How to Recover Deleted Data from NAS Lenovo ThinkSystem SR860 Mission-Critical Server: A Step-by-Step Guide

Has your NAS Lenovo ThinkSystem SR860 Mission-Critical Server suddenly lost its network drive and you’re unsure what to do next? Did the RAID array collapse, making your files inaccessible? Is the device throwing errors during startup? Perhaps you accidentally rebuilt the RAID array or several hard drives failed at the same time?

How to Recover Deleted Data from NAS Lenovo ThinkSystem SR860 Mission-Critical Server: A Step-by-Step Guide

Lenovo ThinkSystem SR860 Mission-Critical Server NAS Data Recovery in 2025

In this step-by-step tutorial, we’ll show you how to rebuild your RAID and recover data from an ThinkSystem SR860 Mission-Critical Server. We’ll walk through the most common causes of failure and demonstrate proven methods to restore files from a lost or degraded RAID array.

How to Recover Deleted Data from NAS Lenovo ThinkSystem SR860 Mission-Critical Server: A Step-by-Step Guide

RAID Recovery™ 2.8
Recover data from damaged RAID arrays inaccessible from a computer.
Download

Why Regular Data Recovery Tools Can’t Restore Files from RAID

Conventional hard drives store user data by writing it sequentially across the disk surface, which means an entire file is typically located on a single drive. In contrast, when data is written to a RAID array, each file is split into multiple fragments. These fragments are then distributed and written in sequence across all the drives in the array. Depending on the configuration, fragment sizes can range from 2 KB to 2 MB, so every file is physically stored across several disks at once.

This approach significantly increases read and write performance — after all, writing two halves of a 1 GB file to two drives simultaneously is much faster than writing the full 1 GB to a single disk. However, this same mechanism makes file recovery far more complex.

Different RAID levels use different methods to distribute and protect data. On top of that, manufacturers like Lenovo often add their own proprietary structures and variations. As a result, data can be written to disks in many different formats, and each requires a specific approach during recovery.

Are there any specific network security measures to implement for safeguarding NAS Lenovo ThinkSystem SR860 Mission-Critical Server devices against data loss?

Yes, there are several network security measures that can be implemented to safeguard NAS Lenovo ThinkSystem SR860 Mission-Critical Server devices against data loss. Here are some key measures:

  1. Access Control: Implement strict access control policies to ensure only authorized personnel have access to the server. Use strong passwords and enforce regular password changes. Consider implementing multi-factor authentication for added security.
  2. Firewall: Configure and maintain a firewall to control incoming and outgoing network traffic. This helps prevent unauthorized access and protects against potential attacks.
  3. Encryption: Enable encryption for data in transit and at rest. This ensures that even if the data is intercepted or stolen, it remains unreadable without the encryption key.
  4. Regular Updates and Patching: Keep the server's operating system, applications, and firmware up to date with the latest security patches. Regularly check for updates and apply them promptly to protect against known vulnerabilities.
  5. Intrusion Detection/Prevention System (IDS/IPS): Deploy an IDS/IPS solution to monitor network traffic and detect any suspicious activity or potential attacks. This helps in identifying and mitigating threats in real-time.
  6. Backup and Disaster Recovery: Implement a robust backup strategy to regularly back up critical data stored on the NAS server. Store backups in a separate location to protect against data loss due to hardware failure, natural disasters, or cyber-attacks.
  7. Network Segmentation: Segment the network to isolate the NAS server from other systems and devices. This limits the potential attack surface and prevents lateral movement of threats within the network.
  8. Logging and Monitoring: Enable logging and monitoring on the NAS server to track and analyze any unusual activities or security incidents. Implement a centralized logging solution to consolidate logs from multiple devices for easier analysis.
  9. Antivirus/Antimalware: Install and regularly update antivirus and antimalware software on the NAS server to detect and remove any malicious software that may compromise data integrity.
  10. User Education and Awareness: Train users on best practices for data security, such as avoiding suspicious emails, not clicking on unknown links, and recognizing social engineering attempts. Regularly educate users about the importance of data protection and the potential risks associated with mishandling sensitive information.

It is important to note that these measures should be implemented as part of a comprehensive security strategy, tailored to the specific needs and requirements of your organization.

How to Remove Hard Disks from Your NAS and Connect Them to a PC

Although the NAS ThinkSystem SR860 Mission-Critical Server can be accessed over the network, you still need to remove its hard disks and connect them directly to a Windows PC. Only then can the recovery software properly scan and analyze the drives. Follow these steps:

  1. Power off the NAS and disconnect it from the power source.

    WARNING! Before removing any drives, carefully read the device manual. Improper actions may damage both the NAS enclosure and the hard disks in the RAID array.

  2. Remove the hard disks one by one, gently sliding each drive out of its slot. Remember that hard disks are highly sensitive: any impact or drop can cause serious physical damage.

  3. Label each hard disk according to its position inside the NAS. The order of the drives is crucial for correct RAID reconstruction.

  4. Connect the drives to your computer. In this video, we explain which ports you can use to connect hard disks and what to do if your PC does not have enough free connectors.

    Go to view
    How to Order Remote Data Recovery

    How to Order Remote Data Recovery

Step-by-Step Data Recovery with Hetman RAID Recovery

Hetman Raid Recovery

This program restores data from damaged RAID arrays and is fully compatible with Lenovo ThinkSystem SR860 Mission-Critical Server. Each hard disk in the array contains technical metadata describing how files were written. When launched, Hetman RAID Recovery analyzes this metadata, automatically reconstructs the damaged array, and provides access to its contents. After that, you can browse the recovered disk and save your files. The program can also restore files that were accidentally deleted from the network drive.

Go to view
How to recover data from a Lenovo

How to recover data from a Lenovo

ThinkSystem SR860 Mission-Critical Server has 24 HDD slots, and it supports the following array types:

  • RAID 0;
  • RAID 1;
  • RAID 5;
  • RAID 6;
  • RAID 50;
  • RAID 60;
  • JBOD;

NAS supports:

  • exFAT, VFAT, FAT 12 / 16 / 32;
  • NTFS / ReFS;
  • APFS / HFS+;
  • Ext2 / 3 / 4 / ReiserFS / XFS / UFS / ZFS / Btrfs;
  • VMFS / HikvisionFS;

How to Safely Recover Data from Disk Images

This utility allows you to create a complete copy of a disk and work with the disk image instead of the physical drive. This approach helps protect your data from:

  • Overwriting during the recovery process;
  • Additional data loss caused by bad sectors;
  • User errors.

To create a disk image, follow these steps:

  1. Ensure you have enough free space to store the image. Its size will typically match the size of the original disk.

  2. In the main window, select the target disk and choose Tools - Save Disk. You can also select multiple disks if needed.

  3. When the Image Creation Wizard opens, select whether you want to save the entire disk or only a specific region. Adjust the settings and click Next.

    Hetman RAID Recovery: Image Creation Wizard
  4. Choose the directory where the image will be saved. You may select any available disk connected to your PC or upload the image via FTP.

    Hetman RAID Recovery: Choose a disk or save the image via FTP

Where Are the User’s Files Actually Stored?

The Lenovo ThinkSystem SR860 Mission-Critical Server network-attached storage keeps LifeLine operating system files on a separate RAID 1 (mirrored) array. Usually, all NAS systems create several volumes on every hard disk, and the first of them takes up to 2 Gb of space. This is where operating system files are stored. Other volumes are united into a RAID array where user’s data is written.

RAID Recovery Software: Detailed Comparison

Product Operating system RAID controller support Supported file systems Virtual RAID controller support Data recovery from damaged RAID File preview
Hetman RAID Recovery Windows, Linux, MacOS Yes, over 100 controllers FAT, exFAT, NTFS, ReFS, APFS, HFS+, Ext4, Ext3, Ext2, ReiserFS, Btrfs, VMFS, Hikvision, XFS, UFS, ZFS Yes Yes Yes
DiskInternals RAID Recovery Windows Yes, over 10 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
R-Studio Windows, Mac, Linux Yes, over 20 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
UFS Explorer RAID Recovery Windows, Mac, Linux Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes
EaseUS Data Recovery Windows Yes, over 20 controllers FAT, NTFS, Ext2/3/4, HFS+ No Yes Yes
ReclaiMe Free RAID Recovery Windows Yes, over 100 controllers FAT, NTFS, Ext2/3/4, HFS+ Yes Yes Yes

Feedback

We will be happy to answer your questions!

Comments (3)

  • Hetman Software: Data Recovery
    Hetman Software: Data Recovery 9.08.2022 12:31 #
    If you want to ask a question about data recovery, from NAS ThinkSystem SR860 Mission-Critical Server, feel free to leave a comment!
  • Xavier Harcourt-Vernon
    Xavier Harcourt-Vernon 22.08.2023 00:48 #
    Is it possible to recover data from a NAS Lenovo ThinkSystem SR860 Mission-Critical Server device that has been affected by a virus or malware infection?
    • Hetman Software
      Hetman Software 22.08.2023 00:59 #

      Yes, it is possible to recover data from a NAS Lenovo ThinkSystem SR860 Mission-Critical Server device that has been affected by a virus or malware infection. However, the success of data recovery depends on various factors such as the severity of the infection, the type of virus or malware, and the steps taken to mitigate the infection.

      Here are some general steps you can take to recover data from an infected NAS device:

      1. Disconnect from the network: Immediately disconnect the infected NAS device from the network to prevent further spread of the virus or malware.
      2. Isolate the device: Place the infected NAS device in a quarantined environment to prevent any potential harm to other systems or data.
      3. Scan and remove malware: Use an up-to-date antivirus or anti-malware software to scan the device and remove any detected threats. Ensure that the antivirus software is compatible with the NAS device's operating system.
      4. Restore from backup: If you have a recent backup of the data stored on the NAS device, restore the data from the backup to a clean and secure environment. This will ensure that you have a clean copy of the data without any malware.
      5. Professional data recovery: If you do not have a backup or if the backup is also infected, consider seeking professional data recovery services. There are specialized data recovery companies that can help recover data from infected NAS devices. They may use advanced techniques and tools to recover the data while minimizing the risk of further infection.

      It is important to note that prevention is always better than recovery. Regularly updating the NAS device's firmware, using strong passwords, implementing security best practices, and maintaining up-to-date antivirus software can help mitigate the risk of virus or malware infections.

Post comment
User
Leave a reply
Your email address will not be published. Required fields are marked *

Vladimir Artiukh

Author: Vladimir Artiukh, Technical Writer

Vladimir Artiukh is a technical writer for Hetman Software, as well as the voice and face of their English-speaking YouTube channel, Hetman Software: Data Recovery for Windows. He handles tutorials, how-tos, and detailed reviews on how the company’s tools work with all kinds of data storage devices.

Oleg Afonin

Editor: Oleg Afonin, Technical Writer

Oleg Afonin is an expert in mobile forensics, data recovery and computer systems. He often attends large data security conferences, and writes several blogs for such resources as xaker.ru, Elcomsoft and Habr. In addition to his online activities, Oleg’s articles are also published in professional magazines. Also, Oleg Afonin is the co-author of a well-known book, Mobile Forensics - Advanced Investigative Strategies.

Share

Questions and answers

  • What are the different file access levels available on the NAS Lenovo ThinkSystem SR860 Mission-Critical Server?

    The Lenovo ThinkSystem SR860 Mission-Critical Server supports various file access levels, including:

    1. Read-only access: Users can only view and read files but cannot modify or delete them.
    2. Read and write access: Users can view, read, modify, and delete files.
    3. Execute access: Users can run executable files or scripts.
    4. Full access: Users have complete control over files, including the ability to view, read, modify, delete, and execute them.

    These access levels can be assigned to individual users or groups, allowing for fine-grained control over file permissions and access rights on the NAS server.

  • How can the file access levels be configured and managed on the NAS Lenovo ThinkSystem SR860 Mission-Critical Server?

    The file access levels on the Lenovo ThinkSystem SR860 Mission-Critical Server can be configured and managed through the following steps:

    1. Access the server's management interface or console.
    2. Navigate to the NAS configuration settings.
    3. Locate the file access settings or permissions section.
    4. Configure the desired access levels for different users or groups. This can typically be done by specifying read, write, or execute permissions.
    5. Assign specific users or groups to the access levels by providing their usernames or group names.
    6. Save the changes and apply the new access levels.

    Additionally, some NAS systems may offer more advanced features for managing file access, such as:

    • Access control lists (ACLs): These allow for more granular control over file permissions, enabling specific permissions for individual users or groups.
    • Role-based access control (RBAC): This feature allows administrators to define roles with specific permissions and assign users to those roles, simplifying access management.
    • Integration with directory services: NAS servers can often integrate with existing directory services like Active Directory or LDAP, allowing for centralized user and group management.

    It's important to consult the specific documentation or user guide for the Lenovo ThinkSystem SR860 Mission-Critical Server or the NAS software being used to get detailed instructions on how to configure and manage file access levels.

  • What security measures are in place to ensure proper file access control and permissions on the NAS Lenovo ThinkSystem SR860 Mission-Critical Server?

    The Lenovo ThinkSystem SR860 Mission-Critical Server includes several security measures to ensure proper file access control and permissions on the NAS. Some of these measures include:

    1. User and group-based access control: The server allows administrators to create and manage user accounts and groups. Access permissions can be assigned at the user or group level, ensuring that only authorized individuals or groups can access specific files or directories.
    2. Role-based access control (RBAC): RBAC allows administrators to define roles with specific permissions and assign users to these roles. This ensures that users have appropriate access rights based on their roles within the organization.
    3. Access control lists (ACLs): ACLs provide fine-grained control over file access permissions. Administrators can define access rules at the file or directory level, specifying which users or groups have read, write, or execute permissions.
    4. Secure protocols: The server supports secure protocols such as Secure Shell (SSH) and Secure File Transfer Protocol (SFTP) for remote file access. These protocols encrypt data transmission, protecting it from unauthorized access or interception.
    5. Audit logs: The server maintains detailed audit logs that record user activities, such as file access, modifications, and permission changes. These logs can be used for monitoring and troubleshooting purposes, as well as for identifying any unauthorized access attempts.
    6. Encryption: The server supports data encryption at rest, ensuring that files stored on the NAS are protected even if the physical drives are compromised. Encryption algorithms, such as Advanced Encryption Standard (AES), can be used to secure data.
    7. Two-factor authentication (2FA): The server can be configured to require two-factor authentication for user login. This adds an extra layer of security by requiring users to provide a second form of authentication, such as a one-time password (OTP) or a biometric scan.
    8. Secure network access: The server can be integrated into the organization's network infrastructure, allowing administrators to implement additional security measures such as firewalls, virtual private networks (VPNs), and intrusion detection systems (IDS) to protect against unauthorized access attempts.

    It's important to note that the specific security measures available may vary depending on the exact configuration and firmware version of the Lenovo ThinkSystem SR860 Mission-Critical Server.