User guide
Continuous Protection 121
Configuring Continuous Protection
5
In the VM name field, enter the desired name.
Note The target VM name can contain upper and lower case letters from the latin alphabet
(a-z, A-Z), numbers from 0-9, and the characters "-" and "_".
Caution To avoid errors, please ensure that the VM name is unique within your
environment.
6
In the Conversion Type field, select Continuous Protection.
7
In the Transfer mode field, select Block or File.
• Block: Block cloning uses an Application Programming Interface (API) from
the source OS that allows you to skip unused sectors. This is the default
transfer mode, yielding an exact binary copy of a source volume. This mode
requires that the source and target disks be the same size. After conversion,
you can resize the target volume up or down.
• File: File cloning of a source occurs on the file system level. The target is
mounted to the source and a full file synchronization occurs-directory
structure from the source and all file content are updated to the target. File
cloning is ideal for capturing large source volumes to a target with limited
storage capacity. To ensure consistency during hot cloning, use the file method
with MS VSS.
Step 4: Select Source Server
1
In the Network Browser pane, select the server to convert. Right-click the server,
and select Set as source.
2
In the Source Drives section, select the volumes to convert.
Step 5: Schedule and Save
1
Click the Scheduler tab to set a schedule for this task.