Creating a validation plan

To validate a backup archive as an off-host data processing operation, you must create a validation plan.

A validation plan might include multiple backups and one backup can be validated by multiple validation plans.

To create a validation plan

  1. In the Cyber Protect console, go to Management > Validation.
  2. Click Create plan.

  3. To modify the plan name, click the default name, and then specify a new name.

  4. In Agent, select the agent that will perform the validation, and then click OK.

    • If you want to perform validation by running a virtual machine from a backup, select a machine with Agent for VMware or Agent for Hyper-V.
    • If you do not want to perform validation by running a virtual machine from a backup, select any machine that has access to the backup location.
  5. In Items to validate, select the backup archives that you want to validate.

    1. Select the validation scope—Backup archives or backup locations, by clicking Backups or Locations in the upper-right corner.

      If the selected archives are encrypted, all of them must use the same encryption password. For archives that use different encryption passwords, create separate plans.

    2. Click Add.

    3. Depending on the validation scope, select one or more locations, or a location and one or more backup archives, and then click Done.

    4. Click Done.

  6. In What to validate, select which backups (also known as recovery points) within the selected archives to validate. The following options are available:

    • All backups

    • Only the last backup

  7. In How to validate, select the validation method.

    You can select one or both of the following options:

    • Checksum verification

    • Run as a virtual machine

      The Run as a virtual machine option provides the VM heartbeat and Screenshot validation methods. For more information, see Validation methods.

  8. [If you selected Checksum verification] Click Done.

  9. [If you selected Run as a virtual machine] Configure the settings for this option.

    1. In Target machine, select the virtual machine type (ESXi or Hyper-V), the host, and the machine name template, and then click OK.

      The default name is [Machine Name]_validate.

    2. In Datastore (for ESXi) or Path (for Hyper-V), select the datastore for the virtual machine.
    3. Select one or both validation methods:
      • VM heartbeat
      • Screenshot validation
    4. Click VM settings to change the memory size and network connections of the virtual machine.

      By default, the virtual machine is not connected to a network and the virtual machine memory size equals that of the original machine.

    5. Click Done.

  10. In the validation plan, click Schedule, and then configure the schedule.

  11. [If the archives selected in Items to validate are encrypted] Enable the Backup password switch, and then provide the encryption password.
  12. To modify the plan options, click the gear icon.

  13. Click Create.

As a result, the validation plan is created and will run according to the schedule that you configured. To run the plan immediately, select it in Management > Validation, and then click Run now. After the validation starts, you can check the running activity and drill down to its details in Cyber Protect console, under Monitoring > Activities.