ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition, ES Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Licencje / aktualizacje oprogramowania ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition, ES. Acronis Backup & Recovery 10 Advanced Server Virtual Edition, ES Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - User's Guide

Update 3 Acronis® Backup & Recovery 10™ Advanced Server Virtual Edition User's Guide

Strona 2

10 Copyright © Acronis, Inc., 2000-2010 3. Install Acronis Backup & Recovery 10 Management Console (p. 23) on the machine from which you prefe

Strona 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 3.3.2 Event tracing It is possible to duplicate log events generated by the agent(s), operating on the ma

Strona 4

101 Copyright © Acronis, Inc., 2000-2010 You can override the settings set here, exclusively for the events that occur during backup or during reco

Strona 5

102 Copyright © Acronis, Inc., 2000-2010  /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent  /etc/snmp/snmptrapd.conf - con

Strona 6

103 Copyright © Acronis, Inc., 2000-2010 If you choose Yes, I want to participate in the ACEP, information about the hardware configuration, the mo

Strona 7

104 Copyright © Acronis, Inc., 2000-2010 Pre/Post backup commands (p. 107) + + + + PE only PE only Pre/Post data capture commands (p. 109) + + +

Strona 8 - Backup & Recovery™ 10

105 Copyright © Acronis, Inc., 2000-2010 Overwrite data on a tape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Ta

Strona 9 - 1.2 Getting started

106 Copyright © Acronis, Inc., 2000-2010 The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly gener

Strona 10

107 Copyright © Acronis, Inc., 2000-2010 Windows and Linux By name F.log F Excludes all files named "F.log" Excludes all folders named &

Strona 11

108 Copyright © Acronis, Inc., 2000-2010 2. Do any of the following:  Click Edit to specify a new command or a batch file  Select the existing

Strona 12 - Navigation tree

109 Copyright © Acronis, Inc., 2000-2010 5. Click Test Command to check if the command is correct. 3.4.1.4 Pre/Post data capture commands This o

Strona 13 - Shortcuts bar

11 Copyright © Acronis, Inc., 2000-2010 3. Install the Acronis Deduplication add-on to the agent on all machines that will back up to the deduplic

Strona 14 - Actions

110 Copyright © Acronis, Inc., 2000-2010 command execution fails Do not perform the data capture until the command execution is complete Selected

Strona 15 - How to expand/minimize panes

111 Copyright © Acronis, Inc., 2000-2010 This option defines whether to back up files one by one or by taking an instant data snapshot. Note: Files

Strona 16 - Action pages

112 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 will select the VSS provider automatically based on the operating system

Strona 17 - Action page - Controls

113 Copyright © Acronis, Inc., 2000-2010 3.4.1.9 Backup performance Use this group of options to specify the amount of network and system resource

Strona 18 - 1.3.1 Agent for Windows

114 Copyright © Acronis, Inc., 2000-2010 Network connection speed This option is effective for Windows and Linux operating systems and bootable med

Strona 19 - 1.3.2 Agent for Linux

115 Copyright © Acronis, Inc., 2000-2010  From - type the e-mail address of the user from whom the message will be sent. If you leave this field

Strona 20 - 1.3.3 Agent for ESX/ESXi

116 Copyright © Acronis, Inc., 2000-2010 3.4.1.11 Event tracing It is possible to duplicate log events of the backup operations, performed on the

Strona 21 - 1.3.4.2 Storage Node

117 Copyright © Acronis, Inc., 2000-2010  Types of events to send – choose the types of events to be sent: All events, Errors and warnings, or Er

Strona 22 - 1.3.4.4 License Server

118 Copyright © Acronis, Inc., 2000-2010 The task will enter the Need interaction state and ask for a new media when the previous one is full. Fixe

Strona 23 - 1.4 Supported file systems

119 Copyright © Acronis, Inc., 2000-2010 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.

Strona 24 - 10 Storage Node

12 Copyright © Acronis, Inc., 2000-2010 Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and

Strona 25

120 Copyright © Acronis, Inc., 2000-2010 When the option is disabled, the program will display a pop-up window each time it comes across a bad sect

Strona 26 - 1.6 System requirements

121 Copyright © Acronis, Inc., 2000-2010 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Strona 27 - 1.7 Technical Support

122 Copyright © Acronis, Inc., 2000-2010 The program will try to execute the failed task again if you select the Restart a failed task check box an

Strona 28 - 2.1 Basic concepts

123 Copyright © Acronis, Inc., 2000-2010 If the console is connected to the management server The Use a separate tape set option has more precise d

Strona 29

124 Copyright © Acronis, Inc., 2000-2010 Dismount media after backup has finished This option is effective in Windows and Linux operating systems.

Strona 30 - Backup using bootable media

125 Copyright © Acronis, Inc., 2000-2010 Deduplicate backup only after transferring it to the vault (do not deduplicate at source) This option is a

Strona 31

126 Copyright © Acronis, Inc., 2000-2010 To view and change the default recovery options, connect the console to the managed machine and then selec

Strona 32

127 Copyright © Acronis, Inc., 2000-2010 E-mail (p. 129) + + + + - - Win Pop-up (p. 130) + + + + - - Event tracing: Windows events log (p. 130

Strona 33 - 2.3 Owners and credentials

128 Copyright © Acronis, Inc., 2000-2010 complete Result Preset Perform the recovery only after the command is successfully executed. Fail the ta

Strona 34 - Full backup

129 Copyright © Acronis, Inc., 2000-2010  High – to maximize the recovery process speed by taking resources from the other processes. 3.4.2.3 F

Strona 35 - Differential backup

13 Copyright © Acronis, Inc., 2000-2010  [Management server name]. Root of the tree also called a Welcome view. Displays the name of the managem

Strona 36 - 2.5 GFS backup scheme

130 Copyright © Acronis, Inc., 2000-2010  Port – set the port of the POP server. By default, the port is set to 110.  User name – enter the use

Strona 37

131 Copyright © Acronis, Inc., 2000-2010 This option defines whether the agent(s) operating on the managed machine have to log events of the recove

Strona 38 - The resulting archive: real

132 Copyright © Acronis, Inc., 2000-2010 3.4.2.6 Error handling These options are effective for Windows and Linux operating systems and bootable m

Strona 39

133 Copyright © Acronis, Inc., 2000-2010 Restart machine automatically if it is required for recovery This option is effective when recovery takes

Strona 40 - Tower of Hanoi by Acronis

134 Copyright © Acronis, Inc., 2000-2010 After a machine is recovered from a backup to another machine, there is a chance the existing machine&apos

Strona 41

135 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i

Strona 42 - 2.7 Retention rules

136 Copyright © Acronis, Inc., 2000-2010 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau

Strona 43 - Combination of rules 1 and 2

137 Copyright © Acronis, Inc., 2000-2010 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p.

Strona 44 - Best practices

138 Copyright © Acronis, Inc., 2000-2010 Operations with archives stored in a vault (p. 169) Operations with backups (p. 170) Filtering and sorting

Strona 45 - Recovering dynamic volumes

139 Copyright © Acronis, Inc., 2000-2010 Delete a vault 1. Select the vault. 2. Click Delete. You'll be asked whether to keep the archives

Strona 46 - Backup (GUI)

14 Copyright © Acronis, Inc., 2000-2010 actions bar will be named as 'System backup' actions and will have the set of actions typical to

Strona 47 - 2.9.2 Backing up MD devices

140 Copyright © Acronis, Inc., 2000-2010 Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter

Strona 48

141 Copyright © Acronis, Inc., 2000-2010 Vault database path To specify the path where the vault's database will be created 1. In the Local f

Strona 49

142 Copyright © Acronis, Inc., 2000-2010 4.1.2.2 Creating an unmanaged centralized vault To create an unmanaged centralized vault, perform the fol

Strona 50 - Virtual machines backup

143 Copyright © Acronis, Inc., 2000-2010 To attach a managed vault to a storage node, perform the following steps. Vault Storage node Select the A

Strona 51 - Troubleshooting

144 Copyright © Acronis, Inc., 2000-2010 by different components of other versions of the product by means of Acronis Backup & Recovery 10, see

Strona 52 - 2.12 Tape support

145 Copyright © Acronis, Inc., 2000-2010 4. A tape with backups written by the storage node cannot be read on a tape device, locally attached to a

Strona 53

146 Copyright © Acronis, Inc., 2000-2010 4.1.3.5 Getting started with a tape library If you have a tape library device attached to a machine with

Strona 54 - 2.13 Support for SNMP

147 Copyright © Acronis, Inc., 2000-2010 If the tape barcode cannot be read, another Tasks Need Interaction window asks you to label a tape. Actio

Strona 55 - 2.14.1 Acronis Secure Zone

148 Copyright © Acronis, Inc., 2000-2010 To change the settings of the backup policy/plan to be created click Change… in the Backup options section

Strona 56

149 Copyright © Acronis, Inc., 2000-2010 Any user with access to a managed vault on a tape library is able to perform these operations. However two

Strona 57 - Restore)

15 Copyright © Acronis, Inc., 2000-2010 Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 p

Strona 58 - Supported operating systems

150 Copyright © Acronis, Inc., 2000-2010 Labeling When a tape required for data recovery is not found, the Task Need Interaction window will ask th

Strona 59 - How to use

151 Copyright © Acronis, Inc., 2000-2010 If you leave this option unchanged, then the backups, belonging to the policy or plan being created, might

Strona 60 - 2.15.1 Basic concepts

152 Copyright © Acronis, Inc., 2000-2010 cycle. The same tape rotation enables you to get by with the minimum number of cartridges and not to be bu

Strona 61

153 Copyright © Acronis, Inc., 2000-2010  capability of the tape library (number of drives, loaders, slots and available tapes; capacity of tapes

Strona 62

154 Copyright © Acronis, Inc., 2000-2010 backup policy/plan starts on Wednesday and full backups should be created on every fourth Friday, on Wedne

Strona 63 - Setting up the storage node

155 Copyright © Acronis, Inc., 2000-2010 The next figure demonstrates the data backup archive at the moment. The differential backup is drawn as a

Strona 64

156 Copyright © Acronis, Inc., 2000-2010 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f

Strona 65 -  IP address range

157 Copyright © Acronis, Inc., 2000-2010 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and

Strona 66 - 2.15.3.4 Example

158 Copyright © Acronis, Inc., 2000-2010 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup

Strona 67

159 Copyright © Acronis, Inc., 2000-2010 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF

Strona 68 - Policy on a group

16 Copyright © Acronis, Inc., 2000-2010 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Strona 69

160 Copyright © Acronis, Inc., 2000-2010  backup deletion frees a tape so it can be reused. The main drawback is the large number of required tap

Strona 70

161 Copyright © Acronis, Inc., 2000-2010 ToH Example 1 Suppose, the backup plan has the following tape options:  the Use a separate tape set opti

Strona 71

162 Copyright © Acronis, Inc., 2000-2010  five-level scheme requires up to five tapes for this case. ToH Example 2 Suppose, the backup plan has

Strona 72

163 Copyright © Acronis, Inc., 2000-2010 ToH Example 3 Imagine the backup plan has the following tape options:  the Use a separate tape set opti

Strona 73 - Backup policy state diagram

164 Copyright © Acronis, Inc., 2000-2010 To simplify the tape planning lets discard the possibility that the calculated tapes might contain backups

Strona 74

165 Copyright © Acronis, Inc., 2000-2010 Total number of required tapes = round up ((2*F_GB + 12*I_GB + 11*D_GB) * CL / T_GB) + 1 = round up ( (2*3

Strona 75 - 2.15.6 Deduplication

166 Copyright © Acronis, Inc., 2000-2010 node database has all the required information about the content of the moved tapes. So all you need to do

Strona 76 - Deduplication at target

167 Copyright © Acronis, Inc., 2000-2010 Metadata The .meta folder is created during backup in every personal vault. This folder contains additiona

Strona 77 - Compacting

168 Copyright © Acronis, Inc., 2000-2010  [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicate

Strona 78 - What ratio to expect

169 Copyright © Acronis, Inc., 2000-2010 4.2.2.1 Creating a personal vault To create a personal vault 1. In the Name field, type a name for the v

Strona 79

17 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Strona 80 - Remote connection

170 Copyright © Acronis, Inc., 2000-2010 To Do Validate an archive Click Validate. The Validation (p. 251) page will be opened with the pre-selec

Strona 81

171 Copyright © Acronis, Inc., 2000-2010 Validate a backup Click Validate. The Validation (p. 251) page will be opened with the pre-selected backu

Strona 82 - Example 2

172 Copyright © Acronis, Inc., 2000-2010 4.3.4 Filtering and sorting archives The following is a guideline for you to filter and sort archives in

Strona 83 - On a domain controller

173 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Strona 84

174 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed + + The scheduler behav

Strona 85

175 Copyright © Acronis, Inc., 2000-2010 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day

Strona 86

176 Copyright © Acronis, Inc., 2000-2010 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/

Strona 87

177 Copyright © Acronis, Inc., 2000-2010 Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six mont

Strona 88 - Client Encryption options

178 Copyright © Acronis, Inc., 2000-2010  Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the t

Strona 89 - Server Encryption options

179 Copyright © Acronis, Inc., 2000-2010 From: <...> Set up a date when this schedule will be enabled (an effective date). If this check box

Strona 90 - 2.15.8.5 SSL certificates

18 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of

Strona 91 - Self-signed certificates

180 Copyright © Acronis, Inc., 2000-2010 In the case when the task needs to be run on different days or weeks with different time intervals dependi

Strona 92 - Non-self-signed certificates

181 Copyright © Acronis, Inc., 2000-2010 Parameters Log name Specifies the name of the log. Select the name of a standard log (Application, Securit

Strona 93 - 3 Options

182 Copyright © Acronis, Inc., 2000-2010  Log name: System  Event source: Microsoft-Windows-WindowsUpdateClient  Event type: Information  E

Strona 94 - 3.1.5 Fonts

183 Copyright © Acronis, Inc., 2000-2010 Delay values range from zero to the specified maximum delay value, and are determined according to the cho

Strona 95 - 3.2.2 Log cleanup rules

184 Copyright © Acronis, Inc., 2000-2010 5.6 When an ADRM alert is received This schedule is effective in Windows operating systems when Acronis®

Strona 96 - 3.2.3 Event tracing

185 Copyright © Acronis, Inc., 2000-2010  Condition: Time since last backup; Value: Time since the last backup: 12 hour(s).  Task start conditi

Strona 97 - 3.2.6 VM protection options

186 Copyright © Acronis, Inc., 2000-2010 5.7.3 Fits time interval Applies to: Windows, Linux Restricts a backup task's start time to a specif

Strona 98 - 3.2.7 Online backup proxy

187 Copyright © Acronis, Inc., 2000-2010 Example Run the backup task at 8 PM on the first and third Friday of every month, preferably when all user

Strona 99 - 3.3 Machine options

188 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by

Strona 100 - 3.3.2 Event tracing

189 Copyright © Acronis, Inc., 2000-2010 licenses. Please make sure you have a valid license on Acronis License Server. After a successful license

Strona 101 - Windows

19 Copyright © Acronis, Inc., 2000-2010 File backup File-level data protection is based on backing up files and folders residing on the machine whe

Strona 102 - 3.3.4 Online backup proxy

190 Copyright © Acronis, Inc., 2000-2010 Errors Highlight the date in red if at least one "Error" entry appeared in the log on this date

Strona 103

191 Copyright © Acronis, Inc., 2000-2010  Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup

Strona 104

192 Copyright © Acronis, Inc., 2000-2010 Status How it is determined How to handle 1 Error At least one task has failed. Otherwise, see 2 Iden

Strona 105 - 3.4.1.1 Archive protection

193 Copyright © Acronis, Inc., 2000-2010 Any running task can put itself into the Need interaction state when it needs human interaction such as ch

Strona 106

194 Copyright © Acronis, Inc., 2000-2010 2 Warning Last result is "Succeeded with warning" View the log to read the warnings -> [opt

Strona 107 - 3.4.1.3 Pre/Post commands

195 Copyright © Acronis, Inc., 2000-2010 Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 198) window, select the task you need

Strona 108 - Post-backup command

196 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (

Strona 109 - Pre-data capture command

197 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apo

Strona 110 - Post-data capture command

198 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Strona 111 -  Do not create a snapshot

199 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover

Strona 112 - 3.4.1.8 Compression level

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Strona 113 - HDD writing speed

20 Copyright © Acronis, Inc., 2000-2010 Disk backup Disk-level data protection is based on backing up either a disk or a volume file system as a wh

Strona 114 - 3.4.1.10 Notifications

200 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The

Strona 115 - Messenger service (WinPopup)

201 Copyright © Acronis, Inc., 2000-2010  Validation (if selected) - events before or after which the validation is performed, and validation sch

Strona 116 - SNMP notifications

202 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following  Click View Details. T

Strona 117 - 3.4.1.13 Backup splitting

203 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I

Strona 118 - 3.4.1.15 Media components

204 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for

Strona 119 - 3.4.1.16 Error handling

205 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the location if the plan account does not have access permissions to th

Strona 120 - 3.4.1.17 Dual destination

206 Copyright © Acronis, Inc., 2000-2010 Here you select the resulting virtual machine type and location. Available options depend on the host you

Strona 121 - Skip the task execution

207 Copyright © Acronis, Inc., 2000-2010 If you recover (p. 230) the machine to a VMware ESX Server using Agent for ESX/ESXi, or convert (p. 229) t

Strona 122 - 3.4.1.20 Tape support

208 Copyright © Acronis, Inc., 2000-2010 Windows 7 windows7Guest Windows 7 (64 bit) windows7_64Guest Windows Server 2008 R2 (64 bit) windows7Ser

Strona 123 - Always use a free tape

209 Copyright © Acronis, Inc., 2000-2010 Backing up a virtual machine means backing up all the machine's disks plus the machine configuration.

Strona 124 - Reset archive bit

21 Copyright © Acronis, Inc., 2000-2010  The configuration database that stores the list of registered machines and other configuration informati

Strona 125 - Use FTP in Active mode

210 Copyright © Acronis, Inc., 2000-2010 exists, the root and the zero track of the hard disk with the master boot record (MBR). The boot code of G

Strona 126

211 Copyright © Acronis, Inc., 2000-2010 6.2.5.4 Selecting a virtual machine's disks and volumes To back up individual disks or volumes withi

Strona 127 - Pre-recovery command

212 Copyright © Acronis, Inc., 2000-2010 To specify which files and folders to exclude: Set up any of the following parameters:  Exclude all hidd

Strona 128 - 3.4.2.2 Recovery priority

213 Copyright © Acronis, Inc., 2000-2010 By file path /home/user/Finance/F.log Excludes the file named "F.log" located in the folder /h

Strona 129 - 3.4.2.4 Notifications

214 Copyright © Acronis, Inc., 2000-2010 3. Naming the new archive Once you select the archive destination, the program generates a name for the ne

Strona 130 - 3.4.2.5 Event tracing

215 Copyright © Acronis, Inc., 2000-2010 If you do not select the Name backup files using the archive name... check box:  Each backup will have

Strona 131

216 Copyright © Acronis, Inc., 2000-2010 See also “The [Date] variable” (p. 217). Example 3. Hourly backups within a day Consider the following sc

Strona 132 - 3.4.2.7 Additional settings

217 Copyright © Acronis, Inc., 2000-2010 In this scenario, you need to create two backup plans as follows: a) When creating the first backup plan,

Strona 133 - 3.4.2.8 VM power management

218 Copyright © Acronis, Inc., 2000-2010 When using this variable, the first backup of a new day will be a full backup. Before creating the next fu

Strona 134

219 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials you specify. Use this option if the plan acc

Strona 135 - 4 Vaults

22 Copyright © Acronis, Inc., 2000-2010  on the hard drives local to the storage node  on a network share  on a Storage Area Network (SAN) 

Strona 136 - 4.1 Centralized vaults

220 Copyright © Acronis, Inc., 2000-2010 6.2.11.2 Back up later scheme With the Back up later scheme, the backup will be performed only once, at t

Strona 137 - Vault content

221 Copyright © Acronis, Inc., 2000-2010 Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W - - Daily backups run every workday except Friday

Strona 138

222 Copyright © Acronis, Inc., 2000-2010  Start backup at: 11:00 PM  Back up on: All days  Weekly/monthly: Saturday (for example)  Keep bac

Strona 139

223 Copyright © Acronis, Inc., 2000-2010 Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six

Strona 140 - Vault path

224 Copyright © Acronis, Inc., 2000-2010 schedule parameters allows creating simple schedules (example of a simple daily schedule: a backup task wi

Strona 141 - Vault encryption

225 Copyright © Acronis, Inc., 2000-2010 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding

Strona 142

226 Copyright © Acronis, Inc., 2000-2010 Differential Specifies on what schedule and under which conditions to perform a differential backup. If

Strona 143 - 4.1.3 Tape libraries

227 Copyright © Acronis, Inc., 2000-2010 Full backup: Schedule: Weekly, every Friday, at 10:00 PM Here, all parameters except Schedule in Full back

Strona 144 - 4.1.3.3 Limitations

228 Copyright © Acronis, Inc., 2000-2010 Cleanup schedule: Monthly, on the Last day of All months, at 10:00 PM By default, a backup is not deleted

Strona 145 - 4.1.3.4 RSM Media Pools

229 Copyright © Acronis, Inc., 2000-2010 peak period. On the other hand, if the validation is a major part of your data protection strategy and you

Strona 146 - Prerequisites

23 Copyright © Acronis, Inc., 2000-2010 For more information about Acronis License Server please see "Using Acronis License Server". 1.3

Strona 147 - Backing up to tape library

230 Copyright © Acronis, Inc., 2000-2010 A VMware virtual machine will be created on the ESX/ESXi server. Virtual machines resulting from backup ar

Strona 148 - Recovering from tape library

231 Copyright © Acronis, Inc., 2000-2010 machine into the operating system found in the backup as if the system were on the physical disk. The syst

Strona 149 - Inventory

232 Copyright © Acronis, Inc., 2000-2010 Acronis Active Restore [OPTIONAL] The Acronis Active Restore check box is available when recovering Window

Strona 150 - 4.1.3.7 Tape support

233 Copyright © Acronis, Inc., 2000-2010 6.3.1 Task credentials Provide credentials for the account under which the task will run. To specify cred

Strona 151 - 4.1.3.8 Tape rotation

234 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as

Strona 152 - Criteria of the choice

235 Copyright © Acronis, Inc., 2000-2010 Selecting an MBR You will usually select the disk's MBR if:  The operating system cannot boot  Th

Strona 153 - Case to analyze

236 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre

Strona 154 - GFS Example 1

237 Copyright © Acronis, Inc., 2000-2010 Disk destination To specify a destination disk: 1. Select a disk where you want the selected disk to reco

Strona 155

238 Copyright © Acronis, Inc., 2000-2010 The selected volumes will be recovered to the physical disks of the machine the console is connected to. O

Strona 156

239 Copyright © Acronis, Inc., 2000-2010 Volume destination To specify a destination volume: 1. Select a volume or unallocated space where you wan

Strona 157 - GFS Example 2

24 Copyright © Acronis, Inc., 2000-2010  XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di

Strona 158

240 Copyright © Acronis, Inc., 2000-2010 File system Change the volume file system, if required. By default, the program selects the original volum

Strona 159 - GFS Example 3

241 Copyright © Acronis, Inc., 2000-2010 ESX may have multiple storages. A Microsoft Hyper-V server enables creating a new virtual machine in any l

Strona 160

242 Copyright © Acronis, Inc., 2000-2010 You can use one or more wildcard characters * and ? in a file mask:  The asterisk (*) substitutes for ze

Strona 161 - ToH Example 1

243 Copyright © Acronis, Inc., 2000-2010 6.3.7 Access credentials for destination To specify credentials 1. Select one of the following:  Use t

Strona 162 - ToH Example 2

244 Copyright © Acronis, Inc., 2000-2010 The best practice is to store drivers for all the hardware used in your organization in a single repositor

Strona 163 - Tape planning

245 Copyright © Acronis, Inc., 2000-2010 step. Use drivers bundled with your virtual machine software or download the latest drivers versions from

Strona 164 - Tape planning: Example 1

246 Copyright © Acronis, Inc., 2000-2010 On a Microsoft Virtual PC, be sure to recover the disk or volume where the operating system's loader

Strona 165 - 4.1.3.9 What if

247 Copyright © Acronis, Inc., 2000-2010 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompts wh

Strona 166 - 4.2 Personal vaults

248 Copyright © Acronis, Inc., 2000-2010 1. Start Linux or boot from the bootable media, and then press CTRL+ALT+F2. 2. Mount the system you are

Strona 167 - Metadata

249 Copyright © Acronis, Inc., 2000-2010 12. Unmount the mounted file systems and then reboot: umount /mnt/system/dev/ umount /mnt/system/proc/ umo

Strona 168

25 Copyright © Acronis, Inc., 2000-2010  Windows Server 2008 - the Standard, Enterprise, Small Business Server, Foundation editions (x86, x64) 

Strona 169 - 4.3 Common operations

250 Copyright © Acronis, Inc., 2000-2010  Otherwise (such as in the second example), perform the recovery from bootable media. No reboot will be

Strona 170

251 Copyright © Acronis, Inc., 2000-2010 This section describes how to recover the storage node registered on the management server in case the sto

Strona 171

252 Copyright © Acronis, Inc., 2000-2010 To create a validation task, perform the following steps. General Task name [Optional] Enter a unique nam

Strona 172 - To show or hide columns

253 Copyright © Acronis, Inc., 2000-2010 To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials

Strona 173 - 5 Scheduling

254 Copyright © Acronis, Inc., 2000-2010 2. In the table to the right of the tree, select the archive. The table displays the names of the archive

Strona 174 - 5.1 Daily schedule

255 Copyright © Acronis, Inc., 2000-2010  Use the following credentials The program will access the location using the credentials you specify. U

Strona 175 -  fifth at 7 PM

256 Copyright © Acronis, Inc., 2000-2010  Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med

Strona 176 - 5.2 Weekly schedule

257 Copyright © Acronis, Inc., 2000-2010 ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port

Strona 177

258 Copyright © Acronis, Inc., 2000-2010 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers

Strona 178 - 5.3 Monthly schedule

259 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient

Strona 179 - Examples

26 Copyright © Acronis, Inc., 2000-2010  SUSE Linux Enterprise Server 10 and 11  Debian 4 (Lenny) and 5 (Etch)  CentOS 5  Agent for Linux i

Strona 180

260 Copyright © Acronis, Inc., 2000-2010 The resulting archive's options The exported archive inherits the options of the original archive, in

Strona 181 - Parameters

261 Copyright © Acronis, Inc., 2000-2010 [Optional] The export task will run on behalf of the user who is creating the task. You can change the tas

Strona 182 - Use Wake-On-LAN

262 Copyright © Acronis, Inc., 2000-2010 6.7.2 Archive selection To select an archive 1. Enter the full path to the location in the Path field, o

Strona 183 - To specify advanced settings

263 Copyright © Acronis, Inc., 2000-2010 6.7.3 Backup selection To specify a backup(s) to export 1. At the top of the window, select the respecti

Strona 184 - 5.7 Conditions

264 Copyright © Acronis, Inc., 2000-2010  To export data to a network share, expand the Network folders group, select the required networked mach

Strona 185 - 5.7.1 User is idle

265 Copyright © Acronis, Inc., 2000-2010 6.7.6 Access credentials for destination Specify credentials required for access to the location where th

Strona 186 - 5.7.4 User logged off

266 Copyright © Acronis, Inc., 2000-2010 [Optional] Protect the Acronis Secure Zone from unauthorized access with a password. The prompt for the pa

Strona 187 - Example:

267 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accord

Strona 188 - 6 Direct management

268 Copyright © Acronis, Inc., 2000-2010 2. Select volumes from which free space will be used to increase the Acronis Secure Zone. 3. Specify the

Strona 189 - Activities

269 Copyright © Acronis, Inc., 2000-2010 Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…" (if you

Strona 190 - Way of working

27 Copyright © Acronis, Inc., 2000-2010 Storage Node 100 MB 150 MB 150 MB When using a tape library, space required for tapes database: approx.

Strona 191 - Backup plan statuses

270 Copyright © Acronis, Inc., 2000-2010 Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent base

Strona 192 - Task states

271 Copyright © Acronis, Inc., 2000-2010  Windows Vista (PE 2.0)  Windows Vista SP1 and Windows Server 2008 (PE 2.1)  Windows 7 (PE 3.0) If y

Strona 193 - Task statuses

272 Copyright © Acronis, Inc., 2000-2010  Universal Restore can be enabled if Acronis Backup & Recovery 10 Universal Restore is installed on

Strona 194 -  Validation task (p. 251)

273 Copyright © Acronis, Inc., 2000-2010 Disables Advanced Programmable Interrupt Controller (APIC). You may want to use this parameter when experi

Strona 195

274 Copyright © Acronis, Inc., 2000-2010 Disables the use of PCI BIOS; only direct hardware access methods will be allowed. You may want to use thi

Strona 196

275 Copyright © Acronis, Inc., 2000-2010 Sizeable data for recovery could be transferred through the second NIC, included in the dedicated backup n

Strona 197

276 Copyright © Acronis, Inc., 2000-2010 2. Click Remove. 6.10.1.2 Adding the Acronis Plug-in to WinPE 1.x Acronis Plug-in for WinPE can be adde

Strona 198 - Task details

277 Copyright © Acronis, Inc., 2000-2010 3. Select Bootable media type: Windows PE. When creating a new PE ISO:  Select Create Windows PE 2.x o

Strona 199 - Settings

278 Copyright © Acronis, Inc., 2000-2010 6. Copy the contents of the current folder—by default: C:\Program Files\Acronis\Bootable Components\WinPE

Strona 200 - Backup plan details

279 Copyright © Acronis, Inc., 2000-2010 7. Tasks cannot be scheduled; in fact, tasks are not created at all. If you need to repeat the operation,

Strona 201 - 6.1.3 Log

28 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Strona 202

280 Copyright © Acronis, Inc., 2000-2010 To add an NDAS device 1. In a Linux-based bootable media, run the management console. 2. Click Configure

Strona 203 - 6.2 Creating a backup plan

281 Copyright © Acronis, Inc., 2000-2010 egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl ud

Strona 204 - Where to back up

282 Copyright © Acronis, Inc., 2000-2010 To create the volume structure by using the management console 1. Boot the machine from a Linux-based boo

Strona 205 - Convert to VM

283 Copyright © Acronis, Inc., 2000-2010 7. Return to the management console by pressing CTRL+ALT+F1, or by running the command: /bin/product (Do

Strona 206 - To specify credentials

284 Copyright © Acronis, Inc., 2000-2010 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgroup /dev/md0 /dev/md1 lvm vgdisplay The output of the

Strona 207 - Parameters specification

285 Copyright © Acronis, Inc., 2000-2010 Num Idx Partition Flags Start Size Type ---- --- --------- ----- ----- --------- ------ Disk 1:

Strona 208 - 6.2.4 Source type

286 Copyright © Acronis, Inc., 2000-2010 6.10.6.2 Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS suppo

Strona 209 - 6.2.5 Items to back up

287 Copyright © Acronis, Inc., 2000-2010 6.11 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configurati

Strona 210

288 Copyright © Acronis, Inc., 2000-2010 Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare

Strona 211 - 6.2.7 Exclusions

289 Copyright © Acronis, Inc., 2000-2010 Displaying operation results The results of any disk or volume operation, you have just planned, are immed

Strona 212

29 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Strona 213 - 6.2.8 Archive

290 Copyright © Acronis, Inc., 2000-2010 If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Li

Strona 214 - 3. Naming the new archive

291 Copyright © Acronis, Inc., 2000-2010 data loss , then the user will be allowed to proceed. If due to the size limitations safe transfer of all

Strona 215 - 6.2.9.1 Usage examples

292 Copyright © Acronis, Inc., 2000-2010 5. Wait until the task is finished. 6.11.5.3 Disk conversion: MBR to GPT You would want to convert an M

Strona 216

293 Copyright © Acronis, Inc., 2000-2010 Please note, a volume, belonging to a GPT disk to convert, will be a logical one after the operation and i

Strona 217 - 6.2.9.2 The [DATE] variable

294 Copyright © Acronis, Inc., 2000-2010 You will be advised about the changes that will happen to the system if the chosen disk is converted from

Strona 218

295 Copyright © Acronis, Inc., 2000-2010 the following Microsoft knowledge base article: http://technet.microsoft.com/en-us/library/cc732026.aspx.

Strona 219 - 6.2.11 Backup schemes

296 Copyright © Acronis, Inc., 2000-2010 A volume, also sometimes called RAID 0, consisting of equal sized stripes of data, written across each dis

Strona 220 - 6.2.11.3 Simple scheme

297 Copyright © Acronis, Inc., 2000-2010  Striped  Mirrored  RAID-5 You will obtain a brief description of every type of volume for better u

Strona 221

298 Copyright © Acronis, Inc., 2000-2010 minimum and the maximum values or click on the special handle, and hold and drag the borders of the disk&a

Strona 222

299 Copyright © Acronis, Inc., 2000-2010 6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is

Strona 223 - At a glance

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 8 1.1

Strona 224 - Roll-back period

30 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Strona 225

300 Copyright © Acronis, Inc., 2000-2010 6.11.6.4 Change volume letter Windows operating systems assign letters (C:, D:, etc) to hard disk volumes

Strona 226

301 Copyright © Acronis, Inc., 2000-2010  to save additional space which is being lost due to the cluster size on the FAT16 or FAT32 file systems

Strona 227

302 Copyright © Acronis, Inc., 2000-2010 Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so

Strona 228 - 6.2.12 Archive validation

303 Copyright © Acronis, Inc., 2000-2010 7 Centralized management This section covers operations that can be performed centrally by using the comp

Strona 229

304 Copyright © Acronis, Inc., 2000-2010 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has

Strona 230 - 6.3 Recovering data

305 Copyright © Acronis, Inc., 2000-2010 Statistics for the selected date are displayed to the right of the chart. All the statistics fields are in

Strona 231 - Where to recover

306 Copyright © Acronis, Inc., 2000-2010 7.1.2.1 Backup policy deployment states A backup policy deployment state is a combination of the policy d

Strona 232 - Recovery options

307 Copyright © Acronis, Inc., 2000-2010 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e

Strona 233 - 6.3.2 Archive selection

308 Copyright © Acronis, Inc., 2000-2010 Edit a policy Click Edit. Editing policies is performed in the same way as creating (p. 367). Once the po

Strona 234 - 6.3.4 Content selection

309 Copyright © Acronis, Inc., 2000-2010 Sort backup policies by any column Click the column's header to sort the backup policies in ascending

Strona 235 - 6.3.4.2 Files selection

31 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Strona 236 - 6.3.6 Destination selection

310 Copyright © Acronis, Inc., 2000-2010 View details of the machine (group). Click View details. In the Machine details (p. 317)/Group details (p

Strona 237 - 6.3.6.2 Volumes

311 Copyright © Acronis, Inc., 2000-2010 Static groups contain machines manually added to the group by the administrator. A static member remains i

Strona 238 - MBR destination

312 Copyright © Acronis, Inc., 2000-2010 added to the management server. Import machines from Active Directory Click Import machines from Active D

Strona 239 - Volume properties

313 Copyright © Acronis, Inc., 2000-2010 Remove a machine from the current static group Click Remove from group. The backup policies applied to th

Strona 240 - Storage

314 Copyright © Acronis, Inc., 2000-2010 Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & R

Strona 241 - Recovery exclusions

315 Copyright © Acronis, Inc., 2000-2010 If more than 1000 matches are found, only the first 1000 items will be displayed. In this case, it is reco

Strona 242 - Overwriting

316 Copyright © Acronis, Inc., 2000-2010 Synchronization command line tool Acronis Backup & Recovery 10 Management Server has a command line to

Strona 243 - 6.3.9 Universal Restore

317 Copyright © Acronis, Inc., 2000-2010 Moving a machine to another group To move the selected machine to another group 1. In the group tree, sel

Strona 244 - Universal Restore settings

318 Copyright © Acronis, Inc., 2000-2010  Unknown - this status is displayed until the first connection between the management server and the mac

Strona 245

319 Copyright © Acronis, Inc., 2000-2010 Plans and tasks Displays a list of the plans (both local and centralized) and tasks existing on the select

Strona 246 - Post-conversion operations

32 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Strona 247

320 Copyright © Acronis, Inc., 2000-2010  recovery task (from the disk backup): The target volume will be deleted and its space unallocated – you

Strona 248

321 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apo

Strona 249 - Windows Vista/2008

322 Copyright © Acronis, Inc., 2000-2010 This opens Log view with pre-filtered log entries of the selected group. Remove machine from a group. Clic

Strona 250

323 Copyright © Acronis, Inc., 2000-2010 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that ar

Strona 251

324 Copyright © Acronis, Inc., 2000-2010 Refresh a list of groups Click Refresh. The management console will update the list of groups from the ma

Strona 252 - 6.4.1 Task credentials

325 Copyright © Acronis, Inc., 2000-2010 IP range: 192.168.17.0 - 192.168.17.55 will add to the same group all the machines whose operating syst

Strona 253 - 6.4.2 Archive selection

326 Copyright © Acronis, Inc., 2000-2010 when the machine was initially added to the management server. Otherwise, the machine will not be added to

Strona 254 - 6.4.4 Location selection

327 Copyright © Acronis, Inc., 2000-2010 View details of a policy Click View details. In the Policy details (p. 309) window, examine all informati

Strona 255 - 6.5 Mounting an image

328 Copyright © Acronis, Inc., 2000-2010 This approach comes in handy when:  the machine is not hosted on a virtualization server  the virtuali

Strona 256 - 6.5.1 Archive selection

329 Copyright © Acronis, Inc., 2000-2010 When virtual machines become unavailable for the agent (this happens when machines are removed from the vi

Strona 257 - 6.5.3 Access credentials

33 Copyright © Acronis, Inc., 2000-2010 Members of the Administrators group also can:  View and manage backup plans and tasks owned by any user o

Strona 258 - 6.6 Managing mounted images

330 Copyright © Acronis, Inc., 2000-2010 5. Click OK As a result, a group that has the same name as the vCenter Server appears on the management s

Strona 259

331 Copyright © Acronis, Inc., 2000-2010 When you select a host or cluster where the agent is already installed, the right panel of the ESX Agent D

Strona 260

332 Copyright © Acronis, Inc., 2000-2010 Monitoring the deployment progress and result Creating or updating virtual appliances may take some time.

Strona 261 - 6.7.1 Task credentials

333 Copyright © Acronis, Inc., 2000-2010 VMotion VMotion moves a virtual machine's state and configuration to another host while the machine&a

Strona 262 - 6.7.2 Archive selection

334 Copyright © Acronis, Inc., 2000-2010 Operation Object Privilege Back up a VM Back up a VM's disk Recover to a new VM Recover to an exis

Strona 263 - 6.7.5 Location selection

335 Copyright © Acronis, Inc., 2000-2010 Virtual machine > Inventory Create from existing + + Create new + + + Remove + + +

Strona 264 - 2. Using the archives table

336 Copyright © Acronis, Inc., 2000-2010 Remove + Virtual machine > Provisioning Allow disk access + Virtual machine > State Create s

Strona 265 - 6.8 Acronis Secure Zone

337 Copyright © Acronis, Inc., 2000-2010 The toolbar lets you perform operations (p. 337) with the selected storage node. The list of storage nodes

Strona 266 - To disable password

338 Copyright © Acronis, Inc., 2000-2010 Create a centralized managed vault on the selected storage node Click Create vault. The Create managed va

Strona 267 - 6.8.1.4 Result confirmation

339 Copyright © Acronis, Inc., 2000-2010 7.1.5.2 Storage node details The Storage node details window accumulates in four tabs all information on

Strona 268

34 Copyright © Acronis, Inc., 2000-2010 You can skip the Plan's (Task) credentials step. Every time you start the task, the task will run unde

Strona 269 - 6.10 Bootable media

340 Copyright © Acronis, Inc., 2000-2010 Way of working with tasks  Use the filtering and sorting (p. 341) capabilities to display the desired ta

Strona 270 - PE-based bootable media

341 Copyright © Acronis, Inc., 2000-2010 Edit a task Click Edit. Why can't I edit the task?  Task belongs to a backup plan Only tasks that

Strona 271 - Using Bart PE

342 Copyright © Acronis, Inc., 2000-2010 plan names) fully or just partly coincide with the entered value. Filter tasks by type, execution state, s

Strona 272 - Kernel parameters

343 Copyright © Acronis, Inc., 2000-2010  Select the log entry (or log entries) to take action on it (them). See the Actions on log entries (p. 3

Strona 273

344 Copyright © Acronis, Inc., 2000-2010 3. In the opened window, specify a path and a name for the file. Save all the filtered log entries to a f

Strona 274 - Network settings

345 Copyright © Acronis, Inc., 2000-2010 7.1.7.3 Centralized log entry details Displays detailed information on the log entry you have selected

Strona 275 - Network port

346 Copyright © Acronis, Inc., 2000-2010 Reports are generated based on report templates. The templates define the information to be included in th

Strona 276

347 Copyright © Acronis, Inc., 2000-2010  Operating system: The operating systems that the machines run.  IP address (physical machines only):

Strona 277 - \winpe_x86\ISO

348 Copyright © Acronis, Inc., 2000-2010  Backup policies (available only for centralized backup plans): The backup policies on which the central

Strona 278

349 Copyright © Acronis, Inc., 2000-2010  Specify how to sort the table. 7.1.8.5 Report about the archives and backups In this view, you can ge

Strona 279 - To add an iSCSI device

35 Copyright © Acronis, Inc., 2000-2010 Example: An Internet cafe, school or university lab where the administrator often undoes changes made by th

Strona 280 - Linux commands and utilities

350 Copyright © Acronis, Inc., 2000-2010 Report view Under Report view, choose how the report will look:  Specify which table columns to show, an

Strona 281

351 Copyright © Acronis, Inc., 2000-2010 Explorer, click the Information bar that appears at the top of the webpage by default, and then click Allo

Strona 282

352 Copyright © Acronis, Inc., 2000-2010 To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32

Strona 283

353 Copyright © Acronis, Inc., 2000-2010 Default value: 10 Acronis Backup & Recovery 10 agents connect to the storage node to access its manage

Strona 284 - Mounting backup volumes

354 Copyright © Acronis, Inc., 2000-2010 If the volume has 5 GB of free space, then the total size of Vault A is 20 GB + 5 GB = 25 GB, and that of

Strona 285 - 6.10.6 Acronis PXE Server

355 Copyright © Acronis, Inc., 2000-2010 7.2.1.3 Acronis Backup & Recovery 10 Management Server The following are the parameters of Acronis Ba

Strona 286

356 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the minimum level of severity of events to be recorded into the event log. Only eve

Strona 287 - 6.11 Disk management

357 Copyright © Acronis, Inc., 2000-2010 Otherwise, it connects to a number of registered machines depending on the allotted number of simultaneous

Strona 288 - Starting the operations

358 Copyright © Acronis, Inc., 2000-2010 If Real Time Monitoring is set to True, the management server instead sends requests to machines to provid

Strona 289 - 6.11.5 Disk operations

359 Copyright © Acronis, Inc., 2000-2010 You may want to increase the initial size of the snapshot storage—or to place it on a different volume—whe

Strona 290 - 6.11.5.2 Basic disk cloning

36 Copyright © Acronis, Inc., 2000-2010 2.5 GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme

Strona 291 - Using advanced options

360 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Agent periodically checks whether its license key is present on the licen

Strona 292

361 Copyright © Acronis, Inc., 2000-2010 For details on how the agent log is cleaned up, see Log cleanup rules (p. 102). Windows Event Log Specifie

Strona 293 - System disk conversion

362 Copyright © Acronis, Inc., 2000-2010 With the default settings, the snapshot storage is created in a Windows' temporary files folder and i

Strona 294

363 Copyright © Acronis, Inc., 2000-2010 Specifies the port that the component will use for incoming and outgoing communication with other Acronis

Strona 295 - 6.11.6 Volume operations

364 Copyright © Acronis, Inc., 2000-2010 Disabled The same as Not configured. Server Encryption options Specifies whether to encrypt the transferre

Strona 296 - Create volume wizard

365 Copyright © Acronis, Inc., 2000-2010 1 Debug Event used for debug purposes 2 Information Informational event, such as one about the succes

Strona 297 - Set the volume size

366 Copyright © Acronis, Inc., 2000-2010 The information will not be sent. Disabled The same as Not configured. 7.2.2 Parameters set through GUI

Strona 298 - Set the volume options

367 Copyright © Acronis, Inc., 2000-2010 (called the tape database), may be large if the tape library contains thousands of archives. In this case,

Strona 299 - 6.11.6.3 Set active volume

368 Copyright © Acronis, Inc., 2000-2010 [Optional] Type a description of the backup policy. To access this option, select the Advanced view check

Strona 300 - 6.11.6.6 Format volume

369 Copyright © Acronis, Inc., 2000-2010 archive compression level. If you do nothing in this section, the default values (p. 103) as set in the ma

Strona 301 - 6.11.7 Pending operations

37 Copyright © Acronis, Inc., 2000-2010 Select a day of the week from the days selected in the previous step. Each 1st, 2nd and 3rd backup created

Strona 302

370 Copyright © Acronis, Inc., 2000-2010 7.3.1 Policy credentials Provide the credentials under which the centralized tasks will run on the machin

Strona 303 - 7 Centralized management

371 Copyright © Acronis, Inc., 2000-2010 Volume C: Type C:\ or select it from the list System volume Type or select: [SYSTEM] The system volum

Strona 304

372 Copyright © Acronis, Inc., 2000-2010 The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hibernatio

Strona 305 - 7.1.2 Backup policies

373 Copyright © Acronis, Inc., 2000-2010 either /dev/hda3 or /home/usr/docs in the Volume field to perform a disk backup of the third partition. In

Strona 306

374 Copyright © Acronis, Inc., 2000-2010 7.3.2.2 Files to back up selection rules Define file selection rules, according to which the files and (

Strona 307

375 Copyright © Acronis, Inc., 2000-2010 All files on all volumes on a machine [All Files] Points to all files on all volumes of the machine. All

Strona 308 - Machines selection

376 Copyright © Acronis, Inc., 2000-2010 To specify which files and folders to exclude: Set up any of the following parameters:  Exclude all hidd

Strona 309 - 7.1.2.4 Policy details

377 Copyright © Acronis, Inc., 2000-2010 By file path /home/user/Finance/F.log Excludes the file named "F.log" located in the folder /h

Strona 310 - 7.1.3 Physical machines

378 Copyright © Acronis, Inc., 2000-2010  [Machine name] - substitution for the machine's name  [Policy name] - substitution for the backu

Strona 311 - 7.1.3.1 Actions on machines

379 Copyright © Acronis, Inc., 2000-2010  Grandfather-Father-Son – to use the Grandfather-Father-Son backup scheme. The scheme does not allow dat

Strona 312 - Grouping actions

38 Copyright © Acronis, Inc., 2000-2010 The resulting archive: ideal Assume you select to keep daily backups for 7 days, weekly backups for 2 weeks

Strona 313 - Other actions

380 Copyright © Acronis, Inc., 2000-2010 Retention rule With the simple scheme, only one retention rule (p. 42) is available. Set the retention pe

Strona 314 - To add a machine

381 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h

Strona 315 - Text file requirements

382 Copyright © Acronis, Inc., 2000-2010 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, you may set

Strona 316

383 Copyright © Acronis, Inc., 2000-2010 Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and monthly backups

Strona 317 - Machine details

384 Copyright © Acronis, Inc., 2000-2010  Recur: Every 1 day  Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14

Strona 318

385 Copyright © Acronis, Inc., 2000-2010 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Sin

Strona 319 - Plans and tasks

386 Copyright © Acronis, Inc., 2000-2010 The archive will be cleaned up only during backup and only if there is not enough space to create a new ba

Strona 320

387 Copyright © Acronis, Inc., 2000-2010 Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-y

Strona 321 - Member of

388 Copyright © Acronis, Inc., 2000-2010 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil

Strona 322 - Inheritance order

389 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Online might be unavailable in your region. To find more information, cli

Strona 323 - 7.1.3.2 Actions on groups

39 Copyright © Acronis, Inc., 2000-2010 When using the incremental and differential backup methods, you cannot delete a backup as soon as the schem

Strona 324 - Adding multiple criteria

390 Copyright © Acronis, Inc., 2000-2010 8.1.3 How long will my backups be kept in the online storage? Your backups remain in the online storage u

Strona 325

391 Copyright © Acronis, Inc., 2000-2010  you want to perform file-level backup and recovery  you want to back up an independent disk or an RDM

Strona 326 - Group details

392 Copyright © Acronis, Inc., 2000-2010 backups. You may also want to set or edit the retention rule (p. 390) so that an overflow does not occur.

Strona 327 - 7.1.4 Virtual machines

393 Copyright © Acronis, Inc., 2000-2010 8.1.7.4 What types of hard drive can I use for Initial Seeding? Acronis accepts hard disk drives of the f

Strona 328

394 Copyright © Acronis, Inc., 2000-2010 4. [Optional] If you want to add more backups to the media, repeat step 3 selecting the different data in

Strona 329 - Grouping of virtual machines

395 Copyright © Acronis, Inc., 2000-2010 Step 2 Place the hard drive into an anti-static bag to protect the drive from electrostatic discharge. If

Strona 330

396 Copyright © Acronis, Inc., 2000-2010 You might want to use the most cost-efficient delivery method for having your hard drive returned. Step 5

Strona 331

397 Copyright © Acronis, Inc., 2000-2010 You will receive a notification message when Acronis receives the order and when the order is completed. I

Strona 332

398 Copyright © Acronis, Inc., 2000-2010 8.1.8.4 Is Large Scale Recovery a paid service? Yes, you need to buy one Large Scale Recovery license per

Strona 333 - Performance considerations

399 Copyright © Acronis, Inc., 2000-2010  [Occasional] Address is undeliverable – Acronis cannot send the disk. On the same Web page, click Chang

Strona 334

2.15 Understanding centralized management ...60 2.15.1 Basic concepts

Strona 335 - Privileges for a folder

40 Copyright © Acronis, Inc., 2000-2010 Tower of Hanoi overview The Tower of Hanoi scheme is based on a mathematical puzzle of the same name. In th

Strona 336 - 7.1.5 Storage nodes

400 Copyright © Acronis, Inc., 2000-2010 8.1.9.4 What happens when my subscription expires? A month before the subscription expiration date you re

Strona 337 -  Information panel

401 Copyright © Acronis, Inc., 2000-2010 group. Click the Group column header to sort the subscriptions and then apply the desired actions to the g

Strona 338 - Adding a storage node

402 Copyright © Acronis, Inc., 2000-2010  VMware ESX(i) 4.0 and 4.1 (Host-based backup is available only for paid licenses of VMware ESXi.)  Wi

Strona 339 - 7.1.6 Tasks

403 Copyright © Acronis, Inc., 2000-2010 4. Select the machine and then click Select subscription. 5. From Available subscriptions, select the su

Strona 340 - 7.1.6.1 Actions on tasks

404 Copyright © Acronis, Inc., 2000-2010 Depending on your settings, this backup will be either full or incremental. But its size is not likely to

Strona 341

405 Copyright © Acronis, Inc., 2000-2010 To configure proxy settings for an agent 1. Connect the console to the machine for which you want to conf

Strona 342 - 7.1.7 Log

406 Copyright © Acronis, Inc., 2000-2010  Dual destination (p. 120) By using the Backup performance > Network connection speed option, you can

Strona 343

407 Copyright © Acronis, Inc., 2000-2010 Reassign a subscription Assign a subscription that is already activated, to a different machine. Registrat

Strona 344 - Configuring the log table

408 Copyright © Acronis, Inc., 2000-2010 9 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi

Strona 345 - 7.1.8 Reporting

409 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup

Strona 346 - Filters

41 Copyright © Acronis, Inc., 2000-2010  up to 16 backup levels  incremental backups on first level (A) - to gain time and storage savings for

Strona 347 - Report view

410 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 409), such as pre/post backup commands,

Strona 348

411 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 409) installed on the machine finds data items using the selection rule

Strona 349 - Report coverage

412 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre

Strona 350 - 7.1.8.9 Report view

413 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 409) from a backup archive (p. 409) in order to get rid of outdated backups o

Strona 351

414 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 417) using the direc

Strona 352

415 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/

Strona 353

416 Copyright © Acronis, Inc., 2000-2010  the administrator changes the criteria so that the machine does not meet them anymore. There is no way

Strona 354

417 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 409) containing all data chosen for backup. You do not need acc

Strona 355

418 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 412) managed by a storage node (p. 419). Archives (p. 409) in a mana

Strona 356

419 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 410). Policy See Backup policy (p. 410). R Recovery point Date and time to whic

Strona 357

42 Copyright © Acronis, Inc., 2000-2010 2.7 Retention rules The backups produced by a backup plan make an archive. The two retention rules describ

Strona 358

420 Copyright © Acronis, Inc., 2000-2010  prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Strona 359

421 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog

Strona 360

422 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 417) is considered vi

Strona 361

43 Copyright © Acronis, Inc., 2000-2010 There is a certain risk that all but one backup will be deleted if the maximum archive size is set improper

Strona 362 - Connection parameters

44 Copyright © Acronis, Inc., 2000-2010 The outdated backup will be kept until all backups that depend on it also become outdated. Then all the cha

Strona 363

45 Copyright © Acronis, Inc., 2000-2010 Backing up dynamic volumes Dynamic and basic GPT volumes are backed up in the same way as basic MBR volumes

Strona 364 - Event tracing parameters

46 Copyright © Acronis, Inc., 2000-2010 Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynamic volume Type as of

Strona 365

47 Copyright © Acronis, Inc., 2000-2010 To back up all available disks, specify all logical volumes plus basic volumes not belonging to them. This

Strona 366

48 Copyright © Acronis, Inc., 2000-2010 For information about assembling MD devices when performing recovery in Linux, see Assembling MD devices fo

Strona 367

49 Copyright © Acronis, Inc., 2000-2010 Num Partition Flags Start Size Type ---- -------------------- ----------- ----

Strona 368 - What to back up

5.4 At Windows Event Log event ... 180 5.5 Advanced s

Strona 369

50 Copyright © Acronis, Inc., 2000-2010 2.11 Backing up virtual machines Acronis Backup & Recovery 10 Advanced Server Virtual Edition allows f

Strona 370 - 7.3.2 Items to back up

51 Copyright © Acronis, Inc., 2000-2010 An online (running) ESX/ESXi virtual machine that has an independent disk or an RDM disk attached in the ph

Strona 371

52 Copyright © Acronis, Inc., 2000-2010 HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{F2C2787D-95AB-40D4-942D-298F5F757874} Solution: Add this key to the re

Strona 372

53 Copyright © Acronis, Inc., 2000-2010 2.12.1 Tape compatibility table The following table summarizes the readability of tapes written by Acronis

Strona 373 - Names for logical volumes

54 Copyright © Acronis, Inc., 2000-2010 You might experience short pauses that are required to rewind the tape. Low-quality or old tape, as well as

Strona 374

55 Copyright © Acronis, Inc., 2000-2010 About the management information base (MIB) The MIB file acronis-abr.mib is located in the Acronis Backup &

Strona 375 - 7.3.4 Exclusions

56 Copyright © Acronis, Inc., 2000-2010  Backup to Acronis Secure Zone is not possible when working under bootable media or Acronis Startup Recov

Strona 376

57 Copyright © Acronis, Inc., 2000-2010 Limitation Acronis Startup Recovery Manager requires re-activation of third-party loaders after activation.

Strona 377 - 7.3.5 Archive

58 Copyright © Acronis, Inc., 2000-2010 2. Manual selection of the mass storage device driver. If the target hardware has a specific mass storage

Strona 378

59 Copyright © Acronis, Inc., 2000-2010 Limitation The only supported archive location is a local drive, or more precisely, any device available th

Strona 379 - 7.3.7.3 Simple scheme

6.5.2 Backup selection ...

Strona 380 - Description

60 Copyright © Acronis, Inc., 2000-2010 Acronis Active Restore will choose for the boot-up and subsequent recovery the first operating system found

Strona 381

61 Copyright © Acronis, Inc., 2000-2010 Centralized management does not rule out the direct management (p. 413) of each machine. You can connect th

Strona 382

62 Copyright © Acronis, Inc., 2000-2010 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi

Strona 383

63 Copyright © Acronis, Inc., 2000-2010 When installing the storage node, register it on the management server in the same way as you register the

Strona 384

64 Copyright © Acronis, Inc., 2000-2010 When you need and have the opportunity to back up any of the servers, navigate to the backup plan as descri

Strona 385

65 Copyright © Acronis, Inc., 2000-2010  Install Agent for Windows or Agent for Linux on each virtual machine. Register the machines on the manag

Strona 386

66 Copyright © Acronis, Inc., 2000-2010 make the best use of the AD OU criterion, consider reproducing the Active Directory hierarchy in the manage

Strona 387 - Resulting tasks

67 Copyright © Acronis, Inc., 2000-2010 To protect the salesmen's workstations with a different policy, the administrator creates the G2 dynam

Strona 388 - 8 Online backup

68 Copyright © Acronis, Inc., 2000-2010 Operations with groups to which backup policies are applied will result in changing the policies on the mem

Strona 389

69 Copyright © Acronis, Inc., 2000-2010 2. A policy can be revoked from a group. 3. A policy applied to a group cannot be revoked from a machine.

Strona 390 - Server uses a free license

7.3.6 Access credentials for location ...

Strona 391

70 Copyright © Acronis, Inc., 2000-2010 2.15.4.3 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine

Strona 392 - 8.1.7 Initial Seeding FAQ

71 Copyright © Acronis, Inc., 2000-2010 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is

Strona 393

72 Copyright © Acronis, Inc., 2000-2010 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines

Strona 394 - Packaging

73 Copyright © Acronis, Inc., 2000-2010 Backup policy state diagram 2.15.5.2 Policy status on a machine To see this parameter, select any group

Strona 395

74 Copyright © Acronis, Inc., 2000-2010 The policy that has to back up the [System] and the /dev/sda1 volumes, will get the Warning status on the W

Strona 396

75 Copyright © Acronis, Inc., 2000-2010 2.15.5.5 Cumulative state and status of a policy In addition to the deployment state and status as related

Strona 397 - Scale Recovery?

76 Copyright © Acronis, Inc., 2000-2010 Deduplication at target Performed in the vault after a backup is completed. The storage node analyses the v

Strona 398

77 Copyright © Acronis, Inc., 2000-2010 disk-level and file-level backups in the vault, there are two separate data stores for them. Items that can

Strona 399

78 Copyright © Acronis, Inc., 2000-2010  When creating a deduplicating vault, place the vault and its deduplication database on different disks.

Strona 400 - To renew a subscription

79 Copyright © Acronis, Inc., 2000-2010 2.15.6.6 Deduplication restrictions Block-level deduplication restrictions During a disk backup to an arch

Strona 401 - 8.3 Choosing a subscription

8 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Strona 402 - Trial subscriptions

80 Copyright © Acronis, Inc., 2000-2010 Local connection The local connection is established between Acronis Backup & Recovery 10 Management Co

Strona 403

81 Copyright © Acronis, Inc., 2000-2010 To establish a local connection as a non-root user 1. Make sure that the root user has allowed you to star

Strona 404

82 Copyright © Acronis, Inc., 2000-2010 Example 1 This authentication policy uses the pam_succeed_if module and works with Linux distributions with

Strona 405 - Backup and recovery options

83 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Agents When Acronis Backup & Recovery 10 Agent for Windows is being in

Strona 406 - 8.7 Terminology reference

84 Copyright © Acronis, Inc., 2000-2010 2.15.7.6 Management server administrator rights Normally, the Acronis Backup & Recovery 10 Management

Strona 407

85 Copyright © Acronis, Inc., 2000-2010 Additional right of machine administrators A user who is a member of the Administrators group on a machine

Strona 408 - 9 Glossary

86 Copyright © Acronis, Inc., 2000-2010 If the machine is part of an Active Directory domain, make sure that the domain's security policies do

Strona 409

87 Copyright © Acronis, Inc., 2000-2010 2.15.8.2 Client and server applications There are two stakeholders of the secure communication process: 

Strona 410 - Backup policy (Policy)

88 Copyright © Acronis, Inc., 2000-2010 4. For the new communication settings to take effect, restart all running Acronis components—preferably, b

Strona 411 - Built-in group

89 Copyright © Acronis, Inc., 2000-2010 Selecting the Trust self-signed certificates check box allows the client to connect to the server applicati

Strona 412 - Centralized vault

9 Copyright © Acronis, Inc., 2000-2010 Overview of all configured and running operations with color-coding for successful and failed operations 

Strona 413

90 Copyright © Acronis, Inc., 2000-2010 The use of SSL certificates is enabled. The server will use SSL certificates if their use is enabled on the

Strona 414 - Disk group

91 Copyright © Acronis, Inc., 2000-2010  Self-signed certificates, such as certificates automatically generated during the installation of an Acr

Strona 415 - Dynamic group

92 Copyright © Acronis, Inc., 2000-2010 4. Restart Windows, or restart the running Acronis services. Non-self-signed certificates You have the opt

Strona 416 - Encrypted vault

93 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Strona 417

94 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Strona 418 - Physical machine

95 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Strona 419

96 Copyright © Acronis, Inc., 2000-2010 This parameter can also be set by using Acronis Administrative Template (p. 355). 3.2.3 Event tracing You

Strona 420 - Tower of Hanoi

97 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser

Strona 421 - Validation rules

98 Copyright © Acronis, Inc., 2000-2010 3.2.6.1 VMware vCenter integration This option defines whether to show virtual machines managed by a VMwar

Strona 422 - Virtual machine

99 Copyright © Acronis, Inc., 2000-2010 Note: Acronis Backup & Recovery 10 Online supports only HTTP and HTTPS proxy servers. Proxy settings fo

Komentarze do niniejszej Instrukcji

Brak uwag