To deploy and protect multiple agents, perform the following tasks:
1.
Deploy AppAssure to multiple machines.
See
Deploying To Multiple Machines
.
2.
Monitor the activity of the batch deployment.
See
Monitoring The Deployment Of Multiple Machines
.
3.
Protect multiple machines.
See
Protecting Multiple Machines
.
NOTE: This step can be skipped if you selected the Protect Machine After Install option during
deployment.
4.
Monitor the activity of the batch protection.
See
Monitoring the Protection of Multiple Machines
.
Deploying To Multiple Machines
You can simplify the task of deploying the AppAssure Agent software to multiple Windows machines by
using the Bulk Deploy feature of AppAssure. You can bulk deploy to:
• Machines on a VMware vCenter/ESXi virtual host
• Machines on an Active Directory domain
• Machines on any other host
The Bulk Deploy feature automatically detects machines on a host and allows you to select those to
which you want to deploy. Alternatively, you can manually enter host and machine information.
NOTE: The machines that you are deploying must have access to the internet to download and
install bits as AppAssure uses the web version of the AppAssure Agent Installer to deploy the
installation components. If access to the internet is not available, you can push the AppAssure Agent
installation program from the Core machine. You can download core and agent updates from the
License Portal.
Monitoring the deployment of multiple machines
You can view the progress of the deployment of AppAssure Agent software to the machines.
To monitor the deployment of multiple machines:
1.
From the Core Console, click
Events
→
Alerts
.
2.
Navigate to the AppAssure Core Home tab and then click the
Events
tab.
Alert events appear in the list, showing the time the event initiated and a message. For each
successful deployment of the Agent software, you will see an alert indicating that the protected
machine has been added.
3.
Optionally, click on any link for a protected machine.
The Summary tab for the selected machine appears, showing pertinent information including:
• The host name of the protected machine
• The last snapshot, if applicable
• The scheduled time of the next snapshot, based on the protection schedule you selected
• Time Remaining
49