Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.15 Product Guide

PDF

Managing policy schedules

Schedule an action that you want the policy to perform.

Prerequisites

  • You are logged in as the admin user.
  • Be aware that the policy action that you want to perform might have prerequisites. For example, a point-in-time (PIT) copy must exist if you want to perform an Analyze action.

About this task

You can create multiple schedules for the same policy. However, you cannot create multiple schedules for a policy that run simultaneously. Each schedule specifies the action that the policy performs.

Steps

  1. Select Policies from the Main Menu.
  2. In the Policies content pane, click Schedules.
  3. Do one of the following:
    1. To create a schedule, click Add to open the Add Schedule wizard.
    2. To modify a schedule, select a schedule and click Edit to open the Edit Schedule wizard.
      The Summary page is displayed. Click Edit or Back to go to the wizard page that you want to update.
  4. On the Schedule Information page, complete the following fields and then click Next:
    Table 1. Schedule Information pageThe following table provides the fields in the Schedule Information page.
    Field Description
    Schedule Name Specify a schedule name.
    Policy (when adding a policy only) Select the policy that you are scheduling.
    Action Select the action that the policy performs when it runs under this schedule. See Running Policies for a description of the actions.
    NOTE:If you select Secure Copy Analyze or Analyze, the wizard displays the Analyze Options step on the left menu.
    Retention Lock Duration Only if you selected Secure Copy Analyze, Secure Copy, or Copy Lock as the action, enter the duration of the retention lock that this policy applies to PIT copies.
    Application Host Only if you selected:
    • Secure Copy Analyze or Analyze, select the CyberSense host
    • Recovery Check, select the PowerProtect Data Manager host
    NOTE:If the deployment is using CyberSense version 8.2 or later, the drop-down list only lists the version 8.2 CyberSense hosts that have a multilink configuration defined for the storage used by the policy to be analyzed.
  5. On the Scheduling page, complete the following fields and then click Next:
    Table 2. Scheduling pageThe following table provides the fields in the Scheduling page.
    Field Description
    Frequency Enter the frequency in days and hours.
    Next Run Date Select the date and time to start running the policy under this schedule.
    NOTE:The Cyber Recovery UI uses the same time zone as the Cyber Recovery management host for the scheduled time.
  6. If you selected the Secure Copy Analyze or Analyze action, optionally complete the following fields on the Analyze Options page and then click Next:
    Table 3. Analyze Options pageThe following table provides the fields in the Analyze options page.
    Field Description
    Content Format The type of application or protocol used to perform backups. Select either:
    • Filesystem—For backups performed without backup software and by using NFS, CIFS, BoostFS, and so on
    • Databases—For database client-direct backups to the DD system using DD Boost for Enterprise Applications, DD Boost for Microsoft Applications, and so on
    • Backup—For backups performed by using backup applications such as NetWorker, Avamar, PowerProtect Data Manager, and so on.
    This information is included as part of the CyberSense report for informational purposes.
    Storage Data Interface (if running CyberSense versions earlier than 8.2) The network storage interface through which the CyberSense feature connects to storage.
    NOTE:If you are running CyberSense version 8.2 or later, this field is not displayed.
    Files/Directories to Include Enter the names of files and directories on the DD MTree to include in the Analyze action. Either:
    • Type the file and directory names, each on a separate line.
    • Click Choose File to select a file that contains a list of the files and directories (one per line) to include. This file is on the host on which the Cyber Recovery UI is running. Files must be text (.txt) files. This option overwrites the content in the text box with the content in the file.
    Files/Directories to Exclude Enter the names of files and directories on the DD MTree that the Analyze action must ignore. Either:
    • Type the file and directory names, each on a separate line.
    • Click Choose File to select a file that contains a list of the files and directories (one per line) to exclude. This file is on the host on which the Cyber Recovery UI is running. Files must be text (.txt) files. This option overwrites the content in the text box with the content in the file.
    NOTE:For Avamar policies, analyze actions are meant for the cur/ directories only. There might be a significant amount of data in the GSAN, STAGING, DELETED, VALIDATED, and VMDS directories; do not analyze these directories and ensure that you exclude them.
  7. Review the Summary page and either:
    • Click Back to return to the previous page to change the information.
    • Click Edit to return to a specific page in the wizard to change information.
    • Click Finish if you are satisfied with the summary information and want to add the schedule.

    The Policies page is displayed and includes the new or updated schedule. By default, the schedule is enabled.

    You cannot create or update a schedule if it will overlap an existing enabled schedule for the same policy. An error message notifies you of the failure and when the overlap will occur.

    NOTE: For a policy schedule that is disabled before you update to version 19.15, the software checks if it overlaps with an existing enabled policy schedule for the same policy. If you cannot enable the policy schedule, we recommend that you to delete and then re-create the policy schedule.
  8. Disable or enable a schedule:
    1. To disable a schedule so that it does not run, swipe left on the slider under Enabled. An informational message confirms that the schedule has been disabled and the Edit button is inactive. Also, an event is created.
    2. To sort schedules by status, click Enabled.
    3. To filter on status, click Icon with an image of funnel, which represnts a filter. and then click the Enabled or Disabled checkbox. Only the schedules with the selected status are displayed. If you select both checkboxes, all schedules are displayed.
    4. To reenable a schedule, swipe right on the slider under Enabled. An informational message confirms that the schedule has been reenabled and the Edit button is active. Also, an event is created.
  9. To customize the columns in the table that lists the policies, click Icon with an image of a gear. and select the columns to show or hide.
  10. Click a schedule's row to open the details pane and view additional details about the schedule, and then:
    1. Click Icon with a right-facing arrow that closes the details pane to close the details pane.
    2. Click Icon with a left-facing arrow that opens the details pane to open the details pane again.
  11. Delete a schedule:
    1. Select an enabled or disabled schedule.
    2. Click Delete.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\