Backup for Windows: Windows 2003 Server

Posted on 2005-04-14
Last Modified: 2010-05-18
Hello All

Have a server using windows backup.2003 server.
i have never used it before.
it was setup by someone else originally.
i have been going through the software to see if i can find where it says if job has completed successfully or not.
i see that it is set to give a job log a summary.
But i cannot find any logs, searched all drives and i dont see anything to with a backup job, and in the software doesnt seem to let me know if it has actually ran the job.
dont see any indication.all i can see is the schedule and that its set to go at a certain time every must be easy i just cant see it

any help be appreciated

Question by:SoHandy
    LVL 13

    Accepted Solution

    By default, Backup saves the backup log files in the Documents and Settings\user name\Local Settings\Application Data\Microsoft\Windows NT\NTbackup\Data folder, where user name is the name of the user who performed the backup.

    If you want to change this, the following link has a lot of info:

    "ntbackup backup [systemstate] "@FileName.bks" /J{"JobName"} [/P {"PoolName"}] [/G {"GUIDName"}] [/T { "TapeName"}] [/N {"MediaName"}] [/F {"FileName"}] [/D {"SetDescription"}] [/DS {"ServerName"}] [/IS {"ServerName"}] [/A] [/V:{yes | no}] [/R:{yes | no}] [/L:{f | s | n}] [/M {BackupType}] [/RS:{yes | no}] [/HC:{on | off}] "

    "/L:{f | s | n}

    Specifies the type of log file: f=full, s=summary, n=none (no log file is created)."

    Author Comment

    Hey man

    Thanks for that.
    i did a search on c drive for log files and it didnt find thes.
    must of been because of the location, in hidden files.
    Sure found them now thanks for the info

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    I have written before on the benefits of using a Boot media other than your HDD when it has become infected.   The article I wrote about creating a bootable CD/DVD/USB ( was mainly concerned with building a UBCD4Win on CD …
    I previously wrote an article addressing the use of UBCD4WIN and SARDU. All are great, but I have always been an advocate of SARDU. Recently it was suggested that I go back and take a look at Easy2Boot in comparison.
    This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
    This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now