NetBackup™ Web UI Administrator's Guide
- Section I. About NetBackup
 - Section II. Monitoring and notifications
- Monitoring NetBackup activity
- The NetBackup dashboard
 - Activity monitor
 - Job monitoring
- Workloads that require a custom RBAC role for specific job permissions
 - View a job
 - View the jobs in the List view
 - View the jobs in the Hierarchy view
 - Jobs: cancel, suspend, restart, resume, delete
 - View the logs for a job
 - Search for or filter jobs in the jobs list
 - Create a jobs filter
 - Edit, copy, or delete a jobs filter
 - Import or export job filters
 - View the status of a redirected restore
 - Troubleshooting the viewing and managing of jobs
 
 
 - Device monitor
 - Notifications
 - Registering the data collector
 
 - Monitoring NetBackup activity
 - Section III. Configuring hosts
- Managing host properties
- Overview of host properties
 - View or edit the host properties of a server or client
 - Host information and settings in Host properties
 - Reset a host's attributes
 - Active Directory properties
 - Backup pool host properties
 - Busy file settings properties
 - Clean up properties
 - Client name properties
 - Client attributes properties
 - Client settings properties for UNIX clients
 - Client settings properties for Windows clients
 - Cloud Storage properties
 - Credential access properties
 - Data Classification properties
 - Default job priorities properties
 - Distributed application restore mapping properties
 - Encryption properties
 - Enterprise Vault properties
 - Enterprise Vault hosts properties
 - Exchange properties
 - Exclude list properties
 - Fibre transport properties
 - Firewall properties
 - General server properties
 - Global attributes properties
 - Logging properties
 - Lotus Notes properties
 - Media properties
 - Network properties
 - Network settings properties
 - Nutanix AHV access hosts
 - Port ranges properties
 - Preferred network properties
- Add or edit a Preferred network setting
 - How NetBackup uses the directives to determine which network to use
 - Configurations to use IPv6 networks
 - Configurations to use IPv4 networks
 - Order of directive processing in the Preferred network properties
 - bptestnetconn utility to display Preferred network information
 - Configuration to prohibit using a specified address
 - Configuration to prefer a specified address
 - Configuration that restricts NetBackup to one set of addresses
 - Configuration that limits the addresses, but allows any interfaces
 
 - Properties setting in host properties
 - RHV access hosts properties
 - Resilient network properties
 - Resource limit properties
 - Restore failover properties
 - Retention periods properties
 - Scalable Storage properties
 - Servers properties
 - SharePoint properties
 - SLP settings properties
 - Throttle bandwidth properties
 - Timeouts properties
 - Universal settings properties
 - UNIX client properties
 - UNIX Server properties
 - User account settings properties
 - VMware access hosts properties
 - Windows client properties
 - Configuration options not found in the host properties
 - About using commands to change the configuration options on UNIX or Linux clients and servers
 
 - Managing credentials for workloads and systems that NetBackup accesses
 - Managing deployment
 
 - Managing host properties
 - Section IV. Configuring storage
- Overview of storage options
 - Configuring disk storage
- Create a Media Server Deduplication Pool storage server
 - Integrating MSDP Cloud and CMS
 - Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
 - Create an AdvancedDisk, OpenStorage (OST), or Cloud Connector storage server
 - Create an MSDP server for MSDP volume group (MVG)
 - Create the MVG volume
 - Edit a storage server
 - About configuring disk pool storage
 - Share images from an on-premises location to the cloud
 - Overview of universal shares
 - About the MSDP object store
 
 - Managing media servers
 - Configuring storage units
 - Configuring robots and tape drives
- NetBackup robot types
 - Prerequisite for configuring robots and drives
 - About configuring robots and tapes drives in NetBackup
 - Configure drives and robots by using the wizard
 - Configure drive name rules
 - Updating the device configuration by using the wizard
 - Robot properties and configuration options
 - Robot control (robot configuration options)
 - Managing robots
 - Managing tape drives
 
 - Configuring tape media
- About NetBackup tape volumes
 - About NetBackup volume pools
 - About NetBackup volume groups
 - NetBackup media types
 - About adding volumes
 - Managing volumes
- Edit a volume
 - About moving volumes
 - Move volumes
 - About recycling a volume
 - About assigning and deassigning volumes
 - Delete a volume
 - Changing the media owner of a volume
 - Changing the volume group assignment
 - About rules for moving volumes between groups
 - Rescan and update barcodes
 - About barcode rules
 - About injecting and ejecting volumes
 - Label a volume
 - Erase a volume
 - Freeze or unfreeze a volume
 - Suspend or unsuspend volumes
 
 - Managing volume pools
 - Managing volume groups
 
 - Inventorying robots
- About robot inventory
 - When to inventory a robot
 - About showing a robot's contents
 - Show the media in a robot
 - About comparing a robot's contents with the volume configuration
 - Comparing media in a robot with the volume configuration
 - About previewing volume configuration changes
 - Previewing volume configuration changes for a robot
 - About updating the NetBackup volume configuration
 - Update the NetBackup volume configuration with a robot's contents
 - Robot inventory options
 - Advanced options for robot inventory settings
 - Configure media ID generation rules
 - Barcode rules settings
 - Media ID generation options
 - Configure media settings
 - About media type mapping rules
 - Configure media type mappings
 
 - Staging backups
 - Troubleshooting storage configuration
 
 - Section V. Configuring backups
- Overview of backups in the NetBackup web UI
 - Managing classic policies
- Add a policy
 - Example policy - Exchange Server DAG backup
 - Example policy - Sharded MongoDB cluster
 - Example policy - Epic-Large-File
 - Edit, copy, or delete a policy
 - Deactivate or activate a policy
 - View automanaged policies and SLPs
 - About automanaged policies or storage lifecycle policies
 - Perform manual backups
 - About the Epic-Large-File policy type
 
 - Managing protection plans
- Create a protection plan
 - Customizing protection plans
 - Edit or delete a protection plan
 - Subscribe an asset or an asset group to a protection plan
 - Unsubscribe an asset from a protection plan
 - View protection plan overrides
 - Copy a protection plan policy (automanaged policy) to a classic policy
 - About Backup now
 
 - Protecting the NetBackup catalog
- About the NetBackup catalog
 - Catalog backups
- The catalog backup process
 - Prerequisites for backing up the NetBackup catalog
 - Configuring catalog backups
 - Backing up NetBackup catalogs manually
 - Concurrently running catalog backups with other backups
 - Catalog policy schedule considerations
 - How catalog incrementals and standard backups interact on UNIX
 - Determining whether or not a catalog backup succeeded
 - Strategies that ensure successful NetBackup catalog backups
 
 - Disaster recovery emails and the disaster recovery files
 - Disaster recovery packages
 - Set the passphrase to encrypt disaster recovery packages
 - Recovering the catalog
 
 - Managing backup images
 - Pausing data protection activity
 
 - Section VI. Managing security
- Security events and audit logs
 - Managing security certificates
 - Managing host mappings
 - Minimizing security configuration risk
 - Configuring multi-person authorization
- About multi-person authorization
 - Workflow to configure multi-person authorization for NetBackup operations
 - RBAC roles and permissions for multi-person authorization
 - Multi-person authorization process with respect to roles
 - NetBackup operations that need multi-person authorization
 - Configure multi-person authorization
 - View multi-person authorization tickets
 - Manage multi-person authorization tickets
 - Add exempted users
 - Schedule expiration and purging of multi-person authorization tickets
 - Disable multi-person authorization
 
 - Managing user sessions
 - Configuring multifactor authentication
- About multifactor authentication
 - Configure multifactor authentication for your user account
 - Disable multifactor authentication for your user account
 - Enforce multifactor authentication for all users
 - Configure multifactor authentication for your user account when it is enforced in the domain
 - Reset multifactor authentication for a user
 
 - Managing the global security settings for the primary server
- View the Certificate authority for secure communication
 - Disable communication with NetBackup 8.0 and earlier hosts
 - Disable automatic mapping of NetBackup host names
 - Configure the global data-in-transit encryption setting
 - About NetBackup certificate deployment security levels
 - Select a security level for NetBackup certificate deployment
 - About TLS session resumption
 - Set a passphrase for disaster recovery
 - Validate the disaster recovery package passphrase
 - About trusted primary servers
 - Configure the audit retention period
 
 - Using access keys, API keys, and access codes
 - Configuring authentication options
 - Managing role-based access control
 - Disabling access to NetBackup interfaces for OS Administrators
 
 - Section VII. Detection and reporting
- Detecting anomalies
- About backup anomaly detection
 - Configure backup anomaly detection settings
 - View backup anomalies
 - Disable backup anomaly detection and computation of entropy and file attributes for a client
 - About system anomaly detection
 - Configure system anomaly detection settings
 - Configure rules-based anomaly detection
 - Configure risk engine-based anomaly detection
 - View system anomalies
 
 - Malware scanning
 - Usage reporting and capacity licensing
 - Reports
 
 - Detecting anomalies
 - Section VIII. NetBackup workloads and NetBackup Flex Scale
 - Section IX. Administering NetBackup
- Management topics
 - Managing client backups and restores
- About server-directed restores
 - About client-redirected restores
 - About restoring the files that have Access Control Lists (ACLs)
 - About setting the original atime for files during restores on UNIX
 - Restoring the System State
 - About the backup and restore of compressed files on VxFS file systems
 - About backups and restores on ReFS
 
 
 - Section X. Disaster recovery and troubleshooting
 - Section XI. Other topics
- Additional NetBackup catalog information
- Parts of the NetBackup catalog
 - Archiving the catalog and restoring from the catalog archive
 - Estimating catalog space requirements
 - About the file hash search in NetBackup
- Configuring the file hash server
 - Enabling the file hash server on the NetBackup primary server
 - Calculating the file hash
 - Searching the files using the file hash
 - Identifying the backups that have the file hash enabled
 - Removing the file hash from the backup
 - Migrating the file hash data from one server to another
 - Configuring the backup of file hash data on the file hash server
 - Restoring the file hash data to the file hash server
 
 
 - About the NetBackup database
- About the NetBackup database installation
 - Post-installation tasks
 - Using the NetBackup Database Administration utility on Windows
 - Using the NetBackup Database Administration utility on UNIX
 
 
 - Additional NetBackup catalog information
 
Configuring RBAC
To configure role-based access control for the NetBackup web UI, perform the following steps.
Table: Steps to configure role-based access control
Step  | Action  | Description  | 
|---|---|---|
1  | Configure any Active Directory or LDAP domains.  | Before you can add domain users, Active Directory or LDAP domains must be authenticated with NetBackup.  | 
2  | Determine the permissions that your users need.  | Determine the permissions that your users need to perform their daily tasks. You can use the default RBAC roles or use a default role as a template to create a new role. Or, you can create a completely custom role to fit your needs. See Role permissions. See Default RBAC roles.  | 
3  | Add users to the appropriate roles.  | See Add a user to a role (non-SAML). See Add a user to a role (SAML). See Add a smart card user to a role (non-SAML, without AD/LDAP).  | 
4  | Determine the permissions that you want for OS administrators  | See Disable web UI access for operating system (OS) administrators. See Disable command-line (CLI) access for operating system (OS) administrators.  |