• The encryption key, if any, used for this protected agent
• The version of the Agent software
Protecting multiple machines
After bulk deploying the AppAssure Agent software to the Windows machines, you must protect the
machines to protect the data. If you select
Protect Machine After Install
when you deployed the agent,
you can skip this procedure.
NOTE: Agent machines must be configured with a security policy that makes remote installation
possible.
To protect multiple machines:
1.
From the Core Console, click
Protect
→
Bulk Protect
.
The
Protect Multiple Machines Wizard
window appears.
2.
Select the appropriate installation option:
• If you do not need to define a repository or establish encryption, select
Typical
.
• If you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select
Skip this Welcome page the next time the wizard opens
.
3.
Click
Next
.
The
Connection
page appears.
4.
Add the machines that you want to protect by clicking one of the following options.
• Click
Active Directory
to specify machines on an Active Directory domain. Enter credentials as
described in the table below and click
Next
.
• Click
vCenter/ESXi
to specify virtual machines on a vCenter/ESXi virtual host. Enter credentials as
described in the table below and click
Next
.
Text Box
Description
Host
The host name or IP address of the Active Directory domain or of the
VMware vCenter Server/ESX(i) virtual host.
Username
Enter the username used to connect to this machine; for example,
Administrator.
Password
Enter the secure password used to connect to this machine.
• To add the machines manually, select
Add the machines manually
. Click
Next
.
5.
On the
Machines
page, to specify machines manually, type the following connection details for each
machine on a separate line, and then click
Next
.
hostname::username::password::port
6.
On the
Machines
page, to specify machines identified from an Active Directory domain or from a
VMware vCenter/ESX(i) virtual host, select each appropriate machine you want to protect from the
list, and then click
Next
.
The system verifies each machine you added automatically and the
Protection
page appears.
7.
On the
Protection
page, select the appropriate protection schedule:
• To use the default protection schedule, then in the
Schedule Settings
option, select
Default
protection (hourly snapshots of all volumes)
.
• If you want to define a different protection schedule, then in the Schedule Settings option, select
Custom protection
and then click
Next
.
8.
Proceed with your configuration as follows:
• If you have selected a Typical configuration for the
Protect Multiple Machines Wizard
, and
default protection, then click
Finish
to confirm your choices, close the wizard, and protect the
machines you specified.
50