Run a policy manually at any time so that it performs a specified action or actions.
Steps
Select
Policies from the
Main Menu.
Click the radio button at the beginning of the row for the policy that you want to run.
Click
Actions and select one of the following:
Table 1. Policy actionsThis table lists and describes the actions that a policy can run.
Action
Description
Copy
Click
Copy and click
Apply to start the Copy action. The
Cyber Recovery software creates a PIT copy of the latest replication.
NOTE: If the automatic retention lock feature is enabled, the Copy action is not available from the
Actions drop-down list.
Copy Lock
Click
Copy Lock and click
Apply to create a point-in-time (PIT) copy and then retention lock it. To retention lock an earlier PIT copy, see
Managing copies.
Sync
Click
Sync and click
Apply to start the Sync action. The
Cyber Recovery software replicates the
MTree from the production system to the
Cyber Recovery vault. This replication synchronizes with the previous replication of the
MTree.
Cyber Recovery unlocks the
Cyber Recovery vault to perform the replication.
NOTE: When performing a Sync action, there might be a delay of up to 15 minutes, depending on the replication cycle on the production
DD system. The
Cyber Recovery software itself does not initiate a replication. Instead, it waits for the production
DD system to synchronize its data over the replication interface and then validates the timestamp of the replicated data on the
Cyber Recovery vaultDD system.
Sync Copy
Click
Sync Copy and click
Apply to start the Sync Copy action. The
Cyber Recovery software performs a Sync and then a Copy action.
NOTE: If the automatic retention lock feature is enabled, the Sync Copy action is not available from the
Actions drop-down list.
Secure Copy
Click
Secure Copy, enter the retention lock duration, and then click
Apply to start the Secure Copy action. The
Cyber Recovery software performs a Sync, a Copy, and then a Lock action.
Secure Copy Analyze
Click
Secure Copy Analyze to start a Sync, Copy, Lock, and then an Analyze action. Enter the retention lock duration and the application nickname for the CyberSense feature. Optionally, use the slider next to
Advanced Options to set more options (see
Analyzing a copy for information about how to set these options). Click
Apply.
NOTE:
The Secure Copy Analyze action is available only if the CyberSense application is installed in the
Cyber Recovery deployment.
If the deployment is using CyberSense version 8.2 or later and a multilink configuration is defined for the storage used by the policy to be analyzed, the drop-down list only lists the version 8.2 CyberSense host.
Results
The policy starts a job. A message indicates that the job has started and provides a link to the appropriate Jobs page with the job details.
You cannot choose to run concurrent Sync or Lock actions for a policy. If you run a policy, and then run the same policy with an action that performs either a sync or lock operation,
Cyber Recovery displays an informational message and does not create a job. When the initial job is completed, run the policy.
NOTE: You can run concurrent Copy actions on a policy.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\