In the log file, each verification process is delineated by beginning and end markers. A list of files that are different on the source and target is provided as well cumulative totals for the verification process. The information provided for each file is the state of its synchronization between the source and the target at the time the file is verified. If the remirror option is selected so that files that are different are remirrored, the data in the verify log reflects the state of the file before it is remirrored, and does not report the state of the file after it is remirrored. If a file is reported as different, review the output for the file to determine what is different.
Sample verification log
--- VERIFICATION OF CONNECTION 2, CHECKSUM ENABLED (Sales data for alpha --> 206.31.65.40 : 1100) --- Start Time: 1/24/2012 12:15:20 PM for connection 2 (Sales data for alpha --> 206.31.65.40 : 1100) File: beta\users\bob\budget.xls DIFFERENT ON TARGET Source Attributes: Timestamp = 1/17/2012 8:21:36 PM Size = 1272 Mask = [0x20] Target Attributes: Timestamp = 1/17/2012 8:21:36 PM Size = 1272 Mask = [0x20] Security descriptors are different. 0 BYTES OUT OF SYNC File: beta\users\bill\timesheet.xls DIFFERENT ON TARGET Source Attributes: Timestamp = 1/17/2012 8:21:37 PM Size = 1272 Mask = [0x20] Target Attributes: Timestamp = 1/17/2012 8:21:37 PM Size = 1272 Mask = [0x23] 0 BYTES OUT OF SYNC File: beta\users\vincent\training.doc DIFFERENT ON TARGET Source Attributes: Timestamp = 1/12/2012 3:28:20 PM Size = 17 Mask = [0x20] Target Attributes: Timestamp = 1/20/2012 5:05:26 PM Size = 2 Mask = [0x20] 17 BYTES OUT OF SYNC Completion Time: 1/24/2012 12:37:44 PM for connection 2 (Sales data for alpha --> 206.31.65.40 : 1100) Elapsed Time (seconds): 1320.256470 Total Directories Compared: 657 Total Directories Missing: 0 Total Directories Remirrored: 0 Total Files Compared: 120978 Total Files Missing: 0 Total Files Different: 3 Total Files Encrypted: 0 Total Files Remirrored: 1 Total Bytes Skipped: 0 Total Bytes Compared: 18527203678 Total Bytes Missing: 0 Total Bytes Different: 17 Total Bytes Remirrored: 17 Related links and directory attributes have been adjusted. ----- END OF VERIFICATION ----- |
The mask must be converted in order to determine what attributes are assigned to a file. The mask is a hexadecimal number corresponding to a binary number that indicates what the attributes are. Using the following steps, you can determine how the mask corresponds to the attributes of a file.
Using the list above, identify those attributes that are enabled by those positions equal to one (1). The positions equal to zero (0) are disabled and that attribute does not apply. So hexadecimal number 23, which converted to 0000000000100011, indicates read only, hidden, and archive. Another example might be mask 0x827 which converted to binary is 0000100000100111. Positions 1-3, 6, and 12 are all enabled which indicates the file is read only, hidden, archive, and compressed.
Files that were replicated with the Replicate NTFS security attributes by name feature enabled, will be identified as different in the log file because of the local name attribute. The files will be the same.