1.3 Overview
The Shadow Copy Management Protocol provides a mechanism for remote configuration of shadow copies. Through the Shadow Copy Management Protocol, a client performs operations to enumerate shadow copies and configure the storage size and location that are used to maintain the shadow copies on the server.
The Shadow Copy Management Protocol is expressed as a set of DCOM interfaces. The server end of the protocol implements support for the DCOM interfaces to manage shadow copy configuration objects. The client end of the protocol invokes method calls on the interfaces to perform shadow copy configuration tasks on the server.<1> Specifically, the protocol is used for the following purposes:
Enumerating the volumes on the server that can be shadow copied.
Enumerating the shadow copies that are currently available on the server and that are point-in-time copies of a specified original volume.
Enumerating the volumes on the server that can be used as shadow copy storage.
Creating, modifying, enumerating, and deleting the shadow copy storage association objects that define the location and size of shadow copy storage for specific original volumes.
Querying all the shadow copy storage association objects on the server that provide shadow copy storage for a specified original volume.
Querying all the shadow copy storage association objects on the server that are located on a specified shadow copy storage volume.