Deployment Guide

NOTE: The Agent software must be installed on the machine you want to protect, and that machine must be restarted,
before it can back up to the Core. To have the installer reboot the protected machine, select the option After
installation, restart the machine automatically (recommended) before clicking Next.
5. On the Upgrade Agent page, do one of the following:
To deploy the new version of the Agent software (matching the version for the Rapid Recovery Core), select Upgrade
the Agent to the latest version of the software.
To continue protecting the machine without updating the Agent software version, clear the option Upgrade the Agent
to the latest version of the software.
6. Click Next.
7. Optionally, on the Protection page, if you want a name other than the IP address to display in the Rapid Recovery Core
console for this protected machine, then in the Display Name field, type a name in the dialog box.
You can enter up to 64 characters. Do not use the special characters described in the topic Prohibited characters in the
Rapid Recovery on DL Appliances Users Guide. Additionally, do not begin the display name with any of the character
combinations described in the topic prohibited phrases in the Rapid Recovery on DL Appliances Users Guide.
8. Select the appropriate protection schedule as described below:
To use the default protection schedule, in the Schedule Settings option, select Default protection.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour.
To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to
the Summary page for the specific protected machine.
To define a different protection schedule, in the Schedule Settings option, select Custom protection.
9. Proceed with your configuration as follows:
If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, then click Finish
to confirm your choices, close the wizard, and protect the machine you specified.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected
volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you
specified to initially pause protection.
If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next
to set up a custom protection schedule. For details on defining a custom protection schedule, see Creating custom
protection schedules section in the Rapid Recovery 6.0 on DL Appliances Users Guide. .
If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and
proceed to Step 14 o see repository and encryption options.
If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, then click Next
and proceed to Step 11 to choose which volumes to protect.
10. On the Protection Volumes page, select which volumes you want to protect. If any volumes are listed that you do not want
to include in protection, click in the Check column to clear the selection. Then click Next.
NOTE:
Typically, it is good practice to protect, at minimum, the System Reserved volume and the volume with the
operating system (typically the C drive).
11. On the Protection Schedule page, define a custom protection schedule and then click Next. For details on defining a
custom protection schedule, see Creating custom protection schedules section in the Rapid Recovery 6.0 on DL
Appliances Users Guide.
If you already have repository information configured, and you selected the Advanced option in Step 1, then the Encryption
page appears. Proceed to Step 13.
12. Optionally, on the Encryption page, to enable encryption, select Enable Encryption.
Encryption key fields appear on the Encryption page.
NOTE:
If you enable encryption, it will be applied to data for all protected volumes for this machine.
You can change encryption settings later from the Rapid Recovery Core Console.
For more information about encryption, see the topic Understanding encryption keys in the Rapid Recovery 6.0 on DL
Appliances Users Guide at https://www.dell.com/support.
CAUTION: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-
bit keys. While using encryption is optional, Dell highly recommends that you establish an encryption key,
38 Preparing to protect your servers