How to recover data from Lenovo ThinkSystem SR670 V2 Rack Server NAS

Is your network drive gone, and you are wondering what to do? Has a RAID system crashed, and your files are no longer accessible? Does your device display an error while booting? Have you accidentally rebuilt your RAID system? Are several hard disks out of order?

How to recover data from NAS Lenovo ThinkSystem SR670 V2 Rack Server

Lenovo ThinkSystem SR670 V2 Rack Server NAS Data Recovery in 2024

In this step-by-step tutorial, we’ll show you how to rebuild your RAID and recover data from ThinkSystem SR670 V2 Rack Server.

How to recover data from NAS Lenovo ThinkSystem SR670 V2 Rack Server

Recover data from damaged RAID arrays inaccessible from a computer.

Why can’t ordinary software tools restore files from RAID?

Conventional hard disks keep user’s data by writing it to their surface in a consecutive way, and this is how an entire file is stored on a single hard disk. However, when data is written to a RAID system, a file is divided into several parts. Then these parts are written consecutively to all hard disks within such array. The size of such parts may range from 2 KB to 2 MB, so each file is stored on several hard disks at the same time.

Such approach helps to speed up read and write operations, and it is evident that saving two parts of a file having the size of 1 GB to two hard disks simultaneously is much faster than saving the same 1 GB of data to one hard disk. However, this peculiarity makes file recovery more complicated.

Various RAID levels store information in different ways. Additionally, manufacturers like Lenovo also introduce some modifications to this process, and that is why data can be written to hard disk in a wide variety of ways.

Is there a risk of data loss if a NAS Lenovo ThinkSystem SR670 V2 Rack Server device is physically damaged or stolen?

Yes, there is a risk of data loss if a NAS Lenovo ThinkSystem SR670 V2 Rack Server device is physically damaged or stolen. If the device is physically damaged, it may result in the loss of data stored on the server's hard drives. Similarly, if the device is stolen, there is a risk that the data stored on the server could be accessed or compromised by unauthorized individuals. It is important to have proper backup and security measures in place to mitigate the risk of data loss in such situations.

How to take hard disks out of the NAS and connect them to a PC?

Although NAS ThinkSystem SR670 V2 Rack Server can be accessed over the network, you still need to take the hard disks out of the storage device and connect them to a Windows computer. Only in this case will the software be able to scan them properly. Here is what you should do:

  1. Turn off the storage and disconnect it from the power supply.

    WARNING! Before you start taking hard disks out of your NAS device, read the manual carefully. Incorrect actions may damage your network-attached storage and/or the hard disks within the RAID system.

  2. Take the hard disks out of the NAS one by one, carefully removing them from their slots. Remember that the disks are extremely vulnerable: hitting or dropping them may result in serious physical damage.

  3. Make sure to mark each hard disk in accordance with how they were installed inside the NAS.

  4. Remove the hard disks and connect them to the computer. In this video, we have explored what ports are used to connect hard disks, and what to do if there are not enough ports or connectors.

    Go to view
    How to Order Remote Data Recovery

    How to Order Remote Data Recovery

Restoring data with Hetman RAID Recovery

Hetman Raid Recovery

This program recovers data from damaged RAID arrays and is fully compatible with Lenovo ThinkSystem SR670 V2 Rack Server. The hard disks that make up the RAID contain technical information about the algorithm used to save files. When launched, Hetman RAID Recovery reads this information and puts the damaged array together. Then you can open the disk and save your files. Also, you can recover the files accidentally deleted from the network drive.

Go to view
How to recover data from a Lenovo

How to recover data from a Lenovo

ThinkSystem SR670 V2 Rack Server has 64 HDD slots, and it supports the following array types:

  • RAID 0;
  • RAID 1;
  • RAID 5;
  • RAID 6;
  • RAID 50;
  • RAID 60;
  • JBOD;

NAS supports:

  • exFAT, VFAT, FAT 12 / 16 / 32;
  • NTFS / ReFS;
  • APFS / HFS+;
  • Ext2 / 3 / 4 / ReiserFS / XFS / UFS / ZFS / Btrfs;
  • VMFS / HikvisionFS;

Safe recovery from disk images

This utility lets you save an entire copy of the disk to file and then work with this image instead of the actual disk. Such feature helps to protect data on the disk from:

  • Overwriting during the recovery process;
  • Loss resulting from bad sectors;
  • User mistakes.

To create an image, do the following:

  1. Make sure that you have enough free space to save the image. The image file size usually equals the disk size.

  2. Select the disk in the main window, and choose from the menu ToolsSave Disk. You can select multiple disks to be saved.

  3. When the image creation wizard starts, you can choose to save the entire disk or select only a part of it. Specify the parameters and click Next.

    Hetman Raid Recovery: Image Creation Wizard
  4. At this stage, you need to choose a directory where to save the image. Choose any disk connected to this PC, or save the image by FTP.

    Hetman Raid Recovery: hoose any disk connected to this PC, or save the image by FTP

Where are user’s files stored?

The Lenovo ThinkSystem SR670 V2 Rack Server network-attached storage keeps LifeLine operating system files on a separate RAID 1 (mirrored) array. Usually, all NAS systems create several volumes on every hard disk, and the first of them takes up to 2 Gb of space. This is where operating system files are stored. Other volumes are united into a RAID array where user’s data is written.

Comparison of software for RAID recovery

Product Operating system License type RAID controller support Supported file systems Virtual RAID controller support Data recovery from damaged RAID File preview
Hetman RAID Recovery Windows Paid Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
DiskInternals RAID Recovery Windows Paid Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
R-Studio Windows, Mac, Linux Paid Yes, over 200 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
UFS Explorer RAID Recovery Windows, Mac, Linux Paid Yes, over 1,000 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
EaseUS Data Recovery Windows Paid Yes, over 20 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
ReclaiMe Free RAID Recovery Windows Free Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes

Feedback

We will be happy to answer your questions!

Comments (3)

  • Hetman Software: Data Recovery
    Hetman Software: Data Recovery 9.08.2022 12:31 #
    If you want to ask a question about data recovery, from NAS ThinkSystem SR670 V2 Rack Server, feel free to leave a comment!
  • Roderick Stanton
    Roderick Stanton 22.08.2023 05:42 #
    Is it possible to recover data from a NAS Lenovo ThinkSystem SR670 V2 Rack Server device that has been affected by a ransomware attack?
    • Hetman Software
      Hetman Software 22.08.2023 07:02 #

      Recovering data from a NAS device that has been affected by a ransomware attack is generally challenging but not impossible. Here are a few steps you can take to attempt data recovery:

      1. Isolate the affected server: Disconnect the server from the network to prevent further spread of the ransomware.
      2. Identify the ransomware: Determine the specific ransomware variant that has infected the server. This information can help in finding decryption tools or possible workarounds.
      3. Consult with cybersecurity experts: Reach out to cybersecurity professionals who specialize in ransomware attacks. They may have experience with the specific ransomware variant and can provide guidance on recovery options.
      4. Restore from backups: If you have recent and unaffected backups of your data, restore the data to a clean server. Ensure that the backups were not compromised during the attack.
      5. Explore decryption options: Some cybersecurity companies and law enforcement agencies may have decryption tools available for certain ransomware variants. Check with them to see if a decryption solution exists for your specific situation.
      6. Seek professional data recovery services: If backups are not available or viable, you can contact professional data recovery services. They have specialized tools and expertise to recover data from compromised systems. However, this can be expensive and may not guarantee complete recovery.
      7. Learn from the incident: After recovering your data, analyze the attack and take measures to strengthen your security posture. This includes implementing robust security practices, educating users about phishing and other attack vectors, and regularly updating and patching your systems.

      Remember, prevention is always better than recovery. Regularly backing up your data, maintaining up-to-date security measures, and training employees on cybersecurity best practices can help prevent ransomware attacks in the future.

Post comment
User
Leave a reply
Your email address will not be published. Required fields are marked *

Vladimir Artiukh

Author: Vladimir Artiukh, Technical Writer

Vladimir Artiukh is a technical writer for Hetman Software, as well as the voice and face of their English-speaking YouTube channel, Hetman Software: Data Recovery for Windows. He handles tutorials, how-tos, and detailed reviews on how the company’s tools work with all kinds of data storage devices.

Oleg Afonin

Editor: Oleg Afonin, Technical Writer

Oleg Afonin is an expert in mobile forensics, data recovery and computer systems. He often attends large data security conferences, and writes several blogs for such resources as xaker.ru, Elcomsoft and Habr. In addition to his online activities, Oleg’s articles are also published in professional magazines. Also, Oleg Afonin is the co-author of a well-known book, Mobile Forensics - Advanced Investigative Strategies.

Share

Questions and answers

  • How does the NAS Lenovo ThinkSystem SR670 V2 Rack Server perform as an email server in terms of reliability and performance?

    The Lenovo ThinkSystem SR670 V2 Rack Server is a high-performance server that can be used for various purposes, including as an email server. In terms of reliability, the server is built with enterprise-grade components and is designed to provide continuous operation without significant downtime. It offers redundancy features such as hot-swappable power supplies and fans, as well as RAID support for data protection.

    In terms of performance, the ThinkSystem SR670 V2 is equipped with powerful processors, high-speed memory, and storage options. It supports up to four Intel Xeon Scalable processors, providing excellent processing power for handling email server workloads. The server also supports a large number of memory modules, allowing for efficient caching and quick access to frequently used data.

    Additionally, the ThinkSystem SR670 V2 offers flexible storage options, including support for SAS, SATA, and NVMe drives. This allows for high-speed data access and storage capacity to handle the demands of email server environments.

    Overall, the Lenovo ThinkSystem SR670 V2 Rack Server is well-suited for use as an email server, providing reliability and performance capabilities to ensure smooth and efficient email communication.

  • What are the key features and specifications of the NAS Lenovo ThinkSystem SR670 V2 Rack Server that make it suitable for hosting an email server?

    The Lenovo ThinkSystem SR670 V2 Rack Server has several key features and specifications that make it suitable for hosting an email server. Some of these features include:

    1. High-performance processors: The server is powered by Intel Xeon Scalable processors, which provide excellent processing power and performance for handling email server workloads.
    2. Scalability: The SR670 V2 supports up to four processors and up to 112 cores, allowing for scalability and the ability to handle a large number of email users and concurrent connections.
    3. Memory capacity: It supports up to 24 DDR4 memory modules, providing a maximum memory capacity of 6TB. Sufficient memory is crucial for handling email server processes and caching frequently accessed data.
    4. Storage options: The server offers flexible storage options, including support for up to 32 2.5-inch or 16 3.5-inch drives, with various SAS, SATA, and NVMe SSD options. This allows for ample storage capacity to store email data and attachments.
    5. Redundancy and reliability: The SR670 V2 includes redundant power supplies and cooling fans, ensuring high availability and minimizing the risk of downtime. It also supports RAID configurations for data protection and reliability.
    6. Network connectivity: The server includes multiple Gigabit Ethernet ports and optional 10GbE or 25GbE adapters, enabling high-speed network connectivity for handling email traffic and ensuring smooth communication.
    7. Management and monitoring: Lenovo XClarity Controller provides comprehensive management and monitoring capabilities, allowing administrators to efficiently manage and troubleshoot the server, ensuring optimal performance and uptime for the email server.
    8. Rack-optimized design: The server is designed to fit into standard data center racks, making it easy to integrate into existing infrastructure and efficiently utilize rack space.

    Overall, the combination of high-performance processors, scalability, ample memory and storage capacity, redundancy, and management features make the Lenovo ThinkSystem SR670 V2 Rack Server well-suited for hosting an email server, capable of handling the demands of email traffic, storage, and user concurrency.

  • How does the NAS Lenovo ThinkSystem SR670 V2 Rack Server ensure data security and privacy for an email server environment?

    The NAS Lenovo ThinkSystem SR670 V2 Rack Server itself does not specifically ensure data security and privacy for an email server environment. However, it can be used as a component within a larger infrastructure to enhance security measures. Here are some ways in which the server, combined with other security practices, can help ensure data security and privacy in an email server environment:

    1. Encryption: The server can support encryption technologies such as SSL/TLS to secure data transmission between the email server and clients, ensuring that data remains confidential during transit.
    2. Access controls: The server can be configured with access control mechanisms, such as user authentication and authorization, to restrict access to the email server environment only to authorized users. This helps prevent unauthorized access and protects sensitive information.
    3. Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS): The server can be integrated into a network security infrastructure that includes firewalls and IDS/IPS systems. These security measures help monitor and prevent unauthorized access, detect and block malicious activities, and protect against potential attacks on the email server environment.
    4. Regular software updates and patches: Keeping the server's operating system and applications up to date with the latest security patches is crucial to protect against known vulnerabilities and exploits. Regular updates help ensure that the server remains secure and resistant to potential threats.
    5. Backup and disaster recovery: The server can be used to implement a robust backup and disaster recovery strategy for the email server environment. Regular backups of email data can help in recovering from data loss or system failures, ensuring business continuity and protecting against potential data breaches.

    It is important to note that while the server can contribute to data security and privacy, a comprehensive security approach also involves implementing best practices, such as strong password policies, email filtering, anti-malware solutions, and user education on phishing and other security threats.

Hello! This is AI-based Hetman Software virtual assistant, and it will answer any of your questions right away.
Start Chat