ACRONIS Backup & Recovery 10 Advanced Workstation, ES podręczniki

Instrukcje obsługi i podręczniki użytkownika dla Licencje / aktualizacje oprogramowania ACRONIS Backup & Recovery 10 Advanced Workstation, ES.
Dostarczamy 1 pdf podręczników ACRONIS Backup & Recovery 10 Advanced Workstation, ES do pobrania za darmo według typów dokumentów: Podręcznik Użytkownika


Spis treści

Advanced Workstation

1

Table of contents

3

1 Introducing Acronis

8

Backup & Recovery™ 10

8

1.2 Getting started

9

Navigation tree

12

Shortcuts bar

13

Actions

14

How to expand/minimize panes

14

"Tasks" view

15

Action pages

16

Console

17

1.3.1 Agent for Windows

18

1.3.2.1 Management Server

19

1.3.2.2 Storage Node

20

1.3.3 Management Console

21

1.4 Supported file systems

22

Acronis License Server

23

10 Storage Node

23

1.6 System requirements

24

1.7 Technical Support

25

Backup using bootable media

28

Full backup

30

Incremental backup

31

Differential backup

31

2.4 Owners and credentials

32

2.5 GFS backup scheme

33

GFS by Acronis

34

The resulting archive: ideal

35

The resulting archive: real

36

Tower of Hanoi overview

37

Tower of Hanoi by Acronis

38

2.7 Retention rules

39

1. Delete backups older than

40

Combination of rules 1 and 2

41

Best practices

42

Backing up dynamic volumes

42

Recovering dynamic volumes

43

2.9 Tape support

44

2.10 Support for SNMP

46

2.11.1 Acronis Secure Zone

47

Limitation

48

Restore)

49

Limitations

50

Getting Universal Restore

50

Supported operating systems

50

How it works

51

Usage scenarios

51

How to use

51

2.12.1 Basic concepts

52

Setting up the storage node

55

Policy on a machine

58

Policy on a group

58

Backup policy state diagram

62

2.12.6 Deduplication

64

Deduplication database

65

Deduplication at source

65

Deduplication at target

66

Compacting

66

What ratio to expect

67

Local connection

69

Remote connection

69

On a domain controller

70

Remote Agent ports

75

Client Encryption options

75

Server Encryption options

76

2.12.8.5 SSL certificates

77

Certificate path

78

Self-signed certificates

78

Non-self-signed certificates

79

3 Options

80

3.1.3 Time-based alerts

81

3.1.4 Number of tasks

81

3.1.5 Fonts

81

3.2.1 Logging level

82

3.2.2 Log cleanup rules

82

3.2.3 Event tracing

83

3.2.5 Acronis WOL Proxy

84

3.2.6 VM protection options

84

3.2.7 Online backup proxy

85

3.3 Machine options

86

3.3.2 Event tracing

87

3.3.3 Log cleanup rules

89

3.3.4 Online backup proxy

89

3.4.1.1 Archive protection

92

3.4.1.3 Pre/Post commands

94

Pre-backup command

95

Post-backup command

95

Pre-data capture command

96

Post-data capture command

97

 Always create a snapshot

98

 Do not create a snapshot

98

3.4.1.8 Compression level

99

3.4.1.9 Backup performance

100

Backup priority

100

HDD writing speed

100

Network connection speed

101

3.4.1.10 Notifications

101

Messenger service (WinPopup)

102

SNMP notifications

103

3.4.1.11 Event tracing

103

Windows event log

103

3.4.1.13 Backup splitting

104

3.4.1.15 Media components

105

3.4.1.16 Error handling

106

3.4.1.17 Dual destination

107

Skip the task execution

108

3.4.1.20 Tape support

109

Always use a free tape

110

Reset archive bit

111

Use FTP in Active mode

112

3.4.2.1 Pre/Post commands

114

Pre-recovery command

114

Post-recovery command

115

3.4.2.2 Recovery priority

115

3.4.2.3 File-level security

116

3.4.2.4 Notifications

116

3.4.2.5 Event tracing

117

3.4.2.6 Error handling

119

3.4.2.7 Additional settings

119

4 Vaults

121

4.1 Centralized vaults

122

Vault toolbar

123

Pie chart with legend

123

Vault content

123

Vault path

126

Vault database path

127

Vault encryption

127

4.1.3 Tape libraries

129

4.1.3.2 Hardware

130

4.1.3.3 Limitations

130

4.1.3.4 RSM Media Pools

131

Prerequisites

132

Backing up to tape library

133

Recovering from tape library

134

Inventory

135

Labeling

136

4.1.3.7 Tape support

136

4.1.3.8 Tape rotation

137

Choosing a backup scheme

138

Criteria of the choice

138

Case to analyze

139

GFS Example 1

140

GFS Example 2

143

GFS Example 3

145

ToH Example 1

147

ToH Example 2

148

ToH Example 3

149

Tape planning

149

Tape planning: Example 1

150

Tape planning: Example 2

151

4.1.3.9 What if

151

4.2 Personal vaults

152

Metadata

153

4.3 Common operations

155

To show or hide columns

158

5 Scheduling

159

5.1 Daily schedule

160

 first at 8 AM

161

 second at 12 PM (noon)

161

 third at 3 PM

161

 fourth at 5 PM

161

 fifth at 7 PM

161

5.2 Weekly schedule

162

5.3 Monthly schedule

164

Examples

165

Use Wake-On-LAN

166

Parameters

168

5.7 Conditions

170

5.7.1 User is idle

171

5.7.3 Fits time interval

172

5.7.4 User logged off

172

Example

173

Example:

173

6 Direct management

174

Activities

175

System view

176

Way of working

176

Backup plan execution states

177

Backup plan statuses

177

Task states

178

Task statuses

179

 Recovery task (p. 213)

180

 Validation task (p. 233)

180

 Backup plan (p. 189)

180

Run backup plan

184

Task details

184

Archive

185

Settings

185

Backup plan details

186

6.1.3 Log

187

6.2 Creating a backup plan

189

General

190

What to backup

190

Where to back up

190

How to back up

191

Archive validation

191

Backup options

191

Convert to VM

191

6.2.3 Source type

192

6.2.4 Items to back up

193

6.2.6 Exclusions

195

6.2.7 Archive

196

6.2.8.1 Usage examples

198

6.2.8.2 The [DATE] variable

201

6.2.10 Backup schemes

202

6.2.10.3 Simple scheme

203

At a glance

206

Roll-back period

207

6.2.10.7 Initial seeding

211

6.2.11 Archive validation

212

6.3 Recovering data

213

What to recover

214

Where to recover

215

When to recover

215

Recovery options

215

6.3.1 Task credentials

216

6.3.2 Archive selection

216

6.3.3 Data type

217

6.3.4 Content selection

217

6.3.4.2 Files selection

218

6.3.6 Destination selection

219

Disk destination

220

NT signature

220

6.3.6.2 Volumes

221

MBR destination

222

Volume destination

222

Volume properties

222

6.3.6.5 File destination

224

Recovery exclusions

225

Overwriting

225

6.3.8 When to recover

226

6.3.9 Universal Restore

226

Universal Restore settings

227

Post-conversion operations

229

Windows NT/2000/XP/2003

232

Windows Vista/2008

232

6.4.1 Task credentials

234

6.4.2 Archive selection

234

6.4.3 Backup selection

235

6.4.4 Location selection

236

6.5 Mounting an image

237

6.5.1 Archive selection

238

6.5.2 Backup selection

239

6.5.3 Access credentials

239

6.5.4 Volume selection

239

6.6 Managing mounted images

240

What to export

242

6.7.1 Task credentials

243

6.7.2 Archive selection

243

6.7.3 Backup selection

244

6.7.5 Location selection

245

2. Using the archives table

246

3. Naming the new archive

246

6.8 Acronis Secure Zone

247

6.8.1.4 Result confirmation

248

Activate

250

6.10 Bootable media

251

Linux-based bootable media

252

PE-based bootable media

252

Using Bart PE

253

Kernel parameters

254

Network settings

255

Network port

256

\winpe_x86\ISO

259

To add an iSCSI device

261

To add an NDAS device

261

Linux commands and utilities

262

Mounting backup volumes

266

6.10.6 Acronis PXE Server

267

6.11 Disk management

268

6.11.1 Basic precautions

269

Starting the operations

270

Displaying operation results

270

6.11.5 Disk operations

271

6.11.5.2 Basic disk cloning

272

Using advanced options

273

System disk conversion

275

6.11.6 Volume operations

277

Create volume wizard

278

Select destination disks

279

Set the volume size

279

Set the volume options

280

6.11.6.2 Delete volume

281

6.11.6.3 Set active volume

281

6.11.6.6 Format volume

282

6.11.7 Pending operations

283

7 Centralized management

285

7.1.2 Backup policies

287

Machines selection

290

7.1.2.4 Policy details

291

7.1.3 Physical machines

292

7.1.3.1 Actions on machines

293

Applying policies

294

Grouping actions

294

Other actions

295

To add a machine

296

Text file requirements

297

Adding machines to a group

299

Machine details

299

Plans and tasks

301

Member of

303

Inheritance order

304

7.1.3.2 Actions on groups

305

Adding multiple criteria

306

Move one group to another

308

Editing custom groups

308

Group details

308

7.1.4 Virtual machines

309

Grouping of virtual machines

311

7.1.5 Storage nodes

314

 Information panel

315

Adding a storage node

316

Storage node properties

317

7.1.6 Tasks

318

7.1.7 Log

320

Configuring the log table

323

7.1.8 Reporting

324

Report view

325

Filters

325

Report coverage

327

7.1.8.8 Column selection

328

7.1.8.9 Report view

329

Connection parameters

341

Event tracing parameters

343

What to back up

346

7.3.1 Policy credentials

348

7.3.2 Items to back up

349

Names for logical volumes

352

Windows

353

7.3.4 Exclusions

354

7.3.5 Archive

355

2. Naming the archives

356

7.3.7.1 Back up now scheme

358

7.3.7.3 Simple scheme

358

Description

359

Resulting tasks

366

8 Online backup

367

Server uses a free license

369

8.1.7 Initial Seeding FAQ

371

Hard drive types

373

Packaging

373

Scale Recovery?

376

To renew a subscription

379

8.2 Where do I start?

380

8.3 Choosing a subscription

380

Trial subscriptions

381

Operations

384

Backup and recovery options

384

8.7 Terminology reference

385

9 Glossary

387

Backup plan (Plan)

389

Backup policy (Policy)

389

Backup scheme

390

Bootable agent

390

Bootable media

390

Built-in group

390

Centralized backup plan

391

Centralized management

391

Centralized task

391

Centralized vault

391

Direct management

393

Disk backup (Image)

393

Disk group

393

Dynamic disk

394

Dynamic group

394

Dynamic volume

395

Encrypted archive

395

Encrypted vault

395

Managed vault

397

Media builder

397

Personal vault

397

Physical machine

397

Storage node-side cleanup

399

Storage node-side validation

399

Tower of Hanoi

399

Unmanaged vault

400

Validation

400

Validation rules

400

Virtual machine

401





Więcej produktów i instrukcji dla Licencje / aktualizacje oprogramowania ACRONIS

Modele Rodzaj dokumentu
Backup & Recovery 10 Server for Windows, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Server for Windows, ES, 241 strony
Backup & Recovery 10 Workstation, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Workstation, EN, 240 strony
DCTXRPEND26 Podręcznik Użytkownika   Acronis DCTXRPEND25, 31 strony
DISK DIRECTOR SERVER 10 Podręcznik Użytkownika   ACRONIS DISK DIRECTOR SERVER 10 User`s guide, 94 strony
PRIVACY EXPERT CORPORATE - Instrukcja Użytkownika   Acronis Privacy Expert Corporate Installation Guide, 8 strony
A1ENLPDEE22 Arkusz Danych   Acronis Backup Advanced for Exchange v11.5, 13 strony
TPDXMSENS71 Arkusz Danych   Acronis Backup & Recovery 11.5 Advanced Workstation, 1Y, 2 strony
DDSXRBFRA33 Arkusz Danych   Acronis Disk Director Server 10.0, AAS>AAP, ALP, 50-499u, Upg, FR, 2 strony
DDDMLPDES21 Arkusz Danych   Acronis DDDMLPDES21, 92 strony
Backup & Recovery 10 Advanced Server Virtual Edition, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Advanced Server Virtual Edition, ES, 422 strony
Backup & Recovery 10 Advanced Server, ES Podręcznik Użytkownika   Acronis Backup & Recovery 10 Advanced Server, ES, 411 strony