Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

Here you can view all the pages of manual Dell Appassure 5 User Guide. The Dell manuals for System are available online for free. You can easily download all the documents as PDF.

Page 121

Dell AppAssure User Guide
Version 5.4.3 Revision B119 cIn the Location field, enter a directory path for the repository. For example, on a local computer, 
type C:\Repository. This location must be unique for this core. If storing your repository on a 
shared drive, enter in format \\servername\sharename.
d If storing the repository on a shared volume, in the User Name field, enter the user name with 
privileges to access the shared drive, and in the Password field, enter the password for this user.
eIn...

Page 122

Dell AppAssure User Guide
Version 5.4.3 Revision B120 19 Optionally, to enable encryption, on the Encryption page, select Enable Encryption.
Encryption key fields appear on the Encryption page.
20 If you want to encrypt these protected machines using an encryption key that is already defined on this 
AppAssure Core, select Encrypt data using an existing Encryption key, and select the appropriate key 
from the drop-down menu.
Proceed to Step 22.
21 If you want to add a new encryption key to the Core and...

Page 123

Dell AppAssure User Guide
Version 5.4.3 Revision B121 You can also filter tasks by status (active, waiting, completed and failed). For more information, see 
Viewing tasks.
As each protected machine is added, an alert is logged, which lists whether the operation was successful 
or if errors were logged. For more information, see Viewing alerts.
For information on viewing all events, see Viewing all events.
NOTE: To only see tasks that are waiting to be performed, make sure that you select the Waiting 
Ta...

Page 124

Dell AppAssure User Guide
Version 5.4.3 Revision B
7
122
Managing Microsoft Exchange and SQL 
Servers
This chapter describes how to configure, and manage the protection of Microsoft Exchange and SQL Servers in 
your AppAssure environment. It includes the following sections:
•Configuring Exchange and SQL Server settings
•Managing SQL attachability and log truncation
•Managing Exchange database mountability checks and log truncation
Options specific to Exchange Server and SQL Server appear in the AppAssure...

Page 125

Dell AppAssure User Guide
Version 5.4.3 Revision B123
Configuring Exchange and SQL Server 
settings
If you protect data on Exchange servers or SQL servers on your AppAssure Core, you can establish credentials so 
the Core can authenticate to those machines. Navigate to the protected server in the AppAssure Core console to 
configure these server settings, as described in the following topics.
Setting credentials for an Exchange Server machine
Once you protect data on a Microsoft Exchange server, you can...

Page 126

Dell AppAssure User Guide
Version 5.4.3 Revision B124 •If you want to set credentials for a single SQL Server database instance, click Set Instance 
Credentials, and in the Edit Instance Credentials dialog box, do the following:
a Select the credential type (Default, Windows, or SQL)
b In the User name text field, enter the user name for a user with permissions to the SQL 
server; for example, Administrator (or, if the machine is in a domain, [domain 
name]\Administrator).
c In the Password text field,...

Page 127

Dell AppAssure User Guide
Version 5.4.3 Revision B125
Modifying Exchange Server settings
If you are protecting data from a Microsoft Exchange server, you need to configure additional settings in the 
AppAssure Core Console.
To modify Exchange Server settings
1 Once you have added the Exchange Server machine for protection, navigate to the AppAssure Core 
Console and select the machine in the Navigation pane.
The Summary tab displays for the machine.
2 From the Summary tab, in the Actions drop-down menu,...

Page 128

Dell AppAssure User Guide
Version 5.4.3 Revision B126 a Select the credential type (Default, Windows, or SQL)
b In the User name text field, enter the user name for a user with permissions to the SQL 
server; for example, Administrator (or, if the machine is in a domain, [domain 
name]\Administrator).
c In the Password text field, enter the password associated with user name you specified to 
connect to the SQL server.
dClick OK to confirm the settings and close the dialog box.
Managing SQL attachability...

Page 129

Dell AppAssure User Guide
Version 5.4.3 Revision B127 2Click Settings.
3 In the Nightly Jobs pane, click change.
The Nightly Jobs dialog box appears.
4Select Attachability Check Job and then click Settings.
The Configuration dialog box appears, letting you choose the local SQL Server instance to use for 
performing attachability checks for the protected SQL Server databases.
5 Use the drop-down menus to select the instance of SQL Server installed on the Core from the following 
options:
•SQL Server 2005...

Page 130

Dell AppAssure User Guide
Version 5.4.3 Revision B128
To configure nightly SQL attachability checks and log truncation
1 Navigate to the AppAssure Core, and then click the Configuration tab.
2Click Settings.
3 In the Nightly Jobs section, click Change.
4 Select or clear the SQL Server settings based on the needs of your organization:
•Attachability Check Job
•Log Truncation Job (simple recovery model only)
5Click OK.
The attachability and log truncation settings take effect for the protected SQL Server....
Start reading Dell Appassure 5 User Guide

Related Manuals for Dell Appassure 5 User Guide

All Dell manuals