How to Recover Deleted Data from NAS Lenovo ThinkSystem SR860 Mission-Critical Server: A Step-by-Step Guide

Deleted files on your ⭐ NAS? Our guide provides the solutions you need for seamless recovery.

How to Recover Deleted Data from NAS Lenovo ThinkSystem SR860 Mission-Critical Server: A Step-by-Step Guide

Lenovo ThinkSystem SR860 Mission-Critical Server NAS Data Recovery in 2024

In this step-by-step tutorial, we’ll show you how to rebuild your RAID and recover data from ThinkSystem SR860 Mission-Critical Server.

How to Recover Deleted Data from NAS Lenovo ThinkSystem SR860 Mission-Critical Server: A Step-by-Step Guide

RAID Recovery™ 2.6
Recover data from damaged RAID arrays inaccessible from a computer.
Download

Why can’t ordinary software tools restore files from RAID?

Conventional hard disks keep user’s data by writing it to their surface in a consecutive way, and this is how an entire file is stored on a single hard disk. However, when data is written to a RAID system, a file is divided into several parts. Then these parts are written consecutively to all hard disks within such array. The size of such parts may range from 2 KB to 2 MB, so each file is stored on several hard disks at the same time.

Such approach helps to speed up read and write operations, and it is evident that saving two parts of a file having the size of 1 GB to two hard disks simultaneously is much faster than saving the same 1 GB of data to one hard disk. However, this peculiarity makes file recovery more complicated.

Various RAID levels store information in different ways. Additionally, manufacturers like Lenovo also introduce some modifications to this process, and that is why data can be written to hard disk in a wide variety of ways.

Are there any specific network security measures to implement for safeguarding NAS Lenovo ThinkSystem SR860 Mission-Critical Server devices against data loss?

Yes, there are several network security measures that can be implemented to safeguard NAS Lenovo ThinkSystem SR860 Mission-Critical Server devices against data loss. Here are some key measures:

  1. Access Control: Implement strict access control policies to ensure only authorized personnel have access to the server. Use strong passwords and enforce regular password changes. Consider implementing multi-factor authentication for added security.
  2. Firewall: Configure and maintain a firewall to control incoming and outgoing network traffic. This helps prevent unauthorized access and protects against potential attacks.
  3. Encryption: Enable encryption for data in transit and at rest. This ensures that even if the data is intercepted or stolen, it remains unreadable without the encryption key.
  4. Regular Updates and Patching: Keep the server's operating system, applications, and firmware up to date with the latest security patches. Regularly check for updates and apply them promptly to protect against known vulnerabilities.
  5. Intrusion Detection/Prevention System (IDS/IPS): Deploy an IDS/IPS solution to monitor network traffic and detect any suspicious activity or potential attacks. This helps in identifying and mitigating threats in real-time.
  6. Backup and Disaster Recovery: Implement a robust backup strategy to regularly back up critical data stored on the NAS server. Store backups in a separate location to protect against data loss due to hardware failure, natural disasters, or cyber-attacks.
  7. Network Segmentation: Segment the network to isolate the NAS server from other systems and devices. This limits the potential attack surface and prevents lateral movement of threats within the network.
  8. Logging and Monitoring: Enable logging and monitoring on the NAS server to track and analyze any unusual activities or security incidents. Implement a centralized logging solution to consolidate logs from multiple devices for easier analysis.
  9. Antivirus/Antimalware: Install and regularly update antivirus and antimalware software on the NAS server to detect and remove any malicious software that may compromise data integrity.
  10. User Education and Awareness: Train users on best practices for data security, such as avoiding suspicious emails, not clicking on unknown links, and recognizing social engineering attempts. Regularly educate users about the importance of data protection and the potential risks associated with mishandling sensitive information.

It is important to note that these measures should be implemented as part of a comprehensive security strategy, tailored to the specific needs and requirements of your organization.

How to take hard disks out of the NAS and connect them to a PC?

Although NAS ThinkSystem SR860 Mission-Critical Server can be accessed over the network, you still need to take the hard disks out of the storage device and connect them to a Windows computer. Only in this case will the software be able to scan them properly. Here is what you should do:

  1. Turn off the storage and disconnect it from the power supply.

    WARNING! Before you start taking hard disks out of your NAS device, read the manual carefully. Incorrect actions may damage your network-attached storage and/or the hard disks within the RAID system.

  2. Take the hard disks out of the NAS one by one, carefully removing them from their slots. Remember that the disks are extremely vulnerable: hitting or dropping them may result in serious physical damage.

  3. Make sure to mark each hard disk in accordance with how they were installed inside the NAS.

  4. Remove the hard disks and connect them to the computer. In this video, we have explored what ports are used to connect hard disks, and what to do if there are not enough ports or connectors.

    Go to view
    How to Order Remote Data Recovery

    How to Order Remote Data Recovery

Restoring data with Hetman RAID Recovery

Hetman Raid Recovery

This program recovers data from damaged RAID arrays and is fully compatible with Lenovo ThinkSystem SR860 Mission-Critical Server. The hard disks that make up the RAID contain technical information about the algorithm used to save files. When launched, Hetman RAID Recovery reads this information and puts the damaged array together. Then you can open the disk and save your files. Also, you can recover the files accidentally deleted from the network drive.

Go to view
How to recover data from a Lenovo

How to recover data from a Lenovo

ThinkSystem SR860 Mission-Critical Server has 24 HDD slots, and it supports the following array types:

  • RAID 0;
  • RAID 1;
  • RAID 5;
  • RAID 6;
  • RAID 50;
  • RAID 60;
  • JBOD;

NAS supports:

  • exFAT, VFAT, FAT 12 / 16 / 32;
  • NTFS / ReFS;
  • APFS / HFS+;
  • Ext2 / 3 / 4 / ReiserFS / XFS / UFS / ZFS / Btrfs;
  • VMFS / HikvisionFS;

Safe recovery from disk images

This utility lets you save an entire copy of the disk to file and then work with this image instead of the actual disk. Such feature helps to protect data on the disk from:

  • Overwriting during the recovery process;
  • Loss resulting from bad sectors;
  • User mistakes.

To create an image, do the following:

  1. Make sure that you have enough free space to save the image. The image file size usually equals the disk size.

  2. Select the disk in the main window, and choose from the menu ToolsSave Disk. You can select multiple disks to be saved.

  3. When the image creation wizard starts, you can choose to save the entire disk or select only a part of it. Specify the parameters and click Next.

    Hetman Raid Recovery: Image Creation Wizard
  4. At this stage, you need to choose a directory where to save the image. Choose any disk connected to this PC, or save the image by FTP.

    Hetman Raid Recovery: hoose any disk connected to this PC, or save the image by FTP

Where are user’s files stored?

The Lenovo ThinkSystem SR860 Mission-Critical Server network-attached storage keeps LifeLine operating system files on a separate RAID 1 (mirrored) array. Usually, all NAS systems create several volumes on every hard disk, and the first of them takes up to 2 Gb of space. This is where operating system files are stored. Other volumes are united into a RAID array where user’s data is written.

Comparison of software for RAID recovery

Product Operating system License type RAID controller support Supported file systems Virtual RAID controller support Data recovery from damaged RAID File preview
Hetman RAID Recovery Windows Paid Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
DiskInternals RAID Recovery Windows Paid Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
R-Studio Windows, Mac, Linux Paid Yes, over 200 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
UFS Explorer RAID Recovery Windows, Mac, Linux Paid Yes, over 1,000 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
EaseUS Data Recovery Windows Paid Yes, over 20 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
ReclaiMe Free RAID Recovery Windows Free Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes

Feedback

We will be happy to answer your questions!

Comments (3)

  • Hetman Software: Data Recovery
    Hetman Software: Data Recovery 9.08.2022 12:31 #
    If you want to ask a question about data recovery, from NAS ThinkSystem SR860 Mission-Critical Server, feel free to leave a comment!
  • Xavier Harcourt-Vernon
    Xavier Harcourt-Vernon 22.08.2023 00:48 #
    Is it possible to recover data from a NAS Lenovo ThinkSystem SR860 Mission-Critical Server device that has been affected by a virus or malware infection?
    • Hetman Software
      Hetman Software 22.08.2023 00:59 #

      Yes, it is possible to recover data from a NAS Lenovo ThinkSystem SR860 Mission-Critical Server device that has been affected by a virus or malware infection. However, the success of data recovery depends on various factors such as the severity of the infection, the type of virus or malware, and the steps taken to mitigate the infection.

      Here are some general steps you can take to recover data from an infected NAS device:

      1. Disconnect from the network: Immediately disconnect the infected NAS device from the network to prevent further spread of the virus or malware.
      2. Isolate the device: Place the infected NAS device in a quarantined environment to prevent any potential harm to other systems or data.
      3. Scan and remove malware: Use an up-to-date antivirus or anti-malware software to scan the device and remove any detected threats. Ensure that the antivirus software is compatible with the NAS device's operating system.
      4. Restore from backup: If you have a recent backup of the data stored on the NAS device, restore the data from the backup to a clean and secure environment. This will ensure that you have a clean copy of the data without any malware.
      5. Professional data recovery: If you do not have a backup or if the backup is also infected, consider seeking professional data recovery services. There are specialized data recovery companies that can help recover data from infected NAS devices. They may use advanced techniques and tools to recover the data while minimizing the risk of further infection.

      It is important to note that prevention is always better than recovery. Regularly updating the NAS device's firmware, using strong passwords, implementing security best practices, and maintaining up-to-date antivirus software can help mitigate the risk of virus or malware infections.

Post comment
User
Leave a reply
Your email address will not be published. Required fields are marked *

Vladimir Artiukh

Author: Vladimir Artiukh, Technical Writer

Vladimir Artiukh is a technical writer for Hetman Software, as well as the voice and face of their English-speaking YouTube channel, Hetman Software: Data Recovery for Windows. He handles tutorials, how-tos, and detailed reviews on how the company’s tools work with all kinds of data storage devices.

Oleg Afonin

Editor: Oleg Afonin, Technical Writer

Oleg Afonin is an expert in mobile forensics, data recovery and computer systems. He often attends large data security conferences, and writes several blogs for such resources as xaker.ru, Elcomsoft and Habr. In addition to his online activities, Oleg’s articles are also published in professional magazines. Also, Oleg Afonin is the co-author of a well-known book, Mobile Forensics - Advanced Investigative Strategies.

Share

Questions and answers

  • What are the different file access levels available on the NAS Lenovo ThinkSystem SR860 Mission-Critical Server?

    The Lenovo ThinkSystem SR860 Mission-Critical Server supports various file access levels, including:

    1. Read-only access: Users can only view and read files but cannot modify or delete them.
    2. Read and write access: Users can view, read, modify, and delete files.
    3. Execute access: Users can run executable files or scripts.
    4. Full access: Users have complete control over files, including the ability to view, read, modify, delete, and execute them.

    These access levels can be assigned to individual users or groups, allowing for fine-grained control over file permissions and access rights on the NAS server.

  • How can the file access levels be configured and managed on the NAS Lenovo ThinkSystem SR860 Mission-Critical Server?

    The file access levels on the Lenovo ThinkSystem SR860 Mission-Critical Server can be configured and managed through the following steps:

    1. Access the server's management interface or console.
    2. Navigate to the NAS configuration settings.
    3. Locate the file access settings or permissions section.
    4. Configure the desired access levels for different users or groups. This can typically be done by specifying read, write, or execute permissions.
    5. Assign specific users or groups to the access levels by providing their usernames or group names.
    6. Save the changes and apply the new access levels.

    Additionally, some NAS systems may offer more advanced features for managing file access, such as:

    • Access control lists (ACLs): These allow for more granular control over file permissions, enabling specific permissions for individual users or groups.
    • Role-based access control (RBAC): This feature allows administrators to define roles with specific permissions and assign users to those roles, simplifying access management.
    • Integration with directory services: NAS servers can often integrate with existing directory services like Active Directory or LDAP, allowing for centralized user and group management.

    It's important to consult the specific documentation or user guide for the Lenovo ThinkSystem SR860 Mission-Critical Server or the NAS software being used to get detailed instructions on how to configure and manage file access levels.

  • What security measures are in place to ensure proper file access control and permissions on the NAS Lenovo ThinkSystem SR860 Mission-Critical Server?

    The Lenovo ThinkSystem SR860 Mission-Critical Server includes several security measures to ensure proper file access control and permissions on the NAS. Some of these measures include:

    1. User and group-based access control: The server allows administrators to create and manage user accounts and groups. Access permissions can be assigned at the user or group level, ensuring that only authorized individuals or groups can access specific files or directories.
    2. Role-based access control (RBAC): RBAC allows administrators to define roles with specific permissions and assign users to these roles. This ensures that users have appropriate access rights based on their roles within the organization.
    3. Access control lists (ACLs): ACLs provide fine-grained control over file access permissions. Administrators can define access rules at the file or directory level, specifying which users or groups have read, write, or execute permissions.
    4. Secure protocols: The server supports secure protocols such as Secure Shell (SSH) and Secure File Transfer Protocol (SFTP) for remote file access. These protocols encrypt data transmission, protecting it from unauthorized access or interception.
    5. Audit logs: The server maintains detailed audit logs that record user activities, such as file access, modifications, and permission changes. These logs can be used for monitoring and troubleshooting purposes, as well as for identifying any unauthorized access attempts.
    6. Encryption: The server supports data encryption at rest, ensuring that files stored on the NAS are protected even if the physical drives are compromised. Encryption algorithms, such as Advanced Encryption Standard (AES), can be used to secure data.
    7. Two-factor authentication (2FA): The server can be configured to require two-factor authentication for user login. This adds an extra layer of security by requiring users to provide a second form of authentication, such as a one-time password (OTP) or a biometric scan.
    8. Secure network access: The server can be integrated into the organization's network infrastructure, allowing administrators to implement additional security measures such as firewalls, virtual private networks (VPNs), and intrusion detection systems (IDS) to protect against unauthorized access attempts.

    It's important to note that the specific security measures available may vary depending on the exact configuration and firmware version of the Lenovo ThinkSystem SR860 Mission-Critical Server.

Hello! This is AI-based Hetman Software virtual assistant, and it will answer any of your questions right away.
Start Chat