The
Cyber Recovery solution secures data by using policies and copies.
Policies
The
Cyber Recovery solution uses policies to perform replications, create point-in-time (PIT) copies, set retention locks, and create sandboxes. Note the following details about
Cyber Recovery policies:
A
Cyber Recovery policy can govern one or more
DDMTrees. Only a
PowerProtect Data Manager policy type can govern more than one
MTree.
You can create, modify, and delete policies.
When you run a policy, you can perform a single action or carry out multiple actions in sequence. For example, you can run a policy so that it only performs a replication. Or, you can run the same policy so that it performs a replication, creates a PIT copy, and then retention locks the copy.
You cannot run concurrent Sync or Lock actions for a policy.
Copies
Copies are the PIT
MTree copies that serve as restore points that you can use to perform recovery operations. In the
Cyber Recovery UI, you can retention lock a copy or analyze its data to detect the presence of malware or other anomalies. You can also delete unlocked copies.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\