Users Guide
Table 284. Start-Protect command options (continued)
Option Description
-agentname
Protected machine name or IP address.
-
agentusernam
e
Log on to the server to be protected.
-
agentpasswor
d
Password to the server to be protected.
-agentport
Protected server port number.
-volumes
List of volumes to protect. Values must be enclosed in double quotes and separated by a space. Do not
use trailing slashes in volume names. For example, "c:" or "d:".
Example:
Put volumes of a server under protection:
>Start-Protect -repository "Repository 1" -agentname 10.10.9.120 -agentusername
administrator -agentpassword 12345 -agentport 5002 -volumes "c:" "d:"
Start-ProtectCluster
The Start-ProtectCluster command lets an administrator add a server cluster under protection by a Core.
Usage
Usage for the command is as follows:
Start-ProtectCluster -core [host name] -user [user name] -password [password] -
repository [repository name] -clustername [name | IP address] -clusterusername [user
name for cluster] -clusterpassword [password for cluster] -clusterport [port] -
clustervolumes [volume names] -clusternodes [cluster nodes names and volumes]
Command Options
The following table describes the options available for the Start-ProtectCluster command:
Table 285. Start-ProtectCluster command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default the
connection is made to the Core installed on the local machine.
-user
Optional. User name for the remote Core host machine. If you specify a user name, you also have to
provide a password. If none are provided, then the logged-on user's credentials will be used.
Understanding the Rapid Recovery PowerShell module 413










