No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor 9000 V300R006C00 File System Feature Guide 12

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


This section describes the background, definition, and benefits of InfoLocker.


In this information era, data volume is ever increasing. Certain types of data, such as audit-related files and files recording enterprise rules, allow only read operations. Protection measures must be taken on such files. When the files are protected, no one can delete or modify them. InfoLocker can meet the above-mentioned requirement, ensuring the security of critical enterprise data.


InfoLocker is a WORM feature. If you have purchased the license for using this feature, you can set a retention period for files. During the retention period, the files can be read but cannot be modified or deleted. After the retention period is expired, the files can be deleted but cannot be modified. With this function, InfoLocker becomes a mandatory feature of archive file systems. InfoLocker has the enterprise compliance mode and the regulatory compliance mode. In enterprise compliance mode, locked files can only be deleted by system administrators. In regulatory compliance mode, no one can delete locked files. This version supports the enterprise compliance mode only.


Table 7-1 describes the benefits provided by InfoLocker.

Table 7-1  Benefits provided by InfoLocker



Better data security

The feature can ensure the security of critical data.

Updated: 2019-06-27

Document ID: EDOC1000122519

Views: 108009

Downloads: 163

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next