Please enter search query.
Search <book_title>...
NetBackup™ Web UI Administrator's Guide
Last Published:
2022-12-19
Product(s):
NetBackup (10.1.1)
- Introducing NetBackup
- Section I. Monitoring and notifications
- Monitoring NetBackup activity
- Activity monitor
- Job monitoring
- Notifications
- Monitoring NetBackup activity
- Section II. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Section III. Configuring storage
- Section IV. Configuring backups
- Section V. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Configuring RBAC
- Add a custom RBAC role
- Section VI. Detection and reporting
- Detecting malware
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section VII. NetBackup workloads and NetBackup Flex Scale
- Section VIII. Disaster recovery and troubleshooting
Search for backup images
To verify, duplicate, or import backup images, you first need to locate those images in the catalog.
For more details on these actions and on data-in-transit encryption (DTE) in your NetBackup environment, see the NetBackup Administrator's Guide, Volume I and NetBackup Security and Encryption Guide.
To search for backup images
- On the left, click Catalog.
- From the Action list, select one of the following:
Verify.
Duplicate.
Phase 1 import.
Phase 2 import.
- Select the criteria for the search or the import.
- Click Search or Import.
Search results
When you search for backup images, the image list displays at the bottom of the screen. Click Show or hide columns to display additional information about the images.
The NetBackup web UI also indicates any image information for the
and . These attributes indicate if a copy or the ancestor copies are created securely.