Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 Product Guide

PDF

Policies and copies overview

The Cyber Recovery solution secures data by using policies and copies.

Policies
The Cyber Recovery solution uses policies to perform replications, create point-in-time (PIT) copies, set retention locks, and create sandboxes. Note the following details about Cyber Recovery policies:
  • A Cyber Recovery policy can govern one or more DD MTrees. Only a PowerProtect Data Manager policy type can govern more than one MTree.
  • You can create, modify, and delete policies.
  • When you run a policy, you can perform a single action or carry out multiple actions in sequence. For example, you can run a policy so that it only performs a replication. Or, you can run the same policy so that it performs a replication, creates a PIT copy, and then retention locks the copy.
  • You cannot run concurrent Sync or Lock actions for a policy.
Copies
Copies are the PIT MTree copies that serve as restore points that you can use to perform recovery operations. In the Cyber Recovery UI, you can retention lock a copy or analyze its data to detect the presence of malware or other anomalies. You can also delete unlocked copies.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\