Protecting an application – HP Storage Mirroring Software User Manual
Page 212

Workload protection
Page 211 of 677
Protecting an application
1.
2. Verify the Setup tab is selected and then from the Tasks list on the left pane,
select the type of application you want to protect.
Note: The fields in the Application Manager console will vary depending on the
type of application you are protecting.
3. Application Manager will automatically identify the root domain where the
Application Manager is running and populate the Domain Name field. If
necessary, change the domain name to a trusted root domain that the Application
Manager console can connect to. If prompted, enter security credentials with
administrator privileges for the domain.
Note: Domain names must include a suffix, such as .com, .corp, .net, and so on.
Exchange Note: If you are protecting Exchange, the domain must be the root of
the forest domain because that is where all Exchange server
objects reside, even if the Exchange server is a member of a
child domain.
4. Application Manager will automatically attempt to populate the Source Server and
Target Server lists with any servers in the specified domain that are running the
application you are protecting. Select your source and target servers.