The first time protection is added for a machine, a base image (which is a snapshot of all the data inthe protected volumes) immediately begins to transfer to the repository on the Core, unless youspecified to initially pause protection.CAUTION: If you protected a Linux machine, you must not unmount a protected volumemanually. In the event you need to do this, you must execute the following command beforeunmounting the volume: bsctl -d [path_to_volume]. In this command, [path_to_volume]does not refer to the mount point of the volume but instead refers to the file descriptor ofthe volume; it must be in a form similar to this example: /dev/sda1.Deploying the agent software when protecting an agentYou can download and deploy agents during the process of adding an agent for protection.NOTE: This procedure is not required if you have already installed the Agent software on a machinethat you want to protect.To deploy agents during the process of adding an agent for protection:1. From the Protect Machine → Connect dialog box, after entering the appropriate connectionsettings, click Connect.The Deploy Agent dialog box is displayed.2. Click Yes to deploy the Agent software remotely to the machine.The Deploy Agent dialog box is displayed.3. Enter logon and protection settings as follows:• Host name — Specifies the host name or IP address of the machine that you want to protect.• Port — Specifies the port number on which the Core communications with the Agent on themachine. The default value is 8006.• User name — Specifies the user name used to connect to this machine; for example,administrator.• Password — Specifies the password used to connect to this machine.• Display name — Specifies a name for the machine which appears on the Core Console. Thedisplay name could be the same value as the host name.• Protect machine after install — Selecting this option enables AppAssure to take a base snapshotof the data after you add the machine for protection. This option is selected by default. If youdeselect this option, then you must force a snapshot manually when you are ready to start dataprotection. For more information about manually forcing a snapshot, see topic 'Forcing ASnapshot' in Dell DL4000 Appliance User’s Guide.• Repository — Select the repository in which to store data from this agent.NOTE: You can store data from multiple agents in a single repository.• Encryption Key — Specifies whether encryption should be applied to the data for every volumeon this machine to be stored in the repository.NOTE: You define encryption settings for a repository under the Configuration tab in theCore Console.4. Click Deploy.The Deploy Agent dialog box closes. There may be a delay before you see the selected agent appearin the list of protected machines.94