add-circle-bold add-circle add-square add alarm-bell-1 alert-diamond analytics-pie-2 archive archive arrow-down-1 arrow-down-2 arrow-left-1 arrow-right-1 arrow-up-1 attachment-1 bin-paper-1 book-star button-record check-1 check-circle-1 close close-quote close cog-1 cog common-file-stack copy-paste credit-card-1 diagram-fall-down disable time-clock-midnight download-thick-bottom drawer-send envelope-letter envelope-letter expand-6 expand-6 file-code filter-1 floppy-disk flying-insect-honey folder-file-1 headphones-customer-support hierarchy-9 hyperlink-2 information-circle keyboard-arrow-down keyboard-arrow-up layout-module-1 list-bullets lock-2 lock-unlock-1 love-it messages-bubble-square move-to-top multiple-circle multiple-neutral-1 multiple-users-1 navigation-menu-horizontal navigation-menu network-browser open-quote pencil-1 pencil-write pencil-1 print-text rating-star rating-star remove-circle remove-square-1 search send-email-1 shield-warning single-neutral-actions single-neutral smiley-sad-1 smiley-unhappy smiley-indifferent smiley-smile-1_1 smiley-happy smiley-sad-1 smiley-unhappy smiley-indifferent smiley-happy smiley-thrilled social-media-twitter synchronize-arrows-1 tags-double ticket-1 ticket-1 time-clock-circle undo view-1 view-off view wench

How do I...?

13 articles

Restoring to an alternate network location

Map a drive from a command prompt running as administrator to restore to an alternate network location When restoring to an alternate location, by default, you do not see any network locations listed in the 'Browse for folder' window for selection. To see a mapped drive in the 'Browse for folder' ...

How to create a bootable USB thumb drive for the System Recovery Environment (SRE)

DATASTOR provides support for full computer system recovery using a restore point generated with a Computer System type plan. The target system must be booted into a pre-install environment using the DATASTOR-provided System Recovery Environment (SRE) in order to initiate the recovery. The SRE .is...

Recovering UEFI and BIOS based systems: choosing the correct SRE image file

In addition to BIOS firmware assisting with the boot process of older computer systems, modern computer systems may boot with UEFI firmware instead, or even 64 bit systems configured for 32 bit legacy (BIOS) mode. DATASTOR Shield provides support for recovering both system types. Complete computer...

System Recovery of server with Active Directory role

How to avoid a USN rollback condition To avoid a USN rollback condition with a recovered Active Directory (AD) server in an environment with one or more additional AD servers, follow the steps below. These steps were provided by Microsoft and then modified for use with our System Recovery Environ...

How to Upgrade Quantum GoProtect to DATASTOR Shield for RDX

Data Storage Group, Inc. (d.b.a DATASTOR™) is the original developer and publisher of the Quantum GoProtect backup software. As of January 31, 2017 the GoProtect product was end-of-lifed. Direct from DATASTOR™ is a 100% compatible alternative to GoProtect. The GoProtect software can be upgraded in...

How to Upgrade Tandberg Data AccuGuard Server for RDX to DATASTOR Shield for RDX

Data Storage Group, Inc. (d.b.a DATASTOR™) is the original developer and publisher of the Tandberg Data AccuGuard Server for RDX backup software. As of January 31, 2017 the AccuGuard product was end-of-lifed. Direct from DATASTOR™ is a 100% compatible alternative to AccuGuard. The AccuGuard softwa...

How to convert from OEM software to DATASTOR Shield for RDX

Converting to DATASTOR Shield for RDX for continued protection and access with existing cartridges License reactivation of software is available for customers with current support contracts only. You may install a compatible version of the DATASTOR Shield for RDX software for any immediate restore...

Mapped drives are not visible for selection in the software

The full edition of DATASTOR Shield Professional supports scanning of NAS locations through mapped drives for data protection. However, due to Microsoft UAC settings the mapped drives may not be visible in the software. With default UAC settings enabled, the software runs with elevated permissi...

How to send the checkup report through your Yahoo! or Google account

Security measures implemented by Yahoo! and Google may prevent your checkup report from relaying through their services until you generate an "app password" through their email account settings. Yahoo! settings If you've activated two-step verification or Account Key for your Yahoo! account, y...

Repair DATASTOR Shield installation files (launch Program Maintenance Wizard)

In some cases the software installation files may need to be repaired or the application components may need to registered again to correct issues.From the Programs and Features control panel (or Settings -> Apps & features on Windows 10) select the DATASTOR Shield application and right-click selec...

Gaining 30 Day Access to DATASTOR Shield Professional Software

DATASTOR Shield Professional grants a 30 day period of access to the software before license activation is required. Your production license key is required. The software is fully functional during this period. Access may facilitate data recovery in a disaster recovery scenario. If the license has a...

Ransomware Lockdown in DATASTOR Shield Professional

Storage configured for use with DATASTOR Shield Professional, such as an RDX cartridge, can be locked down to prevent unauthorized access and protection from Ransomware attack. Three methods of storage protection are discussed here: BitLocker encryption, air gap protection and NTFS permission restri...

Remove and Reinstall DATASTOR Shield installation files (launch Program Maintenance Wizard)

In some cases the software installation files may need to be removed or the application components may need to registered again to correct issues.IMPORTANT NOTE: This process requires that you re-enter and reactivate your software License Key. The License Key may only be reactivated when the softw...