Solved

veritas completing with exceptions

Posted on 2006-11-06
4
264 Views
Last Modified: 2013-12-01
this is what I get

Backup- \\server\C: Unable to open the item \\server\C:\WINDOWS\system32\dhcp\tmp.edb - skipped.
Backup- \\server\D: New VolumeUnable to open the item \\server\D:\Program Files\Exchsrvr\ExchangeServer_EX001\ExchangeServer_EX001.edb - skipped.
Unable to open the item \\server\D:\Program Files\Exchsrvr\ExchangeServer_EX001\MSS.log - skipped.
Unable to open the item \\server\D:\Program Files\Exchsrvr\ExchangeServer_EX001\MSStmp.log - skipped.
Unable to open the item \\server\D:\Program Files\Exchsrvr\ExchangeServer_EX001\tmp.edb - skipped.
0
Comment
Question by:zenworksb
  • 2
  • 2
4 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 500 total points
ID: 17882188
These files are all open and you shouldn't really back them up. The first one, tmp.edb, contains the dhcp database, but this isn't important and changes all the time. The 2nd is part of exchange, but to backup exchange you need the exchange agent installed and then select the exchange server store which will show up in the selection list. The others are open transaction log files of exchange server, and these logs also need the agent installed.

Anyway, it is better not to select the complete "C:\" drive of your server when backing up. Backup the data, not the OS and software!
0
 

Author Comment

by:zenworksb
ID: 17882373
They have teh agent for exchange so what do I do to resolve this thank you somuch
0
 

Author Comment

by:zenworksb
ID: 17882403
th einformation store, microsoft public folders, and exchange mailboxes are all selected for the exchange server so I just can uncheck the otehr selections on teh c:
0
 
LVL 88

Expert Comment

by:rindi
ID: 17882431
Yes, unselect the individual files.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now