add-circle-bold add-circle add-square add alarm-bell-1 alert-diamond analytics-pie-2 archive archive arrow-down-1 arrow-down-2 arrow-left-1 arrow-right-1 arrow-up-1 attachment-1 bin-paper-1 book-star button-record check-1 check-circle-1 close close-quote close cog-1 cog common-file-stack copy-paste credit-card-1 diagram-fall-down disable time-clock-midnight download-thick-bottom drawer-send envelope-letter envelope-letter expand-6 expand-6 file-code filter-1 floppy-disk flying-insect-honey folder-file-1 headphones-customer-support hierarchy-9 hyperlink-2 information-circle keyboard-arrow-down keyboard-arrow-up layout-module-1 list-bullets lock-2 lock-unlock-1 love-it messages-bubble-square move-to-top multiple-circle multiple-neutral-1 multiple-users-1 navigation-menu-horizontal navigation-menu network-browser open-quote pencil-1 pencil-write pencil-1 print-text rating-star rating-star remove-circle remove-square-1 search send-email-1 shield-warning single-neutral-actions single-neutral smiley-sad-1 smiley-unhappy smiley-indifferent smiley-smile-1_1 smiley-happy smiley-sad-1 smiley-unhappy smiley-indifferent smiley-happy smiley-thrilled social-media-twitter synchronize-arrows-1 tags-double ticket-1 ticket-1 time-clock-circle undo view-1 view-off view wench

How do I...?

27 articles

Restoring to an alternate network location

Map a drive from a command prompt running as administrator to restore to an alternate network location When restoring to an alternate location, by default, you do not see any network locations listed in the 'Browse for folder' window for selection. To see a mapped drive in the 'Browse for folder' ...

Configure Expiration and Purge

Configure your expiration and purge settings in three steps Each store takes three steps to configure expiration and purge: Configure Expiration settings in store and archive properties pages. Create an Expire Task and schedule it. Create a Purge Task and schedule it. Configure Expiration settings Con...

How to Copy a Store

You will use the Store Copy task to copy archives in a (source) store to a second (destination) store. STEPS TO COPY A STORE Add a new store to the desired device. In Archive Manager, select Storage in the left pane. In the Actions pane, select Add a Store. Give the store a unique name--the nam...

Exchange 2007 Cluster Documentation - .pdf Download

A DATASTOR Shield protection plan cannot simply be added to the virtual SQL Server, denoted by the SQL Server Cluster name, that exists in a clustered configuration, because a DATASTOR Shield scheduled task cannot be added to each physical node in the cluster using the “Add SQL Server protection pla...

How to Protect and Recover SQL – .pdf download

This document discusses steps to set up SQL Server Protection Plans and restore protected databases using our software. In addition, recovery options are discussed and recovery steps are provided to replace an existing database or to attach the restored database alongside the original database. Co...

How to Protect, Restore and Recover Exchange - .pdf download

This document covers protection, restoration and recovery of Exchange Storage Groups. After data is protected using a DATASTOR Exchange Protection Plan, it may be restored to a restore folder using our software. In addition to protection and restoration, this document provides steps for two recove...

Protecting Exchange 2010 - .pdf download

With the introduction of Exchange 2010, many new Exchange features have been added or refined in the areas of mailbox recovery, mail archiving, and system robustness. With the DATASTOR Enterprise Protection Server or DATASTOR Professional Single Server, you can protect your data while still making...

Computer System Recovery (BMR)

DATASTOR Shield introduces the ability to recover a complete computer system. There are two basic elements for protecting and restoring a complete computer system using DATASTOR Shield. The first element is creating and running a Computer System Protection plan. This plan type is available for loc...

Computer System recovery from a vaulted archive

Recovering a system located on tape or in the cloud is done in a few easy steps. If you wanted to recover a system using a vaulted Computer System archive restore point located on tape or in the cloud, first stage the restore point using the 'Prepare' button in the 'restore' view of Archive Manage...

Erasing a Tape used in vaulting task

Normally, to erase a tape, you would delete the vaulting task (a store task), then remove the vault (from the all vaults folder), and the tapes should then be marked erase pending. If you had a second vaulting task writing to the same volume set, then that is a different matter. If you have taken ...

Exporting and Importing your Archive System

An off-site copy of your system should be retained to protect against site-wide disasters. This article describes how to protect and recover a DATASTOR Shield™ system. Exporting your dataStor Shield System for disaster recovery For Shield Professional, you only need to gather and retain the sys...

How to create a bootable USB thumb drive for the System Recovery Environment (SRE)

DATASTOR provides support for full computer system recovery using a restore point generated with a Computer System type plan. The target system must be booted into a pre-install environment using the DATASTOR-provided System Recovery Environment (SRE) in order to initiate the recovery. The SRE .is...

Recovering UEFI and BIOS based systems: choosing the correct SRE image file

In addition to BIOS firmware assisting with the boot process of older computer systems, modern computer systems may boot with UEFI firmware instead, or even 64 bit systems configured for 32 bit legacy (BIOS) mode. DATASTOR Shield provides support for recovering both system types. Complete computer...

System Recovery of server with Active Directory role

How to avoid a USN rollback condition To avoid a USN rollback condition with a recovered Active Directory (AD) server in an environment with one or more additional AD servers, follow the steps below. These steps were provided by Microsoft and then modified for use with our System Recovery Environ...

How to move the Archive Manager to a different server

To move the software and configuration to a new server, follow the steps below: Submit the software licences to support so they can be set to activate again. Customers must have a current support contract for license reactivation. Give the new server the same name and IP address as the old one. ...

UPGRADE FROM RELEASE 8.0 TO 9.0

Customers with a current support contract and running any 8.0 release of the software are eligible to upgrade to the 9.0 release of the software. If your version of the software alerts you to the availability of an upgrade to 9.0, follow prompts to download the upgrade setup file. If you do not re...

How to recover the entire system with just a set of tapes

In a disaster recovery situation in which the Archive Manager Server itself has been lost, as well as the store on disk, the system can be recovered from a vault on tape. The attached document provides the steps required to recover the Archive Manager Server and then recover the archived data from t...

How to send the checkup report through your Yahoo! or Google account

Security measures implemented by Yahoo! and Google may prevent your checkup report from relaying through their services until you generate an "app password" through their email account settings. Yahoo! settings If you've activated two-step verification or Account Key for your Yahoo! account, y...

How to Recover a Remote Computer License

Each remote computer in Archive Manager requires a remote computer license. To recover a remote computer license assigned to one remote computer and assign it to a different computer, follow the steps below. Steps to Recover a Remote Computer License In Archive Manager, in the left pane, click on th...

DATASTOR Lockdown from Ransomware

Background Ransomware processes run within the security context of the user account that started the infection. These processes can target all accessible files and folders including DATASTOR storage. Goal To prevent ransomware encryption of DATASTOR storage and implement storage redundancy for expanded...

How to Restore from Cloud Storage

To restore from cloud storage you must first prepare the vaulted archive restore point by clicking the 'Prepare' button, which downloads the restore point data to a local disk cache. The 'Prepare' button is located on the calendar view of the selected archive under the Cloud Storage node in Archive ...

How to Configure Vaulting with Tape Rotation

To facilitate tape rotation create two or more vaulting tasks, each with its own volume set. Tapes are then assigned to the vault's volume set. All of the tapes assigned to a vault must be rotated off site together to ensure complete data recovery from any particular archive restore point in the vau...

How to Restore a Filtered File or Folder

The Point-In-Time Explorer filters the display of files and folders that exceed the maximum path length supported by WebDAV. This does not effect the backup of files and folders with long paths but does impact the display of files and folders in the Point-In-Time Explorer once the limit of long path...

Using Mirrored Restore to Prepare a New Server

Administrators may require a restore method to prepare a new file server for production service that is synchronized with the original server's data prior to switchover to the new server. The time required to restore a huge data set may exceed the time available for the restore job to complete. In t...

How to Create a Store Group

To facilitate media rotation in the Enterprise software, set the protection plan to target a store group instead of a specific store. Create a store group, add member stores to it, set the store selection preference, and set the protection plan to use the store group. At protection plan startup, the...

How to configure a network share as the vault cache drive

Vaulting replicates restore points contained in a local store to cloud storage. A customer may wish to use a network share for the cache drive used by the software's vaulting feature in the event no appropriate local disk exists. Build 9.0.3094.1 and newer builds of the software permit the cache to ...

How to add 'Log on as batch job' on Domain Controller

'Log on as a batch job' permission is required to run a backup scheduled task.On Domain Controllers, the Local Security Policy (secpol.msc) cannot be used to configure 'Log on as a batch job' rights for domain account configure to run the backup job. The option is greyed out. Use Group Policy Mana...