![Quest Engineering DL4300 User Manual Download Page 173](http://html1.mh-extra.com/html/quest-engineering/dl4300/dl4300_user-manual_3648779173.webp)
DL4300 Appliance
Protecting a machine
173
Pausing and resuming protection
. Optionally, if you want to protect a machine
immediately, you can force a snapshot. For more information, see
Parent topic
Protecting a machine
If you have already installed the Rapid Recovery Agent software on the machine you want to protect, but have not
restarted it yet, restart the machine now.
This topic describes how to start protecting the data on a single machine that you specify using the Protect
Machine Wizard.
NOTE:
Unless using agentless protection on a VMware or ESXi host, the machine you want to protect
must have the Rapid Recovery Agent software installed in order to be protected. You can choose to install
the Agent software prior to this procedure, or you can deploy the software to the target machine as a part
of completing the Protect Machine Wizard.
NOTE:
For more information on agentless protection and its restrictions, see
NOTE:
For more information on installing the Agent software, see “Installing the Rapid Recovery Agent
software” in the Dell Data Protection | Rapid Recovery License Portal Installation and Upgrade Guide.
If the Agent software is not installed prior to protecting a machine, you will not be able to select specific
volumes for protection as part of this wizard. In this case, by default, all volumes on the agent machine will
be included for protection.
Rapid Recovery supports the protection and recovery of machines configured with EISA partitions. Support
is also extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use Windows
Recovery Environment (Windows RE).
To protect multiple machines using one process simultaneously, see
About protecting multiple machines
When you add protection, you need to define connection information such as the IP address and port, and provide
credentials for the machine you want to protect. Optionally, you can provide a display name to appear in the Core
Console instead of the IP address. If you change this, you will not see the IP address for the protected machine
when you view details in the Core Console. You will also define the protection schedule for the machine.
The protection process includes optional steps you can access if you select an advanced configuration. Advanced
options include repository functions and encryption. For example, you can specify an existing Rapid Recovery
repository to save snapshots, or create a new repository. You can also specify an existing encryption key (or
add a new encryption key) to apply to the data saved to the Core for this machine. For more information about
encryption keys, see
.
The workflow of the protection wizard may differ slightly based on your environment. For example, if the Rapid
Recovery Agent software is installed on the machine you want to protect, you will not be prompted to install it from
the wizard. Likewise, if a repository already exists on the Core, you will not be prompted to create one.
CAUTION:
Rapid Recovery does not support bare metal restores (BMRs) of Linux machines with ext2 boot
partitions. Any BMR performed on a machine with this type of partition results in a machine that does not
start. If you want to be able to perform a BMR on this machine in the future, you must convert any ext2
partitions to ext3 or ext4 before you begin protecting and backing up the machine.
1. Do one of the following:
•
If you are starting from the Protect Machine Wizard, proceed to
.
•
If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.