Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 Product Guide

PDF

Running policies

Run a policy manually at any time so that it performs a specified action or actions.

Prerequisites

You are logged in as the admin user.

Steps

  1. Select Policies from the Main Menu.
  2. Click the radio button at the beginning of the row for the policy that you want to run.
  3. Click Actions and select one of the following:
    Table 1. Policy actionsThis table lists and describes the actions that a policy can run.
    Action Description
    Copy Click Copy and click Apply to start the Copy action. The Cyber Recovery software creates a PIT copy of the latest replication.
    NOTE: If the automatic retention lock feature is enabled, the Copy action is not available from the Actions drop-down list.
    Copy Lock Click Copy Lock and click Apply to create a point-in-time (PIT) copy and then retention lock it. To retention lock an earlier PIT copy, see Managing copies.
    Sync Click Sync and click Apply to start the Sync action. The Cyber Recovery software replicates the MTree from the production system to the Cyber Recovery vault. This replication synchronizes with the previous replication of the MTree. Cyber Recovery unlocks the Cyber Recovery vault to perform the replication.
    NOTE:When performing a Sync action, there might be a delay of up to 15 minutes, depending on the replication cycle on the production DD system. The Cyber Recovery software itself does not initiate a replication. Instead, it waits for the production DD system to synchronize its data over the replication interface and then validates the timestamp of the replicated data on the Cyber Recovery vault DD system.
    Sync Copy Click Sync Copy and click Apply to start the Sync Copy action. The Cyber Recovery software performs a Sync and then a Copy action.
    NOTE: If the automatic retention lock feature is enabled, the Sync Copy action is not available from the Actions drop-down list.
    Secure Copy Click Secure Copy, enter the retention lock duration, and then click Apply to start the Secure Copy action. The Cyber Recovery software performs a Sync, a Copy, and then a Lock action.
    Secure Copy Analyze Click Secure Copy Analyze to start a Sync, Copy, Lock, and then an Analyze action. Enter the retention lock duration and the application nickname for the CyberSense feature. Optionally, use the slider next to Advanced Options to set more options (see Analyzing a copy for information about how to set these options). Click Apply.
    NOTE:
    • The Secure Copy Analyze action is available only if the CyberSense application is installed in the Cyber Recovery deployment.
    • If the deployment is using CyberSense version 8.2 or later and a multilink configuration is defined for the storage used by the policy to be analyzed, the drop-down list only lists the version 8.2 CyberSense host.
  4. To view copies that are associated with policy, click the number under # Copies.
    The number of copies that are associated with the selected policy are displayed in the Copies page.
    NOTE:You can view associated copies for enabled or disabled policies.

Results

The policy starts a job. A message indicates that the job has started and provides a link to the appropriate Jobs page with the job details.

You cannot choose to run concurrent Sync or Lock actions for a policy. If you run a policy, and then run the same policy with an action that performs either a sync or lock operation, Cyber Recovery displays an informational message and does not create a job. When the initial job is completed, run the policy.

NOTE: You can run concurrent Copy actions on a policy.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\