As an inSync administrator, you can restore data to a user's device. If the user has multiple devices, you can choose the device on where want to restore data. You can restore data to the following locations on the user's device:
- User desktop
- The original location from which inSync back up the data. This is applicable only if you are restoring data to the same device from which it was backed up.
- A custom location of your choice.
For restore, you can use Search to easily find and restore selected files.
To restore data on a user device
- On the inSync Master Management Console menu bar, click Users.
- Click the user whose data you want to restore.
- Click Restore > Restore Backup Data.
- On the Restore Data window, click the data source and then select the snapshot from which you want to restore data.
- Select the files or folders that you want to restore, and click Restore to Device. Alternatively, you can use Search to search for files that you want to restore. The Restore to Device window appears.
Note: You cannot restore files with the same names simultaneously.
- On the Restore to Device window, provide details on the following:
Field Action Restore to device If you want to restore the data to the device's desktop, click Desktop. Restore location
If you want to restore the data to the folder from which it was backed up, click Original Location.
- This option is available only when you are restoring data to the device from which it was backed up.
- If you are restoring custom folders configured using global variables as described in Configure custom folders for backup, inSync automatically detects the new user path and restores the data. For example, if you have configured the directory %USERPROFILE% on the user device, inSync automatically identifies the new userhome of the user on the device and restores the data.
- On Android 11 and later devices, Photos and Videos that are backed up from the Pictures and Movies folder are restored to the DCIM folder even if "Restore to Original Location" is selected.
Specify custom location If you want to restore data to a custom location, type the location in the Specify custom location box.
- Click OK.
- The restore request is created. You can track all the ongoing restore activities through the Live Activities page.
- To view the status of the restore activities, see the Restore Overview page.
After the restore operation is completed, you can click View Details to view the restore details. For example, the state of restore, number of files restored, number of files missed, and the reason for incomplete or failed restore along with the recommended actions.
- inSync administrator receives an email notification only when the restore is initiated by the administrator. inSync administrators will not receive email notifications for restores triggered by inSync users on their device or if they are performing a device replace activity.
- If the end-user has enabled the privacy settings, you cannot run admin restore on the device.
In addition to restoring your data, you can select a snapshot and download logs for the snapshot if you have an Elite Plus license. For more information, see Download Logs.
About file metadata after restore
inSync restores the following metadata for the files you restore to their original location.
Note: The Access control list is restored on Windows devices only if you restore a file to its original location and the user has Full Control permissions on the parent folder.
inSync restores the following metadata for the files you restore the files to their custom location.
If you are an Elite Plus License customer and you are using Unusual Data Activity feature to detect suspicious data modification, you can see a Download Logs button in the Restore Data window. Click Download Logs button to download logs, in .csv format, that describes the changes in files in this snapshot compared to the last snapshot. Logs help you identify the modified files that led inSync to flag this snapshot. You can either manually analyze the .csv log or use a third party tool for analysis that can detect potential threats. The log contains the following fields that can help you in analyzing it:
|File Name||Name of the file in the snapshot.|
|Full Path||Path of the file on the device|
|File Type||File extension indicating the file type. For example, .png, .jpeg, and .mov.|
|File Size||Size of the file (in bytes).|
|File Modified Timestamp||Date and time when the file was modified.|
|Operation||Describes whether file was modified, added, or deleted.|
|File Created Timestamp||Date and time when the file was created.|
|SHA1 Checksum||Hash value of the file indicating bytes modified in the file. Can be used to detect a potential threat.|
|File Owner||Name of the file owner.|
The Download Logs button is available for snapshots created only after Unusual Data Activity feature is enabled.
Note: Logs are not available for the first snapshot after Unusual Data Activity is enabled. If you click Download Logs button for the first snapshot, you see the Page Not Found (HTTP 404) error message.