Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 Product Guide

PDF

Cyber Recovery operations

Recovery managers can perform continuous and iterative operations that maintain recovery data in the Cyber Recovery vault if they are needed for restoration. You can perform these operations separately or in combinations. Except for a recovery, you can also schedule operations or trigger them manually as needed.

Table 1. Cyber Recovery operationsThis table lists and describes the operations that you can perform from the CR Vault.
Operation Description
Replication DD MTree replications are performed from the DD production system to the DD system in the Cyber Recovery vault. Each replication uses DD deduplication technology to match the data in the vault incrementally. This document refers to a replication operation as a "Sync."
Copy A point-in-time (PIT) fast copy is made of the most recent replication. If data recovery is required, the copy serves as a PIT restore point. You can maintain multiple PIT copies to ensure an optimal number of restore points. You can mount each copy in a sandbox. The sandbox is a read/write DD fast copy inside the Cyber Recovery vault. A fast copy is a clone of files and directory trees of a PIT copy from the cr-policy-<policy-id>-repo MTree. Data can be scanned for malware or analyzed as needed in the sandbox.
Lock You can secure all files in a PIT copy from modification by retention locking for a specific duration. The Cyber Recovery solution supports the following DD retention locking features:
  • Governance archive data requirements, which are considered lenient and meant to provide relatively short durations as appropriate to achieve your recovery strategy.
  • Compliance archive data requirements, which are stricter than Governance archive data requirements and are recommended to secure against more threats.
  • The automatic retention lock functionality for Retention Lock Governance or Retention Lock Compliance Modes.
NOTE: The Cyber Recovery software does not support the Indefinite Retention Hold capability of Retention Lock Governance or Retention Lock Compliance Modes.
For information about the governance, compliance, and automatic retention lock archive data requirements and how to manage them, see the DD documentation.
Analyze You can analyze locked or unlocked copies with various tools that search for indicators of compromise, suspicious files, or potential malware. These anomalies might identify a copy as an invalid source for recovery.
Recovery You can use the data in a PIT copy to perform a recovery operation.
Recovery Check You can run a scheduled or on-demand recovery check on a PowerProtect Data Manager recovery to provide assurance that after a successful recovery a copy can be recovered.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\