Analyze a point-in-time (PIT) copy by using the CyberSense feature in the Dell PowerProtect Cyber Recovery vault.
For detailed information and instructions on analyzing a copy, see Dell PowerProtect Cyber Recovery Product Guide.
- Login to Dell PowerProtect Cyber Recovery UI and go to Policies > Copies.
- Select the latest copy and click Analyze. From the Application Host list box, select the application nickname for the CyberSense feature.
Figure 19. CyberSense as an application in Dell PowerProtect Cyber Recovery
- When the analysis is complete, return to the list of copies under Policies > Copies and click in the row of a copy. The Last Analysis column shows the results as Suspicious, Good as shown in the following figures:
Figure 20. Analyze the good test data operation status
Figure 21. Analyze the suspicious data operation status
The following figure shows the CyberSense output for suspicious test data found:
Figure 22. CyberSense GUI output for suspicious test data
- To retrieve a detailed analysis report (copy-name.csv) about a completed analysis, select the analyzed copy, click Analysis Report Actions, and do one of the following from the drop-down list as shown in the following figure:
- Click Download Analysis Report to download an analysis report for a specified copy to the location configured for download in the browser.
- Click Email Analysis Report to send an analysis report for a specified copy in an email message. In the drop-down list, enter at least one valid email address. You can then specify multiple email addresses. Click Apply.
Figure 23. Analysis report download options