NetBackup™ Web UI Administrator's Guide
- Introducing NetBackup
- About NetBackup
- NetBackup documentation
- NetBackup web UI features
- NetBackup administration interfaces
- Terminology
- First-time sign in to the NetBackup web UI
- Sign in to the NetBackup web UI
- Sign out of the NetBackup web UI
- Documentation for Catalog Recovery Wizard, disk array hosts, disk pools, and Host Properties in the NetBackup web UI
- Section I. Monitoring and notifications
- Monitoring NetBackup activity
- The NetBackup dashboard
- Activity monitor
- Job monitoring
- Workloads that require a custom RBAC role for specific job permissions
- View a job
- View the jobs in the List view
- View the jobs in the Hierarchy view
- Jobs: cancel, suspend, restart, resume, delete
- Search for or filter jobs in the jobs list
- Create a jobs filter
- Edit, copy, or delete a jobs filter
- Import or export job filters
- Troubleshooting the viewing of jobs
- Notifications
- Monitoring NetBackup activity
- Section II. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Overview of credential management in NetBackup
- Add a credential in NetBackup
- Add a credential for an external KMS
- Add a credential for NetBackup Callhome Proxy
- Edit or delete a named credential
- Add a credential for Network Data Management Protocol (NDMP)
- Edit or delete Network Data Management Protocol (NDMP) credentials in NetBackup
- Managing deployment
- Section III. Configuring storage
- Section IV. Configuring backups
- Section V. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- Certificate authority for secure communication
- Disable communication with NetBackup 8.0 and earlier hosts
- Disable automatic mapping of NetBackup host names
- Configure the global data-in-transit encryption setting
- About NetBackup certificate deployment security levels
- Select a security level for NetBackup certificate deployment
- About TLS session resumption
- Set a passphrase for disaster recovery
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- RBAC features
- Authorized users
- Configuring RBAC
- Notes for using NetBackup RBAC
- Add AD or LDAP domains
- View users in RBAC
- Add a user to a role (non-SAML)
- Add a smart card user to a role (non-SAML, without AD/LDAP)
- Add a user to a role (SAML)
- Remove a user from a role
- Disable web UI access for operating system (OS) administrators
- Disable command-line (CLI) access for operating system (OS) administrators
- Default RBAC roles
- Add a custom RBAC role
- Role permissions
- Manage access permission
- View access definitions
- Section VI. Detection and reporting
- Detecting malware
- About malware detection
- Configure a new scan host pool
- Add an existing scan host
- Manage credentials
- Remove the scan host
- Deactivate the scan host
- Scan a policy client backup images for malware
- Perform malware scanning
- Scan a VMware asset for malware
- View the malware scan status
- Actions for malware scanned images
- Recover from malware-affected images (clients protected by policies)
- Recover a VMware asset affected by malware
- Troubleshooting
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section VII. NetBackup workloads and NetBackup Flex Scale
- Section VIII. Disaster recovery and troubleshooting
Actions for malware scanned images
Once you scan the backup images for malware detection, a tabular data is available on the Malware detection home page. See View the malware scan status.
For each backup image, the following quick configuration are available:
Expire all copies
- On the left, select Detection and reporting > Malware detection
- For the desired scan result, from the right, select Expire all copies
- Confirm to expire all the copies of the selected backup image.
View infected files
- On the left, select Detection and reporting > Malware detection
- For the desired scan result, select View infected files
Note:
This option is available only for infected files.
- In the Infected files table, search or the desired file, if needed.
- If needed, click Export list.
Note:
A list of infected files from the selected malware scanning result is exported in
.csvformat. The file name is of following format:backupid_infected_files_timestamp.csv
Export infected files list
- On the left, select Detection and reporting > Malware detection
- For the desired malware affected , from the right, select Export Infected files list
Note:
.csvfile contains backup time and names of the infected files.
Cancel malware scan
- On the left, select Detection and reporting > Malware detection
- For desired client, from actions menu, click Cancel malware scan.
Note:
You can cancel the malware scan only from in progress and pending states.
- Click Cancel scan to confirm.
Note:
The status changes to Cancellation in progress.
Rescan image
- On the left, select Detection and reporting > Malware detection
- For desired client, from actions menu, click Rescan image .
- Click Rescan to confirm.
- In case of bulk rescan, when you select one or more image with different or empty scanner host pool, you need to select a new scanner host pool.
Click Rescan image
From the Select a malware scanner host pool pop-up select a new scan host.
Note:
New scan host pool is applicable for all the selected images for this rescan.
Click Rescan to confirm.