Solved

Volume Shadow Copies on the Exchange Database

Posted on 2006-11-08
4
256 Views
Last Modified: 2010-03-06
We have a windows 2003 servers which is a file server and an exchange server. I want to know is it advisable to have a volume shadow copies on a disk which has exchange database.
0
Comment
Question by:life_j
  • 2
4 Comments
 
LVL 9

Expert Comment

by:robjeeves
ID: 17904297
0
 
LVL 20

Expert Comment

by:ikm7176
ID: 17904423
Add this 1, if it helps you
http://support.microsoft.com/kb/822896
0
 
LVL 9

Accepted Solution

by:
robjeeves earned 250 total points
ID: 17904734
G'day life_j

A little more concise and useful for you ;-)

http://www.experts-exchange.com/Networking/Email_Groupware/Exchange_Server/Q_20989990.html?query=volume+shadow&topics=132

Seems like it should be fine of 2003 Server

Rob
0
 
LVL 11

Expert Comment

by:NetoMeter Screencasts
ID: 17908410
DISCLAIMER From the Moderators: the links in this thread require a paid registration to view.

I think that you should not use VSS instead of a regular back up for Exchange.
VSS provides and interface for the Software Vendors. They can use that interface in the backup software solutions which you purchase from them.
Technically speaking you can configure VSS for the volumes where the exchange data resides. The problem is that the VSS is enabled on a per volume basis which means that if your Exchange logs are on “D volume” and database files on “E volume” you have to enable VSS on both volumes. You can schedule the VSS and configure disk space restrictions but what is the point of such an approach?
•      The data created by VSS is stored on the same volume and in case of a disk failure you will lose it.
•      If you need to restore quickly a deleted email again that is definitely not a wise approach. It is much easier and faster to configure a Mail Retention policy like in the following video (screencast):

http://www.netometer.net/video/tutorials/mailretention/index.php

Best Regards,

Dean
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Resolve DNS query failed errors for Exchange
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a Resource Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: Navigate to the Recipients >> Resources tab.: "Recipients" is our default selection …
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now