Downloads

Download Shadow Copy Client

Where can I download the Shadow Copy Client? What are the system requirements for the Shadow Copy client?

Shadow Copy Restore is a component of the intelligent file storage technologies in Microsoft Windows Server 2003. It enables you to prevent data loss by creating and storing shadow copies of files and folders on your network at predetermined time intervals.

Before a client computer can access shadow copies, you must install the Shadow Copy Client. The operating systems that require the Shadow Copy Client include:

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

  • Windows XP
  • Windows 2000 (SP3 and higher)

System Requirements

  • Supported Operating Systems: Windows 2000 Service Pack 3, Windows XP, Windows 98SE
  • Windows Installer : To install this msi package you need Windows Installer 2.0 or higher. You can download it from one of the following locations:

Windows Installer 2.0 Redistributable for Windows 98 SE

Windows Installer 2.0 Redistributable for Windows 2000

Download the Shadow Copy Client (488kb)

For Clients Running Windows XP

From the client computer, click the Download File link to start the download, then do one of the following:

  1. To start the installation immediately, click Open.
  2. To copy the download to your computer for installation at a later time, click Save.

For Clients Running Earlier Versions of Windows

To use Shadow Copies of Shared Folders on a client computer running a version of Windows earlier than Windows XP, you must install the shadow copy client software on both the client running the earlier version of Windows, and the server running Windows Server 2003.

From the client computer, click the Download File link to start the download, and then do one of the following:

  1. To start the installation immediately, click Open.
  2. To copy the download to your computer for installation at a later time, click Save.

From the server running Windows Server 2003, click the Download File link to start the download, then do one of the following:

  1. To start the installation immediately, click Open.
  2. To copy the download to your computer for installation at a later time, click Save.

Links

Windows 2003 Homepage

Introduction to Shadow Copies of Shared Folders

Shadow Copy Client: Accessing Shadow Copies on Windows Server 2003 (488kb)

Storage Services

Shadow Copy FAQ

View an animated demonstration of Volume Shadow Copy Service

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

 
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: