Home > Reporting
Export to PDFNavigate to Reporting > API usage to view the API usage report of organizations under the corresponding tabs.
The API Usage chart displays the percentage of the API usage limit by including both running and completed jobs in AvePoint Cloud Backup for Salesforce® as well as the API usage limit percentage of the organization in the last 7 days. To maintain optimum performance and ensure that the Force.com API is available to all Salesforce customers, Salesforce balances transaction loads by imposing Total API Request Limits per 24 hours. When a call exceeds a request limit, an error is returned. The chart can provide you with a convenient way to check the condition of API usage. If a call exceeds the request limit, the backup, archive or restore job will pause. AvePoint Cloud Backup for Salesforce® will keep the progress and enquire Salesforce every 30 minutes. When there is an abundant API quota, AvePoint Cloud Backup for Salesforce® will resume the progress to finish the job.
Administrators can also configure a percentage for the Salesforce API usage limit by clicking Configure API usage limit in the upper-right corner. In the panel, enter an integer from 1 to 100 to define the percentage. Make sure you set an appropriate value to ensure your jobs will not be affected. Click Save to save the configurations, or click Cancel to close the panel without saving the configurations.
The total number of API requests allowed by Salesforce is defined by the users’ licenses in the organization. For details, refer to the Salesforce documentation: API Request Limits and Allocations. For your current API usage, navigate to Salesforce > System Overview > API Usage.

If you have enabled Bulk API and Bulk API 2.0 for organizations, you can also view the percentage of Bulk API and Bulk API 2.0 usage limit on this page. To configure the limit, click Configure Bulk API usage in the chart. For details on the settings, refer to Configure Bulk API Usage.
Cloud Backup for Salesforce® will learn from your backup statistics and warn you of organizations with unusual activities or that are under a potential ransomware attack.
Unusual activities are designed to provide visibility about atypical patterns within your environment, distinct from regular usage patterns. The unusual activities could be related to malware that is related to ransomware or non-ransomware. But in most cases, they can be legitimate operations. It might be normal for a user to make changes that do not match their day-to-day patterns. While you should be aware that these changes are happening, you likely do not have to respond to every unusual activity report.
However, a potential ransomware attack is much more serious and requires your immediate attention. It refers to the real suspicious files that were detected in an organization that requires investigation.
To learn how you use your environment and build the pattern, the Unusual Activities Analysis report requires at least 12 days of successful backups. Once any unusual activity or potential ransomware attack has been detected, you will receive an email notification. To enable the alert, refer to Configure Notifications.
The Dashboard tab displays the number of organizations protected by Cloud Backup and the number of organizations with unusual activities. The main chart in the Dashboard tab shows the data tracked over the last 30 days for unusual activities and potential ransomware attacks.

You can click the number to view the organizations with unusual activities or click the point on the chart to view the details of that specific date. The Details tab will show more information on the unusual activities and suspicious files for the reported organizations. You can download the report in an Excel file.
You can also go to the Details page directly to view the data in a table. You can adjust the time range to change the data scope or click an organization to view the report with its own details.

When you view the details of a specific organization, you can also adjust the time range to change the data scope and click a point in the chart to view the details of that date. The details are displayed below the chart. You can download a report of all files with unusual activities in the organization for record or for further investigation.

To recover suspicious files to a safe state, click the Restore suspicious files button on the details pane of an organization. Then find a safe date and select the proper recovery point to restore.
The Recovery Point calendar will display a yellow dot under the date where its recovery points are detected with unusual activities. For details on the common restore settings, refer to Restore Backup Data.
To recover suspicious files of ContentVersion to a healthy state successfully, go to Salesforce and delete corresponding suspicious files first for the following reasons:
If the suspicious file in the Salesforce environment is a new version of the file before the ransomware attack, the file in the restore job will be skipped.
If the suspicious file in the Salesforce environment is a new file whose name is the same to the file before the ransomware attack, there will be two files with the same name in the Salesforce environment after the restore.