HP 4000S Guia do Utilizador Página 110

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 246
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 109
Shadow Copies
110 NAS 4000s and 9000s Administration Guide
Recovering an Overwritten or Corrupted File
Recovering an overwritten or corrupted file is easier than recovering a deleted file because the
file itself can be right-clicked instead of the folder. To recover an overwritten or corrupted file
use the following procedure:
1. Right-click the overwritten or corrupted file and click Properties.
2. Select Previous Versions.
3. To view the old version, click View. To copy the old version to another location, click
Copy... to replace the current version with the older version, click Restore.
Recovering a Folder
To recover a folder use the following procedure:
1. Position the cursor so that it is over a blank space in the folder that will be recovered. If the
cursor hovers over a file, that file will be selected.
2. Right-click the mouse, select Properties from the bottom of the menu, then click the
Previous Versions tab.
3. Choose either Copy or Restore.
4. Choosing Restore enables the user to recover everything in that folder as well as all
subfolders. Selecting Restore will not delete any files.
Backup and Shadow Copies
As mentioned previously, Shadow Copies are only available on the network via the client
application and only at a file or folder level as opposed to the entire volume. Hence the
standard backup associated with a volume backup will not work to back up the previous
versions of the file system. To answer this particular issue, Shadow Copies are available for
back up in two situations. If the backup software in question supports the use of Shadow
Copies and can communicate with underlying block device, it is supported and the previous
version of the file system will be listed in the backup application as a complete file system
snapshot. Lastly, if the built in backup application NTbackup is utilized, the backup software
forces a snapshot and then uses the snapshot as the means for backup. The user is unaware of
this activity and it is not self evident although it does address the issue of open files.
Vista de página 109
1 2 ... 105 106 107 108 109 110 111 112 113 114 115 ... 245 246

Comentários a estes Manuais

Sem comentários