NetBackup™ Web UI Administrator's Guide
- Section I. About NetBackup
- Introducing NetBackup
- Administering NetBackup licenses
- Registering with Veritas Alta View
- Introducing NetBackup
- Section II. Monitoring and notifications
- Monitoring NetBackup activity
- Activity monitor
- Job monitoring
- Troubleshooting the viewing and managing of jobs
- Device monitor
- Notifications
- Monitoring NetBackup activity
- Section III. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Add a credential for CyberArk
- Managing deployment
- Section IV. Configuring storage
- Overview of storage options
- Configuring storage units
- Configuring disk storage
- Integrating MSDP Cloud and CMS
- Managing media servers
- Managing tape drives
- Staging backups
- Troubleshooting storage configuration
- Section V. Configuring backups
- Overview of backups in the NetBackup web UI
- Managing protection plans
- Managing classic policies
- Protecting the NetBackup catalog
- Catalog backups
- Managing backup images
- Pausing data protection activity
- Section VI. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Configuring multi-person authorization
- Managing user sessions
- Configuring multi-factor authentication
- Managing the global security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Disabling access to NetBackup interfaces for OS Administrators
- Section VII. Detection and reporting
- Section VIII. NetBackup workloads and NetBackup Flex Scale
- Section IX. Disaster recovery and troubleshooting
- Section X. Other topics
- Additional NetBackup catalog information
- About the NetBackup database
View system anomalies
NetBackup can detect system anomalies. During a backup operation, NetBackup checks all the file extensions, compares them with the ransomware extension list, and generates an anomaly if there is a match. Anomaly is generated for each ransomware extension that is found in a particular backup. This anomaly detection is enabled by default for all policy types.
To view system anomalies
- On the left, select Detection and reporting > Anomaly detection > System anomalies.
The following columns are displayed:
Anomaly ID - ID of the anomaly record
Anomaly type - Type of the anomaly
Severity - Severity of the anomaly
Description - Additional information about the anomaly
Detected on - The date when the anomaly is detected
Review status - Indicates whether the detected anomaly is reported as a false positive, an actual anomaly, or it can be ignored.
- Expand a row to see the details of the selected anomaly.
- You can perform the following actions on the anomaly record:
Click Mark as ignore when you can ignore the anomaly condition.
Click Confirm as anomaly when you want to take some action on the anomaly condition.
Click Report as false positive if the anomaly is a false positive. Similar anomaly conditions are not reported in the future.