User's Guide Acronis® Backup & Recovery ™ 10 Advanced Server
10 Copyright © Acronis, Inc., 2000-2009 • Using deduplication 1. Install Acronis Backup & Recovery 10 Storage Node (p. 21) and add it to t
100 Copyright © Acronis, Inc., 2000-2009 The option defines whether the agent(s) operating on the managed machine have to send the log events to th
Copyright © Acronis, Inc., 2000-2009 101 5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operat
102 Copyright © Acronis, Inc., 2000-2009 • The backup destination (networked location or local disk) • The backup scheme (Back up now or using th
Copyright © Acronis, Inc., 2000-2009 103 Error handling (p. 118): Do not show messages and dialogs while processing (silent mode) + + + + + +
104 Copyright © Acronis, Inc., 2000-2009 3.4.1.1. Archive protection This option is effective for Windows and Linux operating systems and bootable
Copyright © Acronis, Inc., 2000-2009 105 • Exclude all system files and folders Select this check box to skip files and folders with the System at
106 Copyright © Acronis, Inc., 2000-2009 The program does not support interactive commands, i.e. commands that require user input (for example, &qu
Copyright © Acronis, Inc., 2000-2009 107 Post-backup command To specify a command/executable file to be executed after the backup is completed 1.
108 Copyright © Acronis, Inc., 2000-2009 o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture c
Copyright © Acronis, Inc., 2000-2009 109 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do n
Copyright © Acronis, Inc., 2000-2009 11 Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace
110 Copyright © Acronis, Inc., 2000-2009 The option determines whether to take snapshots of multiple volumes at the same time or one by one. The p
Copyright © Acronis, Inc., 2000-2009 111 3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable
112 Copyright © Acronis, Inc., 2000-2009 • Normal – to run the backup process with normal speed, allocating resources on a par with other processe
Copyright © Acronis, Inc., 2000-2009 113 3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about ba
114 Copyright © Acronis, Inc., 2000-2009 • Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct.
Copyright © Acronis, Inc., 2000-2009 115 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one
116 Copyright © Acronis, Inc., 2000-2009 • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP man
Copyright © Acronis, Inc., 2000-2009 117 to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since
118 Copyright © Acronis, Inc., 2000-2009 Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is t
Copyright © Acronis, Inc., 2000-2009 119 the data will be backed up and you will be able to mount the resulting disk backup and extract valid files
12 Copyright © Acronis, Inc., 2000-2009 Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on wheth
120 Copyright © Acronis, Inc., 2000-2009 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
Copyright © Acronis, Inc., 2000-2009 121 The program will try to execute the failed task again if you select the Restart a failed task check box an
122 Copyright © Acronis, Inc., 2000-2009 If the console is connected to the management server The Use a separate tape set option has more precise d
Copyright © Acronis, Inc., 2000-2009 123 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you
124 Copyright © Acronis, Inc., 2000-2009 When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup pro
Copyright © Acronis, Inc., 2000-2009 125 3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is
126 Copyright © Acronis, Inc., 2000-2009 Validate backup archive before recovery + + + + + + Check file system after recovery + - + - + -
Copyright © Acronis, Inc., 2000-2009 127 Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1.
128 Copyright © Acronis, Inc., 2000-2009 3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This op
Copyright © Acronis, Inc., 2000-2009 129 To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notificati
Copyright © Acronis, Inc., 2000-2009 13 the history of operations logged in the local logs of the registered machines and the storage nodes. Shortc
130 Copyright © Acronis, Inc., 2000-2009 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the se
Copyright © Acronis, Inc., 2000-2009 131 This option is not available when operating under the bootable media. The option defines whether the agent
132 Copyright © Acronis, Inc., 2000-2009 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se
Copyright © Acronis, Inc., 2000-2009 133 The preset is Disabled. This option enables booting the machine into the recovered operating system withou
Copyright © Acronis, Inc., 2000-2009 134 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault
Copyright © Acronis, Inc., 2000-2009 135 A vault is called personal if it was created using direct connection of the console to a managed machine.
136 Copyright © Acronis, Inc., 2000-2009 Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the mach
Copyright © Acronis, Inc., 2000-2009 137 • [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contain
138 Copyright © Acronis, Inc., 2000-2009 password (if the vault is encrypted) and information in the Comments field. • The Edit unmanaged vault pa
Copyright © Acronis, Inc., 2000-2009 139 4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the followin
14 Copyright © Acronis, Inc., 2000-2009 Actions Contains a list of common operations that can be performed on a managed machine or on a management
140 Copyright © Acronis, Inc., 2000-2009 o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o
Copyright © Acronis, Inc., 2000-2009 141 o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm w
142 Copyright © Acronis, Inc., 2000-2009 To create a new folder for the vault, click Create folder. A vault can be created in an empty folder onl
Copyright © Acronis, Inc., 2000-2009 143 4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acroni
144 Copyright © Acronis, Inc., 2000-2009 If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by sof
Copyright © Acronis, Inc., 2000-2009 145 If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to
146 Copyright © Acronis, Inc., 2000-2009 Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted,
Copyright © Acronis, Inc., 2000-2009 147 At the Delete operation, the vault content will be deleted from the storage node database without accessin
148 Copyright © Acronis, Inc., 2000-2009 The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction w
Copyright © Acronis, Inc., 2000-2009 149 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage
Copyright © Acronis, Inc., 2000-2009 15 The management console "remembers" the way the panes' borders are set. When you run the mana
150 Copyright © Acronis, Inc., 2000-2009 Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the
Copyright © Acronis, Inc., 2000-2009 151 • Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape,
152 Copyright © Acronis, Inc., 2000-2009 Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes
Copyright © Acronis, Inc., 2000-2009 153 • the full size of the data to protect is approximately 320 GB • the approximate size of daily changes o
154 Copyright © Acronis, Inc., 2000-2009 • GFS Example 3 (p. 158). The Use a separate tape set option is selected. All the Always use a free tape
Copyright © Acronis, Inc., 2000-2009 155 • four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of
156 Copyright © Acronis, Inc., 2000-2009 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the
Copyright © Acronis, Inc., 2000-2009 157 GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set opti
158 Copyright © Acronis, Inc., 2000-2009 As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the sec
Copyright © Acronis, Inc., 2000-2009 159 These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of
16 Copyright © Acronis, Inc., 2000-2009 o By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane); o By
160 Copyright © Acronis, Inc., 2000-2009 go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it
Copyright © Acronis, Inc., 2000-2009 161 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac
162 Copyright © Acronis, Inc., 2000-2009 The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options.
Copyright © Acronis, Inc., 2000-2009 163 The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the
164 Copyright © Acronis, Inc., 2000-2009 • tape rotation scheme ( frequency of backups, retention rules) • tape-append options • requirements to
Copyright © Acronis, Inc., 2000-2009 165 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compress
166 Copyright © Acronis, Inc., 2000-2009 • What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis age
Copyright © Acronis, Inc., 2000-2009 167 name. If you accidentally delete the .meta folder, it will be automatically recreated next time you access
168 Copyright © Acronis, Inc., 2000-2009 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplic
Copyright © Acronis, Inc., 2000-2009 169 4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the
Copyright © Acronis, Inc., 2000-2009 17 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages
170 Copyright © Acronis, Inc., 2000-2009 All the operations described below are performed by clicking the corresponding buttons on the toolbar. The
Copyright © Acronis, Inc., 2000-2009 171 Recover a disk/volume as a virtual machine Right-click the disk backup, then select Recover as virtual mac
172 Copyright © Acronis, Inc., 2000-2009 There should be enough space in the vault for temporary files created during consolidation. Backups result
Copyright © Acronis, Inc., 2000-2009 173 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
174 Copyright © Acronis, Inc., 2000-2009 The specified period of time has passed since the last successful backup completed + + The scheduler beha
Copyright © Acronis, Inc., 2000-2009 175 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters a
176 Copyright © Acronis, Inc., 2000-2009 The obvious way is to add five simple schedules. If you spend one minute for examination, you can think ou
Copyright © Acronis, Inc., 2000-2009 177 Advanced scheduling settings (p. 183) are available only for machines registered on Acronis Backup & R
178 Copyright © Acronis, Inc., 2000-2009 Several weekly schedules for one task In the case when the task needs to be run on different days of the w
Copyright © Acronis, Inc., 2000-2009 179 5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a
18 Copyright © Acronis, Inc., 2000-2009 Console The console provides Graphical User Interface and remote connection to the agents and other Acronis
180 Copyright © Acronis, Inc., 2000-2009 This schedule is widely used when creating a custom backup scheme. The "Last day of every month"
Copyright © Acronis, Inc., 2000-2009 181 2. On: <All> <All workdays>. 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Ef
182 Copyright © Acronis, Inc., 2000-2009 Examples "Bad block" emergency backup One or more bad blocks that have suddenly appeared on a ha
Copyright © Acronis, Inc., 2000-2009 183 To view properties of an event, including the event source and event number 1. In Event Viewer, click the
184 Copyright © Acronis, Inc., 2000-2009 Run the task: Daily Once at: 09:00:00 AM Distribute start time within the time window Maximum delay: 1 Hou
Copyright © Acronis, Inc., 2000-2009 185 The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is not m
186 Copyright © Acronis, Inc., 2000-2009 (2) If the user becomes idle between 9PM and 11PM, the backup task will start immediately after the user b
Copyright © Acronis, Inc., 2000-2009 187 As a result, (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start imme
188 Copyright © Acronis, Inc., 2000-2009 5.6.5. Time since last backup Applies to: Windows, Linux Enables to put a backup task run on hold until
Copyright © Acronis, Inc., 2000-2009 189 6. Direct management This section covers operations that can be performed directly on a managed machine b
Copyright © Acronis, Inc., 2000-2009 19 1.3.1.2. Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Ac
190 Copyright © Acronis, Inc., 2000-2009 server and run Acronis License Server to manage licenses. Please make sure you have a valid license on Acr
Copyright © Acronis, Inc., 2000-2009 191 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared i
192 Copyright © Acronis, Inc., 2000-2009 unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 198)
Copyright © Acronis, Inc., 2000-2009 193 Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup pl
194 Copyright © Acronis, Inc., 2000-2009 Need interaction Any running task can put itself into the Need interaction state when it needs human inter
Copyright © Acronis, Inc., 2000-2009 195 • Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last
196 Copyright © Acronis, Inc., 2000-2009 Run a plan/task Click Backup plan Run. In the Run Backup Plan (p. 199) window, select the task you need t
Copyright © Acronis, Inc., 2000-2009 197 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.
198 Copyright © Acronis, Inc., 2000-2009 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'
Copyright © Acronis, Inc., 2000-2009 199 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2009 1.3.4.1. Management Server Acronis Backup & Recovery 10 Management Server is the central server that d
200 Copyright © Acronis, Inc., 2000-2009 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover
Copyright © Acronis, Inc., 2000-2009 201 Settings The Settings tab displays information on scheduling and the options changed against the default
202 Copyright © Acronis, Inc., 2000-2009 • Archive name - name of the archive. • Archive comments - comments on the archive (if provided). Settin
Copyright © Acronis, Inc., 2000-2009 203 To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CTR
204 Copyright © Acronis, Inc., 2000-2009 Filter log entries by task, managed entity, machine, code, owner Type the required value (task name, machi
Copyright © Acronis, Inc., 2000-2009 205 6.2. Creating a backup plan Before creating your first backup plan (p. 383), please familiarize yourself
206 Copyright © Acronis, Inc., 2000-2009 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view
Copyright © Acronis, Inc., 2000-2009 207 Host (p. 223) Specify the machine that will perform the conversion. The machine has to have Acronis Back
208 Copyright © Acronis, Inc., 2000-2009 To learn more about operations available depending on the user privileges, see the Users' privileges
Copyright © Acronis, Inc., 2000-2009 209 What does a disk or volume backup store? For supported file systems, with the sector-by-sector option turn
Copyright © Acronis, Inc., 2000-2009 21 1.3.4.2. Storage Node Acronis Backup & Recovery 10 Storage Node is a server aimed to optimize usage of
210 Copyright © Acronis, Inc., 2000-2009 The program will access the source data using the credentials you specify. Use this option if the plan&apo
Copyright © Acronis, Inc., 2000-2009 211 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the de
212 Copyright © Acronis, Inc., 2000-2009 Backing up to an existing archive You can configure the backup plan to back up to an existing archive. To
Copyright © Acronis, Inc., 2000-2009 213 6.2.9. Backup schemes Choose one of the available backup schemes: • Back up now – to create a backup ta
214 Copyright © Acronis, Inc., 2000-2009 6.2.9.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up data
Copyright © Acronis, Inc., 2000-2009 215 • Daily ("Son") backups are incremental. Parameters You can set up the following parameters of
216 Copyright © Acronis, Inc., 2000-2009 • Start backup at: 11:00 PM • Back up on: All days • Weekly/monthly: Saturday (for example) • Keep bac
Copyright © Acronis, Inc., 2000-2009 217 • Have a monthly full backup of your files. Moreover, assume that you want to retain access to all backup
218 Copyright © Acronis, Inc., 2000-2009 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p
Copyright © Acronis, Inc., 2000-2009 219 Roll-back period The number of days we can go back in the archive is different on different days. The mini
22 Copyright © Acronis, Inc., 2000-2009 Encryption A managed vault can be configured so that anything written to it is encrypted and anything read
220 Copyright © Acronis, Inc., 2000-2009 6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C
Copyright © Acronis, Inc., 2000-2009 221 backup for some reason. Apply the rules (only if the retention rules are set) Specifies when to apply the
222 Copyright © Acronis, Inc., 2000-2009 Incremental: Schedule: Weekly, every workday, at 7:00 PM Differential: Schedule: Weekly, every Saturday, a
Copyright © Acronis, Inc., 2000-2009 223 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks
224 Copyright © Acronis, Inc., 2000-2009 Take into account the following considerations. Which agent is installed on the host? The resulting virtua
Copyright © Acronis, Inc., 2000-2009 225 6.3. Recovering data When it comes to data recovery, first consider the most functional method: connect th
226 Copyright © Acronis, Inc., 2000-2009 Data type (p. 228) Applies to: disk recovery Choose the type of data you need to recover from the selected
Copyright © Acronis, Inc., 2000-2009 227 Automatic drivers search Specify where the program should search for HAL, mass storage and network adapt
228 Copyright © Acronis, Inc., 2000-2009 To learn more about operations available depending on the user privileges, see the User privileges on a ma
Copyright © Acronis, Inc., 2000-2009 229 6.3.4. Content selection The representation of this window depends on the type of data stored in the arch
Copyright © Acronis, Inc., 2000-2009 23 1.4. Supported operating systems Acronis License Server • Windows 2000 Professional SP4/XP Professional SP
230 Copyright © Acronis, Inc., 2000-2009 To specify credentials 1. Select one of the following: o Use the task credentials The program will acces
Copyright © Acronis, Inc., 2000-2009 231 Existing virtual machine Available when the Acronis Backup & Recovery 10 Agent for Hyper-V or Agent fo
232 Copyright © Acronis, Inc., 2000-2009 o Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk. I
Copyright © Acronis, Inc., 2000-2009 233 Select the way the disk's signature contained in the MBR will be handled. The disk signature is used
234 Copyright © Acronis, Inc., 2000-2009 Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and
Copyright © Acronis, Inc., 2000-2009 235 To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the
236 Copyright © Acronis, Inc., 2000-2009 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of
Copyright © Acronis, Inc., 2000-2009 237 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.
238 Copyright © Acronis, Inc., 2000-2009 • Password. The password for the account. 2. Click OK. 6.3.8. When to recover Select when to start the
Copyright © Acronis, Inc., 2000-2009 239 - If the drivers are on a vendor's disc or other removable media, turn on the Search removable media.
24 Copyright © Acronis, Inc., 2000-2009 • Various Linux distributions, including: o Red Hat Enterprise Linux 4 and 5 o CentOS 4 and 5 o Fedora
240 Copyright © Acronis, Inc., 2000-2009 XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMware Workstation
Copyright © Acronis, Inc., 2000-2009 241 6.3.11. Bootability troubleshooting If a system was bootable at the time of backup, you expect that it wi
242 Copyright © Acronis, Inc., 2000-2009 • The system loader points to the wrong volume This may happen when system or boot volumes are not recov
Copyright © Acronis, Inc., 2000-2009 243 The lines starting with title, root, kernel, and initrd respectively determine: o The title of the menu i
244 Copyright © Acronis, Inc., 2000-2009 multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin
Copyright © Acronis, Inc., 2000-2009 245 • Recover the files as two or more groups. For example, if the problem occurs when recovering 1 million f
246 Copyright © Acronis, Inc., 2000-2009 Note: All vaults managed by the storage node will also be removed from the management server. No archives
Copyright © Acronis, Inc., 2000-2009 247 What to validate Validate Choose an object to validate: Archive (p. 248) - in that case, you need to speci
248 Copyright © Acronis, Inc., 2000-2009 6.4.2. Archive selection Selecting the archive 1. Enter the full path to the location in the Path field,
Copyright © Acronis, Inc., 2000-2009 249 6.4.4. Location selection To select a location Enter the full path to the location in the Path field or s
Copyright © Acronis, Inc., 2000-2009 25 Acronis Backup & Recovery 10 Management Console Item Minimum requirements Recommended Computer proces
250 Copyright © Acronis, Inc., 2000-2009 6.4.6. When to validate As validation is a resource-intensive operation, it makes sense to schedule valid
Copyright © Acronis, Inc., 2000-2009 251 Backup (p. 252) Select the backup. Access credentials (p. 252) [Optional] Provide credentials for the arch
252 Copyright © Acronis, Inc., 2000-2009 While you are reviewing the location content, archives can be added, deleted or modified by another user o
Copyright © Acronis, Inc., 2000-2009 253 o Assign letter (in Windows) - Acronis Backup & Recovery 10 will assign an unused letter to the mount
254 Copyright © Acronis, Inc., 2000-2009 Usage scenarios Export enables you to separate a specific backup from a chain of incremental backups for f
Copyright © Acronis, Inc., 2000-2009 255 Tip. When configuring export to a deduplicating managed vault, choose a machine where the deduplication
256 Copyright © Acronis, Inc., 2000-2009 Where to export Archive (p. 258) Enter the path to the location where the new archive will be created. Be
Copyright © Acronis, Inc., 2000-2009 257 o If the archive is stored on a network share, expand the Network folders group, then select the required
258 Copyright © Acronis, Inc., 2000-2009 The program will access the location using the credentials of the task account specified in the General se
Copyright © Acronis, Inc., 2000-2009 259 • To export data to a locally attached tape device, expand the Tape drives group, then click the require
26 Copyright © Acronis, Inc., 2000-2009 Acronis License Server Item Minimum requirements Recommended System memory 128 MB 256 MB or more Instal
260 Copyright © Acronis, Inc., 2000-2009 • User name. When entering the name of an Active Directory user account, be sure to also specify the doma
Copyright © Acronis, Inc., 2000-2009 261 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.
262 Copyright © Acronis, Inc., 2000-2009 • Acronis Secure Zone is always created at the end of the hard disk. When calculating the final layout of
Copyright © Acronis, Inc., 2000-2009 263 o first, it will use the unallocated space. Volumes will be moved, if necessary, but not resized. Moving
264 Copyright © Acronis, Inc., 2000-2009 you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by pre
Copyright © Acronis, Inc., 2000-2009 265 machines with corrupted or non-supported file systems. The operations can be configured and controlled eit
266 Copyright © Acronis, Inc., 2000-2009 • Windows Vista SP1 and Windows Server 2008 (PE 2.1) If you already have media with PE1.x distribution, u
Copyright © Acronis, Inc., 2000-2009 267 o If not configured, the Acronis loader waits for someone to select whether to boot the operating system
268 Copyright © Acronis, Inc., 2000-2009 vga=ask Prompts for the video mode to be used by the bootable media's graphical user interface. Witho
Copyright © Acronis, Inc., 2000-2009 269 pci=nobios Disables the use of PCI BIOS; only direct hardware access methods will be allowed. You may want
Copyright © Acronis, Inc., 2000-2009 27 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders
270 Copyright © Acronis, Inc., 2000-2009 Example The bootable agent could use one of the network adapters for communication with the management co
Copyright © Acronis, Inc., 2000-2009 271 The drivers can be removed from the list only in groups, by removing INF files. To remove drivers: 1. Sel
272 Copyright © Acronis, Inc., 2000-2009 Adding Acronis Plug-in to WinPE 2.x ISO To add Acronis Plug-in to WinPE 2.x ISO: 1. When adding the plug-
Copyright © Acronis, Inc., 2000-2009 273 If the plug-in is installed in a folder other than the default folder, change the path accordingly (check
274 Copyright © Acronis, Inc., 2000-2009 2. The Linux-style bootable media shows local disks and volumes as unmounted (sda1, sda2...). 3. The Lin
Copyright © Acronis, Inc., 2000-2009 275 2. Click Configure iSCSI/NDAS devices (in a Linux-based media) or Run the iSCSI Setup (in a PE-based
276 Copyright © Acronis, Inc., 2000-2009 cp ln scsi_id dd ls sed df lspci sg_map26 dmesg lvm sh dmraid mc sleep e2fsck mdadm ssh e2labe
Copyright © Acronis, Inc., 2000-2009 277 6.10.5.1. Creating the volume structure automatically Suppose that you saved the volume structure to the
278 Copyright © Acronis, Inc., 2000-2009 To recover MD devices and logical volumes 1. Boot the machine from a Linux-based bootable media. 2. Clic
Copyright © Acronis, Inc., 2000-2009 279 The following picture illustrates this configuration. Do the following to recover data from this archive.
28 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
280 Copyright © Acronis, Inc., 2000-2009 7. Press CTRL+ALT+F1 to return to the management console. Step 2: Starting the recovery 1. In the manage
Copyright © Acronis, Inc., 2000-2009 281 6.10.6. Acronis PXE Server Acronis PXE Server allows for booting machines to Acronis bootable components
282 Copyright © Acronis, Inc., 2000-2009 On a machine that has an operating system on the hard disk, the BIOS must be configured so that the networ
Copyright © Acronis, Inc., 2000-2009 283 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c
284 Copyright © Acronis, Inc., 2000-2009 6.11.3. Choosing the operating system for disk management On a machine with two or more operating systems
Copyright © Acronis, Inc., 2000-2009 285 shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including
286 Copyright © Acronis, Inc., 2000-2009 6.11.5.2. Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It
Copyright © Acronis, Inc., 2000-2009 287 source disk data to the target disk is impossible even with the proportional resizing of the volumes, then
288 Copyright © Acronis, Inc., 2000-2009 4. Click Commit on the toolbar and then click Proceed in the Pending Operations window. 5. Wait until th
Copyright © Acronis, Inc., 2000-2009 289 system, the operating system will stop loading after such conversion or some volumes on the selected GPT d
Copyright © Acronis, Inc., 2000-2009 29 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
290 Copyright © Acronis, Inc., 2000-2009 If you need to convert a dynamic disk to basic: 1. Select the dynamic disk to convert to basic. 2. Right
Copyright © Acronis, Inc., 2000-2009 291 • Offline The offline status means that a disk is accessible in the read-only mode. To bring the selected
292 Copyright © Acronis, Inc., 2000-2009 A volume created from free disk space virtually linked together by the LDM from several physical disks. Up
Copyright © Acronis, Inc., 2000-2009 293 If you want to create a volume: Run the Create volume wizard by selecting Create volume on the Wizards
294 Copyright © Acronis, Inc., 2000-2009 If need be, you will be prompted to add the necessary number of disks to your selection, according to the
Copyright © Acronis, Inc., 2000-2009 295 A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be conve
296 Copyright © Acronis, Inc., 2000-2009 If there is no other active volume in the system, the pending operation of setting active volume will be a
Copyright © Acronis, Inc., 2000-2009 297 If you need to change a volume label: 1. Right-click on the selected volume, and then click Change label.
298 Copyright © Acronis, Inc., 2000-2009 This approach enables you to control all planned operations, double-check the intended changes, and, if ne
Copyright © Acronis, Inc., 2000-2009 299 7. Centralized management This section covers operations that can be performed centrally by using the com
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Backu
30 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
300 Copyright © Acronis, Inc., 2000-2009 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has l
Copyright © Acronis, Inc., 2000-2009 301 Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recover
302 Copyright © Acronis, Inc., 2000-2009 • Use the Information pane's tabs to view detailed information about the selected policy and perfor
Copyright © Acronis, Inc., 2000-2009 303 o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select
304 Copyright © Acronis, Inc., 2000-2009 To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is de
Copyright © Acronis, Inc., 2000-2009 305 The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and
306 Copyright © Acronis, Inc., 2000-2009 Settings The tab displays information about the backup scheme used by the policy and backup options that w
Copyright © Acronis, Inc., 2000-2009 307 The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a
308 Copyright © Acronis, Inc., 2000-2009 7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or i
Copyright © Acronis, Inc., 2000-2009 309 Add a machine to another static group Click Add to another group. In the Add to group (p. 312) window, sp
Copyright © Acronis, Inc., 2000-2009 31 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
310 Copyright © Acronis, Inc., 2000-2009 View tasks existing on a machine Click View tasks. The Tasks (p. 331) view will display a list of the tas
Copyright © Acronis, Inc., 2000-2009 311 To perform registration through a local or remote console-agent connection, you have to be connected with
312 Copyright © Acronis, Inc., 2000-2009 A registered machine has to be specified by its registration address, that is, you need to provide exactly
Copyright © Acronis, Inc., 2000-2009 313 The machine being added becomes a member of more than one group. As a result, the backup policies applied
314 Copyright © Acronis, Inc., 2000-2009 o Online - the machine is available for the management server. This means that the management server&ap
Copyright © Acronis, Inc., 2000-2009 315 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the
316 Copyright © Acronis, Inc., 2000-2009 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all
Copyright © Acronis, Inc., 2000-2009 317 Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing
318 Copyright © Acronis, Inc., 2000-2009 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tas
Copyright © Acronis, Inc., 2000-2009 319 Configuring the machines table By default, the table has five columns that are displayed, others are hidde
32 Copyright © Acronis, Inc., 2000-2009 • Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot
320 Copyright © Acronis, Inc., 2000-2009 Refresh a list of groups Click Refresh. The management console will update the list of groups from the ma
Copyright © Acronis, Inc., 2000-2009 321 For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windo
322 Copyright © Acronis, Inc., 2000-2009 Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machine has to be specified
Copyright © Acronis, Inc., 2000-2009 323 • Type - type of the group (static, or dynamic) • Criteria (for dynamic groups only) - grouping criteria
324 Copyright © Acronis, Inc., 2000-2009 7.1.4. Virtual machines You can centrally manage virtual machines using either of the following methods
Copyright © Acronis, Inc., 2000-2009 325 7.1.4.1. Virtual machines on a management server Availability of virtual machines Virtual machines are d
326 Copyright © Acronis, Inc., 2000-2009 • Host/VA Using this criterion, you can create a dynamic group of virtual machines hosted on a specified
Copyright © Acronis, Inc., 2000-2009 327 5. Licenses Click Provide license. When installing the trial product version, select Use the following t
328 Copyright © Acronis, Inc., 2000-2009 The group that has the same name as the vCenter Server will be removed and the policies applied to this gr
Copyright © Acronis, Inc., 2000-2009 329 7.1.5.1. Actions on storage nodes All the operations described here, are performed by clicking the corre
Copyright © Acronis, Inc., 2000-2009 33 Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When c
330 Copyright © Acronis, Inc., 2000-2009 Refresh the list of storage nodes Click Refresh. The management console will update the list of storage n
Copyright © Acronis, Inc., 2000-2009 331 o Withdrawn - the storage node was registered on another management server. As a result, it is not possib
332 Copyright © Acronis, Inc., 2000-2009 or the backup plan will run. View details of a task Click View details. In the Tasks details (p. 199) win
Copyright © Acronis, Inc., 2000-2009 333 • Each storage node has a built-in service task called a compacting task. This task cannot be deleted. Thi
334 Copyright © Acronis, Inc., 2000-2009 Local and centralized logging in Acronis Backup & Recovery 10 Acronis Backup & Recovery 10 has loc
Copyright © Acronis, Inc., 2000-2009 335 7.1.7.1. Actions on log entries All the operations described below are performed by clicking the correspo
336 Copyright © Acronis, Inc., 2000-2009 Filter log entries by type Press or release the following toolbar buttons: to filter error messages to f
Copyright © Acronis, Inc., 2000-2009 337 • Module - Blank or the number of program module where an error was occurred. It is an integer number tha
338 Copyright © Acronis, Inc., 2000-2009 Generating reports To start generating a report, select a report template in the Reports view, and then cl
Copyright © Acronis, Inc., 2000-2009 339 Filters Under Filters, choose which backup policies to include in the report. Only the backup policies th
34 Copyright © Acronis, Inc., 2000-2009 Full backup A full backup stores all data selected for backup. A full backup underlies any archive and form
340 Copyright © Acronis, Inc., 2000-2009 Report view Under Report view, choose how the report will look: • Select whether to show all items in a s
Copyright © Acronis, Inc., 2000-2009 341 • Vaults: The list of centralized managed vaults that store the archives. • Machines: The list of regist
342 Copyright © Acronis, Inc., 2000-2009 7.1.8.7. Report about the task activities In this view, you can generate a report about the tasks that ex
Copyright © Acronis, Inc., 2000-2009 343 To allow active content permanently in Internet Explorer 1. On the Tools menu, click Internet Options, an
344 Copyright © Acronis, Inc., 2000-2009 To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32
Copyright © Acronis, Inc., 2000-2009 345 Possible values: Any integer number between 1 and 2147483647 Default value: 10 Acronis Backup & Recove
346 Copyright © Acronis, Inc., 2000-2009 For example, suppose that two vaults, Vault A and Vault B, are both stored on a disk volume. Suppose furth
Copyright © Acronis, Inc., 2000-2009 347 The database is stored on the storage node in a local folder whose name is specified in Database path when
348 Copyright © Acronis, Inc., 2000-2009 Trace State Description: Specifies whether to record Acronis Backup & Recovery 10 Management Server&ap
Copyright © Acronis, Inc., 2000-2009 349 Synchronization Specifies how Acronis Backup & Recovery 10 Management Server connects to registered ma
Copyright © Acronis, Inc., 2000-2009 35 An incremental or differential backup created after disk defragmentation might be considerably larger than
350 Copyright © Acronis, Inc., 2000-2009 If there are fewer worker threads than normal-priority machines, the actual interval between synchronizati
Copyright © Acronis, Inc., 2000-2009 351 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att
352 Copyright © Acronis, Inc., 2000-2009 Snapshot Storage Relative Size This setting is effective only when the Snapshot Storage Absolute Size se
Copyright © Acronis, Inc., 2000-2009 353 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue working with full
354 Copyright © Acronis, Inc., 2000-2009 Trace Level Description: Specifies the minimum level of severity of events to be recorded into the event l
Copyright © Acronis, Inc., 2000-2009 355 This parameter is used when creating a backup plan. Changes to this parameter do not affect already existi
356 Copyright © Acronis, Inc., 2000-2009 Select one of the following: Not Configured The component will use the default TCP port number 9876. Enabl
Copyright © Acronis, Inc., 2000-2009 357 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S
358 Copyright © Acronis, Inc., 2000-2009 Each event has a level from zero to five based on the event's severity, as shown in the following tab
Copyright © Acronis, Inc., 2000-2009 359 You will find the description of these parameters in the correspondent topic about configuration through t
36 Copyright © Acronis, Inc., 2000-2009 GFS-related settings of the backup plan Start backup at: Back up on: This step creates the total backup sch
360 Copyright © Acronis, Inc., 2000-2009 7.3. Creating a backup policy A backup policy can be applied to both Windows and Linux machines. To create
Copyright © Acronis, Inc., 2000-2009 361 [Optional] Enter comments to the archive. To access this option, select the Advanced view check box. How t
362 Copyright © Acronis, Inc., 2000-2009 Host (p. 223) Specify the machine that will perform the conversion. The machine has to have Acronis Backup
Copyright © Acronis, Inc., 2000-2009 363 7.3.2. Items to back up Specify selection rules for backing up items, selected in the Source type field o
364 Copyright © Acronis, Inc., 2000-2009 All fixed volumes Type or select: [Fixed Volumes] Refers to all volumes other than removable media. Fixe
Copyright © Acronis, Inc., 2000-2009 365 For instance, it is possible to set up a policy to back up volume C: on Windows machines and partition /de
366 Copyright © Acronis, Inc., 2000-2009 To define file selection rules In the first line, select the rule from the list, or type it manually. To a
Copyright © Acronis, Inc., 2000-2009 367 All user profiles existing on a machine [All Profiles Folder] Points to the folder where all user profile
368 Copyright © Acronis, Inc., 2000-2009 • Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden at
Copyright © Acronis, Inc., 2000-2009 369 • Store each machine's archive in the specified folder on the machine Enter the full path to the fol
Copyright © Acronis, Inc., 2000-2009 37 Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays a
370 Copyright © Acronis, Inc., 2000-2009 Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify
Copyright © Acronis, Inc., 2000-2009 371 Backup type Select the type of backup: full, incremental, or differential. If there is no full backup in
372 Copyright © Acronis, Inc., 2000-2009 Feb 26—Mar 4 D D D D W - - Daily backups run every workday except Friday, which is left for weekly a
Copyright © Acronis, Inc., 2000-2009 373 Examples Each day of the past week, each week of the past month Let us consider a GFS backup scheme that m
374 Copyright © Acronis, Inc., 2000-2009 With this scheme, you will have a week to recover a previous version of a damaged file from a daily backup
Copyright © Acronis, Inc., 2000-2009 375 Even though it is possible to use GFS to create such an archive, the Custom scheme is more flexible in thi
376 Copyright © Acronis, Inc., 2000-2009 A cleanup mechanism ensures that only the most recent backups of each level are kept. Here is how the arch
Copyright © Acronis, Inc., 2000-2009 377 On day 14, the interval is five days. It increases on subsequent days before decreasing again, and so on.
378 Copyright © Acronis, Inc., 2000-2009 then delete the last full backup with all dependent incremental/differential backups • If there is only o
Copyright © Acronis, Inc., 2000-2009 379 By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it
38 Copyright © Acronis, Inc., 2000-2009 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
380 Copyright © Acronis, Inc., 2000-2009 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil
Copyright © Acronis, Inc., 2000-2009 381 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
382 Copyright © Acronis, Inc., 2000-2009 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and
Copyright © Acronis, Inc., 2000-2009 383 Backup options Configuration parameters of a backup operation (p. 382), such as pre/post backup commands
384 Copyright © Acronis, Inc., 2000-2009 3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 382) inst
Copyright © Acronis, Inc., 2000-2009 385 A management server has two built-in groups that contain all machines of each type: All physical machines
386 Copyright © Acronis, Inc., 2000-2009 On a machine that is not registered on the management server, a user having the privilege to back up to th
Copyright © Acronis, Inc., 2000-2009 387 Differential backup A differential backup stores changes to the data against the latest full backup (p.
388 Copyright © Acronis, Inc., 2000-2009 and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the
Copyright © Acronis, Inc., 2000-2009 389 • IP address range. A machine remains in a dynamic group as long as the machine meets the group's cr
Copyright © Acronis, Inc., 2000-2009 39 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
390 Copyright © Acronis, Inc., 2000-2009 F Full backup A self-sufficient backup (p. 382) containing all data chosen for backup. You do not need ac
Copyright © Acronis, Inc., 2000-2009 391 Managed vault A centralized vault (p. 385) managed by a storage node (p. 392). Archives (p. 382) in a mana
392 Copyright © Acronis, Inc., 2000-2009 Plan See Backup plan (p. 383). Policy See Backup policy (p. 383). R Recovery point Date and time to whic
Copyright © Acronis, Inc., 2000-2009 393 • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
394 Copyright © Acronis, Inc., 2000-2009 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolo
Copyright © Acronis, Inc., 2000-2009 395 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 390) is considered vi
Index A A policy on a machine or a group • 66 About Windows loaders • 243 Access credentials • 251, 252 Access credentials for archive location • 20
Copyright © Acronis, Inc., 2000-2009 397 Archive validation • 206, 223, 380 At Windows Event Log event • 181 Attaching a managed vault • 138, 142 B
398 Copyright © Acronis, Inc., 2000-2009 Communication between Acronis Backup & Recovery 10 components • 85 Components for centralized manageme
Copyright © Acronis, Inc., 2000-2009 399 Drivers for Universal Restore • 267, 270 Dual destination • 52, 103, 119 Dynamic disk • 44, 381, 387, 388,
3. Options ... 92 3.1. Console option
40 Copyright © Acronis, Inc., 2000-2009 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
400 Copyright © Acronis, Inc., 2000-2009 Inheritance order • 314, 318, 323 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 145, 148,
Copyright © Acronis, Inc., 2000-2009 401 Operations with panes • 14 Options • 92 Organizational unit criterion • 96, 320, 321 Overview • 73, 124, 1
402 Copyright © Acronis, Inc., 2000-2009 Rescan • 138, 146, 147, 148, 149, 165 Result confirmation • 260, 261 Retention rules • 41, 214, 220, 221,
Copyright © Acronis, Inc., 2000-2009 403 Temporarily disabling a backup plan • 169, 199 Time since last backup • 188 Time-based alerts • 93 ToH Exa
404 Copyright © Acronis, Inc., 2000-2009 WinPE (Windows Preinstallation Environment) • 381, 384, 395 Work across subnets • 282 Working under bootab
Copyright © Acronis, Inc., 2000-2009 41 • differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern start
42 Copyright © Acronis, Inc., 2000-2009 to this interval and deletes all backups created before that moment. None of the backups created after this
Copyright © Acronis, Inc., 2000-2009 43 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram be
44 Copyright © Acronis, Inc., 2000-2009 This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you s
Copyright © Acronis, Inc., 2000-2009 45 Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volume
46 Copyright © Acronis, Inc., 2000-2009 o Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume D
Copyright © Acronis, Inc., 2000-2009 47 You can back up data of one or more logical volumes and recover it to a previously created logical volume o
48 Copyright © Acronis, Inc., 2000-2009 3-1 hdd1 Pri,Act 63 1219617 Ext3 3-2 Acronis Secure Zone Pri 12196
Copyright © Acronis, Inc., 2000-2009 49 The system has RAID-1 configured on two basic volumes: sdc1, sdd1. Num Partition Flags St
6.1.1. Dashboard ...
50 Copyright © Acronis, Inc., 2000-2009 Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a
Copyright © Acronis, Inc., 2000-2009 51 ABR10 + + + + Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 -
52 Copyright © Acronis, Inc., 2000-2009 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
Copyright © Acronis, Inc., 2000-2009 53 With the new Acronis Secure Zone behavior, you obtain the ability to: • list archives located in the zone
54 Copyright © Acronis, Inc., 2000-2009 2.12.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recove
Copyright © Acronis, Inc., 2000-2009 55 Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardwa
56 Copyright © Acronis, Inc., 2000-2009 Limitation The only supported archive location is a local drive, or more precisely, any device available th
Copyright © Acronis, Inc., 2000-2009 57 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Resto
58 Copyright © Acronis, Inc., 2000-2009 Since you connect the console to the management server rather than to each machine and perform all manageme
Copyright © Acronis, Inc., 2000-2009 59 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi
6.10. Bootable media ... 264 6.10.1. H
60 Copyright © Acronis, Inc., 2000-2009 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor
Copyright © Acronis, Inc., 2000-2009 61 3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of
62 Copyright © Acronis, Inc., 2000-2009 2.13.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flex
Copyright © Acronis, Inc., 2000-2009 63 • Active Directory organization unit (OU) • IP address range. Multiple criteria can be specified for a dy
64 Copyright © Acronis, Inc., 2000-2009 3, 4, 5, 6 - the salesmen's machines (Windows XP) from the "Sales department" AD organizatio
Copyright © Acronis, Inc., 2000-2009 65 • edit a group, that is: o change the group name o change the group description o change the dynamic m
66 Copyright © Acronis, Inc., 2000-2009 management server tracks and displays personal statuses for each machine that it works with, as well as the
Copyright © Acronis, Inc., 2000-2009 67 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.13.
68 Copyright © Acronis, Inc., 2000-2009 2.13.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machin
Copyright © Acronis, Inc., 2000-2009 69 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is
Copyright © Acronis, Inc., 2000-2009 7 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A
70 Copyright © Acronis, Inc., 2000-2009 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited
Copyright © Acronis, Inc., 2000-2009 71 You may change grouping conditions or the machine may change its properties so that the machine leaves one
72 Copyright © Acronis, Inc., 2000-2009 Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is
Copyright © Acronis, Inc., 2000-2009 73 "Deploying, Deployed". When the deployment completes on both machines, the state will be "De
74 Copyright © Acronis, Inc., 2000-2009 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a du
Copyright © Acronis, Inc., 2000-2009 75 Before sending the item to the vault, the agent queries the deduplication database to determine whether the
76 Copyright © Acronis, Inc., 2000-2009 • When performing incremental backups of data that does not change itself, but changes its location. Suc
Copyright © Acronis, Inc., 2000-2009 77 What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previou
78 Copyright © Acronis, Inc., 2000-2009 • If you protected the archive with a password Files that were not deduplicated are stored in the archive
Copyright © Acronis, Inc., 2000-2009 79 2.13.7.2. Privileges for local connection Windows Local connection on a machine running Windows can be est
8 Copyright © Acronis, Inc., 2000-2009 Overview of all configured and running operations with color-coding for successful and failed operations •
80 Copyright © Acronis, Inc., 2000-2009 2.13.7.4. Privileges for remote connection in Linux Remote connections to a machine running Linux—includin
Copyright © Acronis, Inc., 2000-2009 81 Example 2 The above authentication policy might not work on Linux distributions with kernel version 2.4—inc
82 Copyright © Acronis, Inc., 2000-2009 Management Console; they have the same management rights on the registered machines as users with administr
Copyright © Acronis, Inc., 2000-2009 83 A regular user, such as a member of the Users group on the storage node, can: • Create archives in any cen
84 Copyright © Acronis, Inc., 2000-2009 2.13.7.8. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Back
Copyright © Acronis, Inc., 2000-2009 85 2.13.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acron
86 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node
Copyright © Acronis, Inc., 2000-2009 87 Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disable
88 Copyright © Acronis, Inc., 2000-2009 Always use The use of SSL certificates is enabled. The connection will be established only if the use of SS
Copyright © Acronis, Inc., 2000-2009 89 2.13.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network
Copyright © Acronis, Inc., 2000-2009 9 2. Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When installi
90 Copyright © Acronis, Inc., 2000-2009 In Windows, the certificate path and the server certificate's file name are specified in the registry
Copyright © Acronis, Inc., 2000-2009 91 Non-self-signed certificates You have the option to use trusted third-party certificates or certificates cr
Copyright © Acronis, Inc., 2000-2009 92 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph
Copyright © Acronis, Inc., 2000-2009 93 The option defines whether to display the pop-up messages about task run results: successful completion, fa
94 Copyright © Acronis, Inc., 2000-2009 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem
Copyright © Acronis, Inc., 2000-2009 95 entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the
96 Copyright © Acronis, Inc., 2000-2009 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appr
Copyright © Acronis, Inc., 2000-2009 97 b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is installe
98 Copyright © Acronis, Inc., 2000-2009 On the vCenter Server side When integration is enabled, the vCenter Server will store and show information
Copyright © Acronis, Inc., 2000-2009 99 3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the ma
Comentários a estes Manuais