Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.13 Security Configuration Guide

PDF

Configuring remote connections

You can configure the Cyber Recovery deployment with remote systems to manage and audit the data flow in the Cyber Recovery vault.

With the Cyber Recovery UI, CLI, and REST API, Admin users can define these supported Cyber Recovery vault assets so that they are represented in the Cyber Recovery environment:
  • The Storage asset is used to define the storage systems, which are DD systems.
  • The Application asset is used to define the:
    • Applications that are installed in the Cyber Recovery vault environment, such as the Avamar, NetWorker, and PowerProtect Data Manager applications.
    • Recovery host to which the backup and application and data are recovered by using applications that are installed in the Cyber Recovery vault environment.
    • Validation host on which scanning and validation is performed by using software that is installed in the Cyber Recovery vault environment, such as the CyberSense software.

See the Dell PowerProtect Cyber Recovery Product Guide for more information about managing supported components.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\