1.
Create a shadow copy of the source data on the source server (read-only).
2.
Mask off (hide) the shadow copy from the source server.
3.
Unmask the shadow copy to a target server.
4.
Optionally, clear the read-only flags on the shadow copy.
The data is now ready to use.
Folder and share management
The storage system supports several file-sharing protocols, including DFS, NFS, FTP, HTTP, and
Microsoft SMB. This section discusses overview information as well as procedures for the setup
and management of the file shares for the supported protocols. Security at the file level and at the
share level is also discussed.
NOTE:
Select servers can be deployed in a clustered or non-clustered configuration. This section
discusses share setup for a non-clustered deployment.
Folder management
Volumes and folders on any system are used to organize data. Regardless of system size, systematic
structuring and naming conventions of volumes and folders eases the administrative burden. Moving
from volumes to folders to shares increases the level of granularity of the types of data stored in
the unit and the level of security access allowed.
Folders can be managed using Server Manager. Tasks include:
•
Accessing a specific volume or folder
•
Creating a new folder
•
Deleting a folder
•
Modifying folder properties
•
Creating a new share for a volume or folder
•
Managing shares for a volume or folder
Managing file-level permissions
Security at the file level is managed using Windows Explorer.
File level security includes settings for permissions, ownership, and auditing for individual files.
To enter file permissions:
1.
Using Windows Explorer, access the folder or file that needs to be changed, and then right-click
the folder.
2.
Click
Properties
, and then click the
Security
tab.
Folder and share management
49