Figure 13 Security Tab Dialog

4.Under Group or user names, choose Administrators.

5.Under Permissions for Administrators, grant Full control.

6.Click OK.

You can now proceed with the installation if RMV is not previously installed onto the system.

For a system with RMV previously installed, complete the following steps before proceeding with the installation:

1.Click Start, type mmc in the Search programs and files box, and press Enter.

2.On the File menu, click Add/Remove Snap-in.

3.Under Available snap-ins, double-click Certificates.

4.Select Computer account and click Next.

5.Click Local computer and click Finish.

6.Click Ok.

7.From the left pane, navigate to Console RootCertificates (Local Computer)PersonalCertificates.

8.Delete 3PAR Plug-in.

Installing HP 3PAR Management Plug-in and Recovery Manager Software for VMware vSphere

HP 3PAR Management Plug-in and Recovery Manager Software for VMware vSphere is supported in Windows 2008, and Windows 2008 R2. Both x86 and x64 are supported. The installation package provides the following:

RMVMware_x86.msi

RMVMware_x64.msi

To install HP 3PAR Management Plug-in and Recovery Manager Software for VMware vSphere, perform the following:

26 Installing, Registering, and Uninstalling HP 3PAR Management Plug-in and Recovery Manager Software for VMware vSphere

Page 26
Image 26
HP Recovery Manager Software for VMware vSphere manual RMVMwarex86.msi RMVMwarex64.msi

Recovery Manager Software for VMware vSphere specifications

HP Recovery Manager Software for VMware vSphere is a powerful tool designed to enhance the data recovery process for virtualized environments. It provides enterprises with a reliable solution to protect critical workloads and ensure business continuity, particularly in environments that leverage VMware's virtualization technology.

One of the main features of HP Recovery Manager is its seamless integration with VMware vSphere. The software utilizes VMware’s vSphere Storage APIs, enabling users to perform efficient backups and streamline disaster recovery processes. This integration allows for quiesced snapshots, which ensure data consistency during the backup process by momentarily pausing applications, thereby capturing a reliable state of the data.

Another significant characteristic of HP Recovery Manager is its ability to perform rapid, point-in-time recovery. This functionality is crucial for minimizing downtime after data loss incidents. Organizations can restore entire virtual machines, specific files, or applications quickly, allowing businesses to resume operations without lengthy interruptions.

Management is simplified through a user-friendly interface, which helps administrators monitor and manage backup tasks from a central dashboard. This centralized approach reduces the complexity often associated with managing multiple backup solutions in a virtual environment. Additionally, HP Recovery Manager supports automation features, where users can schedule regular backups, thus ensuring that the most current data is always protected without requiring constant manual intervention.

The software employs advanced technologies such as deduplication, which reduces the amount of storage space required for backups by eliminating duplicate data. This feature not only optimizes disk usage but also enhances overall backup performance by allowing faster backup times.

Furthermore, HP Recovery Manager provides robust reporting and analytics capabilities. Users can generate detailed reports on backup and recovery operations, allowing for better compliance and auditing. These insights aid in capacity planning and performance tuning, ensuring that the backup infrastructure remains efficient and effective.

In summary, HP Recovery Manager Software for VMware vSphere offers a comprehensive suite of features that provide a highly effective solution for data recovery in virtualized environments. Its integration with vSphere, rapid recovery capabilities, user-friendly management, storage optimization through deduplication, and robust reporting functionalities make it a valuable asset for organizations looking to protect their critical data and ensure business continuity.