This chapter describes additional considerations and procedures specific to protecting VMware infrastructure. See the following topics for details:
• Best practices for protecting VMware virtual machines
• About the Virtualization Protector
• Virtualization Protector requirements
• Working with vCenter and ESX servers
• Setting VM credentials for application-aware protection
• Deleting vCenter and ESX servers
• Grouping VMware virtual machines