![background image](http://html1.mh-extra.com/html/quest-engineering/dl4300/dl4300_user-manual_3648779162.webp)
DL4300 Appliance
About protecting machines with Rapid Recovery
162
Protecting workstations and servers
Protecting machines
This section describes how to protect, configure, and manage the protected machines in your Rapid Recovery
environment.
Parent topic
About protecting machines with Rapid Recovery
To protect your data using Rapid Recovery, you need to add the workstations and servers for protection in the
Rapid Recovery Core Console; for example, your Exchange server, SQL Server, Linux server, and so on.
You must install the Rapid Recovery Agent software on all physical or virtual machines you want to protect in the
Core.
NOTE:
As an exception to this rule, if protecting virtual machines on a VMware or ESXi host, you can
use agentless protection. For more information, including restrictions for agentless protection, see
Understanding Rapid Snap for Virtual
.
In the Rapid Recovery Core Console, using one of the Protect Machine wizards, you can identify the machines
you want to protect. You can do the following:
•
You can protect a single machine using the Protect Machine wizard, which connects to the machine using network
hostname or IP address. For more information on how to protect a single machine,
.
•
You can protect a network cluster using the Protect Cluster function, which connects to the cluster and its nodes using
network hostname or IP address.
•
You can protect multiple machines simultaneously using the Protect Multiple Machines wizard, which connects to the
machines using Microsoft Active Directory®, or to a vCenter or ESXi host; or you can specify the network hostname or IP
addresses for a list of machines you enter manually.
NOTE:
Dell recommends limiting the number of machines you protect simultaneously to 50 or fewer, to
preclude experiencing resource constraints that may cause the protect operation to fail.
When identifying your protection requirements for a single machine in the wizard, you can specify which volumes
to protect. When you protect multiple machines, all volumes are protected by default. (You can change this later
on an individual machine basis).
The wizard also lets you define a customized schedule for protection (or re-use an existing schedule).
Using advanced options, you can add additional security measures by specifying or applying an encryption key to
backups for the machines you want to protect.
Finally, if one does not already exist, you can define a repository using the wizard.