Solved

Archive Attribute

Posted on 2014-02-26
2
237 Views
Last Modified: 2014-03-02
I believe I know the answer to this question but I want to make sure that the archive attribute of a file is purely used for backup management. I am robocopying a large amount of data in preparation for a move to a new server. Since there is so much data I am having to do this during business hours the day before so that during the actual setup of the new environment there will be limited waiting on data to be copied. My plan is to do a full copy today and a differential copy tomorrow to keep the data transfer delays to a minimum during the move. In doing this I will be using the /M switch to clear the archive attribute on the source data so that new data will be the only data with the archive attribute active.

This will have no effect on the users experience with the data, just purely be a back end tool for backups correct? Like I said, I am sure the answer is yes but want to make sure before I have some angry end users asking why they are having issues with certain files. Thanks
0
Comment
Question by:PIMSupport
2 Comments
 
LVL 83

Accepted Solution

by:
oBdA earned 500 total points
ID: 39889774
Yes, the Archive flag is usually of no importance for users. It's set by the OS when a file gets changed, and can be reset by backup software.
But you don't even need that with robocopy; just run the robocopy command again whenever you need to. robocopy will by default only copy files that aren't already (same size, same date) in the target folder (that's what you'll see in the "Skipped" column in the summary), so you don't need to worry that all files will be copied again.
You might want to use /mir to delete files in the target that were deleted in the source, and be sure to set /r and /w to something useful (in a reliable LAN, you can usually use /r:0).
0
 

Author Closing Comment

by:PIMSupport
ID: 39899207
Was exactly what I was thinking. Also let me know about the differential copy being the default for Robocopy which was even better.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

A while back when OPSMGR 2012 was released we were very excited about getting it into our environment and upgrading our 2007 implementation,  we started our planning and we then proceeded with our implementation. All went as planned & our system …
I wrote an article (http://www.experts-exchange.com/articles/2245/Anti-rootkit-software.html) some time ago with a reference to nLite  (http://www.nliteos.com/)slipstreaming software.  I recently changed that link to point to NTLite (https://www.ntl…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now