppAssure agent is installed and specify
which volumes to protect, define schedules for protection, add additional security measures such as encryption, and
more. For more information on how to access the AppAssure 5 Core Console to protect workstations and servers, see
Protecting A Machine
.
Configuring Machine Settings
After you add protection for machines in AppAssure, you can easily modify basic machine configuration settings (name,
host name, and so on), protection settings (changing the protection schedule for volumes on the machine, adding or
removing volumes, or pausing protection), and more.
Viewing And Modifying Configuration Settings
To view and modify configuration settings:
1.
After you have added a protected machine, perform one of the following:
From the AppAssure 5 Core Console, click the
Machines
tab and then click the hyperlink for the machine
you want to modify.
Or, from the
Navigation
pane, select the machine you want to modify.
2.
Click the
Configuration
tab.
The
Settings
page is displayed.
3.
Click
Edit
to modify the machine settings as described in the following table.
Text Box
Description
Display Name
Enter a display name for the machine.
A name for this machine to be displayed in the AppAssure 5 Core Console. By default, this
is the host name of the machine. You can change this to something more user-friendly if
needed.
Host Name
Enter a host name for the machine.
Port
Enter a port number for the machine.
The port is used by the Core to communicate with this machine.
85