![background image](http://html1.mh-extra.com/html/quest-engineering/dl4300/dl4300_user-manual_3648779175.webp)
DL4300 Appliance
Protecting a machine
175
You can enter up to 64 characters. Do not use the special characters described in the topic
. Additionally, do not begin the display name with any of the character combinations described in
the topic
.
8. Select the appropriate protection schedule as described below:
•
To use the default protection schedule, in the Schedule Settings option, select Default protection.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine
once every hour. To change the protection settings at any time after you close the wizard, including
choosing which volumes to protect, go to the Summary page for the specific protected machine.
•
To define a different protection schedule, in the Schedule Settings option, select Custom protection.
9. Proceed with your configuration as follows:
•
If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, then click
Finish to confirm your choices, close the wizard, and protect the machine you specified.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the
protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule
you defined, unless you specified to initially pause protection.
•
If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click
Next to set up a custom protection schedule. For details on defining a custom protection schedule, see
.
•
If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and
to see repository and encryption options.
•
If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, then click
Next and proceed to
to choose which volumes to protect.
10. On the Protection Volumes page, select which volumes you want to protect. If any volumes are listed that
you do not want to include in protection, click in the Check column to clear the selection. Then click Next.
NOTE:
Typically, it is good practice to protect, at minimum, the System Reserved volume and the
volume with the operating system (typically the C drive).
11. On the Protection Schedule page, define a custom protection schedule and then click Next. For details on
defining a custom protection schedule, see
Creating custom protection schedules
.
If you already have repository information configured, and you selected the Advanced option in Step 1, then
the Encryption page appears. Proceed to
.
12. On the Repository page, the following:
•
If you already have a repository and want to store the data from this machine for protection in the existing
repository, then do the following:
1. Select Use an existing repository.
2. Select an existing repository from the list.
3. Click Next.
The Encryption page appears. Skip to
to optionally define encryption.
•
If you want to create a repository, select Create a Repository, and then complete the following steps.
1. On the Repository, enter the information described in the following table.
Table 62. Add New Repository settings
Text Box
Description
Repository Name
Enter the display name of the repository.
By default, this text box consists of the word
Repository and a number, which corresponds to the
number of repositories for this Core. For example,