This stage is all about configuring the Inventory Mappings. This includes resource mappings, folder mappings, network mappings and placeholder datastores. This is basically linking the resources being used at the protected site with the resources to be used at the… Continue Reading
↧