A protection policy consists of snapshot rules, replication rules, and remote backup rules, that you can create to establish consistent data protection across storage resources. After configuring a protection policy, you can assign it to new or existing storage resources.
A protection policy can include one replication rule, one remote backup rule, and up to four snapshot rules. All rule types can be in multiple policies.
Protection policies manage snapshot creation, replication sessions, and remote backup, based on the rules in them. You can create policies with various rules that provide different levels of protection to meet your local and remote protection needs, and assign a policy to multiple storage resources to provide identical protection to those resources.
You can create or modify relevant rules and policies, based on your user privileges.
If you want to create a rule, ensure that you review the parameters and your business requirements with an administrator before proceeding. This helps achieve and maintain consistent policies across the system.
For detailed information about protection policies-related procedures you can perform, see the
Protection Policies chapter.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\