Implementing the Cloud-Based Ransomware Recovery or VMware Cloud Foundation validated solution includes activating the VMware Live Cyber Recovery service, preparing your VMware Cloud Foundation instance, and establishing a connection between the two.

To implement and configure cloud-based ransomware recovery, alternative methods exist:
Table 2. Validated Solution Implementation Options
Method Description
Implementation by using PowerShell automation End-to-end automated implementation by using PowerShell. See Automated PowerShell Implementation of Cloud-Based Ransomware Recovery.
Implementation by using component user interfaces End-to-end manual implementation by using components' user interfaces. See User Interface Implementation of Cloud-Based Ransomware Recovery Using Component User Interfaces.

For information on the cloud-based ransomware recovery design, see Detailed Design for Cloud-Based Ransomware Recovery for VMware Cloud Foundation.

Prerequisites

To complete the implementation of Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution, verify that your system fulfills the following prerequisites.

Table 1. Prerequisites for Implementation of Cloud-Based Ransomware Recovery for VMware Cloud Foundation

Category

Prerequisite

Environment

Active Directory

  • Verify that Active Directory Domain Controllers are available in the environment.