Recovering virtual machines after a cyber incident

Recovering VMs after a cyber incident in Commvault focuses on restoring systems to a trusted state by using clean recovery points and controlled recovery workflows.

Use the following approaches depending on your recovery requirements:

Approach Use case What it involves
Cleanroom recovery You need an ongoing cyber resilience workflow that helps you prepare for and respond to cyber attacks in an isolated recovery environment Set up and operate a cleanroom environment over time, then use it to restore, validate, and rehearse recovery for cyber events.
Auto recovery You need to orchestrate repeatable recovery actions across multiple VMs during a cyber incident or large-scale outage Use automated workflows to coordinate recovery steps, reduce manual effort, and speed up recovery across systems.
Restoring VMs to a clean recovery point You need to restore a VM to a trusted state after a cyber incident or corruption Use a full VM restore or out-of-place restore to a recovery point from before the incident, repave the operating system if needed, validate the VM in a secure or isolated environment, and then return it to production.
Running VMs from backup You need fast access to a VM for validation or temporary use Run the VM directly from backup storage without a full restore. See Running VMs from backup.
×

Loading...