User guide

124 | Protecting Workstations and Servers
b. Click Save.
7. To verify that AppAssure 5 can connect to each machine successfully, select each
machine in the Deploy Agent to Machines window, and then click Verify.
The Deploy Agent on Machines window shows an icon next to each machine that
reflects its readiness for deployment, as follows:
Green icon - AppAssure 5 is able to connect to the machine and it is ready to be
deployed.
Yellow icon - AppAssure 5 is able to connect to the machine; however, the
AppAssure 5 Agent on the machine is already paired with an AppAssure 5 Core.
Red icon - AppAssure 5 cannot connect to the machine. This may be because the
logon credentials are incorrect, the machine is shut down, the firewall is blocking
traffic, or another problem. To correct, click Edit Settings on the toolbar or the
Edit link next to the machine.
8. After machines are successfully verified, select each machine to which you want
to deploy the AppAssure 5 Agent, and then click Deploy.
If you chose the Protect machine after install option, after deployment is successful,
the machines automatically reboot and protection is enabled.
Automatic reboot after
install
Specify whether you want to automatically reboot the machine
after deployment.
NOTE: This option is mandatory and selected by default if you want to
automatically protect the machine after deployment by selecting
Protect machine after install.
Protect machine after
install
Specify whether you want to automatically protect the machine
after deployment. (This allows you to skip “Protecting Multiple
Machines” on page 129.)
Repository Use the drop-down list to select the repository on the AppAssure 5
Core where the data from the machines should be stored. The
repository you select is used for all machines being protected.
NOTE: This option is only available when you select Protect machine
after install.
Encryption Key (Optionally) Use the drop-down list to specify whether encryption
should be applied to the data on the machine that should be stored
in the repository. The encryption key is assigned to all machines
that are being protected.
NOTE: This option is only available when you select Protect machine
after install.
Text Box Description