Solved

What happens if files are open or being changed/deleted during shadow copy image creation?

Posted on 2009-07-13
2
248 Views
Last Modified: 2012-05-07
I am trying to modify our backup process to create the backup without shutting down source control services. I discovered that ntbackup is initiating a shadow copy snapshot before each backup and using that image for the entire backup, but what happens when files are open or being changed/deleted during the short time that the shadow copy is being created?
0
Comment
Question by:GrandPixel
2 Comments
 
LVL 23

Accepted Solution

by:
rhandels earned 50 total points
ID: 24847556
Hi, what Microsoft does is it uses it's Volume Shadow Copy feature to create a copy in a single second, meaning it will copy the file like it is on the server. If a user opens a word document and the NTBackup is passing this file for backup it will take the non edited version of the file because the user is still working on the file on it's local laptop. Also, after the file is copied into the snapshot and a file is edited after that, even before Microsoft actually starts writing files to the backup device, it will still use the old file because that's the file in the snapshot..
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The HP utility "HP Lights-Out Online Configuration Utility for Windows Server 2003/2008" could be of great use when it comes to remotely configure a HP servers ILO WITHOUT rebooting the server. We would only need to create and run scripts using thi…
Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question