After defining virtual protection groups (VPGs) the virtual machines specified as part of each VPG are protected. There are a number of ongoing management tasks that you can perform on a VPG, such as specifying a checkpoint to enable recovery to that specific point or you can modify the configurations of existing VPGs.
Monitoring VPGs and the VMs that are protected is described in
“Monitoring Zerto Virtual Replication”, on page 225.'