Книга: Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant
Understanding shadow copies
Understanding shadow copies
You can create shadow copies only on NTFS volumes. You use the Shadow Copy feature to create automatic backups of the files in shared folders on a per-volume basis. For example, on a file server that has three NTFS volumes, each containing shared folders, you need to configure this feature for each volume separately.
If you enable this feature in its default configuration, shadow copies are created twice each weekday (Monday-Friday) at 7:00 A.M. and 12:00 P.M. You need at least 100 megabytes (MB) of free space to create the first shadow copy on a volume. The total disk space used beyond this depends on the amount of data in the volume’s shared folders. You can restrict the total amount of disk space used by Shadow Copy by setting the allowable maximum size of the point-in-time backups.
You configure and view current Shadow Copy settings on the Shadow Copies tab of the disk’s Properties dialog box. In File Explorer or Computer Management, press and hold or right-click the icon for the disk with which you want to work, tap or click Properties, and then tap or click the Shadow Copies tab. The Select A Volume panel shows the following:
? Volume The volume label of NTFS volumes on the selected disk drive
? Next Run Time The status of Shadow Copy as Disabled, or the next time a shadow copy of the volume will be created
? Shares The number of shared folders on the volume
? Used The amount of disk space used by Shadow Copy
Individual shadow copies of the currently selected volume are listed in the Shadow Copies Of Selected Volume panel by date and time.
- Disabling shadow copies
- Shadow count
- Understanding the Command Line
- Understanding Set User ID and Set Group ID Permissions
- Shadow Passwords
- Understanding init Scripts and the Final Stage of Initialization
- Understanding Point-to-Point Protocol over Ethernet
- Understanding SQL Basics
- Understanding the Changes Made by DHCP
- Understanding Computer Attacks
- Understanding SELinux
- Understanding the ext3 File System Structure