![background image](http://html1.mh-extra.com/html/quest-engineering/dl4300/dl4300_user-manual_3648779186.webp)
DL4300 Appliance
Managing protected machines
186
About managing protected machines
The tasks you can accomplish to manage protected machines are broken down into a few categories.
•
You can view protected machines in the Rapid Recovery Core using options described in the topic
.
•
You can configure machine settings, access system information, or configure notifications for events regarding a
particular machine. For more information, see
•
You can for access diagnostics for a protected machine. For more information, see
Downloading and viewing the log file
•
You can remove a machine from protection, cancel current operations, or view license information for a protected
machine. For more information, see
•
You can view and manage data saved in the Core. For more information, see
Managing snapshots and recovery points
.
Parent topic
Viewing protected machines
From the Home page on the Rapid Recovery Core Console, when viewing the Summary Tables view, you can
see summary information for any machines protected by the Core in the Protected Machines pane.
NOTE:
A software agent acts on behalf of the user to take specific actions. Protected machines are
sometimes referred to as agents, since they run the Rapid Recovery Agent software to facilitate data
backup and replication on the Rapid Recovery Core.
You can view the status, the display name for each machine, which repository it uses, the date and time of the
last snapshot, how many recovery points exist in the repository for the machine, and the total amount of storage
space the snapshots use in the repository.
To manage aspects of any protected machine, start by navigating to the machine you want to view, configure, or
manage. From the Home page, there are three ways to navigate to a protected machine:
•
You can click on the IP address or display name of any protected machine from the Protected Machines pane. This takes
you to the Summary page for the selected protected machine.
•
In the left navigation area, you can click on the title of the Protected Machines menu. The Protected Machines page
appears. On the Protected Machines page, you can see summary information about each machine. For a detailed
Viewing summary information for a protected machine
.
•
In the left navigation area, under the Protected Machines menu, you can click any protected machine IP address or
display name. This takes you to the Summary page for the selected protected machine. For a detailed description of this
page, see
Viewing summary information for a protected machine
Parent topic
Viewing cluster summary information
Complete the steps in this procedure to view summary information about a cluster including information about the
associated quorum for the cluster.
1. In the Rapid Recovery Core Console, under Protected Machines, click the cluster you want to view.
The Summary page for the machine appears.
2. On the Summary page, you can view such information as the cluster name, cluster type, quorum type (if
applicable), and the quorum path (if applicable). This page also shows at-a-glance information about the
volumes in this cluster, including size and protection schedule. If applicable, you can also view SQL Server
or Exchange Server information for a different cluster.