DIGISTOR Page 2of 38
Contents
Introduction .................................................................................................................................... 3
Purpose ........................................................................................................................................... 3
Setup and Cigent for Windows Installation .................................................................................... 4
Using Always On and Dynamic Drives .......................................................................................... 12
Locking and Unlocking Drives ................................................................................................ 12
Accessing Always On Files ..................................................................................................... 13
Accessing Dynamic Files ........................................................................................................ 15
Manage Cigent Settings ................................................................................................................ 16
Authentication .............................................................................................................................. 18
License ........................................................................................................................................... 20
Folder Protections ......................................................................................................................... 22
Microsoft Defender and Antivirus Integration ............................................................................. 24
Network Manager ......................................................................................................................... 29
C Series Advanced SSD Features ................................................................................................... 32
KeepAlive ................................................................................................................................... 32
Command Log Audit .................................................................................................................. 33
Erase Verify................................................................................................................................ 36