What do your scripts do?

On Tue, Nov 6, 2018 at 12:34 PM Andrew Galloway <
andrew.gallo...@ssc-spc.gc.ca> wrote:

> We created a couple of scripts (SYSTEMSTATE_ON and SYSTEMSTATE_OFF) and
> run them as needed.
>
> >>> Zoltan Forray <zfor...@vcu.edu> 2018-11-06 10:27 AM >>>
> We are trying to reduce our ISP storage/footprint and one idea that came up
> was to stop backing up Windows server SYSTEMSTATE.  By quick calculations,
> this would eliminate 50TB+ of what I consider unnecessary backups. We are
> not aware of anyone ever restoring a Windows server OS - usually rebuild
> from scratch or maybe from the daily VMware snapshot.
>
> Even for AD servers, from what I understand, they perform their own Windows
> backups and then backup those flat files.
>
> So, we are wondering:  Do you backup SYSTEMSTATE on Windows servers?
>
> If so, why?
>
> If not, what method do you use to prevent the automatic backup of
> SYSTEMSTATE (CLOPTSET which includes a DOMAIN ALL-LOCAL -SYSTEMSTATE is
> what I am thinking of pushing down from the ISP servers).
>
> Your thoughts?
> --
> *Zoltan Forray*
> Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator
> Xymon Monitor Administrator
> VMware Administrator
> Virginia Commonwealth University
> UCC/Office of Technology Services
> www.ucc.vcu.edu
> zfor...@vcu.edu - 804-828-4807
> Don't be a phishing victim - VCU and other reputable organizations will
> never use email to request that you reply with your password, social
> security number or confidential personal information. For more details
> visit http://phishing.vcu.edu/
>


--
*Zoltan Forray*
Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator
Xymon Monitor Administrator
VMware Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
www.ucc.vcu.edu
zfor...@vcu.edu - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will
never use email to request that you reply with your password, social
security number or confidential personal information. For more details
visit http://phishing.vcu.edu/

Reply via email to