Under the Hood

11 articles

Reading the Diagnostic Level Log

With regard to these trace statements: DIAG - 2018-03-12 14:10:44.484 7668 Analyzing: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2379\Previous Files\02 Math and RNG\01 Vols\Touchdown Roulette.txt (0,478)[F,F] [0]   First DIAG statement indi...

How to Use the Status Command

Easily monitor the status of store tasks or protection plans from the command line To see more information on the status of an aiq task, such as purge, or a local plan run, monitor it from the command line: 1. Open a command prompt and change...

How to open a command prompt as administrator and change to the installation directory

You must run DATASTOR command-line commands as an administrator, otherwise you will receive an error when the command tries to run. To open a command prompt as an administrator, click the Start button in the bottom left pane, then select the All...

Modifying DATASTOR Shield™ Tasks

If you need to change the computer name of your DATASTOR Shield™ computer, or perhaps change the administrator account used for running DATASTOR Shield™ tasks, or if you need to change the DATASTOR Shield™ installation directory, use AiqUtil.exe...

Confirming you can fully restore the latest restore point

Restore to a nul location to confirm all files in a restore point can successfully restore The level 1 verify task checks that all referenced files in the latest restore point are present in the store. It also checks the data integrity of each ...

How to move the cache drive used for tape vaulting

The cache drive used by tape vaulting may be moved to a different local disk volume, if desired. The cache drive must be a local logical disk with an assigned drive letter. You may run the Configure Vaulting... wizard to change the cache drive ...

How to move the cache drive used for cloud vaulting

The cache drive used by cloud vaulting may be moved to a different local disk volume, if desired. The cache drive must be a local logical disk with an assigned drive letter. You may run the Configure Vaulting... wizard to change the cache drive...

How to view the Objectstore folder on disk

Protected data is stored in a self-describing, self-contained folder structure on a disk volume, called a store. The store is hidden by the software so it is not visible through Windows Explorer by default. All store functionality is handled thr...

EPS/EL Missing Option to Add a Store on a Network Share

Enabling Enhanced Deduplication in Shield 2012 R1 Enhanced deduplication is available in Enterprise Protection Server 2012 R1 (build 6.0.x) and Scalable Protection Server 2012 R1 (build 6.0.x). Future releases of the software will install with e...

Firewall ports required for communication

Here is a list of firewall ports that need to be open for the Enterprise Archive Manager and remote computers to communicate. Inbound and outbound UDP port 445 Microsoft Common Internet File System (CIFS) for file sharing. Additionally,...

Rebuilding plan indexes

In rare cases a plan's index files may have grown larger than expected after repeated results with errors and warnings. For improved performance and use of system resources the indexes should be rebuilt based off of the last good restore poi...