Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell PowerProtect Cyber Recovery 19.15 Command-Line Interface Reference Guide

PDF

Functionality

The following table lists the Cyber Recovery operations that you can perform with the CRCLI.

NOTE:Your user role determines which operations that you can perform.
Table 1. CRCLI modules and functionality The two-column table lists the Cyber Recovery modules in the first column and the functionality of each module in the second colume.
Module Functionality
login/logout
  • Log in a user
  • Log out the current user
users
  • Create, delete, and modify users
  • Disable and enable users
  • List users
  • Show user details
  • Show password policy details
  • Manage password policy and set requirements
  • Configure email notifications for users
  • Enable multifactor authentication
dd
NOTE: Vault storage in the Cyber Recovery UI corresponds to dd in the CRCLI.
  • Create vault storage
  • Modify vault storage
  • List vault storage
  • Show the configuration for vault storage
apps
  • Create an application object
  • Modify an application object
  • List application objects
  • Show the details for an application object
  • Define multiple links between a CyberSense version 8.2 and later host and one or more DD systems
vcenter
  • Create a vCenter Server object
  • Modify a vCenter Server object
  • List vCenter Server object
  • Show the details for a vCenter Server object
policy
  • Manage policies
  • List all policies
  • Run a policy with the following actions:
    • sync
    • sync-copy
    • securecopy
    • copy
    • copy-lock
    • lock
    • analyze
    • securecopyanalyze
    • shelteredharbor
  • Show details about a policy
  • List PIT copies by policy
  • List sandboxes by policy
  • Retrieve an analysis report
jobs
  • List jobs
  • Show job details
  • Cancel running jobs
  • Watch progress of running jobs
schedules
  • Create schedules
  • List schedules
  • Modify schedules
  • Show the details for a schedule
  • Delete schedules
recovery
  • Recover a PIT copy to the Cyber Recovery vault from the DD production system
  • Recover a PIT copy to the DD production system or an alternate DD system at any location from the Cyber Recovery vault
  • List current recoveries
shelteredharbor
  • Create a financial institution
vault
  • Secure the vault
  • Release the vault
  • Show vault status
alerts
  • List alerts
  • Show details for an alert
  • Acknowledge an alert
  • Add a note to an alert
events
  • List events
  • Show details for an event
system
  • Initiate Cyber Recovery log collection and DD support bundle.
  • Change log level settings
  • Change cleaning schedule settings
  • Retrieve Cyber Recovery environment details
  • Manage mail server settings
  • Show the DR backup configuration
  • Edit the DR backup configuration
  • Run a DR backup
  • List all created DR backups
  • Set a telemetry report schedule
license
  • Add a license
  • Show license information
version Display the Cyber Recovery version and build number
whoami Display the current user that is logged in to the CRCLI
help Display the CRCLI help

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\