Deploying an Agent (Push Install) ......................................................................................................45
Protecting a machine .........................................................................................................................46
Pausing and resuming protection ............................................................................................... 48
Deploying the Agent Software when protecting an agent..........................................................48
Understanding protection schedules ................................................................................................49
Creating custom schedules..........................................................................................................50
Modifying protection schedules ..................................................................................................50
Configuring protected machine settings ...........................................................................................51
Viewing and modifying configuration settings ............................................................................51
Viewing system information for a machine ................................................................................ 52
Viewing license information ........................................................................................................ 53
Modifying transfer settings ...........................................................................................................53
Archiving data......................................................................................................................................55
Creating an archive ...................................................................................................................... 55
Importing an archive .................................................................................................................... 57
Archiving to a cloud...................................................................................................................... 59
Managing SQL attachability ............................................................................................................... 59
Configuring SQL attachability settings ........................................................................................59
Configuring nightly SQL attachability checks and log truncation ............................................. 60
Viewing system diagnostics ............................................................................................................... 61
Viewing machine logs .................................................................................................................. 61
Uploading machine logs............................................................................................................... 61
Canceling operations on a machine ............................................................................................61
Viewing machine status and other details ...................................................................................61
Managing multiple machines ............................................................................................................ 62
Deploying To Multiple Machines ................................................................................................. 63
Monitoring the deployment of multiple machines .....................................................................63
Protecting multiple machines.......................................................................................................63
Monitoring the protection of multiple machines ....................................................................... 65
5 Recovering data..................................................................................................66
Managing recovery ............................................................................................................................ 66
Managing snapshots and recovery points ........................................................................................ 66
Viewing recovery points .............................................................................................................. 66
Viewing a specific recovery point.................................................................................................67
Mounting a recovery point for a Windows machine ..................................................................68
Dismounting select recovery points ........................................................................................... 68
Dismounting all recovery points ..................................................................................................69
Mounting a recovery point for a Linux machine .........................................................................69
Removing recovery points ...........................................................................................................69
Deleting an orphaned recovery point chain................................................................................ 70
Forcing a snapshot .......................................................................................................................70
5