ACRONIS Backup & Recovery 10 Server for Windows, ES Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Licencje / aktualizacje oprogramowania ACRONIS Backup & Recovery 10 Server for Windows, ES. Acronis Backup & Recovery 10 Server for Windows, ES Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 241
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Server for Windows

Update 3 Acronis® Backup & Recovery ™ 10 Server for Windows User's Guide

Strona 2

10 Copyright © Acronis, Inc., 2000-2010 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficientl

Strona 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 Example: Run the backup task at system startup, but only if more than 12 hours have passed since the last

Strona 4

101 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by

Strona 5

102 Copyright © Acronis, Inc., 2000-2010 licenses. Please make sure you have a valid license on Acronis License Server. After a successful license

Strona 6

103 Copyright © Acronis, Inc., 2000-2010 Errors Highlight the date in red if at least one "Error" entry appeared in the log on this date

Strona 7 - Backup & Recovery™ 10

104 Copyright © Acronis, Inc., 2000-2010  Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup

Strona 8

105 Copyright © Acronis, Inc., 2000-2010 Status How it is determined How to handle 1 Error At least one task has failed. Otherwise, see 2 Iden

Strona 9 - Shortcuts bar

106 Copyright © Acronis, Inc., 2000-2010 Any running task can put itself into the Need interaction state when it needs human interaction such as ch

Strona 10 - Actions

107 Copyright © Acronis, Inc., 2000-2010 2 Warning Last result is "Succeeded with warning" View the log to read the warnings -> [opt

Strona 11 - How to expand/minimize panes

108 Copyright © Acronis, Inc., 2000-2010 Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 111) window, select the task you need

Strona 12 - Action pages

109 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (

Strona 13 - Action page - Controls

11 Copyright © Acronis, Inc., 2000-2010 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acroni

Strona 14 - 1.3.1 Agent for Windows

110 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apo

Strona 15 - 1.4 Supported file systems

111 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Strona 16

112 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover

Strona 17 - 1.7 Technical Support

113 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The

Strona 18 - 2.1 Basic concepts

114 Copyright © Acronis, Inc., 2000-2010  Validation (if selected) - events before or after which the validation is performed, and validation sch

Strona 19

115 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following  Click View Details. T

Strona 20 - Backup using bootable media

116 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I

Strona 21

117 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for

Strona 22 - Full backup

118 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the location if the plan account does not have access permissions to th

Strona 23 - Differential backup

119 Copyright © Acronis, Inc., 2000-2010 Here you select the resulting virtual machine type and location. Available options depend on the host you

Strona 24 - 2.4 Owners and credentials

12 Copyright © Acronis, Inc., 2000-2010 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Strona 25 - 2.5 GFS backup scheme

120 Copyright © Acronis, Inc., 2000-2010 Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select th

Strona 26 - GFS by Acronis

121 Copyright © Acronis, Inc., 2000-2010 The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hibernatio

Strona 27 - The resulting archive: ideal

122 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl

Strona 28 - The resulting archive: real

123 Copyright © Acronis, Inc., 2000-2010 By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\Finance

Strona 29 - Tower of Hanoi overview

124 Copyright © Acronis, Inc., 2000-2010  To back up data to a locally attached tape device, expand the Tape drives group, then click the require

Strona 30 - Tower of Hanoi by Acronis

125 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 128) to the archive name. If you do not

Strona 31 - 2.7 Retention rules

126 Copyright © Acronis, Inc., 2000-2010  Your script can move older backups based on the date stamp. See also “The [Date] variable” (p. 128). E

Strona 32 - 1. Delete backups older than

127 Copyright © Acronis, Inc., 2000-2010  You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday

Strona 33 - Combination of rules 1 and 2

128 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each

Strona 34 - Backing up dynamic volumes

129 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the

Strona 35 - Recovering dynamic volumes

13 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Strona 36 - 2.9 Tape support

130 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.

Strona 37

131 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar

Strona 38 - 2.10 Support for SNMP

132 Copyright © Acronis, Inc., 2000-2010  Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows.  Start bac

Strona 39 - 2.11.1 Acronis Secure Zone

133 Copyright © Acronis, Inc., 2000-2010  Have a weekly summary of file changes since last month (Friday weekly differential backup).  Have a m

Strona 40 - Limitation

134 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p

Strona 41 - Restore)

135 Copyright © Acronis, Inc., 2000-2010 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8

Strona 42 - Supported operating systems

136 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If th

Strona 43 - How to use

137 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b

Strona 44

138 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six

Strona 45 - 3 Options

139 Copyright © Acronis, Inc., 2000-2010 Validation of the archive will validate all the archive’s backups and may take a long time and a lot of sy

Strona 46 - 3.1.5 Fonts

14 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron

Strona 47 - 3.2 Machine options

140 Copyright © Acronis, Inc., 2000-2010 You can choose between creating a virtual machine on the Hyper-V server and creating a VMware Workstation,

Strona 48 - 3.2.1.2 SNMP notifications

141 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Agent for Windows has the ability to recover a disk (volume) backup to a

Strona 49 - 3.2.3 Online backup proxy

142 Copyright © Acronis, Inc., 2000-2010 serve incoming requests is recovered with the highest priority; everything else is recovered in the backgr

Strona 50

143 Copyright © Acronis, Inc., 2000-2010  Run under the current user The task will run under the credentials with which the user who starts the t

Strona 51

144 Copyright © Acronis, Inc., 2000-2010 You can access the server as an anonymous user if the server enables such access. To do so, click Use anon

Strona 52 - 3.3.1.1 Archive protection

145 Copyright © Acronis, Inc., 2000-2010 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh

Strona 53

146 Copyright © Acronis, Inc., 2000-2010 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Phys

Strona 54 - 3.3.1.3 Pre/Post commands

147 Copyright © Acronis, Inc., 2000-2010 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot

Strona 55 - Pre-backup command

148 Copyright © Acronis, Inc., 2000-2010 If Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. These agents en

Strona 56 - Post-backup command

149 Copyright © Acronis, Inc., 2000-2010 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. The Linux-styl

Strona 57 - Post-data capture command

15 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil

Strona 58 -  Do not create a snapshot

150 Copyright © Acronis, Inc., 2000-2010 Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter

Strona 59 - 3.3.1.8 Compression level

151 Copyright © Acronis, Inc., 2000-2010 set by the virtualization product. You can add virtual disks to the machine configuration or, in some case

Strona 60 - HDD writing speed

152 Copyright © Acronis, Inc., 2000-2010 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders with names

Strona 61 - 3.3.1.10 Notifications

153 Copyright © Acronis, Inc., 2000-2010  Password. The password for the account. 2. Click OK. 6.3.8 When to recover Select when to start the

Strona 62 - Messenger service (WinPopup)

154 Copyright © Acronis, Inc., 2000-2010 Universal Restore settings Automatic driver search Specify where the program will search for the Hardware

Strona 63 - SNMP notifications

155 Copyright © Acronis, Inc., 2000-2010 With Acronis Backup & Recovery 10 Agent for Windows, you can recover a disk (volume) backup to a new v

Strona 64 - 3.3.1.13 Backup splitting

156 Copyright © Acronis, Inc., 2000-2010 You will be taken to the Backup plans and tasks view where you can examine the state and progress of the r

Strona 65 - Fixed size

157 Copyright © Acronis, Inc., 2000-2010 One part of the GRUB loader resides either in the first several sectors of the disk or in the first severa

Strona 66 - 3.3.1.16 Error handling

158 Copyright © Acronis, Inc., 2000-2010 cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup 5. Edit the /mnt/system/boot/gr

Strona 67 - 3.3.1.17 Dual destination

159 Copyright © Acronis, Inc., 2000-2010 6.3.11.2 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot

Strona 68 - Skip the task execution

16 Copyright © Acronis, Inc., 2000-2010  ReiserFS4 - volume recovery without the volume resize capability; particular files cannot be recovered f

Strona 69

160 Copyright © Acronis, Inc., 2000-2010 If this does not resolve the problem, or for more details on adding these registry settings, see the corre

Strona 70 - Reset archive bit

161 Copyright © Acronis, Inc., 2000-2010 Backup (p. 162) - specify the archive first, and then select the desired backup in this archive. Vault (p.

Strona 71 - Use FTP in Active mode

162 Copyright © Acronis, Inc., 2000-2010  If the archive is stored in a local folder on the machine, expand the Local folders group and click the

Strona 72

163 Copyright © Acronis, Inc., 2000-2010  To select a centralized vault, expand the Centralized group and click the appropriate vault.  To sele

Strona 73 - Pre-recovery command

164 Copyright © Acronis, Inc., 2000-2010 Choose one of the following:  Now - to start the validation task right after its creation, that is, afte

Strona 74 - 3.3.2.3 File-level security

165 Copyright © Acronis, Inc., 2000-2010 Select volumes to mount and configure the mount settings for every volume: assign a letter or enter the mo

Strona 75 - 3.3.2.4 Notifications

166 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Strona 76 - 3.3.2.5 Event tracing

167 Copyright © Acronis, Inc., 2000-2010  Mount point (in Linux) - specify the directory where you want the volume to be mounted. 3. If several

Strona 77 - 3.3.2.6 Error handling

168 Copyright © Acronis, Inc., 2000-2010 be exported from the media to the target storage. Subsequent incremental backups, which are usually much s

Strona 78 - 3.3.2.7 Additional settings

169 Copyright © Acronis, Inc., 2000-2010 An export task starts immediately after you complete its configuration. An export task can be stopped or d

Strona 79

17 Copyright © Acronis, Inc., 2000-2010 1.6 System requirements The components installed in Windows Edition name Memory (above the OS and running

Strona 80 - 4 Vaults

170 Copyright © Acronis, Inc., 2000-2010 6.7.1 Task credentials Provide credentials for the account under which the task will run. To specify cred

Strona 81 - 4.1 Personal vaults

171 Copyright © Acronis, Inc., 2000-2010  If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as

Strona 82 - Vault content

172 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun

Strona 83 - How can I merge two vaults?

173 Copyright © Acronis, Inc., 2000-2010 2. Using the archives table To assist you with choosing the right destination, the table on the right disp

Strona 84 - 4.2 Common operations

174 Copyright © Acronis, Inc., 2000-2010 Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more ab

Strona 85

175 Copyright © Acronis, Inc., 2000-2010 If you have to take space from the boot or the system volume, please bear the following in mind:  Moving

Strona 86 - To show or hide columns

176 Copyright © Acronis, Inc., 2000-2010 6.8.2 Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 240). Once c

Strona 87 - 5 Scheduling

177 Copyright © Acronis, Inc., 2000-2010  typing an exact value in the Acronis Secure Zone Size field. 4. Click OK. 6.8.2.3 Deleting Acronis S

Strona 88 - 5.1 Daily schedule

178 Copyright © Acronis, Inc., 2000-2010 6.10 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media su

Strona 89 -  fifth at 7 PM

179 Copyright © Acronis, Inc., 2000-2010 6.10.1 How to create bootable media To enable creating physical media, the machine must have a CD/DVD rec

Strona 90 - 5.2 Weekly schedule

18 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Strona 91

180 Copyright © Acronis, Inc., 2000-2010 You can find system requirements for installation by following the above links. 2. [optional] Burn the WA

Strona 92 - 5.3 Monthly schedule

181 Copyright © Acronis, Inc., 2000-2010  upload the selected components to a WDS/RIS. 8. [optional] Windows system drivers to be used by Acron

Strona 93

182 Copyright © Acronis, Inc., 2000-2010 Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you to use

Strona 94

183 Copyright © Acronis, Inc., 2000-2010 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i

Strona 95

184 Copyright © Acronis, Inc., 2000-2010  to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the

Strona 96 - 5.6 Conditions

185 Copyright © Acronis, Inc., 2000-2010 6.10.1.3 Adding the Acronis Plug-in to WinPE 2.x or 3.0 Bootable Media Builder provides three methods of

Strona 97 - 5.6.1 User is idle

186 Copyright © Acronis, Inc., 2000-2010 To create a PE image (ISO file) from the resulting WIM file:  replace the default boot.wim file in your

Strona 98 - 5.6.3 Fits time interval

187 Copyright © Acronis, Inc., 2000-2010 Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable med

Strona 99 - 5.6.4 User logged off

188 Copyright © Acronis, Inc., 2000-2010 6.10.3.2 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Comput

Strona 100 - Example:

189 Copyright © Acronis, Inc., 2000-2010 Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp c

Strona 101 - 6 Direct management

19 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Strona 102 - Activities

190 Copyright © Acronis, Inc., 2000-2010 You can create the volume structure in either of the following ways:  Automatically in Linux-based boota

Strona 103 - Way of working

191 Copyright © Acronis, Inc., 2000-2010 6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD d

Strona 104 - Backup plan statuses

192 Copyright © Acronis, Inc., 2000-2010 The following picture illustrates this configuration. Do the following to recover data from this archive.

Strona 105 - Task states

193 Copyright © Acronis, Inc., 2000-2010 2. In Archive, click Change and then specify the name of the archive. 3. In Backup, click Change and the

Strona 106 - Task statuses

194 Copyright © Acronis, Inc., 2000-2010 configuration so that the volume image can be recovered exactly “as it was” or with any alteration of the

Strona 107 -  Validation task (p. 160)

195 Copyright © Acronis, Inc., 2000-2010 A volume may have a different letter in different Windows operating systems. For example, volume E: might

Strona 108

196 Copyright © Acronis, Inc., 2000-2010  Basic disk cloning (p. 196) - transfers complete data from the source basic MBR disk to the target  D

Strona 109

197 Copyright © Acronis, Inc., 2000-2010 To plan the Clone basic disk operation: 1. Select a disk you want to clone. 2. Select a disk as target f

Strona 110

198 Copyright © Acronis, Inc., 2000-2010 Using advanced options When cloning a disk comprising of a system volume, you need to retain an operating

Strona 111 - Task details

199 Copyright © Acronis, Inc., 2000-2010 3. By clicking OK, you'll add a pending operation of MBR to GPT disk conversion. (To finish the adde

Strona 112 - Settings

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Strona 113 - Backup plan details

20 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Strona 114 - 6.1.3 Log

200 Copyright © Acronis, Inc., 2000-2010 If you need to convert a basic disk to dynamic: 1. Select the basic disk to convert to dynamic. 2. Right

Strona 115

201 Copyright © Acronis, Inc., 2000-2010 In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when

Strona 116 - 6.2 Creating a backup plan

202 Copyright © Acronis, Inc., 2000-2010  Format Volume (p. 207) - Formats a volume giving it the necessary file system The full version of Acron

Strona 117 - Where to back up

203 Copyright © Acronis, Inc., 2000-2010 disks fails, the data can still be accessed from the remaining disks. Unfortunately, the hardware limitati

Strona 118 - Convert to VM

204 Copyright © Acronis, Inc., 2000-2010 Select destination disks The next wizard page will prompt you to choose the disks, whose space will be use

Strona 119 - 6.2.3 Source type

205 Copyright © Acronis, Inc., 2000-2010 Set the volume options On the next wizard page you can assign the volume Letter (by default - the first fr

Strona 120 - 6.2.4 Items to back up

206 Copyright © Acronis, Inc., 2000-2010 2. Select Delete volume or a similar item in the Operations sidebar list, or click the Delete the selecte

Strona 121

207 Copyright © Acronis, Inc., 2000-2010 4. By clicking OK in the Change Letter window, you'll add a pending operation to volume letter assig

Strona 122 - 6.2.6 Exclusions

208 Copyright © Acronis, Inc., 2000-2010 In setting the cluster size you can choose between any number in the preset amount for each file system.

Strona 123 - 6.2.7 Archive

209 Copyright © Acronis, Inc., 2000-2010 To collect system information 1. In the management console, select from the top menu Help > Collect sy

Strona 124

21 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Strona 125 - 6.2.8.1 Usage examples

210 Copyright © Acronis, Inc., 2000-2010 7.1.2 What data can I back up and recover? You can back up any files, volumes, or the entire physical mac

Strona 126

211 Copyright © Acronis, Inc., 2000-2010 7.1.5.2 Is the online storage available under Acronis bootable media? Recovery from Acronis Online Backup

Strona 127

212 Copyright © Acronis, Inc., 2000-2010 7.1.6 Initial Seeding FAQ This section explains what Initial Seeding is, why you would want to use it and

Strona 128 - 6.2.8.2 The [DATE] variable

213 Copyright © Acronis, Inc., 2000-2010 7.1.6.7 How to buy an Initial Seeding license? You can buy an Initial Seeding license from an Acronis par

Strona 129 - 6.2.10 Backup schemes

214 Copyright © Acronis, Inc., 2000-2010 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA, SATA, USB co

Strona 130 - 6.2.10.3 Simple scheme

215 Copyright © Acronis, Inc., 2000-2010 Step 4 Choose the transport company that you will use for shipping. On this company's web site, pr

Strona 131 - Examples

216 Copyright © Acronis, Inc., 2000-2010 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending your hard driv

Strona 132

217 Copyright © Acronis, Inc., 2000-2010  The order has been completed. The media has been returned (or: Returning the media was not requested) –

Strona 133 - At a glance

218 Copyright © Acronis, Inc., 2000-2010 7.1.7.6 Can I obtain backups taken from a number of machines on a single hard drive? No. A separate hard

Strona 134 - Roll-back period

219 Copyright © Acronis, Inc., 2000-2010 7.1.8 Subscription lifecycle FAQ This section explains a subscription lifecycle and subscription operatio

Strona 135

22 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Strona 136

220 Copyright © Acronis, Inc., 2000-2010 An expired subscription can be renewed within five days after expiration. In such cases, the new subscript

Strona 137

221 Copyright © Acronis, Inc., 2000-2010 7.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not register

Strona 138 - 6.2.11 Archive validation

222 Copyright © Acronis, Inc., 2000-2010 the backup will fail. With a server subscription, you can only back up the Windows host. With a subscripti

Strona 139

223 Copyright © Acronis, Inc., 2000-2010 Reassigning a subscription does not restart its subscription period. To assign an activated subscription t

Strona 140 - 6.3 Recovering data

224 Copyright © Acronis, Inc., 2000-2010 Delete backups from Subscription 1 using Machine 2. You cannot delete backups from Subscription 2, unless

Strona 141 - Where to recover

225 Copyright © Acronis, Inc., 2000-2010 By using the Backup performance > Network connection speed option, you can vary the transferring speed

Strona 142 - 6.3.1 Task credentials

226 Copyright © Acronis, Inc., 2000-2010 Registration code A character string for registering a subscription or license that was bought from an Acr

Strona 143 - 6.3.2 Archive selection

227 Copyright © Acronis, Inc., 2000-2010 8 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi

Strona 144 - 6.3.4 Content selection

228 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup

Strona 145 - 6.3.6 Destination selection

229 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 228), such as pre/post backup commands,

Strona 146 - Disk destination

23 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Strona 147 - 6.3.6.2 Volumes

230 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 228) installed on the machine finds data items using the selection rule

Strona 148 - Volume destination

231 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre

Strona 149 - Volume properties

232 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 228) from a backup archive (p. 228) in order to get rid of outdated backups o

Strona 150 - Storage

233 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 236) using the direc

Strona 151 - Recovery exclusions

234 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/

Strona 152 - Overwriting

235 Copyright © Acronis, Inc., 2000-2010  the administrator changes the criteria so that the machine does not meet them anymore. There is no way

Strona 153 - 6.3.9 Universal Restore

236 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 228) containing all data chosen for backup. You do not need acc

Strona 154 - Universal Restore settings

237 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 231) managed by a storage node (p. 238). Archives (p. 228) in a mana

Strona 155

238 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 229). Policy See Backup policy (p. 229). R Recovery point Date and time to whic

Strona 156 - Post-conversion operations

239 Copyright © Acronis, Inc., 2000-2010  prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Strona 157

24 Copyright © Acronis, Inc., 2000-2010 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium

Strona 158

240 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog

Strona 159 - Windows Vista/2008

241 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 236) is considered vi

Strona 160 - What to validate

25 Copyright © Acronis, Inc., 2000-2010 a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the warni

Strona 161 - 6.4.2 Archive selection

26 Copyright © Acronis, Inc., 2000-2010 GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme.

Strona 162 - 6.4.4 Location selection

27 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Strona 163 - 6.4.6 When to validate

28 Copyright © Acronis, Inc., 2000-2010 “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M

Strona 164 - 6.5 Mounting an image

29 Copyright © Acronis, Inc., 2000-2010 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b

Strona 165 - 6.5.1 Archive selection

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1

Strona 166 - 6.5.4 Volume selection

30 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Strona 167 - 6.6 Managing mounted images

31 Copyright © Acronis, Inc., 2000-2010  the pattern starts with a full backup since the very first backup cannot be incremental  the scheme fo

Strona 168

32 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules

Strona 169 - Where to export

33 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Strona 170 - 6.7.2 Archive selection

34 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Strona 171 - 6.7.3 Backup selection

35 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Strona 172 - 6.7.5 Location selection

36 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v

Strona 173 - 6.8 Acronis Secure Zone

37 Copyright © Acronis, Inc., 2000-2010 device (tape drive or tape library) by... Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7

Strona 174

38 Copyright © Acronis, Inc., 2000-2010 6. Acronis Active Restore (p. 227) is not available when recovering from a tape. Recovery from a locally a

Strona 175 - 6.8.1.4 Result confirmation

39 Copyright © Acronis, Inc., 2000-2010 OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown"  Text description of the event OID: 1.3.6.1

Strona 176

3.3.1 Default backup options ...

Strona 177 - Do not activate

40 Copyright © Acronis, Inc., 2000-2010  list archives located in the zone and backups contained in each archive  examine a backup's conte

Strona 178 - 6.10 Bootable media

41 Copyright © Acronis, Inc., 2000-2010 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover

Strona 179 - PE-based bootable media

42 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i

Strona 180 - Using Bart PE

43 Copyright © Acronis, Inc., 2000-2010 How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. A

Strona 181 - Kernel parameters

44 Copyright © Acronis, Inc., 2000-2010 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Res

Strona 182 - Network settings

45 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi

Strona 183 - Network port

46 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Strona 184

47 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Strona 185

48 Copyright © Acronis, Inc., 2000-2010 Use the Types of events to log check box to filter the events to be logged in the Application Event Log of

Strona 186 - \winpe_x86\ISO

49 Copyright © Acronis, Inc., 2000-2010 3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine

Strona 187

6.3.8 When to recover ...

Strona 188

50 Copyright © Acronis, Inc., 2000-2010 3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy server requires a

Strona 189 - Linux commands and utilities

51 Copyright © Acronis, Inc., 2000-2010 Availability of the backup options The set of available backup options depends on:  The environment the a

Strona 190

52 Copyright © Acronis, Inc., 2000-2010 Media components (p. 66) Dest: removable media Dest: removable media - - Error handling (p. 66): Do not sho

Strona 191

53 Copyright © Acronis, Inc., 2000-2010 To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2.

Strona 192

54 Copyright © Acronis, Inc., 2000-2010 Select this check box to skip files and folders whose names match any of the criteria — called file masks —

Strona 193 - 6.11 Disk management

55 Copyright © Acronis, Inc., 2000-2010 Pre-backup command Backup Post-backup command Examples of how you can use the pre/post commands:  delete

Strona 194 - 6.11.1 Basic precautions

56 Copyright © Acronis, Inc., 2000-2010 Post-backup command To specify a command/executable file to be executed after the backup is completed 1. I

Strona 195 - 6.11.5 Disk operations

57 Copyright © Acronis, Inc., 2000-2010 Pre-data capture command To specify a command/batch file to be executed before data capture 1. In the Comm

Strona 196 - 6.11.5.2 Basic disk cloning

58 Copyright © Acronis, Inc., 2000-2010 Continue the backup only after the command is successfully executed. Delete the TIB file and temporary file

Strona 197

59 Copyright © Acronis, Inc., 2000-2010 When this option is set to Disable, the volumes' snapshots will be taken one after the other. As a res

Strona 198 - Using advanced options

7.1.6 Initial Seeding FAQ ...

Strona 199

60 Copyright © Acronis, Inc., 2000-2010 To specify the compression level Select one of the following:  None – the data will be copied as is, with

Strona 200 - System disk conversion

61 Copyright © Acronis, Inc., 2000-2010 The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the following:  Click W

Strona 201 - 6.11.6 Volume operations

62 Copyright © Acronis, Inc., 2000-2010 3. Under Send notifications, select the appropriate check boxes as follows:  When backup completes succe

Strona 202 - Types of dynamic volumes

63 Copyright © Acronis, Inc., 2000-2010 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple

Strona 203 - Create volume wizard

64 Copyright © Acronis, Inc., 2000-2010 For detailed information about using SNMP with Acronis Backup & Recovery 10, please see "Support f

Strona 204 - Set the volume size

65 Copyright © Acronis, Inc., 2000-2010 A single backup file will be created if the destination disk's file system allows the estimated file s

Strona 205 - 6.11.6.2 Delete volume

66 Copyright © Acronis, Inc., 2000-2010 Alternatively, you can disable recovery (p. 74) of the security settings, even if they are available in the

Strona 206 - 6.11.6.3 Set active volume

67 Copyright © Acronis, Inc., 2000-2010 the operation succeeds OR the specified number of attempts is performed, depending on which comes first. Fo

Strona 207 - 6.11.6.6 Format volume

68 Copyright © Acronis, Inc., 2000-2010 3.3.1.18 Task start conditions This option is effective in Windows and Linux operating systems. This opti

Strona 208 - 6.11.7 Pending operations

69 Copyright © Acronis, Inc., 2000-2010 3.3.1.19 Task failure handling This option is effective for Windows and Linux operating systems. This opt

Strona 209 - 7 Online backup

7 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Strona 210

70 Copyright © Acronis, Inc., 2000-2010 The destination CD/DVD can be ejected or the tape can be dismounted after the backup is completed. Ask for

Strona 211

71 Copyright © Acronis, Inc., 2000-2010 Enabling this option turns off deduplicating backups at source, meaning that deduplication will be performe

Strona 212 - 7.1.6 Initial Seeding FAQ

72 Copyright © Acronis, Inc., 2000-2010 The following table summarizes the availability of the recovery options. Agent for Windows Bootable media

Strona 213

73 Copyright © Acronis, Inc., 2000-2010 3.3.2.1 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bo

Strona 214 - Packaging

74 Copyright © Acronis, Inc., 2000-2010 Fail the task if the command execution failed. command execution result. Post-recovery command To specify

Strona 215

75 Copyright © Acronis, Inc., 2000-2010 If the file NTFS permissions were preserved during backup (p. 65), you can choose whether to recover the pe

Strona 216

76 Copyright © Acronis, Inc., 2000-2010  User name – enter the user name.  Password – enter the password. Click Send test e-mail message to che

Strona 217

77 Copyright © Acronis, Inc., 2000-2010 To select whether to log the recovery operations events in the Application Event Log of Windows: Select one

Strona 218

78 Copyright © Acronis, Inc., 2000-2010 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mo

Strona 219

79 Copyright © Acronis, Inc., 2000-2010 The option defines whether to reboot the machine automatically if it is required for recovery. Such might b

Strona 220 - To renew a subscription

8 Copyright © Acronis, Inc., 2000-2010 3. Connect the console to the machine where the agent is installed. Where to go from here For what to do ne

Strona 221 - 7.3 Choosing a subscription

80 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is

Strona 222 - Trial subscriptions

81 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to

Strona 223

82 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display

Strona 224 - Backup and recovery options

83 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault

Strona 225 - 7.7 Terminology reference

84 Copyright © Acronis, Inc., 2000-2010 2. Move the archives to vault B manually by means of a third-party file manager. 3. Edit the backup plans

Strona 226

85 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes

Strona 227 - 8 Glossary

86 Copyright © Acronis, Inc., 2000-2010 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap

Strona 228

87 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a

Strona 229 - Backup policy (Policy)

88 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed The scheduler behavior,

Strona 230 - Built-in group

89 Copyright © Acronis, Inc., 2000-2010 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day(

Strona 231 - Centralized vault

9 Copyright © Acronis, Inc., 2000-2010 tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you

Strona 232

90 Copyright © Acronis, Inc., 2000-2010 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Effective: From: 09/20/2

Strona 233 - Disk group

91 Copyright © Acronis, Inc., 2000-2010 Run the task every Friday at 10PM, starting from a certain date (say 05/14/2009) and ending after six month

Strona 234 - Dynamic group

92 Copyright © Acronis, Inc., 2000-2010  Sunday: once at 9 PM Combining the identical times, the following three schedules can be added to the ta

Strona 235 - Encrypted vault

93 Copyright © Acronis, Inc., 2000-2010 From: <...> Set up a date when this schedule will be enabled (an effective date). If this check box

Strona 236

94 Copyright © Acronis, Inc., 2000-2010 In the case when the task needs to be run on different days or weeks with different time intervals dependin

Strona 237 - Physical machine

95 Copyright © Acronis, Inc., 2000-2010 Parameters Log name Specifies the name of the log. Select the name of a standard log (Application, Security

Strona 238

96 Copyright © Acronis, Inc., 2000-2010  Log name: System  Event source: Microsoft-Windows-WindowsUpdateClient  Event type: Information  Ev

Strona 239 - Tower of Hanoi

97 Copyright © Acronis, Inc., 2000-2010 The scheduler behavior in case the event occurs but the condition (or any of multiple conditions) is not me

Strona 240 - Validation rules

98 Copyright © Acronis, Inc., 2000-2010 (2) If the user becomes idle between 9PM and 11PM, the backup task will start immediately after the user be

Strona 241 - Virtual machine

99 Copyright © Acronis, Inc., 2000-2010 (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immediately follow

Komentarze do niniejszej Instrukcji

Brak uwag