1.6 Applicability Statement

An application uses this protocol to remotely configure shadow copies and shadow copy storage on the server.