Solved

What happens if files are open or being changed/deleted during shadow copy image creation?

Posted on 2009-07-13
2
251 Views
Last Modified: 2012-05-07
I am trying to modify our backup process to create the backup without shutting down source control services. I discovered that ntbackup is initiating a shadow copy snapshot before each backup and using that image for the entire backup, but what happens when files are open or being changed/deleted during the short time that the shadow copy is being created?
0
Comment
Question by:GrandPixel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Accepted Solution

by:
rhandels earned 50 total points
ID: 24847556
Hi, what Microsoft does is it uses it's Volume Shadow Copy feature to create a copy in a single second, meaning it will copy the file like it is on the server. If a user opens a word document and the NTBackup is passing this file for backup it will take the non edited version of the file because the user is still working on the file on it's local laptop. Also, after the file is copied into the snapshot and a file is edited after that, even before Microsoft actually starts writing files to the backup device, it will still use the old file because that's the file in the snapshot..
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Learn about cloud computing and its benefits for small business owners.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question