User's Guide Acronis® Backup & Recovery ™ 10 Server for Windows
10 Copyright © Acronis, Inc., 2000-2009 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items se
100 Copyright © Acronis, Inc., 2000-2009 • Event source: Microsoft-Windows-WindowsUpdateClient • Event type: Information • Event ID: 18 Tip: To
Copyright © Acronis, Inc., 2000-2009 101 • backup task start time matters - skip the backup task if the conditions are not met at the time when th
102 Copyright © Acronis, Inc., 2000-2009 "Location is available" means that the destination specified for storing archives on a networked
Copyright © Acronis, Inc., 2000-2009 103 What if... What if a task is scheduled to be executed at a certain time and this time is outside the speci
104 Copyright © Acronis, Inc., 2000-2009 Example: Run the backup task after free space on the managed machine has changed by at least 1 GB, but onl
Copyright © Acronis, Inc., 2000-2009 105 6. Direct management This section covers operations that can be performed directly on a managed machine b
106 Copyright © Acronis, Inc., 2000-2009 License Server was unavailable, or the license key data was corrupted. Check connectivity to the server an
Copyright © Acronis, Inc., 2000-2009 107 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's
108 Copyright © Acronis, Inc., 2000-2009 108). A backup plan state is a cumulative state of the plan's tasks.The status of a backup plan (p. 1
Copyright © Acronis, Inc., 2000-2009 109 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition. This situation is quite
Copyright © Acronis, Inc., 2000-2009 11 Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can
110 Copyright © Acronis, Inc., 2000-2009 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK
Copyright © Acronis, Inc., 2000-2009 111 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta
112 Copyright © Acronis, Inc., 2000-2009 6.1.2.2. Working with backup plans and tasks Actions on backup plans and tasks The following is a guideli
Copyright © Acronis, Inc., 2000-2009 113 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, al
114 Copyright © Acronis, Inc., 2000-2009 Without the Administrator privileges on the machine, a user cannot edit plans owned by other users. • The
Copyright © Acronis, Inc., 2000-2009 115 Why can't I delete the task? • Task belongs to a backup plan A task belonging to a backup plan canno
116 Copyright © Acronis, Inc., 2000-2009 Run backup plan The backup plan is considered as running if at least one of its tasks is running. The Run
Copyright © Acronis, Inc., 2000-2009 117 Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing V
118 Copyright © Acronis, Inc., 2000-2009 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i
Copyright © Acronis, Inc., 2000-2009 119 • Backup scheme - the selected backup scheme and all its settings with schedules. • Validation (if sele
12 Copyright © Acronis, Inc., 2000-2009 "Tasks" view Common way of working with views Generally, every view contains a table of items,
120 Copyright © Acronis, Inc., 2000-2009 To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CT
Copyright © Acronis, Inc., 2000-2009 121 Filter log entries by the original backup plan or managed entity type Under the Backup plan (or Managed en
122 Copyright © Acronis, Inc., 2000-2009 ---------------------------Log Entry Details--------------------------- Type: Infor
Copyright © Acronis, Inc., 2000-2009 123 Exclusions (p. 127) [Optional] Set up exclusions for the specific types of files you do not wish to back
124 Copyright © Acronis, Inc., 2000-2009 default one. When the default value is set, the line disappears and so you always see only the settings th
Copyright © Acronis, Inc., 2000-2009 125 Select this option to back up specific files and folders. If you are not concerned about recovery of the o
126 Copyright © Acronis, Inc., 2000-2009 appropriate place with the zero size. A volume backup stores all other files and folders of the selected v
Copyright © Acronis, Inc., 2000-2009 127 • User name. When entering the name of an Active Directory user account, be sure to also specify the doma
128 Copyright © Acronis, Inc., 2000-2009 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the de
Copyright © Acronis, Inc., 2000-2009 129 3. Naming the new archive Once you select the archive destination, the program generates a name for the ne
Copyright © Acronis, Inc., 2000-2009 13 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
130 Copyright © Acronis, Inc., 2000-2009 The program will access the source data using the credentials you specify. Use this option if the plan acc
Copyright © Acronis, Inc., 2000-2009 131 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.
132 Copyright © Acronis, Inc., 2000-2009 Jan 8—Jan 14 D D D D W - - Jan 15—Jan 21 D D D D W - - Jan 22—Jan 28 D D D D M - - Jan 2
Copyright © Acronis, Inc., 2000-2009 133 At all times, a backup is not deleted until all backups that directly depend on it become subject to delet
134 Copyright © Acronis, Inc., 2000-2009 • Start backup at: 6:00 PM • Back up on: Workdays • Weekly/monthly: Friday • Keep backups: o Daily: 1
Copyright © Acronis, Inc., 2000-2009 135 • Start backup at: 12:00 PM • Back up on: Friday • Weekly/monthly: Friday • Keep backups: o Daily: 1
136 Copyright © Acronis, Inc., 2000-2009 • Recur: Every 1 day • Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14
Copyright © Acronis, Inc., 2000-2009 137 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup has not yet been created, so the back
138 Copyright © Acronis, Inc., 2000-2009 Retention rules Specifies what retention rules will be applied to the archive. For example, the cleanup p
Copyright © Acronis, Inc., 2000-2009 139 Full backup: Schedule: Monthly, every Last Sunday of the month, at 9:00 PM Incremental: Schedule: Weekly,
14 Copyright © Acronis, Inc., 2000-2009 Components for a managed machine (agents) These are applications that perform data backup, recovery and oth
140 Copyright © Acronis, Inc., 2000-2009 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks
Copyright © Acronis, Inc., 2000-2009 141 imported to XenServer. The VMware Workstation machine can be converted to the open virtualization format (
142 Copyright © Acronis, Inc., 2000-2009 Files (p. 152) You may have to specify credentials for the destination. Skip this step when operating on
Copyright © Acronis, Inc., 2000-2009 143 6.3.1. Task credentials Provide credentials for the account under which the task will run. To specify cre
144 Copyright © Acronis, Inc., 2000-2009 o If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
Copyright © Acronis, Inc., 2000-2009 145 2. [OPTIONAL] The Acronis Active Restore check box is available when recovering Windows starting from Win
146 Copyright © Acronis, Inc., 2000-2009 o Use the task credentials The program will access the location using the credentials of the task account
Copyright © Acronis, Inc., 2000-2009 147 (p. 151) section. Check the settings and make changes if necessary. Then you proceed to the regular disk
148 Copyright © Acronis, Inc., 2000-2009 The program will generate a new NT signature for the target hard disk drive. • Recover from backup The pr
Copyright © Acronis, Inc., 2000-2009 149 On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed
Copyright © Acronis, Inc., 2000-2009 15 volumes; changing a disk partitioning style between MBR and GPT or changing a disk label, can be performed
150 Copyright © Acronis, Inc., 2000-2009 Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and
Copyright © Acronis, Inc., 2000-2009 151 6.3.6.3. Virtual machine type / virtualization server selection The new virtual machine can be created ei
152 Copyright © Acronis, Inc., 2000-2009 set by the virtualization product. You can add virtual disks to the machine configuration or, in some case
Copyright © Acronis, Inc., 2000-2009 153 Select this check box to skip files whose names match any of the criteria — called file masks — in the lis
154 Copyright © Acronis, Inc., 2000-2009 6.3.7. Access credentials for destination To specify credentials 1. Select one of the following: o Use
Copyright © Acronis, Inc., 2000-2009 155 DVD supplied by the hardware vendor or download the drivers from the vendor’s Web site. The driver files s
156 Copyright © Acronis, Inc., 2000-2009 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec
Copyright © Acronis, Inc., 2000-2009 157 6. In VM server, select the type of the new virtual machine to be created or on which virtualization serv
158 Copyright © Acronis, Inc., 2000-2009 • Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,
Copyright © Acronis, Inc., 2000-2009 159 Such system cannot boot because its kernel tries to mount the root file system at the LVM volume. Solution
16 Copyright © Acronis, Inc., 2000-2009 1.4. Supported operating systems Acronis Backup & Recovery 10 Management Console • Windows Professiona
160 Copyright © Acronis, Inc., 2000-2009 LILO 1. Perform step 1 described above. 2. Edit the LILO configuration file if the number of the partiti
Copyright © Acronis, Inc., 2000-2009 161 • Not all of the files are recovered. The most likely cause of the problem is an insufficient amount of m
162 Copyright © Acronis, Inc., 2000-2009 bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure that the
Copyright © Acronis, Inc., 2000-2009 163 After you configure all the required settings, click OK to create the validation task. 6.4.1. Task crede
164 Copyright © Acronis, Inc., 2000-2009 Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a
Copyright © Acronis, Inc., 2000-2009 165 • To select a local folder, expand the Local folders group and click the required folder. • To select a
166 Copyright © Acronis, Inc., 2000-2009 6.4.6. When to validate As validation is a resource-intensive operation, it makes sense to schedule valid
Copyright © Acronis, Inc., 2000-2009 167 Mount settings Volumes (p. 168) Select volumes to mount and configure the mount settings for every volume:
168 Copyright © Acronis, Inc., 2000-2009 While you are reviewing the location content, archives can be added, deleted or modified by another user o
Copyright © Acronis, Inc., 2000-2009 169 2. Click on the selected volume to set its mounting parameters. o Access mode - choose the mode you want
Copyright © Acronis, Inc., 2000-2009 17 1.6. Technical support As part of a purchased annual Support charge you are entitled to Technical Support a
170 Copyright © Acronis, Inc., 2000-2009 6.7.1. Creating Acronis Secure Zone You can create Acronis Secure Zone while the operating system is runn
Copyright © Acronis, Inc., 2000-2009 171 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.
172 Copyright © Acronis, Inc., 2000-2009 Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…". If the
Copyright © Acronis, Inc., 2000-2009 173 6.7.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 214). Once
174 Copyright © Acronis, Inc., 2000-2009 6.7.2.2. Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acronis Secure
Copyright © Acronis, Inc., 2000-2009 175 • back up offline any data that cannot be backed up online because of restricted access, being permanentl
176 Copyright © Acronis, Inc., 2000-2009 • Windows XP Professional with Service Pack 2 (PE 1.5) • Windows Server 2003 with Service Pack 1 (PE 1.6
Copyright © Acronis, Inc., 2000-2009 177 When using the media builder, you have to specify: 1. The Acronis bootable components to be placed on the
178 Copyright © Acronis, Inc., 2000-2009 • Gateway • DNS server • WINS server. Once the bootable agent starts on a machine, the configuration is
Copyright © Acronis, Inc., 2000-2009 179 If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also
Copyright © Acronis, Inc., 2000-2009 18 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders
180 Copyright © Acronis, Inc., 2000-2009 • Windows PE 2005 (1.6) (Windows Server 2003 with Service Pack 1). To add Acronis Plug-in to WinPE 1.x: 1
Copyright © Acronis, Inc., 2000-2009 181 run the copype.cmd script to create a folder with Windows PE files. For example, from a command prompt, t
182 Copyright © Acronis, Inc., 2000-2009 6.8.1.4. Building Bart PE with Acronis Plug-in from Windows distribution 1. Get the Bart PE builder. 2.
Copyright © Acronis, Inc., 2000-2009 183 6.8.3. Working under bootable media Operations on a machine booted with bootable media are very similar t
184 Copyright © Acronis, Inc., 2000-2009 6.9.1. Basic precautions To avoid any possible disk and volume structure damage or data loss, please take
Copyright © Acronis, Inc., 2000-2009 185 When you need to perform a disk management operation on such machine, it is necessary to specify for which
186 Copyright © Acronis, Inc., 2000-2009 • Disk conversion: GPT to MBR (p. 190) - converts a GPT partition table to MBR • Disk conversion: Basic
Copyright © Acronis, Inc., 2000-2009 187 6.9.5.2. Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It c
188 Copyright © Acronis, Inc., 2000-2009 source disk data to the target disk is impossible even with the proportional resizing of the volumes, then
Copyright © Acronis, Inc., 2000-2009 189 If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2.
Copyright © Acronis, Inc., 2000-2009 19 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
190 Copyright © Acronis, Inc., 2000-2009 6.9.5.4. Disk conversion: GPT to MBR If you plan to install an OS that does not support GPT disks, conver
Copyright © Acronis, Inc., 2000-2009 191 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic
192 Copyright © Acronis, Inc., 2000-2009 2. The machine runs this operating system. Dynamic to basic conversion of the disk, comprising of system
Copyright © Acronis, Inc., 2000-2009 193 A volume created from free space on a single physical disk. It can consist of one region on the disk or se
194 Copyright © Acronis, Inc., 2000-2009 Create volume wizard The Create volume wizard lets you create any type of volume (including system and a
Copyright © Acronis, Inc., 2000-2009 195 To create a RAID-5 volume: o Select three destination disks to create the volume on. After you choose the
196 Copyright © Acronis, Inc., 2000-2009 If you are creating a basic volume, which can be made into a system volume, this page will be different, g
Copyright © Acronis, Inc., 2000-2009 197 6.9.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volum
198 Copyright © Acronis, Inc., 2000-2009 6.9.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volum
Copyright © Acronis, Inc., 2000-2009 199 3. If you click OK to proceed with the Format Volume operation, you'll add a pending operation of fo
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2009 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
Copyright © Acronis, Inc., 2000-2009 200 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
Copyright © Acronis, Inc., 2000-2009 201 Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user rebo
202 Copyright © Acronis, Inc., 2000-2009 Backup operation An operation that creates a copy of the data that exists on a machine's (p. 210)
Copyright © Acronis, Inc., 2000-2009 203 By applying a policy to a group of machines, the administrator deploys multiple backup plans with a single
204 Copyright © Acronis, Inc., 2000-2009 • deploy an operating system on bare metal • create basic or dynamic volumes (p. 208) on bare metal • b
Copyright © Acronis, Inc., 2000-2009 205 Centralized vault A networked location allotted by the management server (p. 210) administrator to serve a
206 Copyright © Acronis, Inc., 2000-2009 D Deduplicating vault A managed vault (p. 210) in which deduplication (p. 206) is enabled. Deduplication
Copyright © Acronis, Inc., 2000-2009 207 Disk group A number of dynamic disks (p. 207) that store the common configuration data in their LDM databa
208 Copyright © Acronis, Inc., 2000-2009 Disk 1 MBR LDM database 1 MB Disk 2 Protec-tive MBR GPT Microsoft Reserved Partition (MSR) LDM da
Copyright © Acronis, Inc., 2000-2009 209 Dynamic volume Any volume located on dynamic disks (p. 207), or more precisely, on a disk group (p. 206).
Copyright © Acronis, Inc., 2000-2009 21 parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not
210 Copyright © Acronis, Inc., 2000-2009 I Image The same as Disk backup (p. 206). Incremental backup A backup (p. 201) that stores changes to th
Copyright © Acronis, Inc., 2000-2009 211 Management server (Acronis Backup & Recovery 10 Management Server) A central server that drives data p
212 Copyright © Acronis, Inc., 2000-2009 Registered machine A machine (p. 210) managed by a management server (p. 210). A machine can be registered
Copyright © Acronis, Inc., 2000-2009 213 Since the cleanup schedule exists on the machine (p. 210) the agent (p. 201) resides on, and therefore use
214 Copyright © Acronis, Inc., 2000-2009 • when the machine is booted with Acronis Startup Recovery Manager (p. 200) (using F11) or • the image b
Copyright © Acronis, Inc., 2000-2009 215 W WinPE (Windows Preinstallation Environment) A minimal Windows system based on any of the following kerne
Index A About Windows loaders • 160 Access credentials • 166, 168 Access credentials for archive location • 123, 129 Access credentials for destinat
Copyright © Acronis, Inc., 2000-2009 217 Backup schemes • 123, 130 Backup selection • 162, 164, 166, 168 Backup splitting • 52, 66 Basic concepts •
218 Copyright © Acronis, Inc., 2000-2009 GPT to MBR • 186, 190 MBR to GPT • 185, 189 Disk destination • 147 Disk group • 35, 207, 209 Disk initiali
Copyright © Acronis, Inc., 2000-2009 219 M Machine • 201, 202, 203, 204, 207, 208, 210, 211, 212, 213, 214 Machine options • 48, 64, 65, 79 Main ar
22 Copyright © Acronis, Inc., 2000-2009 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
220 Copyright © Acronis, Inc., 2000-2009 Run backup plan • 112, 116 Running Acronis Disk Director Lite • 184 S Scheduling • 69, 90, 131, 140, 166 S
Copyright © Acronis, Inc., 2000-2009 221 Validation rules • 202, 214 Vault • 18, 41, 173, 211, 214 Vaults • 35, 82, 162, 173 Views • 11 Virtual mac
Copyright © Acronis, Inc., 2000-2009 23 of only full backups. A full backup is self-sufficient - you do not need access to any other backup to reco
24 Copyright © Acronis, Inc., 2000-2009 An incremental or differential backup created after disk defragmentation might be considerably larger than
Copyright © Acronis, Inc., 2000-2009 25 A centralized backup plan owner is the management server administrator who created or last modified the cen
26 Copyright © Acronis, Inc., 2000-2009 A scheduled or postponed task has to run anyway, regardless if any user is logged on or not (for example, t
Copyright © Acronis, Inc., 2000-2009 27 Assume you select backing up at 8:00 PM on workdays. Here is the total schedule you have defined. “B” stand
28 Copyright © Acronis, Inc., 2000-2009 Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays a
Copyright © Acronis, Inc., 2000-2009 29 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 6 1.1. Acronis Backu
30 Copyright © Acronis, Inc., 2000-2009 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b
Copyright © Acronis, Inc., 2000-2009 31 other move (moves 1, 3, 5, 7, 9, 11...), the second ring at intervals of four moves (moves 2, 6, 10...), th
32 Copyright © Acronis, Inc., 2000-2009 • incremental backups on first level (A) - to gain time and storage savings for the most frequent backup o
Copyright © Acronis, Inc., 2000-2009 33 2.7. Retention rules The backups produced by a backup plan make an archive. The two retention rules describ
34 Copyright © Acronis, Inc., 2000-2009 There is a certain risk that all but one backup will be deleted if the maximum archive size is set improper
Copyright © Acronis, Inc., 2000-2009 35 When deletion of a backup affects other backups, one of the following rules is applied: • Retain the backu
36 Copyright © Acronis, Inc., 2000-2009 • simple/spanned • striped (RAID 0) • mirrored (RAID 1) • a mirror of stripes (RAID 0+1) • RAID 5. Acr
Copyright © Acronis, Inc., 2000-2009 37 Assume you are going to recover a 30GB striped volume to a disk group consisting of two disks. Each disk ha
38 Copyright © Acronis, Inc., 2000-2009 You might want to change the target volume type (basic, simple/spanned, striped, mirrored, RAID 0+1, RAID 5
Copyright © Acronis, Inc., 2000-2009 39 ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Tape written on a tape device through... Backup
4. Vaults ... 82 4.1. Personal vaul
40 Copyright © Acronis, Inc., 2000-2009 5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis U
Copyright © Acronis, Inc., 2000-2009 41 Managing the Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 214). Once creat
42 Copyright © Acronis, Inc., 2000-2009 Once the Acronis Secure Zone is created, you can activate or deactivate the Acronis Startup Recovery Manage
Copyright © Acronis, Inc., 2000-2009 43 Universal Restore searches for drivers in the network folders you specify, on removable media and in the de
44 Copyright © Acronis, Inc., 2000-2009 Universal Restore for the other product editions is purchased separately, has its own license, and is insta
Copyright © Acronis, Inc., 2000-2009 45 Some machines are being used as storage facilities, where the operating system claims a small space segment
Copyright © Acronis, Inc., 2000-2009 46 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph
Copyright © Acronis, Inc., 2000-2009 47 The option defines whether to display the pop-up messages about task run results: successful completion, fa
48 Copyright © Acronis, Inc., 2000-2009 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem
Copyright © Acronis, Inc., 2000-2009 49 You can further override the settings set in the default backup and recovery options, when creating a backu
6.4.1. Task credentials...
50 Copyright © Acronis, Inc., 2000-2009 o Community – type the name of the SNMP community to which both the host running SNMP management applicati
Copyright © Acronis, Inc., 2000-2009 51 To view and change the default backup options, connect the console to the managed machine and then select O
52 Copyright © Acronis, Inc., 2000-2009 Backup splitting (p. 66) + + + + File-level security (p. 66): Preserve files’ security settings in archi
Copyright © Acronis, Inc., 2000-2009 53 Event tracing: Windows events log (p. 64) + + - - SNMP (p. 64) + + - - 3.3.1.1. Archive protection
54 Copyright © Acronis, Inc., 2000-2009 To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidde
Copyright © Acronis, Inc., 2000-2009 55 The following scheme illustrates when pre/post commands are executed. Pre-backup command Backup Post-backu
56 Copyright © Acronis, Inc., 2000-2009 Result Preset Perform the backup only after the command is successfully executed. Fail the task if the co
Copyright © Acronis, Inc., 2000-2009 57 Using the pre/post data capture commands, you can suspend and resume a database or application that is not
58 Copyright © Acronis, Inc., 2000-2009 executed. Fail the task if the command execution fails. result. Post-data capture command To specify a co
Copyright © Acronis, Inc., 2000-2009 59 Note: Files that are stored on network shares are always backed up one by one. The preset is: Create snapsh
Copyright © Acronis, Inc., 2000-2009 6 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A
60 Copyright © Acronis, Inc., 2000-2009 backup applications. Examples of VSS-aware database servers are Microsoft Exchange and Microsoft SQL Server
Copyright © Acronis, Inc., 2000-2009 61 • Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You ma
62 Copyright © Acronis, Inc., 2000-2009 • Click Writing speed stated as a percentage of the maximum speed of the destination hard disk, and then d
Copyright © Acronis, Inc., 2000-2009 63 o When backup completes successfully – to send a notification when the backup task has completed success
64 Copyright © Acronis, Inc., 2000-2009 To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. 2. In the Machi
Copyright © Acronis, Inc., 2000-2009 65 This option is not available when operating under the bootable media. The option defines whether the agent(
66 Copyright © Acronis, Inc., 2000-2009 3.3.1.13. Backup splitting This option is effective for Windows and Linux operating systems and bootable m
Copyright © Acronis, Inc., 2000-2009 67 the user who encrypted the files/folders will be able to read them. Decryption may also be useful if you ar
68 Copyright © Acronis, Inc., 2000-2009 want more functionality during recovery. You will be able to configure the recovery operation in the same w
Copyright © Acronis, Inc., 2000-2009 69 3.3.1.17. Dual destination This option is effective for both Windows and Linux operating systems, when the
Copyright © Acronis, Inc., 2000-2009 7 1.2. Getting started Direct management 1. Install Acronis Backup & Recovery 10 Management Console and A
70 Copyright © Acronis, Inc., 2000-2009 Wait until the conditions are met With this setting, the scheduler starts monitoring the conditions and lau
Copyright © Acronis, Inc., 2000-2009 71 Stop executing the backup plan The plan's schedule will be temporarily disabled so that you have time
72 Copyright © Acronis, Inc., 2000-2009 The preset is: Disabled. The destination CD/DVD can be ejected or the tape can be dismounted after the back
Copyright © Acronis, Inc., 2000-2009 73 source) This option is effective for Windows and Linux operating systems and bootable media, when the backu
74 Copyright © Acronis, Inc., 2000-2009 Recovery priority (p. 76) + + - - File-level security (p. 76): Recover files with their security setting
Copyright © Acronis, Inc., 2000-2009 75 The program does not support interactive commands, i.e. commands that require user input (for example, &quo
76 Copyright © Acronis, Inc., 2000-2009 Post-recovery command To specify a command/executable file to be executed after the recovery is completed
Copyright © Acronis, Inc., 2000-2009 77 The preset is: Recover files with their security settings. If the file NTFS permissions were preserved duri
78 Copyright © Acronis, Inc., 2000-2009 • User name – enter the user name • Password – enter the password. o Select the Use the specified outgoi
Copyright © Acronis, Inc., 2000-2009 79 Windows event log This option is effective only in Windows operating systems. This option is not available
8 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace
80 Copyright © Acronis, Inc., 2000-2009 • Send SNMP notifications individually for recovery operation events – to send the events of the recovery
Copyright © Acronis, Inc., 2000-2009 81 The preset is Enabled. This option defines whether to recover the files’ date and time from the archive or
Copyright © Acronis, Inc., 2000-2009 82 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i
Copyright © Acronis, Inc., 2000-2009 83 A vault is called personal if it was created using direct connection of the console to a managed machine. P
84 Copyright © Acronis, Inc., 2000-2009 4.1.1. Working with the "Personal vault" view This section briefly describes the main elements o
Copyright © Acronis, Inc., 2000-2009 85 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicat
86 Copyright © Acronis, Inc., 2000-2009 4.1.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the
Copyright © Acronis, Inc., 2000-2009 87 4.2. Common operations 4.2.1. Operations with archives stored in a vault To perform any operation with an
88 Copyright © Acronis, Inc., 2000-2009 To Do View backup content in a separate window Click View content. In the Backup Content window, examine
Copyright © Acronis, Inc., 2000-2009 89 What happens if I delete a backup that is a base of an incremental or differential backup? To preserve arch
Copyright © Acronis, Inc., 2000-2009 9 Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on whethe
Copyright © Acronis, Inc., 2000-2009 90 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
Copyright © Acronis, Inc., 2000-2009 91 All users are logged off The specified period of time has passed since the last successful backup completed
92 Copyright © Acronis, Inc., 2000-2009 Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10
Copyright © Acronis, Inc., 2000-2009 93 • first at 8 AM • second at 12 PM (noon) • third at 3 PM • fourth at 5 PM • fifth at 7 PM The obvious
94 Copyright © Acronis, Inc., 2000-2009 Every: <...> From: <...> Until: <...> Set up how many times the task will be run during t
Copyright © Acronis, Inc., 2000-2009 95 2. Once at: 09:00:00 PM. 3. Effective: From: empty. If you have created the task, say on Monday at 11:30
96 Copyright © Acronis, Inc., 2000-2009 To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3. Effective: Fro
Copyright © Acronis, Inc., 2000-2009 97 Run the task once at 10 PM on the last day of every month. The schedule's parameters are set up as fol
98 Copyright © Acronis, Inc., 2000-2009 First schedule 1. Months: December, January, February. 2. On: <All> <All workdays> 3. Once a
Copyright © Acronis, Inc., 2000-2009 99 Event source Specifies the event source, which typically indicates the program or the system component that
Comentários a estes Manuais