User guide

94 | Protecting Workstations and Servers
7. Click Protect.
The first time protection is added for a machine, a base image (that is, a snapshot of
all the data in the protected volumes) immediately begins to transfer to the repository
on the AppAssure 5 Core, unless you specified to initially pause protection.
Deploying the Agent Software When Protecting an Agent
You can download and deploy agents when you add an agent for protection.
Complete steps in this procedure to deploy the AppAssure 5 Agent software on the
selected machine when adding a machine to protection.
Initially pause
protection
Once you add a machine for protection, AppAssure 5 automatically
begins the process of taking a base snapshot of data. You can select
this check box to pause protection initially. You then need to force
a snapshot manually when you are ready to start protecting your
data. For more information, see “Forcing a Snapshot” on page 141.
Volume Groups Under Volume Groups, you can define which volumes you want to
protect, and establish a protection schedule.
To set a default protection schedule of every 60 minutes for all
volumes on the machine, click Apply Default.
You can also select any volume on the machine and define
protection parameters for it individually.
Initial settings apply a default protection schedule of every 60
minutes. To modify the schedule for any volume, click Edit for that
volume. You can then further define the interval between
snapshots (including defining a separate schedule for weekends) or
specify a daily time to begin a snapshot.
For more information on editing the protection schedule for a
selected volume, see “Creating Custom Schedules for Volumes” on
page 96.
If you protected a Linux machine, note that you should not unmount a protected volume by hand.
In the event you need to do this, you must execute the following command before unmounting
the volume: bsctl -d <path_to_volume>. In this command, <path_to_volume> does not
refer to the mount point of the volume but instead refers to the file descriptor of the volume; it
would need to be in a form similar to this example: /dev/sda1.
This step is not required if you have already installed the Agent software on a machine you want
to protect.
Text Box Description