3 Copyright © Acronis, Inc., 2000-2011
Table of contents
1 Introducing Acronis Backup & Recovery 11 ................................................................................ 9
1.1 What's new in Acronis Backup & Recovery 11 ....................................................................... 9
1.2 Acronis Backup & Recovery 11 components ........................................................................ 11
1.2.1 Agent for Windows ................................................................................................................................. 12
1.2.2 Agent for Linux........................................................................................................................................ 13
1.2.3 Agent for VMware vSphere ESX(i) .......................................................................................................... 13
1.2.4 Agent for Hyper-V ................................................................................................................................... 14
1.2.5 Components for centralized management............................................................................................. 14
1.2.6 Management Console ............................................................................................................................ 15
1.2.7 Bootable Media Builder .......................................................................................................................... 16
1.2.8 Acronis Wake-on-LAN Proxy ................................................................................................................... 16
1.3 Supported file systems ........................................................................................................ 16
1.4 Technical Support ............................................................................................................... 17
2 Getting started ......................................................................................................................... 18
2.1 Using the management console .......................................................................................... 21
2.1.1 "Navigation" pane................................................................................................................................... 22
2.1.2 Main area, views and action pages......................................................................................................... 24
2.1.3 Console options ...................................................................................................................................... 27
3 Understanding Acronis Backup & Recovery 11 ......................................................................... 30
3.1 Owners and credentials ...................................................................................................... 30
3.2 User privileges on a managed machine ............................................................................... 31
3.3 Full, incremental and differential backups ........................................................................... 32
3.4 What does a disk or volume backup store? ......................................................................... 33
3.5 About dynamic and logical volumes .................................................................................... 34
3.5.1 Backup and recovery of dynamic volumes (Windows)........................................................................... 34
3.5.2 Backup and recovery of logical volumes and MD devices (Linux) .......................................................... 36
3.6 Compatibility with encryption software .............................................................................. 42
3.7 Support for SNMP ............................................................................................................... 43
4 Backup ...................................................................................................................................... 45
4.1 Back up now ....................................................................................................................... 45
4.2 Creating a backup plan........................................................................................................ 45
4.2.1 Selecting data to back up ........................................................................................................................ 47
4.2.2 Access credentials for source ................................................................................................................. 48
4.2.3 Source files exclusion .............................................................................................................................. 49
4.2.4 Access credentials for archive location ................................................................................................... 50
4.2.5 Backup schemes ..................................................................................................................................... 51
4.2.6 Backup location selection ....................................................................................................................... 60
4.2.7 Archive validation ................................................................................................................................... 63
4.2.8 Backup plan's credentials ....................................................................................................................... 63
4.2.9 Label (Preserving machine properties in a backup) ................................................................................ 64
4.2.10 Why is the program asking for the password? ....................................................................................... 65
4.3 Simplified naming of backup files ........................................................................................ 65
4.3.1 Usage examples ...................................................................................................................................... 66
Komentarze do niniejszej Instrukcji