Configurations
Navigate to Settings > Configurations to manage backup files of your system configuration.
The buttons at the top of the screen allow you to create and upload configuration files.
Note
Configuration files only contain the activated configuration. Pending changes are not backed up.
For each available configuration file, the table displays the date and time it was created, its automatically generated file name, the user who generated the file, and a note. The icons in last column of the table allow you to view details of the file and install it, edit its note, download, or delete the respective configuration file.
Note
Whenever a new configuration is applied, Threat Defender automatically generates a new configuration file called most-recent-apply
. Note that Threat Defender stores only one automatically generated configuration file. This means older files are overwritten when a new file is auto-generated.
Configuration Details
To see the details of a configuration file, click in the overview table or double-click its row.
The buttons at the top of the page allow you to edit the descriptive note of the file, and to delete or download the file.
The table shows general information about the configuration file:
Field |
Description |
---|---|
Name |
The automatically generated file name. |
Note |
A short description, if available. |
Username |
The user who created the backup. |
Created At |
The date the configuration file was created. |
Updated At |
The date the configuration file was last updated. |
The buttons below the table allow you to select which part of the configuration you want to restore:
Field |
Description |
---|---|
All Configuration |
Restores the entire configuration. |
Network |
Restores only the network configuration. |
Policy |
Restores only the policy configuration. |
Asset |
Restores only the asset database. |
SNMP |
Restores only the SNMP configuration. |
genucenter |
Restores only the genucenter configuration. |
Click INSTALL to restore the selected configuration. Do not shut down Threat Defender during the installation of the configuration.