add-circle-bold add-circle add-square add alarm-bell-1 alert-diamond analytics-pie-2 archive archive arrow-down-1 arrow-down-2 arrow-left-1 arrow-right-1 arrow-up-1 attachment-1 bin-paper-1 book-star button-record check-1 check-circle-1 close close-quote close cog-1 cog common-file-stack copy-paste credit-card-1 diagram-fall-down disable time-clock-midnight download-thick-bottom drawer-send envelope-letter envelope-letter expand-6 expand-6 file-code filter-1 floppy-disk flying-insect-honey folder-file-1 headphones-customer-support hierarchy-9 hyperlink-2 information-circle keyboard-arrow-down keyboard-arrow-up layout-module-1 list-bullets lock-2 lock-unlock-1 love-it messages-bubble-square move-to-top multiple-circle multiple-neutral-1 multiple-users-1 navigation-menu-horizontal navigation-menu network-browser open-quote pencil-1 pencil-write pencil-1 print-text rating-star rating-star remove-circle remove-square-1 search send-email-1 shield-warning single-neutral-actions single-neutral smiley-sad-1 smiley-unhappy smiley-indifferent smiley-smile-1_1 smiley-happy smiley-sad-1 smiley-unhappy smiley-indifferent smiley-happy smiley-thrilled social-media-twitter synchronize-arrows-1 tags-double ticket-1 ticket-1 time-clock-circle undo view-1 view-off view wench

Best Practices

Our tips and tricks to configuring your software
12 articles

Deployment Guidelines

State-of-the-art tools for backup, archive and replication to facilitate Disaster Recovery (DR) are integral in DATASTOR Enterprise level solutions. This document describes several deployment options for the DATASTOR Enterprise Protection Server (EPS) and Scalable Protection Server (SPS) data protect...

Disk Storage Considerations

DATASTOR software intelligently protects data on company servers using protection plans and efficiently stores the data in a central repository on a disk volume called a store. Plan and prepare storage up front to minimize the need to reorganize storage down the line. For larger Enterprise level...

Purchasing barcode labels

There are a few options for purchasing barcode labels. The easiest is to purchase online. Barcode labels are pretty standardized with LTO media. The most typical barcodes are 6 digits in length. Most people start with barcode 000000 and work their way up from there. In addition, the label typicall...

Theory of operations for vaulting to tape

If you are new to our data protection solutions, you may be asking yourself how to run a simple backup to tape, as you would with legacy tape software. The DATASTOR software is a disk to disk to tape solution; it backs up to disk initially using source-based deduplication technology, then facilita...

Creating a service account with restricted permissions

Best practice for your DATASTOR software installation and configuration is to run tasks with a service account. In a domain environment, a group policy can be created to configure the service account as a member of the local Administrators group of each computer in the domain without making the a...

Using a service account with DATASTOR

To seamlessley obtain access to required administrative shares and to access all files for backup, create a service account and configure the software to use it. In a domain environment, use Active Directory Users and Computers to create a domain account to run DATASTOR protection plans and stor...

Creating a Protection Plan on a Workgroup Computer

When the remote computer to be protected is in a workgroup (not in a domain), follow the steps below to use pass through authentication. 1. Create a backup service account on the Archive Manager server that is a member of the local administrators group.2. Create a backup service account on each remot...

Export Settings

Most handy in case of a disaster that requires the recovery of the Archive Manager server itself. Check out this step by step walkthrough to configure your Archive Manager to export DATASTOR system settings and store them in the cloud. A DATASTOR best practice worth putting in place. Should take y...

Virtual Machine Backup Best Practices, Part 1

There are two basic approaches to protecting virtual machines running Windows--at the guest level and at the host level. The guest level backup approach treats a virtual machine the same as a physical machine, and runs backups within the virtual machine, using any of the same options available to ...

Virtual Machine Backup Best Practices, Part 2

Last post we looked at guest level backup integration with Microsoft VSS technology as required when the virtual machine attaches to a physical disk. In this post we'll explore in more detail certain host level backup limitations. The host level backup approach backs up to available disk the virtu...

How to Configure the Export Settings Task

Configure Archive Manager to export its settings regularly, in case you need to recover the Archive Manager system or move it to a new server. Once configured, the Export Settings task exports the following information to a zip file: All Protection Plan configuration files Store Task configuration f...

Cloud Vaulting Task FAQs

Does the initial vaulting task replicate all existing restore points? Or do we select a point-in-time (like 90 days ago)? The software allows for selecting which Archives to vault and which point-in-time. Does the vaulting task then run on an hourly/daily/weekly schedule, synchronizing all backups s...