Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Data Manager Appliance 5.14.0.0 Release Notes for DM5500

New features

The following features are introduced in this release.

Table 1. New features in Data Manager Appliance Software 5.14.0.0 New Data Manager Appliance Software features
Functional area Feature description Summary of benefits
Security The Cyber Recovery solution maintains mission-critical business data and technology configurations in a secure, "vault" environment that can be used for recovery or analysis.

The Cyber Recovery vault is physically or virtually isolated from the production system or the network. The Cyber Recovery solution enables access to the Cyber Recovery vault only long enough to replicate data from the production system. At all other times, the Cyber Recovery vault is secured and off the network. Within the Cyber Recovery vault, the Cyber Recovery software creates point-in-time (PIT) retention-locked copies that can be validated and then used for recovery of the production system. The PowerProtect Data Manager Appliance Administrator Guide for DM5500 provides more information.

Creates point-in-time (PIT) retention-locked copies that can be used for recovery in an isolated vault environment.
Security PowerProtect Data Manager Appliance provides the option to enable Retention Lock Compliance mode at the policy, storage unit, and the system level. This ensures that the appliance data integrity is protected from malicious or unintentional changes. The PowerProtect Data Manager Appliance Administrator Guide for DM5500 provides more information. Provides data immutability. Any data that is locked cannot be overwritten, modified, or deleted for a user-defined retention period of up to 70 years.
Security Multifactor Authentication (MFA) supports re-registering of a new device for the configured authenticator application in case the existing device is damaged or lost or changed by the user. The PowerProtect Data Manager Appliance Security Configuration Guide for DM5500 provides more information. Enables re-registering of a device, if the existing device is damaged or lost.
Security The Audit log feature has been enhanced to include tracking of security related events such as login and logout activity of users.

Syslog server acts as remote server and is utilized to store all the audit logs of the PowerProtect Data Manager Appliance.

The PowerProtect Data Manager Appliance Administrator Guide for DM5500 provides more information.

Helps to monitor system activity by listing the number of events performed.
System configuration An Introduction page has been added to System Configuration, which provides prerequisites and post-configuration details for changing management and data network parameters and changing DNS/NTP. The PowerProtect Data Manager Appliance Administrator Guide for DM5500 provides more information. Informs users to check the prerequisites and post-configuration details before changing the network details.
System configuration The iDRAC page in System Configuration allows you to set iDRAC user credentials after upgrading to the 5.14 build from an earlier build. The PowerProtect Data Manager Appliance Administrator Guide for DM5500 provides more information. Enables users to set iDRAC user credentials.
Protection PowerProtect Data Manager Appliance provides an option to replicate backup copies from DM5500 to DD/DDVE on premise to create a secondary backup copy. PowerProtect Data Manager Appliance Administrator Guide for DM5500 provides more information. Allows you to create a secondary backup copy in DD/DDVE.
Disaster Recovery The recovery process has been enhanced to protect the persistent data of a PowerProtect Data Manager Appliance system from catastrophic loss. Ability to restore the whole appliance from DR backup by using appropriate scripting for each component, in an appropriate order.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\