This report lists all the ignored applications across the appliances. These are
applications that are either ignored on all appliances or are not protected on
any appliance.
Column descriptions
Host: Name of the host.
Application: Name of the application.
Application Type: Type of the application.
Instance Name: Name of the database instance for the instance members.
Ignored on Appliances: List of the appliances on which the application
is marked as ignored.
Discovered on Appliances: List of the appliances on which the
application is discovered.
Multiply protected applications
This report shows the details of the applications that are protected on multiple
appliances that are configured to the Report Manager.
Column descriptions
Host: Name of the host where the application resides.
Application: Name of the application suffixed with the hostname.
Application Type: Type of the application.
UUID: Unique identifiers for application.
Appliance: Appliance name where the application is protected.
Policy Template: Template used in the appliance to protect the
application.
Instance Name: Name of the SQL instance (applicable only for SQL server
database)
Consistency Group: If the application is protected as part of a
consistency group, its name is displayed here.
Managed Data (TB): Managed data consumed by the application in the
appliance.
Most Recent Job: Date and time to the minute of the start of the most
recent snapshot job.
Application ID: The unique identifier for the application in an
appliance.
Policy summary
The report provides the policy summary for all policy templates on each
appliance.
Column descriptions
Appliance: Appliance name.
Policy Template: The assigned backup template in the backup plan.
Policy: Policy name.
Operation: Snapshot, StreamSnap, and OnVault.
Retention: A string value such as "two weeks". Note that StreamSnap
retention knows when to use the snapshot retention, a custom retention, or to
just keep the last image.
Retention Days: Number of days, using two digits, for example 01.
Schedule Type: A text string with values such as Daily, Continuous,
Weekly on Saturday, or Monthly on day one. This also needs to show
any exceptions.
Start Time: When the window starts in the format: hh24:mm. Use the
24-hour clock notation to identify the hour, as in 20:00 for 8 PM. Leave this
blank for continuous policies.
Stop Time: When the window closes. Format: hh24:mm as for Start Time.
Leave blank for continuous policies.
Frequency: RPO (recovery point objective) text string as in "24 hours".
Application Consistent: String value of the policy option.
Values are yes, no, or last. This field is blank if no policy
option is set, which is the default.
Log Backup Frequency (min): Minutes between database log backup jobs,
or blank. This field is blank if the database log backup is not enabled.
Applications Protected: Number of applications protected by this policy
template.
Applications with Schedule Disabled: Number of applications protected
by this policy template that have their schedule disabled.
Protected applications
This report provides the following details about protected applications.
SQL Server instance name and an indication of whether a database is protected through
the SQL Server instance, a consistency group, or directly.
The remote node from the profile if the application is replicated.
All the backup plan restrictions, such as scheduler disabled and snapshots
disabled.
Inclusions and exclusions, such as volumes included or excluded for VMs,
databases included or excluded for SQL Server instances, and include or exclude
patterns, and start or prune paths for file servers.
Column descriptions
Appliance: Name of the appliance.
Host: Name of the host.
Application: Name of the application.
Application Type: Type of application.
Policy Template: Policy template associated with the protected
application.
Protected On: Date when the application protection started.
Source Appliance: Source appliance of a replicated remote application.
Remote Appliance: Remote appliance or remote node where the application
is being replicated.
Consistency Group: If the application is protected as part of a
consistency group, its name is displayed here.
Instance Name: This information is only available for SQL server databases.
Backup Plan Restrictions: A comma-separated list with the following
options:
Scheduler Disabled
Expiration Disabled
Snapshots Disabled
StreamSnap Disabled
OnVault Disabled
Process Latest Snapshot
Inclusions and Exclusions: Volume restrictions.
Policy Overrides: Overrides include any policy options set at the
application or backup plan level.
Unprotected applications
This report displays the list of unprotected applications across the list of
appliances added to Report Manager, with the list of appliances the
application is discovered on. This report excludes applications that are
marked as ignored.
Column descriptions
Host: Name of the host where the application resides.
Application: Name of the application suffixed with the hostname.
Application Type: Type of application.
Instance Name: Name of the SQL instance.
Discovered On: List of the appliances the application is discovered on.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-29 UTC."],[[["\u003cp\u003eProtection reports offer a comprehensive view of application protection and discovery status, both within individual appliances and across the entire enterprise.\u003c/p\u003e\n"],["\u003cp\u003eThe reports detail ignored, multiply protected, protected, and unprotected applications, providing insights into the current status of each application.\u003c/p\u003e\n"],["\u003cp\u003eA policy summary report outlines the configurations of all policy templates on each appliance, including operation types, retention settings, schedules, and consistency.\u003c/p\u003e\n"],["\u003cp\u003eDetailed information on protected applications includes their policy templates, backup plan restrictions, replication status, and any volume or database inclusions/exclusions.\u003c/p\u003e\n"],["\u003cp\u003eUnprotected applications are listed along with the appliances on which they were discovered, excluding applications that are marked as ignored.\u003c/p\u003e\n"]]],[],null,["# Protection reports allow you to verify the application protection and discovery\nstatus within an appliance and also at an enterprise level.\n\nProtection reports include:\n\n- [Ignored applications](#ignore-apps)\n\n- [Multiply protected applications](#mult-prot-apps)\n\n- [Policy summary](#summary)\n\n- [Protected applications](#prot-apps)\n\n- [Unprotected applications](#unprot-apps)\n\nIgnored applications\n--------------------\n\nThis report lists all the ignored applications across the appliances. These are\napplications that are either ignored on all appliances or are not protected on\nany appliance.\n\n### Column descriptions\n\n- **Host**: Name of the host.\n\n- **Application**: Name of the application.\n\n- **Application Type**: Type of the application.\n\n- **Instance Name**: Name of the database instance for the instance members.\n\n- **Ignored on Appliances**: List of the appliances on which the application\n is marked as ignored.\n\n- **Discovered on Appliances**: List of the appliances on which the\n application is discovered.\n\nMultiply protected applications\n-------------------------------\n\nThis report shows the details of the applications that are protected on multiple\nappliances that are configured to the **Report Manager**.\n\n### Column descriptions\n\n- **Host**: Name of the host where the application resides.\n\n- **Application**: Name of the application suffixed with the hostname.\n\n- **Application Type**: Type of the application.\n\n- **UUID**: Unique identifiers for application.\n\n- **Appliance**: Appliance name where the application is protected.\n\n- **Policy Template**: Template used in the appliance to protect the\n application.\n\n- **Instance Name**: Name of the SQL instance (applicable only for SQL server\n database)\n\n- **Consistency Group**: If the application is protected as part of a\n consistency group, its name is displayed here.\n\n- **Managed Data (TB)**: Managed data consumed by the application in the\n appliance.\n\n- **Most Recent Job**: Date and time to the minute of the start of the most\n recent snapshot job.\n\n- **Application ID**: The unique identifier for the application in an\n appliance.\n\nPolicy summary\n--------------\n\nThe report provides the policy summary for all policy templates on each\nappliance.\n\n### Column descriptions\n\n- **Appliance**: Appliance name.\n\n- **Policy Template**: The assigned backup template in the backup plan.\n\n- **Policy**: Policy name.\n\n- **Operation**: Snapshot, StreamSnap, and OnVault.\n\n- **Retention**: A string value such as \"two weeks\". Note that StreamSnap\n retention knows when to use the snapshot retention, a custom retention, or to\n just keep the last image.\n\n- **Retention Days** : Number of days, using two digits, for example `01`.\n\n- **Schedule Type** : A text string with values such as **Daily** , **Continuous** ,\n **Weekly on Saturday** , or **Monthly** on day one. This also needs to show\n any exceptions.\n\n- **Start Time**: When the window starts in the format: hh24:mm. Use the\n 24-hour clock notation to identify the hour, as in 20:00 for 8 PM. Leave this\n blank for continuous policies.\n\n- **Stop Time** : When the window closes. Format: hh24:mm as for **Start Time**.\n Leave blank for continuous policies.\n\n- **Frequency**: RPO (recovery point objective) text string as in \"24 hours\".\n\n- **Application Consistent** : String value of the policy option.\n Values are **yes** , **no** , or **last**. This field is blank if no policy\n option is set, which is the default.\n\n- **Log Backup Frequency (min)**: Minutes between database log backup jobs,\n or blank. This field is blank if the database log backup is not enabled.\n\n- **Applications Protected**: Number of applications protected by this policy\n template.\n\n- **Applications with Schedule Disabled**: Number of applications protected\n by this policy template that have their schedule disabled.\n\nProtected applications\n----------------------\n\nThis report provides the following details about protected applications.\n\n- SQL Server instance name and an indication of whether a database is protected through\n the SQL Server instance, a consistency group, or directly.\n\n- The remote node from the profile if the application is replicated.\n\n- All the backup plan restrictions, such as scheduler disabled and snapshots\n disabled.\n\n- Inclusions and exclusions, such as volumes included or excluded for VMs,\n databases included or excluded for SQL Server instances, and include or exclude\n patterns, and start or prune paths for file servers.\n\n### Column descriptions\n\n- **Appliance**: Name of the appliance.\n\n- **Host**: Name of the host.\n\n- **Application**: Name of the application.\n\n- **Application Type**: Type of application.\n\n- **Policy Template**: Policy template associated with the protected\n application.\n\n- **Protected On**: Date when the application protection started.\n\n- **Source Appliance**: Source appliance of a replicated remote application.\n\n- **Remote Appliance**: Remote appliance or remote node where the application\n is being replicated.\n\n- **Consistency Group**: If the application is protected as part of a\n consistency group, its name is displayed here.\n\n- **Instance Name**: This information is only available for SQL server databases.\n\n- **Backup Plan Restrictions**: A comma-separated list with the following\n options:\n\n - **Scheduler Disabled**\n - **Expiration Disabled**\n - **Snapshots Disabled**\n - **StreamSnap Disabled**\n - **OnVault Disabled**\n - **Process Latest Snapshot**\n- **Inclusions and Exclusions**: Volume restrictions.\n\n- **Policy Overrides**: Overrides include any policy options set at the\n application or backup plan level.\n\nUnprotected applications\n------------------------\n\nThis report displays the list of unprotected applications across the list of\nappliances added to **Report Manager**, with the list of appliances the\napplication is discovered on. This report excludes applications that are\nmarked as ignored.\n\n### Column descriptions\n\n- **Host**: Name of the host where the application resides.\n\n- **Application**: Name of the application suffixed with the hostname.\n\n- **Application Type**: Type of application.\n\n- **Instance Name**: Name of the SQL instance.\n\n- **Discovered On**: List of the appliances the application is discovered on."]]