Database Reference
In-Depth Information
16. Schedule the Log backup before the full backup. If you schedule the Log backup
before the full backup, you will only have to restore the last full backup and one
transaction log. Scheduling after the full backup will demand the restoration of the
last full backup and two transaction logs backups.
17. Establish an Auditing Policy on the Backup Folder. Enabling file access auditing to the
Backup Folder will monitor user access to the backups.
18. After the database is backed up in a file, compress and encrypt the files before
moving the contents to tape backups or other forms of long-term storage.
Encrypting the backup files will help you protect the confidentiality of the information if
somebody gains physical access to the media.
 
Search WWH ::




Custom Search