Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Any purpose in backing up lpt$vpn. files

Posted on 2004-11-02
1
Medium Priority
?
508 Views
Last Modified: 2013-12-04
What kind of files is lpt$vpn.451 (the number is different from file to file) seen in conjunction wit Trend products? When backing up my exchange server wouldn`t it be a good idea to skip backing up these files?

oh...and what about .log files. should they be backed up with excec backup. .log files in MDBDATA for instance. Another way to put it: Which directories is totally unnessesary to backup? on my win2000 server/exchange 2000. Except from the obvious: temp files
0
Comment
Question by:TorgN
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
TannerMan earned 200 total points
ID: 12473284
the lpt$vpn.xxx files is your virus pattern file. You dont' have to back it up, but there is no need not to. Normally there are only two of these. One for current pattern and one for previous. If you attempted to do a resotre it would be nice that trendscan woud function immediately.

If you are running an EXCHANGE backup separate from your full server backup then you do not need to backup the exchange folders like MDBdata.

The best practice for backing up exchange 2000 can be found here.
http://www.msexchange.org/articles/MF020.html

hope it helps
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Want to learn how to record your desktop screen without having to use an outside camera. Click on this video and learn how to use the cool google extension called "Screencastify"! Step 1: Open a new google tab Step 2: Go to the left hand upper corn…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question