You are here: Verification > Verify applications on the target

Verify applications on the target

The application verification process confirms that an Exchange or SQL application database on the target is viable for failover.

 

Note:  The application verification process can only be performed on active connections that are in a good state and are not failed over.

 

  1. Verify that you have installed the Volume Shadow Copy Service SDK.
  2. Verify that your current volumes have adequate space to contain snapshots of your target. These snapshots will be used to revert the target back to its pre-test state after you have completed your application verification.
  3. Disable target path blocking for your application protection connection.
  4. If you are verifying Exchange and you are running the Application Manager from a machine other than the source or target, you must install Exchange System Manager on that machine.
  5. From the Application Manager, select Actions, Verify Target Data.
  6. There are four main sections of the Database Verification window.
  7. Click Test to begin the application verification. The Status, Results, and History will update during the test. When the Status is Target online, the verification is complete. You can perform any custom testing at this time.
  8. If you have any problems during the test, click Undo to revert the target to its pre-test state. All snapshots and items created for the verification test will be removed. If you do not have Volume Shadow Copy installed, the snapshots used during the test will not be removed.
  9. When you have completed any custom testing, click Continue to revert back to the pre-test state. All snapshots and items created for the verification test will be removed. If you do not have Volume Shadow Copy installed, the snapshots used during the test will not be removed.

Related Topics