![](https://secure.gravatar.com/avatar/0e6355acaa723d6161f44975b0b0d6ac.png?s=96&d=blank)
Tami activity
21 Articles Written Last Month
9 0 0 2 2 4 15
Firewall ports (inbound) - x360Recover
General Information This article describes inbound firewall ports and public NAT mappings required by x360Recover. Note: It is best practice to place a hardware firewall between the internet and any device that requires inbound connections. Axcient vaults and portals should always be behind a hardware firewall, with inbound connections limited to t...
1 min reading time1. Single sign-on (SSO) via the x360 Portal - x360Recover
Introducing x360Recover Manager (RMC) single sign-on (SSO) via the x360 Portal As an x360Recover partner, you have access to Manager (formerly the Remote Management Console (RMC), a single-pane-of-glass platform for all your x360Recover tools. To further simplify your user experience, Axcient has enabled single sign-on (SSO) access to the RMC in t...
1 min reading timeJan 18 2023 - v.2.29.2 - Release Notes x360Portal
Version Application 2.29.2 When January 18, 2023 Enhancements Updated links and verbiage for Support pages Fixes Repaired loading error on Training page Corrected typos SUPPORT | 720-204-4500 | 800-352-0248 Contact Axcient Support at https://partner.axcient.com/login or call 800-352-0248 Free certification courses are available in the Axcient ...
0 min reading timeAxcient Certification Courses
What are Axcient certification courses? The Axcient certifications program is our set of free, self-paced interactive training courses, offered in the x360Portal. The courses are designed to give you a "jump start" into our Axcient product environments. Each course will walk you through the basics of how to set up and maintain that Axcient product. ...
0 min reading timeBackup for Files - Scenario: Multiple Service Plans with ShadowProtect Standalone
Question: How to approach the configuration of a single server with both volume and file based backups without a BDR appliance? Resources: Existing guide for mixing Select and Basic service plans can be found here: Axcient r - Basic/Select Guide The guide's approach is with respect to archiving somewhat static data at a lower cost rate than more act...
4 min reading timeCreating Alerts for Unreachable File Server Enablement Machines - x360Sync
Overview The Activity Log tab can be used to create alerts so that you are notified when important events occur in the system. Activity alerts are especially useful when monitoring events that can impact an organization or data access. For example, you can create an alert for when a File Server Enablement machine is unreachable for five minutes. Thi...
1 min reading timeISO Terms - x360Recover (Replibit)
Please review these terms. Continue to the bottom of this page for the download links: AXCIENT VAR AND END USER LICENSE AGREEMENT This Software is COVERED BY U.S. Patent Nos. 7,487,383; 8,001,414; 8,176,358; 8,589,350; 8,639,966; 8,886,611; 8,924,360; 8,954,544; 8,990,613; 9,015,520; 9,104,621; 9,146,769; 9,176,823; 9,213,607; 9,235,474; 9,292,1...
17 min reading timeBilling overview - x360Recover
Flexible billing model x360Recover has a flexible billing model, providing several licensing possibilities: Appliance-based license billing: Appliance-based billing allows licenses on a per-device basis, with servers or workstations as end points at different prices. Direct-to-Cloud (D2C) billing: D2C delivers the full-featured backup of traditi...
4 min reading timeDeprovision a protected system - x360Recover
Important: Please be aware that the legacy License Portal for x360Recover (formerly Replibit) described in this article will be deprecated in 2023. For additional details on using the new licensing process, please see Licensing in x360Recover Manager (RMC) ----------------------------------------------------------------------------------------------...
5 min reading time5. Best Practices: Backup and recovery of a failover cluster - x360Recover
[Return to Guide to failover cluster services] To ensure the best experience when recovering data from failover cluster servers, the following optional configuration steps are recommended for your failover cluster nodes. Best Practice #1: Assign drive letters to shared volumes When virtualizing a protected system, protected disk volumes tha...
2 min reading time