Global Settings
Global
Global value settings for some retentions and schedules:
Node status update interval
- how often nodes should update their statusBackup history retention
- how long should the history of backups be kept (even removed from backup provider)Task retention (in console)
- how long finished/failed tasks should be kept in the console in UI/CLIPeriodic inventory synchronizarion interval
- how often vProtect should scan for changes in VM inventory on HV/HVMsOld backups removal time
- time, when daily backup destination cleanup should be invoked (for all backup destinations)Old snapshots removal time
- time, when daily snapshots cleanup should be invoked (for all VMs with any policy assigned)Session timeout [min]
- Session timeout [min] - the time after which you will be logged out of the webUIDefault paging size
- Default value of items shown on listsFormat time
- you can choose between 12h and 24h time format
E-mail
Email configuration for reports purposes
Sender e-mail
- address from which should e-mail be sentSMTP server
- SMTP server addressSMTP port
- SMTP server portSMTP SSL port
- SMTP SSL port (if enabled)SMTP user
- SMTP user used to send e-mailsE-mail recipients (comma-separated)
- list of recipients of daily backup reportDaily backup report (sending time)
- time when daily backup report should be sentDaily backup report
- sending time for summary reportEnable virtual environment/application grouping
- you can group environment by selected parameter
License
This section enables you to view current license status and upload a new license if necessary.
License details:
MAX_xxx_HOSTS
- maximum number of hosts for given platformBP_xxx
- maximum number of backup destinations per backup provider typeEXPIRE_DATE
- trial period expiration date
Authentication
This section enables you to setup LDAP authentication for administrative accounts in vProtect:
Note: accounts will be added to vProtect automatically with the first successful login
Enable LDAP authentication
- enables LDAP authentication, vProtect will try to check for non-existing accounts in LDAP, and if authenticated successfully, new account will appear on the listServer URL
- LDAP server URLBase DN
- Base DN that needs to be searchedUser filter
- filter to be used to authenticate only users in a specific groupEnable LDAP subtree search
- when disabled, only 1 level below base DN is being searchedUse SSL
- enables SSL for LDAP connectionUse TLS
- enables TLS for LDAP connectionAnonymous access allowed
- if users are not allowed to anonymously browse LDAP directory you need to provide account which has that privilege:Service account DN
- DN of the userService account password
- password of that user
Last updated