The following topics describe the steps required to configure policies and data flows to implement a number of different data protection scenarios.
For a detailed introduction on how to work with the Protector user interface, please refer to Hitachi Ops Center Protector User’s Guide.