Risk Management

Risk Management

Risk management works by analyzing backup executions, both in terms of their characteristics, but also with the policies and associated incidents.
The items analyzed are:

  • Volume (Increase/decrease greater than 50%);
  • Execution Time (Increase/decrease greater than 50%);
  • Associated Policy (Host removal, disabling);
  • Recurrent Failure (failure category) – The risk is generated based on incidents of the same policy and company that had the same category of failures at least 3 times in the 30-day period.


Risk Type


We can filter the types of Risks according to the type or other advanced characteristics.


To interact with a risk, it must first be associated with a user.


After the association, we can:

  • Update Status: Where we place important information regarding the progress;
  • Close: To place a closing solution;
  • Ignore: Ignore this risk after analyzing that it is part of the normal behavior of the environment;

Risks are generated automatically by the FenixDFA system, but we can choose the policies that will be subject to this analysis.

Browsing in Audit, then in Policy, we have the list of all policies detected by FenixDFA.

In the action column, by clicking on settings, we can select the analyses that make sense in the context of each policy.




To check the completed risks, we have to go to filter and select show resolved



    • Related Articles

    • Incident Management

      Incident Management All backup routines with a termination status other than success are imported by Fenix DFA as an incident; Missed or not started routines are also treated as incidents; Administrative routines that are vital for the security and ...
    • Policies

      Browsing in Audit, then in Policies, we have the list of all policies detected by Fenix DFA: We can filter and select the desired policy: In the Assets column, we can check which Assets are assigned to each Policy: Bringing information about the ...
    • User Creation

      To create users, you must log in to the tool using administration After logging in as administrations, you need to go to the "user management" tab, then "user" When creating a new user, you must enter the correct email address and the user’s role. ...
    • NetBackup web server certificate

      At the time of authentication and validation of the Fenix token, the message below may occur due to access permission to the NetBackup API: "The host name that you have specified to connect to the NetBackup web server is not present in the NetBackup ...
    • SQL Native Integration Guide

      Integration Guide Overview This document describes the integration process with SQL Native Backup (Standard, Enterprise and SQLEXPRESS), detailing the required configuration steps and data needed for successful integration. Prerequisites SQL Server ...