Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Microsoft

Configure and use shadow copy in Microsoft Windows

By Mark W. Kaelin October 4, 2007, 12:58 AM PDT

Image
1
of 6

Configure and use shadow copy in Microsoft Windows

Vista System Properties

Vista System Properties

Shadow copy configuration
Before you can use the shadow copy feature you first must make sure it is enabled. Shadow copy does require additional system resources so you should weigh the benefits of file restoration with the availability of system resources. For most the benefits will outweigh the additional system requirements, but your situation may dictate a different approach.

Configuration settings for shadow copy can be found in System Properties. Navigate to the Control Panel and click the System Properties icon as shown. You can also type “system” into the Desktop Search box on the Start Menu.

Configure and use shadow copy in Microsoft Windows

Link to System Protection

Link to System Protection

On the System Properties window, click the System Protection link on the left-hand side of the screen. It is odd, but I could find no keyword that would lead me directly to the System Protection screen from the Desktop Search. The intermediate step to System Properties seems to be required.

Configure and use shadow copy in Microsoft Windows

System Protection tab

System Protection tab

Once you get to the System Properties dialog window, click the System Protection tab to reach the configuration screen for shadow copy. Make sure to check the drives for which you would like shadow copy to be available. If you want you can create a restore point immediately by clicking the Create button. Under normal conditions, a new restore point is created as part of the shutdown/boot process.

You can also restore to a previous point from this screen if you want to and if a restore point exists. Click Okay when your configuration is complete.

Configure and use shadow copy in Microsoft Windows

Original ShadowTest.docx

Original ShadowTest.docx

As you can see, there is just one line of text in ShadowTest.docx.

Configure and use shadow copy in Microsoft Windows

Restore point established

Restore point established

For our example, I forced the creation of a restore point to create a shadow copy of our test file.

From this screen you can Open the document, Copy it, or use it as a restoration file.

Configure and use shadow copy in Microsoft Windows

Restoration warning

Restoration warning

Restoration will replace whatever is in the current document with the version shown here in the shadow copy. Windows will warn you of this fact.

  • Microsoft
  • Account Information

    Share with Your Friends

    Configure and use shadow copy in Microsoft Windows

    Your email has been sent

Share: Configure and use shadow copy in Microsoft Windows
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, gadgets, finance, accounting, and tech-life for more than 25 years. Most recently, he has been a regular contributor to BreakingModern.com, aNewDomain.net,
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

TechRepublic Premium

  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to deploy an application with Kubernetes

    If you want to deploy applications into a Kubernetes cluster, be warned — it’s not the easiest task. There are a lot of moving pieces that go into these scalable containers. Don’t you wish you had a complete roadmap, from start to finish, to walk you through the process of deploying the Kubernetes cluster, deploying ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:51 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cross-training tool kit

    The more flexibility you can create in your technology workforce, the better you’ll be equipped to manage tomorrow, whatever the future brings. Too often, we focus on helping our teams become technical specialists who know volumes about a single technology, but quickly lose sight of how that technology connects with others. This makes their skills ...

    Downloads
    Published:  May 30, 2023, 4:00 PM EDT Modified:  May 31, 2023, 4:50 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice