Map a drive from a command prompt running as administrator to restore to an alternate network location When restoring to an alternate location, by default, you do not see any network locations listed in the 'Browse for folder' window for selection. To see a mapped drive in the 'Browse for folder' ...
Configure your expiration and purge settings in three steps Each store takes three steps to configure expiration and purge: Configure Expiration settings in store and archive properties pages. Create an Expire Task and schedule it. Create a Purge Task and schedule it. Configure Expiration settings Con...
You will use the Store Copy task to copy archives in a (source) store to a second (destination) store. STEPS TO COPY A STORE Add a new store to the desired device. In Archive Manager, select Storage in the left pane. In the Actions pane, select Add a Store. Give the store a unique name--the nam...
A DATASTOR Shield protection plan cannot simply be added to the virtual SQL Server, denoted by the SQL Server Cluster name, that exists in a clustered configuration, because a DATASTOR Shield scheduled task cannot be added to each physical node in the cluster using the “Add SQL Server protection pla...
This document discusses steps to set up SQL Server Protection Plans and restore protected databases using our software. In addition, recovery options are discussed and recovery steps are provided to replace an existing database or to attach the restored database alongside the original database. Co...
This document covers protection, restoration and recovery of Exchange Storage Groups. After data is protected using a DATASTOR Exchange Protection Plan, it may be restored to a restore folder using our software. In addition to protection and restoration, this document provides steps for two recove...
With the introduction of Exchange 2010, many new Exchange features have been added or refined in the areas of mailbox recovery, mail archiving, and system robustness. With the DATASTOR Enterprise Protection Server or DATASTOR Professional Single Server, you can protect your data while still making...
DATASTOR Shield introduces the ability to recover a complete computer system. There are two basic elements for protecting and restoring a complete computer system using DATASTOR Shield. The first element is creating and running a Computer System Protection plan. This plan type is available for loc...
Recovering a system located on tape or in the cloud is done in a few easy steps. If you wanted to recover a system using a vaulted Computer System archive restore point located on tape or in the cloud, first stage the restore point using the 'Prepare' button in the 'restore' view of Archive Manage...
Normally, to erase a tape, you would delete the vaulting task (a store task), then remove the vault (from the all vaults folder), and the tapes should then be marked erase pending. If you had a second vaulting task writing to the same volume set, then that is a different matter. If you have taken ...
An off-site copy of your system should be retained to protect against site-wide disasters. This article describes how to protect and recover a DATASTOR Shield™ system. Exporting your dataStor Shield System for disaster recovery For Shield Professional, you only need to gather and retain the sys...
DATASTOR provides support for full computer system recovery using a restore point generated with a Computer System type plan. The target system must be booted into a pre-install environment using the DATASTOR-provided System Recovery Environment (SRE) in order to initiate the recovery. The SRE .is...
In addition to BIOS firmware assisting with the boot process of older computer systems, modern computer systems may boot with UEFI firmware instead, or even 64 bit systems configured for 32 bit legacy (BIOS) mode. DATASTOR Shield provides support for recovering both system types. Complete computer...
How to avoid a USN rollback condition To avoid a USN rollback condition with a recovered Active Directory (AD) server in an environment with one or more additional AD servers, follow the steps below. These steps were provided by Microsoft and then modified for use with our System Recovery Environ...
To move the software and configuration to a new server, follow the steps below: Submit the software licences to support so they can be set to activate again. Customers must have a current support contract for license reactivation. Give the new server the same name and IP address as the old one. ...
Customers with a current support contract and running any 8.0 release of the software are eligible to upgrade to the 9.0 release of the software. If your version of the software alerts you to the availability of an upgrade to 9.0, follow prompts to download the upgrade setup file. If you do not re...
In a disaster recovery situation in which the Archive Manager Server itself has been lost, as well as the store on disk, the system can be recovered from a vault on tape. The attached document provides the steps required to recover the Archive Manager Server and then recover the archived data from t...
Security measures implemented by Yahoo! and Google may prevent your checkup report from relaying through their services until you generate an "app password" through their email account settings. Yahoo! settings If you've activated two-step verification or Account Key for your Yahoo! account, y...
Each remote computer in Archive Manager requires a remote computer license. To recover a remote computer license assigned to one remote computer and assign it to a different computer, follow the steps below. Steps to Recover a Remote Computer License In Archive Manager, in the left pane, click on th...
Background Ransomware processes run within the security context of the user account that started the infection. These processes can target all accessible files and folders including DATASTOR storage. Goal To prevent ransomware encryption of DATASTOR storage and implement storage redundancy for expanded...
To restore from cloud storage you must first prepare the vaulted archive restore point by clicking the 'Prepare' button, which downloads the restore point data to a local disk cache. The 'Prepare' button is located on the calendar view of the selected archive under the Cloud Storage node in Archive ...
To facilitate tape rotation create two or more vaulting tasks, each with its own volume set. Tapes are then assigned to the vault's volume set. All of the tapes assigned to a vault must be rotated off site together to ensure complete data recovery from any particular archive restore point in the vau...
The Point-In-Time Explorer filters the display of files and folders that exceed the maximum path length supported by WebDAV. This does not effect the backup of files and folders with long paths but does impact the display of files and folders in the Point-In-Time Explorer once the limit of long path...
Administrators may require a restore method to prepare a new file server for production service that is synchronized with the original server's data prior to switchover to the new server. The time required to restore a huge data set may exceed the time available for the restore job to complete. In t...
To facilitate media rotation in the Enterprise software, set the protection plan to target a store group instead of a specific store. Create a store group, add member stores to it, set the store selection preference, and set the protection plan to use the store group. At protection plan startup, the...
Vaulting replicates restore points contained in a local store to cloud storage. A customer may wish to use a network share for the cache drive used by the software's vaulting feature in the event no appropriate local disk exists. Build 9.0.3094.1 and newer builds of the software permit the cache to ...
'Log on as a batch job' permission is required to run a backup scheduled task.On Domain Controllers, the Local Security Policy (secpol.msc) cannot be used to configure 'Log on as a batch job' rights for domain account configure to run the backup job. The option is greyed out. Use Group Policy Mana...
1) Enable SMTP Authentication in Microsoft 365 In order to send your Checkup Report via your Microsoft 365 email address, you first need to enable SMTP authentication for that email address in your Microsoft 365 admin center. Otherwise, Microsoft 365 will block requests to the SMTP server.To get star...