Shadow Copy - what it is, why it helps, and how to use Previous Versions safely

Shadow Copy

What it is

Shadow copy is a built-in Windows feature that takes quick snapshots of files and folders. These snapshots capture how your data looked at a moment in time, so you can roll back to an earlier version if something goes wrong. Think of it like a time machine for your files on the same drive.

Why it matters

If you delete or overwrite a file by accident, or malware scrambles it, you can restore an earlier version in seconds. It is especially handy during ransomware cleanups when you need yesterday’s copy.

How it works 

  • Windows creates snapshots during updates, restore points, or on a schedule.

  • Snapshots live on the same disk and are read-only.

  • You can right-click a file or folder → Properties → Previous Versions to restore.

  • Tools like System Restore can roll back system files and settings.

Red flags

  • Previous Versions tab is empty when you expect copies.

  • Ransomware or scripts that run commands like deleting shadow copies.

  • Low disk space causing Windows to prune old snapshots.

  • Drive errors or a recent reset that removed restore points.

Do it right

  • Turn on System Protection for your system drive and make a manual restore point before big changes.

  • Keep regular backups too. Shadow copies are not a full backup and won’t help if the disk dies.

  • Leave some free space so Windows can keep snapshots.

  • After a malware incident, restore only after you have cleaned the system.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Data Breach Prevention

        Why it matters Breaches drain money, trust, and time. Strong basics turn scary “what ifs” into non-events: a phish gets ignored, a stolen password is useless, a lost laptop holds only encrypted gibberish. The short, smart checklist MFA everywhere: ...
      • Shadow Password Files

        What it is Shadow password files are special system files on Unix/Linux that store the password hashes (not the actual passwords) for user accounts. Public info about users lives in /etc/passwd, while the sensitive, hashed passwords are kept in ...
      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Virut

        What it is Virut is a Windows file-infecting virus that also turns your PC into part of a botnet. It slips its code into many EXE or SCR files and then connects to attacker-controlled IRC servers to get commands. It changes its look each time ...
      • NDR (Network Detection And Response)

        What it is Network Detection and Response (NDR) watches live network traffic to spot and investigate suspicious behavior in real time. Instead of relying on signatures, it analyzes patterns and anomalies to catch threats moving across your ...