User guide
Table of Contents 5
Email Notifications................................................................................................................. 48
ESX Servers.......................................................................................................................... 53
Hyper-V Servers.................................................................................................................... 56
Target Folder......................................................................................................................... 57
User Profiles.......................................................................................................................... 57
Task Profiles ......................................................................................................................... 59
Configuring Setup Files................................................................................................................ 67
Adding Source Content.....................................................................................................70
Source Content ............................................................................................................................ 71
Network Browser.......................................................................................................................... 71
Importing Source Systems ........................................................................................................... 72
Adding Linux Hosts ...................................................................................................................... 74
Cold Cloning Ready ..................................................................................................................... 74
Adding Physical Targets............................................................................................................... 75
Windows P2V Conversions...............................................................................................76
Conversion Overview ................................................................................................................... 77
Converting with Remote Cold Cloning (RCC) ....................................................................... 79
Converting with Synchronized Cutover................................................................................. 80
Converting with Different Destinations Cutover (DDC) ......................................................... 81
A Note About Continuous Protection .................................................................................... 82
Creating Conversions................................................................................................................... 82
Identifying Source Servers.................................................................................................... 83
Creating Folders and Tasks.................................................................................................. 86
Configuring Source and Target Settings............................................................................... 88
Saving and Running a Task.................................................................................................. 97
Conversion Tutorial .................................................................................................................... 100
Pre-task configurations ....................................................................................................... 100
Configuring a Conversion Task........................................................................................... 101
Additional Task Procedures ....................................................................................................... 104
Configuring a Conversion with RCC ................................................................................... 104
Configuring a Conversion with Synchronized Cutover........................................................ 107
Configuring a Conversion with Different Destination Cutover ............................................. 110
Continuous Protection ....................................................................................................114