Gruppen ..............................................................................................24
Access Restrictions ........................................................................................28
Active Directory .................................................................................30
NT-Domänen .......................................................................................32
RAID-Arrays ........................................................................................38
Verwendung von JBOD ................................................................................38
RAID Scanning...............................................................................................41
3