
PowerProtect Data Manager 19.10 Cyber Recovery User Guide
Completing initial setup with the Getting Started wizard
The Getting Started wizard enables you to check your Cyber Recovery deployment, create an Admin user, add storage, and deploy a protection policy quickly.
About this task
Steps
-
Under
Checklist, click
Review to verify that you have performed the required deployment steps.
If you have not satisfied all requirements, log out and complete the deployment steps.
-
Under
Users, click
Add to create an Admin user. Complete the following fields in the
Add User dialog box and click
Save:
Table 1. User fields Field Description Name fields Specify the user's first name and last name. Role Select either: - Admin—Enables users to perform tasks in the Cyber Recovery software.
- Dashboard—Enables users to view the Cyber Recovery dashboard but not perform tasks. The dashboard role does not time out.
User Name (required) Specify a username. Phone Specify the user's telephone number. Email (required) Specify an email address for alert notifications if the user is configured to receive them. NOTE Later, if a user's email is modified, the Security Officer (crso) and the user receive an email message that indicates the change. The user's old email address, which has since been modified, receives the email message.Password/Confirm New Password (required) Specify and confirm the password. Password requirements include: - 9–64 characters
- At least 1 numeric character
- At least 1 uppercase letter
- At least 1 lowercase letter
- At least 1 special character (~!@#$%^&*()+={}|:";<>?[]-_.,^')
Session Timeout Select the amount of idle time after which the user is logged out of the Cyber Recovery UI. -
Under
Vault Storage, click
Add to define the storage object. Complete the following fields in the
Add Vault Storage dialog box and click
Save:
Table 2. Vault storage fields Field Description Nickname Enter a name for the storage object. FQDN or IP Address Specify the DD host by using one of the following: - Fully qualified domain name (FQDN)
- IP address
Storage Username Specify a dedicated Cyber Recovery DD administration account (for example, cradmin), which the Cyber Recovery software uses to perform operations with the DD system. This DD account must have the admin role. Storage Password Enter the password of the DD administrator. SSH Port Number Enter a storage SSH port number. Reset Host Fingerprint (Security Officer only) If you change the FQDN or IP address of the DD host, select to reset the fingerprint. The Cyber Recovery software then sends an alert message. Tags Optionally, add a tag that provides useful information about the storage object. The tag is displayed in the details description for the vault storage in the Assets content pane in the Cyber Recovery UI. Click Add Tag, enter the tag, and then click Add. NOTE If a tag exceeds 24 characters, the details description displays the first 21 characters followed by an ellipsis (...). - Under Policies, click Add to open the Add Policy wizard.
-
On the
Policy Information page, complete the following fields and then click
Next:
Table 3. Policy Information page Field Description Name Specify a policy name. Type From the drop-down list, select PPDM. Storage Select the storage object containing the replication context that the policy will protect. NOTE You cannot edit the storage object for an existing policy.Tags Optionally, add a tag that provides useful information about the policy. The tag is displayed in the details description for the policy in the Policies content pane in the Cyber Recovery UI. Click Add Tag, enter the tag, and then click Add. NOTE If a tag exceeds 24 characters, the details description displays the first 21 characters followed by an ellipsis (...). -
On the
Replication page, complete the following fields and then click
Next:
Table 4. Replication page Field Description Replication Contexts - Under Context, select the MTree replication context to protect and the interface on the storage instance that is configured for replications.
- Under Ethernet Port, select the interface on the storage instance that is configured for replications.
NOTE- There can be only one policy per replication context, except for PowerProtect Data Manager policy types, which support multiple replication contexts.
- Do not select the data or management Ethernet interfaces.
- If your DD system is running a version of DDOS that is earlier than version 7.8 and you select a Retention Lock Compliance replication context, the policy creation fails.
Replication Window Set a timeout value in hours for how long a job for a Sync action runs before Cyber Recovery issues a warning. The default value is 0. Enforce Replication Window If you change the default value in the Replication Window field, the Enforce Replication Window checkbox is displayed. Enable the checkbox to stop a Sync operation that continues to run beyond the replication window limit for that policy. When the replication window limit is exceeded, the operation completes the current DD snapshot replication and does not proceed to replicate queued snapshots. -
On the
Retention page, complete the following fields and then click
Next:
Table 5. Retention page Field Description Retention Lock Type Select one of the following: - (Add Policy dialog box only) None, if retention locking is not supported. The retention fields are then removed from the dialog box.
- Governance if it is enabled on the storage instance.
- (Edit Policy dialog box only) Governance-disabled.
- Compliance if it is enabled on the storage instance.
Enable Auto Retention Lock Optionally, if the retention lock type is Governance or Compliance, click the checkbox to enable the automatic retention lock feature. There is a five-minute delay before the lock is applied. NOTE You cannot disable the automatic retention lock feature after you enable it.Retention Lock Minimum Specify the minimum retention duration that this policy can apply to PIT copies. This value cannot be less than 12 hours. Retention Lock Maximum Specify the maximum retention duration that this policy can apply to PIT copies. This value cannot be greater than 1,827 days. Retention Lock Duration Specify the default retention duration, which is a value between the retention lock minimum and maximum values, that this policy applies to PIT copies. If you selected a Retention Lock Compliance replication context or the Compliance Retention Lock type, the Storage Security Credentials page is displayed. Otherwise, the Summary page is displayed.
-
On the
Storage Security Credentials page, enter the
DD Security Officer (SO) username and password and then click
Next.
NOTE This username was created on the DD system.
-
Review the
Summary page and either:
- Click Finish if you are satisfied with the summary information and want to add the policy.
- Click Back to return to the previous page to change the information.
- Click Edit to return to a specific page in the wizard to change information.
If you selected a Retention Lock Compliance replication context and your deployment is running version of DDOS that is earlier than version 7.8, the Cyber Recovery software fails to create the policy. -
To run the policy immediately, do the following:
- Select Policies in the Main Menu.
- On the Policies content pane, select the policy checkbox. Then click Actions and select the action that you want the policy to perform.
Cyber Recovery runs the policy and displays progress messages on the Jobs content pane and the dashboard. - To recall the wizard at any time, select System Settings > Getting Started from the Masthead Navigation.
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\