Performing Synthetic Recovery of a VM Resource

You can compose a restore set from the last known good versions of files across backup sets, removing malware and minimizing rollback/disruption.

This method recovers the most recent uncorrupted version of each file across all available backups, ensuring a clean recovery point while minimizing data loss. This option may recover older version of files, if the most recent version is infected.

Available restore destinations: In-place or out-of-place.

Procedure

  1. From the Command Center navigation pane, go to Security center > Threat scan.

    The Threat Scan page appears.

  2. Click the Resources tab to show the resources that are currently scanned by Threat Scan.

    threat_scan

  3. For the resource you want to restore, click the Action button action_button, and then select Restore.

    The Restore wizard appears.

  4. Select Synthetic and then click Next.

    threat_scan

    The Restore Options page appears.

    threat_scan

  5. Select Guest files and then click Next.

    The Recovery Location page appears.

    threat_scan

  6. Select the type of restore to perform: In place or Out of place and then click Next.

    Note

    The following steps may vary depending on the type of VM being restored.

    The Guest Files screen appears.

    threat_scan

  7. Select the files you want to restore, and then click Restore.

    The Restore options pane appears.

    threat_scan

  8. To restore to the source VM:

    1. Select the Select client tab (the default option).

      threat_scan

    2. Verify that the source VM is selected in the Destination client box (the default option).

    3. Optional: To use a different VSA access node, change the value in the Access node box.

    4. In the Destination Path box, type the full path to the destination folder.

    5. Unconditionally overwrite if it already exists: Overwrites current state of the VM with the restored VM.

    6. Click Submit.

  9. To restore to a different VM:

    1. Select the Other VM tab.

      threat_scan

      By default, the same access node that was used for the backup performs the restore.

    2. Optional: To use a different access node, change the value in the Access node box.

    3. If the destination VM resides on another hypervisor, select the host name of the hypervisor from the Destination VM list, and then browse to select the destination VM.

    4. In the Destination Path box, type the full path to the destination folder.

    5. Unconditionally overwrite if it already exists: Overwrites current state of the VM with the restored VM.

    6. Click Submit.

Page contents

×

Loading...