Perform a takeover when applications need to be brought online on the secondary cluster, regardless of whether the data is completely consistent between the primary and the secondary. You can take over an individual protection group or take over multiple protection groups that are configured as a multigroup in a single operation.
The information in this section assumes that the protection group has been started.
This section contains the following information: