Update 3 Acronis® Backup & Recovery ™ 10 Advanced Workstation User's Guide
10 Copyright © Acronis, Inc., 2000-2010 To recover the entire machine or the operating system that fails to start, use the bootable media (p. 390).
100 Copyright © Acronis, Inc., 2000-2010 3.4.1.9 Backup performance Use this group of options to specify the amount of network and system resource
101 Copyright © Acronis, Inc., 2000-2010 Network connection speed This option is effective for Windows and Linux operating systems and bootable med
102 Copyright © Acronis, Inc., 2000-2010 From - type the e-mail address of the user from whom the message will be sent. If you leave this field
103 Copyright © Acronis, Inc., 2000-2010 3.4.1.11 Event tracing It is possible to duplicate log events of the backup operations, performed on the
104 Copyright © Acronis, Inc., 2000-2010 Types of events to send – choose the types of events to be sent: All events, Errors and warnings, or Er
105 Copyright © Acronis, Inc., 2000-2010 The task will enter the Need interaction state and ask for a new media when the previous one is full. Fixe
106 Copyright © Acronis, Inc., 2000-2010 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.
107 Copyright © Acronis, Inc., 2000-2010 When the option is disabled, the program will display a pop-up window each time it comes across a bad sect
108 Copyright © Acronis, Inc., 2000-2010 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
109 Copyright © Acronis, Inc., 2000-2010 The program will try to execute the failed task again if you select the Restart a failed task check box an
11 Copyright © Acronis, Inc., 2000-2010 1.2.1 Using the management console As soon as the console connects to a managed machine (p. 396) or to a m
110 Copyright © Acronis, Inc., 2000-2010 If the console is connected to the management server The Use a separate tape set option has more precise d
111 Copyright © Acronis, Inc., 2000-2010 Dismount media after backup has finished This option is effective in Windows and Linux operating systems.
112 Copyright © Acronis, Inc., 2000-2010 Deduplicate backup only after transferring it to the vault (do not deduplicate at source) This option is a
113 Copyright © Acronis, Inc., 2000-2010 To view and change the default recovery options, connect the console to the managed machine and then selec
114 Copyright © Acronis, Inc., 2000-2010 E-mail (p. 116) + + - - Win Pop-up (p. 117) + + - - Event tracing: Windows events log (p. 117) + + -
115 Copyright © Acronis, Inc., 2000-2010 complete Result Preset Perform the recovery only after the command is successfully executed. Fail the ta
116 Copyright © Acronis, Inc., 2000-2010 High – to maximize the recovery process speed by taking resources from the other processes. 3.4.2.3 F
117 Copyright © Acronis, Inc., 2000-2010 Port – set the port of the POP server. By default, the port is set to 110. User name – enter the use
118 Copyright © Acronis, Inc., 2000-2010 This option defines whether the agent(s) operating on the managed machine have to log events of the recove
119 Copyright © Acronis, Inc., 2000-2010 3.4.2.6 Error handling These options are effective for Windows and Linux operating systems and bootable m
12 Copyright © Acronis, Inc., 2000-2010 1.2.1.1 "Navigation" pane The navigation pane includes the Navigation tree and the Shortcuts bar
120 Copyright © Acronis, Inc., 2000-2010 Restart machine automatically if it is required for recovery This option is effective when recovery takes
121 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i
122 Copyright © Acronis, Inc., 2000-2010 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau
123 Copyright © Acronis, Inc., 2000-2010 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p.
124 Copyright © Acronis, Inc., 2000-2010 Operations with archives stored in a vault (p. 155) Operations with backups (p. 156) Filtering and sorting
125 Copyright © Acronis, Inc., 2000-2010 Delete a vault 1. Select the vault. 2. Click Delete. You'll be asked whether to keep the archives
126 Copyright © Acronis, Inc., 2000-2010 Select the Acronis Backup & Recovery 10 Storage Node that will manage the vault. You may need to enter
127 Copyright © Acronis, Inc., 2000-2010 Vault database path To specify the path where the vault's database will be created 1. In the Local f
128 Copyright © Acronis, Inc., 2000-2010 4.1.2.2 Creating an unmanaged centralized vault To create an unmanaged centralized vault, perform the fol
129 Copyright © Acronis, Inc., 2000-2010 To attach a managed vault to a storage node, perform the following steps. Vault Storage node Select the A
13 Copyright © Acronis, Inc., 2000-2010 Log. Use this view to examine the history of centralized management operations, such as creating a mana
130 Copyright © Acronis, Inc., 2000-2010 by different components of other versions of the product by means of Acronis Backup & Recovery 10, see
131 Copyright © Acronis, Inc., 2000-2010 4. A tape with backups written by the storage node cannot be read on a tape device, locally attached to a
132 Copyright © Acronis, Inc., 2000-2010 4.1.3.5 Getting started with a tape library If you have a tape library device attached to a machine with
133 Copyright © Acronis, Inc., 2000-2010 If the tape barcode cannot be read, another Tasks Need Interaction window asks you to label a tape. Actio
134 Copyright © Acronis, Inc., 2000-2010 To change the settings of the backup policy/plan to be created click Change… in the Backup options section
135 Copyright © Acronis, Inc., 2000-2010 Any user with access to a managed vault on a tape library is able to perform these operations. However two
136 Copyright © Acronis, Inc., 2000-2010 Labeling When a tape required for data recovery is not found, the Task Need Interaction window will ask th
137 Copyright © Acronis, Inc., 2000-2010 If you leave this option unchanged, then the backups, belonging to the policy or plan being created, might
138 Copyright © Acronis, Inc., 2000-2010 cycle. The same tape rotation enables you to get by with the minimum number of cartridges and not to be bu
139 Copyright © Acronis, Inc., 2000-2010 capability of the tape library (number of drives, loaders, slots and available tapes; capacity of tapes
14 Copyright © Acronis, Inc., 2000-2010 Actions Contains a list of common operations that can be performed on a managed machine or on a management
140 Copyright © Acronis, Inc., 2000-2010 backup policy/plan starts on Wednesday and full backups should be created on every fourth Friday, on Wedne
141 Copyright © Acronis, Inc., 2000-2010 The next figure demonstrates the data backup archive at the moment. The differential backup is drawn as a
142 Copyright © Acronis, Inc., 2000-2010 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f
143 Copyright © Acronis, Inc., 2000-2010 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and
144 Copyright © Acronis, Inc., 2000-2010 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup
145 Copyright © Acronis, Inc., 2000-2010 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF
146 Copyright © Acronis, Inc., 2000-2010 backup deletion frees a tape so it can be reused. The main drawback is the large number of required tap
147 Copyright © Acronis, Inc., 2000-2010 ToH Example 1 Suppose, the backup plan has the following tape options: the Use a separate tape set opti
148 Copyright © Acronis, Inc., 2000-2010 five-level scheme requires up to five tapes for this case. ToH Example 2 Suppose, the backup plan has
149 Copyright © Acronis, Inc., 2000-2010 ToH Example 3 Imagine the backup plan has the following tape options: the Use a separate tape set opti
15 Copyright © Acronis, Inc., 2000-2010 The management console "remembers" the way the panes' borders are set. When you run the mana
150 Copyright © Acronis, Inc., 2000-2010 To simplify the tape planning lets discard the possibility that the calculated tapes might contain backups
151 Copyright © Acronis, Inc., 2000-2010 Total number of required tapes = round up ((2*F_GB + 12*I_GB + 11*D_GB) * CL / T_GB) + 1 = round up ( (2*3
152 Copyright © Acronis, Inc., 2000-2010 node database has all the required information about the content of the moved tapes. So all you need to do
153 Copyright © Acronis, Inc., 2000-2010 Metadata The .meta folder is created during backup in every personal vault. This folder contains additiona
154 Copyright © Acronis, Inc., 2000-2010 [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicate
155 Copyright © Acronis, Inc., 2000-2010 4.2.2.1 Creating a personal vault To create a personal vault 1. In the Name field, type a name for the v
156 Copyright © Acronis, Inc., 2000-2010 To Do Validate an archive Click Validate. The Validation (p. 233) page will be opened with the pre-selec
157 Copyright © Acronis, Inc., 2000-2010 Validate a backup Click Validate. The Validation (p. 233) page will be opened with the pre-selected backu
158 Copyright © Acronis, Inc., 2000-2010 4.3.4 Filtering and sorting archives The following is a guideline for you to filter and sort archives in
159 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
16 Copyright © Acronis, Inc., 2000-2010 By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane); By se
160 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed The scheduler behavior,
161 Copyright © Acronis, Inc., 2000-2010 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day
162 Copyright © Acronis, Inc., 2000-2010 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/
163 Copyright © Acronis, Inc., 2000-2010 Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six mont
164 Copyright © Acronis, Inc., 2000-2010 Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the t
165 Copyright © Acronis, Inc., 2000-2010 From: <...> Set up a date when this schedule will be enabled (an effective date). If this check box
166 Copyright © Acronis, Inc., 2000-2010 In the case when the task needs to be run on different days or weeks with different time intervals dependi
167 Copyright © Acronis, Inc., 2000-2010 Before using this setting, make sure that you have enabled Wake-on-LAN on the registered machines. The mac
168 Copyright © Acronis, Inc., 2000-2010 To specify advanced settings 1. Connect to the management server or to a machine registered on it, and th
169 Copyright © Acronis, Inc., 2000-2010 When creating the plan, type or select the following in the Schedule area: Log name: System Event so
17 Copyright © Acronis, Inc., 2000-2010 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages
170 Copyright © Acronis, Inc., 2000-2010 5.6 When an ADRM alert is received This schedule is effective in Windows operating systems when Acronis®
171 Copyright © Acronis, Inc., 2000-2010 Condition: Time since last backup; Value: Time since the last backup: 12 hour(s). Task start conditi
172 Copyright © Acronis, Inc., 2000-2010 5.7.3 Fits time interval Applies to: Windows, Linux Restricts a backup task's start time to a specif
173 Copyright © Acronis, Inc., 2000-2010 Example Run the backup task at 8 PM on the first and third Friday of every month, preferably when all user
174 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by
175 Copyright © Acronis, Inc., 2000-2010 licenses. Please make sure you have a valid license on Acronis License Server. After a successful license
176 Copyright © Acronis, Inc., 2000-2010 Errors Highlight the date in red if at least one "Error" entry appeared in the log on this date
177 Copyright © Acronis, Inc., 2000-2010 Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup
178 Copyright © Acronis, Inc., 2000-2010 Status How it is determined How to handle 1 Error At least one task has failed. Otherwise, see 2 Iden
179 Copyright © Acronis, Inc., 2000-2010 Any running task can put itself into the Need interaction state when it needs human interaction such as ch
18 Copyright © Acronis, Inc., 2000-2010 Bootable media builder With bootable media builder, you can create bootable media in order to use the agent
180 Copyright © Acronis, Inc., 2000-2010 2 Warning Last result is "Succeeded with warning" View the log to read the warnings -> [opt
181 Copyright © Acronis, Inc., 2000-2010 Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 184) window, select the task you need
182 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (
183 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apo
184 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
185 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover
186 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The
187 Copyright © Acronis, Inc., 2000-2010 Validation (if selected) - events before or after which the validation is performed, and validation sch
188 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following Click View Details. T
189 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I
19 Copyright © Acronis, Inc., 2000-2010 1.3.2 Components for centralized management This section lists the components included in the Acronis Back
190 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for
191 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the location if the plan account does not have access permissions to th
192 Copyright © Acronis, Inc., 2000-2010 Here you select the resulting virtual machine type and location. Available options depend on the host you
193 Copyright © Acronis, Inc., 2000-2010 Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select th
194 Copyright © Acronis, Inc., 2000-2010 The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hibernatio
195 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl
196 Copyright © Acronis, Inc., 2000-2010 By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance
197 Copyright © Acronis, Inc., 2000-2010 To back up data to a locally attached tape device, expand the Tape drives group, then click the require
198 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 201) to the archive name. If you do not
199 Copyright © Acronis, Inc., 2000-2010 Your script can move older backups based on the date stamp. See also “The [Date] variable” (p. 201). E
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 This feature also enables automatic deployment and configuration of Agent for ESX/ESXi to any ESX/ESXi serv
200 Copyright © Acronis, Inc., 2000-2010 You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday
201 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each
202 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the
203 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.
204 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar
205 Copyright © Acronis, Inc., 2000-2010 Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Start bac
206 Copyright © Acronis, Inc., 2000-2010 Have a weekly summary of file changes since last month (Friday weekly differential backup). Have a m
207 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p
208 Copyright © Acronis, Inc., 2000-2010 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8
209 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If th
21 Copyright © Acronis, Inc., 2000-2010 Encryption A managed vault can be configured so that anything written to it is encrypted and anything read
210 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b
211 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six
212 Copyright © Acronis, Inc., 2000-2010 6.2.11 Archive validation Set up the validation task to check if the backed up data is recoverable. If th
213 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent
214 Copyright © Acronis, Inc., 2000-2010 If the managed machine's operating system fails to start or you need to recover data to bare metal, b
215 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the archive location if the task account does not have the right to acc
216 Copyright © Acronis, Inc., 2000-2010 modify the setting again, the line will display the new value unless the new value is the default one. Whe
217 Copyright © Acronis, Inc., 2000-2010 If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the dis
218 Copyright © Acronis, Inc., 2000-2010 6.3.4.1 Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the su
219 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun
22 Copyright © Acronis, Inc., 2000-2010 The Deduplication (p. 18) add-on enables you to create bootable media with the back up to a deduplicating v
220 Copyright © Acronis, Inc., 2000-2010 Disk #: Disk # (MODEL) (p. 222) Select the destination disk for each of the source disks. NT signature (p.
221 Copyright © Acronis, Inc., 2000-2010 6.3.6.2 Volumes Available volume destinations depend on the agents operating on the machine. Recover to:
222 Copyright © Acronis, Inc., 2000-2010 MBR destination To specify a destination disk: 1. Select the disk to recover the MBR to. 2. Click OK. V
223 Copyright © Acronis, Inc., 2000-2010 set as active. If you recover a system volume to another hard disk with its own volumes and operating syst
224 Copyright © Acronis, Inc., 2000-2010 Storage Initial setting: the default storage of the virtualization server if the new machine is created on
225 Copyright © Acronis, Inc., 2000-2010 Recovery exclusions Set up exclusions for the specific files you do not wish to recover. Use the Add, Edi
226 Copyright © Acronis, Inc., 2000-2010 Do not overwrite existing file - this will give the file on the hard disk priority over the file in the
227 Copyright © Acronis, Inc., 2000-2010 DVD supplied by the hardware vendor or download the drivers from the vendor’s Web site. The driver files s
228 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec
229 Copyright © Acronis, Inc., 2000-2010 8. [Optionally] Review the Virtual machine settings (p. 223) and make changes if necessary. Here you can
23 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can back up and recover corrupted or non-supported file systems using the
230 Copyright © Acronis, Inc., 2000-2010 Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,
231 Copyright © Acronis, Inc., 2000-2010 6.3.11.1 How to reactivate GRUB and change its configuration Generally, you should refer to the boot load
232 Copyright © Acronis, Inc., 2000-2010 root (hd0,0) 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first d
233 Copyright © Acronis, Inc., 2000-2010 Before using the recovered storage node, follow these steps: If you have recovered the storage node on
234 Copyright © Acronis, Inc., 2000-2010 [Optional] The validation task will run on behalf of the user who is creating the task. You can change the
235 Copyright © Acronis, Inc., 2000-2010 If the archive is stored in Acronis Online Backup Storage, click Log in and specify the credentials to
236 Copyright © Acronis, Inc., 2000-2010 The bottom part of the window displays the selected backup content, assisting you to find the right backup
237 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre
238 Copyright © Acronis, Inc., 2000-2010 Backup (p. 239) Select the backup. Access credentials (p. 239) [Optional] Provide credentials for the arch
239 Copyright © Acronis, Inc., 2000-2010 If the archive is stored on a locally attached tape device, expand the Tape drives group, then click th
24 Copyright © Acronis, Inc., 2000-2010 * Acronis Backup & Recovery 10 Storage Node handles tape libraries and autoloaders by using Removable
240 Copyright © Acronis, Inc., 2000-2010 2. Click on the selected volume to set its mounting parameters. Access mode - choose the mode you want
241 Copyright © Acronis, Inc., 2000-2010 an entire vault that can be exported by using the command line interface. For more information, please
242 Copyright © Acronis, Inc., 2000-2010 export from a managed vault. The export is performed by the storage node that manages the vault. The de
243 Copyright © Acronis, Inc., 2000-2010 Where to export Archive (p. 245) Enter the path to the location where the new archive will be created. Be
244 Copyright © Acronis, Inc., 2000-2010 If the archive is stored in a local folder on the machine, expand the Local folders group and click the
245 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Use the task credentials The program will acces
246 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre
247 Copyright © Acronis, Inc., 2000-2010 User name. When entering the name of an Active Directory user account, be sure to also specify the doma
248 Copyright © Acronis, Inc., 2000-2010 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.
249 Copyright © Acronis, Inc., 2000-2010 If there is no or not enough unallocated space at the end of the disk, but there is unallocated space b
25 Copyright © Acronis, Inc., 2000-2010 Bootable media Media type Memory ISO image size Additional Based on Windows PE 512 MB 300 MB Linux-
250 Copyright © Acronis, Inc., 2000-2010 If there is not enough unallocated space, the program will take free space from the selected volumes, p
251 Copyright © Acronis, Inc., 2000-2010 Under Linux, when using a boot loader other than GRUB (such as LILO), consider installing it to a Linux ro
252 Copyright © Acronis, Inc., 2000-2010 Advantages: Using Acronis Backup & Recovery 10 in Windows Preinstallation Environment provides more
253 Copyright © Acronis, Inc., 2000-2010 Automated Installation Kit (AIK) for Windows Vista (PE 2.0): http://www.microsoft.com/Downloads/details.as
254 Copyright © Acronis, Inc., 2000-2010 5. [optional] Network settings (p. 255): TCP/IP settings to be assigned to the machine network adapte
255 Copyright © Acronis, Inc., 2000-2010 Disables displaying of startup messages when the Linux kernel is loading, and starts the management consol
256 Copyright © Acronis, Inc., 2000-2010 Subnet mask Gateway DNS server WINS server. Once the bootable agent starts on a machine, the
257 Copyright © Acronis, Inc., 2000-2010 Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to
258 Copyright © Acronis, Inc., 2000-2010 4. Specify path to the folder where the WinPE files are located. 5. Specify network settings (p. 255) fo
259 Copyright © Acronis, Inc., 2000-2010 controller, network adapter, tape drive or other device. You will have to repeat this procedure for each d
26 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
260 Copyright © Acronis, Inc., 2000-2010 Once the machine boots into the Bart PE and you configure the network connection, select Go -> System -
261 Copyright © Acronis, Inc., 2000-2010 6.10.3.1 Setting up a display mode For a machine booted from media, a display video mode is detected auto
262 Copyright © Acronis, Inc., 2000-2010 6.10.4 List of commands and utilities available in Linux-based bootable media Linux-based bootable media
263 Copyright © Acronis, Inc., 2000-2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdu
264 Copyright © Acronis, Inc., 2000-2010 To create the volume structure by using a script 1. Boot the machine from a Linux-based bootable media. 2
265 Copyright © Acronis, Inc., 2000-2010 Example Suppose that you previously performed a disk backup of a machine with the following disk configura
266 Copyright © Acronis, Inc., 2000-2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size
267 Copyright © Acronis, Inc., 2000-2010 2. Use the --mount command, specifying the volume's index in the -i parameter. For example: trueimag
268 Copyright © Acronis, Inc., 2000-2010 On a machine that has an operating system on the hard disk, the BIOS must be configured so that the networ
269 Copyright © Acronis, Inc., 2000-2010 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c
27 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
270 Copyright © Acronis, Inc., 2000-2010 6.11.3 Choosing the operating system for disk management On a machine with two or more operating systems,
271 Copyright © Acronis, Inc., 2000-2010 6.11.5 Disk operations Acronis Disk Director Lite includes the following operations that can be performed
272 Copyright © Acronis, Inc., 2000-2010 6.11.5.2 Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It c
273 Copyright © Acronis, Inc., 2000-2010 volumes, then the Clone basic disk operation will be impossible and the user will not be able to continue.
274 Copyright © Acronis, Inc., 2000-2010 6.11.5.3 Disk conversion: MBR to GPT You would want to convert an MBR basic disk to a GPT basic disk in t
275 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commit (p. 283) it. Exiting the program without committing
276 Copyright © Acronis, Inc., 2000-2010 dynamic disks (all volume types except Simple volumes), then you will be warned here about the possible da
277 Copyright © Acronis, Inc., 2000-2010 6.11.6 Volume operations Acronis Disk Director Lite includes the following operations that can be perform
278 Copyright © Acronis, Inc., 2000-2010 space available on each disk that you want to include in the volume and the size of the volume will depend
279 Copyright © Acronis, Inc., 2000-2010 RAID-5 You will obtain a brief description of every type of volume for better understanding of the adv
28 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
280 Copyright © Acronis, Inc., 2000-2010 The maximum value normally includes the most possible unallocated space. But in some cases the possible un
281 Copyright © Acronis, Inc., 2000-2010 6.11.6.2 Delete volume This version of Acronis Disk Director Lite has reduced functionality because it is
282 Copyright © Acronis, Inc., 2000-2010 6.11.6.4 Change volume letter Windows operating systems assign letters (C:, D:, etc) to hard disk volumes
283 Copyright © Acronis, Inc., 2000-2010 to save additional space which is being lost due to the cluster size on the FAT16 or FAT32 file systems
284 Copyright © Acronis, Inc., 2000-2010 Quitting Acronis Disk Director Lite without committing the pending operations effectively cancels them, so
285 Copyright © Acronis, Inc., 2000-2010 7 Centralized management This section covers operations that can be performed centrally by using the comp
286 Copyright © Acronis, Inc., 2000-2010 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has
287 Copyright © Acronis, Inc., 2000-2010 Statistics for the selected date are displayed to the right of the chart. All the statistics fields are in
288 Copyright © Acronis, Inc., 2000-2010 7.1.2.1 Backup policy deployment states A backup policy deployment state is a combination of the policy d
289 Copyright © Acronis, Inc., 2000-2010 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e
29 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
290 Copyright © Acronis, Inc., 2000-2010 Edit a policy Click Edit. Editing policies is performed in the same way as creating (p. 346). Once the po
291 Copyright © Acronis, Inc., 2000-2010 Sort backup policies by any column Click the column's header to sort the backup policies in ascending
292 Copyright © Acronis, Inc., 2000-2010 View details of the machine (group). Click View details. In the Machine details (p. 299)/Group details (p
293 Copyright © Acronis, Inc., 2000-2010 Static groups contain machines manually added to the group by the administrator. A static member remains i
294 Copyright © Acronis, Inc., 2000-2010 added to the management server. Import machines from Active Directory Click Import machines from Active D
295 Copyright © Acronis, Inc., 2000-2010 Remove a machine from the current static group Click Remove from group. The backup policies applied to th
296 Copyright © Acronis, Inc., 2000-2010 Adding a machine to the management server To be able to deploy backup policies from Acronis Backup & R
297 Copyright © Acronis, Inc., 2000-2010 If more than 1000 matches are found, only the first 1000 items will be displayed. In this case, it is reco
298 Copyright © Acronis, Inc., 2000-2010 Synchronization command line tool Acronis Backup & Recovery 10 Management Server has a command line to
299 Copyright © Acronis, Inc., 2000-2010 Moving a machine to another group To move the selected machine to another group 1. In the group tree, sel
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 8 1.1
30 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
300 Copyright © Acronis, Inc., 2000-2010 Unknown - this status is displayed until the first connection between the management server and the mac
301 Copyright © Acronis, Inc., 2000-2010 Plans and tasks Displays a list of the plans (both local and centralized) and tasks existing on the select
302 Copyright © Acronis, Inc., 2000-2010 recovery task (from the disk backup): The target volume will be deleted and its space unallocated – you
303 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apo
304 Copyright © Acronis, Inc., 2000-2010 This opens Log view with pre-filtered log entries of the selected group. Remove machine from a group. Clic
305 Copyright © Acronis, Inc., 2000-2010 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that ar
306 Copyright © Acronis, Inc., 2000-2010 Refresh a list of groups Click Refresh. The management console will update the list of groups from the ma
307 Copyright © Acronis, Inc., 2000-2010 IP range: 192.168.17.0 - 192.168.17.55 will add to the same group all the machines whose operating syst
308 Copyright © Acronis, Inc., 2000-2010 when the machine was initially added to the management server. Otherwise, the machine will not be added to
309 Copyright © Acronis, Inc., 2000-2010 View details of a policy Click View details. In the Policy details (p. 291) window, examine all informati
31 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
310 Copyright © Acronis, Inc., 2000-2010 This approach comes in handy when: the machine is not hosted on a virtualization server the virtuali
311 Copyright © Acronis, Inc., 2000-2010 When virtual machines become unavailable for the agent (this happens when machines are removed from the vi
312 Copyright © Acronis, Inc., 2000-2010 5. Click OK As a result, a group that has the same name as the vCenter Server appears on the management s
313 Copyright © Acronis, Inc., 2000-2010 When you select a host or cluster where the agent is already installed, the right panel of the ESX Agent D
314 Copyright © Acronis, Inc., 2000-2010 Monitoring the deployment progress and result Creating or updating virtual appliances may take some time.
315 Copyright © Acronis, Inc., 2000-2010 Storage node enables you to: relieve managed machines of unnecessary CPU load by using the storage node
316 Copyright © Acronis, Inc., 2000-2010 Add a storage node to the management server Click Add. In the Add storage node (p. 316) window, specify t
317 Copyright © Acronis, Inc., 2000-2010 Use the fully-qualified domain name (FQDN) of the storage node, that is, a completely specified domain nam
318 Copyright © Acronis, Inc., 2000-2010 Services This tab displays the compacting task scheduling parameters. Service tasks This tab lets the man
319 Copyright © Acronis, Inc., 2000-2010 Stop a task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its oper
32 Copyright © Acronis, Inc., 2000-2010 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium
320 Copyright © Acronis, Inc., 2000-2010 7.1.6.2 Filtering and sorting tasks The following is a guideline for you to filter and sort tasks. To Do
321 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Storage Node has its own local event log. This log's events are acce
322 Copyright © Acronis, Inc., 2000-2010 window. Expand the Information panel, by clicking the chevron. Save the selected log entries to a file
323 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I
324 Copyright © Acronis, Inc., 2000-2010 7.1.8 Reporting Reporting provides the management server administrator with detailed and well-structured
325 Copyright © Acronis, Inc., 2000-2010 Status: The machine statuses—OK, Warning, and/or Error. Last connection (physical machines only): T
326 Copyright © Acronis, Inc., 2000-2010 7.1.8.3 Report about the backup plans In this view, you can generate a report about backup plans existing
327 Copyright © Acronis, Inc., 2000-2010 Owner: The list of users who created the tasks. Duration: The limits for the amount of time within w
328 Copyright © Acronis, Inc., 2000-2010 Filters Under Filters, select which centralized managed vaults to include in the report, and whether to in
329 Copyright © Acronis, Inc., 2000-2010 When choosing the columns to display, use the left arrow and right arrow buttons to include or exclude col
33 Copyright © Acronis, Inc., 2000-2010 a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the warni
330 Copyright © Acronis, Inc., 2000-2010 7.2.1 Parameters set through administrative template The following are the parameters of Acronis Backup &
331 Copyright © Acronis, Inc., 2000-2010 http://msdn2.microsoft.com/en-us/library/aa374177.aspx 7.2.1.2 Acronis Backup & Recovery 10 Storag
332 Copyright © Acronis, Inc., 2000-2010 In this case, the component's connection to the storage node will fail. If the component is an Acroni
333 Copyright © Acronis, Inc., 2000-2010 When the amount of free space in a vault is equal to the value in Vault Free Space Error Limit or less, an
334 Copyright © Acronis, Inc., 2000-2010 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), o
335 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the minimum level of severity of events for sending SNMP notifications about them.
336 Copyright © Acronis, Inc., 2000-2010 A connected machine to be synchronized waits for an available worker. For this reason, the actual number o
337 Copyright © Acronis, Inc., 2000-2010 When connecting to a registered machine, Acronis Backup & Recovery 10 Management Server first uses the
338 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the initial size of the snapshot storage, in megabytes. Possible values: Any intege
339 Copyright © Acronis, Inc., 2000-2010 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue working with full
34 Copyright © Acronis, Inc., 2000-2010 GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme.
340 Copyright © Acronis, Inc., 2000-2010 Default value: 4 (only errors and critical errors will be recorded—if Trace State is set to True) SNMP Spe
341 Copyright © Acronis, Inc., 2000-2010 You can specify a local folder on any volume, including a volume you are backing up. Snapshot Storage Abso
342 Copyright © Acronis, Inc., 2000-2010 The component will use the default settings, which is to use encryption if possible and to trust self-sign
343 Copyright © Acronis, Inc., 2000-2010 Disabled Encryption is disabled; any connection to a client application which requires encryption will not
344 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the minimum severity level of events to be recorded in the file. Only events of lev
345 Copyright © Acronis, Inc., 2000-2010 7.2.3 Parameters set through Windows registry The following are the parameters of Acronis Backup & Re
346 Copyright © Acronis, Inc., 2000-2010 Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\ASN\Configuration\StorageNode\DatabasePath TapesDatabase
347 Copyright © Acronis, Inc., 2000-2010 Exclusions (p. 354) [Optional] Set up exclusions for the specific types of files you do not wish to back u
348 Copyright © Acronis, Inc., 2000-2010 By setting up regular conversion, you obtain a copy of your server or workstation on a virtual machine whi
349 Copyright © Acronis, Inc., 2000-2010 2. Click OK. To learn more about Acronis service credentials, see the Rights for Acronis services (p. 72)
35 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
350 Copyright © Acronis, Inc., 2000-2010 Boot volume Type or select: [BOOT] Refers to the registered machine's boot volume. The boot volume
351 Copyright © Acronis, Inc., 2000-2010 Linux A volume backup stores all files and folders of the selected volume independent of their attributes,
352 Copyright © Acronis, Inc., 2000-2010 In general, the standard name for a Linux partition consists of three components: Disk type; hd for IDE
353 Copyright © Acronis, Inc., 2000-2010 Windows Full path Point to the folders and files to be backed up. If you specified a path to a file or fol
354 Copyright © Acronis, Inc., 2000-2010 Text file file.txt on the volume /dev/hda3 mounted on /home/usr/docs /dev/hda3/file.txt or /home/usr/docs/
355 Copyright © Acronis, Inc., 2000-2010 You can view file or folder attributes in the file/folder properties or by using the attrib command. For m
356 Copyright © Acronis, Inc., 2000-2010 To back up data to Acronis Online Backup Storage, click Log in and specify the credentials to log in to
357 Copyright © Acronis, Inc., 2000-2010 The name looks like ArchiveN, where N is a sequence number. If the program finds that the archive Archive1
358 Copyright © Acronis, Inc., 2000-2010 Custom – to create a custom scheme, where you are free to set up a backup strategy in the way your ente
359 Copyright © Acronis, Inc., 2000-2010 Description Let us suppose that we want to set up a backup plan that will regularly produce a series of da
36 Copyright © Acronis, Inc., 2000-2010 “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M
360 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h
361 Copyright © Acronis, Inc., 2000-2010 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, you may set
362 Copyright © Acronis, Inc., 2000-2010 Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly and monthly backups
363 Copyright © Acronis, Inc., 2000-2010 Recur: Every 1 day Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14
364 Copyright © Acronis, Inc., 2000-2010 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Sin
365 Copyright © Acronis, Inc., 2000-2010 The archive will be cleaned up only during backup and only if there is not enough space to create a new ba
366 Copyright © Acronis, Inc., 2000-2010 Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-y
367 Copyright © Acronis, Inc., 2000-2010 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil
368 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Online might be unavailable in your region. To find more information, cli
369 Copyright © Acronis, Inc., 2000-2010 8.1.3 How long will my backups be kept in the online storage? Your backups remain in the online storage u
37 Copyright © Acronis, Inc., 2000-2010 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b
370 Copyright © Acronis, Inc., 2000-2010 you want to perform file-level backup and recovery you want to back up an independent disk or an RDM
371 Copyright © Acronis, Inc., 2000-2010 backups. You may also want to set or edit the retention rule (p. 369) so that an overflow does not occur.
372 Copyright © Acronis, Inc., 2000-2010 8.1.7.4 What types of hard drive can I use for Initial Seeding? Acronis accepts hard disk drives of the f
373 Copyright © Acronis, Inc., 2000-2010 4. [Optional] If you want to add more backups to the media, repeat step 3 selecting the different data in
374 Copyright © Acronis, Inc., 2000-2010 Step 2 Place the hard drive into an anti-static bag to protect the drive from electrostatic discharge. If
375 Copyright © Acronis, Inc., 2000-2010 You might want to use the most cost-efficient delivery method for having your hard drive returned. Step 5
376 Copyright © Acronis, Inc., 2000-2010 You will receive a notification message when Acronis receives the order and when the order is completed. I
377 Copyright © Acronis, Inc., 2000-2010 8.1.8.4 Is Large Scale Recovery a paid service? Yes, you need to buy one Large Scale Recovery license per
378 Copyright © Acronis, Inc., 2000-2010 [Occasional] Address is undeliverable – Acronis cannot send the disk. On the same Web page, click Chang
379 Copyright © Acronis, Inc., 2000-2010 8.1.9.4 What happens when my subscription expires? A month before the subscription expiration date you re
38 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
380 Copyright © Acronis, Inc., 2000-2010 group. Click the Group column header to sort the subscriptions and then apply the desired actions to the g
381 Copyright © Acronis, Inc., 2000-2010 VMware ESX(i) 4.0 and 4.1 (Host-based backup is available only for paid licenses of VMware ESXi.) Wi
382 Copyright © Acronis, Inc., 2000-2010 4. Select the machine and then click Select subscription. 5. From Available subscriptions, select the su
383 Copyright © Acronis, Inc., 2000-2010 Depending on your settings, this backup will be either full or incremental. But its size is not likely to
384 Copyright © Acronis, Inc., 2000-2010 To configure proxy settings for an agent 1. Connect the console to the machine for which you want to conf
385 Copyright © Acronis, Inc., 2000-2010 Dual destination (p. 107) By using the Backup performance > Network connection speed option, you can
386 Copyright © Acronis, Inc., 2000-2010 Reassign a subscription Assign a subscription that is already activated, to a different machine. Registrat
387 Copyright © Acronis, Inc., 2000-2010 9 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
388 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup
389 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 388), such as pre/post backup commands,
39 Copyright © Acronis, Inc., 2000-2010 the pattern starts with a full backup since the very first backup cannot be incremental the scheme fo
390 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 388) installed on the machine finds data items using the selection rule
391 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre
392 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 388) from a backup archive (p. 388) in order to get rid of outdated backups o
393 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 396) using the direc
394 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/
395 Copyright © Acronis, Inc., 2000-2010 the administrator changes the criteria so that the machine does not meet them anymore. There is no way
396 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 388) containing all data chosen for backup. You do not need acc
397 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 391) managed by a storage node (p. 398). Archives (p. 388) in a mana
398 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 389). Policy See Backup policy (p. 389). R Recovery point Date and time to whic
399 Copyright © Acronis, Inc., 2000-2010 prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
3.1.1 Startup page ...
40 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules
400 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog
401 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 396) is considered vi
41 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
42 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
43 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to una
44 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v
45 Copyright © Acronis, Inc., 2000-2010 device (tape drive or tape library) by... Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7
46 Copyright © Acronis, Inc., 2000-2010 6. Acronis Active Restore (p. 387) is not available when recovering from a tape. Recovery from a locally a
47 Copyright © Acronis, Inc., 2000-2010 OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown" Text description of the event OID: 1.3.6.1
48 Copyright © Acronis, Inc., 2000-2010 list archives located in the zone and backups contained in each archive examine a backup's conte
49 Copyright © Acronis, Inc., 2000-2010 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover
6 Direct management ... 174 6.1 Administ
50 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i
51 Copyright © Acronis, Inc., 2000-2010 How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. A
52 Copyright © Acronis, Inc., 2000-2010 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Res
53 Copyright © Acronis, Inc., 2000-2010 Using the management server, you can create one or more centralized archive storages (centralized vaults (p
54 Copyright © Acronis, Inc., 2000-2010 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi
55 Copyright © Acronis, Inc., 2000-2010 When installing the storage node, register it on the management server in the same way as you register the
56 Copyright © Acronis, Inc., 2000-2010 When you need and have the opportunity to back up any of the servers, navigate to the backup plan as descri
57 Copyright © Acronis, Inc., 2000-2010 Install Agent for Windows or Agent for Linux on each virtual machine. Register the machines on the manag
58 Copyright © Acronis, Inc., 2000-2010 2.12.4.1 A policy on a machine or a group In the diagrams below, each numbered scheme illustrates the resu
59 Copyright © Acronis, Inc., 2000-2010 In the diagram below, the container stands for a group; the one-color circle stands for a machine with one
6.8.2 Managing Acronis Secure Zone ...
60 Copyright © Acronis, Inc., 2000-2010 In the diagram below, the container stands for a group; the two-color circle stands for a machine with two
61 Copyright © Acronis, Inc., 2000-2010 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited
62 Copyright © Acronis, Inc., 2000-2010 another policy. In this case, the first policy's state on the machine will be Revoking and the second
63 Copyright © Acronis, Inc., 2000-2010 The policy gets the Warning status on Windows machines that have either a D: or F: volume, unless an event
64 Copyright © Acronis, Inc., 2000-2010 This status is defined as the most severe status of the policy on the machines included in the group and it
65 Copyright © Acronis, Inc., 2000-2010 Performed on a managed machine during backup. Acronis Backup & Recovery 10 Agent uses the storage node
66 Copyright © Acronis, Inc., 2000-2010 Deduplication at target After backup to a deduplicating vault is completed, the storage node runs the index
67 Copyright © Acronis, Inc., 2000-2010 The deduplicated items that have changed are not identical anymore and therefore will not be deduplicate
68 Copyright © Acronis, Inc., 2000-2010 Similarly, in case of three machines, the ratio becomes 1.5:1; for four machines, it is 1.6:1. It approache
69 Copyright © Acronis, Inc., 2000-2010 2.12.7 Privileges for centralized management This section describes the users' privileges that are re
8.2 Where do I start? ... 380 8.3 C
70 Copyright © Acronis, Inc., 2000-2010 For information about Acronis security groups and their default members, see Acronis security groups (p. 70
71 Copyright © Acronis, Inc., 2000-2010 DCNAME stands for the NetBIOS name of the domain controller. Each dollar sign is surrounded by a single spa
72 Copyright © Acronis, Inc., 2000-2010 Suppose that two users on a machine, UserA and UserB, perform backups from this machine to a centralized va
73 Copyright © Acronis, Inc., 2000-2010 If you choose to specify an existing user account for the agent service or the storage node service, make s
74 Copyright © Acronis, Inc., 2000-2010 Note: The components of earlier Acronis products, including those of the Acronis True Image Echo family, ca
75 Copyright © Acronis, Inc., 2000-2010 Remote Agent ports Client Encryption options Server Encryption options 4. For the new communicati
76 Copyright © Acronis, Inc., 2000-2010 Authentication parameters Selecting the Trust self-signed certificates check box allows the client to conne
77 Copyright © Acronis, Inc., 2000-2010 The use of SSL certificates is enabled. The server will use SSL certificates if their use is enabled on the
78 Copyright © Acronis, Inc., 2000-2010 Self-signed certificates, such as certificates automatically generated during the installation of an Acr
79 Copyright © Acronis, Inc., 2000-2010 4. Restart Windows, or restart the running Acronis services. Non-self-signed certificates You have the opt
8 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
80 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
81 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
82 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
83 Copyright © Acronis, Inc., 2000-2010 This parameter can also be set by using Acronis Administrative Template (p. 333). 3.2.3 Event tracing You
84 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser
85 Copyright © Acronis, Inc., 2000-2010 3.2.6.1 VMware vCenter integration This option defines whether to show virtual machines managed by a VMwar
86 Copyright © Acronis, Inc., 2000-2010 Note: Acronis Backup & Recovery 10 Online supports only HTTP and HTTPS proxy servers. Proxy settings fo
87 Copyright © Acronis, Inc., 2000-2010 3.3.2 Event tracing It is possible to duplicate log events generated by the agent(s), operating on the man
88 Copyright © Acronis, Inc., 2000-2010 You can override the settings set here, exclusively for the events that occur during backup or during recov
89 Copyright © Acronis, Inc., 2000-2010 /etc/snmp/snmpd.conf - configuration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd.conf - conf
9 Copyright © Acronis, Inc., 2000-2010 Running services with minimal user rights Restricted remote access to a backup agent Secure communication be
90 Copyright © Acronis, Inc., 2000-2010 If you choose Yes, I want to participate in the ACEP, information about the hardware configuration, the mos
91 Copyright © Acronis, Inc., 2000-2010 (p. 94) Pre/Post data capture commands (p. 96) + + - - Multi-volume snapshot (p. 98) + + - - File-lev
92 Copyright © Acronis, Inc., 2000-2010 Overwrite data on a tape without prompting for user confirmation Dest: Tape Dest: Tape Dest: Tape Dest: Tap
93 Copyright © Acronis, Inc., 2000-2010 The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a randomly genera
94 Copyright © Acronis, Inc., 2000-2010 Windows and Linux By name F.log F Excludes all files named "F.log" Excludes all folders named &q
95 Copyright © Acronis, Inc., 2000-2010 2. Do any of the following: Click Edit to specify a new command or a batch file Select the existing
96 Copyright © Acronis, Inc., 2000-2010 5. Click Test Command to check if the command is correct. 3.4.1.4 Pre/Post data capture commands This op
97 Copyright © Acronis, Inc., 2000-2010 command execution fails Do not perform the data capture until the command execution is complete Selected S
98 Copyright © Acronis, Inc., 2000-2010 This option defines whether to back up files one by one or by taking an instant data snapshot. Note: Files
99 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 will select the VSS provider automatically based on the operating system r
Komentarze do niniejszej Instrukcji