Update 3 Acronis® Backup & Recovery ™ 10 Advanced Server User's Guide
10 Copyright © Acronis, Inc., 2000-2010 4. Start the console. Create the bootable media. 5. Connect the console to the management server. The sim
100 Copyright © Acronis, Inc., 2000-2010 Pre/Post backup commands (p. 103) + + + + PE only PE only Pre/Post data capture commands (p. 105) + + + +
101 Copyright © Acronis, Inc., 2000-2010 Overwrite data on a tape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Ta
102 Copyright © Acronis, Inc., 2000-2010 The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly gener
103 Copyright © Acronis, Inc., 2000-2010 Exclusion examples Criterion Example Description Windows and Linux By name F.log F Excludes all files name
104 Copyright © Acronis, Inc., 2000-2010 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:
105 Copyright © Acronis, Inc., 2000-2010 4. If successful execution of the command is critical for your backup strategy, select the Fail the task
106 Copyright © Acronis, Inc., 2000-2010 4. Depending on the result you want to obtain, select the appropriate options as described in the table b
107 Copyright © Acronis, Inc., 2000-2010 fails. 3.4.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows
108 Copyright © Acronis, Inc., 2000-2010 transactions, at the moment of taking the data snapshot by Acronis Backup & Recovery 10. Data consiste
109 Copyright © Acronis, Inc., 2000-2010 Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You may
11 Copyright © Acronis, Inc., 2000-2010 Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the
110 Copyright © Acronis, Inc., 2000-2010 Click Writing speed stated in kilobytes per second, and then enter the writing speed in kilobytes per s
111 Copyright © Acronis, Inc., 2000-2010 4. For the e-mail message to include the log entries related to the backup, select the Add full log to th
112 Copyright © Acronis, Inc., 2000-2010 The When user interaction is required check box – to send notification during the operation when user inte
113 Copyright © Acronis, Inc., 2000-2010 Use the setting set in the Machine options – to use the setting specified for the machine. For more inf
114 Copyright © Acronis, Inc., 2000-2010 If the destination disk runs out of free space while creating the backup, the task enters the Need interac
115 Copyright © Acronis, Inc., 2000-2010 3.4.1.15 Media components This option is effective for both Windows and Linux operating systems, when the
116 Copyright © Acronis, Inc., 2000-2010 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will display a pop-up
117 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior in case a backup task is about to start (the scheduled time co
118 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior when any of the backup plan's tasks fails. The preset is
119 Copyright © Acronis, Inc., 2000-2010 When this option is enabled, the backups, belonging to the policy or plan being created, will be located o
12 Copyright © Acronis, Inc., 2000-2010 Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and t
120 Copyright © Acronis, Inc., 2000-2010 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you
121 Copyright © Acronis, Inc., 2000-2010 For example, if the machine boots from a hard disk drive by default and you select this check box, the mac
122 Copyright © Acronis, Inc., 2000-2010 You can also customize a default option itself by changing its value against the pre-defined one. The new
123 Copyright © Acronis, Inc., 2000-2010 Change SID after recovery Windows recovery - Windows recovery - Windows recovery - Notifications: E-mail (
124 Copyright © Acronis, Inc., 2000-2010 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not
125 Copyright © Acronis, Inc., 2000-2010 Low – to minimize resources taken by the recovery process, leaving more resources to other processes ru
126 Copyright © Acronis, Inc., 2000-2010 Some Internet service providers require authentication on the incoming mail server before being allowed
127 Copyright © Acronis, Inc., 2000-2010 Windows event log This option is effective only in Windows operating systems. This option is not availabl
128 Copyright © Acronis, Inc., 2000-2010 Community – type the name of SNMP community to which both the host running SNMP management application
129 Copyright © Acronis, Inc., 2000-2010 Check file system after recovery This option is effective only when recovering disks or volumes. When oper
13 Copyright © Acronis, Inc., 2000-2010 [Management server name]. Root of the tree also called a Welcome view. Displays the name of the managem
130 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i
131 Copyright © Acronis, Inc., 2000-2010 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau
132 Copyright © Acronis, Inc., 2000-2010 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p.
133 Copyright © Acronis, Inc., 2000-2010 Related sections: Operations with archives stored in a vault (p. 164) Operations with backups (p. 165) Fil
134 Copyright © Acronis, Inc., 2000-2010 Delete a vault 1. Select the vault. 2. Click Delete. You'll be asked whether to keep the archives
135 Copyright © Acronis, Inc., 2000-2010 Storage node Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may
136 Copyright © Acronis, Inc., 2000-2010 Vault database path To specify the path where the vault's database will be created 1. In the Local f
137 Copyright © Acronis, Inc., 2000-2010 4.1.2.2 Creating an unmanaged centralized vault To create an unmanaged centralized vault, perform the fol
138 Copyright © Acronis, Inc., 2000-2010 To attach a managed vault to a storage node, perform the following steps. Vault Storage node Select the A
139 Copyright © Acronis, Inc., 2000-2010 by different components of other versions of the product by means of Acronis Backup & Recovery 10, see
14 Copyright © Acronis, Inc., 2000-2010 actions bar will be named as 'System backup' actions and will have the set of actions typical to
140 Copyright © Acronis, Inc., 2000-2010 4. A tape with backups written by the storage node cannot be read on a tape device, locally attached to a
141 Copyright © Acronis, Inc., 2000-2010 4.1.3.5 Getting started with a tape library If you have a tape library device attached to a machine with
142 Copyright © Acronis, Inc., 2000-2010 If the tape barcode cannot be read, another Tasks Need Interaction window asks you to label a tape. Actio
143 Copyright © Acronis, Inc., 2000-2010 To change the settings of the backup policy/plan to be created click Change… in the Backup options section
144 Copyright © Acronis, Inc., 2000-2010 Any user with access to a managed vault on a tape library is able to perform these operations. However two
145 Copyright © Acronis, Inc., 2000-2010 Labeling When a tape required for data recovery is not found, the Task Need Interaction window will ask th
146 Copyright © Acronis, Inc., 2000-2010 If you leave this option unchanged, then the backups, belonging to the policy or plan being created, might
147 Copyright © Acronis, Inc., 2000-2010 cycle. The same tape rotation enables you to get by with the minimum number of cartridges and not to be bu
148 Copyright © Acronis, Inc., 2000-2010 capability of the tape library (number of drives, loaders, slots and available tapes; capacity of tapes
149 Copyright © Acronis, Inc., 2000-2010 backup policy/plan starts on Wednesday and full backups should be created on every fourth Friday, on Wedne
15 Copyright © Acronis, Inc., 2000-2010 Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 p
150 Copyright © Acronis, Inc., 2000-2010 The next figure demonstrates the data backup archive at the moment. The differential backup is drawn as a
151 Copyright © Acronis, Inc., 2000-2010 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f
152 Copyright © Acronis, Inc., 2000-2010 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and
153 Copyright © Acronis, Inc., 2000-2010 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup
154 Copyright © Acronis, Inc., 2000-2010 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF
155 Copyright © Acronis, Inc., 2000-2010 backup deletion frees a tape so it can be reused. The main drawback is the large number of required tap
156 Copyright © Acronis, Inc., 2000-2010 ToH Example 1 Suppose, the backup plan has the following tape options: the Use a separate tape set opti
157 Copyright © Acronis, Inc., 2000-2010 five-level scheme requires up to five tapes for this case. ToH Example 2 Suppose, the backup plan has
158 Copyright © Acronis, Inc., 2000-2010 ToH Example 3 Imagine the backup plan has the following tape options: the Use a separate tape set opti
159 Copyright © Acronis, Inc., 2000-2010 To simplify the tape planning lets discard the possibility that the calculated tapes might contain backups
16 Copyright © Acronis, Inc., 2000-2010 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
160 Copyright © Acronis, Inc., 2000-2010 Total number of required tapes = round up ((2*F_GB + 12*I_GB + 11*D_GB) * CL / T_GB) + 1 = round up ( (2*3
161 Copyright © Acronis, Inc., 2000-2010 node database has all the required information about the content of the moved tapes. So all you need to do
162 Copyright © Acronis, Inc., 2000-2010 Metadata The .meta folder is created during backup in every personal vault. This folder contains additiona
163 Copyright © Acronis, Inc., 2000-2010 [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicate
164 Copyright © Acronis, Inc., 2000-2010 4.2.2.1 Creating a personal vault To create a personal vault 1. In the Name field, type a name for the v
165 Copyright © Acronis, Inc., 2000-2010 To Do Validate an archive Click Validate. The Validation (p. 244) page will be opened with the pre-selec
166 Copyright © Acronis, Inc., 2000-2010 Validate a backup Click Validate. The Validation (p. 244) page will be opened with the pre-selected back
167 Copyright © Acronis, Inc., 2000-2010 4.3.4 Filtering and sorting archives The following is a guideline for you to filter and sort archives in
168 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
169 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed + + The scheduler behav
17 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
170 Copyright © Acronis, Inc., 2000-2010 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters a
171 Copyright © Acronis, Inc., 2000-2010 task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the
172 Copyright © Acronis, Inc., 2000-2010 Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certa
173 Copyright © Acronis, Inc., 2000-2010 Thursday: every 3 hours from 9 AM till 9 PM Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)
174 Copyright © Acronis, Inc., 2000-2010 Every: <...> From: <...> Until: <...> Set up how many times the task will be run during
175 Copyright © Acronis, Inc., 2000-2010 To: 12/01/2010. Actually the task will end on the last workday of November. By setting up this date we jus
176 Copyright © Acronis, Inc., 2000-2010 For example, you may want to set up a backup plan that will automatically perform an emergency full backup
177 Copyright © Acronis, Inc., 2000-2010 WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When c
178 Copyright © Acronis, Inc., 2000-2010 Distribute start time within the time window When this setting is enabled, the backup task on each registe
179 Copyright © Acronis, Inc., 2000-2010 2. In How to back up, select the Simple, Tower of Hanoi, or Custom scheme, and then click Change to speci
18 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of
180 Copyright © Acronis, Inc., 2000-2010 Adding multiple conditions Multiple conditions must be met simultaneously to enable task execution. Exampl
181 Copyright © Acronis, Inc., 2000-2010 Event: Weekly, Every 1 week(s) on <workdays>; Once at 09:00:00 PM. Condition: Location's
182 Copyright © Acronis, Inc., 2000-2010 If the task start conditions are Wait until the conditions are met and the Run the task anyway after ch
183 Copyright © Acronis, Inc., 2000-2010 (3) if the machine is never restarted, the task will never start. You can start the backup manually, if ne
184 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by
185 Copyright © Acronis, Inc., 2000-2010 licenses. Please make sure you have a valid license on Acronis License Server. After a successful license
186 Copyright © Acronis, Inc., 2000-2010 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared in
187 Copyright © Acronis, Inc., 2000-2010 In the backup table, select the backup plan (task). Use the toolbar's buttons to take an action
188 Copyright © Acronis, Inc., 2000-2010 A backup plan status is derived from the results of the last run of the plans' tasks. Status How it
189 Copyright © Acronis, Inc., 2000-2010 Need interaction Any running task can put itself into the Need interaction state when it needs human inter
19 Copyright © Acronis, Inc., 2000-2010 File backup File-level data protection is based on backing up files and folders residing on the machine whe
190 Copyright © Acronis, Inc., 2000-2010 centralized plan has failed 2 Warning Last result is "Succeeded with warning" View the log to re
191 Copyright © Acronis, Inc., 2000-2010 Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 194) window, select the task you need
192 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p
193 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos
194 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
195 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery o
196 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The
197 Copyright © Acronis, Inc., 2000-2010 Validation (if selected) - events before or after which the validation is performed, and validation sch
198 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following Click View Details. Th
199 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 recovered to their original location or to another place. It is possible to recover all files and directori
200 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for
201 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the location if the plan account does not have access permissions to th
202 Copyright © Acronis, Inc., 2000-2010 Virtualization server (p. 222) Here you select the resulting virtual machine type and location. Available
203 Copyright © Acronis, Inc., 2000-2010 Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Sel
204 Copyright © Acronis, Inc., 2000-2010 Windows The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hi
205 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl
206 Copyright © Acronis, Inc., 2000-2010 Windows By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\
207 Copyright © Acronis, Inc., 2000-2010 To back up data to a locally attached tape device, expand the Tape drives group, then click the require
208 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 211) to the archive name. If you do not
209 Copyright © Acronis, Inc., 2000-2010 Your script can move older backups based on the date stamp. See also “The *Date+ variable” (p. 211). E
21 Copyright © Acronis, Inc., 2000-2010 VMware vCenter integration This feature provides the capability to view virtual machines managed by a VMwar
210 Copyright © Acronis, Inc., 2000-2010 You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday
211 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each
212 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the
213 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.
214 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W
215 Copyright © Acronis, Inc., 2000-2010 Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Start bac
216 Copyright © Acronis, Inc., 2000-2010 Have a weekly summary of file changes since last month (Friday weekly differential backup). Have a m
217 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p.
218 Copyright © Acronis, Inc., 2000-2010 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 to 2 days 1
219 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If the
22 Copyright © Acronis, Inc., 2000-2010 Deduplication A managed vault can be configured as a deduplicating vault. This means that identical data wi
220 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b
221 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six
222 Copyright © Acronis, Inc., 2000-2010 6.2.11 Archive validation Set up the validation task to check if the backed up data is recoverable. If th
223 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent
224 Copyright © Acronis, Inc., 2000-2010 If the managed machine's operating system fails to start or you need to recover data to bare metal, b
225 Copyright © Acronis, Inc., 2000-2010 Access credentials (p. 228) [Optional] Provide credentials for the archive location if the task account do
226 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val
227 Copyright © Acronis, Inc., 2000-2010 If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the dis
228 Copyright © Acronis, Inc., 2000-2010 6.3.4.1 Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the su
229 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun
23 Copyright © Acronis, Inc., 2000-2010 The media builder that installs on Windows can create bootable media based on either Windows Preinstallatio
230 Copyright © Acronis, Inc., 2000-2010 Disk #: Disk # (MODEL) (p. 232) Select the destination disk for each of the source disks. NT signature (p.
231 Copyright © Acronis, Inc., 2000-2010 6.3.6.2 Volumes Available volume destinations depend on the agents operating on the machine. Recover to:
232 Copyright © Acronis, Inc., 2000-2010 MBR destination To specify a destination disk: 1. Select the disk to recover the MBR to. 2. Click OK. V
233 Copyright © Acronis, Inc., 2000-2010 set as active. If you recover a system volume to another hard disk with its own volumes and operating syst
234 Copyright © Acronis, Inc., 2000-2010 Storage Initial setting: the default storage of the virtualization server if the new machine is created on
235 Copyright © Acronis, Inc., 2000-2010 Recovery exclusions Set up exclusions for the specific files you do not wish to recover. Use the Add, Edi
236 Copyright © Acronis, Inc., 2000-2010 Do not overwrite existing file - this will give the file on the hard disk priority over the file in the
237 Copyright © Acronis, Inc., 2000-2010 DVD supplied by the hardware vendor or download the drivers from the vendor’s Web site. The driver files s
238 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec
239 Copyright © Acronis, Inc., 2000-2010 8. [Optionally] Review the Virtual machine settings (p. 233) and make changes if necessary. Here you can
24 Copyright © Acronis, Inc., 2000-2010 Windows Server 2008 - the Standard, Enterprise, Small Business Server, Foundation editions (x86, x64)
240 Copyright © Acronis, Inc., 2000-2010 Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,
241 Copyright © Acronis, Inc., 2000-2010 6.3.11.1 How to reactivate GRUB and change its configuration Generally, you should refer to the boot load
242 Copyright © Acronis, Inc., 2000-2010 9. Specify the disk on which GRUB is located—typically, the boot or root partition: root (hd0,0) 10. Inst
243 Copyright © Acronis, Inc., 2000-2010 If the recovery requires the machine to be rebooted (usually, when the volumes to recover include the boot
244 Copyright © Acronis, Inc., 2000-2010 6.3.14 Recovering the storage node In addition to backing up data to centralized vaults managed by Acroni
245 Copyright © Acronis, Inc., 2000-2010 You can access the Validation page from the Vaults (p. 130) view. Right-click the object to validate (arch
246 Copyright © Acronis, Inc., 2000-2010 User name. When entering the name of an Active Directory user account, be sure to also specify the doma
247 Copyright © Acronis, Inc., 2000-2010 To access a managed vault, type the following string in the Path field: bsp://node_address/vault_name/
248 Copyright © Acronis, Inc., 2000-2010 Use the task credentials The program will access the location using the credentials of the task account
249 Copyright © Acronis, Inc., 2000-2010 "Band aid" database recovery solution: mount up an image that contains an SQL database from a
25 Copyright © Acronis, Inc., 2000-2010 Windows Server 2008 - the Standard, Enterprise, Small Business Server, Foundation editions (x86, x64)
250 Copyright © Acronis, Inc., 2000-2010 If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
251 Copyright © Acronis, Inc., 2000-2010 User name. When entering the name of an Active Directory user account, be sure to also specify the doma
252 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient
253 Copyright © Acronis, Inc., 2000-2010 The resulting archive's options The exported archive inherits the options of the original archive, in
254 Copyright © Acronis, Inc., 2000-2010 [Optional] The export task will run on behalf of the user who is creating the task. You can change the tas
255 Copyright © Acronis, Inc., 2000-2010 6.7.2 Archive selection To select an archive 1. Enter the full path to the location in the Path field, o
256 Copyright © Acronis, Inc., 2000-2010 6.7.3 Backup selection To specify a backup(s) to export 1. At the top of the window, select the respecti
257 Copyright © Acronis, Inc., 2000-2010 To export data to a network share, expand the Network folders group, select the required networked mach
258 Copyright © Acronis, Inc., 2000-2010 6.7.6 Access credentials for destination Specify credentials required for access to the location where th
259 Copyright © Acronis, Inc., 2000-2010 [Optional] Protect the Acronis Secure Zone from unauthorized access with a password. The prompt for the pa
26 Copyright © Acronis, Inc., 2000-2010 Management Console 30 MB 950 MB 450 MB Screen resolution 1024*768 pixels or higher Management Server 40 MB
260 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accord
261 Copyright © Acronis, Inc., 2000-2010 2. Select volumes from which free space will be used to increase the Acronis Secure Zone. 3. Specify the
262 Copyright © Acronis, Inc., 2000-2010 Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…" (if you
263 Copyright © Acronis, Inc., 2000-2010 Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent base
264 Copyright © Acronis, Inc., 2000-2010 Windows Vista (PE 2.0) Windows Vista SP1 and Windows Server 2008 (PE 2.1) Windows 7 (PE 3.0) If y
265 Copyright © Acronis, Inc., 2000-2010 Universal Restore can be enabled if Acronis Backup & Recovery 10 Universal Restore is installed on
266 Copyright © Acronis, Inc., 2000-2010 noapic Disables Advanced Programmable Interrupt Controller (APIC). You may want to use this parameter when
267 Copyright © Acronis, Inc., 2000-2010 pci=nobios Disables the use of PCI BIOS; only direct hardware access methods will be allowed. You may want
268 Copyright © Acronis, Inc., 2000-2010 Example The bootable agent could use one of the network adapters for communication with the management co
269 Copyright © Acronis, Inc., 2000-2010 To remove drivers: 1. Select the INF file. 2. Click Remove. 6.10.1.2 Adding the Acronis Plug-in to Win
27 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
270 Copyright © Acronis, Inc., 2000-2010 2. Start the Bootable Media Builder either from the management console, by selecting Tools > Create Bo
271 Copyright © Acronis, Inc., 2000-2010 5. Run the following command: export_license.bat 6. Copy the contents of the current folder—by default:
272 Copyright © Acronis, Inc., 2000-2010 5. There is no Navigation tree in the media GUI. Use the Navigation menu item to navigate between views.
273 Copyright © Acronis, Inc., 2000-2010 7. If prompted, specify the user name and password to access the iSCSI device. To add an NDAS device 1.
274 Copyright © Acronis, Inc., 2000-2010 echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo
275 Copyright © Acronis, Inc., 2000-2010 To create the volume structure by using the management console 1. Boot the machine from a Linux-based boo
276 Copyright © Acronis, Inc., 2000-2010 7. Return to the management console by pressing CTRL+ALT+F1, or by running the command: /bin/product (Do
277 Copyright © Acronis, Inc., 2000-2010 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgroup /dev/md0 /dev/md1 lvm vgdisplay The output of the
278 Copyright © Acronis, Inc., 2000-2010 Num Idx Partition Flags Start Size Type ---- --- --------- ----- ----- --------- ------ Disk 1:
279 Copyright © Acronis, Inc., 2000-2010 6.10.6.2 Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS suppo
28 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
280 Copyright © Acronis, Inc., 2000-2010 6.11 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configurati
281 Copyright © Acronis, Inc., 2000-2010 Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare
282 Copyright © Acronis, Inc., 2000-2010 Displaying operation results The results of any disk or volume operation, you have just planned, are immed
283 Copyright © Acronis, Inc., 2000-2010 If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Li
284 Copyright © Acronis, Inc., 2000-2010 data loss , then the user will be allowed to proceed. If due to the size limitations safe transfer of all
285 Copyright © Acronis, Inc., 2000-2010 5. Wait until the task is finished. 6.11.5.3 Disk conversion: MBR to GPT You would want to convert an M
286 Copyright © Acronis, Inc., 2000-2010 Please note, a volume, belonging to a GPT disk to convert, will be a logical one after the operation and i
287 Copyright © Acronis, Inc., 2000-2010 You will be advised about the changes that will happen to the system if the chosen disk is converted from
288 Copyright © Acronis, Inc., 2000-2010 the following Microsoft knowledge base article: http://technet.microsoft.com/en-us/library/cc732026.aspx.
289 Copyright © Acronis, Inc., 2000-2010 A volume, also sometimes called RAID 0, consisting of equal sized stripes of data, written across each dis
29 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
290 Copyright © Acronis, Inc., 2000-2010 Striped Mirrored RAID-5 You will obtain a brief description of every type of volume for better u
291 Copyright © Acronis, Inc., 2000-2010 minimum and the maximum values or click on the special handle, and hold and drag the borders of the disk&a
292 Copyright © Acronis, Inc., 2000-2010 6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is
293 Copyright © Acronis, Inc., 2000-2010 6.11.6.4 Change volume letter Windows operating systems assign letters (C:, D:, etc) to hard disk volumes
294 Copyright © Acronis, Inc., 2000-2010 to save additional space which is being lost due to the cluster size on the FAT16 or FAT32 file systems
295 Copyright © Acronis, Inc., 2000-2010 Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so
296 Copyright © Acronis, Inc., 2000-2010 7 Centralized management This section covers operations that can be performed centrally by using the comp
297 Copyright © Acronis, Inc., 2000-2010 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has le
298 Copyright © Acronis, Inc., 2000-2010 Statistics for the selected date are displayed to the right of the chart. All the statistics fields are in
299 Copyright © Acronis, Inc., 2000-2010 7.1.2.1 Backup policy deployment states A backup policy deployment state is a combination of the policy d
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...8 1.1 A
30 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
300 Copyright © Acronis, Inc., 2000-2010 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e
301 Copyright © Acronis, Inc., 2000-2010 Edit a policy Click Edit. Editing policies is performed in the same way as creating (p. 357). Once the p
302 Copyright © Acronis, Inc., 2000-2010 To Do Sort backup policies by any column Click the column's header to sort the backup policies in asc
303 Copyright © Acronis, Inc., 2000-2010 Actions To Do View details of the machine (group). Click View details. In the Machine details (p. 310)/G
304 Copyright © Acronis, Inc., 2000-2010 Static groups Static groups contain machines manually added to the group by the administrator. A stati
305 Copyright © Acronis, Inc., 2000-2010 In the Add machine (p. 307) window, select the machine that needs to be added to the management server. Im
306 Copyright © Acronis, Inc., 2000-2010 Remove a machine from the current static group Click Remove from group. The backup policies applied to t
307 Copyright © Acronis, Inc., 2000-2010 Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & R
308 Copyright © Acronis, Inc., 2000-2010 If more than 1000 matches are found, only the first 1000 items will be displayed. In this case, it is reco
309 Copyright © Acronis, Inc., 2000-2010 Synchronization command line tool Acronis Backup & Recovery 10 Management Server has a command line to
31 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
310 Copyright © Acronis, Inc., 2000-2010 Moving a machine to another group To move the selected machine to another group 1. In the group tree, sel
311 Copyright © Acronis, Inc., 2000-2010 Unknown - this status is displayed until the first connection between the management server and the mac
312 Copyright © Acronis, Inc., 2000-2010 Plans and tasks Displays a list of the plans (both local and centralized) and tasks existing on the select
313 Copyright © Acronis, Inc., 2000-2010 recovery task (from the disk backup): The target volume will be deleted and its space unallocated – you
314 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos
315 Copyright © Acronis, Inc., 2000-2010 This opens Log view with pre-filtered log entries of the selected group. Remove machine from a group. Clic
316 Copyright © Acronis, Inc., 2000-2010 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that ar
317 Copyright © Acronis, Inc., 2000-2010 Refresh a list of groups Click Refresh. The management console will update the list of groups from the m
318 Copyright © Acronis, Inc., 2000-2010 IP range: 192.168.17.0 - 192.168.17.55 will add to the same group all the machines whose operating syst
319 Copyright © Acronis, Inc., 2000-2010 when the machine was initially added to the management server. Otherwise, the machine will not be added to
32 Copyright © Acronis, Inc., 2000-2010 Members of the Administrators group also can: View and manage backup plans and tasks owned by any user o
320 Copyright © Acronis, Inc., 2000-2010 To Do View details of a policy Click View details. In the Policy details (p. 302) window, examine all in
321 Copyright © Acronis, Inc., 2000-2010 Adding a virtual machine as a physical machine Install Acronis Backup & Recovery 10 Agent for Windows
322 Copyright © Acronis, Inc., 2000-2010 7.1.4.1 Virtual machines on a management server Availability of virtual machines Virtual machines are dis
323 Copyright © Acronis, Inc., 2000-2010 7.1.4.2 VMware vCenter integration If you are using VMware vSphere, it is recommended that you integrate
324 Copyright © Acronis, Inc., 2000-2010 For a vCenter Server, a list of ESX/ESXi hosts and clusters obtained from the vCenter Server will be displ
325 Copyright © Acronis, Inc., 2000-2010 To be able to deduplicate backups, an agent needs a separately sold license for deduplication. If you have
326 Copyright © Acronis, Inc., 2000-2010 Creating a cluster of servers that already have agents It is recommended that you remove Agents for ESX/ES
327 Copyright © Acronis, Inc., 2000-2010 7.1.5.1 Actions on storage nodes All the operations described here, are performed by clicking the corresp
328 Copyright © Acronis, Inc., 2000-2010 storage nodes The management console will update the list of storage nodes from the management server with
329 Copyright © Acronis, Inc., 2000-2010 Archives - the total number of archives stored in all the vaults managed by the storage node Backups
33 Copyright © Acronis, Inc., 2000-2010 Manual start You can skip the Plan's (Task) credentials step. Every time you start the task, the task
330 Copyright © Acronis, Inc., 2000-2010 View a task's log Click View log. The Log (p. 331) view will display a list of the log entries rel
331 Copyright © Acronis, Inc., 2000-2010 Refresh tasks table Click Refresh. The management console will update the list of tasks existing on the
332 Copyright © Acronis, Inc., 2000-2010 personal vaults, executing a recovery task, will generate events logged in the local event log. Physically
333 Copyright © Acronis, Inc., 2000-2010 To Do Select a single log entry Click on it. Select multiple log entries non-contiguous: hold down CTRL
334 Copyright © Acronis, Inc., 2000-2010 Filter log entries by the original backup plan or managed entity type Under the Backup plan (or Managed en
335 Copyright © Acronis, Inc., 2000-2010 ---------------------------Log Entry Details--------------------------- Type: Infor
336 Copyright © Acronis, Inc., 2000-2010 the tables. You can export the report to an XML file and open it later using Microsoft Excel or Microsoft
337 Copyright © Acronis, Inc., 2000-2010 Schedule: The types of the backup policies' schedules—Manual and/or Scheduled. Manual schedule mea
338 Copyright © Acronis, Inc., 2000-2010 Filters Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter cr
339 Copyright © Acronis, Inc., 2000-2010 Report view Under Report view, choose how the report will look: Select whether to show all items in a s
34 Copyright © Acronis, Inc., 2000-2010 you need to roll back the system to its initial state this initial state does not change often, so th
340 Copyright © Acronis, Inc., 2000-2010 Backup policies (centralized tasks only): The backup policies on which the tasks are based. The default
341 Copyright © Acronis, Inc., 2000-2010 By using the graphical user interface (GUI) By modifying the Windows registry In Linux, instead of u
342 Copyright © Acronis, Inc., 2000-2010 http://msdn2.microsoft.com/en-us/library/aa374177.aspx 7.2.1.2 Acronis Backup & Recovery 10 Storag
343 Copyright © Acronis, Inc., 2000-2010 In this case, the component's connection to the storage node will fail. If the component is an Acroni
344 Copyright © Acronis, Inc., 2000-2010 When the amount of free space in a vault is equal to the value in Vault Free Space Error Limit or less, an
345 Copyright © Acronis, Inc., 2000-2010 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), o
346 Copyright © Acronis, Inc., 2000-2010 Trace Level Description: Specifies the minimum level of severity of events for sending SNMP notifications
347 Copyright © Acronis, Inc., 2000-2010 Each worker performs synchronization for exactly one machine at a time. A connected machine to be synchron
348 Copyright © Acronis, Inc., 2000-2010 When connecting to a registered machine, Acronis Backup & Recovery 10 Management Server first uses the
349 Copyright © Acronis, Inc., 2000-2010 Snapshot Storage Absolute Size Description: Specifies the initial size of the snapshot storage, in megabyt
35 Copyright © Acronis, Inc., 2000-2010 Recovery time Minimal Medium Maximal 2.5 GFS backup scheme This section covers implementation of the Gra
350 Copyright © Acronis, Inc., 2000-2010 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue working with full
351 Copyright © Acronis, Inc., 2000-2010 Default value: 4 (only errors and critical errors will be recorded—if Trace State is set to True) SNMP Spe
352 Copyright © Acronis, Inc., 2000-2010 You can specify a local folder on any volume, including a volume you are backing up. Snapshot Storage Abso
353 Copyright © Acronis, Inc., 2000-2010 The component will use the default settings, which is to use encryption if possible and to trust self-sign
354 Copyright © Acronis, Inc., 2000-2010 Disabled Encryption is disabled; any connection to a client application which requires encryption will not
355 Copyright © Acronis, Inc., 2000-2010 File Trace Minimal Level Description: Specifies the minimum severity level of events to be recorded in the
356 Copyright © Acronis, Inc., 2000-2010 7.2.3 Parameters set through Windows registry The following are the parameters of Acronis Backup & Re
357 Copyright © Acronis, Inc., 2000-2010 Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabase
358 Copyright © Acronis, Inc., 2000-2010 Exclusions (p. 365) [Optional] Set up exclusions for the specific types of files you do not wish to back u
359 Copyright © Acronis, Inc., 2000-2010 By setting up regular conversion, you obtain a copy of your server or workstation on a virtual machine whi
36 Copyright © Acronis, Inc., 2000-2010 Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day of the we
360 Copyright © Acronis, Inc., 2000-2010 2. Click OK. To learn more about Acronis service credentials, see the Rights for Acronis services (p. 81)
361 Copyright © Acronis, Inc., 2000-2010 Boot volume Type or select: [BOOT] Refers to the registered machine's boot volume. The boot volume co
362 Copyright © Acronis, Inc., 2000-2010 Linux A volume backup stores all files and folders of the selected volume independent of their attributes,
363 Copyright © Acronis, Inc., 2000-2010 In general, the standard name for a Linux partition consists of three components: Disk type; hd for IDE
364 Copyright © Acronis, Inc., 2000-2010 Windows Full path Point to the folders and files to be backed up. If you specified a path to a file or fol
365 Copyright © Acronis, Inc., 2000-2010 Linux To include In the Files and folders column, type or select: Text file file.txt on the volume /dev/hd
366 Copyright © Acronis, Inc., 2000-2010 Exclude all system files and folders This option is effective only for file systems that are supported
367 Copyright © Acronis, Inc., 2000-2010 1. Selecting the archives destination Choose where to store machines' archives: Store all machines
368 Copyright © Acronis, Inc., 2000-2010 FINDEPT2_SYSTEM_BACKUP_Archive1 FINDEPT3_SYSTEM_BACKUP_Archive1 2. Click OK. The name looks like ArchiveN
369 Copyright © Acronis, Inc., 2000-2010 backup levels, you automatically obtain the rollback period – the guaranteed number of sessions that you c
37 Copyright © Acronis, Inc., 2000-2010 backups’ retention period cannot be less than the weekly backups’ retention period. It is usually set sever
370 Copyright © Acronis, Inc., 2000-2010 Custom retention periods for backups of each type Description Let us suppose that we want to set up a b
371 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in ho
372 Copyright © Acronis, Inc., 2000-2010 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, you may set
373 Copyright © Acronis, Inc., 2000-2010 Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and monthly backups
374 Copyright © Acronis, Inc., 2000-2010 Recur: Every 1 day Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14
375 Copyright © Acronis, Inc., 2000-2010 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Sin
376 Copyright © Acronis, Inc., 2000-2010 The archive will be cleaned up only during backup and only if there is not enough space to create a new ba
377 Copyright © Acronis, Inc., 2000-2010 Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-y
378 Copyright © Acronis, Inc., 2000-2010 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil
379 Copyright © Acronis, Inc., 2000-2010 8 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online ser
38 Copyright © Acronis, Inc., 2000-2010 The resulting archive: real In reality, the archive content will somewhat differ from the ideal scheme. Whe
380 Copyright © Acronis, Inc., 2000-2010 8.1.2 What data can I back up and recover? You can back up files, volumes, disks, or the entire physical
381 Copyright © Acronis, Inc., 2000-2010 Host-based backup is available only for paid licenses of VMware ESXi. Choose the below approach if your ES
382 Copyright © Acronis, Inc., 2000-2010 8.1.6.4 What if a network connection is lost during online backup or recovery? The software will try to r
383 Copyright © Acronis, Inc., 2000-2010 The hard disk drive is sent back to you but it is not possible to recover from it. However, recovery from
384 Copyright © Acronis, Inc., 2000-2010 8.1.7.8 How to perform initial seeding? 1. Decide on the media (p. 383) that you will send. 2. Attach
385 Copyright © Acronis, Inc., 2000-2010 Step 1 Delicately remove your hard disk drive from the machine. Step 2 Place the hard drive into an anti-
386 Copyright © Acronis, Inc., 2000-2010 Step 4 Choose the transport company that you will use for shipping. On this company's web site, prepa
387 Copyright © Acronis, Inc., 2000-2010 An order was created – The first backup is about to start and the license cannot be used for any other
388 Copyright © Acronis, Inc., 2000-2010 Once you order Large Scale Recovery for a particular machine, Acronis sends you a USB hard disk drive with
389 Copyright © Acronis, Inc., 2000-2010 can cancel the order if something goes wrong. This will return the license to the pool of available licens
39 Copyright © Acronis, Inc., 2000-2010 2.6 Tower of Hanoi backup scheme The need to have frequent backups always conflicts with the cost of keepi
390 Copyright © Acronis, Inc., 2000-2010 If you purchased your subscriptions online using the Acronis Web site, they are available immediately on y
391 Copyright © Acronis, Inc., 2000-2010 What does "Auto-renew" mean? Auto-renewal means that when the current subscription expires, the
392 Copyright © Acronis, Inc., 2000-2010 Windows Server 2008 R2 - the Standard, Enterprise, Small Business Server, Datacenter, Foundation editio
393 Copyright © Acronis, Inc., 2000-2010 As soon as a subscription is activated, its subscription period starts. To avoid losing subscription ti
394 Copyright © Acronis, Inc., 2000-2010 Depending on your settings, this backup will be either full or incremental. But its size is not likely to
395 Copyright © Acronis, Inc., 2000-2010 To configure proxy settings for an agent 1. Connect the console to the machine for which you want to conf
396 Copyright © Acronis, Inc., 2000-2010 Dual destination (p. 116) By using the Backup performance > Network connection speed option, you can
397 Copyright © Acronis, Inc., 2000-2010 Reassign a subscription Assign a subscription that is already activated, to a different machine. Registrat
398 Copyright © Acronis, Inc., 2000-2010 9 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
399 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup
2.14.4 Policies on machines and groups ...
40 Copyright © Acronis, Inc., 2000-2010 Tower of Hanoi by Acronis The Tower of Hanoi backup scheme is generally too complex to mentally calculate t
400 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 399), such as pre/post backup commands,
401 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 399) installed on the machine finds data items using the selection rule
402 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre
403 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 399) from a backup archive (p. 399) in order to get rid of outdated backups o
404 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 407) using the direc
405 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/
406 Copyright © Acronis, Inc., 2000-2010 the administrator changes the criteria so that the machine does not meet them anymore. There is no way
407 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 399) containing all data chosen for backup. You do not need acc
408 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 402) managed by a storage node (p. 409). Archives (p. 399) in a mana
409 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 400). Policy See Backup policy (p. 400). R Recovery point Date and time to whic
41 Copyright © Acronis, Inc., 2000-2010 For information about using Tower of Hanoi for tape libraries, see Using the Tower of Hanoi tape rotation s
410 Copyright © Acronis, Inc., 2000-2010 prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
411 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog
412 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 407) is considered vi
42 Copyright © Acronis, Inc., 2000-2010 There is a certain risk that all but one backup will be deleted if the maximum archive size is set improper
43 Copyright © Acronis, Inc., 2000-2010 Retain the backup until all dependent backups become subject to deletion The outdated backup will be kep
44 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, with minor limitations, basic
45 Copyright © Acronis, Inc., 2000-2010 Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynamic
46 Copyright © Acronis, Inc., 2000-2010 Backup (GUI) In Acronis Backup & Recovery 10 GUI, logical volumes appear under Dynamic & GPT Volume
47 Copyright © Acronis, Inc., 2000-2010 When recovering MD devices under bootable media, the structure of MD devices can be automatically created i
48 Copyright © Acronis, Inc., 2000-2010 Num Partition Flags Start Size Type ---- -------------------- ----------- ----
49 Copyright © Acronis, Inc., 2000-2010 2.11 Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tape
5.7 Conditions ...179 5.
50 Copyright © Acronis, Inc., 2000-2010 Backup to a locally attached tape device When creating a backup plan, you are able to select the locally at
51 Copyright © Acronis, Inc., 2000-2010 The value may be "Information", "Warning", 'Error" and "Unknown". &
52 Copyright © Acronis, Inc., 2000-2010 Should the disk experience a physical failure, the zone and the archives located there will be lost. That&a
53 Copyright © Acronis, Inc., 2000-2010 to start the bootable rescue utility. This feature has the trade name "Acronis Startup Recovery Manage
54 Copyright © Acronis, Inc., 2000-2010 The Universal Restore technology provides an efficient solution for hardware-independent system recovery by
55 Copyright © Acronis, Inc., 2000-2010 Getting Universal Restore Universal Restore comes free with Acronis Backup & Recovery 10 Advanced Serv
56 Copyright © Acronis, Inc., 2000-2010 multimedia files. Some of these storage volumes can be extremely large as compared to the system and so pra
57 Copyright © Acronis, Inc., 2000-2010 2.14.1 Basic concepts Applying backup policies and tracking their execution To protect data on a single ma
58 Copyright © Acronis, Inc., 2000-2010 More than one storage node, each managing a number of vaults, can be set up and controlled centrally from t
59 Copyright © Acronis, Inc., 2000-2010 When installing the agents, register each of the machines on the management server. To do so, enter the ser
6.7.1 Task credentials ...
60 Copyright © Acronis, Inc., 2000-2010 2. Create a static group named, say, S_1. Add all the servers to this group. (A storage node can be added
61 Copyright © Acronis, Inc., 2000-2010 2.14.2.3 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the
62 Copyright © Acronis, Inc., 2000-2010 IP address range. Multiple criteria can be specified for a dynamic group. For example, a set of criteria
63 Copyright © Acronis, Inc., 2000-2010 3, 4, 5, 6 - the salesmen's machines (Windows XP) from the "Sales department" AD organizatio
64 Copyright © Acronis, Inc., 2000-2010 edit a group, that is: change the group name change the group description change the dynamic m
65 Copyright © Acronis, Inc., 2000-2010 2.14.4.1 A policy on a machine or a group In the diagrams below, each numbered scheme illustrates the res
66 Copyright © Acronis, Inc., 2000-2010 2.14.4.2 Operations with a machine This section is a simplified illustration of what happens with the poli
67 Copyright © Acronis, Inc., 2000-2010 2.14.4.3 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine c
68 Copyright © Acronis, Inc., 2000-2010 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited
69 Copyright © Acronis, Inc., 2000-2010 another policy. In this case, the first policy's state on the machine will be Revoking and the second
8.1.1 What is Acronis Backup & Recovery 10 Online? ... 379
70 Copyright © Acronis, Inc., 2000-2010 The policy gets the Warning status on Windows machines that have either a D: or F: volume, unless an event
71 Copyright © Acronis, Inc., 2000-2010 This status is defined as the most severe status of the policy on the machines included in the group and it
72 Copyright © Acronis, Inc., 2000-2010 Deduplication at source Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agen
73 Copyright © Acronis, Inc., 2000-2010 Deduplication at target After backup to a deduplicating vault is completed, the storage node runs the index
74 Copyright © Acronis, Inc., 2000-2010 The deduplicated items that have changed are not identical anymore and therefore will not be deduplicate
75 Copyright © Acronis, Inc., 2000-2010 Similarly, in case of three machines, the ratio becomes 1.5:1; for four machines, it is 1.6:1. It approache
76 Copyright © Acronis, Inc., 2000-2010 2.14.7 Privileges for centralized management This section describes the users' privileges that are re
77 Copyright © Acronis, Inc., 2000-2010 2. Click Manage this machine. To allow a non-root user to start the console As a root user, add the nam
78 Copyright © Acronis, Inc., 2000-2010 Remote connection as a non-root user Since accessing the system as the root user should be restricted, the
79 Copyright © Acronis, Inc., 2000-2010 2.14.7.5 Acronis security groups On a machine running Windows, Acronis security groups determine who can m
8 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
80 Copyright © Acronis, Inc., 2000-2010 Tip: To ensure proper group names, you should install Acronis components in a domain controller after you h
81 Copyright © Acronis, Inc., 2000-2010 For users whom you want to act as storage node administrators, add their accounts to the Administrators
82 Copyright © Acronis, Inc., 2000-2010 If you choose to specify an existing user account for the management server service, this account will be a
83 Copyright © Acronis, Inc., 2000-2010 2.14.8.2 Client and server applications There are two stakeholders of the secure communication process:
84 Copyright © Acronis, Inc., 2000-2010 4. For the new communication settings to take effect, restart all running Acronis components—preferably, b
85 Copyright © Acronis, Inc., 2000-2010 Authentication parameters Selecting the Trust self-signed certificates check box allows the client to conne
86 Copyright © Acronis, Inc., 2000-2010 The use of SSL certificates is enabled. The server will use SSL certificates if their use is enabled on the
87 Copyright © Acronis, Inc., 2000-2010 Self-signed certificates, such as certificates automatically generated during the installation of an Acr
88 Copyright © Acronis, Inc., 2000-2010 4. Restart Windows, or restart the running Acronis services. Non-self-signed certificates You have the opt
89 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
9 Copyright © Acronis, Inc., 2000-2010 Controlling user rights to perform operations and access backups Running services with minimal user rights R
90 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
91 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
92 Copyright © Acronis, Inc., 2000-2010 This parameter can also be set by using Acronis Administrative Template (p. 344). 3.2.3 Event tracing You
93 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser
94 Copyright © Acronis, Inc., 2000-2010 3.2.6.1 VMware vCenter integration This option defines whether to show virtual machines managed by a VMwar
95 Copyright © Acronis, Inc., 2000-2010 Note: Acronis Backup & Recovery 10 Online supports only HTTP and HTTPS proxy servers. Proxy settings fo
96 Copyright © Acronis, Inc., 2000-2010 3.3.2 Event tracing It is possible to duplicate log events generated by the agent(s), operating on the man
97 Copyright © Acronis, Inc., 2000-2010 You can override the settings set here, exclusively for the events that occur during backup or during recov
98 Copyright © Acronis, Inc., 2000-2010 /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd.conf - conf
99 Copyright © Acronis, Inc., 2000-2010 If you choose Yes, I want to participate in the ACEP, information about the hardware configuration, the mos
Comentários a estes Manuais