The Requestor is basically driving the creation and use of the shadow cop-
ies. It does not interface directly with the application or with the storage
array, and it is only with a requestor that you realize the full power of the
VSS framework. With no knowledge of an application or a back-end disk
array, a requestor can obtain a physically identical point-in-time copy that
only took seconds to create (regardless of the volume size), and that copy
contains data that is exploitable and consistent vis-à-vis the application.
We generally break down the types of requestors in three categories:
Category 1: ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.