Please enter search query.
Search <book_title>...
Veritas CloudPoint Administrator's Guide
Last Published:
2020-06-04
Product(s):
CloudPoint (2.2.2)
Platform: Linux
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Hitachi plug-in configuration notes
- InfiniBox plug-in configuration notes
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- Oracle plug-in configuration notes
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- Managing your assets
- About snapshot restore
- Single file restore requirements and limitations
- Additional steps required after a SQL Server snapshot restore
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Working with your CloudPoint license
- Managing CloudPoint agents and plug-ins
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
Prerequisites for the agentless configuration
Verify the following before you configure the agentless feature:
The agentless feature is available only with the CloudPoint Enterprise or an equivalent license. Ensure that you have installed the appropriate license.
Have the following information with you:
Host user name
Host password or SSH key
CloudPoint requires these details to gain access to the host and perform requested operations.
On hosts where you wish to configure this feature, grant password-less sudo access to the host user account that you provide to CloudPoint.
See Granting password-less sudo access to host user account.
More Information