• If you have selected a Typical configuration for the
Protect Multiple Machines Wizard
and
specified custom protection, click
Next
and set up a custom schedule.
• If you have selected Advanced configuration for the Protect Machine Wizard, click
Next
and
proceed to Step 9 to see repository and encryption options.
9.
On the
Repository
page select
Use an existing repository
.
10.
Click
Next
.
The
Encryption
page appears.
11.
To enable encryption, on the
Encryption
page, select
Enable Encryption
.
Encryption key fields appear on the
Encryption
page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for the
machines you have specified for protection. You can change the settings later from the
Configuration
tab in the Core Console. For more information about encryption, see
Managing
Security
.
12.
Enter the information as described in the following table to add an encryption key for the Core.
Text Box
Description
Name
Enter a name for the encryption key.
Description
Enter a description to provide additional details for the encryption key.
Passphrase
Enter the passphrase used to control access.
Confirm
Passphrase
Re-enter the passphrase you just entered.
13.
Click
Finish
to save and apply your settings.
Monitoring the protection of multiple machines
You can monitor the progress as AppAssure applies the protection polices and schedules to the
machines.
To monitor the protection of multiple machines navigate to the Core Console Home tab and click
Events
.
The Events tab displays Tasks, Alerts, and Events. When volumes are transferred, the status, start times,
and end times display in the Tasks pane. You can also filter tasks by status (active, waiting, completed and
failed).
As each protected machine is added, an alert is logged, indicating if the operation was successful or if
errors were logged.
51