NetBackup IT Analytics Data Collector Installation Guide for Backup Manager
- Introduction
- Pre-Installation setup for Commvault Simpana
- Open TCP/IP access to the Commvault database
- Set up a read-only user in the CommServe server
- Pre-Installation setup for Cohesity DataProtect
- Pre-Installation setup for EMC Avamar
- Import EMC Avamar server information
- Pre-Installation setup for EMC Data Domain backup
- Pre-Installation setup for EMC NetWorker
- Architecture overview (EMC NetWorker)
- Pre-Installation setup for Dell EMC NetWorker backup & Recovery
- Pre-Installation setup for generic backup
- CSV format specification
- Pre-Installation setup for HP Data Protector
- Architecture overview (HP Data Protector)
- Configure the Data Collector server in Cell Manager (HP Data Protector)
- Pre-Installation setup for IBM Spectrum Protect (TSM)
- Architecture overview (IBM Spectrum Protect -TSM)
- Import IBM Spectrum Protect (TSM) information
- Pre-Installation setup for NAKIVO Backup & Replication
- Pre-Installation setup for Veritas Backup Exec
- Pre-Installation setup for Veritas NetBackup
- Prerequisites to use SSH and WMI (Veritas NetBackup)
- Prerequisites for NetBackup collection over SSH (Kerberos option)
- Configuring file analytics in NetBackup Data Collector policy
- Pre-Installation setup for Oracle Recovery Manager (RMAN)
- Pre-Installation setup for Rubrik Cloud Data Management
- Pre-Installation setup for Veeam Backup & Replication
- Discovery policies for Veritas NetBackup
- About Discovery types
- About SNMP probes
- Installing the Data Collector software
- Validate data collection
- Manually start the Data Collector
- Uninstall the Data Collector
- Appendix A. Load historic events
- Load Veritas NetBackup events
- Appendix B. Firewall configuration: Default ports
Discovery policies overview
The Discovery module, specific to Veritas NetBackup, uses Discovery policies to illuminate risk and exposure within the corporate IT backup and recovery environment. The Discovery module is a separately licensed feature.
See Activate a Discovery license.
Discovery policies provide answers to the following questions:
Where is my data protected? (for example, disk-to-disk, disk-to-tape, or disk-to-disk-to-tape)
What is the extent and coverage of my data protection?
Are all my clients and applications protected?
Is every data set on every client and every application protected?
Discovery finds hosts on a corporate network and compares those hosts with the policies of the underlying backup and recovery software. Discovery performs the following steps:
Identifies orphan clients that are not being protected.
Probes and determines the file systems or drives of the hosts.
Compares and contrasts the file systems to the equivalent policies within the underlying backup and recovery software.
Use Discovery policies if:
Your IT infrastructure, applications, and servers are rapidly changing.
Your backup solution cannot detect your backup servers and cannot provide information about successful or unsuccessful backups.