VSS Backup. How to backup Microsoft Windows machines with Bacula Enterprise and VSS?
Bacula Enterprise is frequently perceived as a solution geared towards Linux. Nevertheless, in reality, Bacula Enterprise offers sophisticated tools for backing up Windows servers and workstations, along with advanced Windows applications and databases. Therefore, regardless of the variety of operating systems under your care, Bacula Enterprise can deliver comprehensive data backup and recovery services. Additionally, Bacula Enterprise enables cross-platform data recovery, Bare Metal recovery for Windows, and agentless backup for HyperV guests.

To ensure the proper backup of Microsoft Windows for most basic backups of filesystems and user data, it is necessary to use backup software that creates a shadow copy of the filesystem. This ensures that open files are backed up accurately and can be restored in a consistent state. The Volume Shadow Copy Service (VSS) is responsible for this task, allowing the backup of data and applications without interrupting ongoing writes. Bacula Enterprise has supported VSS for all Windows versions, starting from Windows XP and Server 2003.
Advanced backups of complex applications like MSSQL, Active Directory, HyperV, and others leverage the VSS system, but necessitate more intricate setups than a basic filesystem VSS backup. Bacula Enterprise integrates these extra functionalities in Windows through application-specific plugins. To view a demonstration of MSSQL server backup implementation, refer to our video at: https://www.youtube.com/watch?v=4jmsMfBHNr4
Fortunately, setting up a basic Windows fileset with VSS backup capabilities using Bacula Enterprise is a very simple process. The File Daemon efficiently manages all the intricacies associated with shadow copy management.
Using the BCenter “Add source” feature simplifies the procedure significantly, enabling the creation of a fileset that effectively backs up all files on a Windows server or workstation by utilizing VSS. Moreover, it also facilitates the customization of filesets to include or exclude particular files, directories, and volumes, providing a more tailored backup solution.
The actual configuration file will resemble the following format:
Name = “Windows Example”
Enable VSS = Yes #optional, on by default
Include {
Options {
IgnoreCase = yes
OneFs = no
Signature = Md5
}
File = “/”
}
Exclude {
File = “[A-Z]:/pagefile.sys”
File = “[A-Z]:/RECYCLER”
File = “[A-Z]:/WINNT/Temp”
}
}
The Bacula Enterprise Windows File Daemon has the capability to automatically identify mounted drives. The fileset mentioned above will then proceed to back up all the files located on these mounted drives, utilizing VSS for the backup snapshot. While the VSS line is not mandatory, it is advisable to include it explicitly to avoid any confusion when reviewing the fileset in the future. For automated fileset deployment, it is safe to include ‘Enable VSS = yes’ in every fileset, even though non-Windows File Daemons will simply disregard it. Additionally, the Windows File Daemon now has the ability to handle multiple concurrent jobs from a single VSS snapshot, which can lead to improved backup throughput to various storage destinations from a well-equipped Windows file server.
So while it’s true that Bacula Enterprise’s core components run primarily on Linux servers, it is important to note that Windows servers, workstations, filesystems, and advanced applications can be fully backed up and recovered with the use of the Windows File Daemon and Enterprise plugins. Please contact Bacula Systems with any questions at baculasystems.com/contactus
ContentsHigh-Performance Computing (HPC) ExplainedWhat is HPC and Why is it Important?How Does HPC Differ from Traditional Computing?What Industries Benefit Most from HPC?The Role of Kubernetes in HPCWhat is Kubernetes and How Does it Work?Why Choose Kubernetes for HPC Workloads?What are the Key Features of Kubernetes that Enhance HPC?Benefits of Kubernetes for HPC WorkloadsKubernetes vs. Slurm:…
ContentsWhy Is Ransomware a Critical Threat in Modern Cybersecurity?Who Are the Primary Targets of Ransomware Attacks?What Are the Different Types of Ransomware?Double-extortion and data exfiltrationWhat Are Common Myths About Ransomware and Backups?What Are the Best Methods of Protecting Backups from Ransomware?Use Unique, Distinct CredentialsOffline storageBackup Copy JobsAvoid too many file system typesUse the 3-2-1-1 ruleVerify…
ContentsWhat is High Performance Computing Security and Why Does It Matter?Why HPC Security Standards and Architecture Matter in Modern FacilitiesHow Do We Understand HPC Security Architecture and Threats?What Does NIST SP 800-223 Establish for HPC Security Architecture?How Does the Four-Zone Reference Architecture Work?What Are the Real-World Attack Scenarios Against HPC Systems?What Makes HPC Threat Landscape…