Specifications

34
- Transaction Logs backup every hour
Database size is large and activity is high, recovery model is Full or Bulk-
Logged:
- Full backup once a week
- Differential backup once a day
- Transaction Logs backup every twenty minutes
Database size is large and activity is high, recovery model is Simple:
- Full backup once a week
- Differential backup twice a day
For advice on creating the best strategy you can also rely upon Acronis Recovery for
MS SQL Server Assistant while working with the Create Backup wizard. See 5.2.6 for
detailed information.
We recommend that you do not to use several third-party backup tools
simultaneously since backup operations may conflict or affect the operation of
your databases. Instead, combine different backup methods to protect your
data with Acronis Recovery for MS SQL Server.
5.1.4 Recovery Models
There are three database recovery models: Full, Simple and Bulk-logged. In most
cases databases use the simple or full recovery models.
Full Recovery Model
Full recovery model requires backing up logs, which allows you to restore to the point
in time just before the data was corrupted and prevent data loss.
The disadvantage of this recovery model is that it requires storage space and makes
restoration slower and complicated.
Simple Recovery Model
The Simple recovery model does not store transaction logs, so you can recover your
databases only to the point in time when the last backup was created. Therefore, it is
recommend that you create backups (full or differential, in accordance with the backup
strategy you defined) often enough to prevent significant data loss. For critical
databases it is better to use the full recovery model.
Bulk-logged Recovery Model
Bulk-logged recovery model uses transaction logs for non-bulk operations fully logged
and bulk operations minimally logged. Data may be lost when restoring from bulk
operations (e.g. SELECT INTO).
The bulk-logged recovery model requires log backups. It is an adjunct of the full
recovery model and provides recovery to the end of any backup (but not to any point-
in-time). In case the log was damaged or bulk-logged operations occurred after the
latest log backup, data changes will be lost. This is the least secure recovery model.