
Tami activity
5 Articles Written Last Month
0 0 28 32 0 36 3
Restore files and folders with D2C Recovery Center
What is Recovery Center? Recovery Center is a companion recovery platform for Direct-to-Cloud (D2C ) protected systems. It is a stand-alone application that allows you to perform file and folder recovery, virtual disk exports, and Hyper-V virtualization of protected systems.[ Complete details on Recovery Center ] Delete Where do I download Rec...
4 min reading timeAutoVerify Troubleshooting Guide - x360Recover BDR
Overview AutoVerify is a method of validating and testing the integrity and recoverability of protected systems released with x360Recover version 8.3.0. [Learn more about AutoVerify: ] With AutoVerify, each nightly Boot VM check performs a series of deep system integrity checks within the running virtual machine, to ensure that the protected syst...
4 min reading timeBackup for Files - How do I bill my customers?
Overview You will receive an invoice from Axcient that charges you, the partner, based on the amount of online backup storage, local-only backup devices, and email archiving mailboxes you have. (The exact price is listed in your partner contract.) In addition to your invoice from Axcient , monthly billing reports are available to you in the partner ...
3 min reading timeHow do I create backups? - x360Sync
Overview x360Sync allows administrators and end users to back up personal files and folders that exist on registered Windows and Mac machines. A backup is a root and is functionally the same as Synced Folder. Making a backup refers to the copying and archiving of your data so it may be used to restore the original when data is lost. Use Cases The ...
3 min reading timeUsers in Manager (RMC)
In October 2023, we consolidated several services and tasks within x360Recover Manager. This means you now manage your x360Recover users directly within x360Recover Manager , if you prefer (versus managing all users within the x360Portal. ) NOTE on direct user logins: x360Recover Manager is accessed at my.axcient.net for direct user logins. How ...
4 min reading timeVirtual Office FAQs
What is Virtual Office? The cloud failover feature in x360Recover allows you to start virtual machines in the Axcient Cloud of one or more protected devices. You can then create a Virtual Office running within the Axcient data center, using matching existing server configurations. Virtual Office lets you self-manage using a secure, web-based applic...
0 min reading timeVirtual Office FAQs and best practices
an Overview Axcient's Virtual Office is a powerful tool, designed to provide business continuity for your clients, but it can present a complicated environment to configure and manage. What is Virtual Office? The cloud failover feature in x360Recover allows you to start virtual machines in the Axcient Cloud of one or more protected devices. You can...
5 min reading timeSupported configurations - x360Recover
The following information is designed to help you make decisions - before you begin working with x360Recover. SUPPORTED CONFIGURATIONS UNSUPPORTED CONFIGURATIONS Supported Windows protected system configurations Minimum hardware recommendations Firewall ports (inbound) Firewall ports (outbound) Appliance requirements Vault requirements Supported ...
14 min reading timeCannot access vault or appliance from x360Recover Manager
Problem On rare occasions, you may encounter an error like this when you are trying to connect to an appliance or vault from within x360Recover Manager: Your secure tunnel session has expired Symptom Resolve this issue This may be caused by invalid cached data within your web browser. If you experience this issue, try the following steps to resol...
0 min reading timeSchedule an immediate backup of a protected system- x360Recover BDR
To schedule an immediate backup of a protected system: 1. In the left navigation, open the Protected Systems tab. You will see a list of the systems currently being backed up and protected by the appliance. 2. Click the appropriate System Name to open a detailed page on that system. 3. In the Protected Systems Details page, click the Schedule Now ...
0 min reading time