Protected Computers

In this article

    This report provides information on all protected and unprotected computers including their last backup state.

    A computer is considered to be Protected if there is at least one valid backup restore point that meets the designated RPO for it. A computer is considered to be Unprotected if it has an outdated or missing backup restore point.

    The report examines whether computers have valid backup restore points created within the specified time range (RPO period), shows the total number of restore points available for each protected computer, and provides information on the completion status of recent backup job sessions.

    • The Summary section provides information on the number of discovered, backed up and protected computers and contains the following charts:
      • The Protected Computers chart shows the number of protected and unprotected computers.
      • The Computer Type chart shows types of protected computers: Windows or Linux workstations and servers.
      • The Computer Last Backup State chart shows status of the latest job session for a discovered/protected computer.
      • The Unprotection Reason chart shows reasons for non-compliance with the specified RPO requirements.
    • The Details section provides information on all protected and unprotected computers including IP address, protection group, backup job or policy name, backup source and target, number of available restore points and date and time of the latest backup.

    Report Parameters

    You can specify the following report parameters:

    • Infrastructure objects: defines a list of Veeam Backup & Replication servers and protection groups to include in the report.
    • Business View objects: defines a list of business groups to include in the report. The parameter options are limited to objects of the Computer type.
    • Backup jobs/policies: defines a list of backup jobs and policies to include in the report.
    • Agent types: defines types of Veeam backup agents to include in the report (Windows Server, Windows Workstation, Linux Server, Linux Workstation, Mac Server, Mac Workstation, All).
    • Computer inclusion rule: defines names of computers that must be included in the report.

    In the Computer inclusion rule field, you can specify a mask for names of computers that must be included in the report scope. The mask can contain the asterisk (*) that stands for zero or more characters. You can specify multiple masks or computer names separated with commas.

    • RPO (Recovery Point Objective): defines the maximum amount of data that you may accept to lose, expressed in time. RPO defines the age of the latest backup files required to resume normal operation if system failure occurs. For example, to compile a list of computers protected on a daily basis, you need to set the RPO value to 1 day.

    Protected Computers Report
    Protected Computers Report
    Protected Computers Report

    Use Case

    When you set up your agent backup jobs based on protection groups or employ complex exclusion parameters in job properties, some computers may turn out to be excluded from protection groups and therefore will lack proper protection.

    This report displays a list of computers protected by up-to-date backups as well as a list of unprotected computers which have outdated or missing backups. This information helps you identify which computers in your environment function without proper protection and make sure the existing backups meet established RPO requirements.