Solved

Volume Shadow Copies on the Exchange Database

Posted on 2006-11-08
4
257 Views
Last Modified: 2010-03-06
We have a windows 2003 servers which is a file server and an exchange server. I want to know is it advisable to have a volume shadow copies on a disk which has exchange database.
0
Comment
Question by:life_j
  • 2
4 Comments
 
LVL 9

Expert Comment

by:robjeeves
ID: 17904297
0
 
LVL 20

Expert Comment

by:ikm7176
ID: 17904423
Add this 1, if it helps you
http://support.microsoft.com/kb/822896
0
 
LVL 9

Accepted Solution

by:
robjeeves earned 250 total points
ID: 17904734
G'day life_j

A little more concise and useful for you ;-)

http://www.experts-exchange.com/Networking/Email_Groupware/Exchange_Server/Q_20989990.html?query=volume+shadow&topics=132

Seems like it should be fine of 2003 Server

Rob
0
 
LVL 11

Expert Comment

by:NetoMeter Screencasts
ID: 17908410
DISCLAIMER From the Moderators: the links in this thread require a paid registration to view.

I think that you should not use VSS instead of a regular back up for Exchange.
VSS provides and interface for the Software Vendors. They can use that interface in the backup software solutions which you purchase from them.
Technically speaking you can configure VSS for the volumes where the exchange data resides. The problem is that the VSS is enabled on a per volume basis which means that if your Exchange logs are on “D volume” and database files on “E volume” you have to enable VSS on both volumes. You can schedule the VSS and configure disk space restrictions but what is the point of such an approach?
•      The data created by VSS is stored on the same volume and in case of a disk failure you will lose it.
•      If you need to restore quickly a deleted email again that is definitely not a wise approach. It is much easier and faster to configure a Mail Retention policy like in the following video (screencast):

http://www.netometer.net/video/tutorials/mailretention/index.php

Best Regards,

Dean
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Lotus Notes – formerly IBM Notes – is an email client application, while IBM Domino (earlier Lotus Domino) is an email server. The client possesses a set of features that are even more advanced as compared to that of Outlook. Likewise, IBM Domino is…
Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
In this video we show how to create a mailbox database in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Servers >> Data…
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now