NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
 - Monitoring and notifications
 - Section I. Configuring hosts
 - Section II. Configuring storage and backups
- Configuring storage
- About storage configuration
 - Create a Media Server Deduplication Pool (MSDP) storage server
 - Create a Cloud storage, OpenStorage, or AdvancedDisk storage server
 - Create a disk pool
 - Create a storage unit
 - Create a universal share
 - Using image sharing from the NetBackup web UI
 - Troubleshooting storage configuration
 - Troubleshooting universal share configuration issues
 - Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
 
 - Managing protection plans
 - Managing classic policies
 - Managing backup images
 
 - Configuring storage
 - Section III. Managing credentials
- Managing credentials for workloads and systems that NetBackup accesses
- About credential management in NetBackup
 - Add a credential in NetBackup
 - Add a credential for an external KMS
 - Add a credential for NetBackup Callhome Proxy
 - Edit or delete a named credential
 - Add a credential for Network Data Management Protocol (NDMP)
 - Edit or delete Network Data Management Protocol (NDMP) credentials in NetBackup
 
 
 - Managing credentials for workloads and systems that NetBackup accesses
 - Section IV. Managing security
- Security events and audit logs
 - Managing security certificates
 - Managing host mappings
 - Managing user sessions
 - Managing the security settings for the primary server
- Certificate authority for secure communication
 - Disable communication with NetBackup 8.0 and earlier hosts
 - Disable automatic mapping of NetBackup host names
 - Configure the global data-in-transit encryption setting
 - About NetBackup certificate deployment security levels
 - Select a security level for NetBackup certificate deployment
 - Set a passphrase for disaster recovery
 - About trusted primary servers
 
 - Access keys
 - Configuring authentication options
 
 - Section V. Managing role-based access control
- About role-based access control in NetBackup
 - Configuring RBAC roles
- Configuring RBAC
- Notes for using NetBackup RBAC
 - Add AD or LDAP domains
 - Add a custom RBAC role
 - Edit or remove a role a custom role
 - View users in RBAC
 - Add a user to a role (non-SAML)
 - Add a user to a role (non-SAML, smart card user without AD or LDAP domain association or mapping)
 - Add a user to a role (SAML)
 - Remove a user from a role
 
 - Default RBAC roles
- Administrator
 - Default AHV Administrator
 - Default Cloud Administrator
 - Default NetBackup Command Line (CLI) Administrator
 - Default Kubernetes Administrator
 - Default NetBackup Kubernetes Operator Service
 - Default Microsoft SQL Server Administrator
 - Default Oracle Administrator
 - Default RHV Administrator
 - Default SaaS Administrator
 - Default Resiliency Administrator
 - Default Security Administrator
 - Default Storage Administrator
 - Default Universal Share Administrator
 - Default VMware Administrator
 
 
 - Configuring RBAC
 - RBAC permissions
- About role permissions
 - Global > BMR
 - Global > NetBackup Web Management Console Administration
 - Global > NetBackup management
- Access hosts
 - Agentless hosts
 - Anomalies
 - CLI sessions
 - Data classifications
 - Email notifications
 - Event logs
 - NetBackup hosts
 - Image sharing
 - NetBackup backup images
 - Jobs
 - Licensing
 - Media server
 - Remote primary server certificate authority
 - Resiliency
 - Resource limits
 - Retention levels
 - Servers > Trusted primary servers
 - Cloud providers
 - CloudPoint servers
 - WebSocket servers
 
 - Global > Protection
 - Global > Security
- Access control
 - Security events
 - Certificate management
 - Disaster recovery passphrase
 - Identity provider and SAML certificate configuration
 - Key Management Services (KMS)
 - Passphrase constraints
 - Service principal configuration
 - Global security settings
 - Trust versions
 - API keys
 - User certificates
 - User sessions and authentication
 
 - Global > Storage
 - Assets
 - Protection plans
 - Credentials
 - Manage access
 
 
 - Section VI. Managing detection and reporting
 - Managing deployment
 - Managing Resiliency Platforms
 - NetBackup SaaS Protection
 - NetBackup Flex Scale
 - Managing Bare Metal Restore (BMR)
 - Troubleshooting the NetBackup Web UI
 
Understanding the terms
The following table explains the key components related to Veritas Resiliency Platform and NetBackup integration.
Term  | Description  | 
|---|---|
Resiliency Platform  | The Veritas Resiliency Platform integrated with your NetBackup primary server. The Resiliency Manager provides the services required for protecting assets, such as virtual machines, within a resiliency domain. It also provides workload automation services.  | 
Resiliency manager  | The component that provides resiliency capabilities within a resiliency domain. It is composed of loosely coupled services, a distributed data repository, and a management console.  | 
Infrastructure management server (IMS)  | The component that discovers, monitors, and manages the asset infrastructure within a data center. The IMS transmits information about the asset infrastructure to the Resiliency Manager. The IMS is deployed as a virtual appliance. To achieve scale, multiple IMSs can be deployed in the same data center.  | 
Data center  | The location that contains source data center and a target data center. Each data center has one or more IMSs.  | 
Resiliency group  | The unit of management and control in Resiliency Platform. You organize related assets into a resiliency group and manage and monitor them as a single entity.  | 
Automated virtual machines  | The assets that are a part of a resiliency group and you can perform actions, such as migrate, recover, and rehearsal.  | 
Recovery readiness  | Measured based on migrate, recover or rehearsal operations. 
  | 
Recovery Point Object (RPO)  | Recovery Point Objective is the point in time you can recover to in the event of a disaster. For example, if you have an RPO of 4 hours on your critical virtual machines then you lose 4 hours of data, as 4 hours ago is the last point in time to which you can recover data on your VMs.  |