Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell DL1000 Appliance User's Guide

Deploying the Agent Software when protecting an agent

You can download and deploy agents during the process of adding an agent for protection.
  • NOTE: This procedure is not required if you have already installed the Agent software on a machine that you want to protect.

To deploy agents during the process of adding an agent for protection:

  1. Click Protected Machines on the left navigation pane.
  2. Click Actions > Deploy Agent . The Deploy Agent dialog box appears.
  3. Enter logon and protection settings as follows:
    • Host name — Specifies the host name or IP address of the machine that you want to protect.

    • User name — Specifies the user name used to connect to this machine; for example, administrator.

    • Password — Specifies the password used to connect to this machine.

    • Protect machine after install — Selecting this option enables AppAssure to take a base snapshot of the data after you add the machine for protection. This option is selected by default. If you deselect this option, then you must force a snapshot manually when you are ready to start data protection.

    • Display name — Specifies a name for the machine which appears on the Core Console. The display name could be the same value as the host name.

    • Port — Specifies the port number on which the Core communications with the Agent on the machine. The default value is 8006.

    • Repository — Select the repository in which to store data from this agent.

      • NOTE: You can store data from multiple agents in a single repository.
    • Encryption Key — Specifies whether encryption should be applied to the data for every volume on this machine to be stored in the repository.

      • NOTE: You define encryption settings for a repository under the Configuration tab in the Core Console.
  4. Click Deploy. The Deploy Agent dialog box closes. There may be a delay before you see the selected agent appear in the list of protected machines.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\