Logicube SuperSonix
®
-
NG User’s Manual
II
3.2.1 Step-by-step instructions
Drive Hash ................................................................................... 18
3.3.1 Step-by-step instructions
Wipe ............................................................................................ 19
3.4.1 Step-by-step instructions
Task Macro .................................................................................. 21
3.5.1 Step-by-step instructions
Viewing or exporting logs ............................................................ 24
3.5.2 Deleting Log Files ..................................................................................................................... 25
3.5.3 Accessing the Logs Over a Network ........................................................................................ 26
4.0.1 Cloning to Smaller Capacity Drives .......................................................................................... 30
4.0.2 BIOS, UEFI, Partitioning Schemes, and Sector Sizes ................................................................ 31
4.0.3 Mirror Copy Limitations........................................................................................................... 32
4.0.4 Clever Copy Limitations ........................................................................................................... 32
4.0.5 Cloning BitLocker Encrypted Drives......................................................................................... 32
4.3.1 Job Info .................................................................................................................................... 35
4.3.2 HPA/DCO ................................................................................................................................. 35
4.3.3 Error Handling ......................................................................................................................... 35
4.3.4 Hash/Verification Method ....................................................................................................... 36
4.3.5 File Image Method Settings ..................................................................................................... 37
4.3.6 Clone Method Settings ............................................................................................................ 37
5.2.1 Target....................................................................................................................................... 44
5.2.2 Settings .................................................................................................................................... 45