After you complete the implementation of the Cloud-Based Ransomware Recovery for VMware Cloud Foundation validated solution, you perform common operations on the environment, such as examining the operational state of the components added to the environment during the implementation and managing account passwords for these components.
For operational guidance on the components that are deployed automatically in VMware Cloud Foundation or complements in the basic VMware Cloud Foundation configuration, see the VMware Cloud Foundation Operations and Administration Guides in the VMware Cloud Foundation Documentation.