If a remote computer is at risk of failing, the administrator can connect to the remote computer and create a complete or partial image of the failing drive. The cloned drive image file can then be scanned for all data, without further potential risk to the original drive’s data. All data that is on the drive image file is now secure.
When a file is deleted, either by accident or intentionally, the Windows operating system neither moves nor erases the file. Rather, Windows will designate the area on the drive on which the deleted file (or files) is located as available for immediate use. The file and folder information is no longer listed in Windows, but the file and folder data is still on the drive, AND is exactly where it was before it was deleted.
It is VERY IMPORTANT once it is realised that the data has been deleted that the drive activity is kept to a minimum, otherwise Windows, or another program, will start writing new data to the newly allocated “free” area of the drive. Stopping the use of the drive will minimise the chances of Windows overwriting the deleted data. Once a deleted file is overwritten, the deleted data will no longer be recoverable.
A user (client) should NOT turn off the computer or disk drive device! Shutting down and then rebooting a device may create new files and potentially overwrite the deleted or lost files.
FileRestore for Networks is a read only recovery solution, and when installed, will NOT write data to your drive. FileRestore for Networks will not therefore overwrite the very same data that you are attempting to recover.
Key requirements of an Enterprise Recovery solution are:
- All computers across the network can be connected to and their data recovered from a single management console.
- All computers across the network can be connected to and their drives imaged from a single management console.
- The detected files should be recoverable to any drive on the network.
- Read only data recovery - Important so that the lost or deleted data cannot be overwritten and permanently lost.
- Enterprise computers broadcast their protected status to the management console.
- Fast and easy deployment of the client service to remote computers e.g. Push-install or enterprise deployment with Active Directory Group Policy.
- Employs multiple data recovery scanning algorithms to provide the best possible chances of lost or deleted file detection.
- Provides previews of the lost or deleted data to expedite the recovered file selection process.