Performing Manual Recovery of a VM Resource

You can manually select a point-in-time restore set while excluding detected malware from the restore path.

Note

Although malware is excluded from restore, any detected anomalies or encrypted files will be recovered as part of the selected recovery point.

Available restore destinations: In-place or out-of-place.

Procedure

  1. From the Command Center navigation pane, go to Security center > Threat scan.

    The Threat Scan page appears.

  2. Click the Resources tab to show the resources that are currently scanned by Threat Scan.

    threat_scan

  3. For the resource you want to restore, click the Action button action_button, and then select Restore.

    The Restore wizard appears.

  4. Select Manual.

    threat_scan

  5. In the Recovery points calendar, click the date to restore from (the dates on which backup jobs were run are marked in gray).

    The backup job times appear.

  6. Click a backup job time and then click Next.

    The Restore Options page appears.

    threat_scan

  7. Select Guest files and then click Next.

    The Recovery Location page appears.

    threat_scan

  8. Select the type of restore to perform: In place or Out of place and then click Next.

    Note

    The following steps may vary depending on the type of VM being restored.

    The Guest Files screen appears.

    threat_scan

  9. Select the files you want to restore, and then click Restore.

    The Restore options pane appears.

  10. To restore to the source VM:

    1. Select the Select client tab (the default option).

      threat_scan

    2. Verify that the source VM is selected in the Destination client box (the default option).

    3. Optional: To use a different VSA access node, change the value in the Access node box.

    4. In the Destination Path box, type the full path to the destination folder.

    5. Unconditionally overwrite if it already exists: Overwrites current state of the VM with the restored VM.

    6. Click Submit.

  11. To restore to a different VM:

    1. Select the Other VM tab.

      threat_scan

      By default, the same access node that was used for the backup performs the restore.

    2. Optional: To use a different access node, change the value in the Access node box.

    3. If the destination VM resides on another hypervisor, select the host name of the hypervisor from the Destination VM list, and then browse to select the destination VM.

    4. In the Destination Path box, type the full path to the destination folder.

    5. Unconditionally overwrite if it already exists: Overwrites current state of the VM with the restored VM.

    6. Click Submit.

Page contents

×

Loading...