You are here: Managing servers > Editing server properties > Log file properties > Verification log

Verification log

In the log file, each verification process is delineated by beginning and end markers. A list of files that are different on the source and target is provided as well cumulative totals for the verification process. The information provided for each file is the state of its synchronization between the source and the target at the time the file is verified. If the remirror option is selected so that files that are different are remirrored, the data in the verify log reflects the state of the file before it is remirrored, and does not report the state of the file after it is remirrored. If a file is reported as different, review the output for the file to determine what is different.

Sample verification log

--- VERIFICATION OF CONNECTION 2, CHECKSUM ENABLED (Sales data for alpha --> 206.31.65.40 : 1100) ---

Start Time: 1/24/2013 12:15:20 PM for connection 2 (Sales data for alpha -->

206.31.65.40 : 1100)

File:       beta\users\bob\budget.xls DIFFERENT ON TARGET

     Source Attributes: Timestamp = 1/17/2013 8:21:36 PM Size = 1272 Mask = [0x20]

     Target Attributes: Timestamp = 1/17/2013 8:21:36 PM Size = 1272 Mask = [0x20]

Security descriptors are different.

      0 BYTES OUT OF SYNC

File:       beta\users\bill\timesheet.xls DIFFERENT ON TARGET

     Source Attributes: Timestamp = 1/17/2013 8:21:37 PM Size = 1272 Mask = [0x20]

     Target Attributes: Timestamp = 1/17/2013 8:21:37 PM Size = 1272 Mask = [0x23]

      0 BYTES OUT OF SYNC

File:       beta\users\vincent\training.doc DIFFERENT ON TARGET

     Source Attributes: Timestamp = 1/12/2013 3:28:20 PM Size = 17 Mask = [0x20]

     Target Attributes: Timestamp = 1/20/2013 5:05:26 PM Size = 2 Mask = [0x20]

      17 BYTES OUT OF SYNC

Completion Time: 1/24/2013 12:37:44 PM for connection 2 (Sales data for alpha -->

206.31.65.40 : 1100)

Elapsed Time (seconds): 1320.256470

Total Directories Compared: 657

Total Directories Missing: 0

Total Directories Remirrored: 0

Total Files Compared: 120978

Total Files Missing: 0

Total Files Different: 3

Total Files Encrypted: 0

Total Files Remirrored: 1

Total Bytes Skipped: 0

Total Bytes Compared: 18527203678

Total Bytes Missing: 0

Total Bytes Different: 17

Total Bytes Remirrored: 17

Related links and directory attributes have been adjusted.

----- END OF VERIFICATION -----

The mask must be converted in order to determine what attributes are assigned to a file. The mask is a hexadecimal number corresponding to a binary number that indicates what the attributes are. Using the following steps, you can determine how the mask corresponds to the attributes of a file.

  1. Each mask begins with 0x. Identify the hexadecimal number after the constant 0x. For example, if the mask is 0x23, then the hexadecimal number you are interested in is 23. The hexadecimal number may be up to four digits.
  2. Convert the hexadecimal number to its 16-digit binary equivalent. You can use the Windows calculator for this conversion.
    1. Select Calculator from your Accessories program or apps group.
    2. Switch to scientific view, if it is not already in that view, by selecting View, Scientific.
    3. Select Hex.
    4. Enter the hexadecimal number, for example 23, as specified in your verification log.
    5. Select Bin and the hexadecimal number will change to the binary equivalent.
    6. Pad the beginning of the binary equivalent with zeroes (0) so that the number is 16 digits long. For example, hexadecimal number 23 converts to 100011, so the 16-digit binary equivalent would be 0000000000100011.
  3. Determine what number (0 or 1) appears in each position of the binary number. Because binary numbers count from right to left, start with position 1 on the right.
  4. Using the list above, identify those attributes that are enabled by those positions equal to one (1). The positions equal to zero (0) are disabled and that attribute does not apply. So hexadecimal number 23, which converted to 0000000000100011, indicates read only, hidden, and archive. Another example might be mask 0x827 which converted to binary is 0000100000100111. Positions 1-3, 6, and 12 are all enabled which indicates the file is read only, hidden, archive, and compressed.

    Files that were replicated with the Replicate NTFS security attributes by name feature enabled, will be identified as different in the log file because of the local name attribute. The files will be the same.