Solved

What are the implications of implementing Volume Shadow Copy?

Posted on 2007-04-04
4
259 Views
Last Modified: 2010-05-18
I am considering implementing Volume Shadow Copy on my new server.  What concerns (security, or disk space, etc.) should I be aware of?  What requirements are there?  I will be enabling it on a Small Business Server 2003 server.  Thanks for any help that you can give.   I do have a Raid 5 volume on this server with 5- 500 GB drives including the boot drive.
0
Comment
Question by:jmattson30
  • 2
  • 2
4 Comments
 
LVL 95

Expert Comment

by:Lee W, MVP
Comment Utility
The service takes deltas in files so that it doesn't actually backup the entire file.  It backs up only the changed sections of it.  Security wise, it should be as safe as having the file on the server... Disk can be a concern and there CAN be disk performance issues during the time the copies are made.  If the disk is VERY busy, sometimes copies WON'T be made.  In addition, I would strongly encourage purchasing another disk (separate spindles) to allow better performance and be sure to set the other disk as the place to store the copies.  If you can't do that, you can still use them, but the performance considerations will be more pressing.  

Just remember, Shadow Copies and RAID are NOT a substitute for backup - they are GREAT at helping to reduce down time and lost data due to negligence, but they can't save you from corruption, fire, or other hardware problems.
0
 

Author Comment

by:jmattson30
Comment Utility
Thanks Leew,

I appreciate the information.  If I do implement the Volume Shadow copy service and there is a performance decrease, is it easy to reverse or disable VSC?
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 125 total points
Comment Utility
Very.  Just disable it on the drives.  Couple clicks and you're done.  You can also reduce the number of copies made.  I try to have them made every 3 hours from 8am to 8pm.  Helps prevent problems from accidental deletions and overwrites.  But you could run them just at midnight (or after hours) once per day.  This would essentially give you a single online available backup that users could restore themselves.
0
 

Author Comment

by:jmattson30
Comment Utility
Great!  I will give this a shot and see what happens.  Thanks for the help!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now