Endpoint Data Protection Best Practices Part 3 — Monitoring and Integration

Rakesh Ramakrishnan, Product Manager — Data Governance and Cyber Resilience

In part one of our endpoint best practices mini-series, we covered the steps to correctly plan for deployment, including building the best strategy and outlined the impact/issues of improper or no planning. Continuing with this series, in part two, we discussed why certain critical settings/options have to be configured and what might be the impact if these are missed.

We have reached the last part of the deployment journey. A good deployment strategy helps ensure a high deployment success rate. However, with the deployment done, the next steps are to make sure the backups complete successfully and all your devices stay compliant.

In this blog, we will cover the areas that a backup administrator has to monitor, the integration with APIs to automate workflows, and how to build your reporting dashboards.

Monitoring and Integration

Once the deployment is done and devices have backed up to the cloud, Backup admins need to make sure the users/devices remain compliant. They can do this by tracking daily activities like backups and restores; this can be done from:

Druva Cloud Admin Console

Review the backup overview page on the Druva endpoint dashboard to identify backups that have failed, completed with errors, as well as those that are inactive, and take corrective actions. 

A quick glance at the devices page gives details of the last backup status of all devices.


Reports contain a summary of events and activities that have occurred over a specified period of time. Review these reports, for example last backup statusrestore activity, and user rollout to track backup, restore activities and deployment status. 


Alerts indicate an exception situation or notify about a potential issue that needs attention. The manage alerts page on the Druva admin console lists the active alerts, including misconfigured backup, inactive, low user storage available, and restore status. Review these alerts and take corrective actions to fix the issues.


Integrate Druva telemetry into your security incident and event management tools like Splunk to monitor the health, backup trends, and restore activity. Or build your own automations to trigger actions using actionable APIs or custom reporting dashboards. Refer to some of the sample codes on GitHub.

Key takeaways

Protecting endpoints with a good strategy is key to insure you’re protected from a disaster, ransomware, or malware attack. A well-planned endpoint deployment will result in low deployment issues, higher success rate in protecting your devices, and a higher adoption rate with your users. Leverage the best practices in each of the three parts in this blog series, they can act as a baseline for your own custom plans and strategies.

Visit the endpoints page to learn more about how Druva provides a secure, reliable, and fast endpoint backup solution, so your teams can always recover clean end-user data. Druva’s integrated backup, eDiscovery, and compliance monitoring simplify endpoint data protection, ensure regulatory compliance, and improve data visibility for the mobile workforce.