Data protection map settings
To learn how to create a protection plan with the Data protection map module, refer to "Creating a protection plan".
The following settings can be specified for the Data protection map module.
Schedule
You can define different settings to create the schedule according to which the task for data protection map will be performed.
Field | Description |
---|---|
Schedule the task run using the following events |
This setting defines when the task will run. The following values are available:
|
Schedule type |
The field appears if in Schedule the task run using the following events you have selected Schedule by time. The following values are available:
|
Start at |
The field appears if in Schedule the task run using the following events you have selected Schedule by time Select the exact time when the task will run. |
Run within a date range |
The field appears if, in Schedule the task run using the following events, you have selected Schedule by time. Set a range in which the configured schedule will be effective. |
Specify a user account whose login to the operating system will initiate a task |
The field appears if, in Schedule the task run using the following events, you have selected When user logs in to the system. The following values are available:
|
Specify a user account whose logout from the operating system will initiate a task |
The field appears if, in Schedule the task run using the following events, you have selected When user logs off the system. The following values are available:
|
Start conditions |
Defines all conditions that must be met simultaneously for the task to run. Start conditions for antimalware scans are similar to the start conditions for the Backup module that are described in "Start conditions". You can define the following additional start conditions:
Start conditions are not supported for Linux.
|
Extensions and exception rules
On the Extensions tab, you can define the list of file extensions that will be considered as important during data discovery and checked whether they are protected. Use the following format for defining extensions:
.html, .7z, .docx, .zip, .pptx, .xml
On the Exception rules tab, you can define which files and folders not to check on protection status during data discovery.
- Hidden files and folders – if selected, hidden files and folders will be skipped during data examination.
- System files and folders – if selected, system files and folders will be skipped during data examination.