Upload 1323 files
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- API_Playground_1.md +19 -0
- Annapurna_1.md +35 -0
- Anomaly_Detection_1.md +52 -0
- Anomaly_Detection_reports_1.md +13 -0
- CLI_administrator_role_1.md +15 -0
- Cluster_configuration_considerations_1.md +19 -0
- Cluster_registration_1.md +17 -0
- Comments_and_suggestions_2.md +33 -0
- Data_Security_Posture_1.md +29 -0
- Data_Threat_Analytics_dashboard_1.md +23 -0
- Data_Threat_Analytics_events_1.md +15 -0
- Downloading_and_installing_Rubrik_CDM_1.md +121 -0
- Downloading_quarantined_files_for_forensic_analysis_1.md +46 -0
- Getting_started_with_RSC_1.md +15 -0
- Guidelines_for_choosing_a_strong_password_1.md +34 -0
- Identities_in_Identity_Resilience_1.md +32 -0
- Identity_Resilience_1.md +17 -0
- Identity_Resilience_reports_1.md +28 -0
- Identity_summary_1.md +37 -0
- Jumbo_frame_support_1.md +31 -0
- Key_features_of_Identity_Resilience_1.md +46 -0
- Legal_Notices_2.md +29 -0
- Polaris_to_RSC_upgrade_1.md +28 -0
- Quarantine_overview_1.md +59 -0
- Quarantining_matched_files_or_objects_1.md +45 -0
- RBAC_privileges_for_quarantine_1.md +28 -0
- RSC_Data_Threat_Analytics_1.md +17 -0
- RSC_Orchestrated_Application_Recovery_1.md +32 -0
- Removing_a_quarantined_file_or_object_1.md +44 -0
- Rubrik_CDM_software_upgrade_1.md +36 -0
- Rubrik_MFA_with_TOTP_1.md +17 -0
- Rubrik_Security_Cloud_-_Offline_Recovery_1.md +283 -0
- Rubrik_Security_Cloud_1.md +57 -0
- Rubrik_Security_Cloud_service_types_1.md +17 -0
- Rubrik_Security_Cloud_workloads_1.md +47 -0
- Rubrik_cluster_deployment_1.md +37 -0
- Ruby_2.md +31 -0
- System_shutdown_1.md +11 -0
- Threat_Monitoring_1.md +34 -0
- Threat_hunts_1.md +39 -0
- Viewing_quarantined_files_or_objects_in_threat_hunts_1.md +28 -0
- adds_active_directory_domain_dc.md +20 -0
- adds_active_directory_forest.md +23 -0
- adds_active_directory_inventory_management.md +20 -0
- adds_active_directory_snapshots.md +27 -0
- adds_ad_dc_recovery_options.md +23 -0
- adds_ad_domain_controller_protection.md +33 -0
- adds_ad_domain_controllers_info.md +25 -0
- adds_ad_forest_discovery.md +34 -0
- adds_ad_forest_inventory_management.md +25 -0
API_Playground_1.md
ADDED
|
@@ -0,0 +1,19 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# API Playground
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/gql/api_playground_2.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# API Playground
|
| 8 |
+
|
| 9 |
+
API Playground is a development environment integrated with Rubrik Security Cloud that you can use to run various GraphQL API operations on the data managed in real time by RSC.
|
| 10 |
+
|
| 11 |
+
API Playground is an integrated development environment (IDE) that you can use to browse, explore, and run GraphQL APIs offered by Rubrik Security Cloud (RSC). The IDE also provides reference to the latest Rubrik GraphQL API documentation. Running GraphQL queries and mutations in API Playground validates the GraphQL operations so that you can confirm that your queries or mutations will achieve the expected result when included in automation scripts.
|
| 12 |
+
|
| 13 |
+
After logging in to API Playground with your RSC user account credentials, you can choose to run GraphQL queries and mutations either as yourself or with a service account. The level of access you have for running the GraphQL queries and mutations depends on the RBAC roles assigned to your user account or to the service account you are using. For enhanced security, API Playground does not persist the service account access credentials.
|
| 14 |
+
|
| 15 |
+
Warning:
|
| 16 |
+
|
| 17 |
+
If not used cautiously, the GraphQL mutations that you run in API Playground can result in data loss because they affect the data managed in real time by RSC.
|
| 18 |
+
|
| 19 |
+
In addition to using the API Playground, you can also use the PowerShell SDK for RSC to enable seamless automation and management of various operations within RSC. You can download the SDK from the [PowerShell Gallery](https://www.powershellgallery.com/packages/RubrikSecurityCloud) or from the [Rubrikinc GitHub repository](https://github.com/rubrikinc/rubrik-powershell-sdk).
|
Annapurna_1.md
ADDED
|
@@ -0,0 +1,35 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Annapurna
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/ai/annapurna.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Annapurna
|
| 8 |
+
|
| 9 |
+
Rubrik Security Cloud includes the Annapurna application which you can use to obtain answers from your data, using generative AI.
|
| 10 |
+
|
| 11 |
+
Annapurna is an enterprise application. By using the generative AI capabilities of Annapurna, you can leverage your protected data to obtain natural language answers to business questions through retrieval-augmented generation (RAG).
|
| 12 |
+
|
| 13 |
+
You can use Annapurna in two different ways:
|
| 14 |
+
|
| 15 |
+
* Custom chatbots can be created in Rubrik Security Cloud (RSC) to process your prompts through the large language model (LLM) of Azure OpenAI Service.
|
| 16 |
+
* Data chunks generated via RAG can be retrieved using an API endpoint, and these chunks can then be sent to your specified LLM within your custom GenAI application.
|
| 17 |
+
|
| 18 |
+
To begin using Annapurna with your enterprise data, your administrators create chatbots. Each chatbot specifies which workload data to index and which sensitive data filters to apply. A chatbot can be configured to exclude sensitive user data based on your Data Security Posture policies. Data sources from the following workloads can be included:
|
| 19 |
+
|
| 20 |
+
* Microsoft 365
|
| 21 |
+
* Jira Cloud
|
| 22 |
+
* Salesforce
|
| 23 |
+
* Confluence[1](#fntarg_1)
|
| 24 |
+
|
| 25 |
+
After specifying the data to include, your administrators assign a role to the chatbot. Only users with the assigned role will be able to use the chatbot. The data available to a user through a chatbot depends on the access permissions the user has for that data. Annapurna uses the permissions assigned by each source application to determine the access a user has to data from that application.
|
| 26 |
+
|
| 27 |
+
Once chatbots are created, your enterprise users can launch a chatbot and ask natural language questions about the data available through the chatbot. Based on the query, Annapurna uses RAG to get relevant data from the available data sources. The retrieved data and the query are combined into a prompt and sent to the LLM. The user gets a natural language response to their query that is based on the data included in the prompt. This process does not involve training the LLM.
|
| 28 |
+
|
| 29 |
+
The chatbots that your administrators create can use multiple data sources from different workload types. This means a chatbot can query data from various workloads at the same time. Queries through such a chatbot can give answers that combine data from different sources.
|
| 30 |
+
|
| 31 |
+
Important:
|
| 32 |
+
|
| 33 |
+
Annapurna uses generative AI to respond to your prompts. AI-generated content may contain errors or inaccuracies. Independent verification of such content is strongly recommended.
|
| 34 |
+
|
| 35 |
+
[1](#fnsrc_1) To enable Confluence as a data source, contact Rubrik Support.
|
Anomaly_Detection_1.md
ADDED
|
@@ -0,0 +1,52 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Anomaly Detection
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/anomaly_detection.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Anomaly Detection
|
| 8 |
+
|
| 9 |
+
Anomaly Detection examines a range of file system statistics to check for anomalies in file system usage patterns.
|
| 10 |
+
|
| 11 |
+
Anomaly Detection provides details about potentially anomalous incidents, including their location, Rubrik cluster, file details, and snapshot time. When you enable Orchestrated Recovery, objects that are part of a Recovery Plan are grouped together.
|
| 12 |
+
|
| 13 |
+
When you enable Anomaly Detection for the data, Large Language Model (LLM) analysis for Anomaly Detection is enabled by default. When LLM analysis for Anomaly Detection is enabled, RSC uses a pre-trained LLM in Microsoft Azure OpenAI to detect suspicious activity. The model differentiates suspicious activity from legitimate changes caused by routine operations, such as upgrading an application or operating system.
|
| 14 |
+
|
| 15 |
+
Identifying and differentiating malicious behavior from legitimate activities helps reduce the frequency of false alerts and enhances the experience of using Anomaly Detection to protect data. When you do not want to use LLM analysis on Anomaly Detection, you can disable it and use Anomaly Detection without it.
|
| 16 |
+
|
| 17 |
+
When you enable Data Security Posture for an object that has an anomalous snapshot and a user account that has Data Security Posture privileges, the Sensitive files and Sensitive hits columns display values based on the base snapshot of the anomalous snapshot. The Sensitive files column shows the number of files that contain sensitive data, and the Sensitive hits column shows the number of sensitive hits for that object.
|
| 18 |
+
|
| 19 |
+
Note:
|
| 20 |
+
|
| 21 |
+
Anomaly Detection supports protected objects running in single-stack IPv6 environments.
|
| 22 |
+
|
| 23 |
+
On the Anomaly Detection page, you can:
|
| 24 |
+
|
| 25 |
+
* View the list of new and resolved investigations.
|
| 26 |
+
* Use the filters on the page to sort anomalies by time range, severity, encryption, object type, Rubrik cluster, and SLA Domain.
|
| 27 |
+
* Sort anomalous data by sensitive files or sensitive hits when you enable Data Security Posture.
|
| 28 |
+
* Filter anomalies by the selected policies when you enable Data Security Posture.
|
| 29 |
+
* Investigate and recover anomalous files in protected workloads.
|
| 30 |
+
* Recover a full snapshot for a virtual machine.
|
| 31 |
+
* Use the Search filter to search for protected workloads or Recovery Plans that have an identified anomaly.
|
| 32 |
+
* Initiate bulk recovery for vSphere-protected workloads or for Recovery Plans that have an identified anomaly.
|
| 33 |
+
* Perform cyber recovery on virtual machines based on threat hunting results to a local, isolated recovery environment.
|
| 34 |
+
* Download a CSV file of the changes identified for each protected workload. When you click Download CSV, RSC prepares a secure link for the file and displays a message about the download. You can also visit the File Preparation Center to access the downloaded file.
|
| 35 |
+
|
| 36 |
+
RSC supports Anomaly Detection for:
|
| 37 |
+
|
| 38 |
+
* VMware, AHV, and Hyper-V virtual machines
|
| 39 |
+
* NAS filesets
|
| 40 |
+
* Linux and Windows servers
|
| 41 |
+
* Windows Volume groups
|
| 42 |
+
* NAS CD data sets
|
| 43 |
+
* Azure virtual machines
|
| 44 |
+
* Azure Blob storage
|
| 45 |
+
* Microsoft OneDrive and SharePoint
|
| 46 |
+
* Amazon S3 buckets
|
| 47 |
+
* Amazon EC2 instances and EBS volumes
|
| 48 |
+
* Kubernetes virtual machines
|
| 49 |
+
* Kubernetes protection sets
|
| 50 |
+
* GCP GCE Instance
|
| 51 |
+
* GCP Persistent Disk
|
| 52 |
+
|
Anomaly_Detection_reports_1.md
ADDED
|
@@ -0,0 +1,13 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Anomaly Detection reports
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/ri_reports.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Anomaly Detection reports
|
| 8 |
+
|
| 9 |
+
Anomaly Detection reports provide information about the changes in snapshots for anomaly events. You can also download, save, or delete the reports.
|
| 10 |
+
|
| 11 |
+
The Anomaly Detection report displays information about anomalies detected in the Scanned Objects and Unscannable Objects tab. You can view details, including snapshot date, resource name, resource type, change in byte size, anomaly indicator, number of files added, number of files removed, and number of files modified.
|
| 12 |
+
|
| 13 |
+
You can also download a CSV or PDF file of the report, send the report to an email address, and save or delete the report.
|
CLI_administrator_role_1.md
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# CLI administrator role
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/cdm/cli_administrator_role.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# CLI administrator role
|
| 8 |
+
|
| 9 |
+
As a CLI administrator, a Rubrik cluster user can connect to nodes in Rubrik clusters through the CLI Secure Shell (SSH) protocol.
|
| 10 |
+
|
| 11 |
+
As both an administrator and a CLI administrator, you can assign the CLI administrator role (CliAdminRole) to others who have the administrator role. With that role, they can connect to nodes in the Rubrik cluster through the Secure Shell (SSH) protocol and use the full range of CLI commands.
|
| 12 |
+
|
| 13 |
+
The CLI administrator role cannot be assigned to a username that contains a dot (.) character.
|
| 14 |
+
|
| 15 |
+
Regardless of their assigned roles, only Rubrik CDM local users can connect using SSH. LDAP and SSO users are denied SSH access.
|
Cluster_configuration_considerations_1.md
ADDED
|
@@ -0,0 +1,19 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Cluster configuration considerations
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/rsc_cluster_config_considerations.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Cluster configuration considerations
|
| 8 |
+
|
| 9 |
+
You determine network related settings and capabilities of a Rubrik cluster through the set up task.
|
| 10 |
+
|
| 11 |
+
The initial setup of the cluster involves node discovery, and the configuration of data and management interfaces and services for all the nodes on the cluster. A UI to perform the initial configuration is available through any of the nodes. Alternatively, you can configure the cluster at the command line using the Rubrik CLI.
|
| 12 |
+
|
| 13 |
+
If you have an IPv4 cluster deployment, you can optionally configure VLAN tagging for both the management network and the data network. You can configure VLAN tagging through either the UI or the Rubrik CLI.
|
| 14 |
+
|
| 15 |
+
If your cluster deployment supports encryption of data at rest, Rubrik CDM enables data encryption by default during the initial configuration. You can disable the encryption of data at rest but this must be done through the CLI and should be done before protecting any data. If the encryption of data at rest setting is changed after system setup, a cluster reset is required, which will delete all stored data.
|
| 16 |
+
|
| 17 |
+
The setting for encryption of data at rest is supported only on Brik models that have the hardware Trusted Platform Module (TPM).You will not have this option during setup for Brik models that use hardware data encryption at rest, such as the r6xxxF series Briks.
|
| 18 |
+
|
| 19 |
+
Virtual clusters allow you to configure an encryption password when you enable encryption.
|
Cluster_registration_1.md
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Cluster registration
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/rsc_cluster_registration.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Cluster registration
|
| 8 |
+
|
| 9 |
+
Rubrik offers two modes for registering clusters with Rubrik Security Cloud, online and offline.
|
| 10 |
+
|
| 11 |
+
After configuring a Rubrik cluster, the next required task is to register it through your Rubrik Security Cloud account. Registration is performed over the internet using a web browser.
|
| 12 |
+
|
| 13 |
+
The online registration method uses a secure internet connection from the Rubrik cluster to your Rubrik Security Cloud account to retrieve the registration key. When physical hardware is in use, that hardware must also be available and have access to the network.
|
| 14 |
+
|
| 15 |
+
The offline registration method uses a manual method of retrieving the registration key and providing it to the Rubrik cluster. Offline registration requires access to a web browser for a one-time login to the Rubrik Security Cloud account to retrieve a unique registration key for each cluster. The registration key is valid only for two days from the time it is generated.
|
| 16 |
+
|
| 17 |
+
Either way, the registration process requires signing into your Rubrik Security Cloud account using a web browser on a computer with an internet connection, even when the configuration of the cluster was performed through the CLI. The domain URL of your Rubrik Security Cloud account is available in the Rubrik Welcome email or on the Rubrik Support portal.
|
Comments_and_suggestions_2.md
ADDED
|
@@ -0,0 +1,33 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Comments and suggestions
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/reuse/comments_suggestions.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Comments and suggestions
|
| 8 |
+
|
| 9 |
+
We welcome your comments and suggestions about our products and our product documentation.
|
| 10 |
+
|
| 11 |
+
## Products
|
| 12 |
+
|
| 13 |
+
To provide comments and suggestions about our products contact Rubrik Support, as described in [Support](support.html "Use one of the following methods to contact Rubrik Support.").
|
| 14 |
+
|
| 15 |
+
## Product documentation
|
| 16 |
+
|
| 17 |
+
To provide comments and suggestions about the product documentation, send an email to: [[email protected]](mailto:[email protected]).
|
| 18 |
+
|
| 19 |
+
To help our writers identify the area that you are referencing, include the following requested information.
|
| 20 |
+
|
| 21 |
+
For HTML documentation, include:
|
| 22 |
+
|
| 23 |
+
* Page title
|
| 24 |
+
* Page address
|
| 25 |
+
* Page date
|
| 26 |
+
|
| 27 |
+
For PDF documentation, include:
|
| 28 |
+
|
| 29 |
+
* PDF title
|
| 30 |
+
* Part number
|
| 31 |
+
* Revision
|
| 32 |
+
* Relevant page numbers
|
| 33 |
+
|
Data_Security_Posture_1.md
ADDED
|
@@ -0,0 +1,29 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Data Security Posture
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/dspm/data_security_posture.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Data Security Posture
|
| 8 |
+
|
| 9 |
+
Data Security Posture provides agile data security across multi-cloud environments for posture management and access governance. It also includes threat monitoring and response to protect your data.
|
| 10 |
+
|
| 11 |
+
Organizations have innovated how they use cloud data, but not how they secure it. Users create, copy, share, and move cloud data rapidly. This drastic expansion and replication of data for business advantage protected by traditional data security controls creates a security gap. Data Security Posture provides the capability to effectively manage data security, for data located on premises, in the cloud, or on SaaS applications. This unified approach enables you to define, manage, and monitor policies regardless of where data resides. Rubrik Data Security Posture discovers and classifies all data across all your environments, including managed and self-hosted technologies to provide the following benefits:
|
| 12 |
+
|
| 13 |
+
* Automated data discovery across on-prem, cloud, and SaaS workloads
|
| 14 |
+
* Data classification without impact on production workloads
|
| 15 |
+
* Built-in and customizable data categories and data types
|
| 16 |
+
* Identity inventory showing sensitive data access and blast radius
|
| 17 |
+
* Identification of data at risk and appropriate access remediation
|
| 18 |
+
* User Insights highlighting changes to sensitive data
|
| 19 |
+
* Detection of suspicious data activity
|
| 20 |
+
|
| 21 |
+
Data Security Posture automatically discovers and classifies an extensive range of data detected across your multi-cloud environment while ensuring that sensitive data never leaves your environment. Data Security Posture focuses on the following:
|
| 22 |
+
|
| 23 |
+
* Identifying sensitive and regulated data across your organization
|
| 24 |
+
* Locating objects that have sensitive data and their location and flagging their exposure
|
| 25 |
+
* Detecting violations of your data policy and identifying misconfigured, misplaced, or obsolete data
|
| 26 |
+
* User access to data and remedying access issues
|
| 27 |
+
* Monitoring for allowed access and providing alerts of anomalous activities
|
| 28 |
+
|
| 29 |
+
You can use the insights from Data Security Posture with third-party integrations to maintain a data security environment resilient to external threats.
|
Data_Threat_Analytics_dashboard_1.md
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Data Threat Analytics dashboard
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/dta_dashboard.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Data Threat Analytics dashboard
|
| 8 |
+
|
| 9 |
+
The Data Threat Analytics dashboard provides a comprehensive analysis of data threats including a summary of anomalies, threat monitoring matches, matched threat hunts for protected objects, and object timeline analysis.
|
| 10 |
+
|
| 11 |
+
Widget | Description
|
| 12 |
+
---|---
|
| 13 |
+
Threat Summary | Displays the number of backups completed with the percentage of healthy backups and the following Data Threat Analytics summary:
|
| 14 |
+
|
| 15 |
+
* Anomaly Detection analysis completed and the number of anomalous objects found
|
| 16 |
+
* Threat Monitoring results with the details of the objects scanned for IOCs appear
|
| 17 |
+
* Active threat hunts with the number of matched hunts
|
| 18 |
+
|
| 19 |
+
You can filter the data for the past 24 hours, 7 days, or 30 days.
|
| 20 |
+
Known IOCs | Displays a pie chart of the known IOCs for which Threat Monitoring checks. The chart displays known IOCs divided into file hashes and YARA rules. This widget also displays the time at which the known IOCs were updated.
|
| 21 |
+
Anomaly Detection | Displays the total percentage of anomalous and non-anomalous objects for the past 24 hours, 7 days, and 30 days.
|
| 22 |
+
Threat Monitoring | Displays the total percentage of objects with and without threats for the past 24 hours, 7 days, and 30 days.This widget is visible when Threat Monitoring is enabled. Threat Monitoring is available as part of the Rubrik Enterprise edition.
|
| 23 |
+
Timeline Analysis | The chart shows the number of anomalies and threats found over the past 7 days and 30 days.
|
Data_Threat_Analytics_events_1.md
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Data Threat Analytics events
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/ri_events.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Data Threat Analytics events
|
| 8 |
+
|
| 9 |
+
Data Threat Analytics provides filters and real-time search capabilities that can be used to find specific events.
|
| 10 |
+
|
| 11 |
+
When events are enabled, Data Threat Analytics sends an alert email when an anomaly is detected. The alert email contains a link to RSC. Accessing the link allows you to perform further investigation and, if necessary, recover files. The recovery process allows you to replace only the affected data without requiring that you perform a new analysis of the entire data set.
|
| 12 |
+
|
| 13 |
+
Click on a Data Threat Analytics event to view the time line of snapshots taken for a specific time range, examine the file system of a series of snapshots, and determine approximately when the ransomware attack occurred. From this view, select the snapshot with the most recent clean versions of the files that were identified as compromised. Those files can be used as the starting point for file recovery.
|
| 14 |
+
|
| 15 |
+
To support RBAC, CSV file downloads are only available from the Anomalies page and the anomaly details page. When you click Download CSV, RSC prepares a secure link for the file and displays a message about the download. You can also visit the File Preparation Center to access the downloaded file.
|
Downloading_and_installing_Rubrik_CDM_1.md
ADDED
|
@@ -0,0 +1,121 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Downloading and installing Rubrik CDM
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/download_install_cdm_on_appliance_nodes.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Downloading and installing Rubrik CDM
|
| 8 |
+
|
| 9 |
+
Before you set up your Rubrik cluster, you can install a version of Rubrik CDM that is different from the one already installed on the Rubrik appliance nodes. This involves downloading the software, transferring it to one of the nodes, and running the installation.
|
| 10 |
+
|
| 11 |
+
## About this task
|
| 12 |
+
|
| 13 |
+
Rubrik appliance nodes are shipped with a recent major GA release package already installed. However, you will often want to install a more recent version of Rubrik CDM before you set up a new cluster. Or you may want to install a specific version on a new node before you add the node to an existing cluster.
|
| 14 |
+
|
| 15 |
+
## Procedure
|
| 16 |
+
|
| 17 |
+
1. Download the Rubrik CDM installation package from the [Rubrik Support portal](https://support.rubrik.com/) to a computer with network access to the Rubrik appliance nodes.
|
| 18 |
+
|
| 19 |
+
Part of the download process involves accepting the EULA. To be able to read and accept the EULA, you must disable the pop-up blocker setting in your web browser.
|
| 20 |
+
|
| 21 |
+
When downloading a installation package for a new a node that you are adding to a running Rubrik cluster, select the installation package that contains the same version of Rubrik CDM that is on the running Rubrik cluster.
|
| 22 |
+
|
| 23 |
+
2. Unzip the package.
|
| 24 |
+
|
| 25 |
+
The zip file contains an installation zip file and a signature file:
|
| 26 |
+
* rubrik-image-xyz.tar.gz
|
| 27 |
+
* rubrik-image-xyz_tar.gz.sig
|
| 28 |
+
|
| 29 |
+
Where xyz is the release and patch number.
|
| 30 |
+
|
| 31 |
+
3. Use SSH over IPv6 to connect to the node.
|
| 32 |
+
|
| 33 |
+
`ssh -6 admin@node_serial_number.local`
|
| 34 |
+
|
| 35 |
+
Where `node_serial_number` is the serial number of the node. You can retrieve the serial number of the cluster node from the sticker attached to the node or by connecting directly to the node and running network ifconfig from the Rubrik CLI.
|
| 36 |
+
|
| 37 |
+
4. At the username prompt, enter `admin`.
|
| 38 |
+
5. At the password prompt, enter `rubrik`.
|
| 39 |
+
|
| 40 |
+
The Rubrik CLI prompt appears.
|
| 41 |
+
|
| 42 |
+
6. In the SSH session, enter the version-dependent command to view the IP address of the node.
|
| 43 |
+
|
| 44 |
+
For Rubrik CDM version 5.0.4 and later, enter:
|
| 45 |
+
|
| 46 |
+
network ifconfig
|
| 47 |
+
|
| 48 |
+
For versions of Rubrik CDM earlier than 5.0.4, enter:
|
| 49 |
+
|
| 50 |
+
ifconfig bond0
|
| 51 |
+
|
| 52 |
+
Keep the SSH session open to use later in this task.
|
| 53 |
+
|
| 54 |
+
If cluster setup was previously run on the node, the IP address that appears will be an IPv4 address. If this is the first time you are configuring the node, the IP address will be an IPv6 address. The command also displays the interface name.
|
| 55 |
+
|
| 56 |
+
7. In a new terminal session, use SFTP to connect to the new node.
|
| 57 |
+
|
| 58 |
+
For an IPv6 address, at the prompt, enter:
|
| 59 |
+
|
| 60 |
+
sftp adminstaging@[ipv6address]%interface
|
| 61 |
+
|
| 62 |
+
Where ipv6address is the IPv6 address and interface is the interface name determined in a previous step. For example:
|
| 63 |
+
|
| 64 |
+
sftp adminstaging@[fe80::ae1f:6bff:fe55:8c77]%bond0
|
| 65 |
+
|
| 66 |
+
For an IPv4 address, at the prompt, enter:
|
| 67 |
+
|
| 68 |
+
sftp adminstaging@ipv4address
|
| 69 |
+
|
| 70 |
+
Where ipv4address is the IPv4 address determined in a previous step. For example:
|
| 71 |
+
|
| 72 |
+
sftp [email protected]
|
| 73 |
+
|
| 74 |
+
8. When prompted, enter the password.
|
| 75 |
+
|
| 76 |
+
The password is `rubrik`.
|
| 77 |
+
|
| 78 |
+
9. Use SFTP to upload the installation package to the node.
|
| 79 |
+
|
| 80 |
+
At the prompt, enter:
|
| 81 |
+
|
| 82 |
+
put install-package /upgrade/
|
| 83 |
+
|
| 84 |
+
Where install-package is the name of the installation package.
|
| 85 |
+
|
| 86 |
+
10. Use SFTP to upload the signature file to the node.
|
| 87 |
+
|
| 88 |
+
At the prompt, enter:
|
| 89 |
+
|
| 90 |
+
put sig-file /upgrade/
|
| 91 |
+
|
| 92 |
+
Where sig-file is the name of the signature file.
|
| 93 |
+
|
| 94 |
+
11. Return to the SSH session and start the software installation.
|
| 95 |
+
|
| 96 |
+
Enter:
|
| 97 |
+
|
| 98 |
+
cluster install start
|
| 99 |
+
|
| 100 |
+
A list of available versions of the CDM software appears.
|
| 101 |
+
|
| 102 |
+
12. When prompted, enter the number assigned to the software version that you want to install.
|
| 103 |
+
|
| 104 |
+
A list of the available nodes appears.
|
| 105 |
+
|
| 106 |
+
13. When prompted, select the number assigned to a node that you want the software installed on.
|
| 107 |
+
|
| 108 |
+
The installation script installs the software on the selected node and displays the list of nodes again, with an asterisk by the entry for each node that has the software successfully installed.
|
| 109 |
+
|
| 110 |
+
14. Repeat the previous step until all of the nodes that you want the software on are listed with an asterisk.
|
| 111 |
+
15. **Optional:** To view the installation log, enter:
|
| 112 |
+
|
| 113 |
+
`support log_view installer.log`
|
| 114 |
+
|
| 115 |
+
## Results
|
| 116 |
+
|
| 117 |
+
The installation script installs the selected software on all of the selected nodes.
|
| 118 |
+
|
| 119 |
+
## What to do next
|
| 120 |
+
|
| 121 |
+
After successfully completing the software installation process, perform the system setup task.
|
Downloading_quarantined_files_for_forensic_analysis_1.md
ADDED
|
@@ -0,0 +1,46 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Downloading quarantined files for forensic analysis
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/downloading_quarantined_files_analysis.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Downloading quarantined files for forensic analysis
|
| 8 |
+
|
| 9 |
+
Download quarantined files to examine and analyze them for malicious content.
|
| 10 |
+
|
| 11 |
+
## Before you begin
|
| 12 |
+
|
| 13 |
+
Ensure that you have a user account with permissions to add files to quarantine and remove files from quarantine.
|
| 14 |
+
|
| 15 |
+
## Procedure
|
| 16 |
+
|
| 17 |
+
1. Log in to RSC.
|
| 18 |
+
2. Click and select **Data Threat Analytics**.
|
| 19 |
+
|
| 20 |
+
The Data Threat Analytics dashboard appears.
|
| 21 |
+
|
| 22 |
+
3. Click Hunts.
|
| 23 |
+
|
| 24 |
+
The Hunts page displays the completed and in-progress threat hunts with details about the matches found and their impact.
|
| 25 |
+
|
| 26 |
+
4. Click the threat hunt of interest.
|
| 27 |
+
|
| 28 |
+
If added to quarantine, the quarantined objects are listed along with details of their location, files matched, and match type.
|
| 29 |
+
|
| 30 |
+
5. Click an object to view the files in that object.
|
| 31 |
+
6. Select the files to download.
|
| 32 |
+
7. Click and select Download For Forensics.
|
| 33 |
+
|
| 34 |
+
The Download for Forensics dialog box appears.
|
| 35 |
+
|
| 36 |
+
8. **Optional:** Click the snapshot column to choose any other non-expired snapshot containing the file.
|
| 37 |
+
|
| 38 |
+
By default, the Download For Forensics wizard selects the latest non-expired snapshot for each file.
|
| 39 |
+
|
| 40 |
+
9. Click Download.
|
| 41 |
+
|
| 42 |
+
Downloading the files can be dangerous if these files are malicious. Exercise caution to keep your systems safe.
|
| 43 |
+
|
| 44 |
+
## Results
|
| 45 |
+
|
| 46 |
+
RSC downloads the files as specified.
|
Getting_started_with_RSC_1.md
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Getting started with RSC
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/common/getting_started_with_rsc.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Getting started with RSC
|
| 8 |
+
|
| 9 |
+
To start using Rubrik Security Cloud, add authorized user accounts before adding Rubrik clusters.
|
| 10 |
+
|
| 11 |
+
Rubrik sets up the initial user account for the RSC domain and sends an email invitation to the primary owner from this account. After setting up the initial user account, the owner can invite other users to set up accounts on the domain.
|
| 12 |
+
|
| 13 |
+
Any user account in the RSC domain with cluster-management permissions can add Rubrik clusters to the domain.
|
| 14 |
+
|
| 15 |
+
RSC uses HTTPS to transmit data between RSC and Rubrik clusters. RSC requires that each Rubrik cluster enable outbound port 443 in both firewall and proxy settings.
|
Guidelines_for_choosing_a_strong_password_1.md
ADDED
|
@@ -0,0 +1,34 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Guidelines for choosing a strong password
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/guidelines_strong_password.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Guidelines for choosing a strong password
|
| 8 |
+
|
| 9 |
+
When choosing a password, you are required to follow the guidelines recommended by Rubrik to set a strong password that is difficult to guess or extract through a password cracker application, but is something that is easy to remember.
|
| 10 |
+
|
| 11 |
+
When choosing a password, the goal is to make it difficult to guess but easy to remember.
|
| 12 |
+
|
| 13 |
+
Rubrik recommends avoiding passwords with the following criteria:
|
| 14 |
+
|
| 15 |
+
* Single words that can be found in a dictionary.
|
| 16 |
+
* Common passwords, such as passw0rd, letmein, or abc123.
|
| 17 |
+
* Repeated characters, such as aaaa or 2222.
|
| 18 |
+
* Character sequences, such as abcd or 1234.
|
| 19 |
+
* L33t speak, where numbers and symbols are used in place of letters, for example, 3 for e, @ for a, and $ for s.
|
| 20 |
+
* Patterns made up of adjacent keys on a keyboard, such as qwerty or ujm.
|
| 21 |
+
|
| 22 |
+
You are required to incorporate the following characteristics to make a password difficult to guess but easy to remember:
|
| 23 |
+
|
| 24 |
+
* Long strings (up to 1000 characters) of uncommon, unrelated words combined in a sequence, such as CorrectHorseBreadStaple. Rubrik clusters do not support passwords longer than 1000 characters.
|
| 25 |
+
* Unexpected caPitalizAtion.
|
| 26 |
+
* Numbers at the beginning or middle of the password or distributed throughout the password.
|
| 27 |
+
|
| 28 |
+
As most users put a number at the end of their password, you must increase unpredictability by putting it at the beginning or in the middle, or distributing numbers throughout the password.
|
| 29 |
+
|
| 30 |
+
* A series of short keyboard patterns with lots of turns.
|
| 31 |
+
|
| 32 |
+
A turn corresponds to a change of direction on the keyboard from one character to the next. A turn can also refer to the gap between pattern segments in the password.
|
| 33 |
+
|
| 34 |
+
To make the password easy to remember, you can try a long password (up to 1000 characters) made up of a series of dictionary words that are not commonly combined in a sequence, and include one or more numbers.
|
Identities_in_Identity_Resilience_1.md
ADDED
|
@@ -0,0 +1,32 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Identities in Identity Resilience
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/identity_resilience/ir_identitites.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Identities in Identity Resilience
|
| 8 |
+
|
| 9 |
+
The identities page in Identity Resilience provides visibility into identities discovered in your environment.
|
| 10 |
+
|
| 11 |
+
The Identities page within Identity Resilience provides a centralized and comprehensive view of all identities, both human and non-human, across your hybrid identity environment. This page is crucial for understanding the identity landscape and assessing associated risks.
|
| 12 |
+
|
| 13 |
+
The Identities page offers a high-level summary of total identities discovered and the number of identities in your hybrid identity environment.
|
| 14 |
+
|
| 15 |
+
RSC organizes identities into distinct categories, accessible through tabs for focused analysis:
|
| 16 |
+
|
| 17 |
+
* All Identities: Displays a complete list of every discovered identity.
|
| 18 |
+
* Users: Focuses specifically on human user accounts.
|
| 19 |
+
* Groups: Lists security and distribution groups.
|
| 20 |
+
* Service Accounts: Highlights non-human identities often used by applications and services such as Group Managed Service Accounts (gMSA), Standalone Managed Service Accounts (sMSA), and enterprise apps.
|
| 21 |
+
|
| 22 |
+
The Identities page is important for:
|
| 23 |
+
|
| 24 |
+
* Visibility: Gaining a complete inventory of all identities and their characteristics.
|
| 25 |
+
* Identity insights: Quickly identifying identities that are at risk, privileged, or have access to highly sensitive data.
|
| 26 |
+
|
| 27 |
+
Note:
|
| 28 |
+
|
| 29 |
+
The highly sensitive data is available only if you have the DSPM license enabled.
|
| 30 |
+
|
| 31 |
+
* Policy enforcement: Understanding which identities violate defined security policies.
|
| 32 |
+
|
Identity_Resilience_1.md
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Identity Resilience
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/identity_resilience/identity_resilience.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Identity Resilience
|
| 8 |
+
|
| 9 |
+
Rubrik Identity Resilience secures, monitors, and recovers the Identity Providers.
|
| 10 |
+
|
| 11 |
+
Identity Resilience in Rubrik Security Cloud (RSC) offers protection services for identities in hybrid environments and safeguards the identity infrastructure in an organization. Identities, both human and non-human, are the most common entry points for cyberattacks, and any form of compromise in the identity infrastructure can cripple the ability of an organization to recover from a breach.
|
| 12 |
+
|
| 13 |
+
Identity Resilience comprises security and recovery of identities in your hybrid identity infrastructure. Identity Resilience requires purchasing the Rubrik Identity Resilience License.
|
| 14 |
+
|
| 15 |
+
Identity Resilience provides extensive capabilities, including protection, active risk identification, and robust remediation. It simplifies managing complexities in hybrid identity environments and addresses the increasing instances of cyberattacks, thereby minimizing the risks of identity compromise and data breaches. Additionally, it offers real-time monitoring to detect critical changes with Active Directory (AD), including modifications to privileged group membership and Group Policy Objects (GPOs). This enables immediate awareness of crucial security events.
|
| 16 |
+
|
| 17 |
+
Identity Resilience provides automated, clean-room recovery, enabling swift restoration of compromised identities, and minimizes downtime. It also proactively mitigates risks by identifying risky privilege escalations and problematic access combinations. When combined with Data Security Posture Management (DSPM), Identity Resilience provides a holistic view of both data and identity, significantly strengthening the overall data security posture.
|
Identity_Resilience_reports_1.md
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Identity Resilience reports
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/identity_resilience/ir_reports.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Identity Resilience reports
|
| 8 |
+
|
| 9 |
+
The Identity Resilience Reports page offers comprehensive analytics and actionable insights into your identity security posture. It provides various report templates for protection status, identity violations, audit trails, and operational activities across Identity Providers.
|
| 10 |
+
|
| 11 |
+
The Reports page in Rubrik Identity Resilience serves as the central hub for generating and managing analytical reports that provide deep insights into your identity security posture, protection status, and operational activities across your hybrid identity environments. This feature is crucial for compliance, auditing, risk assessment, and demonstrating the effectiveness of your identity resilience strategy.
|
| 12 |
+
|
| 13 |
+
The page aggregates various reporting capabilities, allowing administrators to access predefined reports relevant to their specific needs. RSC organizes reports into categories, enabling users to quickly navigate to relevant areas of interest.
|
| 14 |
+
|
| 15 |
+
You can generate the following reports for Identity Resilience:
|
| 16 |
+
|
| 17 |
+
* Protection
|
| 18 |
+
* Protection Tasks Details
|
| 19 |
+
* Object Capacity
|
| 20 |
+
* SLA Audit
|
| 21 |
+
* Object Audit
|
| 22 |
+
* Recovery Tasks Details
|
| 23 |
+
* Event
|
| 24 |
+
* Identity Violations
|
| 25 |
+
|
| 26 |
+
The Identity Violations report analyzes various identity-related security risks.
|
| 27 |
+
|
| 28 |
+
The reports can transform raw operational and security data from your identity infrastructure into digestible, insightful formats, empowering organizations to make data-driven decisions regarding their identity resilience posture.
|
Identity_summary_1.md
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Identity summary
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/identity_resilience/ir_identity_summary.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Identity summary
|
| 8 |
+
|
| 9 |
+
RSC provides a summary of an individual identity and insights about various components of an identity.
|
| 10 |
+
|
| 11 |
+
The identity summary overview page provides a detailed, centralized view of different aspects of a specific identity and activity within your hybrid environment. It serves as a single source for deep-dive investigations into any user, group, or service account. It also displays the essential attributes such as identity type, unique identifier, and current status.
|
| 12 |
+
|
| 13 |
+
## Identity summary graph
|
| 14 |
+
|
| 15 |
+
A dynamic graph illustrates the relationships of a specific identity within the environment and highlights immediate security concerns. This includes summarized insights such as risk status, privilege levels, and authentication posture, along with real-time counts of identity violations and alerts.
|
| 16 |
+
|
| 17 |
+
For privileged identities, the graph also provides insights into their associated privileged memberships or roles.
|
| 18 |
+
|
| 19 |
+
## Policy Violations
|
| 20 |
+
|
| 21 |
+
The policy violations widget displays details of the violations associated with the identity and categorizes the violations based on severity.
|
| 22 |
+
|
| 23 |
+
On the right, specific policy violations associated with the identity are detailed. This provides direct insight into non-compliance, alongside information about its data access by sensitivity, if available.
|
| 24 |
+
|
| 25 |
+
## Snapshot Based Vulnerabilities Summary
|
| 26 |
+
|
| 27 |
+
RSC provides a time-series trend graph that visually tracks the vulnerabilities or overall security posture of an identity over time. This allows administrators to observe historical trends, identify changes, and assess improvements or deteriorations in security state of the identity.
|
| 28 |
+
|
| 29 |
+
RSC updates the vulnerabilities graph using the snapshot of the Identity Provider (IdP) object. When there are multiple snapshots of the IdP object in a day, the graph is updated only once after the last snapshot.
|
| 30 |
+
|
| 31 |
+
## Data Access by Sensitivity
|
| 32 |
+
|
| 33 |
+
Note:
|
| 34 |
+
|
| 35 |
+
This requires a DSPM license.
|
| 36 |
+
|
| 37 |
+
The data access by sensitivity widget provides information about the access to sensitive data, categorized by its sensitivity level. When data is available, it offers insights into the potential blast radius if the identity were compromised, based on data context.
|
Jumbo_frame_support_1.md
ADDED
|
@@ -0,0 +1,31 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Jumbo frame support
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/cdm/jumbo_frame_support.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Jumbo frame support
|
| 8 |
+
|
| 9 |
+
For Rubrik CDM versions 9.4 and later, you can set the value for the maximum transmission unit to a maximum value of 10000, instead of the default value of 1500. This larger unit size is called jumbo frames.
|
| 10 |
+
|
| 11 |
+
You can use the Rubrik CLI to set the maximum transmission units (MTUs) for Rubrik CDM versions 9.4 and later to a maximum of 10000 bytes instead of the default value of 1500 bytes. This larger MTU size, called jumbo frames, provides a more efficient and much faster network throughput. The typical value for jumbo frames is 9000.
|
| 12 |
+
|
| 13 |
+
Rubrik supports changing the MTU value for a Rubrik cluster only on bootstrapped physical machines, but not on cloud clusters. Changing the MTU is a cluster-wide parameter. If you set the MTU value on a node for an interface, this value applies to all the nodes in the cluster for that interface. If the Rubrik cluster includes a VLAN interface, this interface inherits the MTU value from the corresponding parent interface.
|
| 14 |
+
|
| 15 |
+
Changes to the MTU value are persisted across:
|
| 16 |
+
|
| 17 |
+
* Node and cluster reboots
|
| 18 |
+
* Cluster upgrades
|
| 19 |
+
* Node additions
|
| 20 |
+
|
| 21 |
+
The MTU value from the Rubrik cluster is applied to the added node.
|
| 22 |
+
|
| 23 |
+
* Node replacement
|
| 24 |
+
|
| 25 |
+
The MTU value from Rubrik cluster is applied to the replacement node.
|
| 26 |
+
|
| 27 |
+
Changes to the MTU value are not persisted across:
|
| 28 |
+
|
| 29 |
+
* Node resets
|
| 30 |
+
* Operations that change the IP address
|
| 31 |
+
|
Key_features_of_Identity_Resilience_1.md
ADDED
|
@@ -0,0 +1,46 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Key features of Identity Resilience
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/identity_resilience/ir_key_features.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Key features of Identity Resilience
|
| 8 |
+
|
| 9 |
+
RSC provides unified identity management, identity protection, and identity security for human and non-human identities in hybrid identity environments.
|
| 10 |
+
|
| 11 |
+
Rubrik Identity Resilience is a critical product offering designed to provide comprehensive security and recovery for the identity infrastructure in hybrid identity environments.
|
| 12 |
+
|
| 13 |
+
The key features of Identity Resilience include:
|
| 14 |
+
|
| 15 |
+
## Hybrid identity protection and recovery
|
| 16 |
+
|
| 17 |
+
* Scope: Secures identities in complex hybrid setups.
|
| 18 |
+
* Automated discovery and protection: RSC automatically discovers AD domains, domain controllers (including FSMO roles, DNS, DHCP services), and Microsoft Entra ID tenants and objects for streamlined protection.
|
| 19 |
+
* Recovery: Offers automated, orchestrated recovery workflows to restore AD domain controllers, AD forests, and Microsoft Entra ID tenants quickly after attacks, reducing downtime.
|
| 20 |
+
* Clean-room recovery: Restores AD identities in a secure, isolated environment to prevent attacks by malware or persistent threats.
|
| 21 |
+
* SLA-based management: Applies defined SLA Domains for consistent backup frequency, retention, replication, and archival policies across your identity infrastructure.
|
| 22 |
+
* Granular restoration: Recovers specific AD or Microsoft Entra ID objects, such as users, groups, and service accounts, without full system rollback.
|
| 23 |
+
* Simplified process: Reduces manual recovery steps and accelerates restoration.
|
| 24 |
+
|
| 25 |
+
## Real-time monitoring and alerts
|
| 26 |
+
|
| 27 |
+
* Tamper-resistant monitoring: Provides real-time tracking of critical changes within AD.
|
| 28 |
+
* Privilege change tracking: Monitors additions or removals of users and groups from privileged AD groups, flagging potential escalations or unauthorized de-provisioning.
|
| 29 |
+
* GPO modification alerts: Immediately identifies and alerts on any changes to Group Policy Objects (GPOs), which are critical for maintaining security configurations.
|
| 30 |
+
* Notifications: Enables management of notification channels and email alerts for detected events.
|
| 31 |
+
* Rapid response: Enables early detection and faster response to identity-based threats.
|
| 32 |
+
|
| 33 |
+
## Comprehensive risk analysis
|
| 34 |
+
|
| 35 |
+
* Unified visibility: Provides a single dashboard to monitor human identities, such as user accounts and groups, and non-human identities, such as service accounts.
|
| 36 |
+
* Risk detection: Utilizes risk policies aimed at detecting security gaps across your identity and identity infrastructure configurations, enabling proactive remediation.
|
| 37 |
+
* Actionable remediation: Detects security violations and provides workflows to drive their remediation through IT Service Management (ITSM) integration, remediation guidance, and in-app remediation actions to close security gaps directly from RSC.
|
| 38 |
+
|
| 39 |
+
## Identity and data context integration
|
| 40 |
+
|
| 41 |
+
This requires a DSPM license.
|
| 42 |
+
|
| 43 |
+
* Holistic view: Combines identity and sensitive data context for better prioritization of identity risks, identifies highly sensitive identities that require additional security measures, and assesses the potential blast radius of a compromised identity.
|
| 44 |
+
* Time-series data: Tracks identity and access changes over time for continuous monitoring and historical analysis.
|
| 45 |
+
* Enhanced threat investigation: Correlates identity risks with data access patterns to identify and respond to threats faster.
|
| 46 |
+
|
Legal_Notices_2.md
ADDED
|
@@ -0,0 +1,29 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Legal Notices
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/reuse/notices.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Legal Notices
|
| 8 |
+
|
| 9 |
+
## Copyright
|
| 10 |
+
|
| 11 |
+
Copyright © 2025 Rubrik, Inc.
|
| 12 |
+
|
| 13 |
+
All rights reserved. This document may be used free of charge. Selling without prior written consent is prohibited. Obtain permission before redistributing. In all cases, this copyright notice and disclaimer must remain intact.
|
| 14 |
+
|
| 15 |
+
THE CONTENTS OF THIS DOCUMENT ARE PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR TITLE; THAT THE CONTENTS OF THE DOCUMENT ARE SUITABLE FOR ANY PURPOSE; THAT THE IMPLEMENTATION OF SUCH CONTENTS WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS.
|
| 16 |
+
|
| 17 |
+
COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE DOCUMENT OR THE PERFORMANCE OR IMPLEMENTATION OF THE CONTENTS THEREOF.
|
| 18 |
+
|
| 19 |
+
## Trademarks
|
| 20 |
+
|
| 21 |
+
Registered in the U.S. Trademark Office
|
| 22 |
+
|
| 23 |
+
Rubrik, the Rubrik graphic, and Datos IO are registered trademarks of Rubrik, Inc. in the U.S. and other countries.
|
| 24 |
+
|
| 25 |
+
## Data Security Posture Legal Notices
|
| 26 |
+
|
| 27 |
+
By using the Data Security Posture application, you understand and acknowledge that the pre-existing Policies and Analyzers of Data Security Posture contain general suggestions for data elements and formats based on common data sets and formats. The suggested data elements and formats in Data Security Posture are not intended to be a comprehensive or exhaustive list of data elements and formats regulated by the GDPR, CCPA or any other applicable laws and regulations. We also do not guarantee that your Data Security Posture search results will include every instance of each data element and format within your data set. We strongly recommend that you consult legal counsel for specific advice regarding compliance with applicable laws and regulations.
|
| 28 |
+
|
| 29 |
+
Data Security Posture is designed to assist customers with identifying certain data elements and formats and should not be solely relied upon to identify all data elements and formats of a certain type for any purpose, including legal or compliance.
|
Polaris_to_RSC_upgrade_1.md
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Polaris to RSC upgrade
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/upgrade_to_rubrik_security_cloud.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Polaris to RSC upgrade
|
| 8 |
+
|
| 9 |
+
Rubrik Security Cloud provides a unified user interface to manage all your Rubrik tasks.
|
| 10 |
+
|
| 11 |
+
Upgrading to Rubrik Security Cloud (RSC) provides:
|
| 12 |
+
|
| 13 |
+
* Global dashboard for an overview of data health and security
|
| 14 |
+
* Data Security Command Center (DSCC) to identify security gaps and provide recommendations for improving data security status
|
| 15 |
+
* Cluster dashboard offering meaningful insights into individual cluster health
|
| 16 |
+
* Unified user interface for managing all data center, cloud, and SaaS workloads
|
| 17 |
+
* Global search capability across RSC
|
| 18 |
+
* Ability to create and schedule custom reports or use predefined reports
|
| 19 |
+
|
| 20 |
+
When you login to the Polaris web UI, a dialog box appears on the screen, prompting you to upgrade to the RSC experience. The upgrade dialog box provides an overview of the RSC upgrade and its capabilities. The dialog box does not prevent you from performing any operations. To learn more about the upgrade, you can watch the overview video or refer to the RSC upgrade documentation.
|
| 21 |
+
|
| 22 |
+
The RSC upgrade is instantaneous and does not need any scheduled downtime. Rubrik cluster backups will continue as configured. Once upgraded, you can use RSC for daily operations. You can also upgrade SLA Domains created on a Rubrik cluster to RSC SLA Domains as required for centralized management.
|
| 23 |
+
|
| 24 |
+
Limitations of RSC management are as follows:
|
| 25 |
+
|
| 26 |
+
* Configuring the two-person rule (TPR) for changes or actions cannot be completed using RSC. These actions require Rubrik CDM workflows.
|
| 27 |
+
* Adding NAS systems managed in Rubrik CDM to RSC will trigger a new full backup and cause duplicate data protection of the NAS system. You can add the NAS host to RSC when the storage overhead is acceptable or continue to manage NAS hosts using Rubrik CDM.
|
| 28 |
+
|
Quarantine_overview_1.md
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Quarantine overview
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/quarantine.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Quarantine overview
|
| 8 |
+
|
| 9 |
+
The Quarantine feature in Data Threat Analytics isolates potentially malicious files or objects to allow seamless data recovery and to avoid reinfection.
|
| 10 |
+
|
| 11 |
+
Data recovery risks restoring malware, ransomware, or other unwanted applications. To restore data rapidly without compromising the recovered systems, you must:
|
| 12 |
+
|
| 13 |
+
* Restore to a pre-malware infection state.
|
| 14 |
+
* Restore only uninfected files.
|
| 15 |
+
|
| 16 |
+
By quarantining the snapshots that contain malware, you can quickly isolate potentially malicious files and identify healthy snapshots to use for performing a full system restore.
|
| 17 |
+
|
| 18 |
+
## Quarantine operation and file version
|
| 19 |
+
|
| 20 |
+
When you quarantine a file from a threat hunt or Threat Monitoring match, the system creates a quarantine operation. A quarantine operation is expressed as the unique combination of the object, file path, and file version. This operation fundamentally blocks the recovery of a specific file version. The file version is defined by its modification time (MTime). The MTime is a unique metadata stamp that records the exact date and time the file was last modified on the source object. This precision ensures you block the recovery of the specific malicious content that existed at that exact point in time.
|
| 21 |
+
|
| 22 |
+
The quarantine operation applies to that specific file version across all existing and future snapshots for that object, including any replica and archival copies. This is the recommended behavior, as the operation uses file version metadata to automatically apply the quarantine to all current and future snapshots. If the file is modified and its MTime changes, the new version is not covered by the original operation.
|
| 23 |
+
|
| 24 |
+
Note:
|
| 25 |
+
|
| 26 |
+
In some cases, if the file version information is unavailable, such as with older Threat Monitoring matches or a threat hunt performed on Rubrik clusters running a version earlier than 9.2.3, the system will fall back to a limited quarantine scope that only affects the specific snapshots where the match was detected. To initiate the recommended full-scope quarantine for such a file, run a new threat hunt on the object to ensure the necessary file version metadata is populated, and then quarantine the file again.
|
| 27 |
+
|
| 28 |
+
## Quarantine processing and recovery restrictions
|
| 29 |
+
|
| 30 |
+
It is important to understand the following concepts regarding the quarantine mechanism and their impact on recovery:
|
| 31 |
+
|
| 32 |
+
* Quarantine scope: Quarantining a file implicitly quarantines the file path and the snapshot. The operation applies to all snapshots, including future snapshots of the object that contain the relevant file path and version.
|
| 33 |
+
* Quarantine processing: When an object has active quarantine operations, RSC processes every snapshot to determine if the relevant file version exists. Until this process is complete, the snapshot is marked as Quarantine processing. Recovery is automatically blocked for any snapshot in this state.
|
| 34 |
+
|
| 35 |
+
Snapshots are marked as Quarantine processing in two primary cases:
|
| 36 |
+
|
| 37 |
+
* When a new snapshot first arrives at RSC, if the associated object has any active quarantine operations. Processing of the new snapshot usually completes in seconds to minutes, but can take up to 30 minutes in certain conditions.
|
| 38 |
+
* When a new quarantine operation or a remove from quarantine operation is applied to the object. All snapshots are temporarily reset to the Quarantine processing status and reprocessed. Processing of all affected snapshots usually completes in seconds to minutes, but can take up to 30 minutes in certain conditions.
|
| 39 |
+
|
| 40 |
+
Recovery block: Quarantining a file or object blocks all image-level recovery options for the affected snapshot, including Live Mount, Export, and Instant Recovery. The following exceptions apply:
|
| 41 |
+
|
| 42 |
+
* Exception for forensics: The quarantined data remains accessible for security operations only by using the password-protected Download for Forensics feature.
|
| 43 |
+
* RBAC override: This recovery block is automatically bypassed for users who have the Recover From Quarantine RBAC permission.
|
| 44 |
+
|
| 45 |
+
## Supported workloads
|
| 46 |
+
|
| 47 |
+
RSC supports quarantining on the following objects:
|
| 48 |
+
|
| 49 |
+
* VMware virtual machines
|
| 50 |
+
* Linux filesets
|
| 51 |
+
* Windows filesets
|
| 52 |
+
* Nutanix AHV virtual machines
|
| 53 |
+
* Hyper-V virtual machines
|
| 54 |
+
* Volume groups
|
| 55 |
+
* NAS filesets
|
| 56 |
+
* Kubernetes virtual machines
|
| 57 |
+
* Kubernetes protection sets
|
| 58 |
+
|
| 59 |
+
Using the Quarantine feature requires access to the Data Protection dashboard, the Data Threat Analytics dashboard, and either the threat hunt or Threat Monitoring feature. For detailed instructions on how to configure user permissions, refer to the [RBAC Permissions for Quarantine](rbac_permissions_for_quarantine.html "RBAC privileges are required to remove files or objects from quarantine, bypass quarantine, and download files for forensic analysis.") topic.
|
Quarantining_matched_files_or_objects_1.md
ADDED
|
@@ -0,0 +1,45 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Quarantining matched files or objects
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/quarantining_matched_objects_or_files.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Quarantining matched files or objects
|
| 8 |
+
|
| 9 |
+
Quarantine a matched file or object indicated in a threat hunt to separate potentially malicious objects or files before proceeding with recovery.
|
| 10 |
+
|
| 11 |
+
## Before you begin
|
| 12 |
+
|
| 13 |
+
Ensure that you have a user account with permissions to add files to quarantine and remove files from quarantine.
|
| 14 |
+
|
| 15 |
+
## Procedure
|
| 16 |
+
|
| 17 |
+
1. Log in to RSC.
|
| 18 |
+
2. Click and select **Data Threat Analytics**.
|
| 19 |
+
|
| 20 |
+
The Data Threat Analytics dashboard appears.
|
| 21 |
+
|
| 22 |
+
3. Click Hunts.
|
| 23 |
+
|
| 24 |
+
The Hunts page displays the completed and in-progress threat hunts with details about the matches found and their impact.
|
| 25 |
+
|
| 26 |
+
4. Click the threat hunt of interest.
|
| 27 |
+
|
| 28 |
+
Quarantined objects are listed with details of their location, files matched, and match type.
|
| 29 |
+
|
| 30 |
+
5. **Optional:** Click an object to view the files in that object.
|
| 31 |
+
6. Select items at the object or file level and click Quarantine.
|
| 32 |
+
|
| 33 |
+
Matched files are quarantined only on the snapshots where they were matched in the threat hunt and cannot be recovered. When the file exists in a previous or later snapshot, it might still be recoverable.
|
| 34 |
+
|
| 35 |
+
Quarantining a file implicitly quarantines the snapshot. Snapshots with a matched file have limited recovery options unless they are removed from quarantine.
|
| 36 |
+
|
| 37 |
+
The Quarantine Objects wizard shows the files selected for quarantine.
|
| 38 |
+
|
| 39 |
+
7. In the Quarantine Objects wizard, click Quarantine.
|
| 40 |
+
|
| 41 |
+
When the total request size exceeds the limit, you can make further selections on a subsequent request.
|
| 42 |
+
|
| 43 |
+
## Results
|
| 44 |
+
|
| 45 |
+
RSC quarantines the file and provides no recovery options in any quarantined snapshot until the file is removed from quarantine. Users with the Recover From Quarantine permission can still download the file for forensics or perform image-level recovery options for the snapshot.
|
RBAC_privileges_for_quarantine_1.md
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# RBAC privileges for quarantine
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/rbac_permissions_for_quarantine.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# RBAC privileges for quarantine
|
| 8 |
+
|
| 9 |
+
RBAC privileges are required to remove files or objects from quarantine, bypass quarantine, and download files for forensic analysis.
|
| 10 |
+
|
| 11 |
+
All Data Threat Analytics users can view quarantined objects and files. Additional threat containment privileges are required to:
|
| 12 |
+
|
| 13 |
+
* Add files to quarantine and remove files from quarantine
|
| 14 |
+
* Bypass quarantine and continue with recovery, and download for forensics
|
| 15 |
+
|
| 16 |
+
You can assign additional threat containment privileges from the Users and Roles page. The administrator and owner roles are assigned these privileges by default. You can also assign these additional privileges to custom roles.
|
| 17 |
+
|
| 18 |
+
Privilege | Description
|
| 19 |
+
---|---
|
| 20 |
+
Add files to quarantine and remove files from quarantine | Users with this privilege can add files to quarantine and remove files from quarantine. The administrator and owner roles are assigned this privilege by default and this privilege can also be assigned to custom roles.
|
| 21 |
+
Recover quarantined files and snapshots | Users with this privilege can bypass quarantine and perform most recoveries for:
|
| 22 |
+
|
| 23 |
+
* Image-level recoveries such as Live Mount, Export, and Instant Recovery
|
| 24 |
+
* File-level recoveries from the Hunts page
|
| 25 |
+
|
| 26 |
+
Users can only download quarantined files or folders containing quarantined files. Other file recovery options are not available for quarantined files.
|
| 27 |
+
|
| 28 |
+
All users with permission to view a workload in the Data Protection room can view the snapshots quarantined for that workload, as well as the files quarantined in a particular snapshot, in the Data Protection object details page.
|
RSC_Data_Threat_Analytics_1.md
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# RSC Data Threat Analytics
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/ri_ransomware_monitoring.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# RSC Data Threat Analytics
|
| 8 |
+
|
| 9 |
+
RSC Data Threat Analytics provides Anomaly Detection and data recovery services on protected resources.
|
| 10 |
+
|
| 11 |
+
Data Threat Analytics comprises Anomaly Detection, Threat Monitoring, Threat Hunting, and data recovery services on protected resources.
|
| 12 |
+
|
| 13 |
+
Anomaly Detection identifies and analyzes anomaly events that can indicate a ransomware attack. When an attack is discovered, you can use Anomaly Detection to directly recover the original data. Anomaly Detection works in combination with other data security methods to provide an additional layer of protection.
|
| 14 |
+
|
| 15 |
+
For each protected object, Anomaly Detection captures the changes in file system behavior and file content behavior that occur between snapshots. Anomaly Detection analyzes this information and provides a view of the changed behavior and changed content over time, when an incident has occurred. RSC retains the history of the metadata tracked by Data Threat Analytics for 30 days.
|
| 16 |
+
|
| 17 |
+
Anomaly Detection does not support deep scanning for encryption for NAS Direct Archive.
|
RSC_Orchestrated_Application_Recovery_1.md
ADDED
|
@@ -0,0 +1,32 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# RSC Orchestrated Application Recovery
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/oar.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# RSC Orchestrated Application Recovery
|
| 8 |
+
|
| 9 |
+
The Orchestrated Application Recovery feature automates end-to-end recovery as well as disaster recovery and application migration from an on-premises data center to a secondary recovery site.
|
| 10 |
+
|
| 11 |
+
Orchestrated Recovery uses Recovery Plans to group virtual machines for proactive testing and reporting and for production recovery situations. RSC creates Recovery Plans for a group of virtual machines and their associated target resource specifications for recovery. Orchestrated Recovery options to recover objects using a Recovery Plan include the following:
|
| 12 |
+
|
| 13 |
+
* Disaster recovery
|
| 14 |
+
* Cyber recovery
|
| 15 |
+
* In-place recovery
|
| 16 |
+
|
| 17 |
+
You can also initiate a cyber recovery as needed without a Recovery Plan by using the Cyber Recovery wizard.
|
| 18 |
+
|
| 19 |
+
Orchestrated Recovery supports the following recovery types. You can filter for a recovery point based on Anomaly Detection and Quarantine results.
|
| 20 |
+
|
| 21 |
+
You can use Orchestrated Recovery for the following workloads:
|
| 22 |
+
|
| 23 |
+
* VMware virtual machines
|
| 24 |
+
* AHV virtual machines
|
| 25 |
+
* Azure virtual machines
|
| 26 |
+
|
| 27 |
+
Only Cyber recovery is available for Azure virtual machines.
|
| 28 |
+
|
| 29 |
+
* AWS EC2 instances
|
| 30 |
+
|
| 31 |
+
Only Cyber recovery is available for AWS EC2 instances.
|
| 32 |
+
|
Removing_a_quarantined_file_or_object_1.md
ADDED
|
@@ -0,0 +1,44 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Removing a quarantined file or object
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/removing_quarantined_file_or_object.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Removing a quarantined file or object
|
| 8 |
+
|
| 9 |
+
Remove a quarantined file or object to make it available for recovery.
|
| 10 |
+
|
| 11 |
+
## Before you begin
|
| 12 |
+
|
| 13 |
+
Ensure that you have a user account with permissions to add files to quarantine and remove files from quarantine.
|
| 14 |
+
|
| 15 |
+
## Procedure
|
| 16 |
+
|
| 17 |
+
1. Log in to RSC.
|
| 18 |
+
2. Click and select **Data Threat Analytics**.
|
| 19 |
+
|
| 20 |
+
The Data Threat Analytics dashboard appears.
|
| 21 |
+
|
| 22 |
+
3. Click Hunts.
|
| 23 |
+
|
| 24 |
+
The Hunts page displays the completed and in-progress threat hunts with details about the matches found and their impact.
|
| 25 |
+
|
| 26 |
+
4. Click the threat hunt of interest.
|
| 27 |
+
|
| 28 |
+
When added to quarantine, the quarantined objects are listed with details of the location, files matched, and match type.
|
| 29 |
+
|
| 30 |
+
5. **Optional:** Click an object to view the files in that object.
|
| 31 |
+
6. Select items for quarantining at the object or file level.
|
| 32 |
+
7. Click select Remove from Quarantine.
|
| 33 |
+
|
| 34 |
+
Releasing the selected files from quarantine removes the restrictions placed on those files. All matched snapshots in the threat hunt that contain the selected files then have full recovery options.
|
| 35 |
+
|
| 36 |
+
The Remove from Quarantine wizard shows the files you selected for removal from quarantine.
|
| 37 |
+
|
| 38 |
+
8. In the Remove from Quarantine wizard, enter `REMOVE` to confirm and then click Remove.
|
| 39 |
+
|
| 40 |
+
When the total request size exceeds the limit, you can make further selections on a subsequent request.
|
| 41 |
+
|
| 42 |
+
## Results
|
| 43 |
+
|
| 44 |
+
RSC removes the selected objects from quarantine and makes the object available for recovery.
|
Rubrik_CDM_software_upgrade_1.md
ADDED
|
@@ -0,0 +1,36 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik CDM software upgrade
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/rbk_cdm_software_upgrade.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Rubrik CDM software upgrade
|
| 8 |
+
|
| 9 |
+
To take advantage of the latest features and improvements, you can upgrade your Rubrik CDM software running on your Rubrik clusters to the latest version.
|
| 10 |
+
|
| 11 |
+
An upgrade is an operation for updating an older software version to a newer version, representing significant changes or improvements. Rubrik CDM software upgrades offer considerable changes and new functionality over previous versions, effectively superseding them.
|
| 12 |
+
|
| 13 |
+
Some key advantages of upgrading your Rubrik CDM software to the latest version are as follows:
|
| 14 |
+
|
| 15 |
+
* Maintaining business continuity and preventing unnecessary failures.
|
| 16 |
+
* Benefiting from essential security updates, new features, and integration with current technology trends and advancements, giving your business a competitive advantage.
|
| 17 |
+
* Safeguarding your systems and applications from viruses, spyware, and other malicious software that can harm or steal data or cause lengthy delays in problem resolution.
|
| 18 |
+
* Enhancing the quality of user experiences.
|
| 19 |
+
|
| 20 |
+
If you are considering upgrading your Rubrik CDM software, Rubrik recommends that you evaluate the latest version available. Rubrik maintains a comprehensive Compatibility Matrix document that outlines which systems, protocols, and interfaces are supported for each product release. You can also check the Release Notes for the latest CDM software version to learn about new features, enhancements, and resolved issues. This way, you can ensure you are making the best choice for your needs.
|
| 21 |
+
|
| 22 |
+
Rubrik follows the N-2 lifecycle policy, which supports the three most recent major releases (N, N-1, and N-2) of Rubrik CDM software. Each major release comes with a minimum support duration of 18 months. The Rubrik CDM Software Support Lifecycle documentation provides more information about the lifecycle policy.
|
| 23 |
+
|
| 24 |
+
The Rubrik CDM Upgrades page provides all the information you need to make an informed decision about upgrading the CDM software. Some critical pieces of information you can gather include:
|
| 25 |
+
|
| 26 |
+
* Checking the installed CDM software versions for your Rubrik clusters.
|
| 27 |
+
* Opening the Rubrik CDM Releases table to view details about the major release, its release notes, release adoption, release dates, latest minor release, Rubrik CDM software support policy, and Compatibility Matrix documentation.
|
| 28 |
+
|
| 29 |
+
After you have decided to upgrade the Rubrik CDM software, you need to consider:
|
| 30 |
+
|
| 31 |
+
* Choosing between a rolling upgrade and a fast upgrade.
|
| 32 |
+
* Reviewing the list of prerequisites and prechecks for your chosen upgrade type and ensuring you fulfill them for a successful upgrade.
|
| 33 |
+
* Selecting RSC or Rubrik CLI to perform the upgrade.
|
| 34 |
+
|
| 35 |
+
Rubrik does not support using CLI commands to upgrade Rubrik clusters to the Rubrik CDM software version 9.0 or later.
|
| 36 |
+
|
Rubrik_MFA_with_TOTP_1.md
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik MFA with TOTP
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/common/rsc_rmfa_totp.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Rubrik MFA with TOTP
|
| 8 |
+
|
| 9 |
+
The Rubrik two-step verification feature uses time-based one-time passwords in addition to the user login credentials to enforce multi-factor authentication on user accounts.
|
| 10 |
+
|
| 11 |
+
Rubrik two-step verification is an implementation of 2FA for Rubrik Security Cloud (RSC). You can enable Rubrik two-step verification to use 2FA mediated by time-based one-time password (TOTP), which provides an additional layer of authentication security. By using TOTP, Rubrik enforces multi-factor authentication (MFA) with the help of a single-use numeric code in addition to your login credentials. You can use an application running on your personal device, for example a smart phone, to generate the single-use numeric code. Rubrik two-step verification works with any TOTP application that complies with RFC 6238.
|
| 12 |
+
|
| 13 |
+
MFA enforcement is mandatory for all local RSC user accounts. Administrators must enforce Rubrik two-step verification for users at the global level. When enforced, each user must configure Rubrik two-step verification on an individual basis.
|
| 14 |
+
|
| 15 |
+
Note:
|
| 16 |
+
|
| 17 |
+
MFA enforcement does not impact user accounts authenticated through SAML-based SSO authentication providers.
|
Rubrik_Security_Cloud_-_Offline_Recovery_1.md
ADDED
|
@@ -0,0 +1,283 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik Security Cloud - Offline Recovery
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/latest/offrec/index.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
[Rubrik CDM offline recovery](offrec/rubrik_offrec_or.html)
|
| 8 |
+
|
| 9 |
+
In the unlikely event of a service disruption between the Rubrik cluster and RSC, Rubrik CDM version 9.2 and later can switch between running in recovery mode and in fully functional, read-write mode.
|
| 10 |
+
|
| 11 |
+
[Logging in to Rubrik cluster](offrec/logging_in_off_rec.html)
|
| 12 |
+
|
| 13 |
+
Log in to Rubrik cluster to recover workloads when RSC is
|
| 14 |
+
|
| 15 |
+
[Logging out of the Rubrik cluster](offrec/logging_out_rsc_offrec_or.html)
|
| 16 |
+
|
| 17 |
+
Log out of the Rubrik cluster.
|
| 18 |
+
|
| 19 |
+
[Live Mounts in the Rubrik cluster](offrec/live_mounts_offrec.html)
|
| 20 |
+
|
| 21 |
+
The Rubrik cluster displays a list of Live Mounts that are available for workload recovery.
|
| 22 |
+
|
| 23 |
+
[The Rubrik cluster Events page](offrec/offrec_events_page.html)
|
| 24 |
+
|
| 25 |
+
The Events page displays the events of the Rubrik cluster.
|
| 26 |
+
|
| 27 |
+
[Viewing the Rubrik cluster inventory](offrec/viewing_rsc_offline_recovery_inventory.html)
|
| 28 |
+
|
| 29 |
+
View the workloads inventory included with the Rubrik cluster.
|
| 30 |
+
|
| 31 |
+
[SMB security in the Rubrik cluster](offrec/smb_security_or.html)
|
| 32 |
+
|
| 33 |
+
With the SMB security, the Rubrik cluster provides security for SMB shares by requiring Active Directory authentication and enforcing SMB security.
|
| 34 |
+
|
| 35 |
+
[Cyber Event Lockdown in Rubrik cluster](offrec/cyber_event_lockdown_or.html)
|
| 36 |
+
|
| 37 |
+
When a suspected cyber attack, ransomware attack, or other event affecting data integrity impacts your environment, you can use Cyber Event Lockdown on the Rubrik cluster to protect the data.
|
| 38 |
+
|
| 39 |
+
[Cluster details page in the Rubrik cluster](offrec/cluster_details_page_or.html)
|
| 40 |
+
|
| 41 |
+
Information about Rubrik clusters and their configurations.
|
| 42 |
+
|
| 43 |
+
[Viewing the cluster settings in the Rubrik cluster](offrec/viewing_the_cluster_settings.html)
|
| 44 |
+
|
| 45 |
+
View the cluster settings for the Rubrik cluster.
|
| 46 |
+
|
| 47 |
+
[Changing the cluster settings in the Rubrik cluster](offrec/changingl_cluster_settings.html)
|
| 48 |
+
|
| 49 |
+
Change the general cluster settings for the Rubrik cluster.
|
| 50 |
+
|
| 51 |
+
[Changing the network settings in the Rubrik cluster](offrec/changing_network_settings.html)
|
| 52 |
+
|
| 53 |
+
Change the network settings for the Rubrik cluster.
|
| 54 |
+
|
| 55 |
+
[Adding an NTP server to a Rubrik cluster](offrec/adding_ntp_server_cdm.html)
|
| 56 |
+
|
| 57 |
+
Add an NTP server to the Rubrik cluster for network time synchronization.
|
| 58 |
+
|
| 59 |
+
[Adding a VLAN to a Rubrik cluster](offrec/adding_vlan_cdm.html)
|
| 60 |
+
|
| 61 |
+
Add a VLAN to the Rubrik cluster for a logical segmentation of networks.
|
| 62 |
+
|
| 63 |
+
[Deleting a VLAN from a Rubrik cluster](offrec/deleting_vlans_offrec_or.html)
|
| 64 |
+
|
| 65 |
+
Delete a VLAN if multiple VLANs are associated with a Rubrik cluster.
|
| 66 |
+
|
| 67 |
+
[Pause and resume protection activity](offrec/pause_protection_activity_or.html)
|
| 68 |
+
|
| 69 |
+
When you are performing maintenance activities on a Rubrik cluster, you can temporarily pause the protection activity and then resume it by using the pause and resume protection activity feature.
|
| 70 |
+
|
| 71 |
+
[Support tunnel for Rubrik cluster](offrec/support_tunnels_or.html)
|
| 72 |
+
|
| 73 |
+
Support tunnel allows authorized Rubrik Support engineers to gain secure, logged access to Rubrik clusters for diagnosis and resolution of hardware and software issues.
|
| 74 |
+
|
| 75 |
+
[Checking RSC connectivity](offrec/checking_rsc_connectivity.html)
|
| 76 |
+
|
| 77 |
+
Check the connectivity between RSC and the Rubrik cluster.
|
| 78 |
+
|
| 79 |
+
[Creating a support bundle on Rubrik cluster](offrec/creating_a_support_bundle.html)
|
| 80 |
+
|
| 81 |
+
Create a support bundle that Rubrik Support can use to evaluate any issues that occur during offline workload recovery.
|
| 82 |
+
|
| 83 |
+
[Adding a static route in Rubrik cluster](offrec/adding_routing_table_cluster_or.html)
|
| 84 |
+
|
| 85 |
+
Add a static route for a network destination in Rubrik cluster with other network details such as netmask, gateway, and interface for efficient network routing and better performance.
|
| 86 |
+
|
| 87 |
+
[Deleting a static route from the Rubrik cluster](offrec/deleting_static_route_cluster_or.html)
|
| 88 |
+
|
| 89 |
+
Delete an unnecessary static route from the routing table on Rubrik cluster.
|
| 90 |
+
|
| 91 |
+
[Node Management](offrec/node_management_or.html)
|
| 92 |
+
|
| 93 |
+
You can use Rubrik cluster to optimize the performance of the cluster nodes by adding nodes and setting up or removing disks.
|
| 94 |
+
|
| 95 |
+
[Rubrik cluster workloads](offrec/offrec_workloads.html)
|
| 96 |
+
|
| 97 |
+
Rubrik cluster securely manages and protects data from a wide variety of workload types.
|
| 98 |
+
|
| 99 |
+
[File systems](offrec/filesystems/fs_filesystems_or.html)
|
| 100 |
+
|
| 101 |
+
Rubrik cluster provides management and protection of file system data on supported Linux, Unix, and Windows hosts through filesets.
|
| 102 |
+
|
| 103 |
+
[SQL Server databases](offrec/mssql/sql_server_databases_or.html)
|
| 104 |
+
|
| 105 |
+
A Rubrik cluster provides data management and protection for Microsoft SQL Server databases.
|
| 106 |
+
|
| 107 |
+
[AHV virtual machines](offrec/nutanix_ahv/virtual_machines_or.html)
|
| 108 |
+
|
| 109 |
+
Rubrik cluster provides data management and protection for virtual machines deployed in a Nutanix Acropolis environment.
|
| 110 |
+
|
| 111 |
+
[Managed Volumes and SLA Managed Volumes](offrec/managed_volumes/mv_managed_volumes_sla_managed_volumes_or.html)
|
| 112 |
+
|
| 113 |
+
Managed Volumes in Rubrik cluster protect and manage data while SLA Managed Volumes schedule and initiate backups using an SLA Domain.
|
| 114 |
+
|
| 115 |
+
[On-premises Active Directory](offrec/on_prem_ad/on_prem_active_directory_or.html)
|
| 116 |
+
|
| 117 |
+
You can protect and recover on-premises Active Directory domains by using the protection services offered by Rubrik cluster.
|
| 118 |
+
|
| 119 |
+
[NAS systems on Rubrik cluster](offrec/nas/nas_systems_or.html)
|
| 120 |
+
|
| 121 |
+
Rubrik cluster manages and protects NFS and SMB shares on NAS systems for efficient data storage and retrieval.
|
| 122 |
+
|
| 123 |
+
[Oracle databases on Rubrik cluster](offrec/oracle/oracle_databases_rsc_or.html)
|
| 124 |
+
|
| 125 |
+
You an use Rubrik cluster to back up, archive, replicate, and recover Oracle databases.
|
| 126 |
+
|
| 127 |
+
[VMware Cloud Director vApps](offrec/vcd/vmware_cloud_director_vapps_or.html)
|
| 128 |
+
|
| 129 |
+
The Rubrik cluster provides SLA Domain protection and data management for VMware Cloud Director vApps.
|
| 130 |
+
|
| 131 |
+
[Hyper-V virtual machines](offrec/hyper_v/hyperv_vm_or.html)
|
| 132 |
+
|
| 133 |
+
The Rubrik cluster provides data management and protection for virtual machines that are deployed in a Microsoft Hyper-V environment. the Rubrik cluster can manage and protect virtual machines in an environment with multiple Hyper-V servers and virtual machines.
|
| 134 |
+
|
| 135 |
+
[vSphere virtual machines](offrec/vsphere/vs_virtual_machines_or.html)
|
| 136 |
+
|
| 137 |
+
Rubrik cluster provides data management and SLA Domain protection for virtual machines that are deployed in a VMware vSphere environment.
|
| 138 |
+
|
| 139 |
+
[vCenter management](offrec/vsphere/vs_vcenter_management_or.html)
|
| 140 |
+
|
| 141 |
+
The Rubrik cluster accesses virtual machine data through a connection with the VMware vCenter Server that manages the hypervisor running the virtual machine.
|
| 142 |
+
|
| 143 |
+
[Windows volume groups](offrec/wvg/windows_volume_groups_or.html)
|
| 144 |
+
|
| 145 |
+
A volume group is a Rubrik workload comprised of at least one data storage volume on a Windows host.
|
| 146 |
+
|
| 147 |
+
[Archiving of data center workloads](offrec/archival/arch_dc_workloads_or.html)
|
| 148 |
+
|
| 149 |
+
With a Rubrik cluster, you can recover your data from your data center archival locations in the event of a disaster or cyber event.
|
| 150 |
+
|
| 151 |
+
[Archival Locations](offrec/archival/arch_loc_page_or.html)
|
| 152 |
+
|
| 153 |
+
The Archival Locations page provides summary information about existing archival locations on the Rubrik cluster.
|
| 154 |
+
|
| 155 |
+
[Connecting as a reader to the Rubrik cluster archival location](offrec/conn_as_reader_or_arch_loc.html)
|
| 156 |
+
|
| 157 |
+
Connect to an Rubrik cluster archival location as a reader to recover snapshot data.
|
| 158 |
+
|
| 159 |
+
[Disaster recovery using an archival location](offrec/archival/disaster_rec_using_arch_loc_or.html)
|
| 160 |
+
|
| 161 |
+
Rubrik CDM supports recovering data from an existing archival location using a different Rubrik cluster than the Rubrik cluster that archived the data.
|
| 162 |
+
|
| 163 |
+
[Azure archival locations](offrec/archival/arch_azure_or.html)
|
| 164 |
+
|
| 165 |
+
With Rubrik cluster, you can connect as a reader to an existing Azure archival storage to read existing data to perform a recovery during a service disruption. The Azure archival storage was previously configured from a different Rubrik cluster.
|
| 166 |
+
|
| 167 |
+
[Amazon S3 archival locations](offrec/archival/arch_amazon_s3_or.html)
|
| 168 |
+
|
| 169 |
+
With Rubrik cluster, you can connect as a reader to an existing Azure archival storage to read existing data to perform a recovery during a service disruption. The Amazon S3 archival storage was previously configured from a different Rubrik cluster.
|
| 170 |
+
|
| 171 |
+
[Google Cloud Platform archival locations](offrec/archival/arch_gcp_or.html)
|
| 172 |
+
|
| 173 |
+
With the Rubrik cluster, you can connect as a reader to an existing Azure archival storage to read existing data to perform a recovery during a service disruption. The Google Cloud Platform archival storage was previously configured from a different Rubrik cluster.
|
| 174 |
+
|
| 175 |
+
[NFS archival locations](offrec/archival/nfs_arch_loc_or.html)
|
| 176 |
+
|
| 177 |
+
An NFS archival location is storage on an NFS server where you can archive snapshots from your Rubrik cluster. You must identify a specific location on the NFS server to serve as the archival location.
|
| 178 |
+
|
| 179 |
+
[Object Store archival locations](offrec/archival/obj_store_archival_locations_or.html)
|
| 180 |
+
|
| 181 |
+
With Rubrik cluster, you can connect as a reader to an existing Object Store archival storage configured from another cluster to read existing data to perform a recovery during a service disruption.
|
| 182 |
+
|
| 183 |
+
[QStar tape archive](offrec/archival/archiving_qstar_tape_archive_or.html)
|
| 184 |
+
|
| 185 |
+
QStar tape archive enables the Rubrik cluster to store data on tape for long-term retention and regulatory compliance using QStar Archive Manager on Windows servers.
|
| 186 |
+
|
| 187 |
+
[User accounts for Rubrik cluster](offrec/security/security_or.html)
|
| 188 |
+
|
| 189 |
+
Rubrik cluster provides RBAC and several methods for authenticating a user account.
|
| 190 |
+
|
| 191 |
+
[Authentication for Rubrik cluster](offrec/security/cdm_authentication_or.html)
|
| 192 |
+
|
| 193 |
+
The Rubrik cluster authenticates all login attempts.
|
| 194 |
+
|
| 195 |
+
[Local authentication for Rubrik cluster](offrec/security/local_authentication_or.html)
|
| 196 |
+
|
| 197 |
+
Local authentication methods control access to local accounts on the Rubrik cluster.
|
| 198 |
+
|
| 199 |
+
[Roles for Rubrik cluster](offrec/security/roles_or.html)
|
| 200 |
+
|
| 201 |
+
Roles help define privileges for user accounts on a Rubrik cluster. With the admin account, you can assign administrator roles that grant varying access permissions to user accounts for specific purposes.
|
| 202 |
+
|
| 203 |
+
[Requirements for BIND user credentials for Rubrik cluster](offrec/security/requirements_for_bind_user_credentials_or.html)
|
| 204 |
+
|
| 205 |
+
Rubrik CDM has specific requirements for BIND credentials.
|
| 206 |
+
|
| 207 |
+
[LDAP authentication for Rubrik cluster](offrec/security/ldap_authentication_or.html)
|
| 208 |
+
|
| 209 |
+
The Rubrik cluster uses LDAP to authenticate users who log in through the Rubrik cluster welcome screen.
|
| 210 |
+
|
| 211 |
+
[Single Sign-on for Rubrik cluster](offrec/security/single_signon_or.html)
|
| 212 |
+
|
| 213 |
+
Rubrik CDM supports single sign-on using the Security Assertion Markup Language 2.0 standard.
|
| 214 |
+
|
| 215 |
+
[ADFS integration workflow for Rubrik cluster](offrec/security/cdm_adfs_integration_workflow_or.html)
|
| 216 |
+
|
| 217 |
+
The workflow gives a high-level view of the tasks involved in configuring single sign-on with ADFS.
|
| 218 |
+
|
| 219 |
+
[Okta integration workflow for Rubrik cluster](offrec/security/okta_sso_integration_workflow_or.html)
|
| 220 |
+
|
| 221 |
+
The Okta integration workflow gives a high-level view of the tasks involved in configuring single sign-on with Okta.
|
| 222 |
+
|
| 223 |
+
[Multifactor authentication for Rubrik cluster](offrec/security/multifactor_auth_or.html)
|
| 224 |
+
|
| 225 |
+
Multifactor authentication is the practice of adding more factors to the basic authentication process. By using multifactor authentication, you can prevent unauthorized users from accessing your Rubrik clusters.
|
| 226 |
+
|
| 227 |
+
[Certificate management for Rubrik cluster](offrec/security/certificate_management_or.html)
|
| 228 |
+
|
| 229 |
+
Rubrik cluster Certificate Management provides a centralized dashboard to manage certificates for Rubrik cluster workflows.
|
| 230 |
+
|
| 231 |
+
[Rubrik MFA with TOTP for Rubrik cluster](offrec/security/cdm_rmfa_totp_or.html)
|
| 232 |
+
|
| 233 |
+
Rubrik MFA for Rubrik clusters uses time-based one-time passwords to provide secure authentication for local and LDAP users. Rubrik MFA does not apply for users authenticated via SAML-based SSO integrations.
|
| 234 |
+
|
| 235 |
+
[CLI administrator role for Rubrik cluster](offrec/security/cli_administrator_role_or.html)
|
| 236 |
+
|
| 237 |
+
As a CLI administrator, a Rubrik cluster user can connect to nodes in Rubrik clusters through the CLI SSH protocol.
|
| 238 |
+
|
| 239 |
+
[Rubrik port specifications](ports/rubrik_port_specifications.html)
|
| 240 |
+
|
| 241 |
+
Information about the ports that Rubrik clusters use.
|
| 242 |
+
|
| 243 |
+
[Additional network requirements](ports/additional_network_requirement.html)
|
| 244 |
+
|
| 245 |
+
To provide IPMI management information, Rubrik nodes must be able to receive packets sent from a local ping program.
|
| 246 |
+
|
| 247 |
+
[Archiving ports](ports/archiving_ports.html)
|
| 248 |
+
|
| 249 |
+
The Rubrik cluster requires a number of outbound ports for archiving.
|
| 250 |
+
|
| 251 |
+
[Azure ports](ports/azure_ports.html)
|
| 252 |
+
|
| 253 |
+
Configure the following ports for Azure virtual machines.
|
| 254 |
+
|
| 255 |
+
[GCP ports](ports/gcp_ports.html)
|
| 256 |
+
|
| 257 |
+
The Rubrik cluster requires specific ports to be configured for GCP virtual machines.
|
| 258 |
+
|
| 259 |
+
[Kubernetes ports](ports/kubernetes_ports.html)
|
| 260 |
+
|
| 261 |
+
The Rubrik cluster requires specific ports to be configured for Kubernetes clusters.
|
| 262 |
+
|
| 263 |
+
[AWS ports](ports/aws_ports.html)
|
| 264 |
+
|
| 265 |
+
The Rubrik cluster requires the following ports to be configured for AWS virtual machines.
|
| 266 |
+
|
| 267 |
+
[Replication port information](ports/replication_port_information.html)
|
| 268 |
+
|
| 269 |
+
Information about the assigned port number and behavior of the replication service. The replication service manages the incoming traffic for the Rubrik replication feature, which directs the management of replica snapshots or backups from a source Rubrik cluster to a target Rubrik cluster.
|
| 270 |
+
|
| 271 |
+
[Legal Notices and additional resources](reuse/notices.html)
|
| 272 |
+
|
| 273 |
+
Rubrik legal notices for this documentation, and topics with additional resources and information.
|
| 274 |
+
|
| 275 |
+
[Legal Notices](reuse/notices.html)
|
| 276 |
+
|
| 277 |
+
[Comments and suggestions](reuse/comments_suggestions.html)
|
| 278 |
+
|
| 279 |
+
We welcome your comments and suggestions about our products and our product documentation.
|
| 280 |
+
|
| 281 |
+
[Support](reuse/support.html)
|
| 282 |
+
|
| 283 |
+
Use one of the following methods to contact Rubrik Support.
|
Rubrik_Security_Cloud_1.md
ADDED
|
@@ -0,0 +1,57 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik Security Cloud
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/index.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
[Setup](install/rsc_cluster_deployment.html)
|
| 8 |
+
|
| 9 |
+
Rubrik CDM software can be installed on many different platforms, both physical and virtual. The software can run on a single node computer and on multiple node computing clusters.
|
| 10 |
+
|
| 11 |
+
[Data Protection](saas/common/getting_started_with_rsc.html)
|
| 12 |
+
|
| 13 |
+
Rubrik Security Cloud - Data Protection provides the core tools and features for protecting, managing, and analyzing your data.
|
| 14 |
+
|
| 15 |
+
[Workloads](rubrik/supported_workloads.html)
|
| 16 |
+
|
| 17 |
+
Rubrik Security Cloud - Data Protection securely manages and protects data from a wide variety of workload types.
|
| 18 |
+
|
| 19 |
+
[Identity Resilience](identity_resilience/identity_resilience.html)
|
| 20 |
+
|
| 21 |
+
Rubrik Identity Resilience is designed to protect, monitor, and recover identities, both human and non-human identities, in hybrid identity environments.
|
| 22 |
+
|
| 23 |
+
[Data Threat Analytics](saas/ri_ransomware_monitoring.html)
|
| 24 |
+
|
| 25 |
+
Rubrik Security Cloud Data Threat Analytics provides anomaly detection and data recovery services on protected resources such as VMware virtual machines, NAS, and Linux and Windows servers.
|
| 26 |
+
|
| 27 |
+
[Data Security Posture](dspm/data_security_posture.html)
|
| 28 |
+
|
| 29 |
+
Rubrik Security Cloud Data Security Posture enables organizations to find specific types of data within the data that has been indexed by Rubrik clusters.
|
| 30 |
+
|
| 31 |
+
[Annapurna](ai/annapurna.html)
|
| 32 |
+
|
| 33 |
+
Annapurna is an enterprise application for querying your protected data. It allows you to create custom chatbots that use advanced language models and retrieval-augmented generation to answer natural language questions about your data.
|
| 34 |
+
|
| 35 |
+
[Orchestrated Application Recovery](saas/oar.html)
|
| 36 |
+
|
| 37 |
+
Rubrik Security Cloud Orchestrated Application Recovery provides disaster recovery and application migration from an on-premises data center to a secondary recovery site.
|
| 38 |
+
|
| 39 |
+
[Ruby](saas-ai/ruby_2.html)
|
| 40 |
+
|
| 41 |
+
Ruby is an AI assistant designed to help you ask natural language questions to better understand and use Rubrik Security Cloud.
|
| 42 |
+
|
| 43 |
+
[GraphQL API Playground](gql/api_playground_2.html)
|
| 44 |
+
|
| 45 |
+
The API Playground is a tool that allows you to browse, explore, and run the GraphQL APIs of Rubrik Security Cloud.
|
| 46 |
+
|
| 47 |
+
[Offline Recovery](https://docs.rubrik.com/en-us/latest/offrec/index.html)
|
| 48 |
+
|
| 49 |
+
In the unlikely event that you cannot connect to Rubrik Security Cloud, you can use the offline recovery UI on your Rubrik clusters to perform basic recovery and maintenance.
|
| 50 |
+
|
| 51 |
+
[Legal Notices and additional resources](reuse/notices.html)
|
| 52 |
+
|
| 53 |
+
Rubrik legal notices for this documentation, and topics with additional resources and information.
|
| 54 |
+
|
| 55 |
+
[Comments and suggestions](reuse/comments_suggestions.html)
|
| 56 |
+
|
| 57 |
+
We welcome your comments and suggestions about our products and our product documentation.
|
Rubrik_Security_Cloud_service_types_1.md
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik Security Cloud service types
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/rsc_service_types.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Rubrik Security Cloud service types
|
| 8 |
+
|
| 9 |
+
Rubrik Security Cloud offers two distinct service types, SaaS mode and software mode, which provide different sets of functionality.
|
| 10 |
+
|
| 11 |
+
Rubrik Security Cloud (RSC) can be configured in SaaS mode or software mode.
|
| 12 |
+
|
| 13 |
+
RSC in SaaS mode provides many benefits through a unified control plane across multiple Rubrik clusters. The benefits of SaaS mode include a common UI, security layer and RBAC, common policy management, and reporting. Rubrik Security Cloud in SaaS mode cannot be converted to the software mode.
|
| 14 |
+
|
| 15 |
+
If Rubrik Security Cloud becomes temporarily unavailable, the Rubrik cluster UI offers a recovery mode to handle critical tasks such as restoring data from a backup.
|
| 16 |
+
|
| 17 |
+
RSC in software mode provides standalone, on-premises access to Rubrik CDM for data protection and recovery. The software mode uses appliances provided by Rubrik or selected compatible hardware. RSC in software mode provides a UI on the Rubrik cluster for your management tasks.
|
Rubrik_Security_Cloud_workloads_1.md
ADDED
|
@@ -0,0 +1,47 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik Security Cloud workloads
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/rubrik/supported_workloads.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Rubrik Security Cloud workloads
|
| 8 |
+
|
| 9 |
+
RSC securely manages and protects data from a wide variety of workload types.
|
| 10 |
+
|
| 11 |
+
Supported workload types:
|
| 12 |
+
|
| 13 |
+
* [Active Directory forest](../adds/active_directory_forest.html "Rubrik Security Cloud offers protection services for the Active Directory forest hierarchy. You can protect and recover the entire forest hierarchy in the event of a disaster or ransomware attack.")
|
| 14 |
+
* [Active Directory domains and domain controllers](../adds/active_directory_domain_dc.html "You can protect and recover Active Directory domains and domain controllers by using the protection services offered by Rubrik Security Cloud.")
|
| 15 |
+
* [AHV virtual machines](../nutanix_ahv/ahv_virtual_machines.html "RSC provides data management and protection for virtual machines deployed in a Nutanix Acropolis environment.")
|
| 16 |
+
* [Amazon Web Services workloads](../saas/aws_workloads.html "RSC protects the following types of Amazon Web Services workloads: EC2 instances, EBS volumes, Amazon S3, Amazon RDS and Aurora databases, and Amazon DynamoDB.")
|
| 17 |
+
* [Azure DevOps](../azure_devops/azr_devops.html "RSC protects the data and resources of Azure DevOps projects and repositories within the Azure DevOps organization.")
|
| 18 |
+
* [Atlassian Jira](../jira/jira.html "To protect your Atlassian Jira data, you can back up and restore data, such as projects, settings, workflows, and issues, in your Jira site .")
|
| 19 |
+
* [File systems](../saas/fs_filesystems.html "RSC provides management and protection of file system data on supported Linux, Unix, and Windows hosts through filesets.")
|
| 20 |
+
* [Google Cloud Platform workloads](../gcp/gcp.html "RSC protects the following types of Google Cloud Platform workloads: Google Compute Engine instances and persistent disks.")
|
| 21 |
+
* [Hyper-V virtual machines](../saas/hyper_v/hyperv_virtual_machines.html "A Rubrik cluster provides data management and protection for virtual machines that are deployed in a Microsoft Hyper-V environment. The Rubrik cluster can manage and protect virtual machines in an environment with multiple Hyper-V servers and virtual machines.")
|
| 22 |
+
* [IBM Db2](../db2/ibm_db2.html "With IBM Db2 workloads, you can automate complex tasks such as database discovery and data protection for managing databases.")
|
| 23 |
+
* [Kubernetes protection](../kubernetes/k8s_workload_protection.html "You can use Kubernetes protection to protect your on-premise or cloud-native Kubernetes clusters using a protection set.")
|
| 24 |
+
* [Managed Volumes and SLA Managed Volumes](../managedvolumes/mv_managed_volumes_sla_managed_volumes.html "Managed Volumes in RSC protect and manage data while SLA Managed Volumes schedule and initiate backups using an SLA Domain.")
|
| 25 |
+
* [Microsoft Azure workloads](../saas/azr_workloads.html "RSC protects the data and resources of Azure virtual machines, Azure managed disks, Azure Blob Storage, and Azure SQL workloads in Azure subscriptions.")
|
| 26 |
+
* [Microsoft 365](../saas/m365.html "Using the data management and protection services offered by Rubrik Security Cloud, you can protect Microsoft 365 data operations.")
|
| 27 |
+
* [Microsoft 365 Backup Storage](../m365_backup_storage/m365_backup_storage.html "With the Microsoft 365 Backup Storage feature, you can back up Microsoft 365 applications such as SharePoint sites, OneDrive user accounts, and Exchange mailboxes. You can also restore large volumes of data during ransomware attacks, accidental deletion, or malicious data deletion and overwrite events.")
|
| 28 |
+
* [Microsoft Dynamics 365](../microsoft_dynamics_365/microsoft_dynamics_365.html "RSC protects the tables and metadata in your Microsoft Dynamics 365 subscription.")
|
| 29 |
+
* [Microsoft Entra ID](../saas/ms_entra_id.html "RSC supports backup and recovery of Microsoft Entra ID.")
|
| 30 |
+
* [Microsoft Exchange Server](../saas/ms_exchange_server.html "Rubrik Security Cloud provides protection for Microsoft Exchange Servers.")
|
| 31 |
+
* [MongoDB workloads](../mongodb/mongodb_workloads.html "Rubrik Security Cloud protects your MongoDB sources, databases, and collections, ensuring optimal storage efficiency and smooth database operations with its advanced security features and strong data protection.")
|
| 32 |
+
* [MySQL](../mysql/mysql.html "RSC protects the MySQL databases from accidental deletions, ransomware attacks, and other potential threats.")
|
| 33 |
+
* [NAS CD data sets](../saas/ncd_data_sets.html "Rubrik NAS Cloud Direct offers secure data protection with high-performance, scalable enterprise backup, and archive services for unstructured file data.")
|
| 34 |
+
* [NAS systems](../nas/nas_systems.html "RSC manages and protects NFS and SMB shares on NAS systems for efficient data storage and retrieval.")
|
| 35 |
+
* [Okta IdP](../okta/okta_idp.html "Rubrik Security Cloud provides protection and recovery for Okta Identity Provider objects. By integrating your Okta tenant with Rubrik, you can leverage a comprehensive set of data protection features designed for security, simplicity, and reliability.")
|
| 36 |
+
* [Oracle databases](../oracle/oracle_databases_rsc.html "You can use RSC to back up, archive, replicate, and recover Oracle databases.")
|
| 37 |
+
* [OpenStack virtual machines](../openstack/openstack_virtual_machines.html "RSC provides data management, SLA Domain protection, and recovery for OpenStack virtual machines.")
|
| 38 |
+
* [PostgreSQL](../postgresql/postgresql.html "Rubrik Security Cloud protects your PostgreSQL cluster by simplifying complex backup and recovery processes, discovering the databases automatically, and protecting data using SLA Domains.")
|
| 39 |
+
* [Salesforce Data Protection](../salesforce/salesforce_management.html "Salesforce Data Protection is a Rubrik-hosted SaaS service that extends RSC by securely backing up your critical Salesforce data and metadata for standard and custom objects.")
|
| 40 |
+
* [SAP HANA databases](../saas/sap_hana_protection.html "RSC enables administrators to implement backup policies on SAP HANA databases running on public clouds and on-premises.")
|
| 41 |
+
* [SnapMirror Cloud](../saas/snapmirror_cloud.html "RSC protects user data replicated by the NetApp SnapMirror Cloud service.")
|
| 42 |
+
* [Microsoft SQL Server databases](../common/sql_server_databases.html "A Rubrik cluster provides data management and protection for Microsoft SQL Server databases.")
|
| 43 |
+
* [VMware Cloud](../vmware_cloud/vmware_cloud.html "A Rubrik Cloud Cluster effectively protects virtual machines deployed on VMware Cloud on AWS, Microsoft Azure VMware Solution, and Google Cloud VMware Engine.")
|
| 44 |
+
* [vSphere virtual machines](../saas/vs_virtual_machines.html "Rubrik Security Cloud provides data management and SLA Domain protection for vSphere virtual machines, including vSphere VM templates that are managed either through a VMware vSphere environment or a content library.")
|
| 45 |
+
* [VMware Cloud Director vApps](../vcd/vmware_cloud_director_vapps.html "The Rubrik cluster provides SLA Domain protection and data management for VMware Cloud Director vApps.")
|
| 46 |
+
* [Windows volume groups](../saas/windows_volume_groups.html "A volume group is a Rubrik workload comprised of at least one data storage volume on a Windows host.")
|
| 47 |
+
|
Rubrik_cluster_deployment_1.md
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Rubrik cluster deployment
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/rsc_cluster_deployment.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Rubrik cluster deployment
|
| 8 |
+
|
| 9 |
+
Deploying a Rubrik cluster running on Rubrik appliance nodes involves installing the CDM software on the nodes and setting up that software for your environment.
|
| 10 |
+
|
| 11 |
+
## Appliance nodes
|
| 12 |
+
|
| 13 |
+
Getting your Rubrik cluster up and running on Rubrik appliance nodes involves the following tasks:
|
| 14 |
+
|
| 15 |
+
* Downloading and installing the Rubrik CDM software
|
| 16 |
+
* Setting up the Rubrik cluster
|
| 17 |
+
* Registering the Rubrik cluster
|
| 18 |
+
|
| 19 |
+
Rubrik appliance nodes come with a recent version of the Rubrik CDM software already preloaded. Rubrik recommends that instead of running your Rubrik cluster with this factory loaded version, you consider downloading and installing the most recent GA version of the CDM software. By doing this you can avoid running multiple upgrades to get the cluster running the latest GA version. However, selecting a Rubrik CDM version that is not preloaded adds approximately 30 minutes to the setup process.
|
| 20 |
+
|
| 21 |
+
Installing and configuring the Rubrik CDM software on a cluster usually involves running the configuration wizard from the UI provided by a node of the cluster. The wizard ensures that all nodes pass the pre-checks and meet the requirement of running the same version of Rubrik CDM before installing and configuring the software.
|
| 22 |
+
|
| 23 |
+
When required, installing and configuring the software can also be done from the Rubrik CLI.
|
| 24 |
+
|
| 25 |
+
After installing the software on all of your nodes, you perform the set up task. The set up task involves configuring each node to operate as part of a cluster. It also involves configuring the nodes with your network preferences.
|
| 26 |
+
|
| 27 |
+
Your last step is registering the new Rubrik cluster. If your Rubrik cluster can connect to your Rubrik Security Cloud (RSC) domain, you can easily register your Rubrik cluster using a web browser. If your Rubrik cluster cannot connect to your RSC domain, you can use the offline method to register the cluster.
|
| 28 |
+
|
| 29 |
+
## Other platforms
|
| 30 |
+
|
| 31 |
+
Supported hardware other than the Rubrik appliance hardware is available from manufacturers such as Dell, Cisco, and Hewlett Packard Enterprise. Rubrik provides hardware-specific installation and configuration guides for each supported platform. These guides are available through the [Rubrik Support portal](https://support.rubrik.com/).
|
| 32 |
+
|
| 33 |
+
The process of installing Rubrik CDM software on virtual instances such as Rubrik Edge, Rubrik Virtual Cluster, and Rubrik Cloud Cluster includes preparing the virtual hardware for those deployments. Rubrik provides documentation for each deployment type through the [Rubrik Support portal](https://support.rubrik.com/).
|
| 34 |
+
|
| 35 |
+
## RSC association
|
| 36 |
+
|
| 37 |
+
After the Rubrik cluster is successfully configured, you establish an association between the Rubrik cluster and Rubrik Security Cloud by registering the cluster using your RSC account.
|
Ruby_2.md
ADDED
|
@@ -0,0 +1,31 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Ruby
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas-ai/ruby_2.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Ruby
|
| 8 |
+
|
| 9 |
+
Ruby is a generative AI assistant that extends Rubrik Security Cloud capabilities. You can interact with Ruby to use and manage RSC security features.
|
| 10 |
+
|
| 11 |
+
Ruby is built on Microsoft Azure Open AI. This Rubrik partnership with Microsoft secures a private entry point into generative AI and ensures that your data remains private. Ruby uses Rubrik threat intelligence information based on machine learning to develop interactive workflows for data recovery during a security incident.
|
| 12 |
+
|
| 13 |
+
Using RSC Data Threat Analytics, Data Security Posture, and Orchestrated Application Recovery, you can detect anomalies, uncover sensitive data, and identify and isolate threats in the environment. Ruby streamlines these multi-step workflows within RSC into a single process, allowing backup administrators to perform security-related tasks and collaborate with security teams.
|
| 14 |
+
|
| 15 |
+
When Threat Monitoring detects an anomaly, you receive a security incident notification. Ruby is then available in the Notifications tab in the Inbox in RSC dashboards to guide you through an integrated and interactive message window. Ruby provides recommendations to remediate the security incident using Sensitive Data Monitoring, Threat Hunting, and Orchestrated Application Recovery.
|
| 16 |
+
|
| 17 |
+
Ruby matches user intent to a defined workflow based on a pre-trained model. The Ruby workflow involves the following:
|
| 18 |
+
|
| 19 |
+
* Viewing the threat details, including the indicators of compromise (IOCs), snapshot location, and time of the snapshot
|
| 20 |
+
* Searching for additional IOCs by using threat hunting
|
| 21 |
+
* Discovering the location of the sensitive data, including violations and the policies and objects impacted. For Microsoft 365 objects, you can also use Ruby to take remedial actions to address the issues identified.
|
| 22 |
+
* Quarantining snapshots that contain potentially malicious files or objects
|
| 23 |
+
* Creating Recovery Plans for data recovery
|
| 24 |
+
|
| 25 |
+
While the notifications in the Inbox on the RSC dashboard are available to all users, Ruby only performs tasks for user accounts with the owner and administrator roles. Ruby recommends actions based on the RBAC permissions of the user account. Actions that do not correlate to user account permissions are not available. Ruby asks for user confirmation before proceeding with any recovery or quarantine action. The audit logs also indicate the user account that confirmed the specific actions performed using Ruby.
|
| 26 |
+
|
| 27 |
+
Ruby is available as part of the Rubrik Enterprise edition. Enabling Ruby requires that Rubrik clusters are running CDM version 9.0.1 or later. For the threat detection and remediation use case, enabling Threat Monitoring is required.
|
| 28 |
+
|
| 29 |
+
Note:
|
| 30 |
+
|
| 31 |
+
Ruby is an AI assistant. AI-generated content may contain errors or inaccuracies. Independent verification of such content is strongly recommended.
|
System_shutdown_1.md
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# System shutdown
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/install/system_shutdown.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# System shutdown
|
| 8 |
+
|
| 9 |
+
A system shutdown can be done from the Rubrik CLI.
|
| 10 |
+
|
| 11 |
+
Typical operation of a Rubrik cluster does not require a system shutdown, but is occasionally necessary for business purposes or at the request of Rubrik Support.
|
Threat_Monitoring_1.md
ADDED
|
@@ -0,0 +1,34 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Threat Monitoring
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/threat_monitoring.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Threat Monitoring
|
| 8 |
+
|
| 9 |
+
Threat Monitoring automatically and continuously scans snapshots for new and existing indicators of compromise, and provides visibility into potential threats.
|
| 10 |
+
|
| 11 |
+
With an initial full scan at feature enablement, followed by incremental scans, Threat Monitoring scans snapshots for threats based on indicators of compromise (IOCs) from multiple threat intelligence sources. Threat Monitoring detects risk early by:
|
| 12 |
+
|
| 13 |
+
* Identifying threat indicators within backups.
|
| 14 |
+
* Accelerating threat investigation.
|
| 15 |
+
* Reducing the threat duration and risk of reinfection during recovery.
|
| 16 |
+
|
| 17 |
+
IOCs provide forensic evidence of potential intrusions on a host system or network. When enabled, Threat Monitoring automatically pushes a threat feed of Yet Another Recursive Acronym (YARA) rules and file hashes every 24 hours to all applicable Rubrik deployments. RSC uses a hash database created during backup indexing to perform the file hash scanning. After the threat feed is downloaded to the Rubrik cluster, subsequent Threat Monitoring jobs start YARA rule analysis using the threat feed details. The threat feed updates periodically to import new intelligence, as available, to identify threats.
|
| 18 |
+
|
| 19 |
+
Threat Monitoring scans executable files in snapshots that are smaller than 15 MB in size. Threat Monitoring scans Windows files that have the following extensions: .acm, .ax, .bat, .cmd, .com, .cpl, .dll, .drv, .efi, .exe, .js, .jse, .msi, .mui, .ocx, .ps1, .psc1, .scr, .sys, .tsp, .vbe, .vbs, .wsf, and .wsh. Threat Monitoring scans only Linux files that have the executable bit set.
|
| 20 |
+
|
| 21 |
+
Threat Monitoring uses two key detection methods:
|
| 22 |
+
|
| 23 |
+
* YARA rule-based detection, which applies pattern-based analysis to identify potential threats, but does not rely on exact file-matching. As a result, YARA rules can sometimes generate false positives, detecting both malicious and benign files under the same logic. To maintain accuracy, RSC continuously monitors, reviews, and refines YARA rules, removing those that generate excessive false positives.
|
| 24 |
+
* Hash-based detection, which uses exact file-matching, ensuring high confidence in identifying known threats.
|
| 25 |
+
|
| 26 |
+
Threat Monitoring uses only file hashes as IOCs to identify threats for Azure virtual machines and managed disks, Microsoft SharePoint and OneDrive objects, AWS EC2 instances and EBS volumes, and GCP GCE instances and persistent disks. For other workloads, Threat Monitoring supports monitoring with both YARA rules and file hashes as IOCs.
|
| 27 |
+
|
| 28 |
+
For Rubrik clusters running CDM version 9.1.3-p2 and later, RSC offers the following capabilities:
|
| 29 |
+
|
| 30 |
+
* Scanning using a full set of YARA rules and file hashes.
|
| 31 |
+
* File hash scanning using a hash database created during backup indexing.
|
| 32 |
+
* Incremental and full scanning of existing data. Incremental scans handle new data, while RSC performs full scans of existing data when IOC updates occur. For example, when hash IOCs are processed against the hash database and new YARA rules are applied to the last completed backups.
|
| 33 |
+
* Retroactively processing IOC updates, as well as up to 100 custom IOCs.
|
| 34 |
+
|
Threat_hunts_1.md
ADDED
|
@@ -0,0 +1,39 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Threat hunts
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/ri_threat_hunts.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Threat hunts
|
| 8 |
+
|
| 9 |
+
On-demand threat hunts scan Rubrik backups for user-defined indicators of compromise and identify the systems potentially affected by an attack.
|
| 10 |
+
|
| 11 |
+
When ransomware attacks happen, it is essential to respond quickly. Identifying which systems were compromised and when indicators of compromise (IOCs) were first present in those systems can be challenging. A threat hunt identifies files that might be at risk by scanning Rubrik backups to find when a compromise related to the attack occurred.
|
| 12 |
+
|
| 13 |
+
Threat hunting is not a pattern-based anti-malware scanner, but an analysis tool for identifying specific IOCs. You can use threat hunt results to identify potentially malicious files and the snapshots in which they were present, avoiding malware reinfection during recovery.
|
| 14 |
+
|
| 15 |
+
Threat hunting employs a full/incremental scanning method in which the initial scan is a full scan, but all subsequent scans are incremental. This reduces the number of files in subsequent scans and reduces the time to scan, optimizing the threat hunt.
|
| 16 |
+
|
| 17 |
+
The presence of IOCs on a system indicates that malware might have compromised the system. You can configure threat hunts with the following key IOCs:
|
| 18 |
+
|
| 19 |
+
* Yet Another Recursive Acronym (YARA) rules, which use scripts that look for certain characteristics to identify malware. YARA rules are available only for advanced threat hunts.
|
| 20 |
+
* File hashes, which use specific file hash values to search for malware (MD5, SHA1, or SHA256).
|
| 21 |
+
* File patterns, which use specific file paths to search for malware. File patterns are available only for advanced threat hunts.
|
| 22 |
+
|
| 23 |
+
RSC limits the number of threat hunts it supports. For each 30-day period, the product of the number of threat hunts and the number of snapshots per threat hunt should be fewer than 10,000.
|
| 24 |
+
|
| 25 |
+
Threat hunting is supported for the following workloads:
|
| 26 |
+
|
| 27 |
+
* VMware, AHV, and Hyper-V virtual machines
|
| 28 |
+
* NAS filesets, excluding NAS Direct Archive filesets
|
| 29 |
+
* Microsoft Windows filesets
|
| 30 |
+
* Linux and Unix filesets
|
| 31 |
+
* Microsoft SharePoint and OneDrive
|
| 32 |
+
* Azure virtual machines, Blob storage, and managed disks
|
| 33 |
+
* AWS EC2 instances, S3 buckets, and EBS volumes
|
| 34 |
+
|
| 35 |
+
Only turbo threat hunts are supported for Azure virtual machines, Blob storage, and managed disks, AWS EC2 instances, S3 buckets, and EBS volumes, Microsoft SharePoint, and OneDrive.
|
| 36 |
+
|
| 37 |
+
* GCP GCE Instances
|
| 38 |
+
* GCP Disks
|
| 39 |
+
|
Viewing_quarantined_files_or_objects_in_threat_hunts_1.md
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Viewing quarantined files or objects in threat hunts
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/saas/viewing_quarantined_files.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Viewing quarantined files or objects in threat hunts
|
| 8 |
+
|
| 9 |
+
You can view threat hunts that have quarantined files or objects as well as the number of impacted snapshots.
|
| 10 |
+
|
| 11 |
+
## Procedure
|
| 12 |
+
|
| 13 |
+
1. Log in to RSC.
|
| 14 |
+
2. Click and select **Data Threat Analytics**.
|
| 15 |
+
|
| 16 |
+
The Data Threat Analytics dashboard appears.
|
| 17 |
+
|
| 18 |
+
3. Click Hunts.
|
| 19 |
+
|
| 20 |
+
The Hunts page displays the completed and in-progress threat hunts with details about the matches found and their impact.
|
| 21 |
+
|
| 22 |
+
4. Select One or More in the Quarantined Matches filter.
|
| 23 |
+
|
| 24 |
+
This allows you to view threat hunts that have multiple quarantined files or objects.
|
| 25 |
+
|
| 26 |
+
## Results
|
| 27 |
+
|
| 28 |
+
Threat hunts with quarantined matches, the number of quarantined files, and the number of impacted objects and snapshots appear.
|
adds_active_directory_domain_dc.md
ADDED
|
@@ -0,0 +1,20 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Active Directory domains and domain controllers
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/active_directory_domain_dc.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Active Directory domains and domain controllers
|
| 8 |
+
|
| 9 |
+
You can protect and recover Active Directory domains and domain controllers by using the protection services offered by Rubrik Security Cloud.
|
| 10 |
+
|
| 11 |
+
Active Directory (AD) is a database that stores user credentials and information about computers and other resources on a network. Hence, AD services are used to authorize and authenticate users to access the resources within a network. By keeping access management within the network, AD provides an extra layer of security, which reduces the risk of unauthorized access.
|
| 12 |
+
|
| 13 |
+
With Rubrik Security Cloud (RSC), you can protect your AD domains by recovering the domain controllers in the event of data threats. Additionally, RSC helps you to identify the changes made to AD objects.
|
| 14 |
+
|
| 15 |
+
You can protect your AD domain controller by performing the following actions:
|
| 16 |
+
|
| 17 |
+
* Installing Rubrik Backup Service (RBS) on a domain controller that you want to protect
|
| 18 |
+
* Adding the domain controller to Rubrik cluster as a Windows host
|
| 19 |
+
* Assigning an SLA Domain
|
| 20 |
+
|
adds_active_directory_forest.md
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Active Directory forest
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/active_directory_forest.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Active Directory forest
|
| 8 |
+
|
| 9 |
+
Rubrik Security Cloud offers protection services for the Active Directory forest hierarchy. You can protect and recover the entire forest hierarchy in the event of a disaster or ransomware attack.
|
| 10 |
+
|
| 11 |
+
Protecting and recovering the entire Active Directory (AD) forest requires purchasing Rubrik Identity Recovery License. RSC supports protection and recovery of an AD forest for Rubrik clusters running Rubrik CDM version 9.2.2 or later. The object and attribute comparison feature also requires the Rubrik Identity Recovery License.
|
| 12 |
+
|
| 13 |
+
An AD forest is the topmost organizational boundary and logical container in an AD environment. It comprises one or more AD domains that share a common schema, configuration, and global catalog, enabling centralized management and coherent structure. Within an AD forest, domains can collaborate through trusted relationships, resource sharing, and unified security policies. This hierarchical framework facilitates the integration of diverse organizational units, users, computers, and policies, ensuring consistent access control and administration across large and complex enterprise networks.
|
| 14 |
+
|
| 15 |
+
AD forest offers several key advantages for managing and organizing directory services in large, complex environments.
|
| 16 |
+
|
| 17 |
+
RSC enables comprehensive recovery and protection of entire AD forest in the event of data threats. Key benefits include centralized domain management and discovery, SLA Domain assignment for protection, and automated recovery processes following best practices recommended by Microsoft. The solution minimizes downtime and mitigates the risk of malware reintroduction. It also enhances security, provides a detailed view of forest hierarchies, and supports various recovery use cases. Additional features include DNS recovery, advanced recovery settings, metadata erasure for unselected domain controllers, and recovery progress tracking.
|
| 18 |
+
|
| 19 |
+
You can protect your AD forest by:
|
| 20 |
+
|
| 21 |
+
* Adding the domain controller to Rubrik cluster as a Windows host: This task ensures that the AD domain controller is part of the Rubrik backup environment.
|
| 22 |
+
* Assigning an SLA Domain at the forest level: This task ensures that all domains within the forest receive the same level of protection.
|
| 23 |
+
|
adds_active_directory_inventory_management.md
ADDED
|
@@ -0,0 +1,20 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Active Directory inventory management
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/active_directory_inventory_management.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Active Directory inventory management
|
| 8 |
+
|
| 9 |
+
The Active Directory inventory provides a summary of the actions involved in protecting the AD domain controllers in RSC. You can manage your domains and domain controllers using the information available in the AD inventory.
|
| 10 |
+
|
| 11 |
+
With RSC, you can manage the domains and domain controllers in the AD inventory page by adding domain controllers to a Rubrik cluster. When you add a domain controller to a Rubrik cluster as a Windows host, RSC discovers the AD domain of the domain controller and the other domain controllers associated with that AD domain and displays them in the AD inventory page. You can start protecting a domain controller by assigning an SLA Domain.
|
| 12 |
+
|
| 13 |
+
AD domains are logical entities that can be used to design a network hierarchy that meets your requirements. AD domain controllers, which are Windows servers running Active Directory, authenticate users and manage access to resources in an AD Domain.
|
| 14 |
+
|
| 15 |
+
Information about all the discovered AD domains and associated domain controllers is displayed in the following tabs:
|
| 16 |
+
|
| 17 |
+
* Domains: This tab displays information about all the discovered AD domains.
|
| 18 |
+
* Domain Controllers: This tab displays information about all the discovered domain controllers.
|
| 19 |
+
|
| 20 |
+
*[ > ]: and then
|
adds_active_directory_snapshots.md
ADDED
|
@@ -0,0 +1,27 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Active Directory snapshots
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/active_directory_snapshots.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Active Directory snapshots
|
| 8 |
+
|
| 9 |
+
RSC protects and manages data by taking snapshots of the domain controller. You can take an on-demand snapshot, or you can configure an SLA Domain to take scheduled snapshots.
|
| 10 |
+
|
| 11 |
+
RSC provides support for on-demand snapshots and scheduled snapshots. Scheduled snapshots are created based on the policies and rules of an assigned SLA Domain.
|
| 12 |
+
|
| 13 |
+
The supported snapshot types are described as follows:
|
| 14 |
+
|
| 15 |
+
* On-demand: Snapshots of AD domain controller that you can take whenever required using the take on-demand snapshot option.
|
| 16 |
+
* Scheduled: Snapshots created on a schedule according to the frequency specified in the SLA Domain. RSC takes scheduled snapshots using the manual snapshot API technology.
|
| 17 |
+
|
| 18 |
+
The SLA Domain feature provides a configurable set of policies that you can apply to domains or domain controllers to achieve specific data protection objectives. The SLA Domain directs when to schedule backups of domain controller data and how long to keep the data.
|
| 19 |
+
|
| 20 |
+
With RSC, you can perform the following actions for snapshots:
|
| 21 |
+
|
| 22 |
+
* Take on-demand snapshots
|
| 23 |
+
* Change the retention policy for snapshots taken
|
| 24 |
+
* Delete the snapshots that have a Forever retention policy
|
| 25 |
+
* Recover the snapshots using the various recovery options RSC offers
|
| 26 |
+
|
| 27 |
+
*[ > ]: and then
|
adds_ad_dc_recovery_options.md
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# AD domain controller recovery options
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/ad_dc_recovery_options.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# AD domain controller recovery options
|
| 8 |
+
|
| 9 |
+
With RSC, you can recover Active Directory domain controller snapshots using either granular recovery or domain controller recovery options.
|
| 10 |
+
|
| 11 |
+
You can take snapshots of the Active Directory (AD) domain controller using scheduled backups or take on-demand snapshots of the domain controller. RSC provides two options for recovering the snapshot information.
|
| 12 |
+
|
| 13 |
+
The following table provides the AD domain controller recovery options. Recovery type | Description
|
| 14 |
+
---|---
|
| 15 |
+
Granular recovery | Recovers the selected objects in an AD. The protected objects include containers, organization units, users, groups, contacts, group policies, and computers.
|
| 16 |
+
Domain controller recovery | Recovers the domain from the selected domain controller and restores it to one of the following destinations:
|
| 17 |
+
|
| 18 |
+
* Restore to alternate host: Recovers the domain controller data to the alternative host that you selected.
|
| 19 |
+
* Restore to original domain controller: Recovers the domain controller data to the same domain controller by replacing the information with the selected snapshot information.
|
| 20 |
+
* Restore to new host or VM using bare-metal recovery: Recovers a failed server or domain controller to a separate host or a new virtual machine.
|
| 21 |
+
|
| 22 |
+
Note: The AD domain controller recovery options restore additional roles, such as Active Directory Certificate Service (ADCS) and Network Policy and Access Services (NPAS), along with recovering data in an AD.
|
| 23 |
+
*[ > ]: and then
|
adds_ad_domain_controller_protection.md
ADDED
|
@@ -0,0 +1,33 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Active Directory domain controller protection
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/ad_domain_controller_protection.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# Active Directory domain controller protection
|
| 8 |
+
|
| 9 |
+
To protect the information on your AD domain controllers by applying RSC data protection policies, you can assign SLA Domains to the domain controllers
|
| 10 |
+
|
| 11 |
+
RSC uses SLA Domains to apply data protection policies to Active Directory (AD) objects. The AD objects are domains and domain controllers. If there is no SLA Domain assigned to a domain controller, the SLA Domain assigned to the parent AD domain is inherited by the domain controllers of that specific AD domain.
|
| 12 |
+
|
| 13 |
+
The minimum SLA Domain frequency required for AD domain controllers is four hours. You cannot assign an SLA Domain with a frequency of less than four hours to AD domain controllers. When you try to assign an SLA Domain with a frequency of less than four hours, RSC displays an error message indicating the minimum requirement of SLA Domain frequency to protect domain controllers.
|
| 14 |
+
|
| 15 |
+
Rubrik recommends installing the Rubrik Backup Service (RBS) software on your Windows host to start taking backups of the information that resides on your AD domain controllers.
|
| 16 |
+
|
| 17 |
+
You can start protecting the information on your domain controllers by:
|
| 18 |
+
|
| 19 |
+
* Adding the DNS IP entries to a Rubrik cluster
|
| 20 |
+
* Assigning SLA Domains to domain controllers
|
| 21 |
+
* Configuring an SMB domain
|
| 22 |
+
|
| 23 |
+
When RBS is running with an AD domain user account, the user account should be a member of backup operators and server operators AD groups for the AD backups to work as expected. However, to recover an entire AD or AD objects using Rubrik AD recovery, the service account must have Domain Admin privileges or LocalSystem account. To enhance security, you can initially add the user accounts to the backup operators and server operator AD groups. When a restore is needed, you can temporarily raise the user account privileges to Domain Admin or set it to LocalSystem.
|
| 24 |
+
|
| 25 |
+
Rubrik requires you to restart the RBS services in the following scenarios for the changes to take effect:
|
| 26 |
+
|
| 27 |
+
* When you change the logon user privileges
|
| 28 |
+
* When you change the logon user
|
| 29 |
+
|
| 30 |
+
The logon user account that RBS is running with requires Write permission to the C:\programdata\Rubrik directory of the host that RBS is installed on. You must assign the Write permission recursively to all the child directories of the C:\programdata\Rubrik directory. An administrator can assign the permission to the user account using the Advanced option in the Windows Security tab for the C:\programdata\Rubrik directory.
|
| 31 |
+
|
| 32 |
+
Rubrik recommends that you use a Microsoft Group Managed Service Account for the RBS service account instead of a traditional AD service account. Microsoft documentation provides more information about Microsoft Group Managed Service Account.
|
| 33 |
+
*[ > ]: and then
|
adds_ad_domain_controllers_info.md
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# AD domain controllers information
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/ad_domain_controllers_info.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# AD domain controllers information
|
| 8 |
+
|
| 9 |
+
Information about the Active Directory domain controllers registered with Rubrik clusters. You can view information about domain controllers and start protecting a domain controller by assigning an SLA Domain.
|
| 10 |
+
|
| 11 |
+
The Domain Controllers tab in the inventory page contains fields related to the Active Directory (AD) domain controllers registered with Rubrik clusters. You can also customize the view by adding, removing, pinning, and re-ordering the columns using the icon.
|
| 12 |
+
|
| 13 |
+
Field | Description
|
| 14 |
+
---|---
|
| 15 |
+
Domain Controller | The name associated with an AD domain controller.
|
| 16 |
+
FSMO Role | The FSMO roles assigned to the domain controller.
|
| 17 |
+
Server Role | The server roles assigned to the domain controller, for example, DNS and DHCP.
|
| 18 |
+
Domain | The domain name associated with the domain controller.
|
| 19 |
+
Rubrik Cluster | The Rubrik cluster associated with the domain controller.
|
| 20 |
+
SLA Domain | The SLA Domain assigned to the domain controller.If the domain controller does not have an SLA Domain assigned, it will inherit the SLA Domain of the parent AD domain.
|
| 21 |
+
RBS Status | The status of RBS. Only the domain controllers registered with a Rubrik cluster display the RBS status as Connected.
|
| 22 |
+
Snapshots | Number of snapshots available for the domain controller.
|
| 23 |
+
DC Location | Details about the location where the domain controller resides in your network.
|
| 24 |
+
Assignment | Type of assignment, indicating whether the SLA Domain assigned to the domain controller is direct or inherited from the AD domain.
|
| 25 |
+
*[ > ]: and then
|
adds_ad_forest_discovery.md
ADDED
|
@@ -0,0 +1,34 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# AD forest discovery
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/ad_forest_discovery.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# AD forest discovery
|
| 8 |
+
|
| 9 |
+
When you add an Active Directory domain controller to a Rubrik cluster as a Windows host, RSC discovers the Active Directory forest and all the domains in the forest hierarchy.
|
| 10 |
+
|
| 11 |
+
RSC discovers the Active Directory (AD) domains in a forest after:
|
| 12 |
+
|
| 13 |
+
* You install Rubrik Backup Service (RBS) on a domain controller
|
| 14 |
+
* You add the domain controller to a Rubrik cluster as a Windows host
|
| 15 |
+
|
| 16 |
+
RSC retrieves information about the applications running on the Windows host and identifies the Windows host as a domain controller.
|
| 17 |
+
|
| 18 |
+
After you install RBS on a domain controller and add the domain controller to a Rubrik cluster as a Windows host, RSC performs the following actions as part of AD forest discovery:
|
| 19 |
+
|
| 20 |
+
Discovery task | Description
|
| 21 |
+
---|---
|
| 22 |
+
Discovering all AD domains | Discovers all the AD domains in an AD forest.
|
| 23 |
+
Discovering domain controllers | Discovers the other domain controllers that exist in the same AD domain and displays the discovered domains and domain controllers in RSC.
|
| 24 |
+
Identifying FSMO roles | Identifies the FSMO roles assigned to each of the discovered domain controllers and displays them in RSC.
|
| 25 |
+
Identifying Windows services | Identifies other Windows services, such as DNS and DHCP, if any domain controller in the AD domain is hosting these services.
|
| 26 |
+
|
| 27 |
+
For Windows installations, all non-administrator RBS accounts must have access to the Rubrik registry at Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Rubrik Inc.\Backup Service\ and must be part of the backup operators group. If you install RBS on a host running CDM versions 9.0.3-p12, 9.1.3-p4, 9.2.1-p1, 9.2.2, or 9.3.0 and then later perform a CDM upgrade, all Windows hosts that are running RBS with a non-administrator account will be disconnected.
|
| 28 |
+
|
| 29 |
+
You can reactivate RBS in one of the following ways:
|
| 30 |
+
|
| 31 |
+
* By giving the user account or service account running RBS full access to the C:/Program Files/Rubrik directory. Restart RBS after adding the necessary permissions.
|
| 32 |
+
* By performing a clean reinstallation of RBS on the Windows host after upgrading CDM to versions 9.0.3-p12, 9.1.3-p4, 9.2.1-p1, 9.2.2, 9.3.0 or above.
|
| 33 |
+
|
| 34 |
+
*[ > ]: and then
|
adds_ad_forest_inventory_management.md
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# AD forest inventory management
|
| 2 |
+
|
| 3 |
+
Source: https://docs.rubrik.com/en-us/saas/adds/ad_forest_inventory_management.html
|
| 4 |
+
|
| 5 |
+
---
|
| 6 |
+
|
| 7 |
+
# AD forest inventory management
|
| 8 |
+
|
| 9 |
+
The Active Directory inventory provides a summary of the actions involved in protecting and recovering the Active Directory domains in forest hierarchy using RSC. You can manage the domain controllers in a forest using the information available in the Active Directory inventory.
|
| 10 |
+
|
| 11 |
+
With RSC, you can manage the domains and domain controllers in the Active Directory (AD) inventory page by adding domain controllers to a Rubrik cluster. When you add a domain controller to a Rubrik cluster as a Windows host, RSC discovers the AD forest and all the domains in the forest and displays the discovered domains in the inventory page.
|
| 12 |
+
|
| 13 |
+
Information about all the discovered forests and domains and associated domain controllers is displayed in the following tabs:
|
| 14 |
+
|
| 15 |
+
* Forests/Domains: This displays information about all the discovered AD forests and domains.
|
| 16 |
+
* Domain Controllers: This displays information about all the discovered domain controllers.
|
| 17 |
+
|
| 18 |
+
As part of inventory management for domains in a forest, you can:
|
| 19 |
+
|
| 20 |
+
* Add your domain controllers to a Rubrik cluster as Windows hosts.
|
| 21 |
+
* Remove domain controllers from the Rubrik cluster if the AD domain data is corrupted or the Windows server fails.
|
| 22 |
+
|
| 23 |
+
If all the domain controllers in a forest are deleted, the AD forest is automatically removed from RSC.
|
| 24 |
+
|
| 25 |
+
*[ > ]: and then
|