Dell Appassure 5 User Guide
Here you can view all the pages of manual Dell Appassure 5 User Guide. The Dell manuals for System are available online for free. You can easily download all the documents as PDF.
Page 2
© 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s...
Page 3
Contents Dell AppAssure User Guide Version 5.4.3 Revision B1 Introduction to AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 AppAssure core technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Live Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Verified Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Page 4
Dell AppAssure User Guide Version 5.4.3 Revision B2 Configuring the AppAssure Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Understanding repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Managing a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Creating a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52...
Page 5
Dell AppAssure User Guide Version 5.4.3 Revision B3 Understanding encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Applying or removing encryption from a protected machine . . . . . . . . . . . . . . . . . . . .89 Associating an encryption key with a protected machine . . . . . . . . . . . . . . . . . . . .89 Applying an encryption key from the Machines tab . . . . . . . . . . . . . . . . . . . . . . . .90 Disassociating an encryption key from a protected...
Page 6
Dell AppAssure User Guide Version 5.4.3 Revision B4 Managing Exchange database mountability checks and log truncation . . . . . . . . . . . . . 129 Configuring nightly Exchange database checksum checks and log truncation . . . . . . 129 Forcing a mountability check of an Exchange database . . . . . . . . . . . . . . . . . . . . 129 Forcing a checksum check of Exchange Server recovery points . . . . . . . . . . . . . . . 130 Forcing log truncation for an Exchange machine . . . . . . . . . . . . . ....
Page 7
Dell AppAssure User Guide Version 5.4.3 Revision B5 Performing a continual (Virtual Standby) Hyper-V export . . . . . . . . . . . . . . . . . . 156 Exporting data to a VirtualBox virtual machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Performing a one-time VirtualBox export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Performing a continual (Virtual Standby) VirtualBox export . . . . . . . . . . . . . . . . . 159 Managing protected machines . . . . . . . . . ....
Page 8
Dell AppAssure User Guide Version 5.4.3 Revision B6 Managing replication settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Scheduling replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Using the Copy function to create a seed drive . . . . . . . . . . . . . . . . . . . . . . . . . 199 Monitoring replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Pausing and...
Page 9
Dell AppAssure User Guide Version 5.4.3 Revision B7 Restoring a directory or file and preserving permissions using Windows Explorer . . . . . . 228 Understanding bare metal restore for Windows machines . . . . . . . . . . . . . . . . . . .229 Performing a bare metal restore for Windows machines . . . . . . . . . . . . . . . . . . . . . . 230 Prerequisites for performing a bare metal restore for a Windows machine . . . . . . . 231 Managing a Windows boot image . . . . . . . . . . . . . . . . . . . ....
Page 10
Dell AppAssure User Guide Version 5.4.3 Revision B8 Working with Linux machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261 Working with Linux recovery points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Mounting a recovery point volume on a Linux machine . . . . . . . . . . . . . . . . . . . . 261 Unmounting a recovery point on a Linux machine . . . . . . . . . . . . . . . . . . . . . . . 263 Exporting data to a Linux-based...