ACRONIS Backup & Recovery 10 Workstation, AAP, GOV/SV, L1, 50-499u, DEU Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Oprogramowanie do odzyskiwania kopii zapasowych ACRONIS Backup & Recovery 10 Workstation, AAP, GOV/SV, L1, 50-499u, DEU. Acronis Backup & Recovery 10 Workstation, AAP, MNT, 50-499u, ENG Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 241
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Workstation

Update 3 Acronis® Backup & Recovery ™ 10 Workstation User's Guide

Strona 2

10 Copyright © Acronis, Inc., 2000-2010 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficientl

Strona 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 5.6.5 Time since last backup Applies to: Windows, Linux Enables to put a backup task run on hold until t

Strona 4

101 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by

Strona 5

102 Copyright © Acronis, Inc., 2000-2010 Create now will launch the Bootable Media Builder (p. 237). No backups have been created for X days Back

Strona 6

103 Copyright © Acronis, Inc., 2000-2010 Alternatively, you can review the task execution states in the Backup plans and tasks (p. 103) view and sp

Strona 7 - 1.2 Getting started

104 Copyright © Acronis, Inc., 2000-2010 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one ta

Strona 8

105 Copyright © Acronis, Inc., 2000-2010 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK in

Strona 9 - Shortcuts bar

106 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta

Strona 10 - Actions

107 Copyright © Acronis, Inc., 2000-2010 6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guidelin

Strona 11 - How to expand/minimize panes

108 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all

Strona 12 - "Tasks" view

109 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p

Strona 13 - Action pages

11 Copyright © Acronis, Inc., 2000-2010 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acr

Strona 14 - 1.3.1 Agent for Windows

110 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos

Strona 15 - 1.4 Supported file systems

111 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Strona 16 - 1.6 System requirements

112 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery o

Strona 17 - 1.7 Technical Support

113 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The

Strona 18 - 2.1 Basic concepts

114 Copyright © Acronis, Inc., 2000-2010  Validation (if selected) - events before or after which the validation is performed, and validation sch

Strona 19

115 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following  Click View Details. Th

Strona 20 - Backup using bootable media

116 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I

Strona 21

117 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for

Strona 22 - Full backup

118 Copyright © Acronis, Inc., 2000-2010 Access credentials (p. 128) [Optional] Provide credentials for the location if the plan account does not h

Strona 23 - Differential backup

119 Copyright © Acronis, Inc., 2000-2010 Virtualization server (p. 139) Here you select the resulting virtual machine type and location. Available

Strona 24 - 2.4 Owners and credentials

12 Copyright © Acronis, Inc., 2000-2010 and action pages according the items you select in the menu, Navigation tree, or on the Actions and Tools p

Strona 25 - 2.5 GFS backup scheme

120 Copyright © Acronis, Inc., 2000-2010 Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Sel

Strona 26 - GFS by Acronis

121 Copyright © Acronis, Inc., 2000-2010 Windows The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hi

Strona 27 - The resulting archive: ideal

122 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl

Strona 28 - The resulting archive: real

123 Copyright © Acronis, Inc., 2000-2010 Windows By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\

Strona 29 - Tower of Hanoi overview

124 Copyright © Acronis, Inc., 2000-2010  To back up data to a locally attached tape device, expand the Tape drives group, then click the require

Strona 30 - Tower of Hanoi by Acronis

125 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 128) to the archive name. If you do not

Strona 31 - 2.7 Retention rules

126 Copyright © Acronis, Inc., 2000-2010  Your script can move older backups based on the date stamp. See also “The *Date+ variable” (p. 128). E

Strona 32 - 1. Delete backups older than

127 Copyright © Acronis, Inc., 2000-2010  You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday

Strona 33 - Combination of rules 1 and 2

128 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each

Strona 34 - Backing up dynamic volumes

129 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the

Strona 35 - Recovering dynamic volumes

13 Copyright © Acronis, Inc., 2000-2010 Action pages An action page appears in the main area when clicking any action item in the Actions menu, or

Strona 36 - 2.9 Tape support

130 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.

Strona 37

131 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W

Strona 38 - 2.10 Support for SNMP

132 Copyright © Acronis, Inc., 2000-2010  Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows.  Start bac

Strona 39 - 2.11.1 Acronis Secure Zone

133 Copyright © Acronis, Inc., 2000-2010  Have a weekly summary of file changes since last month (Friday weekly differential backup).  Have a m

Strona 40 - Limitation

134 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p.

Strona 41 - Restore)

135 Copyright © Acronis, Inc., 2000-2010 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 to 2 days 1

Strona 42 - Supported operating systems

136 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If the

Strona 43 - How to use

137 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b

Strona 44

138 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six

Strona 45 - 3 Options

139 Copyright © Acronis, Inc., 2000-2010 Validation of the archive will validate all the archive’s backups and may take a long time and a lot of sy

Strona 46 - 3.1.5 Fonts

14 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you st

Strona 47 - 3.2 Machine options

140 Copyright © Acronis, Inc., 2000-2010  Agent for Hyper-V is installed on the host You can choose between creating a virtual machine on the Hy

Strona 48 - 3.2.1.2 SNMP notifications

141 Copyright © Acronis, Inc., 2000-2010 A dynamic volume can be recovered over an existing volume, to unallocated space of a disk group, or to una

Strona 49 - 3.2.3 Online backup proxy

142 Copyright © Acronis, Inc., 2000-2010 after the recovery is started. The operating system boots from the backup image and the machine becomes op

Strona 50

143 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Run under the current user The task will run un

Strona 51

144 Copyright © Acronis, Inc., 2000-2010 After entering access credentials, the folders on the server become available. Click the appropriate folde

Strona 52 - 3.3.1.1 Archive protection

145 Copyright © Acronis, Inc., 2000-2010  The disk geometry is different to that stored in the backup. There are probably other times when you ma

Strona 53

146 Copyright © Acronis, Inc., 2000-2010 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Phys

Strona 54 - 3.3.1.3 Pre/Post commands

147 Copyright © Acronis, Inc., 2000-2010 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot

Strona 55 - Pre-backup command

148 Copyright © Acronis, Inc., 2000-2010 If Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. These agents en

Strona 56 - Post-backup command

149 Copyright © Acronis, Inc., 2000-2010 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. The Linux-styl

Strona 57 - Post-data capture command

15 Copyright © Acronis, Inc., 2000-2010 File backup File-level data protection is based on backing up files and folders residing on the machine whe

Strona 58 -  Do not create a snapshot

150 Copyright © Acronis, Inc., 2000-2010 Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter

Strona 59 - 3.3.1.8 Compression level

151 Copyright © Acronis, Inc., 2000-2010 set by the virtualization product. You can add virtual disks to the machine configuration or, in some case

Strona 60 - HDD writing speed

152 Copyright © Acronis, Inc., 2000-2010 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders with names

Strona 61 - 3.3.1.10 Notifications

153 Copyright © Acronis, Inc., 2000-2010  Password. The password for the account. 2. Click OK. 6.3.8 When to recover Select when to start the

Strona 62 - Messenger service (WinPopup)

154 Copyright © Acronis, Inc., 2000-2010 Universal Restore settings Automatic driver search Specify where the program will search for the Hardware

Strona 63 - SNMP notifications

155 Copyright © Acronis, Inc., 2000-2010 With Acronis Backup & Recovery 10 Agent for Windows, you can recover a disk (volume) backup to a new v

Strona 64 - 3.3.1.13 Backup splitting

156 Copyright © Acronis, Inc., 2000-2010 You will be taken to the Backup plans and tasks view where you can examine the state and progress of the r

Strona 65 - Fixed size

157 Copyright © Acronis, Inc., 2000-2010 One part of the GRUB loader resides either in the first several sectors of the disk or in the first severa

Strona 66 - 3.3.1.16 Error handling

158 Copyright © Acronis, Inc., 2000-2010 cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup 5. Edit the /mnt/system/boot/gr

Strona 67 - 3.3.1.17 Dual destination

159 Copyright © Acronis, Inc., 2000-2010 6.3.11.2 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot

Strona 68

16 Copyright © Acronis, Inc., 2000-2010  NTFS  Ext2/Ext3/Ext4  ReiserFS3 - particular files cannot be recovered from disk backups located on

Strona 69 - Skip the task execution

160 Copyright © Acronis, Inc., 2000-2010 To create a validation task, perform the following steps. General Task name [Optional] Enter a unique name

Strona 70 - Reset archive bit

161 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma

Strona 71 - Use FTP in Active mode

162 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Strona 72

163 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun

Strona 73 - Pre-recovery command

164 Copyright © Acronis, Inc., 2000-2010  Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med

Strona 74 - 3.3.2.3 File-level security

165 Copyright © Acronis, Inc., 2000-2010 ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port

Strona 75 - 3.3.2.4 Notifications

166 Copyright © Acronis, Inc., 2000-2010 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers

Strona 76 - 3.3.2.5 Event tracing

167 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient

Strona 77 - 3.3.2.6 Error handling

168 Copyright © Acronis, Inc., 2000-2010 The resulting archive's options The exported archive inherits the options of the original archive, in

Strona 78 - 3.3.2.7 Additional settings

169 Copyright © Acronis, Inc., 2000-2010 Task credentials (p. 169) [Optional] The export task will run on behalf of the user who is creating the ta

Strona 79

17 Copyright © Acronis, Inc., 2000-2010 Workstation 80 MB 1 GB 500 MB 1024*768 pixels or higher Bootable Media Builder (Windows) 80 MB 700 MB 300

Strona 80 - 4 Vaults

170 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma

Strona 81 - 4.1 Personal vaults

171 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Strona 82 - Vault content

172 Copyright © Acronis, Inc., 2000-2010  To export data to a personal vault, expand the Personal vaults group and click the vault.  To export

Strona 83 - How can I merge two vaults?

173 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Use the task credentials The program will acces

Strona 84 - 4.2 Common operations

174 Copyright © Acronis, Inc., 2000-2010 6.8.1.1 Acronis Secure Zone Disk The Acronis Secure Zone can be located on any fixed hard drive. Acronis

Strona 85

175 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi

Strona 86 - To show or hide columns

176 Copyright © Acronis, Inc., 2000-2010 3. Specify the new size of the zone by:  dragging the slider and selecting any size between the current

Strona 87 - 5 Scheduling

177 Copyright © Acronis, Inc., 2000-2010 (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by

Strona 88 - 5.1 Daily schedule

178 Copyright © Acronis, Inc., 2000-2010 PE-based bootable media PE-based bootable media contains a minimal Windows system called Windows Preinstal

Strona 89

179 Copyright © Acronis, Inc., 2000-2010 Bootable Media or, as a separate component. The wizard will guide you through the necessary operations. Pl

Strona 90 - 5.2 Weekly schedule

18 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Strona 91

180 Copyright © Acronis, Inc., 2000-2010  If not configured, the Acronis loader waits for someone to select whether to boot the operating system

Strona 92 - 5.3 Monthly schedule

181 Copyright © Acronis, Inc., 2000-2010 vga=mode_number Specifies the video mode to be used by the bootable media's graphical user interface.

Strona 93

182 Copyright © Acronis, Inc., 2000-2010 These calls might not work properly on some machines. But this may be the only way to get the interrupt ro

Strona 94

183 Copyright © Acronis, Inc., 2000-2010  the default port  the currently used port  the new port (enter the port number). If the port has no

Strona 95

184 Copyright © Acronis, Inc., 2000-2010 To add Acronis Plug-in to WinPE 1.x: 1. Unpack all files of your WinPE 1.x ISO to a separate folder on th

Strona 96

185 Copyright © Acronis, Inc., 2000-2010 4. Specify network settings (p. 182) for the machine network adapters or choose DHCP auto configuration.

Strona 97 - 5.6 Conditions

186 Copyright © Acronis, Inc., 2000-2010 11. Specify the output folder and the full path to the resulting ISO file including the file name or the m

Strona 98 - 5.6.3 Fits time interval

187 Copyright © Acronis, Inc., 2000-2010 After entering access credentials, you will see a list of archives located in the vault. 6.10.3.1 Settin

Strona 99 - 5.6.4 User logged off

188 Copyright © Acronis, Inc., 2000-2010 6.10.4 List of commands and utilities available in Linux-based bootable media Linux-based bootable media

Strona 100 - Example:

189 Copyright © Acronis, Inc., 2000-2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdu

Strona 101 - 6 Direct management

19 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Strona 102 - System view

190 Copyright © Acronis, Inc., 2000-2010 To create the volume structure by using a script 1. Boot the machine from a Linux-based bootable media. 2

Strona 103 - Backup plan execution states

191 Copyright © Acronis, Inc., 2000-2010 Example Suppose that you previously performed a disk backup of a machine with the following disk configura

Strona 104 - Backup plan statuses

192 Copyright © Acronis, Inc., 2000-2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size

Strona 105 - Task states

193 Copyright © Acronis, Inc., 2000-2010 2. Use the --mount command, specifying the volume's index in the -i parameter. For example: trueimag

Strona 106 - Task statuses

194 Copyright © Acronis, Inc., 2000-2010 6.11.2 Running Acronis Disk Director Lite You can run Acronis Disk Director Lite under Windows or start i

Strona 107 -  Validation task (p. 159)

195 Copyright © Acronis, Inc., 2000-2010 Starting the operations Any operation can be launched:  From the volume or disk context menu (both in th

Strona 108

196 Copyright © Acronis, Inc., 2000-2010 3. In the window, you will be able to set the disk partitioning scheme (MBR or GPT) and the disk type (ba

Strona 109

197 Copyright © Acronis, Inc., 2000-2010 But with the wide range of available hardware it is normal that the target disk would differ in size from

Strona 110

198 Copyright © Acronis, Inc., 2000-2010 5. Wait until the machine is turned off. 6. Disconnect either the source or the target hard disk drive f

Strona 111 - Task details

199 Copyright © Acronis, Inc., 2000-2010 If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the

Strona 112 - Settings

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Strona 113 - Backup plan details

20 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Strona 114 - 6.1.3 Log

200 Copyright © Acronis, Inc., 2000-2010 6.11.5.6 Disk conversion: dynamic to basic You would want to convert dynamic disks back to basic ones, e

Strona 115

201 Copyright © Acronis, Inc., 2000-2010  Online The online status means that a disk is accessible in the read-write mode. This is the normal dis

Strona 116 - 6.2 Creating a backup plan

202 Copyright © Acronis, Inc., 2000-2010 Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can

Strona 117 - Where to back up

203 Copyright © Acronis, Inc., 2000-2010 Its pages will enable you to enter operation parameters, proceeding step-by-step further on and return to

Strona 118 - Convert to VM

204 Copyright © Acronis, Inc., 2000-2010 If you are creating a dynamic volume and select one or several basic disks, as its destination, you will r

Strona 119 - 6.2.3 Source type

205 Copyright © Acronis, Inc., 2000-2010 A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be conve

Strona 120 - 6.2.4 Items to back up

206 Copyright © Acronis, Inc., 2000-2010 Please note, that due to setting the new active volume, the former active volume letter might be changed a

Strona 121

207 Copyright © Acronis, Inc., 2000-2010 3. By clicking OK in the Change label window, you'll add the pending operation of changing the volum

Strona 122 - 6.2.6 Exclusions

208 Copyright © Acronis, Inc., 2000-2010 The Disk management view contains the toolbar with icons to launch the Undo, Redo and Commit actions inten

Strona 123 - 6.2.7 Archive

209 Copyright © Acronis, Inc., 2000-2010 7 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online ser

Strona 124

21 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Strona 125 - 6.2.8.1 Usage examples

210 Copyright © Acronis, Inc., 2000-2010 7.1.3 How long will my backups be kept in the online storage? Your backups remain in the online storage

Strona 126

211 Copyright © Acronis, Inc., 2000-2010 7.1.5.3 Can I use Acronis Universal Restore when recovering a system from the online storage? Yes. Acroni

Strona 127

212 Copyright © Acronis, Inc., 2000-2010 7.1.6.1 What is Initial Seeding? Initial Seeding is an extra service that lets you save an initial full b

Strona 128 - 6.2.8.2 The [DATE] variable

213 Copyright © Acronis, Inc., 2000-2010 Having purchased a license from an Acronis partner, you receive a confirmation e-mail with a registration

Strona 129 - 6.2.10 Backup schemes

214 Copyright © Acronis, Inc., 2000-2010 Packaging If possible, use the original packaging. Otherwise, packaging materials can be obtained at any s

Strona 130 - 6.2.10.3 Simple scheme

215 Copyright © Acronis, Inc., 2000-2010 Step 4 Choose the transport company that you will use for shipping. On this company's web site, pre

Strona 131 - Examples

216 Copyright © Acronis, Inc., 2000-2010 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending your hard driv

Strona 132

217 Copyright © Acronis, Inc., 2000-2010  The order has been completed. The media has been returned (or: Returning the media was not requested) –

Strona 133 - At a glance

218 Copyright © Acronis, Inc., 2000-2010 7.1.7.6 Can I obtain backups taken from a number of machines on a single hard drive? No. A separate hard

Strona 134 - Roll-back period

219 Copyright © Acronis, Inc., 2000-2010 7.1.8 Subscription lifecycle FAQ This section explains a subscription lifecycle and subscription operatio

Strona 135

22 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Strona 136

220 Copyright © Acronis, Inc., 2000-2010 An expired subscription can be renewed within five days after expiration. In such cases, the new subscript

Strona 137

221 Copyright © Acronis, Inc., 2000-2010 7.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not register

Strona 138 - 6.2.11 Archive validation

222 Copyright © Acronis, Inc., 2000-2010 the backup will fail. With a server subscription, you can only back up the Windows host. With a subscripti

Strona 139

223 Copyright © Acronis, Inc., 2000-2010 Reassigning a subscription does not restart its subscription period. To assign an activated subscription t

Strona 140 - 6.3 Recovering data

224 Copyright © Acronis, Inc., 2000-2010 After reassigning Delete backups from Subscription 1 using Machine 2. You cannot delete backups from Subsc

Strona 141 - Where to recover

225 Copyright © Acronis, Inc., 2000-2010  Dual destination (p. 67) By using the Backup performance > Network connection speed option, you can

Strona 142 - 6.3.1 Task credentials

226 Copyright © Acronis, Inc., 2000-2010 Reassign a subscription Assign a subscription that is already activated, to a different machine. Registrat

Strona 143 - 6.3.2 Archive selection

227 Copyright © Acronis, Inc., 2000-2010 8 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi

Strona 144 - 6.3.4 Content selection

228 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup

Strona 145 - 6.3.6 Destination selection

229 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 228), such as pre/post backup commands,

Strona 146 - Disk destination

23 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Strona 147 - 6.3.6.2 Volumes

230 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 228) installed on the machine finds data items using the selection rule

Strona 148 - Volume destination

231 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre

Strona 149 - Volume properties

232 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 228) from a backup archive (p. 228) in order to get rid of outdated backups o

Strona 150 - Storage

233 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 236) using the direc

Strona 151 - Recovery exclusions

234 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/

Strona 152 - Overwriting

235 Copyright © Acronis, Inc., 2000-2010  the administrator changes the criteria so that the machine does not meet them anymore. There is no way

Strona 153 - 6.3.9 Universal Restore

236 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 228) containing all data chosen for backup. You do not need acc

Strona 154 - Universal Restore settings

237 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 231) managed by a storage node (p. 238). Archives (p. 228) in a mana

Strona 155

238 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 229). Policy See Backup policy (p. 229). R Recovery point Date and time to whic

Strona 156 - Post-conversion operations

239 Copyright © Acronis, Inc., 2000-2010  prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Strona 157

24 Copyright © Acronis, Inc., 2000-2010 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation

Strona 158

240 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog

Strona 159 - Windows Vista/2008

241 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 236) is considered vi

Strona 160 - 6.4.1 Task credentials

25 Copyright © Acronis, Inc., 2000-2010 When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task

Strona 161 - 6.4.2 Archive selection

26 Copyright © Acronis, Inc., 2000-2010 “sons”; weekly backups are referred to as “fathers”; the longest lived monthly backups are called “grandfat

Strona 162 - 6.4.4 Location selection

27 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Strona 163 - 6.5 Mounting an image

28 Copyright © Acronis, Inc., 2000-2010 “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M

Strona 164 - 6.5.1 Archive selection

29 Copyright © Acronis, Inc., 2000-2010 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b

Strona 165 - 6.5.3 Access credentials

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...7 1.1 A

Strona 166 - 6.6 Managing mounted images

30 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Strona 167

31 Copyright © Acronis, Inc., 2000-2010  the pattern starts with a full backup since the very first backup cannot be incremental  the scheme fo

Strona 168

32 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules

Strona 169 - 6.7.1 Task credentials

33 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Strona 170 - 6.7.2 Archive selection

34 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Strona 171 - 6.7.5 Location selection

35 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Strona 172 - 3. Naming the new archive

36 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v

Strona 173 - 6.8 Acronis Secure Zone

37 Copyright © Acronis, Inc., 2000-2010 device (tape drive or tape library) by... Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - -

Strona 174 - To disable password

38 Copyright © Acronis, Inc., 2000-2010 6. Acronis Active Restore (p. 227) is not available when recovering from a tape. Recovery from a locally a

Strona 175 - 6.8.1.4 Result confirmation

39 Copyright © Acronis, Inc., 2000-2010  Type of event OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown"  Text description of the e

Strona 176 - Activate

3.3.1 Default backup options ...

Strona 177 - 6.10 Bootable media

40 Copyright © Acronis, Inc., 2000-2010 With the new Acronis Secure Zone behavior, you obtain the ability to:  list archives located in the zone

Strona 178 - Linux-based bootable media

41 Copyright © Acronis, Inc., 2000-2010 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover

Strona 179 - Using Bart PE

42 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i

Strona 180 - Kernel parameters

43 Copyright © Acronis, Inc., 2000-2010 How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. A

Strona 181

44 Copyright © Acronis, Inc., 2000-2010 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Res

Strona 182 - Network port

45 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Strona 183

46 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Strona 184

47 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Strona 185

48 Copyright © Acronis, Inc., 2000-2010 Use the Types of events to log check box to filter the events to be logged in the Application Event Log of

Strona 186

49 Copyright © Acronis, Inc., 2000-2010 3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine

Strona 187 - To add an NDAS device

6.3.8 When to recover ...

Strona 188 - Linux commands and utilities

50 Copyright © Acronis, Inc., 2000-2010 3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy server requires a

Strona 189

51 Copyright © Acronis, Inc., 2000-2010 Availability of the backup options The set of available backup options depends on:  The environment the a

Strona 190

52 Copyright © Acronis, Inc., 2000-2010 Media components (p. 66) Dest: removable media Dest: removable media - - Error handling (p. 66): Do not sho

Strona 191

53 Copyright © Acronis, Inc., 2000-2010 To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2.

Strona 192 - Mounting backup volumes

54 Copyright © Acronis, Inc., 2000-2010  Exclude files matching the following criteria Select this check box to skip files and folders whose name

Strona 193 - 6.11 Disk management

55 Copyright © Acronis, Inc., 2000-2010 The following scheme illustrates when pre/post commands are executed. Pre-backup command Backup Post-backup

Strona 194

56 Copyright © Acronis, Inc., 2000-2010 execution fails. Post-backup command To specify a command/executable file to be executed after the backup

Strona 195 - 6.11.5 Disk operations

57 Copyright © Acronis, Inc., 2000-2010 3. Click OK. Pre-data capture command To specify a command/batch file to be executed before data capture

Strona 196 - 6.11.5.2 Basic disk cloning

58 Copyright © Acronis, Inc., 2000-2010 Result Preset Continue the backup only after the command is successfully executed. Delete the TIB file and

Strona 197 - Using advanced options

59 Copyright © Acronis, Inc., 2000-2010 When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously.

Strona 198

7.1.7 Large Scale Recovery FAQ ...

Strona 199 - System disk conversion

60 Copyright © Acronis, Inc., 2000-2010 The optimal data compression level depends on the type of data being backed up. For example, even maximum c

Strona 200

61 Copyright © Acronis, Inc., 2000-2010 Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating

Strona 201 - 6.11.6 Volume operations

62 Copyright © Acronis, Inc., 2000-2010 To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notificatio

Strona 202 - Create volume wizard

63 Copyright © Acronis, Inc., 2000-2010 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the ser

Strona 203 - Select destination disks

64 Copyright © Acronis, Inc., 2000-2010 The option defines whether the agent(s) operating on the managed machine have to send the log events of the

Strona 204 - Set the volume options

65 Copyright © Acronis, Inc., 2000-2010 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows.  When backing up to a

Strona 205 - 6.11.6.3 Set active volume

66 Copyright © Acronis, Inc., 2000-2010 To completely eliminate this kind of problem, disable preserving file security settings in archives. The re

Strona 206

67 Copyright © Acronis, Inc., 2000-2010 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can set

Strona 207 - 6.11.7 Pending operations

68 Copyright © Acronis, Inc., 2000-2010 You might have to provide the access credentials for the secondary destination. Enter the credentials on pr

Strona 208

69 Copyright © Acronis, Inc., 2000-2010 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up data

Strona 209 - 7 Online backup

7 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Strona 210

70 Copyright © Acronis, Inc., 2000-2010 This option is effective when backing up to a removable media (CD, DVD, tape or floppy disk.) The preset i

Strona 211 - 7.1.6 Initial Seeding FAQ

71 Copyright © Acronis, Inc., 2000-2010 This option is effective for Windows and Linux operating systems and bootable media, when the backup destin

Strona 212

72 Copyright © Acronis, Inc., 2000-2010  The environment the agent operates in (Windows, bootable media)  The type of data being recovered (dis

Strona 213 - Hard drive types

73 Copyright © Acronis, Inc., 2000-2010 SNMP (p. 77) + + - - 3.3.2.1 Pre/Post commands This option is effective for Windows and Linux operating s

Strona 214 - Packaging

74 Copyright © Acronis, Inc., 2000-2010 command is successfully executed. Fail the task if the command execution failed. executed despite execution

Strona 215

75 Copyright © Acronis, Inc., 2000-2010 The preset is: Recover files with their security settings. If the file NTFS permissions were preserved duri

Strona 216

76 Copyright © Acronis, Inc., 2000-2010  Port – set the port of the SMTP server. By default, the port is set to 25.  User name – enter the user

Strona 217

77 Copyright © Acronis, Inc., 2000-2010 To select whether to log the recovery operations events in the Application Event Log of Windows: Select one

Strona 218

78 Copyright © Acronis, Inc., 2000-2010 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mo

Strona 219

79 Copyright © Acronis, Inc., 2000-2010 The option defines whether to reboot the machine automatically if it is required for recovery. Such might b

Strona 220 - To renew a subscription

8 Copyright © Acronis, Inc., 2000-2010 3. Connect the console to the machine where the agent is installed. Where to go from here For what to do ne

Strona 221 - 7.3 Choosing a subscription

80 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is

Strona 222 - Trial subscriptions

81 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to

Strona 223

82 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display

Strona 224 - Backup and recovery options

83 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vaul

Strona 225 - 7.7 Terminology reference

84 Copyright © Acronis, Inc., 2000-2010 2. Move the archives to vault B manually by means of a third-party file manager. 3. Edit the backup plans

Strona 226

85 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes

Strona 227 - 8 Glossary

86 Copyright © Acronis, Inc., 2000-2010 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap

Strona 228

87 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a

Strona 229 - Backup policy (Policy)

88 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed The scheduler behavior,

Strona 230 - Built-in group

89 Copyright © Acronis, Inc., 2000-2010 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters ar

Strona 231 - Centralized vault

9 Copyright © Acronis, Inc., 2000-2010 tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you

Strona 232

90 Copyright © Acronis, Inc., 2000-2010 task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the o

Strona 233 - Disk group

91 Copyright © Acronis, Inc., 2000-2010 Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certai

Strona 234 - Dynamic group

92 Copyright © Acronis, Inc., 2000-2010  Thursday: every 3 hours from 9 AM till 9 PM  Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)

Strona 235 - Encrypted vault

93 Copyright © Acronis, Inc., 2000-2010 Every: <...> From: <...> Until: <...> Set up how many times the task will be run during t

Strona 236

94 Copyright © Acronis, Inc., 2000-2010 To: 12/01/2010. Actually the task will end on the last workday of November. By setting up this date we just

Strona 237 - Physical machine

95 Copyright © Acronis, Inc., 2000-2010 For example, you may want to set up a backup plan that will automatically perform an emergency full backup

Strona 238

96 Copyright © Acronis, Inc., 2000-2010 WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When cr

Strona 239 - Tower of Hanoi

97 Copyright © Acronis, Inc., 2000-2010 5.6 Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with res

Strona 240 - Validation rules

98 Copyright © Acronis, Inc., 2000-2010  Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s). As a resu

Strona 241 - Virtual machine

99 Copyright © Acronis, Inc., 2000-2010  Condition: Fits the time interval, from 04:30:00 PM until 10:00:00 PM.  Task start conditions: Skip th

Komentarze do niniejszej Instrukcji

Brak uwag