<div dir="ltr"><br><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div class=""><div class="h5"><br>
</div></div>You don't need to resort to antiquated technologies to avoid clients being<br>
able to nuke their own backups. Server-initiated backups (my preference)<br>
get this capability by default, and even with client-initiated backups, it's<br>
not hard to allow the client to create and write to a new backup set without<br>
allowing the client to modify or remove completed backup sets.<br>
<span class=""></span></blockquote><div><br></div><div>I should have said "And thats one more reason why..." </div><div><br></div><div>So, if that virus got into your systems, and not the clients?</div><div><br>
</div><div>Having backups that are physically removed and unable to be destroyed quickly and effectively by a miss-configuration, malicious administrator or malicious software is valuable. </div><div><br></div><div>Tapes, removable hard drives, totally independent system thats WORM and very hardened - whatever floats your boat. Maybe its a risk you prefer to accept - that's your call. Obviously you need to actually remove tapes to make it effective in this capacity.</div>
<div><br></div><div>Or, in other words - snapshots are not a *complete* backup solution - despite what the vendor says.</div></div></div></div>