Update 3 Acronis® Backup & Recovery ™ 10 Server for Windows User's Guide
10 Copyright © Acronis, Inc., 2000-2010 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficientl
100 Copyright © Acronis, Inc., 2000-2010 Example: Run the backup task at system startup, but only if more than 12 hours have passed since the last
101 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by
102 Copyright © Acronis, Inc., 2000-2010 licenses. Please make sure you have a valid license on Acronis License Server. After a successful license
103 Copyright © Acronis, Inc., 2000-2010 Errors Highlight the date in red if at least one "Error" entry appeared in the log on this date
104 Copyright © Acronis, Inc., 2000-2010 Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup
105 Copyright © Acronis, Inc., 2000-2010 Status How it is determined How to handle 1 Error At least one task has failed. Otherwise, see 2 Iden
106 Copyright © Acronis, Inc., 2000-2010 Any running task can put itself into the Need interaction state when it needs human interaction such as ch
107 Copyright © Acronis, Inc., 2000-2010 2 Warning Last result is "Succeeded with warning" View the log to read the warnings -> [opt
108 Copyright © Acronis, Inc., 2000-2010 Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 111) window, select the task you need
109 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (
11 Copyright © Acronis, Inc., 2000-2010 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acroni
110 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apo
111 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
112 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover
113 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The
114 Copyright © Acronis, Inc., 2000-2010 Validation (if selected) - events before or after which the validation is performed, and validation sch
115 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following Click View Details. T
116 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I
117 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for
118 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the location if the plan account does not have access permissions to th
119 Copyright © Acronis, Inc., 2000-2010 Here you select the resulting virtual machine type and location. Available options depend on the host you
12 Copyright © Acronis, Inc., 2000-2010 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
120 Copyright © Acronis, Inc., 2000-2010 Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select th
121 Copyright © Acronis, Inc., 2000-2010 The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hibernatio
122 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl
123 Copyright © Acronis, Inc., 2000-2010 By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance
124 Copyright © Acronis, Inc., 2000-2010 To back up data to a locally attached tape device, expand the Tape drives group, then click the require
125 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 128) to the archive name. If you do not
126 Copyright © Acronis, Inc., 2000-2010 Your script can move older backups based on the date stamp. See also “The [Date] variable” (p. 128). E
127 Copyright © Acronis, Inc., 2000-2010 You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday
128 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each
129 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the
13 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
130 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.
131 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar
132 Copyright © Acronis, Inc., 2000-2010 Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Start bac
133 Copyright © Acronis, Inc., 2000-2010 Have a weekly summary of file changes since last month (Friday weekly differential backup). Have a m
134 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p
135 Copyright © Acronis, Inc., 2000-2010 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8
136 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If th
137 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b
138 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six
139 Copyright © Acronis, Inc., 2000-2010 Validation of the archive will validate all the archive’s backups and may take a long time and a lot of sy
14 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron
140 Copyright © Acronis, Inc., 2000-2010 You can choose between creating a virtual machine on the Hyper-V server and creating a VMware Workstation,
141 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a
142 Copyright © Acronis, Inc., 2000-2010 serve incoming requests is recovered with the highest priority; everything else is recovered in the backgr
143 Copyright © Acronis, Inc., 2000-2010 Run under the current user The task will run under the credentials with which the user who starts the t
144 Copyright © Acronis, Inc., 2000-2010 You can access the server as an anonymous user if the server enables such access. To do so, click Use anon
145 Copyright © Acronis, Inc., 2000-2010 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh
146 Copyright © Acronis, Inc., 2000-2010 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Phys
147 Copyright © Acronis, Inc., 2000-2010 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot
148 Copyright © Acronis, Inc., 2000-2010 If Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. These agents en
149 Copyright © Acronis, Inc., 2000-2010 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. The Linux-styl
15 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil
150 Copyright © Acronis, Inc., 2000-2010 Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter
151 Copyright © Acronis, Inc., 2000-2010 set by the virtualization product. You can add virtual disks to the machine configuration or, in some case
152 Copyright © Acronis, Inc., 2000-2010 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders with names
153 Copyright © Acronis, Inc., 2000-2010 Password. The password for the account. 2. Click OK. 6.3.8 When to recover Select when to start the
154 Copyright © Acronis, Inc., 2000-2010 Universal Restore settings Automatic driver search Specify where the program will search for the Hardware
155 Copyright © Acronis, Inc., 2000-2010 With Acronis Backup & Recovery 10 Agent for Windows, you can recover a disk (volume) backup to a new v
156 Copyright © Acronis, Inc., 2000-2010 You will be taken to the Backup plans and tasks view where you can examine the state and progress of the r
157 Copyright © Acronis, Inc., 2000-2010 One part of the GRUB loader resides either in the first several sectors of the disk or in the first severa
158 Copyright © Acronis, Inc., 2000-2010 cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup 5. Edit the /mnt/system/boot/gr
159 Copyright © Acronis, Inc., 2000-2010 6.3.11.2 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot
16 Copyright © Acronis, Inc., 2000-2010 ReiserFS4 - volume recovery without the volume resize capability; particular files cannot be recovered f
160 Copyright © Acronis, Inc., 2000-2010 If this does not resolve the problem, or for more details on adding these registry settings, see the corre
161 Copyright © Acronis, Inc., 2000-2010 Backup (p. 162) - specify the archive first, and then select the desired backup in this archive. Vault (p.
162 Copyright © Acronis, Inc., 2000-2010 If the archive is stored in a local folder on the machine, expand the Local folders group and click the
163 Copyright © Acronis, Inc., 2000-2010 To select a centralized vault, expand the Centralized group and click the appropriate vault. To sele
164 Copyright © Acronis, Inc., 2000-2010 Choose one of the following: Now - to start the validation task right after its creation, that is, afte
165 Copyright © Acronis, Inc., 2000-2010 Select volumes to mount and configure the mount settings for every volume: assign a letter or enter the mo
166 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o
167 Copyright © Acronis, Inc., 2000-2010 Mount point (in Linux) - specify the directory where you want the volume to be mounted. 3. If several
168 Copyright © Acronis, Inc., 2000-2010 be exported from the media to the target storage. Subsequent incremental backups, which are usually much s
169 Copyright © Acronis, Inc., 2000-2010 An export task starts immediately after you complete its configuration. An export task can be stopped or d
17 Copyright © Acronis, Inc., 2000-2010 1.6 System requirements The components installed in Windows Edition name Memory (above the OS and running
170 Copyright © Acronis, Inc., 2000-2010 6.7.1 Task credentials Provide credentials for the account under which the task will run. To specify cred
171 Copyright © Acronis, Inc., 2000-2010 If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
172 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun
173 Copyright © Acronis, Inc., 2000-2010 2. Using the archives table To assist you with choosing the right destination, the table on the right disp
174 Copyright © Acronis, Inc., 2000-2010 Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more ab
175 Copyright © Acronis, Inc., 2000-2010 If you have to take space from the boot or the system volume, please bear the following in mind: Moving
176 Copyright © Acronis, Inc., 2000-2010 6.8.2 Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 240). Once c
177 Copyright © Acronis, Inc., 2000-2010 typing an exact value in the Acronis Secure Zone Size field. 4. Click OK. 6.8.2.3 Deleting Acronis S
178 Copyright © Acronis, Inc., 2000-2010 6.10 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media su
179 Copyright © Acronis, Inc., 2000-2010 6.10.1 How to create bootable media To enable creating physical media, the machine must have a CD/DVD rec
18 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
180 Copyright © Acronis, Inc., 2000-2010 You can find system requirements for installation by following the above links. 2. [optional] Burn the WA
181 Copyright © Acronis, Inc., 2000-2010 upload the selected components to a WDS/RIS. 8. [optional] Windows system drivers to be used by Acron
182 Copyright © Acronis, Inc., 2000-2010 Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you to use
183 Copyright © Acronis, Inc., 2000-2010 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i
184 Copyright © Acronis, Inc., 2000-2010 to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the
185 Copyright © Acronis, Inc., 2000-2010 6.10.1.3 Adding the Acronis Plug-in to WinPE 2.x or 3.0 Bootable Media Builder provides three methods of
186 Copyright © Acronis, Inc., 2000-2010 To create a PE image (ISO file) from the resulting WIM file: replace the default boot.wim file in your
187 Copyright © Acronis, Inc., 2000-2010 Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable med
188 Copyright © Acronis, Inc., 2000-2010 6.10.3.2 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Comput
189 Copyright © Acronis, Inc., 2000-2010 Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp c
19 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
190 Copyright © Acronis, Inc., 2000-2010 You can create the volume structure in either of the following ways: Automatically in Linux-based boota
191 Copyright © Acronis, Inc., 2000-2010 6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD d
192 Copyright © Acronis, Inc., 2000-2010 The following picture illustrates this configuration. Do the following to recover data from this archive.
193 Copyright © Acronis, Inc., 2000-2010 2. In Archive, click Change and then specify the name of the archive. 3. In Backup, click Change and the
194 Copyright © Acronis, Inc., 2000-2010 configuration so that the volume image can be recovered exactly “as it was” or with any alteration of the
195 Copyright © Acronis, Inc., 2000-2010 A volume may have a different letter in different Windows operating systems. For example, volume E: might
196 Copyright © Acronis, Inc., 2000-2010 Basic disk cloning (p. 196) - transfers complete data from the source basic MBR disk to the target D
197 Copyright © Acronis, Inc., 2000-2010 To plan the Clone basic disk operation: 1. Select a disk you want to clone. 2. Select a disk as target f
198 Copyright © Acronis, Inc., 2000-2010 Using advanced options When cloning a disk comprising of a system volume, you need to retain an operating
199 Copyright © Acronis, Inc., 2000-2010 3. By clicking OK, you'll add a pending operation of MBR to GPT disk conversion. (To finish the adde
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
200 Copyright © Acronis, Inc., 2000-2010 If you need to convert a basic disk to dynamic: 1. Select the basic disk to convert to dynamic. 2. Right
201 Copyright © Acronis, Inc., 2000-2010 In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when
202 Copyright © Acronis, Inc., 2000-2010 Format Volume (p. 207) - Formats a volume giving it the necessary file system The full version of Acron
203 Copyright © Acronis, Inc., 2000-2010 disks fails, the data can still be accessed from the remaining disks. Unfortunately, the hardware limitati
204 Copyright © Acronis, Inc., 2000-2010 Select destination disks The next wizard page will prompt you to choose the disks, whose space will be use
205 Copyright © Acronis, Inc., 2000-2010 Set the volume options On the next wizard page you can assign the volume Letter (by default - the first fr
206 Copyright © Acronis, Inc., 2000-2010 2. Select Delete volume or a similar item in the Operations sidebar list, or click the Delete the selecte
207 Copyright © Acronis, Inc., 2000-2010 4. By clicking OK in the Change Letter window, you'll add a pending operation to volume letter assig
208 Copyright © Acronis, Inc., 2000-2010 In setting the cluster size you can choose between any number in the preset amount for each file system.
209 Copyright © Acronis, Inc., 2000-2010 To collect system information 1. In the management console, select from the top menu Help > Collect sy
21 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
210 Copyright © Acronis, Inc., 2000-2010 7.1.2 What data can I back up and recover? You can back up any files, volumes, or the entire physical mac
211 Copyright © Acronis, Inc., 2000-2010 7.1.5.2 Is the online storage available under Acronis bootable media? Recovery from Acronis Online Backup
212 Copyright © Acronis, Inc., 2000-2010 7.1.6 Initial Seeding FAQ This section explains what Initial Seeding is, why you would want to use it and
213 Copyright © Acronis, Inc., 2000-2010 7.1.6.7 How to buy an Initial Seeding license? You can buy an Initial Seeding license from an Acronis par
214 Copyright © Acronis, Inc., 2000-2010 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA, SATA, USB co
215 Copyright © Acronis, Inc., 2000-2010 Step 4 Choose the transport company that you will use for shipping. On this company's web site, pr
216 Copyright © Acronis, Inc., 2000-2010 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending your hard driv
217 Copyright © Acronis, Inc., 2000-2010 The order has been completed. The media has been returned (or: Returning the media was not requested) –
218 Copyright © Acronis, Inc., 2000-2010 7.1.7.6 Can I obtain backups taken from a number of machines on a single hard drive? No. A separate hard
219 Copyright © Acronis, Inc., 2000-2010 7.1.8 Subscription lifecycle FAQ This section explains a subscription lifecycle and subscription operatio
22 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
220 Copyright © Acronis, Inc., 2000-2010 An expired subscription can be renewed within five days after expiration. In such cases, the new subscript
221 Copyright © Acronis, Inc., 2000-2010 7.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not register
222 Copyright © Acronis, Inc., 2000-2010 the backup will fail. With a server subscription, you can only back up the Windows host. With a subscripti
223 Copyright © Acronis, Inc., 2000-2010 Reassigning a subscription does not restart its subscription period. To assign an activated subscription t
224 Copyright © Acronis, Inc., 2000-2010 Delete backups from Subscription 1 using Machine 2. You cannot delete backups from Subscription 2, unless
225 Copyright © Acronis, Inc., 2000-2010 By using the Backup performance > Network connection speed option, you can vary the transferring speed
226 Copyright © Acronis, Inc., 2000-2010 Registration code A character string for registering a subscription or license that was bought from an Acr
227 Copyright © Acronis, Inc., 2000-2010 8 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
228 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup
229 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 228), such as pre/post backup commands,
23 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
230 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 228) installed on the machine finds data items using the selection rule
231 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre
232 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 228) from a backup archive (p. 228) in order to get rid of outdated backups o
233 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 236) using the direc
234 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/
235 Copyright © Acronis, Inc., 2000-2010 the administrator changes the criteria so that the machine does not meet them anymore. There is no way
236 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 228) containing all data chosen for backup. You do not need acc
237 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 231) managed by a storage node (p. 238). Archives (p. 228) in a mana
238 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 229). Policy See Backup policy (p. 229). R Recovery point Date and time to whic
239 Copyright © Acronis, Inc., 2000-2010 prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
24 Copyright © Acronis, Inc., 2000-2010 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium
240 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog
241 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 236) is considered vi
25 Copyright © Acronis, Inc., 2000-2010 a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the warni
26 Copyright © Acronis, Inc., 2000-2010 GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme.
27 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
28 Copyright © Acronis, Inc., 2000-2010 “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M
29 Copyright © Acronis, Inc., 2000-2010 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1
30 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
31 Copyright © Acronis, Inc., 2000-2010 the pattern starts with a full backup since the very first backup cannot be incremental the scheme fo
32 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules
33 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
34 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
35 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to una
36 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v
37 Copyright © Acronis, Inc., 2000-2010 device (tape drive or tape library) by... Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7
38 Copyright © Acronis, Inc., 2000-2010 6. Acronis Active Restore (p. 227) is not available when recovering from a tape. Recovery from a locally a
39 Copyright © Acronis, Inc., 2000-2010 OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown" Text description of the event OID: 1.3.6.1
3.3.1 Default backup options ...
40 Copyright © Acronis, Inc., 2000-2010 list archives located in the zone and backups contained in each archive examine a backup's conte
41 Copyright © Acronis, Inc., 2000-2010 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover
42 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i
43 Copyright © Acronis, Inc., 2000-2010 How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. A
44 Copyright © Acronis, Inc., 2000-2010 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Res
45 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
46 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
47 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
48 Copyright © Acronis, Inc., 2000-2010 Use the Types of events to log check box to filter the events to be logged in the Application Event Log of
49 Copyright © Acronis, Inc., 2000-2010 3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine
6.3.8 When to recover ...
50 Copyright © Acronis, Inc., 2000-2010 3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy server requires a
51 Copyright © Acronis, Inc., 2000-2010 Availability of the backup options The set of available backup options depends on: The environment the a
52 Copyright © Acronis, Inc., 2000-2010 Media components (p. 66) Dest: removable media Dest: removable media - - Error handling (p. 66): Do not sho
53 Copyright © Acronis, Inc., 2000-2010 To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2.
54 Copyright © Acronis, Inc., 2000-2010 Select this check box to skip files and folders whose names match any of the criteria — called file masks —
55 Copyright © Acronis, Inc., 2000-2010 Pre-backup command Backup Post-backup command Examples of how you can use the pre/post commands: delete
56 Copyright © Acronis, Inc., 2000-2010 Post-backup command To specify a command/executable file to be executed after the backup is completed 1. I
57 Copyright © Acronis, Inc., 2000-2010 Pre-data capture command To specify a command/batch file to be executed before data capture 1. In the Comm
58 Copyright © Acronis, Inc., 2000-2010 Continue the backup only after the command is successfully executed. Delete the TIB file and temporary file
59 Copyright © Acronis, Inc., 2000-2010 When this option is set to Disable, the volumes' snapshots will be taken one after the other. As a res
7.1.6 Initial Seeding FAQ ...
60 Copyright © Acronis, Inc., 2000-2010 To specify the compression level Select one of the following: None – the data will be copied as is, with
61 Copyright © Acronis, Inc., 2000-2010 The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the following: Click W
62 Copyright © Acronis, Inc., 2000-2010 3. Under Send notifications, select the appropriate check boxes as follows: When backup completes succe
63 Copyright © Acronis, Inc., 2000-2010 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple
64 Copyright © Acronis, Inc., 2000-2010 For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support f
65 Copyright © Acronis, Inc., 2000-2010 A single backup file will be created if the destination disk's file system allows the estimated file s
66 Copyright © Acronis, Inc., 2000-2010 Alternatively, you can disable recovery (p. 74) of the security settings, even if they are available in the
67 Copyright © Acronis, Inc., 2000-2010 the operation succeeds OR the specified number of attempts is performed, depending on which comes first. Fo
68 Copyright © Acronis, Inc., 2000-2010 3.3.1.18 Task start conditions This option is effective in Windows and Linux operating systems. This opti
69 Copyright © Acronis, Inc., 2000-2010 3.3.1.19 Task failure handling This option is effective for Windows and Linux operating systems. This opt
7 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
70 Copyright © Acronis, Inc., 2000-2010 The destination CD/DVD can be ejected or the tape can be dismounted after the backup is completed. Ask for
71 Copyright © Acronis, Inc., 2000-2010 Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performe
72 Copyright © Acronis, Inc., 2000-2010 The following table summarizes the availability of the recovery options. Agent for Windows Bootable media
73 Copyright © Acronis, Inc., 2000-2010 3.3.2.1 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bo
74 Copyright © Acronis, Inc., 2000-2010 Fail the task if the command execution failed. command execution result. Post-recovery command To specify
75 Copyright © Acronis, Inc., 2000-2010 If the file NTFS permissions were preserved during backup (p. 65), you can choose whether to recover the pe
76 Copyright © Acronis, Inc., 2000-2010 User name – enter the user name. Password – enter the password. Click Send test e-mail message to che
77 Copyright © Acronis, Inc., 2000-2010 To select whether to log the recovery operations events in the Application Event Log of Windows: Select one
78 Copyright © Acronis, Inc., 2000-2010 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mo
79 Copyright © Acronis, Inc., 2000-2010 The option defines whether to reboot the machine automatically if it is required for recovery. Such might b
8 Copyright © Acronis, Inc., 2000-2010 3. Connect the console to the machine where the agent is installed. Where to go from here For what to do ne
80 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is
81 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to
82 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display
83 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault
84 Copyright © Acronis, Inc., 2000-2010 2. Move the archives to vault B manually by means of a third-party file manager. 3. Edit the backup plans
85 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes
86 Copyright © Acronis, Inc., 2000-2010 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap
87 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a
88 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed The scheduler behavior,
89 Copyright © Acronis, Inc., 2000-2010 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day(
9 Copyright © Acronis, Inc., 2000-2010 tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you
90 Copyright © Acronis, Inc., 2000-2010 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2
91 Copyright © Acronis, Inc., 2000-2010 Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six month
92 Copyright © Acronis, Inc., 2000-2010 Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the ta
93 Copyright © Acronis, Inc., 2000-2010 From: <...> Set up a date when this schedule will be enabled (an effective date). If this check box
94 Copyright © Acronis, Inc., 2000-2010 In the case when the task needs to be run on different days or weeks with different time intervals dependin
95 Copyright © Acronis, Inc., 2000-2010 Parameters Log name Specifies the name of the log. Select the name of a standard log (Application, Security
96 Copyright © Acronis, Inc., 2000-2010 Log name: System Event source: Microsoft-Windows-WindowsUpdateClient Event type: Information Ev
97 Copyright © Acronis, Inc., 2000-2010 The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is not me
98 Copyright © Acronis, Inc., 2000-2010 (2) If the user becomes idle between 9PM and 11PM, the backup task will start immediately after the user be
99 Copyright © Acronis, Inc., 2000-2010 (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immediately follow
Komentarze do niniejszej Instrukcji