• IntelliSnap Overview
  • Advantages of IntelliSnap for Virtual Machine Protection
  • Assign Virtual Machines to Tiers Based on Service Level Agreements (SLAs)
  • Protection Methods
  • Best Practices for Implementing Virtual Machine Protection
  • Scheduling Considerations and Examples
  • ESX Proxy Sizing (SAN Only)
  • IntelliSnap User Permission Requirements
  • Snapshot Engine Requirements
  • IntelliSnap Configuration
  • IntelliSnap Backup Operations
  • Restore Operations
  • IntelliSnap Considerations