Configuring Threat Scan from the Service Catalog

You can configure Threat Scan from the Command Center Service Catalog.

Enable the bEnableThreatDetection Additional Setting

Start the Wizard

  1. From the Command Center navigation pane, go to Service catalog.

    The Service Catalog page appears.

  2. In the Threat Scan tile, click Manage.

    The Configure Resources page of the Configure Threat Scan wizard appears.

Enter Group Name

  1. Enter a Name for the configuration.

  2. Click Next.

    The Add Rules page appears.

Add Rules

Note

This step is optional.

  1. Click Add Rule.

  2. For Client scope, select one of the following:

    • Clients of company

      • After selecting this option, select or enter a Company name.
    • Clients of user

      • After selecting this option, select or enter a User name.
    • Clients of user group

      • After selecting this option, select or enter a User group.
  3. For Company, select or enter the company name.

  4. Click Add rule group

    The Edit associations dialog box appears.

  5. Select or enter the criteria for this new rule group.

  6. Click Save, and then click Next.

    The Add Resources page appears.

Add Resources

  1. Select the resources to add to the group.

  2. Click Next.

    The Assign Plan page appears.

Assign Threat Scan Plan

  1. To use an existing plan, click Select an existing plan, select the plan.

  2. To create a new plan, click Create a new plan and then do the following:

    1. Enter a name for the new plan in the Plan name field.

    2. Under Plan settings, do the following:

      1. Select the scanning frequency (Automatic or Scheduled).

      2. Select the backup storage. If you select Bring your own compute, then select the following:

        • Storage. Select an existing storage pool.

        • Access nodes. Either select an existing access node, or click the Add button add_button and then add a new access node.

    3. Under Detection services, select from the following:

      • Anomaly detection is enabled by default and cannot be disabled. It automatically monitors backup metadata and file attributes to identify suspicious or unusual activity patterns.

      • Threat detection. Enable this option and then select from the following:

        • Encryption detection. Select this to scan backups for encrypted files and ransomware threats.

        • Malware detection. Scans backups for known malware signatures to identify threats.

  3. Click Next.

    The Summary page appears.

Onboard the Threat Scan Group

  1. Review the summary information.

  2. Click Onboard.

Next Steps

To configure additional Threat Scan groups, see .

×

Loading...