EasyManua.ls Logo

HP ProLiant DL380 G5

HP ProLiant DL380 G5
168 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Recover les that were accidentally deleted. Previous versions can be opened and copied to
asafelocation.
Recover from accidentally overwriting a le. A previous version of that le can be acc essed.
Compare several versions of a le while working. Use previous versions to compare changes
between two versions of a le.
Shadow copies c annot replace the current backup, archive, or business recovery system, but they can
help to simplif y restore procedures. Because a snapshot only contains a portion of the original data
blocks, shadow copies can not protect against data loss due to med ia failures. However, the strength
of snapshots is the ability to instantly recover data from shad ow copies, reducing the number of times
needed to restore data from tape.
Shadow copy planning
Before setup is initiated on the server and the client interface is mad e available to end users, consider the
following:
From what v
olume will shadow copies be taken?
How much disk space should be allocated for shadow c opies?
Will separate d isks be used to store shadow copies?
How freque
ntly will shadow copies be made?
Identifying the volume
Shadow copies are taken for a complete volume, but not for a specicdirectory. Shadowcopies
work best when the server stores user les, such as documents, spreadsheets, presentations, graphics,
or database les.
NOTE:
Shadow copies should not be used to provide acc ess to previous versions of application or e-ma il
databases.
Shadow copies are designed for volumes that store user data such as home d irectories and My Documents
folders that are redirected by using Group P olicy or other shared folders in which users store data.
Shadow copies work with compressed or encrypted les and retain whatever permissions were set on the
les when the shadow copies were taken. For example, if a user is denied permission to read a le,
that user would not be able to restore a previous version of the le, or be able to read the le a f ter
it has been r estored.
Although shadow copies are taken for an entire volume, users must use shared folders to access sha dow
copies. Administrators on the local server must also specify the \\servername\sharename path to
access shadow copies. If administrators or end users want to access a pre vious version of a le that does
not reside in a shared folder, the administrator must rstsharethefolder.
NOTE:
Shadow copies a re available only on NTFS, not FAT or FAT32 volumes.
Files or folders that are recorded by using Shadow Copy appear static, even though the original data is
changing.
Allocating disk space
When determining the amo unt of space to allocate for storing shadow copies, consider both the number
and size of les that are being copied, as well as the frequency of changes between copies. For
example, 100 les that only change monthly require less storage space tha n 1 0 les that change daily. If
HPProLiantDL380G5StorageServer 63

Table of Contents

Other manuals for HP ProLiant DL380 G5

Related product manuals