User guide

92 | Protecting Workstations and Servers
About Protecting Workstations and Servers
To protect your data using AppAssure 5, you need to add the workstations and
servers for protection in the AppAssure 5 Core Console; for example, your Exchange
server, SQL Server, your Linux server, and so on.
In the AppAssure 5 Core Console, you can identify the machine on which an
AppAssure 5 Agent is installed and specify which volumes, for example, a Microsoft
Windows Storage Space, to protect. You can define the schedules for protection, add
additional security measures such as encryption, and much more. For more
information on how to access the AppAssure 5 Core Console to protect workstations
and servers, see “Protecting a Machine” on page 92.
Protecting a Machine
This topic describes how to start protecting the data on a machine that you specify.
When you add protection, you need to specify the name or IP address of the
machine to protect and the volumes on that machine to protect as well as define the
protection schedule for each volume.
To protect multiple machines at the same time, see “Protecting Multiple Machines” on
page 129.
To protect a machine
1. If you did not do so after installation, reboot the machine on which the AppAssure
5 Agent software is installed.
2. On the core machine, navigate to the AppAssure 5 Core Console, and do one of
the following:
From the Home tab, under Protected machines, click Protect Machine.
In this chapter, generally the word machine also refers to the AppAssure Agent software installed
on that machine.
Windows 8, 8.1 and Windows Server 2012, 2012 R2 operating systems that are booted from FAT32
EFI partitions are not available for protection or recovery, nor are Resilient File System (ReFS)
volumes. Bare metal restore of Storage Spaces disks configuration (a feature of Windows 8.1) is
also not supported in this release. For details, see the AppAssure 5 Deployment Guide.
The machine must have the AppAssure 5 Agent software installed in order to be protected. You
can choose to install the Agent software prior to this procedure, or you can deploy the software
to the agent as you define protection in the Connection dialog box. For specific steps to install the
agent software during the process of protecting a machine, see “Deploying the Agent Software
When Protecting an Agent” on page 94.