{"id":2662,"date":"2014-01-16T11:05:22","date_gmt":"2014-01-16T11:05:22","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=2662"},"modified":"2026-04-03T13:27:32","modified_gmt":"2026-04-03T13:27:32","slug":"image-backup-destination-selection","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection","title":{"rendered":"Image backup destination selection"},"content":{"rendered":"<p>BackupAssist\u2019s suite of backup types includes System Protection, our recommended backup type for Windows servers. This article looks at the requirements and advantages of different backup destinations for System Protection backups.<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2672\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\" alt=\"banner\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1-300x117.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/backup\/system-protection.htm\" target=\"_blank\" rel=\"noopener noreferrer\">System Protection<\/a> backs your data up to&nbsp;an image file that provides the following advantages.<\/p>\n<ul>\n<li>It can be used to restore individual files, folders and VSS applications.<\/li>\n<li>It can be used to create a bare-metal backup for a recovery.<\/li>\n<li>It can back up data incrementally and support multiple restore points.<\/li>\n<li>It can be used with our <a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/restore\/hyper-v-granular-restore.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Hyper-V Granular add-on<\/a> to restore files from a hyper-v guest.<\/li>\n<\/ul>\n<p>For these reasons, we recommended System Protection. It is, however, important that you chose the right backup destination for two important reasons:<\/p>\n<ol>\n<li style=\"margin-bottom: 10px\">The destination must support image backups.<\/li>\n<li style=\"margin-bottom: 10px\">The destination type determines whether you can have multiple restore points.<\/li>\n<\/ol>\n<h3>A destination\u2019s ability to support multiple restore points<\/h3>\n<p>System Protection creates a full backup when it first runs. If the data selection and destination do not change, subsequent backups will be incremental. A limitation of image backups is that each of these incremental backups overwrites the data that changed, so you can only restore data from the previous backup. System Protection overcomes this limitation by using VSS snapshots, which are stored on the backup destination to maintain copies of the data that is overwritten each time a backup job runs. When a restore is performed, the image backup and these VSS snapshots can be used to provide a restore point for each backup job.<\/p>\n<p>To maintain these multiple restore points, the destination must support VSS snapshots &#8211; and to do that &#8211; the destination must be seen as a local device by the computer that you are backing up.<\/p>\n<p>So let\u2019s take a look at the destinations available for System Protection, and which ones support VSS.<\/p>\n<p>Available Destinations<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/destination-options.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2664\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/destination-options.png\" alt=\"destination options\" width=\"474\" height=\"84\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/destination-options.png 474w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/destination-options-300x53.png 300w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/a><\/p>\n<p>The <a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/manage\/destination\/destination.htm\" target=\"_blank\" rel=\"noopener noreferrer\">destinations <\/a>listed below support VSS snapshots and therefore multiple restore points.<\/p>\n<ol>\n<li style=\"margin-bottom: 10px\"><strong>Local hard drives<\/strong><\/li>\n<li style=\"margin-bottom: 10px\"><strong>iSCSI<\/strong> targets that can appear to your computer as a local (not mapped) drives<\/li>\n<li style=\"margin-bottom: 10px\"><strong>External disks<\/strong> that are directly attached &#8211; you can remove these disks as part of your media rotation, as long as they are presented as a local drive when they are attached.<\/li>\n<li style=\"margin-bottom: 10px\"><strong>Data containers<\/strong> &#8211; these are .vhd files that your image backups are stored inside of at the backup destination.&nbsp;During the backup process, the .vhd file is mounted as a local drive within Windows and the backup is written into the .vhd file . The advantage of this is that the .vhd can be stored on a device which isn\u2019t usually detected as local to Windows (such as RDX drives, NAS devices or network locations). This allows support for VSS snapshots and the ability to maintain multiple restore points.<\/li>\n<\/ol>\n<p>Data containers are enabled by ticking the Data container box on the destination selection screen.<\/p>\n<p>To learn more about Data containers, see our article <a href=\"https:\/\/www.backupassist.com\/support\/en\/references\/data-containers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/p>\n<h3>A destination\u2019s ability to support an image backup<\/h3>\n<p><strong>Destination\u2019s format <\/strong><\/p>\n<p>Local drives, external drives and iSCSI targets (destinations) must be formatted with NTFS or ReFS to support VSS snapshots.<\/p>\n<p>System Protection cannot use incremental reading to enable fast incremental backups if the data source is a ReFS formatted drive. Incremental reading helps System Protection work out what data has changed when it performs a backup, and makes the backup job run faster. This is enabled in the BackupAssist <em>Setting <\/em>tab &gt;<em>Windows Settings &gt; Enable<\/em> <em>image tracking<\/em>.<\/p>\n<p><strong>Destination\u2019s capacity<\/strong><\/p>\n<p>If your System Protection backup is using VSS snapshots to support multiple restore points, then the amount of storage required will grow as data changes. For this reason, the capacity of the backup destination should be at least 2.5 times larger than the amount of data being backed up. If there is other data on the drive, then the free space needs to be at least 2.5 times larger than the data you\u2019re backing up.<\/p>\n<p>This allows room for the snapshot to maintain copies of data that has changed. As the extra space for these copies runs out, the oldest copies (restore points) will be deleted. This capacity will allow for multiple restore points.<\/p>\n<p><strong>Destination\u2019s sector size<\/strong><\/p>\n<p>System Protection uses Windows imaging technology to create image backups. Therefore, the version of Windows you are using affects the disk sector size supported by your image backups.<\/p>\n<ul>\n<li style=\"margin-bottom: 10px\">Windows Server 2008 \/ 2008R2 and SBS 2008 \/ 2011 require 512 byte sector disks.<\/li>\n<li style=\"margin-bottom: 10px\">Windows Server 2012 &nbsp;and later can use either 512 byte sector or 4k sector size disks.<\/li>\n<\/ul>\n<p>This consideration is important for large capacity devices because vendors often set the sector size to 4k (4096 bytes), because it provides better density and reliability. It is important to check the sector size of your storage device, and if the vendor has tools that allow the device to support 512 bytes.<\/p>\n<p>For example, 3 TB drives by Seagate, Western Digital, or Iomega are often formatted as 4096 bytes (4k). Western Digital does offer a format utility to emulate the 512byte sector size on their drives.<\/p>\n<p>To check your disk&#8217;s sector size, run the following command in an elevated command prompt: fsutil fsinfo ntfsinfo x: where x is the drive letter.<\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/sector-size-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2665\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/sector-size-2.png\" alt=\"sector size 2\" width=\"660\" height=\"268\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/sector-size-2.png 660w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/sector-size-2-300x122.png 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><\/p>\n<p align=\"left\">We hope this article has helped shine a light on the destination considerations for System Protection backups. You can read more about System Protection backups <a href=\"https:\/\/www.backupassist.com\/support\/en\/backupassist\/backup\/system-protection.htm\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, and our article on how these backups work&nbsp;<a href=\"http:\/\/www.backupassist.com\/blog\/support\/fast-incremental-backups-for-system-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p><strong>Destination&#8217;s shadow copy storage<\/strong><\/p>\n<p>The space on the disk used by the <a href=\"https:\/\/www.backupassist.com\/support\/en\/references\/volume-shadow-copy.htm\" target=\"_blank\" rel=\"noopener noreferrer\">VSS <\/a>snapshot to store data that has changed is called the volume shadow copy storage. In the same way that you need to ensure that you have enough space on the disk that you are backing up to, you should also be mindful of the amount of disk space specifically allocated to the shadow copy storage.<\/p>\n<p>When the amount of disk space allocated to the shadow copy storage reaches its limit, it will delete the oldest data to make room for new data. If the amount of space reserved is set too low, or at 100%, then problems can occur. For this reason, you should set the disk space allocated to your shadow copy storage to a size that allows for it to grow as data changes and is added.<\/p>\n<p>Shadow copy storage &#8211; disk allocation considerations:<\/p>\n<ul>\n<li>The amount of data to backup<\/li>\n<li>How often the backup job runs<\/li>\n<li>How much data changes between each backup<\/li>\n<li>The size of the backup disk(s)<\/li>\n<\/ul>\n<p>For example, if a full backup is currently 500 GB and the backup disk is 2TB, then setting the shadow copy storage to 50% (1TB), would allow the full backup to grow to twice its current size.<\/p>\n<p>You can view the amount of space reserved for the shadow copy storage by running the command <strong><i>vssadmin list shadowstorage<\/i><\/strong> at an elevated command prompt.<\/p>\n<p>You can change the amount of disk space allocated to the shadow copy storage in GB or as a percentage of the disk, using the following commands:<\/p>\n<p><em>vssadmin Resize ShadowStorage \/For=X: \/On=X: \/Maxsize=XX%<\/em><\/p>\n<p><em>vssadmin Resize ShadowStorage \/For=X: \/On=X: \/Maxsize=XXGB<\/em><\/p>\n<p>This will resize the limit to <strong><i>XX<\/i><\/strong> size for drive <strong><i>X:<\/i><\/strong><\/p>\n<p>To see more VSS admin commands, please refer to this <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc754968.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft VSS admin resource.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BackupAssist\u2019s suite of backup types includes System Protection, our recommended backup type for Windows servers. This article looks at the requirements and advantages of different backup destinations for System Protection backups.<\/p>\n","protected":false},"author":13,"featured_media":2672,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95,3,760],"tags":[215,154,128,216,80,126,118],"class_list":["post-2662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-support","category-legacy","tag-backup-destination","tag-data-container","tag-image-backup","tag-image-backup-destination","tag-iscsi","tag-nas","tag-system-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Image backup destination selection<\/title>\n<meta name=\"description\" content=\"BackupAssist System Protection, ideal for Windows 2008\u20132012 servers\u2014explore requirements and benefits of different backup destinations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Image backup destination selection\" \/>\n<meta property=\"og:description\" content=\"BackupAssist System Protection, ideal for Windows 2008\u20132012 servers\u2014explore requirements and benefits of different backup destinations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-16T11:05:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T13:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"Image backup destination selection\",\"datePublished\":\"2014-01-16T11:05:22+00:00\",\"dateModified\":\"2026-04-03T13:27:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\"},\"wordCount\":1197,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\",\"keywords\":[\"backup destination\",\"Data container\",\"image backup\",\"image backup destination\",\"iSCSI\",\"NAS\",\"System Protection\"],\"articleSection\":[\"Guides\",\"Support\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\",\"url\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\",\"name\":\"Image backup destination selection\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\",\"datePublished\":\"2014-01-16T11:05:22+00:00\",\"dateModified\":\"2026-04-03T13:27:32+00:00\",\"description\":\"BackupAssist System Protection, ideal for Windows 2008\u20132012 servers\u2014explore requirements and benefits of different backup destinations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png\",\"width\":640,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Image backup destination selection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Image backup destination selection","description":"BackupAssist System Protection, ideal for Windows 2008\u20132012 servers\u2014explore requirements and benefits of different backup destinations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection","og_locale":"en_US","og_type":"article","og_title":"Image backup destination selection","og_description":"BackupAssist System Protection, ideal for Windows 2008\u20132012 servers\u2014explore requirements and benefits of different backup destinations.","og_url":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection","og_site_name":"Cyber Resilience Blog","article_published_time":"2014-01-16T11:05:22+00:00","article_modified_time":"2026-04-03T13:27:32+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png","type":"image\/png"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"Image backup destination selection","datePublished":"2014-01-16T11:05:22+00:00","dateModified":"2026-04-03T13:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection"},"wordCount":1197,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png","keywords":["backup destination","Data container","image backup","image backup destination","iSCSI","NAS","System Protection"],"articleSection":["Guides","Support","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection","url":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection","name":"Image backup destination selection","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png","datePublished":"2014-01-16T11:05:22+00:00","dateModified":"2026-04-03T13:27:32+00:00","description":"BackupAssist System Protection, ideal for Windows 2008\u20132012 servers\u2014explore requirements and benefits of different backup destinations.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2014\/01\/banner1.png","width":640,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/image-backup-destination-selection#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Image backup destination selection"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=2662"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2662\/revisions"}],"predecessor-version":[{"id":13629,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/2662\/revisions\/13629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/2672"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=2662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=2662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=2662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}