12 managing data retention and validation, 13 configuring antivirus support, 15 creating block snapshots – HP StoreAll Storage User Manual
Page 6
Pausing a remote replication task.......................................................................................131
Resuming a remote replication task....................................................................................132
Querying remote replication tasks......................................................................................132
Replicating WORM/retained files...........................................................................................132
Configuring remote failover/failback.......................................................................................132
Troubleshooting remote replication..........................................................................................133
12 Managing data retention and validation..................................................134
WORM and WORM-retained files.....................................................................................134
Data retention attributes for a file system.............................................................................134
Data validation scans.......................................................................................................135
Viewing the retention profile for a file system.......................................................................139
Changing the retention profile for a file system.....................................................................140
Creating WORM and WORM-retained files........................................................................140
Viewing the retention information for a file..........................................................................141
File administration............................................................................................................141
Scheduling a validation scan.............................................................................................144
Starting an on-demand validation scan...............................................................................145
Viewing, stopping, or pausing a scan.................................................................................146
Viewing validation scan results..........................................................................................146
Viewing and comparing hash sums for a file.......................................................................146
Handling validation scan errors.........................................................................................147
Using hard links with WORM files..........................................................................................150
Using remote replication........................................................................................................150
Backup support for data retention...........................................................................................151
Troubleshooting data retention................................................................................................151
Adding or removing external virus scan engines.......................................................................153
Enabling or disabling Antivirus on X9000 file systems...............................................................153
Updating Antivirus definitions.................................................................................................154
Configuring Antivirus settings.................................................................................................154
Viewing Antivirus statistics......................................................................................................157
Antivirus quarantines and software snapshots...........................................................................158
14 Creating X9000 software snapshots........................................................160
Taking an on-demand snapshot.........................................................................................162
Determining space used by snapshots................................................................................163
Accessing snapshot directories...........................................................................................163
Restoring files from snapshots............................................................................................164
Deleting snapshots...........................................................................................................165
6
Contents