Validation methods

You can select one or more validation methods. If multiple validation methods are selected, they are applied in the following order:

  • VM heartbeat (part of the Run as virtual machine validation option)
  • Screenshot validation (part of the Run as virtual machine validation option)
  • Checksum verification

The Run as virtual machine validation option is available only for disk-level backups that contain an operating system. You can use it on ESXi or Hyper-V hosts that are managed by a protection agent (Agent for VMware or Agent for Hyper-V).

VM heartbeat

With this validation method, the agent runs a virtual machine from the backup, connects to VMware Tools or Hyper-V Integration Services, and then checks the heartbeat response to ensure that the operating system has started successfully. If the connection fails, the agent attempts to connect every two minutes, to a total of five times. If none of the attempts are successful, the validation fails.

Regardless of the number of validation plans and validated backups, the agent that performs the validation runs one virtual machine at a time. When the validation result is clear, the agent deletes the virtual machine, and then runs the next one.

Use this method only when you validate backups of VMware virtual machines by running these backups as virtual machines on an ESXi host, and backups of Hyper-V virtual machines by running them as virtual machines on a Hyper-V host.

Screenshot validation

With this validation method, the agent runs a virtual machine from the backup and, while the virtual machine is booting, screenshots are taken. A machine intelligence (MI) module checks the screenshots and if they contain a login screen, the backup is validated.

The screenshot is attached to the recovery point, and you can download it in the Cyber Protect console within one year of the validation. For more information on how to check the screenshot, see Checking the validation status.

If notifications are enabled for your user account, you will receive an email about the validation status of the backup. The email contains the screenshot as an attachment. For more information about the notifications, see Changing the notification settings for a user.

Screenshot validation is supported by agent version 15.0.30971 (released in November, 2022) and later.

Screenshot validation works best with backups of Windows and Linux systems with a GUI-based login screen. This method is not optimized for Linux systems with a console login screen.

Checksum verification

Validation via checksum verification calculates a checksum for every data block that can be recovered from the backup, and then compares it to the original checksum for the data block that was written during the backup process. The only exception is validation of file-level backups that are located in the cloud storage. These backups are validated by checking the consistency of the metadata that is saved in the backup.

Validation via checksum verification is a time-consuming operation, even for incremental or differential backups, which are usually small in size. The validation operation includes all data that must be recovered. In the case of incremental and differential backups, this data might be contained in more than one backup.

A successful validation via checksum verification ensures high probability of data recovery. However, validation via this method does not check all factors that can influence the recovery process.

If you back up an operating system, we recommend that you use some of the following additional operations: