Optionally, deploy the CyberSense software, which is a third-party tool that validates and analyzes point-in-time copies for the presence of malware or other anomalies. A report provides indication of compromise. To use CyberSense, you must have a valid CyberSense license.
The CyberSense software must be installed at the same location as the
Cyber Recovery vault.
NOTE:
CyberSense is only supported as a component of the
Cyber Recovery solution in the vault; it is not supported on the production system.
CyberSense is not supported if the
Cyber Recovery solution is deployed on
Microsoft Azure or
Google Cloud Platform.
Requirements include:
A valid CyberSense license. Contact your Dell Technologies sales representative to obtain a CyberSense license. You will be provided with access and instructions.
A dedicated host running CentOS, SUSE Linux Enterprise Server, or Red Hat Enterprise Linux, on which CyberSense is installed, that acts as the validation host. The validation host provides direct integration between the
Cyber Recovery software and CyberSense.
NOTE: You can also deploy the CyberSense virtual appliance (OVA) in the
Cyber Recovery vault or in an ESXi environment.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\