Recovering VMs after a cyber incident in Commvault focuses on restoring systems to a trusted state by using clean recovery points and controlled recovery workflows.
Use the following approaches depending on your recovery requirements:
| Approach | Use case | What it involves |
|---|---|---|
| Cleanroom recovery | You need an ongoing cyber resilience workflow that helps you prepare for and respond to cyber attacks in an isolated recovery environment | Set up and operate a cleanroom environment over time, then use it to restore, validate, and rehearse recovery for cyber events. |
| Auto recovery | You need to orchestrate repeatable recovery actions across multiple VMs during a cyber incident or large-scale outage | Use automated workflows to coordinate recovery steps, reduce manual effort, and speed up recovery across systems. |
| Restoring VMs to a clean recovery point | You need to restore a VM to a trusted state after a cyber incident or corruption | Use a full VM restore or out-of-place restore to a recovery point from before the incident, repave the operating system if needed, validate the VM in a secure or isolated environment, and then return it to production. |
| Running VMs from backup | You need fast access to a VM for validation or temporary use | Run the VM directly from backup storage without a full restore. See Running VMs from backup. |