Before you start implementing the components of the Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution, you must ensure the environment has a specific compute, storage, and network configuration, and provides external services to the components of the solution.
Use the VMware Cloud Foundation Planning and Preparation Workbook to capture environment specific input values that are required during the implementation.
Carefully review the VMware Cloud Foundation Planning and Preparation Workbook before implementation to avoid costly rework and delays. Capture input values that are specific to your environment and verify that the components that are required by this solution are available.
The VMware Cloud Foundation Planning and Preparation Workbook contains inputs for each implementation and configuration procedure. Reference your values from the VMware Cloud Foundation Planning and Preparation Workbook to complete the UI or PowerShell procedures.
External Services
You use services that are external to VMware Cloud Foundation when implementing the Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution.
External Service |
Description |
---|---|
Active Directory (AD) |
Active Directory (AD) is used to provide authentication and authorization to the VMware Cloud Foundation infrastructure. |
Domain Name Services (DNS) |
Domain Name Services is used to ensure components are resolvable by FQDN and by IP address. |
Network Time Protocol (NTP) |
Network Time Protocol is used to synchronize time consistently across components. |