
PowerProtect Data Manager 19.10 Cyber Recovery User Guide
Cyber Recovery operations
Recovery managers can perform continuous and iterative operations that maintain recovery data in the Cyber Recovery vault if they are needed for restoration. You can perform these operations separately or in combinations. Except for a recovery, you can also schedule operations or trigger them manually as needed.
| Operation | Description |
|---|---|
| Replication | DD MTree replications are performed from the DD production system to the DD system in the Cyber Recovery vault. Each replication uses DD deduplication technology to match the data in the vault incrementally. This document refers to a replication operation as a "Sync." |
| Copy | A point-in-time (PIT) fast copy is made of the most recent replication. If data recovery is required, the copy serves as a PIT restore point. You can maintain multiple PIT copies to ensure an optimal number of restore points. You can mount each copy in a sandbox. The sandbox is a read/write DD fast copy inside the Cyber Recovery vault. A fast copy is a clone of files and directory trees of a PIT copy from the cr-policy-<policy-id>-repo MTree. Data can be scanned for malware or analyzed as needed in the sandbox. |
| Lock | You can secure all files in a PIT copy from modification by retention locking for a specific duration. The
Cyber Recovery solution supports the following
DD retention locking features:
NOTE
For information about the governance, compliance, and automatic retention lock archive data requirements and how to manage them, see the
DD documentation.
|
| Analyze | You can analyze locked or unlocked copies with various tools that search for indicators of compromise, suspicious files, or potential malware. These anomalies might identify a copy as an invalid source for recovery. |
| Recovery | You can use the data in a PIT copy to perform a recovery operation. |
| Recovery Check | You can run a scheduled or on-demand recovery check on a PowerProtect Data Manager recovery to provide assurance that after a successful recovery a copy can be recovered. |
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\