10
©
Copyright 2017 QSAN Technology, Inc. All Right Reserved.
2.1.
Plan and identify WORM policy to apply
Figure 2
-
2 Configuration Process Flow: Plan and Identify WORM Policy to Apply
Keep in mind that WORM protection cannot be removed once activated, so planning and
designing the WORM policy to apply will be the most important step for the whole process.
Property description of each policy:
Protect This Forever
Folders and files do not require any rewrite after being placed into the share folder.
Set Retention Period on This Folder
Files and folders will be kept as read
-
only for a certain time until share folder is rewritable
again.
Set Retention Period on Each File of This Folder
Files and folders will be kept as read
-
only for a certain time until each individual file or folder
is rewritable again.
TIP:
Still not sure what to choose?
Composite Design:
Final Stage
WORM Policy
Transition Stage
WORM Policy
Initial Stage
WORM Policy
Set Retention
Period on Each File
of This Folder
Set Retention
Period on This
Folder
Set Retention
Period on This
Folder
Protect This
Forever
No Transition
Protect This
Forever
Plan and Identify
WORM Policy to
Apply
Select or Create
Share Folder for
WORM
Apply WORM Policy
to Share Folder
Test WORM
Share Folder