This is an archive version of the document. To get the most up-to-date information, see the current version.

Protected Computers

This report lists all protected and unprotected computers including their last backup state.

A computer is considered to be Protected if there is at least one valid backup restore point that meets the designated RPO for it. A computer is considered to be Unprotected if it has an outdated or missing backup restore point.

The report examines whether computers have valid backup restore points created within the specified time range (RPO period), shows the total number of restore points available for each protected computer, and provides information on the completion status of recent backup job sessions.

The report helps you identify which computers in your environment function without proper protection and make sure the existing backups meet established RPO requirements.

Protected Computers Note:

This report is available in Veeam ONE 9.5 Update 3 or later.

Summary

The Summary section contains the following summary information:

  • Discovered Computers – shows a total number of computers with installed Veeam backup agents that are managed by selected Veeam Backup & Replication and Veeam Backup Enterprise Manager servers.
  • Backed Up Computers – shows a total number of computers protected by Veeam backup agent jobs.
  • Protected Computers – shows a total number of computers with at least one valid backup restore point that meets the designated RPO for it.

Charts

The report contains the following charts:

  • Protected Computers – shows the number of protected and unprotected computers.
  • Computer Types – shows types of protected computers: Windows or Linux workstations and servers.
  • Computer Last Backup State – shows status of the latest job session for a discovered/protected computer.
  • Unprotection Reason – shows reasons for non-compliance with the specified RPO requirements.

Details

The Details section lists all protected and unprotected computers including the following details:

  • Computer Name
  • IP Address
  • Protection Group
  • Backup Job/Policy
  • Backup Source
  • Backup Target
  • Available Restore Points
  • Last Backup Date

Protected Computers
Protected Computers
Protected Computers 

Use Case

When you set up your agent backup jobs based on protection groups or employ complex exclusion parameters in job properties, some computers may turn out to be excluded from protection groups and therefore will lack proper protection.

This report displays a list of computers protected by up-to-date backups, as well as a list of unprotected computers which have outdated or missing backups. This information helps you validate the state of backup protection in your organization.

Report Parameters

Scope: defines a list of Veeam Backup & Replication servers and protection groups to include in the report.

Business View Objects: defines a list of business groups to include in the report.

Backup Job/Policy: defines a list of backup jobs and policies to include in the report.

Server Type: defines type(s) of Veeam backup agents to include in the report.

Host Name Filter: defines names of computers that must be excluded from the report.

In the Host Name Filter field, you can specify a mask for names of computers that must be excluded from the report scope. The mask can contain the asterisk (*) that stands for zero or more characters. You can specify multiple masks or computer names separated with commas.

RPO (Recovery Point Objective): defines the maximum amount of data that you may accept to lose, expressed in time. RPO defines the age of the latest backup files required to resume normal operation if system failure occurs. For example, to compile a list of computers protected on a daily basis, you need to set the RPO value to 1 day.