Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

PowerProtect Data Manager 19.11 Cyber Recovery User Guide

Running policies

Run a policy manually at any time so that it performs a specified action or actions.

Steps

  1. Select Policies from the Main Menu.
  2. Click the radio button at the beginning of the row for the policy that you want to run.
  3. Click Actions and select one of the following:
    Table 1. Policy actionsThis table lists and describes the actions that a policy can run.
    Action Description
    Copy Click Copy and click Apply to start the Copy action. The Cyber Recovery software creates a PIT copy of the latest replication.
    NOTE If the automatic retention lock feature is enabled, the Copy action is not available from the Actions drop-down list.
    Copy Lock Retention locks the most recent point-in-time (PIT) copy. To retention lock an earlier PIT copy, see Managing copies.
    Sync Click Sync and click Apply to start the Sync action. The Cyber Recovery software replicates the MTree from the production system to the Cyber Recovery vault. This replication synchronizes with the previous replication of the MTree. Cyber Recovery unlocks the Cyber Recovery vault to perform the replication.
    NOTE When performing a Sync action, there might be a delay of up to 15 minutes, depending on the replication cycle on the production DD system. The Cyber Recovery software itself does not initiate a replication. Instead, it waits for the production DD system to synchronize its data over the replication interface and then validates the timestamp of the replicated data on the Cyber Recovery vault DD system.
    Sync Copy Click Sync Copy and click Apply to start the Sync Copy action. The Cyber Recovery software performs a Sync and then a Copy action.
    NOTE If the automatic retention lock feature is enabled, the Sync Copy action is not available from the Actions drop-down list.
    Secure Copy Click Secure Copy, enter the retention lock duration, and then click Apply to start the Secure Copy action. The Cyber Recovery software performs a Sync, a Copy, and then a Lock action.
    Secure Copy Analyze Click Secure Copy Analyze to start a Sync, Copy, Lock, and then an Analyze action. Enter the retention lock duration and the application nickname for the CyberSense feature. Optionally, use the slider next to Advanced Options to set more options (see Analyzing a copy for information about how to set these options). Click Apply.
    NOTE The Secure Copy Analyze action is available only if the CyberSense application is installed in the Cyber Recovery deployment.

Results

The policy starts a job. A message indicates that the job has started and provides a link to the appropriate Jobs page with the job details.

You cannot choose to run concurrent Sync or Lock actions for a policy. If you run a policy, and then run the same policy with an action that performs either a sync or lock operation, Cyber Recovery displays an informational message and does not create a job. When the initial job is completed, run the policy.

NOTE You can run concurrent Copy actions on a policy.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\