After you complete the implementation of the Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution, you perform common operations on the environment, such as examining the operational state of the components added to the environment during the implementation and managing account passwords for these components.
For operational guidance on the components that are deployed automatically in VMware Cloud Foundation or complement the basic VMware Cloud Foundation configuration, see the VMware Cloud Foundation Operations Guide and the VMware Cloud Foundation Administration Guide.