{"id":2477,"date":"2013-11-29T14:34:41","date_gmt":"2013-11-29T14:34:41","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2477"},"modified":"2019-11-19T02:33:10","modified_gmt":"2019-11-19T02:33:10","slug":"understanding-backup-methods","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods","title":{"rendered":"Understanding Backup Methods"},"content":{"rendered":"<p align=\"left\"><b>&nbsp;<\/b>When planning a backup, the amount of time the backup job takes and the amount of storage used are key considerations. By backing up only the data that has changed, you can reduce both the time and storage space\u2014but you must still be able to restore any data required, using those backups. This can be achieved by using full, differential and incremental backup &#8216;methods&#8217;.<\/p>\n<p>These 3 backup \u2018methods\u2019 are described below<\/p>\n<ul>\n<li style=\"margin-bottom: 10px\"><strong>A Full backup <\/strong>means that all of the data you selected is backed up each time the backup job runs. To perform a restore, all you need is the <em>Full<\/em> backup.<\/li>\n<li style=\"margin-bottom: 10px\"><strong>A Differential backup <\/strong>means only data that has changed since the last Full backup, is backed up. To perform a restore, you need the last <em>Full<\/em> backup and the <em>Differential<\/em> backup from the day you want to restore from.<\/li>\n<li style=\"margin-bottom: 10px\"><strong>An Incremental backup <\/strong>means only data that has changed since the last backup (e.g. last incremental backup) is backed up. To perform a restore you need the last <em>Full<\/em> backup and all <em>Incremental<\/em> backups up to the day you want to restore from.<\/li>\n<\/ul>\n<figure id=\"attachment_2508\" aria-describedby=\"caption-attachment-2508\" style=\"width: 783px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/backup_method_customize.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-2508 size-full\" style=\"border: 2px solid grey\" title=\"Backup schedule - Customize options\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/backup_method_customize.png\" alt=\"backup_method_customize\" width=\"793\" height=\"414\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/backup_method_customize.png 793w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/backup_method_customize-300x157.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/backup_method_customize-768x401.png 768w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/a><figcaption id=\"caption-attachment-2508\" class=\"wp-caption-text\">File Archiving schedule &#8211; Customize options<\/figcaption><\/figure>\n<p>A combination of <em>Full<\/em> plus <em>Differential<\/em> or <em>Incremental<\/em> backups can be implemented manually or automatically, depending on the backup type. This is because File Protection, File Archiving and System Protection use different backup technologies.<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/article_backupmethods1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2480 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/article_backupmethods1.png\" alt=\"article_backupmethods\" width=\"759\" height=\"245\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/article_backupmethods1.png 759w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2013\/11\/article_backupmethods1-300x97.png 300w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\" \/><\/a><\/p>\n<p>Traditionally, backups needed the <em>method<\/em> to be<a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/manage\/schedule.htm\" target=\"_blank\" rel=\"noopener noreferrer\"> manually configured<\/a>, as in the case of File Archiving. File Protection and System Protection manage the <em>method<\/em> automatically because they use advanced technologies that store and monitor data in different ways.<\/p>\n<p>These 3 backup types are explained below<\/p>\n<ul>\n<li style=\"margin-bottom: 10px\"><strong>File Archiving<\/strong> needs to have the backup method set manually. To do this, select the <em>Backup<\/em> tab\u2019s <em>Manage<\/em> menu and then the backup job. Select <em>Edit<\/em> from the top menu and then <em>Schedule<\/em> from the left menu to display the scheduling options. The <em>Customize schedule<\/em> option will open a window where you can manually set the backup method for each day in your backup schedule.<\/li>\n<li style=\"margin-bottom: 10px\"><strong>System Protection <\/strong>automatically manages the backup method because it uses imaging technology. This technology creates a full backup when a new destination is selected. Each time the backup job runs, the same image is incrementally updated with data that has changed. Copies of the data that are written over are maintained by virtual snapshots that enable multiple restore points.<\/li>\n<\/ul>\n<ul>\n<li style=\"margin-bottom: 10px\"><strong>File Protection<\/strong> automatically manages the backup method because it uses single-instance store. This technology has the advantages of both incremental and full backups. After the initial full backup, each subsequent backup will contain only data that has changed. Data that has not changed will be represented by links to earlier backups (on the same destination) that contain that data. &nbsp;This means each incremental backup will appear as a full backup and it will be the only backup you need to perform a restore.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;When planning a backup, the amount of time the backup job takes and the amount of storage used are key considerations. By backing up only the data that has changed, you can reduce both the time and storage space\u2014but you must still be able to restore any data required, using those backups. This can be &#8230; <a title=\"Understanding Backup Methods\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\">Read more <span class=\"screen-reader-text\">Understanding Backup Methods<\/span><\/a><\/p>\n","protected":false},"author":13,"featured_media":13831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95,3,760],"tags":[202,203,204,205,206],"class_list":["post-2477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-support","category-legacy","tag-backup-method","tag-customize-backup","tag-differential-backup","tag-full-backup","tag-incremental-backup"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Backup Methods | BackupAssist<\/title>\n<meta name=\"description\" content=\"Understanding full, differential and incremental backup methods and how they are implemented in BackupAssist\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup Methods | BackupAssist\" \/>\n<meta property=\"og:description\" content=\"Understanding full, differential and incremental backup methods and how they are implemented in BackupAssist\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-29T14:34:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-19T02:33:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"Understanding Backup Methods\",\"datePublished\":\"2013-11-29T14:34:41+00:00\",\"dateModified\":\"2019-11-19T02:33:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\"},\"wordCount\":489,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"keywords\":[\"backup method\",\"customize backup\",\"differential backup\",\"full backup\",\"incremental backup\"],\"articleSection\":[\"Guides\",\"Support\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\",\"url\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\",\"name\":\"Backup Methods | BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"datePublished\":\"2013-11-29T14:34:41+00:00\",\"dateModified\":\"2019-11-19T02:33:10+00:00\",\"description\":\"Understanding full, differential and incremental backup methods and how they are implemented in BackupAssist\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"width\":842,\"height\":596},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Backup Methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backup Methods | BackupAssist","description":"Understanding full, differential and incremental backup methods and how they are implemented in BackupAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods","og_locale":"en_US","og_type":"article","og_title":"Backup Methods | BackupAssist","og_description":"Understanding full, differential and incremental backup methods and how they are implemented in BackupAssist","og_url":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods","og_site_name":"Cyber Resilience Blog","article_published_time":"2013-11-29T14:34:41+00:00","article_modified_time":"2019-11-19T02:33:10+00:00","og_image":[{"width":842,"height":596,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","type":"image\/png"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"Understanding Backup Methods","datePublished":"2013-11-29T14:34:41+00:00","dateModified":"2019-11-19T02:33:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods"},"wordCount":489,"commentCount":2,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","keywords":["backup method","customize backup","differential backup","full backup","incremental backup"],"articleSection":["Guides","Support","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods","url":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods","name":"Backup Methods | BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","datePublished":"2013-11-29T14:34:41+00:00","dateModified":"2019-11-19T02:33:10+00:00","description":"Understanding full, differential and incremental backup methods and how they are implemented in BackupAssist","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/understanding-backup-methods"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","width":842,"height":596},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Understanding Backup Methods"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2477"}],"version-history":[{"count":4,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2477\/revisions"}],"predecessor-version":[{"id":14509,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2477\/revisions\/14509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/13831"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}