ACRONIS Backup & Recovery 10 Server, Windows Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS Backup & Recovery 10 Server, Windows. Acronis Backup & Recovery 10 Server, Windows Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 217
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Server for Windows

User's Guide Acronis® Backup & Recovery ™ 10 Server for Windows

Strona 2

10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac

Strona 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition. This situation is quite

Strona 4

Copyright © Acronis, Inc., 2000-2010 101 Task states A task can be in one of the following states: Idle; Waiting; Running; Stopping; Need interacti

Strona 5

102 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta

Strona 6 - 1.2 Getting started

Copyright © Acronis, Inc., 2000-2010 103 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you

Strona 7

104 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Strona 8 - "Navigation" pane

Copyright © Acronis, Inc., 2000-2010 105 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Strona 9 - Actions

106 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Strona 10 - Operations with panes

Copyright © Acronis, Inc., 2000-2010 107 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Strona 11 - Action pages

108 Copyright © Acronis, Inc., 2000-2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove

Strona 12 - Action page - Controls

Copyright © Acronis, Inc., 2000-2010 109 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i

Strona 13 - 1.3.1 Agent for Windows

Copyright © Acronis, Inc., 2000-2010 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Strona 14 - 1.4 Supported file systems

110 Copyright © Acronis, Inc., 2000-2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m

Strona 15 - 1.6 System requirements

Copyright © Acronis, Inc., 2000-2010 111 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click

Strona 16 - 1.7 Technical support

112 Copyright © Acronis, Inc., 2000-2010 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d

Strona 17 - 2.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 113 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo

Strona 18

114 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val

Strona 19 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2010 115 To specify credentials 1. Select one of the following:  Run under the current user The tasks will run u

Strona 20

116 Copyright © Acronis, Inc., 2000-2010 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks a

Strona 21

Copyright © Acronis, Inc., 2000-2010 117 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going

Strona 22 - Differential backup

118 Copyright © Acronis, Inc., 2000-2010 By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file na

Strona 23 - 2.4 Owners and credentials

Copyright © Acronis, Inc., 2000-2010 119 unique within the selected location. If you are satisfied with the automatically generated name, click OK.

Strona 24 - 2.5 GFS backup scheme

12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Strona 25 - GFS by Acronis

120 Copyright © Acronis, Inc., 2000-2010 6.2.9 Backup schemes Choose one of the available backup schemes:  Back up now – to create a backup task

Strona 26 - The resulting archive: ideal

Copyright © Acronis, Inc., 2000-2010 121 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup

Strona 27 - The resulting archive: real

122 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h

Strona 28 - Tower of Hanoi overview

Copyright © Acronis, Inc., 2000-2010 123  Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered r

Strona 29 - Tower of Hanoi by Acronis

124 Copyright © Acronis, Inc., 2000-2010  Start backup at: 12:00 PM  Back up on: Friday  Weekly/monthly: Friday  Keep backups:  Daily: 1

Strona 30 - 2.7 Retention rules

Copyright © Acronis, Inc., 2000-2010 125 Backups of different levels have different types:  Last-level (in this case, level 4) backups are full;

Strona 31

126 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back perio

Strona 32 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2010 127 This setting enables deletion of the last backup in the archive, in case your storage device cannot accomm

Strona 33 - Backing up dynamic volumes

128 Copyright © Acronis, Inc., 2000-2010 Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and dai

Strona 34 - Recovering dynamic volumes

Copyright © Acronis, Inc., 2000-2010 129 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks

Strona 35 - 2.9 Tape support

Copyright © Acronis, Inc., 2000-2010 13 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron

Strona 36

130 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent

Strona 37 - 2.10.1 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 131 If the managed machine's operating system fails to start or you need to recover data to bare metal, b

Strona 38 - Universal Restore)

132 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the archive location if the task account does not have the right to acc

Strona 39

Copyright © Acronis, Inc., 2000-2010 133 default one. When the default value is set, the line disappears and so you always see only the settings th

Strona 40 - How it works

134 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as

Strona 41 - How to use

Copyright © Acronis, Inc., 2000-2010 135 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh

Strona 42

136 Copyright © Acronis, Inc., 2000-2010 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Physical mach

Strona 43 - 3 Options

Copyright © Acronis, Inc., 2000-2010 137 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot

Strona 44 - 3.1.5 Fonts

138 Copyright © Acronis, Inc., 2000-2010 The new virtual machine will be configured automatically, the source machine configuration being copied wh

Strona 45 - 3.2 Machine options

Copyright © Acronis, Inc., 2000-2010 139 Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and

Strona 46 - SNMP notifications

14 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil

Strona 47 - 3.2.2 Log cleanup rules

140 Copyright © Acronis, Inc., 2000-2010 Virtual machine type / virtualization server selection The new virtual machine can be created either on a

Strona 48

Copyright © Acronis, Inc., 2000-2010 141 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of

Strona 49

142 Copyright © Acronis, Inc., 2000-2010 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th

Strona 50 - Source files exclusion

Copyright © Acronis, Inc., 2000-2010 143  you have chosen to use Acronis Active Restore (p. 197) because these features are primarily meant for i

Strona 51 - Pre/Post commands

144 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec

Strona 52 - Post-backup command

Copyright © Acronis, Inc., 2000-2010 145 The same type of machines with the same name cannot be created in the same folder. Change either the VM na

Strona 53 - Pre-data capture command

146 Copyright © Acronis, Inc., 2000-2010 Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Too

Strona 54 - Post-data capture command

Copyright © Acronis, Inc., 2000-2010 147 cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub

Strona 55 - Volume Shadow Copy Service

148 Copyright © Acronis, Inc., 2000-2010 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, t

Strona 56 - Compression level

Copyright © Acronis, Inc., 2000-2010 149 If this does not resolve the problem, or for more details on adding these registry settings, see the corre

Strona 57 - Network connection speed

Copyright © Acronis, Inc., 2000-2010 15  XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di

Strona 58 - Notifications

150 Copyright © Acronis, Inc., 2000-2010 Vault (p. 151) - select a vault (or other location), which archives to validate. Access Credentials (p. 15

Strona 59 - Messenger service (WinPopup)

Copyright © Acronis, Inc., 2000-2010 151  If the archive is stored on a network share, expand the Network folders group, then select the required

Strona 60 - Windows event log

152 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre

Strona 61 - Backup splitting

Copyright © Acronis, Inc., 2000-2010 153  On schedule - to schedule the task. To learn more about how to configure the scheduling parameters, ple

Strona 62 - Media components

154 Copyright © Acronis, Inc., 2000-2010  If the archive is stored in a local folder on the machine, expand the Local folders group and click the

Strona 63 - Error handling

Copyright © Acronis, Inc., 2000-2010 155 The program will access the location using the credentials you specify. Use this option if the current use

Strona 64 - Task start conditions

156 Copyright © Acronis, Inc., 2000-2010 To unmount an image, select it in the table and click Unmount. To unmount all the mounted volumes, click

Strona 65 - Task failure handling

Copyright © Acronis, Inc., 2000-2010 157 Source and destination locations When the console is connected to a managed machine, you can export an arc

Strona 66 - Additional settings

158 Copyright © Acronis, Inc., 2000-2010 Archive (p. 133) - in that case, you need to specify the archive only. Backups (p. 159) - specify the arch

Strona 67 - Reset archive bit

Copyright © Acronis, Inc., 2000-2010 159  If the archive is stored in a local folder on the machine, expand the Local folders group and click the

Strona 68 - Use FTP in Active mode

16 Copyright © Acronis, Inc., 2000-2010 Linux-based 256 MB 130 MB 1.7 Technical support As part of a purchased annual Support charge you are

Strona 69

160 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials of the task account specified in the General se

Strona 70 - Post-recovery command

Copyright © Acronis, Inc., 2000-2010 161 2. Using the archives table To assist you with choosing the right destination, the table on the right disp

Strona 71 - Recovery priority

162 Copyright © Acronis, Inc., 2000-2010 To learn more about the advantages and limitations of the Acronis Secure Zone, see the Acronis Secure Zone

Strona 72

Copyright © Acronis, Inc., 2000-2010 163  Taking all free space from a system volume may cause the operating system to work unstably and even fai

Strona 73

164 Copyright © Acronis, Inc., 2000-2010 If you have used the Acronis Secure Zone before, please note a radical change in the zone functionality. T

Strona 74

Copyright © Acronis, Inc., 2000-2010 165 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from

Strona 75

166 Copyright © Acronis, Inc., 2000-2010  recover an operating system that cannot start  access and back up the data that has survived in a cor

Strona 76

Copyright © Acronis, Inc., 2000-2010 167  A media with Linux-style volume handling displays the volumes as, for example, hda1 and sdb2. It tries

Strona 77 - 4 Vaults

168 Copyright © Acronis, Inc., 2000-2010 Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer

Strona 78 - 4.1 Personal vaults

Copyright © Acronis, Inc., 2000-2010 169 You also can specify any of these parameters by pressing F11 while in the boot menu. Parameters When speci

Strona 79 - Vault content

Copyright © Acronis, Inc., 2000-2010 17 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Strona 80 - Creating a personal vault

170 Copyright © Acronis, Inc., 2000-2010 module_name=off Disables the module whose name is given by module_name. For example, to disable the use of

Strona 81 - 4.2 Common operations

Copyright © Acronis, Inc., 2000-2010 171 You can customize bootable media for any machine, and not only for the machine where the media is created.

Strona 82

172 Copyright © Acronis, Inc., 2000-2010 To add drivers: 1. Click Add and browse to the INF file or a folder that contains INF files. 2. Select

Strona 83 - To show or hide columns

Copyright © Acronis, Inc., 2000-2010 173 Adding Acronis Plug-in to WinPE 2.x or 3.0 ISO To add Acronis Plug-in to WinPE 2.x or 3.0 ISO: 1. When ad

Strona 84 - 5 Scheduling

174 Copyright © Acronis, Inc., 2000-2010 export_license.bat 5. Copy the contents of the current folder—by default: C:\Program Files\Acronis\Boota

Strona 85 - 5.1 Daily schedule

Copyright © Acronis, Inc., 2000-2010 175 6. Tasks cannot be scheduled; in fact, tasks are not created at all. If you need to repeat the operation,

Strona 86 -  fifth at 7 PM

176 Copyright © Acronis, Inc., 2000-2010 2. Click Configure iSCSI/NDAS devices. 3. In NDAS devices, click Add device. 4. Specify the 20-characte

Strona 87 - 5.2 Weekly schedule

Copyright © Acronis, Inc., 2000-2010 177 fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs p

Strona 88

178 Copyright © Acronis, Inc., 2000-2010 4. Click Details in the area with that message. 5. Review the volume structure, and then click Apply RAI

Strona 89 - 5.3 Monthly schedule

Copyright © Acronis, Inc., 2000-2010 179 Example Suppose that you previously performed a disk backup of a machine with the following disk configura

Strona 90

18 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Strona 91

180 Copyright © Acronis, Inc., 2000-2010 5. Run the following command to create the logical volume; in the -L parameter, specify the size given by

Strona 92

Copyright © Acronis, Inc., 2000-2010 181 6.11 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configurati

Strona 93 - 5.5 Conditions

182 Copyright © Acronis, Inc., 2000-2010 Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare

Strona 94 - 5.5.3 Fits time interval

Copyright © Acronis, Inc., 2000-2010 183 Displaying operation results The results of any disk or volume operation, you have just planned, are immed

Strona 95 - 5.5.4 User logged off

184 Copyright © Acronis, Inc., 2000-2010 If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Li

Strona 96 - Example:

Copyright © Acronis, Inc., 2000-2010 185 the source disk data to the target disk is impossible even with the proportional resizing of the volumes,

Strona 97 - 6 Direct management

186 Copyright © Acronis, Inc., 2000-2010 Disk conversion: MBR to GPT You would want to convert an MBR basic disk to a GPT basic disk in the followi

Strona 98 - Tasks need interaction

Copyright © Acronis, Inc., 2000-2010 187 (To finish the added operation you will have to commit (p. 195) it. Exiting the program without committing

Strona 99 - Backup plan execution states

188 Copyright © Acronis, Inc., 2000-2010 dynamic disks (all volume types except Simple volumes), then you will be warned here about the possible da

Strona 100 - Backup plan statuses

Copyright © Acronis, Inc., 2000-2010 189  Create Volume (p. 189) - Creates a new volume with the help of the Create Volume Wizard.  Delete Volu

Strona 101 - Task states

Copyright © Acronis, Inc., 2000-2010 19 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Strona 102 - Task statuses

190 Copyright © Acronis, Inc., 2000-2010 Striped volumes are created for improved performance, not for their better reliability - they do not conta

Strona 103 -  Validation task (p. 149)

Copyright © Acronis, Inc., 2000-2010 191 If the current operating system, installed on this machine, does not support the selected type of volume ,

Strona 104

192 Copyright © Acronis, Inc., 2000-2010 For basic volumes if some unallocated space is left on the disk, you also will be able to choose the posit

Strona 105

Copyright © Acronis, Inc., 2000-2010 193 After a volume is deleted, its space is added to unallocated disk space. It can be used for creation of a

Strona 106

194 Copyright © Acronis, Inc., 2000-2010 If you need to change a letter assigned to a volume by the operating system: 1. Select a volume to change

Strona 107 - Run backup plan

Copyright © Acronis, Inc., 2000-2010 195 In the text window you will be able to enter the volume label, if necessary: by default this window is emp

Strona 108 - Progress

196 Copyright © Acronis, Inc., 2000-2010 This option is available under bootable media and for machines where Agent for Windows, Agent for Linux or

Strona 109 - Backup plan details

Copyright © Acronis, Inc., 2000-2010 197 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Strona 110 - 6.1.3 Log

198 Copyright © Acronis, Inc., 2000-2010 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e

Strona 111 - Configuring the log table

Copyright © Acronis, Inc., 2000-2010 199 Backup options Configuration parameters of a backup operation (p. 198), such as pre/post backup commands,

Strona 112 - 6.2 Creating a backup plan

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Strona 113 - Backup options

20 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Strona 114 - Convert to VM

200 Copyright © Acronis, Inc., 2000-2010 5. On each machine, the agent installed on the machine creates a backup plan (p. 199) using other rules s

Strona 115 - 6.2.4 Items to back up

Copyright © Acronis, Inc., 2000-2010 201 built-in group except for deleting the machine from the management server. Virtual machines are deleted as

Strona 116 - Selecting files and folders

202 Copyright © Acronis, Inc., 2000-2010 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 199) that produc

Strona 117 - 6.2.6 Exclusions

Copyright © Acronis, Inc., 2000-2010 203 operations are configured on the management server (p. 207) and propagated by the server to the managed ma

Strona 118 - 6.2.7 Archive

204 Copyright © Acronis, Inc., 2000-2010 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with

Strona 119

Copyright © Acronis, Inc., 2000-2010 205 Dynamic volume Any volume located on dynamic disks (p. 203), or more precisely, on a disk group (p. 203)

Strona 120 - 6.2.9 Backup schemes

206 Copyright © Acronis, Inc., 2000-2010 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 200) aimed to maintain the optimal balance bet

Strona 121 - Parameters

Copyright © Acronis, Inc., 2000-2010 207 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n

Strona 122 - Examples

208 Copyright © Acronis, Inc., 2000-2010 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi

Strona 123

Copyright © Acronis, Inc., 2000-2010 209 Since the cleanup schedule exists on the machine (p. 206) the agent (p. 197) resides on, and therefore use

Strona 124 - Tower of Hanoi scheme

Copyright © Acronis, Inc., 2000-2010 21 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Strona 125 - Roll-back period

210 Copyright © Acronis, Inc., 2000-2010  the image being recovered is located in Acronis Secure Zone (p. 197) or  when using Acronis Active Re

Strona 126 - Custom backup scheme

Copyright © Acronis, Inc., 2000-2010 211  Windows Server 2003 with Service Pack 1 (PE 1.6)  Windows Vista (PE 2.0)  Windows Vista SP1 and Win

Strona 127

Index A About Windows loaders • 152 Access credentials • 158, 159 Access credentials for archive location • 118, 124 Access credentials for destinat

Strona 128 - Resulting tasks

Copyright © Acronis, Inc., 2000-2010 213 Basic precautions • 186 Bootability troubleshooting • 150 Bootable agent • 39, 170, 202, 205 Bootable medi

Strona 129 - 6.2.10 Archive validation

214 Copyright © Acronis, Inc., 2000-2010 Disk management • 36, 136, 186 Disk operations • 188 Disks • 136, 140 Disks/volumes selection • 139 Driver

Strona 130 - 6.3 Recovering data

Copyright © Acronis, Inc., 2000-2010 215 M Machine • 203, 204, 205, 206, 208, 209, 211, 212, 213, 214, 215 Machine options • 46, 61, 62, 75, 76 Mai

Strona 131 - What to recover

216 Copyright © Acronis, Inc., 2000-2010 Run backup plan • 107, 111 Running Acronis Disk Director Lite • 186 S Scheduling • 66, 87, 125, 134, 157 S

Strona 132 - Recovery options

Copyright © Acronis, Inc., 2000-2010 217 Validation • 18, 203, 214, 215 Validation rules • 204, 215 Vault • 18, 39, 168, 210, 212, 215 Vaults • 34,

Strona 133 - 6.3.2 Archive selection

22 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Strona 134 - 6.3.4 Content selection

Copyright © Acronis, Inc., 2000-2010 23 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Mediu

Strona 135 - 6.3.6 Destination selection

24 Copyright © Acronis, Inc., 2000-2010  Click Cancel and create your own plan or task. The original task will remain intact.  Continue editing

Strona 136 - Disk destination

Copyright © Acronis, Inc., 2000-2010 25  how many tapes you need to enable recovery with the desired resolution (time interval between recovery p

Strona 137 - Volumes

26 Copyright © Acronis, Inc., 2000-2010 Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so

Strona 138 - Volume destination

Copyright © Acronis, Inc., 2000-2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Strona 139 - Volume properties

28 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at

Strona 140 - Virtual machine settings

Copyright © Acronis, Inc., 2000-2010 29 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Strona 141 - Recovery exclusions

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...6 1.1 A

Strona 142 - 6.3.9 Universal Restore

30 Copyright © Acronis, Inc., 2000-2010  the scheme forces every backup level to keep only the most recent backup, other backups from the level h

Strona 143 - Universal Restore settings

Copyright © Acronis, Inc., 2000-2010 31 to this interval and deletes all backups created before that moment. None of the backups created after this

Strona 144

32 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Strona 145

Copyright © Acronis, Inc., 2000-2010 33 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Strona 146

34 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Strona 147

Copyright © Acronis, Inc., 2000-2010 35 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing

Strona 148 - About Windows loaders

36 Copyright © Acronis, Inc., 2000-2010 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE

Strona 149 - What to validate

Copyright © Acronis, Inc., 2000-2010 37 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont

Strona 150 - 6.4.2 Archive selection

38 Copyright © Acronis, Inc., 2000-2010  mount a disk backup to copy files from the backup to a physical disk  safely delete archives and backu

Strona 151 - 6.4.4 Location selection

Copyright © Acronis, Inc., 2000-2010 39 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac

Strona 153 - 6.5 Mounting an image

40 Copyright © Acronis, Inc., 2000-2010 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w

Strona 154 - 6.5.3 Access credentials

Copyright © Acronis, Inc., 2000-2010 41 Because serving requests is performed simultaneously with recovery, the system operation can slow down even

Strona 155 - 6.6 Managing mounted images

42 Copyright © Acronis, Inc., 2000-2010

Strona 156

Copyright © Acronis, Inc., 2000-2010 43 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Strona 157 - What to export

44 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Strona 158 - 6.7.2 Archive selection

Copyright © Acronis, Inc., 2000-2010 45 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Strona 159 - 6.7.3 Backup selection

46 Copyright © Acronis, Inc., 2000-2010  All events - all events (information, warnings and errors)  Errors and warnings  Errors only. To dis

Strona 160 - 6.7.5 Location selection

Copyright © Acronis, Inc., 2000-2010 47 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine running

Strona 161 - 6.8 Acronis Secure Zone

48 Copyright © Acronis, Inc., 2000-2010 Initially the option is configured during the Acronis Backup & Recovery 10 agent installation. This set

Strona 162 - Acronis Secure Zone Size

Copyright © Acronis, Inc., 2000-2010 49 Compression level (p. 56) + + + + Backup performance: Backup priority (p. 57) + + - - HDD writing spe

Strona 163 - Result confirmation

6.4 Validating vaults, archives and backups ...149 6.4.1 Task credent

Strona 164 - Deleting Acronis Secure Zone

50 Copyright © Acronis, Inc., 2000-2010 E-mail (p. 58) + + - - Win Pop-up (p. 59) + + - - Event tracing: Windows events log (p. 60) + + -

Strona 165 - 6.10 Bootable media

Copyright © Acronis, Inc., 2000-2010 51 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of it

Strona 166 - PE-based bootable media

52 Copyright © Acronis, Inc., 2000-2010 The program does not support interactive commands, i.e. commands that require user input (for example, &quo

Strona 167

Copyright © Acronis, Inc., 2000-2010 53 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i

Strona 168 - Kernel parameters

54 Copyright © Acronis, Inc., 2000-2010 4. Depending on the result you want to obtain, select the appropriate options as described in the table be

Strona 169

Copyright © Acronis, Inc., 2000-2010 55 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operati

Strona 170 - Network settings

56 Copyright © Acronis, Inc., 2000-2010 The preset is: Create snapshots using VSS Acronis Backup & Recovery 10 will select the VSS provider aut

Strona 171 - Network port

Copyright © Acronis, Inc., 2000-2010 57 Backup performance Use this group of options to specify the amount of network and system resources to alloc

Strona 172

58 Copyright © Acronis, Inc., 2000-2010 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server

Strona 173

Copyright © Acronis, Inc., 2000-2010 59  Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types a

Strona 174

Copyright © Acronis, Inc., 2000-2010 6 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Strona 175 - Setting up a display mode

60 Copyright © Acronis, Inc., 2000-2010 Event tracing It is possible to duplicate log events of the backup operations, performed on the managed mac

Strona 176 - Linux commands and utilities

Copyright © Acronis, Inc., 2000-2010 61  Send SNMP notifications individually for backup operation events – to send the events of the backup oper

Strona 177

62 Copyright © Acronis, Inc., 2000-2010  When backing up to removable media (CD, DVD or a tape device locally attached to the managed machine):

Strona 178

Copyright © Acronis, Inc., 2000-2010 63 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.

Strona 179 - Example

64 Copyright © Acronis, Inc., 2000-2010 When the option is disabled, the program will display a pop-up window each time it comes across a bad secto

Strona 180 - Mounting backup volumes

Copyright © Acronis, Inc., 2000-2010 65 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Strona 181 - 6.11 Disk management

66 Copyright © Acronis, Inc., 2000-2010 trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depen

Strona 182 - Starting the operations

Copyright © Acronis, Inc., 2000-2010 67 the prompt when scheduling a backup to removable media. Then, if the removable media is available (for exam

Strona 183 - 6.11.5 Disk operations

68 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information

Strona 184 - Basic disk cloning

Copyright © Acronis, Inc., 2000-2010 69 File-level security (p. 71): Recover files with their security settings - + - + Error handling (p. 74):

Strona 185 - Using advanced options

Copyright © Acronis, Inc., 2000-2010 7 Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the G

Strona 186 - Disk conversion: GPT to MBR

70 Copyright © Acronis, Inc., 2000-2010 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  E

Strona 187 - System disk conversion

Copyright © Acronis, Inc., 2000-2010 71 When the check box is not selected, the command execution result does not affect the task execution failure

Strona 188 - 6.11.6 Volume operations

72 Copyright © Acronis, Inc., 2000-2010 The option enables you to receive e-mail notifications about the recovery task's successful completion

Strona 189 - Types of dynamic volumes

Copyright © Acronis, Inc., 2000-2010 73 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine e

Strona 190 - Create volume wizard

74 Copyright © Acronis, Inc., 2000-2010 This option is not available when operating under the bootable media. The option defines whether the agent(

Strona 191 - Set the volume size

Copyright © Acronis, Inc., 2000-2010 75 For example, if the network location becomes unavailable or not reachable, the program will attempt to reac

Strona 192 - Delete volume

76 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.

Strona 193 - Change volume letter

Copyright © Acronis, Inc., 2000-2010 77 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is

Strona 194 - Format volume

78 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to

Strona 195 - 6.11.7 Pending operations

Copyright © Acronis, Inc., 2000-2010 79 Vault content The Vault content section contains the archives table and toolbar. The archives table display

Strona 196

8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o

Strona 197 - Glossary

80 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault

Strona 198

Copyright © Acronis, Inc., 2000-2010 81 3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree,

Strona 199 - Backup policy (Policy)

82 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes

Strona 200 - Built-in group

Copyright © Acronis, Inc., 2000-2010 83 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap

Strona 201 - Cleanup

Copyright © Acronis, Inc., 2000-2010 84 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a

Strona 202

Copyright © Acronis, Inc., 2000-2010 85 What-ifs  What if an event occurs (and a condition, if any, is met) while the previous task run has not c

Strona 203 - Disk group

86 Copyright © Acronis, Inc., 2000-2010 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P

Strona 204 - Dynamic group

Copyright © Acronis, Inc., 2000-2010 87 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.

Strona 205 - Full backup

88 Copyright © Acronis, Inc., 2000-2010 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still b

Strona 206

Copyright © Acronis, Inc., 2000-2010 89 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 0

Strona 207

Copyright © Acronis, Inc., 2000-2010 9 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel

Strona 208

90 Copyright © Acronis, Inc., 2000-2010 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every m

Strona 209 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2010 91 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not

Strona 210

92 Copyright © Acronis, Inc., 2000-2010 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block

Strona 211 -  Windows Vista (PE 2.0)

Copyright © Acronis, Inc., 2000-2010 93 To view properties of an event, including the event source and event number 1. In Event Viewer, click the

Strona 212

94 Copyright © Acronis, Inc., 2000-2010 Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If

Strona 213

Copyright © Acronis, Inc., 2000-2010 95 time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that the b

Strona 214

96 Copyright © Acronis, Inc., 2000-2010 (2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the user h

Strona 215

Copyright © Acronis, Inc., 2000-2010 97 6 Direct management This section covers operations that can be performed directly on a managed machine by

Strona 216

98 Copyright © Acronis, Inc., 2000-2010 No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on

Strona 217

Copyright © Acronis, Inc., 2000-2010 99 A backup plan is a set of rules that specify how the given data will be protected on a given machine. Physi

Komentarze do niniejszej Instrukcji

Brak uwag