User's GuideAcronis®True Image EchoEnterprise ServerCompute with confidencewww.acronis.com
1.2 Acronis True Image Echo Enterprise Server components Acronis True Image Echo Enterprise Server includes the following components. 1. Acronis Tru
Chapter 9. Managing the Acronis Secure Zone The Acronis Secure Zone is a hidden partition for storing archives on the computer system itself. It is
4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum s
5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as data backup
2. Select Change password. 3. Enter the new password and confirm it or select Do not use password protection. You can also select a secret question
Chapter 10. Creating bootable media 10.1 Creating Acronis rescue media You can run Acronis True Image Echo Enterprise Server on a bare metal or on
The bootable version of Acronis True Image Agent. This component is designed to provide unattended restores from remote locations. To find more abo
4. If you are creating a CD, DVD, diskettes or any removable media, insert the blank disk so the program can determine its capacity. If you chose to
Chapter 11. Operations with archives 11.1 Validating backup archives You can check the integrity of an archive to be certain that the archive is no
Mounting images as virtual drives lets you access them as though they were physical drives. This means that: • a new disk with its own letter will a
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T
Set how often to check the computers state (status refresh rate) Wake on LAN for backup Backup server Import/export archives from external locations
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis T
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected
security of the archive in case the consolidation fails because of power failure or lack of disk space. 2. On the backup server, you only can consoli
The clone archive will consist of MyBackup3 and MyBackup5, however, their numbers will be zero (no number) and 2. MyBackup3 will change into a full
6:54:40 PM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup(1) and proceeding to the next window
Chapter 12. Notifications and event tracing Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True Image Echo Enterpr
1. Enable the Messenger service on both the computer executing the task and the computer that will receive messages. The Messenger service is disab
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows.
An additional choice is available - recording All events, Warnings and Errors, or Errors only. 12.4.2 SNMP notifications Acronis True Image Echo Ent
This feature is available in Acronis True Image Echo Enterprise Server local version only. Managing System Restore using Acronis True Image Manageme
Operations with hard disks Convert basic disk to dynamic Create dynamic volumes CLI features MBR restore Backup to FTP server Allow logs on net share
Chapter 13. Working with a virtual environment Virtual machine technologies provide a powerful tool to help accelerate the development, testing, dep
If the virtual machine cannot start, boot it into Acronis rescue environment using physical bootable media or RIS server, or by adding the bootable m
4. Add the other converted disks to the VM. 5. Start the VM and complete the hardware drivers configuration, if Windows prompts. This allows: • the
1. Do one of the following: Connect the console to the computer where Acronis True Image Agent is installed. Select Backup and Recovery tasks and cl
Chapter 14. Transferring the system to a new disk 14.1 General information Sooner or later computer users find that their hard disk is just too sma
14.2 Security Please note the following: If the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system
14.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the No
• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk. If you are going to sell or give aw
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure,
• USB 1.0 / 2.0, FireWire (IEEE-1394) and PC card storage devices • ZIP®, Jaz® and other removable media * - an FTP-server must allow passive mode
If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system an
Along with the hard disk number, you will also see disk capacity, label, partition and file system information. Different partition types, including
To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Cli
Chapter 15. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new, higher-capacit
If the cursor turns to two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce
Chapter 16. Command-line mode and scripting Acronis True Image Echo Enterprise Server (local version) supports the command-line mode and enables bac
deploy Restores disks and partitions, except for the MBR, from an image /filename:[file name] /password:[password] /asz /index:N /net_user:[username
convert Converts an image to virtual disk format for using with a virtual machine /filename:[file name] /password:[password] /asz /index:N /net_user
asz_delete_files Deletes the most recent backup in the archive located in the Acronis Secure Zone /filename:[file name] /password:[password] /log:[fi
/ftp_password:[password] Specify a password for access to an FTP server FTP server Backup options /incremental Set the backup type to incremental. If
Chapter 2. Acronis True Image Echo Enterprise Server installation and startup 2.1 System requirements 2.1.1 Minimum hardware requirements Acronis
By specifying /harddisk:DYN you will back up all dynamic volumes present in the system. /partition:[partition number] Specifies the partitions to in
Dynamic volumes are specified with prefix DYN, e.g.: /file_partition:DYN1 /filename:”\1.tib” /harddisk:[disk number] Specifies the basic hard disks
partition’s entry will occupy the same position as in the source disk MBR saved in the image. If the position is not empty, the existing entry will b
/harddisk:[disk number] Specifies the hard disks to convert by numbers. For each disk, a separate virtual disk will be created. By specifying /hardd
/partition:[partition number] Specifies partitions from which free space will be taken for Acronis Secure Zone. /size:[ASZ size in sectors | unalloca
• This will append an incremental image to the image named 1.tib of hard disk 2. The image will be saved to C:\Test\ folder, protected with password
• This will restore MBR from the image of hard disk 1 to the hard disk 2. The image is contained in the arc.tib file located on the FTP server. 3. B
• This will list available partitions. trueimagecmd /list /asz • This will list contents of the latest image located in Acronis Secure Zone. 8. Acr
The archive FAAA (F means that this is a file-level archive) contains one base file-level backup. The archive FAAB2 (B means that this is the second
Files\Acronis\TrueImageEchoEnterpriseServer). This utility is also used to monitor backup progress. TrueImageTerminal execution parameters: TrueImage
• Windows Server 2000 /Advanced Server 2000 /Server 2003 • Windows XP Professional x64 Edition, Windows Server 2003 x64 Editions • Windows Vista a
the program will create a complete image file. The default value for this parameter is “true”. Description: adds a description to an image file. The
2.2.3 Encrypted communication Acronis True Image Echo Enterprise Server provides capability to secure all data transferred between Acronis component
For detailed information about Windows GPO Editor please see: http://msdn2.microsoft.com/en-us/library/aa374163.aspxFor detailed information about
Acronis True Image Echo Enterprise Server Install Window It is recommended that you install Acronis True Image Management Console first. After that
2.3.2 Installation of Acronis True Image Agent for Linux To install the Acronis True Image Agent for Linux, extract its setup file to a shared netwo
Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron
4. Acronis Backup Server Management -> Specify Default Settings -> Set Backup Location -> specify path to the storage drive. You can creat
Select from the local backup server users or the domain users Choose Create user with administrator’s rights. Click Proceed. User or administrator
Click Set up Administrator profiles -> Add. Choose the computer or enter its name. Choose Use default settings. Click Proceed. Adding a computer
2.3.5 Acronis Universal Restore installation Acronis Universal Restore is an option for Acronis True Image Echo Enterprise Server. It is purchased s
to learn more about this procedure. To run the program, press F11 during the server bootup when you see a corresponding message that tells you to pre
Chapter 3. General information and proprietary Acronis technologies 3.1 The difference between file archives and disk/partition images A backup arc
A standalone, full backup could be an optimal solution if you often roll back the system to the initial state (for example, systems in a gaming club
You can back up data automatically on a schedule (see Chapter 8. Scheduling tasks), and not worry about zone overflow issues. However, if you keep l
Here’s an example of how you would use this feature. If failure occurs on a computer, turn on the computer and press F11 when you see the "Press
of archives in a location may be a serious problem. Practice is the best criterion for your choice. You can move, clear or delete existing backup lo
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT U
The person who installed the program becomes the administrator in this group. The administrator is automatically registered on the backup server. Gen
drivers receive the system queries and restore the sectors that are necessary for the requested operation. 3. At the same time, Acronis True Image Ec
Using Microsoft System Preparation Tool (Sysprep) does not solve this problem, because Sysprep permits replacing drivers only for Plug-and-Play devic
3.7.4 Limitations in using Acronis Universal Restore 1. The system recovered by Acronis Universal Restore might not start if the partition structur
3.8 Backing up to tape libraries and tape drives Acronis True Image Echo Enterprise Server supports tape libraries, autoloaders and SCSI tape drives
Low-quality or old tape, as well as dirt on the magnetic head, might lead to pauses that can last up to several minutes. 3.8.3 Setting up backup to
Chapter 4. Using Acronis True Image Management Console 4.1 General information Acronis True Image Management Console is the primary tool for managi
To install Acronis components: 1. Click Install Acronis components to a remote computer in the center of Acronis True Image Management Console main w
5. Provide administrator username and password for each computer. If there is a universal administrator account on the network, enter the account cr
7. Once the installation starts, the program displays the operation progress and the name of the computer on which the component is being installed.
Table of Contents Chapter 1. Introduction ...8 1.1 Acronis® True
The task list content depends on the programs installed on the connected computer. The most populated list will include managing Backup and Recovery
Set up default backup or restore options, such as system/network resources usage, before/after backup commands, etc. Click Remote Computer Options,
Other Tools Create bootable rescue media, its ISO or RIS package See Chapter 10. Creating bootable media. Update the remote agent Click Update
Failed – the task could not be completed because of an error Finished – the task has been completed successfully Cancelled – the task has been cancel
5. Set (or change) the MAC address for each computer. To do so, select the computer, then select on the sidebar Computer details -> MAC address: S
5. Specify the paths for the backup archives. To place every archive on its local computer, specify Local path or select Acronis Secure Zone, if ther
12. After you click Proceed, Acronis True Image Management Console connects to every computer of the group in turn to distribute the task. If a remot
Check – the group server will connect in turn to all computers involved in the group task and check if the child tasks are intact on the computers so
When connecting to a backup server inside a domain, be aware whether your domain or local account is registered on the backup server. If you entere
The default quotas/time limits are preset to Unlimited, except for Maximum number of incremental backups for each full backup, which is set to 5 (th
3.7.5 Getting Acronis Universal Restore...33 3.8 Backing up to tape lib
Please take note of the fact that checking limitations makes no sense if you have not changed at least one of the preset Unlimited values for quotas
To change a computer backup location within the same device, you must have at least as much free space on the device as the computer archives occupy
To add another administrator, first add this person’s local or domain account to the AcronisBackupServerUsers group. Then click Set up User profiles
To edit limitations for a backup location, select the backup location, click Quotas and Time Limits and enter the new values in the appearing window
You can: 1. Sort the list by Location or Owners (users and computers) by clicking on the respective item above the list. 2. Filter out from the li
starting their task. They will be trying to connect to the server every 5 seconds until the connection is allowed. Therefore, the real backup start t
Chapter 5. Using Acronis True Image Echo Enterprise Server (local version) Acronis True Image Echo Enterprise Server (local version) supports the GU
• Explore and Validate Backup Archives – explore file-level archives, mount disk/partition images as virtual drives, run the archive integrity check
Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.
Run, stop, edit, clone, rename, delete backup and archive validation tasks Click Tasks in the Manage Tasks group or select the Task Scheduling categ
7.3.2 Archive selection...82 7.3.3 Restoration
Transfer the system to a new hard disk See Chapter 14. Transferring the system to a new disk. Format partitions on a new hard disk See Chapter 15.
Chapter 6. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a
You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe. My???.ex
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to anot
7. Select the backup options (that is, backup file splitting, compression level, password protection, pre/post backup commands etc.). You may selec
You can adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from t
4. Select the name and location of the archive. If you are going to create a full backup, type the file name in the File Name line, or use the file
See notes and recommendations for using the FTP server in 1.4.2 Supported storage media. 5. If your choice was not Acronis Backup Server, select wh
6.3.1 Archive protection Password The preset is no password. An archive can be protected with a password. To protect the archive data from being a
This option is effective for file/folders backup only. When creating a disk/partition image, you cannot filter out any files. 6.3.3 Pre/post command
12.5 Managing System Restore ...118 Chapter 13. Working wi
net start “Microsoft Exchange POP3” net start “Microsoft Exchange Routing Engine” Create batch files in any text editor (for example, name it pause_s
The preset is Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process.
6.3.8 Archive splitting Sizeable backups can be split into several files that together make the original backup. A backup file can be split for burn
Properties -> General -> Advanced Attributes -> Encrypt contents to secure data). Check the option if there are encrypted files in the backu
Corporate administrators need an option to continue a back up despite any errors that might occur without the system popping up an error box. Details
2. Set the NIC properties on the computer as follows. Control Panel -> System -> Device Manager -> Network adapters -> select the NIC -&g
4. Reset archive bit The preset is disabled. The option relates only to file-level backup. In Windows operating systems, each file has an attribute F
Chapter 7. Restoring the backup data 7.1 Considerations before recovery 7.1.1 Restore under Windows or boot from CD? As mentioned above (see 2.5.1
7.1.3 Recovering dynamic volumes Dynamic volumes are volumes located on dynamic disks, i.e. disks managed by Windows Logical Disk Manager (LDM). For
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard pro
Chapter 1. Introduction 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users Acronis True Image Echo Enterprise
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original locat
7. Set filters for the specific types of files that are not to be restored. For example, you may want hidden and system files and folders, as well as
(disk) can not be blocked, close applications that use this partition (disk) and start over. If you can not determine which applications use the part
7.3.3 Restoration type selection Select what you want to restore: Restore specified files or folders With this selection, you will be further offer
Finally, if you are not going to recover the system, but only want to repair damaged files, select Restore specified files or folders. 7.3.4 Selecti
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination dis
Selecting Active for a partition without an installed operating system could prevent your server from booting. 7.3.7 Changing the restored partitio
7.3.9 Assigning a letter to the restored partition Acronis True Image Echo Enterprise Server will assign an unused letter to a restored partition. Y
- the driver repository - a folder or folders on a network drive or CD specified in restore options. If you have not specified the driver repository
7.4.1 Files to exclude from restoration The preset is Restore all files. You can set the default filters for the specific types of files that are n
availability for mission critical applications. Additionally, users can control hard disk drive writing speeds and control network bandwidth used dur
The backup process will run concurrently with your commands if you uncheck the Do not perform operations until the commands execution is complete box
7.4.7 Additional settings 1. You can choose whether to restore files’ date and time from the archive or assign the files the current date and time.
1. Close all applications that use the basic disk(s) that will be converted. 2. If there are partitions on the basic disk(s), define whether you want
4. Select the type of dynamic volume that will be created: simple/spanned, striped, mirrored or RAID 5. 5. Specify amount of space that the dynamic
Chapter 8. Scheduling tasks Acronis True Image Echo Enterprise Server allows you to schedule periodic backup and archive validation tasks. Doing so
• Manually later – the task will be saved, but not launched automatically. You will be able to launch it later by clicking Run in the Scheduled Tas
In the upper field, enter a user name. Enter a password twice in two fields below. 7. At the final step, the task configuration is displayed. Up to
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system st
8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specif
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system sta
Komentarze do niniejszej Instrukcji