Acronis Backup Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS For Linux Server
10 Copyright © Acronis International GmbH, 2002-2014 1.7.1 Agent for Linux This agent enables disk-level and file-level data protection under Linux
100 Copyright © Acronis International GmbH, 2002-2014 User name. When entering the name of an Active Directory user account, be sure to also spec
101 Copyright © Acronis International GmbH, 2002-2014 Select the destination disk for each of the source disks. NT signature (p. 101) Select the way
102 Copyright © Acronis International GmbH, 2002-2014 How the automatic mapping works Acronis Backup automatically maps the disks or volumes to the
103 Copyright © Acronis International GmbH, 2002-2014 Choose the disk to recover the Master Boot Record to. NT signature: (p. 101) Select the way th
104 Copyright © Acronis International GmbH, 2002-2014 Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes an
105 Copyright © Acronis International GmbH, 2002-2014 When recovering basic MBR and GPT volumes, you can select the alignment method manually if the
106 Copyright © Acronis International GmbH, 2002-2014 Note: Exclusions override selection of data items to recover. For example, if you select to re
107 Copyright © Acronis International GmbH, 2002-2014 User name. When entering the name of an Active Directory user account, be sure to also spec
108 Copyright © Acronis International GmbH, 2002-2014 One part of the GRUB loader resides either in the first several sectors of the disk or in the
109 Copyright © Acronis International GmbH, 2002-2014 5. Edit the /mnt/system/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Linux distribut
11 Copyright © Acronis International GmbH, 2002-2014 Upgrading to the full mode After the trial period expires, the product GUI displays a notificat
110 Copyright © Acronis International GmbH, 2002-2014 creating a recovery task, you can either use a default option, or override the default option
111 Copyright © Acronis International GmbH, 2002-2014 Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery File recovery (also f
112 Copyright © Acronis International GmbH, 2002-2014 The preset is Disabled. This option enables booting the machine into the recovered operating s
113 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encr
114 Copyright © Acronis International GmbH, 2002-2014 For detailed information about using SNMP with Acronis Backup, please see "Support for SN
115 Copyright © Acronis International GmbH, 2002-2014 2. Do any of the following: Click Edit to specify a new command or a batch file Select
116 Copyright © Acronis International GmbH, 2002-2014 A post-recovery command will not be executed if the recovery proceeds with reboot. 5.3.7 Rec
117 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk
118 Copyright © Acronis International GmbH, 2002-2014 During conversion which is part of a backup plan (p. 119), the software creates the virtual
119 Copyright © Acronis International GmbH, 2002-2014 Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo
12 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to
120 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac
121 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker
122 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr
123 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso
124 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak
125 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A
126 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio
127 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F
128 Copyright © Acronis International GmbH, 2002-2014 7.1.1 Working with vaults This section briefly describes the main GUI elements of the selecte
129 Copyright © Acronis International GmbH, 2002-2014 personal vault available to all users that can log on the system. Personal vaults are created
13 Copyright © Acronis International GmbH, 2002-2014 Tip. Using the bootable media, you can do off-line ("cold") backups in the same way a
130 Copyright © Acronis International GmbH, 2002-2014 vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut
131 Copyright © Acronis International GmbH, 2002-2014 7.2 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup
132 Copyright © Acronis International GmbH, 2002-2014 The Acronis Secure Zone cannot be organized on a dynamic disk. To allocate space for Acronis S
133 Copyright © Acronis International GmbH, 2002-2014 Acronis Secure Zone is always created at the end of the hard disk. When calculating the fin
134 Copyright © Acronis International GmbH, 2002-2014 7.2.2.2 Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acro
135 Copyright © Acronis International GmbH, 2002-2014 When you back up using the Back up now feature or under bootable media, the removable device i
136 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an
137 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 138) [Optional] Provide credentials for accessing the source if the task accou
138 Copyright © Acronis International GmbH, 2002-2014 To select a network share, expand the Network folders group, select the required networked
139 Copyright © Acronis International GmbH, 2002-2014 Specify the appropriate parameters as follows: Date and time - the date and time when to st
14 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Management Console - Welcome screen Key elements of the console workspace Name
140 Copyright © Acronis International GmbH, 2002-2014 Example. When backing up data to a remote location through an unstable or low-bandwidth networ
141 Copyright © Acronis International GmbH, 2002-2014 To access the Export page first select a validation object: an archive or a backup. 1. Select
142 Copyright © Acronis International GmbH, 2002-2014 2. In the table to the right of the tree, select the archive. The table displays the names of
143 Copyright © Acronis International GmbH, 2002-2014 To export data to a network share, expand the Network folders group, select the required ne
144 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if
145 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or
146 Copyright © Acronis International GmbH, 2002-2014 User name. When entering the name of an Active Directory user account, be sure to also spec
147 Copyright © Acronis International GmbH, 2002-2014 8.4 Operations available in vaults By using vaults, you can easily access archives and backup
148 Copyright © Acronis International GmbH, 2002-2014 8.4.2 Operations with backups To perform any operation with a backup 1. In the Navigation pa
149 Copyright © Acronis International GmbH, 2002-2014 During the conversion, the selected incremental or differential backup is replaced with a full
15 Copyright © Acronis International GmbH, 2002-2014 Alerts. Use this view to examine warning messages for the managed machine. The Full list a
150 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or
151 Copyright © Acronis International GmbH, 2002-2014 To use the media on different types of hardware, select both types of components. When booting
152 Copyright © Acronis International GmbH, 2002-2014 Disables Advanced Configuration and Power Interface (ACPI). You may want to use this parameter
153 Copyright © Acronis International GmbH, 2002-2014 Forces the use of PCI BIOS instead of accessing the hardware device directly. You may want to
154 Copyright © Acronis International GmbH, 2002-2014 Example The bootable agent could use one of the network adapters for communication with the
155 Copyright © Acronis International GmbH, 2002-2014 9.3 Working under bootable media Operations on a machine booted with bootable media are very
156 Copyright © Acronis International GmbH, 2002-2014 These devices are connected to the machine through a network interface and appear as if they w
157 Copyright © Acronis International GmbH, 2002-2014 chroot kpartx sed cp ln sg_map26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsc
158 Copyright © Acronis International GmbH, 2002-2014 Activate Activation enables the boot time prompt "Press F11 for Acronis Startup Recovery
159 Copyright © Acronis International GmbH, 2002-2014 10 Administering a managed machine This section describes the views that are available through
16 Copyright © Acronis International GmbH, 2002-2014 "Log" view Common way of working with views Generally, every view contains a table of
160 Copyright © Acronis International GmbH, 2002-2014 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 168) or
161 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea
162 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At
163 Copyright © Acronis International GmbH, 2002-2014 A task changes to the Running state when the event specified by the schedule occurs AND all th
164 Copyright © Acronis International GmbH, 2002-2014 Deploying of a backup plan to multiple machines You want to use the same backup plan on mul
165 Copyright © Acronis International GmbH, 2002-2014 To change the encrypted password 1. In the command line, run the acronis_encrypt utility: acr
166 Copyright © Acronis International GmbH, 2002-2014 1. Add the <rules_type> tag with "disks" or "files" value, dependin
167 Copyright © Acronis International GmbH, 2002-2014 folder, the agent imports the backup plan from that file. If you change (or delete) an .xml fi
168 Copyright © Acronis International GmbH, 2002-2014 10.1.5 Backup plan details The Backup plan details window (also duplicated on the Information
169 Copyright © Acronis International GmbH, 2002-2014 Name - name of the archive. Location - name of the vault or path to the folder, where th
17 Copyright © Acronis International GmbH, 2002-2014 Action page - Create backup plan Using controls and specifying settings Use active controls to
170 Copyright © Acronis International GmbH, 2002-2014 Select multiple log entries non-contiguous: hold down CTRL and click the log entries one by
171 Copyright © Acronis International GmbH, 2002-2014 Code - It can be blank or the program error code if the event type is error. Error code is
172 Copyright © Acronis International GmbH, 2002-2014 10.4 Changing a license By changing the license, you switch a product from trial mode to full
173 Copyright © Acronis International GmbH, 2002-2014 10.6 Adjusting machine options The machine options define the general behavior of all Acronis
174 Copyright © Acronis International GmbH, 2002-2014 To configure e-mail notification 1. In the E-mail addresses field, type the destination e-mai
175 Copyright © Acronis International GmbH, 2002-2014 10.6.3 Event tracing It is possible to send log events generated by the agent(s), operating o
176 Copyright © Acronis International GmbH, 2002-2014 10.6.3.2 Setting up SNMP services on the receiving machine Windows To install the SNMP servic
177 Copyright © Acronis International GmbH, 2002-2014 If you do not know the proxy server settings, contact your network administrator or Internet s
178 Copyright © Acronis International GmbH, 2002-2014 11 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th
179 Copyright © Acronis International GmbH, 2002-2014 Example You might want to use the following backup strategy for a file server. Back up the c
18 Copyright © Acronis International GmbH, 2002-2014 Navigation buttons 2.1.3 Console options The console options define the way information is r
180 Copyright © Acronis International GmbH, 2002-2014 Windows Vista – all editions except for Vista Home Basic and Vista Home Premium (x86, x64) Win
181 Copyright © Acronis International GmbH, 2002-2014 11.1.6.4 What if a network connection is lost during cloud backup or recovery? The software w
182 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t
183 Copyright © Acronis International GmbH, 2002-2014 11.1.7.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac
184 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,
185 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa
186 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo
187 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis
188 Copyright © Acronis International GmbH, 2002-2014 11.1.8.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens
189 Copyright © Acronis International GmbH, 2002-2014 11.1.9.1 How do I access my account management webpage? Go to http://www.acronis.com/my/cloud
19 Copyright © Acronis International GmbH, 2002-2014 2.1.3.4 Pop-up messages The “Activities Need Interaction” dialog This option defines whether t
190 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli
191 Copyright © Acronis International GmbH, 2002-2014 11.1.9.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are
192 Copyright © Acronis International GmbH, 2002-2014 Install Acronis Backup on the machine you want to back up, start the product, click Back up
193 Copyright © Acronis International GmbH, 2002-2014 Example The diagram below shows what happens if you reassign a subscription to a different mac
194 Copyright © Acronis International GmbH, 2002-2014 2. On the Options menu, click Machine options. 3. Click Cloud backup proxy. 4. Enter the pr
195 Copyright © Acronis International GmbH, 2002-2014 11.7 Limitations of the cloud storage Unlike other types of storage available in Acronis Back
196 Copyright © Acronis International GmbH, 2002-2014 Assign a subscription to a machine Reserve a subscription for a particular machine in order to
197 Copyright © Acronis International GmbH, 2002-2014 Renew a subscription Assign a subscription of the same type and with the same or a larger stor
198 Copyright © Acronis International GmbH, 2002-2014 12 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o
199 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b
2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr
20 Copyright © Acronis International GmbH, 2002-2014 About the task execution results The option defines whether to display the pop-up messages abou
200 Copyright © Acronis International GmbH, 2002-2014 the backup archive (p. 199) name and location the backup scheme (p. 200). This includes
201 Copyright © Acronis International GmbH, 2002-2014 access and back up the data that has survived in a corrupted system deploy an operating
202 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 207) administrato
203 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 207) contains all data stored o
204 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 199) that contains a sector-based copy of a disk or a volume
205 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di
206 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil
207 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli
208 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect
209 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req
21 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding
210 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 200) aimed to maintain the optimal balance between
22 Copyright © Acronis International GmbH, 2002-2014 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user. I
23 Copyright © Acronis International GmbH, 2002-2014 3.3 User privileges on a managed machine When managing a machine running Linux, the user has o
24 Copyright © Acronis International GmbH, 2002-2014 you need the possibility to roll back to any one of multiple saved states the data change
25 Copyright © Acronis International GmbH, 2002-2014 The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes i
26 Copyright © Acronis International GmbH, 2002-2014 This option is useful in the following cases: When some data on the volume was lost, but no
27 Copyright © Acronis International GmbH, 2002-2014 3.6.4 Assembling MD devices for recovery (Linux) In Linux, when performing recovery from a dis
28 Copyright © Acronis International GmbH, 2002-2014 3.6.5.1 Creating the volume structure automatically Use the following procedure to automatical
29 Copyright © Acronis International GmbH, 2002-2014 Note: This procedure will not work if you connect to Acronis Backup Bootable Agent remotely, be
3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...
30 Copyright © Acronis International GmbH, 2002-2014 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable .
31 Copyright © Acronis International GmbH, 2002-2014 type: disk Num Partition Flags Size Type GUID ------
32 Copyright © Acronis International GmbH, 2002-2014 4K native (4Kn) disks have 4-KB logical sector size. Modern operating systems can store data
33 Copyright © Acronis International GmbH, 2002-2014 Supported operations Acronis Backup supports only TRAP operations. It is not possible to manage
34 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i
35 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 134) If the specified location is an R
36 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan
37 Copyright © Acronis International GmbH, 2002-2014 A file-level backup is not sufficient for recovery of the operating system. Choose file backup
38 Copyright © Acronis International GmbH, 2002-2014 The option defines which files and folders to skip during the backup process and thus exclude f
39 Copyright © Acronis International GmbH, 2002-2014 Exclusion examples Criterion Example Description Windows and Linux By name F.log F Excludes all
4 Copyright © Acronis International GmbH, 2002-2014 4.2.5 Access credentials for archive location ...
40 Copyright © Acronis International GmbH, 2002-2014 Backing up to an existing archive You can configure the backup plan to back up to an existing a
41 Copyright © Acronis International GmbH, 2002-2014 Destination Details Network folders To back up data to a network folder, expand the Network f
42 Copyright © Acronis International GmbH, 2002-2014 Warning: According to the original FTP specification, credentials required for access to FTP se
43 Copyright © Acronis International GmbH, 2002-2014 Note: When the Incremental backup type is selected along with retention rules, the archive will
44 Copyright © Acronis International GmbH, 2002-2014 Keep backups Specifies how long you want the backups to be stored in the archive. A term can be
45 Copyright © Acronis International GmbH, 2002-2014 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, y
46 Copyright © Acronis International GmbH, 2002-2014 Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and mont
47 Copyright © Acronis International GmbH, 2002-2014 Clean up archive Specifies how to get rid of old backups: either to apply retention rules (p. 7
48 Copyright © Acronis International GmbH, 2002-2014 Here, all parameters except Schedule in Full backup are left empty. All backups in the archive
49 Copyright © Acronis International GmbH, 2002-2014 By default, a backup is not deleted as long as it has dependent backups that must be kept. For
5 Copyright © Acronis International GmbH, 2002-2014 5.2.1 How to reactivate GRUB and change its configuration ...
50 Copyright © Acronis International GmbH, 2002-2014 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different levels have different types: Last-level (in
51 Copyright © Acronis International GmbH, 2002-2014 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back period shows how man
52 Copyright © Acronis International GmbH, 2002-2014 not corrupted and can be successfully recovered, think of starting the validation right after b
53 Copyright © Acronis International GmbH, 2002-2014 To add a text label to a backup: 1. On the Create backup plan (p. 34) page, click Show plan&ap
54 Copyright © Acronis International GmbH, 2002-2014 acronisTag.hostname = “superserver.corp.local” acronisTag.os.type = “windows7Server64Guest” acr
55 Copyright © Acronis International GmbH, 2002-2014 134) determines whether the standard or simplified naming scheme will be used. In Linux, the ch
56 Copyright © Acronis International GmbH, 2002-2014 The value of this variable is the current date surrounded by brackets ([]). The date format dep
57 Copyright © Acronis International GmbH, 2002-2014 If you choose to back up to a locally attached RDX drive or USB flash drive, you will not see t
58 Copyright © Acronis International GmbH, 2002-2014 Specify MyMachine as the archive name. Create a directory such as /mnt/backup and speci
59 Copyright © Acronis International GmbH, 2002-2014 a) When creating the first backup plan, specify ServerFiles[DATE] as the archive name, select
6 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full ...
60 Copyright © Acronis International GmbH, 2002-2014 Condition: run the task only if Location's host is available The task run time is within t
61 Copyright © Acronis International GmbH, 2002-2014 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. E
62 Copyright © Acronis International GmbH, 2002-2014 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2009. To:
63 Copyright © Acronis International GmbH, 2002-2014 3. Effective: From: 05/13/2009. The task will be started on the nearest Friday at 10 PM. To: 1
64 Copyright © Acronis International GmbH, 2002-2014 From: 12:00:00 PM Until: 09:00:00 PM. 3. Effective: From: not set. To: not set. Second schedul
65 Copyright © Acronis International GmbH, 2002-2014 Examples "Last day of every month" schedule Run the task once at 10 PM on the last da
66 Copyright © Acronis International GmbH, 2002-2014 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2
67 Copyright © Acronis International GmbH, 2002-2014 4.4.4.1 Location's host is available Applies to: Windows, Linux "Location's h
68 Copyright © Acronis International GmbH, 2002-2014 What if... What if a task is scheduled to be executed at a certain time and this time is outsid
69 Copyright © Acronis International GmbH, 2002-2014 Similarly, you can copy or move backups from a second location to a third location and so on. U
7 Copyright © Acronis International GmbH, 2002-2014 11.4.2 Reassigning an activated subscription ...
70 Copyright © Acronis International GmbH, 2002-2014 With simplified naming of backup files (p. 54), neither replication nor use of retention rul
71 Copyright © Acronis International GmbH, 2002-2014 4.5.3 Setting up retention of backups You can set retention rules for backups when creating a
72 Copyright © Acronis International GmbH, 2002-2014 4.5.4 Retention rules for the Custom scheme In the Retention Rules window, you can select how
73 Copyright © Acronis International GmbH, 2002-2014 This mode is not available for Acronis Cloud Storage when you copy or move backups there. In th
74 Copyright © Acronis International GmbH, 2002-2014 In this scenario, create a backup plan with the Custom scheme. When creating the backup plan, s
75 Copyright © Acronis International GmbH, 2002-2014 During the subsequent backups, only changes to the original data will be sent to the cloud stor
76 Copyright © Acronis International GmbH, 2002-2014 Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File backup Disk backup
77 Copyright © Acronis International GmbH, 2002-2014 Agent for Linux Bootable media (Linux-based or PE-based) Disk backup File backup Disk backup
78 Copyright © Acronis International GmbH, 2002-2014 Restart the machine automatically after backup is finished This option is available only when o
79 Copyright © Acronis International GmbH, 2002-2014 4.7.3 Backup cataloging Cataloging a backup adds the contents of the backup to the data catalo
8 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5 The most recent operating syst
80 Copyright © Acronis International GmbH, 2002-2014 Low – to minimize resources taken by the backup process, leaving more resources to other pro
81 Copyright © Acronis International GmbH, 2002-2014 This option is not effective when the backup destination is a managed vault or Acronis Cloud St
82 Copyright © Acronis International GmbH, 2002-2014 The preset is: Normal. The optimal data compression level depends on the type of data being bac
83 Copyright © Acronis International GmbH, 2002-2014 2. Enter the e-mail address in the E-mail Address field. You can enter several e-mail addresse
84 Copyright © Acronis International GmbH, 2002-2014 8. If the outgoing mail server requires authentication, enter User name and Password of the se
85 Copyright © Acronis International GmbH, 2002-2014 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will displ
86 Copyright © Acronis International GmbH, 2002-2014 This option defines whether a file change is detected using the file size and time stamp or by
87 Copyright © Acronis International GmbH, 2002-2014 Logical volume manager Acronis Backup will use the snapshot taken by LVM. This snapshot is s
88 Copyright © Acronis International GmbH, 2002-2014 4.7.14 Media components This option is effective for both Windows and Linux operating systems,
89 Copyright © Acronis International GmbH, 2002-2014 Execute after the backup 2. Do any of the following: Click Edit to specify a new command
9 Copyright © Acronis International GmbH, 2002-2014 Other Support for Oracle Linux 5.x, 6.x – both Unbreakable Enterprise Kernel and Red Hat Comp
90 Copyright © Acronis International GmbH, 2002-2014 When the check box is not selected, the command execution result does not affect the task execu
91 Copyright © Acronis International GmbH, 2002-2014 Check box Selection Fail the backup task if the command execution fails* Selected Cleared Selec
92 Copyright © Acronis International GmbH, 2002-2014 4.7.17 Replication/cleanup inactivity time This option is effective only if you set up replic
93 Copyright © Acronis International GmbH, 2002-2014 The program will try to execute the failed task again if you select the Restart a failed task c
94 Copyright © Acronis International GmbH, 2002-2014 Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be
95 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect
96 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the recovery task. A conscious name lets you quickly identif
97 Copyright © Acronis International GmbH, 2002-2014 Selecting MBR When recovering a system volume, you will usually select the disk's MBR if:
98 Copyright © Acronis International GmbH, 2002-2014 Location Details FTP, SFTP If the archive is stored on an FTP or SFTP server, type the server
99 Copyright © Acronis International GmbH, 2002-2014 6. Having selected the required data, click Recover and configure the parameters of the recove
Comentários a estes Manuais