NetBackup™ Web UI Administrator's Guide
- Section I. About NetBackup
- Section II. Monitoring and notifications
- Monitoring NetBackup activity
- The NetBackup dashboard
- Activity monitor
- Job monitoring
- Workloads that require a custom RBAC role for specific job permissions
- View a job
- Expand or collapse rows in the Jobs tab
- View the jobs in the List view
- View the jobs in the Hierarchy view
- Jobs: cancel, suspend, restart, resume, delete
- View the logs for a job
- Search for or filter jobs in the jobs list
- Create a jobs filter
- Edit, copy, or delete a jobs filter
- Import or export job filters
- Collect logs for Cohesity Technical Support
- View the status of a redirected restore
- Troubleshooting the viewing and managing of jobs
- Device monitor
- Notifications
- Registering the data collector
- Monitoring NetBackup activity
- Section III. Configuring hosts
- Managing host properties
- Overview of host properties
- View or edit the host properties of a server or client
- Host information and settings in Host properties
- Reset a host's attributes
- Active Directory properties
- Backup pool host properties
- Busy file settings properties
- Clean up properties
- Client name properties
- Client attributes properties
- Client settings properties for UNIX clients
- Client settings properties for Windows clients
- Cloud Storage properties
- Credential access properties
- Data Classification properties
- Default job priorities properties
- Distributed application restore mapping properties
- Encryption properties
- Enterprise Vault properties
- Enterprise Vault hosts properties
- Exchange properties
- Exclude list properties
- Fibre transport properties
- Firewall properties
- General server properties
- Global attributes properties
- Logging properties
- Lotus Notes properties
- Media properties
- Network properties
- Network settings properties
- Nutanix AHV access hosts
- Port ranges properties
- Preferred network properties
- Add or edit a Preferred network setting
- How NetBackup uses the directives to determine which network to use
- Configurations to use IPv6 networks
- Configurations to use IPv4 networks
- Order of directive processing in the Preferred network properties
- bptestnetconn utility to display Preferred network information
- Configuration to prohibit using a specified address
- Configuration to prefer a specified address
- Configuration that restricts NetBackup to one set of addresses
- Configuration that limits the addresses, but allows any interfaces
- Properties setting in host properties
- RHV access hosts properties
- Resilient network properties
- Resource limit properties
- Restore failover properties
- Retention periods properties
- Scalable Storage properties
- Servers properties
- SharePoint properties
- SLP settings properties
- Throttle bandwidth properties
- Timeouts properties
- Universal settings properties
- UNIX client properties
- UNIX Server properties
- User account settings properties
- VMware access hosts properties
- Windows client properties
- Configuration options not found in the host properties
- About using commands to change the configuration options on UNIX or Linux clients and servers
- Managing credentials for workloads and systems that NetBackup accesses
- Overview of credential management in NetBackup
- Adding credentials in NetBackup
- Add a credential for NetBackup Callhome Proxy
- Add a credential for an external KMS
- Add a credential for Network Data Management Protocol (NDMP)
- Add a configuration for an external CMS server
- Edit or delete a named credential
- Edit or delete Network Data Management Protocol (NDMP) credentials in NetBackup
- Managing deployment
- Managing host properties
- Section IV. Configuring storage
- Overview of storage options
- Configuring disk storage
- Create a Media Server Deduplication Pool storage server
- Integrating MSDP Cloud and CMS
- Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
- Create an AdvancedDisk, OpenStorage (OST), or Cloud Connector storage server
- Create an MSDP server for MSDP volume group (MVG)
- Create the MVG volume
- Edit a storage server
- About configuring disk pool storage
- Share images from an on-premises location to the cloud
- Overview of universal shares
- About the MSDP object store
- Managing media servers
- Configuring storage units
- Configuring robots and tape drives
- NetBackup robot types
- About the device mapping files
- Downloading the device mapping files
- Prerequisites for configuring robots and drives
- About configuring robots and tapes drives in NetBackup
- Configure drives and robots by using the wizard
- Configure drive name rules
- Update the device configuration by using the wizard
- Robot properties and configuration options
- Robot control (robot configuration options)
- Managing robots
- Correlating tape drives and SCSI addresses on Windows hosts
- Correlating tape drives and device files on UNIX hosts
- Managing tape drives
- Verifying the device configuration
- About automatic path correction
- Enabling automatic path correction
- Replacing a device
- Updating device firmware
- About the NetBackup Device Manager
- About external access to NetBackup controlled devices on UNIX
- Configuring tape media
- About NetBackup tape volumes
- About NetBackup volume pools
- About NetBackup volume groups
- NetBackup media types
- About adding volumes
- Managing volumes
- Edit a volume
- About moving volumes
- Move volumes
- About recycling a volume
- About assigning and deassigning volumes
- Delete a volume
- Changing the media owner of a volume
- Changing the volume group assignment
- About rules for moving volumes between groups
- Rescan and update barcodes
- About barcode rules
- About injecting and ejecting volumes
- Label a volume
- Erase a volume
- Freeze or unfreeze a volume
- Suspend or unsuspend volumes
- Managing volume pools
- Managing volume groups
- Inventorying robots
- About robot inventory
- When to inventory a robot
- About showing a robot's contents
- Show the media in a robot
- About comparing a robot's contents with the volume configuration
- Comparing media in a robot with the volume configuration
- About previewing volume configuration changes
- Previewing volume configuration changes for a robot
- About updating the NetBackup volume configuration
- Update the NetBackup volume configuration with a robot's contents
- Robot inventory options
- Advanced options for robot inventory settings
- Configure media ID generation rules
- Barcode rules settings
- Media ID generation options
- Configure media settings
- About media type mapping rules
- Configure media type mappings
- Staging backups
- Troubleshooting storage configuration
- Section V. Configuring backups
- Overview of backups in the NetBackup web UI
- Managing policies
- Add a policy
- About the Epic-Large-File policy type
- Example policy - Exchange Server DAG backup
- Example policy - Sharded MongoDB cluster
- Example policy - Epic-Large-File
- Edit, copy, or delete a policy
- Deactivate or activate a policy
- View automanaged policies and SLPs
- About automanaged policies or storage lifecycle policies
- Perform manual backups
- Managing protection plans
- Create a protection plan
- Customizing protection plans
- Edit or delete a protection plan
- Subscribe an asset or an asset group to a protection plan
- Unsubscribe an asset from a protection plan
- View protection plan overrides
- Copy a protection plan policy (automanaged policy) to a classic policy
- About Backup now
- Protecting the NetBackup catalog
- About the NetBackup catalog
- Catalog backups
- The catalog backup process
- Prerequisites for backing up the NetBackup catalog
- Configuring catalog backups
- Backing up NetBackup catalogs manually
- Concurrently running catalog backups with other backups
- Catalog policy schedule considerations
- How catalog incrementals and standard backups interact on UNIX
- Determining whether or not a catalog backup succeeded
- Strategies that ensure successful NetBackup catalog backups
- Disaster recovery emails and the disaster recovery files
- Disaster recovery packages
- Set the passphrase to encrypt disaster recovery packages
- Recovering the catalog
- Managing backup images
- Pausing data protection activity
- Section VI. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Minimizing security configuration risk
- Configuring multi-person authorization
- About multi-person authorization
- Workflow to configure multi-person authorization for NetBackup operations
- RBAC roles and permissions for multi-person authorization
- Multi-person authorization process with respect to roles
- NetBackup operations that need multi-person authorization
- Configure multi-person authorization
- View multi-person authorization tickets
- Manage multi-person authorization tickets
- Add exempted users
- Schedule expiration and purging of multi-person authorization tickets
- Disable multi-person authorization
- Managing user sessions
- Configuring multifactor authentication
- About multifactor authentication
- Configure multifactor authentication for your user account
- Disable multifactor authentication for your user account
- Enforce multifactor authentication for all users
- Configure multifactor authentication for your user account when it is enforced in the domain
- Reset multifactor authentication for a user
- Managing the global security settings for the primary server
- View the Certificate authority for secure communication
- Disable communication with NetBackup 8.0 and earlier hosts
- Disable automatic mapping of NetBackup host names
- Configure the global data-in-transit encryption setting
- About NetBackup certificate deployment security levels
- Select a security level for NetBackup certificate deployment
- About TLS session resumption
- Set a passphrase for disaster recovery
- Validate the disaster recovery package passphrase
- About trusted primary servers
- Configure the audit retention period
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control (RBAC)
- Disabling access to NetBackup interfaces for OS Administrators
- Section VII. Detection and reporting
- Detecting anomalies
- About backup anomaly detection
- Configure backup anomaly detection settings
- View backup anomalies
- Disable backup anomaly detection and computation of entropy and file attributes for a client
- About system anomaly detection
- Configure system anomaly detection settings
- Configure rules-based anomaly detection
- Configure risk engine-based anomaly detection
- View system anomalies
- Malware scanning
- Usage reporting and capacity licensing
- Reports
- Detecting anomalies
- Section VIII. NetBackup workloads and NetBackup Flex Scale
- Section IX. Administering NetBackup
- Management topics
- Managing client backups and restores
- About server-directed restores
- About client-redirected restores
- About restoring the files that have Access Control Lists (ACLs)
- About setting the original atime for files during restores on UNIX
- Restoring the System State
- About the backup and restore of compressed files on VxFS file systems
- About backups and restores on ReFS
- Section X. Disaster recovery and troubleshooting
- Section XI. Other topics
- Additional NetBackup catalog information
- Parts of the NetBackup catalog
- Archiving the catalog and restoring from the catalog archive
- Estimating catalog space requirements
- About the file hash search in NetBackup
- Configuring the file hash server
- Enabling the file hash server on the NetBackup primary server
- Calculating the file hash
- Searching the files using the file hash
- Identifying the backups that have the file hash enabled
- Removing the file hash from the backup
- Migrating the file hash data from one server to another
- Configuring the backup of file hash data on the file hash server
- Restoring the file hash data to the file hash server
- About the NetBackup database
- About the NetBackup database installation
- Post-installation tasks
- Using the NetBackup Database Administration utility on Windows
- Using the NetBackup Database Administration utility on UNIX
- Additional NetBackup catalog information
Configure risk engine-based anomaly detection
The NetBackup risk engine detects certain system anomalies in a proactive manner and sends appropriate alerts. It helps you take corrective action before you face any security threat in your environment.
You can configure the following options that the risk engine uses to detect anomalies for the given operations:
Use this option to detect when images are expired in an unusual or a suspicious manner.
By default, a system anomaly is generated when the risk engine detects an unusual or a suspicious image expiration attempt and allows the operation to proceed.
However, for additional security, you can configure multi-person authorization for such image expiration attempts, where an MPA approver needs to approve the operation.
Important notes on the Detect suspicious image expiration option
If the audit retention period is set to less than 3 months, this option accumulates data of 3 months and then becomes active.
This option supports full backup schedules. Other types of schedule are not considered. The retention level of an image is also not considered for this rule.
Images are expired by media ID, server name, or by recalculating the retention period.
Select and select the Generate multi-person authorization ticket if images are deleted in a suspicious manner option.
Note:
To successfully review the multi-person authorization tickets, ensure that one or more MPA approvers are available in your environment.
See About multi-person authorization.
See RBAC roles and permissions for multi-person authorization.
Use this option to detect when a user attempts to sign in to the NetBackup web UI at an unusual time. NetBackup identifies deviations in user sign-in patterns, and flags them.
A notification is generated when an unusual user login is detected.
For additional security, you can configure multi-person authorization for such unusual login attempts, where an MPA approver needs to approve the operation.
See Configure multi-person authorization.
If an unusual login attempt is detected on a NetBackup host earlier that 11.0, the request is rejected. Carry out the operation on a NetBackup 11.0 host.
If an unusual login request is detected in the , the request is rejected. Use the web UI to carry out the operation.
If none of the users can login and they are placed on hold because of unusual login pattern, the NetBackup administrator can disable the unusual login detection to allow the users to sign in to the NetBackup web UI using the following command:
NBU_INSTALL_PATH/netbackup/bin/admincmd/nbseccmd -disableLoginAnomalyDetection
User logins that are based on the authentication types such as SAML, smart card, and API keys do not support login anomaly detection.
Click and use the option to enable multi-person authentication.
To successfully review the multi-person authorization tickets, ensure that one or more MPA approvers are available in your environment.
If multi-person authorization is enabled and an unusual user login is detected, the user's login is placed on hold.
A ticket is generated and requires approval for the user to proceed. Until the ticket is approved, the user shall not be able to login from the device.
If the ticket is approved, the user is allowed login and granted a free pass for the next 24 hours. During the free pass period, the user is not subjected to further scrutiny for unusual login attempts.
If the ticket is rejected, the user cannot log in for the current session but can try again with their credentials.
The user can choose to cancel their login request.
By default, a system anomaly is generated when the risk engine detects an unusual deletion or update of a policy. An alert is generated and the operation proceeds.
For additional security, you can configure multi-person authorization for such unusual policy update or deletion attempts, where an MPA approver needs to approve the operation.
See Configure multi-person authorization.
Click and use the option to enable multi-person authorization for the Detect unusual updates to policies type of anomaly.
To successfully review the multi-person authorization tickets, ensure that one or more MPA approvers are available in your environment.
Two alerts are generated for unusual updates to a policy for the next 48 hours. After the second alert, no alert is generated for the next 48 hours even if the policy is modified.
If multi-person authorization is enabled, a ticket is generated for modification of a policy.
Approving two consecutive tickets for the same policy does not generate new tickets for the next 48 hours for the same policy.
If multi-person authorization is enabled for the policy operations on the global level, the Detect unusual updates to policies option is disabled.
Note:
If multi-person authorization is enabled for the Detect unusual updates to policies option, you cannot update or delete policies using the NetBackup Administration Console or the command-line interface.
Alternatively, use the nbcmdrun command to update or delete policies. For more information on the commands, see the NetBackup Commands Reference Guide.
Use this option to protect critical operations such as modifying global security settings and creating API key. When you select this option, you are required to reautneticate yourself by entering the one-time password that you see in the authenticator application on your smart device before you perform the given critical operations.
Ensure that you have configured multifactor authentication for your user account. If multifactor authentication is not configured, you are not prompted to reauthenticate.
Note:
It is strongly recommended that you configure multifactor authentication in your environment to prevent security threats by malicious sources.
See Configure multifactor authentication for your user account.
Use this option to detect if there is a possible user session hijack by a malicious source.
The risk engine detects if the same user session token is used by another IP address, and sends a maximum of 10 alerts per day.
Select and select the check box to terminate the user session when the risk engine detects that there is a possible session hijack.