Incremental Backup: How It Works, Chain Mechanics, Recovery

Incremental Backup

A backup type that captures only the data changed since the most recent prior backup, regardless of whether that prior backup was a full or another incremental. The classic chain pattern is full backup on Sunday plus daily incrementals from Monday through Saturday; each incremental captures only the changes since the previous backup. Incremental backups produce the smallest backup files of any backup type with the shortest backup windows and lowest bandwidth requirements; the trade-off is restoration depending on the entire chain (last full plus every incremental) with any missing or corrupted link breaking recovery. Variants include incremental forever (no second full ever needed), synthetic full (consolidated virtual full from chain), forever forward incremental (regularly merged), reverse incremental (Veeam approach), and block-level incremental via VMware Changed Block Tracking (CBT) or Hyper-V Resilient Change Tracking (RCT).

Reference content reviewed by recovery engineers. Editorial standards. About the authors.
📚
9 sources
AWS · Veeam · Acronis
TechTarget · Macrium
📅
5 variants
Classic · Forever · Synthetic
Reverse · Block-level
📅
Last updated
VMware CBT / Hyper-V RCT
📖
9 min
Reading time

An incremental backup captures only the data changed since the most recent prior backup, whether full or incremental. The classic pattern is Sunday full plus daily incrementals; each captures only the changes since the previous backup. Incremental backups produce the smallest backup files of any type but require the entire chain (full plus every incremental in sequence) for restoration. Variants include synthetic full and incremental forever (no repeated source-side fulls). For recovery purposes, the chain dependency is the critical property: any missing or corrupted incremental in the sequence breaks restoration at that point. Pairs naturally with differential backup; both contrast with full backups under the backup strategy framework.

What an Incremental Backup Is

The Redstor backup reference describes the operational pattern: “An incremental backup saves only the data changed since the most recent backup, full or incremental. This minimises backup windows and storage by capturing smaller sets of changes. Restores require the last full backup plus every subsequent incremental taken up to the recovery point, which can make recovery slower.”1

The fundamental concept

An incremental backup is a backup type defined by what it captures and what it depends on:

  • What it captures: only data that has changed since the most recent prior backup of any type.
  • What “changed” means: files modified, created, or deleted since the previous backup completed.
  • What it depends on: the chain of all preceding backups going back to the last full backup.
  • What it produces: the smallest backup file of any backup type for the same time period.
  • What it requires for restore: the full backup plus every incremental in sequence up to the desired recovery point.

The classic Sunday-Monday-Tuesday example

The AWS backup reference describes the classic pattern: “An incremental backup only copies modified data since the last backup. For example, if you took a full backup on Sunday, your incremental backup on Monday would only copy changes since the Sunday backup. On Tuesday, it would only copy changes to the backup image file since the Monday backup.”2 The Unitrends photo example illustrates the pattern with concrete numbers:

  • Monday: 100 photos exist; full backup creates 100-photo backup file.
  • Tuesday: 100 new photos added (200 total); incremental captures only the 100 new photos.
  • Wednesday: 50 new photos added (250 total); incremental captures only those 50 new photos.
  • Thursday: 30 new photos added (280 total); incremental captures only those 30.
  • Restoration of Thursday state: requires Monday full + Tuesday incremental + Wednesday incremental + Thursday incremental; total 280 photos restored.

The contrast with full and differential backups

Three backup types differ in what they capture and how they’re restored:

  • Full backup: copies all selected data every time; self-contained for restoration; largest storage requirement.
  • Incremental backup: copies changes since the last backup of any type; smallest storage; chain-dependent restoration.
  • Differential backup: copies all changes since the last full backup; intermediate storage; restoration needs full + latest differential only.
  • Restore time progression: full (fastest) < differential (intermediate) < incremental (slowest, depends on chain length).
  • Backup time progression: incremental (fastest) < differential (grows with time since full) < full (slowest).
  • Storage requirement progression: incremental (smallest) < differential (grows with time since full) < full (largest).

Why use incremental backups

Incremental backups address several specific operational requirements:

  • Short backup windows: production systems with limited maintenance time benefit from incremental’s small backup size.
  • Limited bandwidth: remote sites and cloud destinations benefit from minimal data transfer.
  • Storage cost optimization: incremental’s smaller footprint reduces backup storage requirements.
  • Frequent backup intervals: hourly or sub-hourly backups become feasible with incremental’s small size.
  • Cloud backup destinations: reduced bandwidth and storage costs make cloud backup affordable at scale.
  • VM environments: Changed Block Tracking enables very efficient incrementals at the hypervisor level.

The Macrium storage math

The Macrium incremental reference illustrates the storage advantage with specific numbers: “two 500GB full images use 1TB of sectors to provide just two restore points. One 500GB full image followed by ten 5GB incremental images uses only 550GB of sectors while providing eleven restore points. Fewer sectors in use means a smaller surface area for potential corruption, incrementals actually reduce the risk at a fundamental level.”3 The implication:

  • Backup storage scales with change rate, not data size.
  • More restore points become possible for same storage budget.
  • Smaller storage footprint means smaller surface area for corruption.
  • Long retention is feasible with incrementals when full-only retention would be prohibitive.

How Incremental Backups Work

Incremental backups rely on change-detection mechanisms to identify which data has been modified since the previous backup. The specific mechanism depends on the backup software, the file system, and the operating system.

Change detection mechanisms

Several mechanisms enable incremental backup software to identify changed data:

  • Archive bit (Windows): file attribute set when a file is modified; backup software clears the bit after backing up; subsequent backups check this bit.
  • Modification time (mtime): Unix file attribute updated when content changes; backup software compares against the previous backup’s recorded mtime.
  • Change time (ctime): Unix attribute updated for any inode change including permission changes; more comprehensive than mtime.
  • File system snapshots: ZFS, Btrfs, NTFS Volume Shadow Copy provide before/after states for differential analysis.
  • Hash-based comparison: tools like restic, BorgBackup, and rsync compute content hashes to detect actual changes regardless of timestamps.
  • Block-level change tracking: Changed Block Tracking (CBT) at the hypervisor level identifies modified blocks without scanning files.
  • Database transaction logs: database systems (Oracle, SQL Server, PostgreSQL) provide log-based incremental backup at the transaction level.

The Volume Shadow Copy Service (VSS) integration

On Windows, incremental backups typically integrate with the Volume Shadow Copy Service (VSS) for consistency:

  • VSS creates a point-in-time snapshot of the volume at backup start.
  • The snapshot provides a consistent view of the file system during the backup operation.
  • Open files (databases, locked Office documents) are captured in their VSS snapshot state.
  • VSS writers in applications coordinate quiescing for application-consistent snapshots.
  • The backup software reads from the VSS snapshot rather than the live volume; backup completion releases the snapshot.
  • Application-aware backups (SQL Server, Exchange) leverage VSS writers for transaction-consistent backup.

VMware Changed Block Tracking (CBT)

For virtualized environments, CBT is the foundation of efficient incremental backup:

  • Origin: VMware introduced CBT in vSphere 4 (2009) for vStorage APIs for Data Protection (VADP).
  • Mechanism: hypervisor maintains a bitmap of modified blocks for each virtual disk.
  • Backup software query: backup software calls the QueryChangedDiskAreas API to retrieve the changed-block list.
  • Result: backup software copies only the changed blocks rather than scanning entire VMDK files.
  • Performance impact: 1 TB virtual disk with 100 MB of changes results in 100 MB backup transfer instead of 1 TB scan.
  • Fallback: if CBT becomes inconsistent (rare), backup software performs full VM scan as recovery.

Hyper-V Resilient Change Tracking (RCT)

Microsoft Hyper-V implements equivalent functionality starting with Windows Server 2016:

  • Equivalent capability: tracks changed blocks for incremental backup of Hyper-V VHDX files.
  • Improvement over earlier: Hyper-V before 2016 required differential disks for incremental tracking, less efficient than RCT.
  • API integration: backup software queries RCT through Hyper-V WMI providers.
  • Cross-platform implication: Veeam, Veritas, and other backup vendors support both VMware CBT and Hyper-V RCT through unified VM backup engines.

Hash-based change detection

Modern backup tools use content hashing for change detection independent of file system metadata:

  • restic: chunks files and computes SHA-256 hashes per chunk; stores deduplicated chunks in repository.
  • BorgBackup: similar approach with content-defined chunking and HMAC-SHA-256 chunk identification.
  • rsync: rolling checksum comparison detects byte-level differences; transfers only changed portions.
  • duplicity: uses rsync algorithm but stores in tar volumes for compatibility.
  • Advantages over timestamp-based: detects actual content changes regardless of timestamp manipulation; deduplicates identical content across files; resilient to filesystem metadata corruption.
  • Trade-offs: hash computation requires reading entire file; slower than timestamp comparison for very large files.

Database incremental specifics

Database systems implement incremental backup using transaction log mechanisms:

  • SQL Server: transaction log backups capture all log records since the previous log backup; restoration applies log backups in sequence.
  • Oracle: archive log mode preserves redo logs; RMAN incremental backups use Block Change Tracking (BCT) file for efficient block-level backup.
  • PostgreSQL: Write-Ahead Log (WAL) shipping provides continuous incremental backup capability.
  • MySQL: binary log replication and Percona XtraBackup provide incremental backup capability.
  • Common pattern: full database backup weekly + differential or transaction log backups daily/hourly.
  • Recovery model: database systems typically use point-in-time recovery via log application rather than file-level restore.

Incremental Variants and Strategies

Several variants of incremental backup address different operational requirements and trade-offs.

Five incremental variants

VariantPatternSource-Side FullsUse Case
Classic incrementalFull + Inc + Inc + Inc + new FullPeriodic (weekly/monthly)Standard SMB/enterprise pattern
Incremental foreverInitial Full + Inc + Inc + Inc… indefinitelySingle initial full onlyCloud backup, tape libraries
Synthetic fullFull + Inc + Inc… + (synthesized Full)None after initialBandwidth-constrained environments
Forever forward incrementalFull + Inc + Inc + (merge oldest into Full)None after initialLong-retention with bounded chain length
Reverse incrementalSynthesized current Full + reverse Incs for older versionsNone after initialVeeam approach; fast restore of recent state

Classic incremental

The classic incremental pattern is the most-widely deployed strategy:

  • Weekly full backup (Sunday) establishes baseline.
  • Daily incremental backups (Monday-Saturday) capture changes since previous backup.
  • Following Sunday: new full backup resets the chain.
  • Retention: keep multiple weekly fulls plus their associated incremental chains.
  • Common variant: daily incrementals + weekly differential + monthly full for hybrid restore characteristics.

Incremental forever and synthetic full

The TechTarget backup types reference describes the synthetic approach: “A synthetic full backup compares the data that has changed at the source with the original full backup and all incremental backups to create the next full synthesized backup. In a synthetic full backup, you don’t save on storage space but you do save on network bandwidth. You only send incremental changes to the server instead of sending all your data. The server uses the data it already has to create the full backup copy.”4 Implementation:

  • Initial full backup: taken once at backup deployment.
  • Subsequent incrementals: capture changes since previous backup indefinitely.
  • Synthetic full: backup server consolidates full + incrementals into virtual full without re-reading source.
  • Source bandwidth: only incremental changes ever transmitted; no repeated full transfers.
  • Storage: typically deduplicated across the backup chain to minimize space.
  • Restoration: backup server presents the most-recent synthetic full as restore target.

Forever forward incremental

The Acronis backup reference describes forever forward incremental: “Forever Forward incremental backups rely on creating a single full backup, followed by subsequent incremental backups. This backup method only retains one backup generation in the backup server. Here, the backup system regularly renews the full backup copy by merging the latest relevant increments. Once the new full backup is compiled, the previous full and incremental backup copies are deleted according to a set retention policy to optimize storage space usage.”5 Implementation:

  • Single full backup: only one full backup retained at any time.
  • Forward merging: as new incrementals are added, the oldest incrementals are merged into the full backup.
  • Bounded chain length: chain length stays constant; old data is consolidated forward.
  • Trade-off: older recovery points are lost as they merge forward; long retention not supported by this pattern alone.
  • Use case: environments needing recent restore points only with minimal storage overhead.

Reverse incremental (Veeam pattern)

Reverse incremental is Veeam’s signature backup pattern:

  • Most-recent backup is full: the active full backup represents current state.
  • Reverse incrementals: older versions are stored as differences from the current full going backward.
  • Latest version restore: single full backup file; fastest possible restore.
  • Older version restore: apply reverse incrementals in reverse chronological order from current full.
  • New backup operation: new incremental against current full; promotes incremental data into full while archiving old version as reverse incremental.
  • Advantages: fastest restore for most-common case (recent state); retention chain managed automatically.
  • Limitations: backup operation more complex than forward incremental; requires more sophisticated backup software.

Block-level vs file-level vs byte-level incremental

The Acronis backup reference describes the granularity options: “Byte-level incremental backup perceives the file system as individual bytes and only backs up bytes that have changed since the last backup process. Since so much less data is comprised in a byte-level copy, it can yield the smallest available backups.”6 The granularity progression:

  • File-level incremental: entire file copied if any byte changed; simplest implementation; works on any file system.
  • Block-level incremental: only changed blocks copied within modified files; significantly more efficient for large files with small changes (databases, VHDX, large logs).
  • Byte-level incremental: only changed byte sequences captured; finest granularity; produces smallest backups but requires sophisticated detection and reconstruction.
  • Sub-file deduplication: content-defined chunking (restic, BorgBackup) achieves block-level efficiency without explicit block-level support.
  • VM block-level: CBT/RCT operate at virtual disk block level natively.

Multilevel incremental

Multilevel incremental introduces incremental hierarchy for granular recovery point management:

  • Level 0: full backup serves as the baseline.
  • Level 1: first incremental after Level 0; captures all changes since the full.
  • Level 2: second-tier incremental; captures changes since Level 1.
  • Higher levels: further granularity for very-frequent backup schedules.
  • Restoration: apply Level 0 + Level 1 + Level 2 in order to reach desired recovery point.
  • Use case: environments needing very-frequent recovery points (hourly or sub-hourly).

Incremental Backup Implementation

Incremental backup implementations vary across vendor products, but several common patterns and considerations apply.

Backup software supporting incremental

Most backup software supports incremental backup with various sophistication levels:

  • Veeam Backup & Replication: reverse incremental, forever incremental, synthetic full; CBT/RCT integration for VMs.
  • Veritas NetBackup: forward incremental, synthetic full, accelerator for incremental optimization.
  • Commvault: incremental, synthetic full, IntelliSnap for snapshot-based incrementals.
  • Acronis Cyber Protect: forever forward incremental with byte-level capability.
  • restic (open source): hash-based deduplicated incremental with point-in-time snapshots.
  • BorgBackup (open source): deduplicated content-defined chunking; effective incremental.
  • duplicity (open source): rsync-based incremental with encryption; standard Linux backup tool.
  • Bacula (open source): traditional incremental with extensive scheduling control.
  • Apple Time Machine: hourly incremental with hard-link consolidation; the standard macOS backup.
  • Windows File History: simple incremental for user data; preceded modern Windows Backup.

Scheduling considerations

Incremental backup scheduling balances recovery point objectives with operational constraints:

  • Backup frequency: daily incrementals for typical environments; hourly for active databases; sub-hourly for high-change-rate systems.
  • Full backup frequency: weekly full + daily incrementals is the canonical pattern; monthly fulls acceptable for stable systems.
  • Backup window: incrementals fit in shorter windows than fulls; matters for production systems with limited maintenance time.
  • Verification frequency: chains should be verified periodically; some software performs automatic verification on synthetic full creation.
  • Retention period: longer retention requires more incrementals retained; balance against storage cost.
  • Off-site rotation: traditional tape rotation problematic with long incremental chains; synthetic full enables off-site rotation of consolidated backups.

Storage considerations

Incremental backup storage planning differs from full backup:

  • Initial sizing: first full backup sets baseline; subsequent incrementals scale with change rate.
  • Change rate estimation: typical 1-5% daily change rate for many environments; databases and active systems may have 10%+ daily change.
  • Deduplication: inline or post-process deduplication can dramatically reduce incremental storage requirements.
  • Compression: backup software compression typically achieves 2-3x compression for typical data.
  • Encryption: at-rest encryption applied after deduplication and compression to maximize efficiency.
  • Cloud storage tiering: recent incrementals on hot tier; older chains on cool tier; very old on archive tier.

The 3-2-1 rule applied

The 3-2-1 backup rule applies to incremental backups with chain-specific considerations:

  • 3 copies: original + 2 backup copies; the chain (full + incrementals) counts as one copy.
  • 2 different media: different storage technologies (local disk + cloud, or NAS + tape).
  • 1 offsite: chain replicated to offsite location; bandwidth-efficient with incremental forever.
  • Chain integrity: all media must contain complete chains; partial chains are useless.
  • Verification: hash verification confirms chain integrity periodically.
  • 3-2-1-1-0 extension: add immutable copy and zero verified errors for ransomware protection.

Cloud backup considerations

Cloud destinations particularly favor incremental backup:

  • Bandwidth efficiency: incremental’s small size minimizes monthly cloud transfer.
  • Storage cost: incremental’s smaller footprint reduces monthly storage charges.
  • Egress fees: some providers charge for retrieval; chain restoration triggers fees for entire chain.
  • Sync limitations: cloud backup tools must handle partial uploads, retries, network interruptions during incremental transfer.
  • Provider features: AWS Backup, Azure Backup, Google Cloud Backup handle incremental natively with synthetic full consolidation.
  • Hybrid approach: local incremental + periodic cloud sync balances speed and offsite protection.

Incremental Backups in Recovery Scenarios

The chain dependency of incremental backups creates specific recovery characteristics that affect both successful and failed recovery scenarios.

Standard restoration workflow

Restoring from incremental backups follows a specific sequence:

  1. Identify recovery point: determine which incremental contains the desired state (typically by date/time).
  2. Locate the chain: find the full backup that anchors the chain plus all incrementals up to recovery point.
  3. Verify chain integrity: confirm all required incrementals are present and readable; verify hashes if available.
  4. Restore the full backup: apply the baseline full backup to recovery destination.
  5. Apply incrementals in order: each incremental applied in chronological sequence on top of restored full.
  6. Verify restored state: confirm restoration matches expected recovery point state.
  7. Resume operations: bring restored system online or extract specific files as needed.

Recovery time analysis

Incremental backup restoration time scales with chain length:

  • Time to read full backup: proportional to full backup size and storage read speed.
  • Time per incremental: proportional to incremental size; small individually but cumulative.
  • Sequential application: incrementals must be applied in order; cannot be parallelized in most implementations.
  • Total time: approximately full restore time + sum of incremental restore times.
  • 30-day chain example: daily incrementals for 30 days = 30 sequential application steps after full restore.
  • Recovery time objective (RTO) implications: longer chains mean longer RTO; if RTO is short, fewer increments between fulls is required.

Chain corruption scenarios

The Veeam backup reference describes the dependency property: “Restoring data from incremental backups requires the presence and integrity of all preceding backups in the sequence. A failure in any incremental backup in the chain could impact the restoration process.”7 Specific failure modes:

  • Missing incremental: chain broken at the gap; recovery limited to incrementals before the gap.
  • Corrupted incremental: chain may be unrecoverable from that point forward; partial recovery may be possible from prior increments.
  • Tape failure mid-chain: single bad tape can break recovery for many subsequent recovery points.
  • Cloud retrieval failure: incremental retrieval from cold archive may fail or time out; entire chain affected.
  • Software version mismatch: backup software incompatibility may prevent reading older incrementals.
  • Format obsolescence: incremental backup format may become unreadable as backup software evolves.

The off-site rotation problem

The TechTarget backup reference identifies a specific incremental backup limitation: “If backups are shipped off-site, incremental backups are a bad idea because you must retrieve all the tapes before you can begin a restoration.”8 The implications:

  • Traditional tape rotation requires retrieving all tapes in chain for restoration.
  • Geographic separation of tapes means longer recovery time during disasters.
  • Tape library coordination must ensure complete chain availability.
  • Mitigation: synthetic full or incremental forever consolidation creates single restore point on the most-recent media.
  • Alternative: off-site full backups (less frequent) plus on-site incrementals; off-site full sufficient for disaster recovery.
  • Modern alternative: cloud-based incremental forever eliminates the tape retrieval problem.

Recovery time vs storage trade-off

The fundamental incremental backup trade-off in recovery contexts:

StrategyStorageRecovery TimeChain Dependency Risk
Full only (daily)HighestFastest (single restore)None
Full weekly + Differential dailyMediumFast (full + 1 differential)Low
Full weekly + Incremental dailyLowerSlower (full + up to 6 increments)Medium
Full monthly + Incremental dailyLowestSlowest (full + up to 30 increments)High
Incremental forever + syntheticOptimizedFast (synthetic full)Managed by software

When incremental is the right choice

Incremental backups are the appropriate strategy in specific scenarios:

  • Large datasets with low change rates: 10 TB system with 50 GB daily change benefits from incremental’s bandwidth efficiency.
  • Cloud backup destinations: bandwidth and storage costs favor incremental’s smaller transfers.
  • Remote sites with limited connectivity: nightly incremental fits in available bandwidth window.
  • Frequent backup intervals: hourly backups feasible only with incremental’s small footprint.
  • VM environments: CBT/RCT make incremental highly efficient at virtual disk level.
  • Long retention requirements: incremental’s storage efficiency enables practical long-term retention.

When incremental is the wrong choice

Several scenarios make incremental backup inappropriate:

  • Tight RTO requirements: chain reconstruction takes too long when business continuity demands fast restoration.
  • Off-site tape rotation without synthetic full: retrieving all tapes for restoration impractical for disaster recovery.
  • High change rate workloads: when daily changes approach full backup size, incremental loses its advantages.
  • Critical systems requiring simple recovery: when chain complexity creates unacceptable recovery risk.
  • Older backup software lacking synthetic full: traditional incremental without consolidation becomes unmanageable over time.
  • Compliance scenarios requiring audit-friendly backups: some compliance frameworks prefer self-contained full backups.

Incremental backup is the foundation of efficient backup strategies for large datasets, cloud backup destinations, and frequent backup intervals; the chain dependency makes restoration more complex than full backup but the storage and bandwidth efficiency makes incremental the practical choice for most production environments. For data recovery purposes, the practical implication is that recovery from incremental backup chains requires understanding which incrementals are needed, verifying their integrity before restoration begins, and applying them in the correct sequence; missing or corrupted incrementals create gaps that may make some recovery points unreachable. The 5 incremental variants (classic, forever, synthetic, forever forward, reverse) address different operational requirements while preserving incremental’s fundamental efficiency advantages.

For users wondering when to use incremental backup, the practical guidance follows the workload characteristics. For typical SMB environments with daily change rates of 1-5%, classic incremental (weekly full + daily incremental) is the standard recommendation; restoration time scales with chain length but storage efficiency is substantial. For cloud backup destinations where bandwidth and storage costs are explicit, incremental forever with synthetic full is highly effective; only the initial full transfers full data, all subsequent transfers are incremental. For VM environments, CBT/RCT-based block-level incremental is the modern standard; backup software handles all chain management transparently. For environments with very fast RTO requirements, differential backup or full daily backup may be preferable despite higher storage cost.

For users facing specific recovery scenarios from incremental chains, the practical guidance reflects the situation. If recovery is straightforward (recent recovery point, complete chain available), proceed with sequential application of full + incrementals. If chain integrity is uncertain, verify each backup file’s hash against backup logs before beginning restoration; corrupted incrementals discovered mid-restore waste time. If chain has a gap or corrupted segment, recovery is limited to the last valid recovery point before the gap; data after the gap is unrecoverable from that chain. Standard data recovery software applies when both source and backup chain have failed; HDD-focused recovery tools may help recover backup chain data from failed backup storage. Cleanroom recovery services are the option when backup storage media has experienced physical failure. The strongest defense remains preventive: regular chain verification via hash verification, multiple chains across different media following the 3-2-1 rule, and synthetic full or incremental forever strategies that simplify long-term chain management.

Incremental Backup FAQ

What is an incremental backup?+

An incremental backup is a backup type that captures only the data that has changed since the most recent prior backup, regardless of whether that prior backup was a full or another incremental. The AWS backup reference describes the operational pattern: “An incremental backup only copies modified data since the last backup. For example, if you took a full backup on Sunday, your incremental backup on Monday would only copy changes since the Sunday backup. On Tuesday, it would only copy changes to the backup image file since the Monday backup.” The classic chain pattern: Day 0 (Sunday) full backup; Day 1 (Monday) incremental of changes since Sunday; Day 2 (Tuesday) incremental of changes since Monday; Day 3 (Wednesday) incremental of changes since Tuesday; and so on until the next full backup resets the chain. Incremental backups produce the smallest backup files of any backup type because they capture only the most-recent changes; backup windows are short and bandwidth requirements are minimal. The trade-off is that restoration requires the full backup plus every incremental in the chain applied in sequence; any missing or corrupted incremental breaks the chain and may cause recovery failure. Incremental backups are typically implemented using the archive bit (Windows), file modification timestamps (Unix), or block-level change tracking (VMware CBT, Hyper-V RCT).

How do incremental backups differ from full and differential backups?+

The three main backup types differ in what they capture and how restoration works. A full backup copies all selected data regardless of whether it has changed since the last backup; full backups are self-contained and can be restored without reference to other backups, but require the most storage space and longest backup window. An incremental backup captures only data changed since the most recent prior backup of any type (full or incremental); incremental backups produce the smallest files but require the full backup plus every incremental in the chain for restoration. A differential backup captures all data changed since the last full backup; differential backups grow larger over time as more changes accumulate, but only the last full plus the most recent differential are needed for restoration. The Acronis backup comparison reference describes the trade-off: “Differential backups copy all changed data since the last full backup; incremental backups copy only changed data since the last incremental. Differential speeds up restores but grows larger over time; incremental minimizes backup size and bandwidth but may slow restores. Choose differential when fast recovery is critical; choose incremental when you need storage and network efficiency.” Most organizations use a combination: weekly fulls, daily incrementals or differentials depending on recovery time vs storage trade-offs.

What is the incremental backup chain?+

The incremental backup chain is the sequence of dependent backups required for restoration: a full backup plus all subsequent incrementals taken since that full. The Veeam backup reference describes the dependency property: “Restoring data from incremental backups requires the presence and integrity of all preceding backups in the sequence. A failure in any incremental backup in the chain could impact the restoration process.” The chain works as follows: the full backup serves as the baseline; each incremental captures only changes since the previous backup; restoration applies the full backup, then each incremental in chronological order, until reaching the desired recovery point. The chain length grows with each incremental until reset by a new full backup. A weekly full plus daily incrementals creates a chain of 7 (Sunday full + Mon, Tue, Wed, Thu, Fri, Sat incrementals); a monthly full plus daily incrementals creates a chain of 30+. Longer chains mean: longer restoration time (each link must be applied in sequence); higher dependency risk (more links that can fail); larger total storage (multiple incremental files); and more complex chain management. The chain dependency is the fundamental trade-off of incremental backups: smallest backup size in exchange for longest restoration time and highest dependency exposure.

What are synthetic full and incremental forever backups?+

Synthetic full and incremental forever are advanced incremental backup strategies that minimize the need for repeated full backups. The TechTarget backup types reference describes synthetic full: “A synthetic full backup compares the data that has changed at the source with the original full backup and all incremental backups to create the next full synthesized backup.” The synthetic full is constructed on the backup server by combining the existing full plus all incrementals in the chain, producing a virtual full backup without re-reading the source data. Benefits: no production system load for creating the new full; no large backup window for the synthetic full operation; chain reset achieved without source-side full backup. Incremental forever is the related strategy: “If you implement an incremental forever backup, you only take an initial full backup. Subsequently, you take a sequence of incremental (forever) backups indefinitely.” The backup server stores all backup sets and automates restoration to mimic full backup restoration; the backup software handles chain management, synthetic full creation, and consolidation transparently. Both strategies are particularly valuable for cloud backups where bandwidth costs make repeated source-side full backups impractical. Forever forward incremental is a variant that periodically merges the oldest increments into the full backup to maintain manageable chain length while preserving the no-re-read property.

What is Changed Block Tracking (CBT)?+

Changed Block Tracking (CBT) is a hypervisor-level mechanism for incremental backup that tracks which blocks have been modified since the previous backup, enabling the backup software to copy only changed blocks rather than scanning entire files. VMware vSphere introduced CBT in 2009; Microsoft Hyper-V provides equivalent Resilient Change Tracking (RCT) starting with Windows Server 2016. The mechanism works at the virtual disk (VMDK or VHDX) level: when a virtual machine is configured for backup with CBT enabled, the hypervisor maintains a bitmap of changed blocks; the backup software queries this bitmap to identify only the blocks needing backup. Benefits: dramatic reduction in backup time and storage compared to file-level incremental (a 1 TB virtual disk with 100 MB of changes results in 100 MB backup instead of scanning 1 TB to find the changes); no need for traditional change-tracking mechanisms at the file system level; works regardless of guest operating system inside the VM. Limitations: CBT only tracks the current state and the most recent change point; backup software must take incrementals frequently enough to avoid losing CBT history; CBT can occasionally produce inconsistent results requiring full backup as fallback. CBT is the foundation of modern VM backup software including Veeam, Veritas NetBackup, Commvault, and Acronis Cyber Protect.

What are the trade-offs of incremental backup?+

Incremental backups trade restoration speed and dependency risk for backup size and bandwidth efficiency. Advantages: smallest backup files of any backup type because only changes since the last backup are captured; shortest backup windows ideal for short maintenance periods; lowest bandwidth requirements ideal for cloud destinations and remote sites; minimal storage growth proportional to actual change rate; preserves source system performance during backup operations. Disadvantages: restoration requires the entire backup chain (full plus all subsequent incrementals); chain corruption risk increases with chain length; off-site backups become problematic because all incrementals must be retrieved before restoration can begin; chain management complexity grows with retention period; verification is more complex (each link in chain must be verified independently). The TechTarget backup reference describes the off-site warning: “If backups are shipped off-site, incremental backups are a bad idea because you must retrieve all the tapes before you can begin a restoration.” The Macrium math illustrates the storage advantage: “two 500GB full images use 1TB of sectors to provide just two restore points. One 500GB full image followed by ten 5GB incremental images uses only 550GB of sectors while providing eleven restore points.” Best fit: large datasets with small daily change rates; cloud backup where bandwidth matters; remote sites with limited connectivity; environments with short backup windows. Poor fit: scenarios requiring fastest possible recovery; off-site tape rotation without local recovery copy.

Related glossary entries

  • Differential Backup: complementary backup type capturing changes since last full backup.
  • Backup vs Archive: strategic context for incremental backup within data management.
  • 3-2-1 Backup Rule: applies to incremental backup chains: 3 copies, 2 media, 1 offsite.
  • Cloud Backup: incremental forever and synthetic full are particularly effective for cloud destinations.
  • Hash Verification: confirms incremental chain integrity before restoration.
  • Data Recovery: when both source and backup chain have failed, drive-level recovery is the remaining option.
  • Disk Image: full backups produce disk images; incrementals capture changes against the image baseline.

About the Authors

đŸ‘„ Researched & Reviewed By
Rachel Dawson
Rachel Dawson
Technical Approver · Data Recovery Engineer

Rachel brings over twelve years of data recovery engineering experience including substantial work with clients facing incremental backup chain failures. The most consistent pattern in incremental recovery cases is the “missing incremental” scenario: a customer needs to recover data from three weeks ago, but the incremental backup for one specific day has become unreadable due to media failure, file corruption, or backup software errors. The recovery prospects depend on what’s missing: an incremental between the desired recovery point and the most-recent valid backup blocks recovery to that point; an incremental after the desired recovery point doesn’t affect recovery of earlier states. The harder cases involve clients running long incremental chains (monthly full + daily incrementals) where corruption in any of 30 incrementals can break recovery for many subsequent dates. The synthetic full and incremental forever patterns from modern backup software (Veeam, Veritas, Acronis) substantially reduce these risks by automatically managing chain consolidation. The universal recovery advice on incremental: verify chain integrity periodically through hash verification, prefer synthetic full strategies that bound chain length, follow 3-2-1 with multiple complete chains across different media, and never rely on single-chain incremental backup for critical data.

12+ years data recovery engineeringBackup chain recoveryVMware CBT recovery
✅
Editorial Independence & Affiliate Disclosure

Data Recovery Fix earns revenue through affiliate links on some product recommendations. This does not influence our reference content. Glossary entries are written and reviewed independently based on documented research, vendor documentation, independent testing, and recovery-engineer review. If anything on this page looks inaccurate, outdated, or worth revisiting, please reach out at contact@datarecoveryfix.com and we’ll review it promptly.

We will be happy to hear your thoughts

Leave a reply

Data Recovery Fix: Reviews, Comparisons and Tutorials
Logo