Table of ContentsView in Frames

How SnapLock uses fingerprints

A fingerprint is useful for checking data integrity. The fingerprint operation allows you to generate a fingerprint on a per-file basis by using either of the following hashing algorithms—MD5 or SHA-256.

The fingerprint accounts for data set in place before migration and compares the data before and after migration. In addition, fingerprinting enables log tracking, thus extending the logging functionality.

For example, the privileged delete feature needs the ability to disambiguate (in a crash situation) between a file that was not deleted and a file that is deleted and replaced with a new file with the same name or contents.

You can create fingerprints for both WORM and non-WORM data files. You can generate fingerprints in XML format that can be viewed using any XML browser.

The SnapLock fingerprint operation supports the following algorithms:

By default, SnapLock uses the SHA-256 algorithm.