Optionally, deploy the
CyberSense feature, which is a third-party tool that validates and analyzes point-in-time copies for the presence of malware or other anomalies. A report provides indication of compromise. To use the
CyberSense feature, you must have a valid license.
CyberSense feature must be installed at the same location as the
Cyber Recovery vault.
NOTE
The
CyberSense feature is only supported as a component of the
Cyber Recovery solution in the vault; it is not supported on the production system.
The
CyberSense feature is not supported if the
Cyber Recovery solution is deployed on
Amazon Web Services (AWS) or
Microsoft Azure.
Requirements include:
A valid
CyberSense feature license. Contact your Dell Technologies sales representative to obtain a
CyberSense feature license. You will be provided with access and instructions.
A dedicated host running CentOS or Red Hat Enterprise Linux, on which the
CyberSense feature is installed, that acts as the validation host. The validation host provides direct integration between the
Cyber Recovery software and the
CyberSense feature.
NOTE You can also install the
CyberSense feature in an ESXi environment.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\