ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition, ES podręczniki

Instrukcje obsługi i podręczniki użytkownika dla Licencje / aktualizacje oprogramowania ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition, ES.
Dostarczamy 1 pdf podręczników ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition, ES do pobrania za darmo według typów dokumentów: Podręcznik Użytkownika


Spis treści

User's Guide

1

Table of contents

3

1 Introducing Acronis

8

Backup & Recovery™ 10

8

1.2 Getting started

9

Navigation tree

12

Shortcuts bar

13

Actions

14

How to expand/minimize panes

15

Action pages

16

Action page - Controls

17

1.3.1 Agent for Windows

18

1.3.2 Agent for Linux

19

1.3.3 Agent for ESX/ESXi

20

1.3.4.2 Storage Node

21

1.3.4.3 PXE Server

22

1.3.4.4 License Server

22

1.4 Supported file systems

23

Acronis License Server

24

10 Storage Node

24

1.6 System requirements

26

1.7 Technical Support

27

2.1 Basic concepts

28

Backup using bootable media

30

2.3 Owners and credentials

33

Full backup

34

Incremental backup

35

Differential backup

35

2.5 GFS backup scheme

36

The resulting archive: ideal

38

The resulting archive: real

38

Tower of Hanoi overview

40

Tower of Hanoi by Acronis

40

2.7 Retention rules

42

Combination of rules 1 and 2

43

Best practices

44

Backing up dynamic volumes

45

Recovering dynamic volumes

45

Backup (GUI)

46

2.9.2 Backing up MD devices

47

Preparation

50

Virtual machines backup

50

Guest operating systems

51

Guest HDD

51

Troubleshooting

51

2.12 Tape support

52

2.13 Support for SNMP

54

2.14.1 Acronis Secure Zone

55

Restore)

57

Limitations

58

Getting Universal Restore

58

Supported operating systems

58

Limitation

59

How it works

59

Usage scenarios

59

How to use

59

2.15.1 Basic concepts

60

Setting up the storage node

63

 Operating system (OS)

65

 IP address range

65

2.15.3.4 Example

66

Policy on a machine

68

Policy on a group

68

Backup policy state diagram

73

2.15.6 Deduplication

75

Deduplication database

76

Deduplication at source

76

Deduplication at target

76

Compacting

77

What ratio to expect

78

Local connection

80

Remote connection

80

Example 1

82

Example 2

82

On a domain controller

83

Remote Agent ports

88

Client Encryption options

88

Server Encryption options

89

2.15.8.5 SSL certificates

90

Certificate path

91

Self-signed certificates

91

Non-self-signed certificates

92

3 Options

93

3.1.3 Time-based alerts

94

3.1.4 Number of tasks

94

3.1.5 Fonts

94

3.2.1 Logging level

95

3.2.2 Log cleanup rules

95

3.2.3 Event tracing

96

3.2.5 Acronis WOL Proxy

97

3.2.6 VM protection options

97

3.2.7 Online backup proxy

98

3.3 Machine options

99

3.3.2 Event tracing

100

Windows

101

3.3.3 Log cleanup rules

102

3.3.4 Online backup proxy

102

3.4.1.1 Archive protection

105

3.4.1.3 Pre/Post commands

107

Pre-backup command

108

Post-backup command

108

Pre-data capture command

109

Post-data capture command

110

 Always create a snapshot

111

 Do not create a snapshot

111

3.4.1.8 Compression level

112

3.4.1.9 Backup performance

113

Backup priority

113

HDD writing speed

113

Network connection speed

114

3.4.1.10 Notifications

114

Messenger service (WinPopup)

115

3.4.1.11 Event tracing

116

Windows event log

116

SNMP notifications

116

3.4.1.13 Backup splitting

117

3.4.1.15 Media components

118

3.4.1.16 Error handling

119

3.4.1.17 Dual destination

120

Skip the task execution

121

3.4.1.20 Tape support

122

Always use a free tape

123

Reset archive bit

124

Use FTP in Active mode

125

3.4.2.1 Pre/Post commands

127

Pre-recovery command

127

Post-recovery command

128

3.4.2.2 Recovery priority

128

3.4.2.3 File-level security

129

3.4.2.4 Notifications

129

3.4.2.5 Event tracing

130

3.4.2.6 Error handling

132

3.4.2.7 Additional settings

132

3.4.2.8 VM power management

133

4 Vaults

135

4.1 Centralized vaults

136

Vault toolbar

137

Pie chart with legend

137

Vault content

137

Vault path

140

Vault database path

141

Vault encryption

141

4.1.3 Tape libraries

143

4.1.3.2 Hardware

144

4.1.3.3 Limitations

144

4.1.3.4 RSM Media Pools

145

Prerequisites

146

Backing up to tape library

147

Recovering from tape library

148

Inventory

149

Labeling

150

4.1.3.7 Tape support

150

4.1.3.8 Tape rotation

151

Choosing a backup scheme

152

Criteria of the choice

152

Case to analyze

153

GFS Example 1

154

GFS Example 2

157

GFS Example 3

159

ToH Example 1

161

ToH Example 2

162

ToH Example 3

163

Tape planning

163

Tape planning: Example 1

164

Tape planning: Example 2

165

4.1.3.9 What if

165

4.2 Personal vaults

166

Metadata

167

4.3 Common operations

169

To show or hide columns

172

5 Scheduling

173

5.1 Daily schedule

174

 first at 8 AM

175

 second at 12 PM (noon)

175

 third at 3 PM

175

 fourth at 5 PM

175

 fifth at 7 PM

175

5.2 Weekly schedule

176

5.3 Monthly schedule

178

Examples

179

Parameters

181

Use Wake-On-LAN

182

To specify advanced settings

183

5.7 Conditions

184

5.7.1 User is idle

185

5.7.3 Fits time interval

186

5.7.4 User logged off

186

Example

187

Example:

187

6 Direct management

188

Activities

189

System view

190

Way of working

190

Backup plan execution states

191

Backup plan statuses

191

Task states

192

Task statuses

193

 Backup plan (p. 203)

194

 Recovery task (p. 230)

194

 Validation task (p. 251)

194

Run backup plan

198

Task details

198

Archive

199

Settings

199

Backup plan details

200

6.1.3 Log

201

6.2 Creating a backup plan

203

General

204

What to backup

204

Where to back up

204

How to back up

205

Archive validation

205

Backup options

205

Convert to VM

205

To specify credentials

206

Parameters specification

207

6.2.4 Source type

208

6.2.5 Items to back up

209

6.2.7 Exclusions

211

6.2.8 Archive

213

3. Naming the new archive

214

6.2.9.1 Usage examples

215

6.2.9.2 The [DATE] variable

217

6.2.11 Backup schemes

219

6.2.11.3 Simple scheme

220

At a glance

223

Roll-back period

224

6.2.12 Archive validation

228

6.3 Recovering data

230

What to recover

231

Where to recover

231

When to recover

232

Recovery options

232

6.3.1 Task credentials

233

6.3.2 Archive selection

233

6.3.3 Data type

234

6.3.4 Content selection

234

6.3.4.2 Files selection

235

6.3.6 Destination selection

236

Disk destination

237

NT signature

237

6.3.6.2 Volumes

237

MBR destination

238

Volume destination

239

Volume properties

239

Storage

240

6.3.6.5 File destination

241

Recovery exclusions

241

Overwriting

242

6.3.8 When to recover

243

6.3.9 Universal Restore

243

Universal Restore settings

244

Post-conversion operations

246

Windows NT/2000/XP/2003

249

Windows Vista/2008

249

6.4.1 Task credentials

252

6.4.2 Archive selection

253

6.4.3 Backup selection

254

6.4.4 Location selection

254

6.5 Mounting an image

255

6.5.1 Archive selection

256

6.5.2 Backup selection

257

6.5.3 Access credentials

257

6.6 Managing mounted images

258

6.7.1 Task credentials

261

6.7.2 Archive selection

262

6.7.3 Backup selection

263

6.7.5 Location selection

263

2. Using the archives table

264

6.8 Acronis Secure Zone

265

To set up a password

266

To disable password

266

6.8.1.4 Result confirmation

267

6.10 Bootable media

269

Linux-based bootable media

270

PE-based bootable media

270

Using Bart PE

271

Kernel parameters

272

Network settings

274

Network port

275

\winpe_x86\ISO

277

To add an iSCSI device

279

Linux commands and utilities

280

Mounting backup volumes

284

6.10.6 Acronis PXE Server

285

6.11 Disk management

287

Starting the operations

288

6.11.5 Disk operations

289

6.11.5.2 Basic disk cloning

290

Using advanced options

291

System disk conversion

293

6.11.6 Volume operations

295

Create volume wizard

296

Select destination disks

297

Set the volume size

297

Set the volume options

298

6.11.6.2 Delete volume

299

6.11.6.3 Set active volume

299

6.11.6.6 Format volume

300

6.11.7 Pending operations

301

7 Centralized management

303

7.1.2 Backup policies

305

Machines selection

308

7.1.2.4 Policy details

309

7.1.3 Physical machines

310

7.1.3.1 Actions on machines

311

Applying policies

312

Grouping actions

312

Other actions

313

To add a machine

314

Text file requirements

315

Adding machines to a group

317

Machine details

317

Plans and tasks

319

Member of

321

Inheritance order

322

7.1.3.2 Actions on groups

323

Adding multiple criteria

324

Move one group to another

326

Editing custom groups

326

Group details

326

7.1.4 Virtual machines

327

Grouping of virtual machines

329

VMotion

333

Storage VMotion

333

Performance considerations

333

Privileges for a folder

335

7.1.5 Storage nodes

336

 Information panel

337

Adding a storage node

338

7.1.6 Tasks

339

7.1.6.1 Actions on tasks

340

7.1.7 Log

342

Configuring the log table

344

7.1.8 Reporting

345

Generating reports

346

Filters

346

Report view

347

Report coverage

349

7.1.8.8 Column selection

350

7.1.8.9 Report view

350

Connection parameters

362

Event tracing parameters

364

What to back up

368

7.3.1 Policy credentials

370

7.3.2 Items to back up

370

Names for logical volumes

373

7.3.4 Exclusions

375

7.3.5 Archive

377

7.3.7.1 Back up now scheme

379

7.3.7.3 Simple scheme

379

Description

380

Resulting tasks

387

8 Online backup

388

Server uses a free license

390

8.1.7 Initial Seeding FAQ

392

Hard drive types

394

Packaging

394

Scale Recovery?

397

To renew a subscription

400

8.2 Where do I start?

401

8.3 Choosing a subscription

401

Trial subscriptions

402

Operations

405

Backup and recovery options

405

8.7 Terminology reference

406

9 Glossary

408

Backup plan (Plan)

410

Backup policy (Policy)

410

Backup scheme

411

Bootable agent

411

Bootable media

411

Built-in group

411

Centralized backup plan

412

Centralized management

412

Centralized task

412

Centralized vault

412

Direct management

414

Disk backup (Image)

414

Disk group

414

Dynamic disk

415

Dynamic group

415

Dynamic volume

416

Encrypted archive

416

Encrypted vault

416

Managed vault

418

Media builder

418

Personal vault

418

Physical machine

418

Storage node-side cleanup

420

Storage node-side validation

420

Tower of Hanoi

420

Unmanaged vault

421

Validation

421

Validation rules

421

Virtual machine

422





Więcej produktów i instrukcji dla Licencje / aktualizacje oprogramowania ACRONIS

Modele Rodzaj dokumentu
Backup & Recovery 10 Advanced Server, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Advanced Server, ES, 411 strony
Backup & Recovery 10 Advanced Workstation, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Advanced Workstation, EN, 401 strony
Backup & Recovery 10 Server for Windows, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Server for Windows, ES, 241 strony
Backup & Recovery 10 Workstation, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Workstation, EN, 240 strony
DCTXRPEND26 Podręcznik Użytkownika   Acronis DCTXRPEND25, 31 strony
DISK DIRECTOR SERVER 10 Podręcznik Użytkownika   ACRONIS DISK DIRECTOR SERVER 10 User`s guide, 94 strony
PRIVACY EXPERT CORPORATE - Instrukcja Użytkownika   Acronis Privacy Expert Corporate Installation Guide, 8 strony
A1ENLPDEE22 Arkusz Danych   Acronis Backup Advanced for Exchange v11.5, 13 strony
TPDXMSENS71 Arkusz Danych   Acronis Backup & Recovery 11.5 Advanced Workstation, 1Y, 2 strony
DDSXRBFRA33 Arkusz Danych   Acronis Disk Director Server 10.0, AAS>AAP, ALP, 50-499u, Upg, FR, 2 strony
DDDMLPDES21 Arkusz Danych   Acronis DDDMLPDES21, 92 strony