Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.13 Product Guide

PDF

Adding and editing policy schedules

Schedule an action that you want the policy to perform.

Prerequisites

The policy action that you want to perform might have prerequisites. For example, a point-in-time (PIT) copy must exist if you want to perform an Analyze action.

About this task

You can create multiple schedules for the same policy. However, you cannot create multiple schedules for a policy that run simultaneously. Each schedule specifies the action that the policy performs.

Steps

  1. Select Policies from the Main Menu.
  2. In the Policies content pane, click Schedules.
  3. Do one of the following:
    1. To create a schedule, click Add to open the Add Schedule wizard.
    2. To modify a schedule, select a schedule and click Edit to open the Edit Schedule wizard.
      The Summary page is displayed. Click Edit or Back to go to the wizard page that you want to update.
  4. On the Schedule Information page, complete the following fields and then click Next:
    Table 1. Schedule Information page
    Field Description
    Schedule Name Specify a schedule name.
    Policy (when adding a policy only) Select the policy that you are scheduling.
    Action Select the action that the policy performs when it runs under this schedule. See Running Policies for a description of the actions.
    NOTE:If you select Secure Copy Analyze or Analyze, the wizard displays the Analyze Options step on the left menu.
    Retention Lock Duration Only if you selected Secure Copy Analyze, Secure Copy, or Copy Lock as the action, enter the duration of the retention lock that this policy applies to PIT copies.
    Application Host Only if you selected:
    • Secure Copy Analyze or Analyze, select the CyberSense host
    • Recovery Check, select the PowerProtect Data Manager host
    NOTE:If the deployment is using CyberSense version 8.2 or later and a multilink configuration is defined for the storage used by the policy to be analyzed, the drop-down list only lists the version 8.2 CyberSense host.
  5. On the Scheduling page, complete the following fields and then click Next:
    Table 2. Scheduling page
    Field Description
    Frequency Enter the frequency in days and hours.
    Next Run Date Select the date and time to start running the policy under this schedule.
    NOTE:The Cyber Recovery UI uses the same time zone as the Cyber Recovery management host for the scheduled time.
  6. If you selected the Secure Copy Analyze or Analyze action, optionally complete the following fields on the Analyze Options page and then click Next:
    Table 3. Analyze Options page
    Field Description
    Content Format The type of application or protocol used to perform backups. Select either:
    • Filesystem—For backups performed without backup software and by using NFS, CIFS, BoostFS, and so on
    • Databases—For database client-direct backups to the DD system using DD Boost for Enterprise Applications, DD Boost for Microsoft Applications, and so on
    • Backup—For backups performed by using backup applications such as NetWorker, Avamar, PowerProtect Data Manager, and so on.
    This information is included as part of the CyberSense report for informational purposes.
    Storage Data Interface (if running CyberSense versions earlier than 8.2) The network storage interface through which the CyberSense feature connects to storage.
    NOTE:If you are running CyberSense version 8.2 or later, this field is not displayed.
    Files/Directories to Include Enter text files and directories on which you want the Analyze action to run. Either:
    • Type the file and directory names, each on a separate line.
    • Click Choose File to select a file that contains a list of the files and directories (one per line) to include. This file is on the host on which the Cyber Recovery UI is running. Files must be text (.txt) files. This option overwrites the content in the text box with the content in the file.
    Files/Directories to Exclude Enter text files and directories that you want the Analyze action to ignore. Either:
    • Type the file and directory names, each on a separate line.
    • Click Choose File to select a file that contains a list of the files and directories (one per line) to exclude. This file is on the host on which the Cyber Recovery UI is running. Files must be text (.txt) files. This option overwrites the content in the text box with the content in the file.
  7. Review the Summary page and either:
    • Click Finish if you are satisfied with the summary information and want to add the schedule.
    • Click Back to return to the previous page to change the information.
    • Click Edit to return to a specific page in the wizard to change information.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\