?
Solved

Cannot perform system state backup

Posted on 2008-09-29
6
Medium Priority
?
190 Views
Last Modified: 2012-05-05
I am trying to create a system state backup using the built in utility (programs > accessories > system tools > back up) and cannot complete the process.  I keep getting this error:

Backup Status
Operation: Backup
Active backup destination: File
Media name: "Backup.bkf created 9/29/2008 at 12:06 PM"

Volume shadow copy creation: Attempt 1.
Timeout before function completed

Error returned while creating the volume shadow copy:0xffffffff.

Error returned while creating the volume shadow copy:ffffffff
Aborting Backup.

----------------------

The operation did not successfully complete.

----------------------

It has the most recent updates, not sure what to try.
0
Comment
Question by:bradlee27514
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 

Author Comment

by:bradlee27514
ID: 22599161
Is it safe to follow the commands in the 3rd link?
0
 

Author Comment

by:bradlee27514
ID: 22601035
I can run this fine on my other three servers, this is a terminal server, could that be an issue?
0
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 22923940
bradlee27514,

Since the issue was resolved and you posted the solution, a better closing would be to PAQ/Refund.  This way others who search EE can find your solution if they have a similar issue.  Thanks.

Cyclops3590
EE Cleanup Volunteer
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 22964928
PAQed with points refunded (500)

Computer101
EE Admin
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question