Solved

shadow question

Posted on 2003-11-14
3
413 Views
Last Modified: 2010-04-14
hi

can someone explain me how do i use the shadowing in 2003 server ?


victor
0
Comment
Question by:victorbx
  • 3
3 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 500 total points
Comment Utility
Hi victorbx,
Knowledge Base  

Description of the Shadow Copies Feature in Windows Server 2003PSS ID Number: 304606

Article Last Modified on 5/9/2003


--------------------------------------------------------------------------------
The information in this article applies to:


Microsoft Windows Server 2003, Standard Edition
Microsoft Windows Server 2003, Enterprise Edition

--------------------------------------------------------------------------------

This article was previously published under Q304606
SUMMARY
This article provides a description of the Shadow Copies feature in Windows Server 2003.
MORE INFORMATION
The Shadow Copies feature provides point-in-time copies of files on network shares. With shadow copies of shared folders, you can view the contents of network folders as they existed at points of time in the past. This feature may be very beneficial in the following three scenarios:
You want to recover files that were accidentally deleted. This is the network equivalent of the Recycle Bin functionality. If you accidentally delete a file, you can open an old version of the file, and then copy it to a safe location. Shadow copies of shared folders can recover files that are deleted by any mechanism, as long as the required history folder exists.
You want to recover a file after you accidentally overwrite it. Shadow copies of shared folders can be very useful in environments where you commonly create new files by opening an existing file, making modifications, and then saving the file with a new name. For example, you might open a financial-modeling spreadsheet, make modifications based upon new scenario assumptions, and then save the spreadsheet with a new name to create a new spreadsheet. The problem arises when you forget to save the file by using a new file name, so that the original work is erased. You can use a shadow copy of the shared folder to recover the previous version of the file.
You want to check different versions of the same file while you are working on the file. You could use shadow copies of shared folders during the normal work cycle when you want to determine what has changed between two versions of the same file. For example, you might want to see what your original text looked like before you spent time editing the file.
Notes
You can access shadow copies of shared folders on the Shadow Copies tab of the Local Disk Properties dialog box. You can also view the same dialog box in the Computer Management snap-in. To do so, right-click Shares, point to All Tasks, and then click Configure Shadow Copies.

The Vssadmin.exe tool is the command-line equivalent tool for the Volume Shadow Copy service.

For more information about shadow copies, search for "Shadow Copies" in Online Help.
Access Shadow Copies on Windows Server 2003 from Another Operating System
You can use the Shadow Copy Client to access shadow copies on Windows Server 2003 from client computers that are running other operating systems. For information about how to obtain the Shadow Copy Client, visit the following Microsoft Web site:
http://www.microsoft.com/downloads/details.aspx?FamilyID=e382358f-33c3-4de7-acd8-a33ac92d295e&DisplayLang=en

Keywords: kbenv kbinfo KB304606
Technology: kbWinServ2003Ent kbWinServ2003EntSearch kbWinServ2003Search kbWinServ2003St



--------------------------------------------------------------------------------

Send feedback to Microsoft

© 2003 Microsoft Corporation. All rights reserved.


Cheers!
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
victorbx,
Knowledge Base  

White Paper: Introduction to Shadow Copies of Shared FoldersPSS ID Number: 818694

Article Last Modified on 4/18/2003


--------------------------------------------------------------------------------
The information in this article applies to:


Microsoft Windows Server 2003, 64-Bit Datacenter Edition
Microsoft Windows Server 2003, 64-Bit Enterprise Edition
Microsoft Windows Server 2003, Datacenter Edition
Microsoft Windows Server 2003, Enterprise Edition
Microsoft Windows Server 2003, Standard Edition
Microsoft Windows Server 2003, Web Edition

--------------------------------------------------------------------------------

SUMMARY
Studies have shown that human error—primarily accidental file deletion or modification—causes over one-third of all data loss. For the average business of any size, data loss is at least an inconvenience and may be a critical blow that can jeopardize daily operations.

Microsoft Windows Server 2003 includes shadow copies of shared folders to help prevent inadvertent loss of data. Shadow copies of shared folders help reduce data loss by creating shadow copies of files or folders that are stored on network file shares at predetermined time intervals. A shadow copy is essentially a previous version of the file or folder from a specific point in time.

The "Introduction to Shadow Copies of Shared Folders" white paper describes the functionality of shadow copies of shared folders, the fundamentals of how to design a shadow copy strategy, and the basic steps for setting up and using shadow copies of shared folders on both servers and client computers. The white paper is for IT architects and system administrators.

To view this white paper, visit the following Microsoft Web site:
http://www.microsoft.com/windowsserver2003/techinfo/overview/scr.mspx

Topics That Are Included in This White Paper
Client Usage Scenarios
What Shadow Copies of Shared Folders Can Do
IT Usage Scenarios
Setup for Servers
How Shadow Copy Works
Designing a Shadow Copy Strategy
Setup for Clients
Keywords: KB818694
Technology: kbWinServ2003Data kbWinServ2003Data64bit kbWinServ2003Data64bitSearch kbWinServ2003DataSearch kbWinServ2003Ent kbWinServ2003Ent64bit kbWinServ2003Ent64bitSearch kbWinServ2003EntSearch kbWinServ2003Search kbWinServ2003St kbWinServ2003Web



--------------------------------------------------------------------------------

Send feedback to Microsoft

© 2003 Microsoft Corporation. All rights reserved.
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
ThanQ
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Describes a method of obtaining an object variable to an already running instance of Microsoft Access so that it can be controlled via automation.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now