Integrations
The One Backups integrates with other products in the platform to share device context, automate ticketing, and enable cross-product workflows like ransomware recovery.
Backups + RMM
Shared agent binary — The backup agent runs as a module of the unified RMM agent. No separate binary to install or update. Agent updates deployed via RMM also update the backup module.
Device context — Devices enrolled via RMM automatically appear in the Backups console. The hardware fingerprint established during RMM enrollment is used as the device identity in backup catalogs — no re-enrollment needed when enabling the Backups module on existing RMM devices.
Backup health on devices — The RMM device view shows a backup health badge: Healthy, Warning, Critical, or Unprotected. Technicians can see backup status without leaving the RMM console.
Remote backup trigger — From the RMM console, you can trigger a manual backup job on any device via the Run Task → Backup Now action.
Backups + PSA
Failed backup tickets — Backup job failures automatically create PSA tickets when the integration is active:
| Trigger | Ticket Type | Default Priority |
|---|---|---|
| 3 consecutive job failures | Backup Failure | Critical |
| Backup overdue >24h | Backup Overdue | High |
| SaaS consent expired | SaaS Connection Error | Critical |
| DR test failed | DR Test Failure | High |
Each ticket includes device name, client company, last successful backup timestamp, failure error message, and a deep link back to the backup job log.
Ticket resolution — When the underlying backup issue resolves (the next backup job succeeds), the PSA ticket can be auto-resolved. Configure this behavior in Settings → Integrations → PSA → Auto-resolve on recovery.
Configuration:
- Go to Settings → Integrations → PSA
- Enable Auto-create tickets on failure
- Set failure threshold and ticket type mappings
- The integration uses the
X-Integration-Keyservice-to-service channel
INTEGRATION_KEY) must be configured on both the Backups API and the PSA API. Contact your platform admin if ticket creation is not working.Backups + Defend
Ransomware recovery trigger — When Defend confirms a ransomware attack on a device, it sends a signal to Backups to:
- Immediately verify the integrity of the device's most recent backup
- Flag the backup catalog for the affected time window
- Optionally initiate Rewind Recovery using the last confirmed-clean backup snapshot
The Rewind Recovery workflow is initiated from the Defend console (Investigations → Response Actions → Rewind Recovery) after a confirmed ransomware detection.
Backup health informs risk score — The CMDB asset risk score includes backup protection status as a factor. An unprotected device or a device with a failing backup gets a higher risk score in CMDB, which in turn affects Defend alert severity weighting.
Coordinated response — In the Defend response automation rules, you can add Verify Backup as an automated action on ransomware detection. This queues a backup integrity check immediately when ransomware is confirmed, before the response team intervenes.
Backups + CMDB
Device backup status in asset records — Every device record in CMDB shows:
- Backup protection: Enabled / Disabled / Not enrolled
- Policy assigned
- Last successful backup timestamp
- Health score
This lets your service desk quickly confirm backup status during incident response without switching to the Backups console.
Unprotected device compliance — CMDB generates a compliance report showing all assets without active backup protection. Filter by company, asset type, or criticality to identify coverage gaps.
Criticality tagging — CMDB asset criticality (High/Medium/Low) is surfaced in the Backups console to help prioritize which devices to protect first and which SLA thresholds to apply.
Backups + On-Call
SLA breach escalation — Configure On-Call escalation for critical backup SLA breaches:
- Go to Settings → Integrations → On-Call
- Enable SLA breach escalation
- Define escalation triggers:
- Server backup overdue by more than 6 hours
- Any device backup overdue during a scheduled backup window
- Map to an On-Call escalation policy and schedule
On-Call escalation fires independently of PSA ticketing — both can be active simultaneously. On-Call is recommended for after-hours server backup failures where same-night response may be required.
Related Pages
- Backup Health Monitoring — Configuring PSA and On-Call thresholds
- DR Testing — Scheduled and manual restore verification
- Troubleshooting — Integration-specific issues