
Advanced Topics — Deployment Guide 10.1.6296 documentation
Once the database and user are created, sign into the CentreStack management console as the cluster admin and navigate to Cluster Control Panel > Settings > Change Log. Update the “Logging DB …
Installation — CentreStack Installation Guide 6.7 documentation
The second decision factor is how much logging information you would like to keep in the database. SQL Server Express 2008 has 4GB size limit and SQL Server Express 2012 has 10GB size limit. …
CentreStack Release History
The release notification is also published to twitter.com/gladinet Latest Downloads Page
Advanced Topics — Deployment Guide 7.12 documentation
The secondary database (for more volatile data) can be either MySQL Database or SQL Database. To split the database, first setup the secondary database. After that, set the secondary database’s …
Secure AutoCAD Collaboration with CentreStack File Locking
Yes, CentreStack provides a logging feature where you can query by user email or file name to see the history of file change activity. The normal period for the file logging is about 15 days, but you can …
Advanced Topics — Deployment Guide 8.3.4083 documentation
The secondary database (for more volatile data) can be either MySQL Database or SQL Database. To split the database, first setup the secondary database. After that, set the secondary database’s …
CentreStack: Secure File Storage & Collaboration Solution
Yes, CentreStack provides logging and file change activity tracking. Users can query by user email or file name within a specified date range to view the history of file change activities.
Revolutionize CAD Collaboration with CentreStack Solutions
Yes, you can generate a full report on all employees in the company, capturing everything they are doing, where they are logging in from, what time they are logging in, and their IP address.
Revolutionize Remote Work with CentreStack's Secure Access
What security features does CentreStack offer for remote access? CentreStack offers a suite of security features including auditing, reporting, file change logging, heuristics to block devices that change …
After logging into the portal, select ‘Management Console’ under username on the top right corner of the web portal: Here you can import users from Active Directory, automatically create users from a CSV …