NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring and notifications
- Section I. Configuring hosts
- Section II. Configuring storage and backups
- Configuring storage
- Managing protection plans
- Managing classic policies
- Managing backup images
- Configuring storage
- Section III. Managing credentials
- Managing credentials for workloads and systems that NetBackup accesses
- Managing credentials for workloads and systems that NetBackup accesses
- Section IV. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Access keys
- Configuring authentication options
- Section V. Managing role-based access control
- About role-based access control in NetBackup
- Configuring RBAC roles
- Configuring RBAC
- Default RBAC roles
- Configuring RBAC
- RBAC permissions
- Global > NetBackup management
- Global > Security
- Global > Storage
- Assets
- Manage access
- Section VI. Managing detection and reporting
- Managing deployment
- Managing Resiliency Platforms
- NetBackup SaaS Protection
- NetBackup Flex Scale
- Managing Bare Metal Restore (BMR)
- Troubleshooting the NetBackup Web UI
About Malware detection
NetBackup finds malware in supported backup images and finds the last good-known image which is malware free.
Malware detection provides the following benefits:
You can select one or more backup images of the supported policy-types for on-demand scan. You can use a predefined list of scan host.
If malware is detected during the scanning, a notification is generated in WebUI.
The following steps depict the Malware workflow:
Primary server verify if the given backup images are eligible for scan. Primary server checks if they have valid instant access capable copy and if the policy type is supported.
Note:
The backup images which failed in validation, are ignored.
Once backup images are queued for on-demand scan, the primary server identify the storage server and create instant access mount of configured share type specified in scan host pool.
Primary server instructs the available media server to initiate Malware scan on the scan host.
Scan host mounts instant access mount on the scan host and initiate the scan using malware tool configured in the scan host pool.
Once scan is completed, scan host unmount, and results are sent to media server. Then, media server sends result to the primary server.
Primary server updates the scan results and unmount the instant access.
Maximum of three scans can be initiated on scan host at given point of time.