Ransomware attackers specifically target and attempt to destroy backup systems to increase the probability of payment. Hardening your system is critical. Please ensure you have reviewed your platform security using the Security Hardening Checklist
IBM COS Mirror Summary — NetBackup IT Analytics 11.8 | Cohesity Documentation
IBM COS Mirror Summary
This reports shows listing of Mirror for the COS Manager. We can drill-down to these reports from 'Array Capacity and Utilization Report'.