Recovery managers can perform continuous and iterative operations that maintain recovery data in the
Cyber Recovery vault if they are needed for restoration. You can perform these operations separately or in combinations. Except for a recovery, you can also schedule operations or trigger them manually as needed.
Table 1. Cyber Recovery operationsThis table lists and describes the operations that you can perform from the CR Vault.
Operation
Description
Replication
DDMTree replications are performed from the
DD production system to the
DD system in the
Cyber Recovery vault. Each replication uses
DD deduplication technology to match the data in the vault incrementally. This document refers to a replication operation as a "Sync."
Copy
A point-in-time (PIT) fast copy is made of the most recent replication. If data recovery is required, the copy serves as a PIT restore point. You can maintain multiple PIT copies to ensure an optimal number of restore points. You can mount each copy in a sandbox. The sandbox is a read/write
DD fast copy inside the
Cyber Recovery vault. A fast copy is a clone of files and directory trees of a PIT copy from the
cr-policy-<policy-id>-repoMTree. Data can be scanned for malware or analyzed as needed in the sandbox.
Lock
You can secure all files in a PIT copy from modification by retention locking for a specific duration. The
Cyber Recovery solution supports the following
DD retention locking features:
Governance archive data requirements, which are considered lenient and meant to provide relatively short durations as appropriate to achieve your recovery strategy.
Compliance archive data requirements, which are stricter than Governance archive data requirements and are recommended to secure against more threats.
The automatic retention lock functionality for Retention Lock Governance or Retention Lock Compliance Modes.
NOTE
The
Cyber Recovery software does not support the Indefinite Retention Hold capability of Retention Lock Governance or Retention Lock Compliance Modes.
The
Cyber Recovery solution on
Amazon Web Services (AWS) does not support Retention Lock Compliance mode.
For information about the governance, compliance, and automatic retention lock archive data requirements and how to manage them, see the
DD documentation.
Analyze
You can analyze locked or unlocked copies with various tools that search for indicators of compromise, suspicious files, or potential malware. These anomalies might identify a copy as an invalid source for recovery.
Recovery
You can use the data in a PIT copy to perform a recovery operation.
Recovery Check
You can run a scheduled or on-demand recovery check on a
PowerProtect Data Manager recovery to provide assurance that after a successful recovery a copy can be recovered.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\