– Truncate log before checksum check completes
4.
You can also modify the logon credentials for your Exchange Server. To do so, scroll down to the
Exchange Server Information
section and then click
Change Credentials
.
The
Set Exchange Credentials
dialog box appears.
5.
Enter the new credentials and then click
OK
.
Modifying SQL server settings
If you are protecting data from Microsoft SQL Server, there are additional settings that you need to
configure in the Core Console.
To modify SQL server settings:
1.
After you have added the SQL Server machine for protection, select the machine in the Core
Console’s
Navigation
pane.
The
Summary
tab appears for the machine.
2.
From the
Summary
tab, click the SQL Server settings link.
The
SQL Server Settings
dialog box appears.
3.
In the
SQL Server Settings
dialog box, edit the following settings, as needed:
• Enable nightly attachability check
• Truncate log after successful attachability check (simple recovery model only)
4.
You can also modify the logon credentials for SQL Server. To do so, scroll down to the
SQL Server
Information
table and then click
Change Credentials
.
The
Set SQL Server Credentials
dialog box appears.
5.
Enter the new credentials, and then click
OK
.
Deploying an agent (push install)
AppAssure requires microsoft.net for the agent installation. Microsoft.net must be installed on any client
machine prior to installing the agent either manually or by a push installation process.
AppAssure lets you deploy the AppAssure Agent Installer to individual Windows machines for protection.
Complete the steps in the following procedure to push the installer to an agent. To deploy agents to
multiple machines at the same time, see
Deploying To Multiple Machines
NOTE: Agents must be configured with a security policy that makes remote installation possible.
To deploy an agent:
1.
From the Core Console, click the
Machines
tab.
2.
In the
Actions
drop-down menu, click
Deploy Agent
.
The
Deploy Agent
dialog box appears.
3.
In the
Deploy Agent
dialog box, enter the logon settings as described in the following table.
Text Box
Description
Machine
Enter the host name or IP address of the machine that you want to deploy.
Username
Enter the user name to connect to this machine (for example, administrator).
Password
Enter the password to connect to this machine.
96