You are here: Workload protection > Application protection > Exchange 2003 cluster protection with a like-named cluster > Like-named cluster permissions

Like-named cluster permissions

When protecting a cluster with a like-named cluster, you can perform the setup, failover, and failback with the following permissions:

Next step: Configure protection for your like-named cluster