time-clock-circle multiple-users-1 bin-paper-1 smiley-indifferent view-off alert-diamond envelope-letter rating-star network-browser pencil-write ticket-1 button-record headphones-customer-support close synchronize-arrows-1 common-file-stack close-quote arrow-down-2 multiple-circle attachment-1 folder-file-1 disable smiley-indifferent shield-warning love-it smiley-smile-1_1 check-circle-1 time-clock-midnight floppy-disk view smiley-unhappy book-star lock-unlock-1 arrow-right-1 archive smiley-unhappy send-email-1 hierarchy-9 open-quote add-circle-bold search remove-circle cog-1 filter-1 hyperlink-2 analytics-pie-2 flying-insect-honey navigation-menu-horizontal pencil-1 smiley-thrilled check-1 arrow-up-1 lock-2 navigation-menu add layout-module-1 archive arrow-left-1 wench arrow-down-1 multiple-neutral-1 expand-6 close drawer-send alarm-bell-1 social-media-twitter keyboard-arrow-up ticket-1 copy-paste rating-star download-thick-bottom information-circle smiley-sad-1 single-neutral-actions remove-square-1 file-code pencil-1 keyboard-arrow-down smiley-sad-1 cog single-neutral add-circle move-to-top list-bullets expand-6 undo tags-double smiley-happy view-1 messages-bubble-square print-text add-square smiley-happy credit-card-1 envelope-letter diagram-fall-down

Best Practices

Our tips and tricks to configuring your software
12 articles

Deployment Guidelines

State-of-the-art tools for backup, archive and replication to facilitate Disaster Recovery (DR) are integral in DATASTOR Enterprise level solutions. This document describes several deployment options for the DATASTOR Enterprise Protection Server (EPS) and Scalable Protection Server (SPS) data protect...

Disk Storage Considerations

DATASTOR software intelligently protects data on company servers using protection plans and efficiently stores the data in a central repository on a disk volume called a store. Plan and prepare storage up front to minimize the need to reorganize storage down the line. For larger Enterprise level...

Purchasing barcode labels

There are a few options for purchasing barcode labels. The easiest is to purchase online. Barcode labels are pretty standardized with LTO media. The most typical barcodes are 6 digits in length. Most people start with barcode 000000 and work their way up from there. In addition, the label typicall...

Theory of operations for vaulting to tape

If you are new to our data protection solutions, you may be asking yourself how to run a simple backup to tape, as you would with legacy tape software. The DATASTOR software is a disk to disk to tape solution; it backs up to disk initially using source-based deduplication technology, then facilita...

Creating a service account with restricted permissions

Best practice for your DATASTOR software installation and configuration is to run tasks with a service account. In a domain environment, a group policy can be created to configure the service account as a member of the local Administrators group of each computer in the domain without making the a...

Using a service account with DATASTOR

To seamlessley obtain access to required administrative shares and to access all files for backup, create a service account and configure the software to use it. In a domain environment, use Active Directory Users and Computers to create a domain account to run DATASTOR protection plans and stor...

Creating a Protection Plan on a Workgroup Computer

When the remote computer to be protected is in a workgroup (not in a domain), follow the steps below to use pass through authentication. 1. Create a backup service account on the Archive Manager server that is a member of the local administrators group.2. Create a backup service account on each remot...

Export Settings

Most handy in case of a disaster that requires the recovery of the Archive Manager server itself. Check out this step by step walkthrough to configure your Archive Manager to export DATASTOR system settings and store them in the cloud. A DATASTOR best practice worth putting in place. Should take y...

Virtual Machine Backup Best Practices, Part 1

There are two basic approaches to protecting virtual machines running Windows--at the guest level and at the host level. The guest level backup approach treats a virtual machine the same as a physical machine, and runs backups within the virtual machine, using any of the same options available to ...

Virtual Machine Backup Best Practices, Part 2

Last post we looked at guest level backup integration with Microsoft VSS technology as required when the virtual machine attaches to a physical disk. In this post we'll explore in more detail certain host level backup limitations. The host level backup approach backs up to available disk the virtu...

How to Configure the Export Settings Task

Configure Archive Manager to export its settings regularly, in case you need to recover the Archive Manager system or move it to a new server. Once configured, the Export Settings task exports the following information to a zip file: All Protection Plan configuration files Store Task configuration f...

Cloud Vaulting Task FAQs

Does the initial vaulting task replicate all existing restore points? Or do we select a point-in-time (like 90 days ago)? The software allows for selecting which Archives to vault and which point-in-time. Does the vaulting task then run on an hourly/daily/weekly schedule, synchronizing all backups s...