The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.

Secondary checkpoint

See checkpoint.

See checkpoint.

The Secondary checkpoint is also marked on Primary Replicator Log. The only way it differs from the Primary checkpoint is that it is specific to the particular Secondary node, unlike Primary checkpoint which is for all the Secondary nodes. There is no checkend for RLINK checkpoints.

Secondary checkpoint is used for pausing the replication before taking backups at Secondary node.