To deploy and protect multiple agents, perform the following tasks:1. Deploy AppAssure to multiple machines.See Deploying To Multiple Machines.2. Monitor the activity of the batch deployment.See Monitoring The Deployment Of Multiple Machines.3. Protect multiple machines.See Protecting Multiple Machines .NOTE: This step can be skipped if you selected the Protect Machine After Install option duringdeployment.4. Monitor the activity of the batch protection.See Monitoring the Protection of Multiple Machines.Deploying To Multiple MachinesYou can simplify the task of deploying the AppAssure Agent software to multiple Windows machines byusing the Bulk Deploy feature of AppAssure. You can bulk deploy to:• Machines on a VMware vCenter/ESXi virtual host• Machines on an Active Directory domain• Machines on any other hostThe Bulk Deploy feature automatically detects machines on a host and allows you to select those towhich you want to deploy. Alternatively, you can manually enter host and machine information.NOTE: The machines that you are deploying must have access to the internet to download andinstall bits as AppAssure uses the web version of the AppAssure Agent Installer to deploy theinstallation components. If access to the internet is not available, you can push the AppAssure Agentinstallation program from the Core machine. You can download core and agent updates from theLicense Portal.Monitoring the deployment of multiple machinesYou can view the progress of the deployment of AppAssure Agent software to the machines.To monitor the deployment of multiple machines:1. From the Core Console, click Events → Alerts.2. Navigate to the AppAssure Core Home tab and then click the Events tab.Alert events appear in the list, showing the time the event initiated and a message. For eachsuccessful deployment of the Agent software, you will see an alert indicating that the protectedmachine has been added.3. Optionally, click on any link for a protected machine.The Summary tab for the selected machine appears, showing pertinent information including:• The host name of the protected machine• The last snapshot, if applicable• The scheduled time of the next snapshot, based on the protection schedule you selected• Time Remaining49