Consider the following scenario:
- You use an application to open executable files over the network from a client computer that is running Windows 7 or Windows Server 2008 R2.
- This application also opens more files that enable opportunistic locking (oplock) over the network.
- Another process tries to access a shared file that the application already opened over the network.
- The server requests that the client computer break the oplock.