Acronis Backup for PC - User Guide Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie Acronis Backup for PC - User Guide. Acronis Backup for PC - User Guide User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 243
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Version 11.5 Update 5

Acronis Backup Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS For PC

Strona 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2014 Bootable Media Builder With Bootable Media Builder, you can create bootable media in order to u

Strona 3 - Table of contents

100 Copyright © Acronis International GmbH, 2002-2014 Where to recover This section appears after the required backup is selected and the type of da

Strona 4

101 Copyright © Acronis International GmbH, 2002-2014 2. Selecting data The backed-up data can be selected using the Data view tab, or the Archive v

Strona 5

102 Copyright © Acronis International GmbH, 2002-2014 Location Details Machine name Local machine Local folders If the archive is stored in

Strona 6

103 Copyright © Acronis International GmbH, 2002-2014 4. Do any of the following:  Select the data to recover in the catalog tree, or in the ta

Strona 7

104 Copyright © Acronis International GmbH, 2002-2014 To specify credentials 1. Select one of the following:  Use the task credentials The softwa

Strona 8 - OS support

105 Copyright © Acronis International GmbH, 2002-2014 The selected disks will be recovered to the physical disks of the machine the console is conne

Strona 9

106 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. All the data stored on the target disk will be replaced by the backed-up data, s

Strona 10 - 1.7.2 Management Console

107 Copyright © Acronis International GmbH, 2002-2014 1. If the disk or volume is recovered to its original location, the mapping process reproduce

Strona 11 - 1.10 Technical Support

108 Copyright © Acronis International GmbH, 2002-2014 Existing virtual machine Available when the Acronis Backup Agent for Hyper-V or Agent for VMwa

Strona 12 - Product Updates

109 Copyright © Acronis International GmbH, 2002-2014 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. T

Strona 13 - 2 Getting started

11 Copyright © Acronis International GmbH, 2002-2014 To install the product in the trial mode, run the setup program locally or use the remote insta

Strona 14 - Step 6. Management

110 Copyright © Acronis International GmbH, 2002-2014 Volume (partition) alignment Acronis Backup automatically eliminates volume misalignment – a s

Strona 15 - Operations with pane

111 Copyright © Acronis International GmbH, 2002-2014 Files and folders will be recovered to the same path(s) as they are in the backup. For example

Strona 16 - 2.1.2.1 Views

112 Copyright © Acronis International GmbH, 2002-2014 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders

Strona 17 - 2.1.2.2 Action pages

113 Copyright © Acronis International GmbH, 2002-2014 In addition, the operating system itself is sensitive to the type of firmware. When performing

Strona 18 - 2.1.3 Console options

114 Copyright © Acronis International GmbH, 2002-2014 If the initialization may result in bootability loss, the software takes the partitioning styl

Strona 19 - 2.1.3.4 Pop-up messages

115 Copyright © Acronis International GmbH, 2002-2014 The ability of the recovered system to boot up in different modes depends on the operating sys

Strona 20

116 Copyright © Acronis International GmbH, 2002-2014 Original system Target hardware BIOS UEFI UEFI OS: non- convertible The target disk will be in

Strona 21 - 3.1 Owners

117 Copyright © Acronis International GmbH, 2002-2014 Usage scenarios 1. The system uptime is one of the efficiency criteria. Examples: Client-orie

Strona 22 - Task credentials

118 Copyright © Acronis International GmbH, 2002-2014 5.4 Bootability troubleshooting If a system was bootable at the time of backup, you expect th

Strona 23 - Services of Acronis Backup

119 Copyright © Acronis International GmbH, 2002-2014 Solution: Reactivate the boot loader. You might also need to fix the loader configuration file

Strona 24

12 Copyright © Acronis International GmbH, 2002-2014 Product Updates You can download the latest updates for all your registered Acronis software pr

Strona 25 - Incremental backup

120 Copyright © Acronis International GmbH, 2002-2014  The device on which the Linux kernel is located—typically, this is the boot partition or th

Strona 26

121 Copyright © Acronis International GmbH, 2002-2014 5.5 Reverting a Windows system to its factory settings If your Windows operating system was d

Strona 27 - (Windows)

122 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also

Strona 28

123 Copyright © Acronis International GmbH, 2002-2014 Set current date and time for recovered files This option is effective only when recovering fi

Strona 29 - By disk specification

124 Copyright © Acronis International GmbH, 2002-2014  When recovery completes successfully.  When recovery fails.  When user interaction is r

Strona 30 - 3.10 Support for Windows 8

125 Copyright © Acronis International GmbH, 2002-2014 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With

Strona 31 - Common backup rule

126 Copyright © Acronis International GmbH, 2002-2014  Community – type the name of SNMP community to which both the host running SNMP management

Strona 32 - 3.12 Support for SNMP

127 Copyright © Acronis International GmbH, 2002-2014 This option is effective only when you select for backup a folder that is higher in the folder

Strona 33 - 4 Backup

128 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the recovery only after the command is successfully executed. Fail the task if

Strona 34 - Plan parameters

129 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk

Strona 35

13 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to

Strona 36

130 Copyright © Acronis International GmbH, 2002-2014  During conversion which is part of a backup plan (p. 131), the software creates the virtual

Strona 37 - Exclusion examples

131 Copyright © Acronis International GmbH, 2002-2014  Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo

Strona 38 - 1. Selecting the destination

132 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac

Strona 39

133 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker

Strona 40 - 4.2.6 Backup schemes

134 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr

Strona 41 - 4.2.6.1 Simple scheme

135 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso

Strona 42 - Parameters

136 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak

Strona 43 - Examples

137 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A

Strona 44

138 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio

Strona 45 - At a glance

139 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F

Strona 46

14 Copyright © Acronis International GmbH, 2002-2014 Step 5. Recovery Recover (p. 99) To recover data, you need to select the backed-up data

Strona 47

140 Copyright © Acronis International GmbH, 2002-2014 7.1.1 Working with vaults This section briefly describes the main GUI elements of the selecte

Strona 48 - Roll-back period

141 Copyright © Acronis International GmbH, 2002-2014 personal vault available to all users that can log on the system. Personal vaults are created

Strona 49 - 4.2.6.5 Manual start

142 Copyright © Acronis International GmbH, 2002-2014 vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut

Strona 50 - 4.2.7 Archive validation

143 Copyright © Acronis International GmbH, 2002-2014 7.2 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup

Strona 51 - Parameters specification

144 Copyright © Acronis International GmbH, 2002-2014 The Acronis Secure Zone cannot be organized on a dynamic disk. To allocate space for Acronis S

Strona 52

145 Copyright © Acronis International GmbH, 2002-2014  Acronis Secure Zone is always created at the end of the hard disk. When calculating the fin

Strona 53

146 Copyright © Acronis International GmbH, 2002-2014 7.2.2.2 Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acro

Strona 54 - 4.3.1 The [DATE] variable

147 Copyright © Acronis International GmbH, 2002-2014 When you back up using the Back up now feature or under bootable media, the removable device i

Strona 55 - 4.3.3 Usage examples

148 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an

Strona 56

149 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 150) [Optional] Provide credentials for accessing the source if the task accou

Strona 57

15 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Management Console - Welcome screen Key elements of the console workspace Name

Strona 58 - 4.4 Scheduling

150 Copyright © Acronis International GmbH, 2002-2014  To select a network share, expand the Network folders group, select the required networked

Strona 59 - 4.4.1 Daily schedule

151 Copyright © Acronis International GmbH, 2002-2014 Specify the appropriate parameters as follows:  Date and time - the date and time when to st

Strona 60

152 Copyright © Acronis International GmbH, 2002-2014 Example. When backing up data to a remote location through an unstable or low-bandwidth networ

Strona 61 - 4.4.2 Weekly schedule

153 Copyright © Acronis International GmbH, 2002-2014 To access the Export page first select a validation object: an archive or a backup. 1. Select

Strona 62

154 Copyright © Acronis International GmbH, 2002-2014 2. In the table to the right of the tree, select the archive. The table displays the names of

Strona 63 - 4.4.3 Monthly schedule

155 Copyright © Acronis International GmbH, 2002-2014  To export data to a network share, expand the Network folders group, select the required ne

Strona 64

156 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if

Strona 65

157 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or

Strona 66

158 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. According to the original FTP specification, credentials required for access to

Strona 67 - 4.4.5 Conditions

159 Copyright © Acronis International GmbH, 2002-2014 To perform operations with archives and backups 1. In the Navigation pane, select the vault w

Strona 68 - Example:

16 Copyright © Acronis International GmbH, 2002-2014 How to change the panes' borders 1. Point to the pane's border. 2. When the pointer

Strona 69 - 4.4.5.4 Users logged off

160 Copyright © Acronis International GmbH, 2002-2014 2. On the Archive view tab of the vault, select the archive. Then, expand the archive and cli

Strona 70

161 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full When the chain of incremental backups in an archive becomes

Strona 71 - 4.5.1 Supported locations

162 Copyright © Acronis International GmbH, 2002-2014 Please be aware that consolidation is just a method of deletion but not an alternative to dele

Strona 72 - Simple scheme

163 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or

Strona 73 - Custom scheme

164 Copyright © Acronis International GmbH, 2002-2014  When a machine is booted with a PE-based bootable media, you cannot select optical media su

Strona 74 -  Consolidate these backups

165 Copyright © Acronis International GmbH, 2002-2014  User name and password to be entered on the console side at the connection to the agent. If

Strona 75 - 4.5.5 Usage examples

166 Copyright © Acronis International GmbH, 2002-2014 Specifies the video mode to be used by the bootable media's graphical user interface. The

Strona 76

167 Copyright © Acronis International GmbH, 2002-2014 9.1.1.2 Network settings While creating Acronis bootable media, you have an option to pre-con

Strona 77 - 4.7 Default backup options

168 Copyright © Acronis International GmbH, 2002-2014 If the port has not been pre-configured, the agent uses the default port number (9876.) This p

Strona 78

169 Copyright © Acronis International GmbH, 2002-2014 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AI

Strona 79 - 4.7.1 Additional settings

17 Copyright © Acronis International GmbH, 2002-2014 Sorting, filtering and configuring table items The following is a guideline to sort, filter and

Strona 80 - 4.7.3 Backup cataloging

170 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select whether to enable or disable remote connections to a machine booted from

Strona 81 - 4.7.4 Backup performance

171 Copyright © Acronis International GmbH, 2002-2014 Adding VLANs In the Network Settings window, you can add virtual local area networks (VLANs).

Strona 82 - 4.7.5 Backup splitting

172 Copyright © Acronis International GmbH, 2002-2014 9.3.1 Setting up a display mode For a machine booted from media, a display video mode is dete

Strona 83 - 4.7.6 Compression level

173 Copyright © Acronis International GmbH, 2002-2014 9.4 List of commands and utilities available in Linux-based bootable media Linux-based bootab

Strona 84

174 Copyright © Acronis International GmbH, 2002-2014 grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 9.5

Strona 85 - 4.7.8 E-mail notifications

175 Copyright © Acronis International GmbH, 2002-2014 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume co

Strona 86 - 4.7.9 Error handling

176 Copyright © Acronis International GmbH, 2002-2014 1. Back up the disk on which volumes will be created or managed. Having your most important d

Strona 87 - 4.7.10 Event tracing

177 Copyright © Acronis International GmbH, 2002-2014 10.5 "Disk management" view Acronis Disk Director Lite is controlled through the Di

Strona 88

178 Copyright © Acronis International GmbH, 2002-2014 10.6.1 Disk initialization If you add any new disk to your machine, Acronis Disk Director Lit

Strona 89 - 4.7.14 Media components

179 Copyright © Acronis International GmbH, 2002-2014 10.6.2.1 Selecting source and target disks The program displays a list of partitioned disks a

Strona 90 - 4.7.15 Mount points

18 Copyright © Acronis International GmbH, 2002-2014 Using controls and specifying settings Use active controls to specify a backup plan or recovery

Strona 91 - 4.7.17 Pre/Post commands

180 Copyright © Acronis International GmbH, 2002-2014 You have the following two alternatives to retain system bootability on the target disk volume

Strona 92 - 4.7.17.1 Pre-backup command

181 Copyright © Acronis International GmbH, 2002-2014 Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR t

Strona 93

182 Copyright © Acronis International GmbH, 2002-2014 System disk conversion Acronis Disk Director Lite does not require an operating system reboot

Strona 94

183 Copyright © Acronis International GmbH, 2002-2014  safe conversion of a dynamic disk to basic when it contains volumes with data for simple an

Strona 95

184 Copyright © Acronis International GmbH, 2002-2014  Store backups (images) of other volumes/disks on a special volume;  Install a new operati

Strona 96

185 Copyright © Acronis International GmbH, 2002-2014 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to

Strona 97 - Skip the task execution

186 Copyright © Acronis International GmbH, 2002-2014 To create a RAID-5 volume:  Select three destination disks to create the volume on. After yo

Strona 98 - Enabling VSS Full backup

187 Copyright © Acronis International GmbH, 2002-2014 If you are creating a basic volume, which can be made into a system volume, this page will be

Strona 99 - 5 Recovery

188 Copyright © Acronis International GmbH, 2002-2014 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the

Strona 100 - 5.1.1 What to recover

189 Copyright © Acronis International GmbH, 2002-2014 an application volume, DATA — a data volume, etc., but it does not imply that only the type of

Strona 101 - 2. Selecting data

19 Copyright © Acronis International GmbH, 2002-2014 If the option is enabled, the credentials for various locations that you enter during a console

Strona 102 - 5.1.1.2 Data catalog

190 Copyright © Acronis International GmbH, 2002-2014 10.8 Pending operations All operations, which were prepared by the user in manual mode or wit

Strona 103

191 Copyright © Acronis International GmbH, 2002-2014 11 Administering a managed machine This section describes the views that are available through

Strona 104 - 5.1.4 Where to recover

192 Copyright © Acronis International GmbH, 2002-2014 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 200) or

Strona 105 - Disk destination

193 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea

Strona 106 - NT signature

194 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At

Strona 107 - Recover to:

195 Copyright © Acronis International GmbH, 2002-2014 A task changes to the Running state when the event specified by the schedule occurs AND all th

Strona 108 - Volume destination

196 Copyright © Acronis International GmbH, 2002-2014  Deploying of a backup plan to multiple machines You want to use the same backup plan on mul

Strona 109 - File system

197 Copyright © Acronis International GmbH, 2002-2014 To change the encrypted password 1. In the command line, run the acronis_encrypt utility: acr

Strona 110 - Volume (partition) alignment

198 Copyright © Acronis International GmbH, 2002-2014 1. Add the <rules_type> tag with "disks" or "files" value, dependin

Strona 111 - Recovery exclusions

199 Copyright © Acronis International GmbH, 2002-2014 folder, the agent imports the backup plan from that file. If you change (or delete) an .xml fi

Strona 112 - 5.1.6 Task credentials

2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr

Strona 113 - 5.2.1 Recovering volumes

20 Copyright © Acronis International GmbH, 2002-2014 The preset is: Enabled. To make a selection, select or clear the Notify when the management con

Strona 114 - 5.2.2 Recovering disks

200 Copyright © Acronis International GmbH, 2002-2014 11.1.5 Backup plan details The Backup plan details window (also duplicated on the Information

Strona 115

201 Copyright © Acronis International GmbH, 2002-2014  Name - name of the archive.  Location - name of the vault or path to the folder, where th

Strona 116 - 5.3 Acronis Active Restore

202 Copyright © Acronis International GmbH, 2002-2014 Select multiple log entries  non-contiguous: hold down CTRL and click the log entries one by

Strona 117 - How to use

203 Copyright © Acronis International GmbH, 2002-2014  Code - It can be blank or the program error code if the event type is error. Error code is

Strona 118

204 Copyright © Acronis International GmbH, 2002-2014 11.4 Changing a license By changing the license, you switch a product from trial mode to full

Strona 119

205 Copyright © Acronis International GmbH, 2002-2014 11.6 Adjusting machine options The machine options define the general behavior of all Acronis

Strona 120 - 5.4.2 About Windows loaders

206 Copyright © Acronis International GmbH, 2002-2014 When enabled, you can specify the keeping period for the accepted alerts. The accepted alerts

Strona 121

207 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encr

Strona 122 - 5.6.1 Additional settings

208 Copyright © Acronis International GmbH, 2002-2014 This option is not available when operating under the bootable media. The option defines wheth

Strona 123 - 5.6.2 E-mail notifications

209 Copyright © Acronis International GmbH, 2002-2014 Linux To receive SNMP messages on a machine running Linux, the net-snmp (for RHEL and SUSE) or

Strona 124 - 5.6.3 Error handling

21 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding

Strona 125 - 5.6.4 Event tracing

210 Copyright © Acronis International GmbH, 2002-2014 When the option is enabled, the program compares the actual log size with the maximum size aft

Strona 126 - 5.6.6 Mount points

211 Copyright © Acronis International GmbH, 2002-2014 12 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th

Strona 127 - 5.6.7 Pre/Post commands

212 Copyright © Acronis International GmbH, 2002-2014 Example You might want to use the following backup strategy for a file server. Back up the c

Strona 128 - 5.6.8 Recovery priority

213 Copyright © Acronis International GmbH, 2002-2014 Windows Vista – all editions except for Vista Home Basic and Vista Home Premium (x86, x64) Win

Strona 129 - 6.1 Conversion methods

214 Copyright © Acronis International GmbH, 2002-2014 12.1.6.4 What if a network connection is lost during cloud backup or recovery? The software w

Strona 130 - Custom loader reactivation

215 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t

Strona 131 - 6.2.2.1 Conversion settings

216 Copyright © Acronis International GmbH, 2002-2014 12.1.7.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac

Strona 132

217 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,

Strona 133 - Storage space

218 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa

Strona 134

219 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo

Strona 135 - 6.2.3.1 Steps to perform

22 Copyright © Acronis International GmbH, 2002-2014 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user. I

Strona 136

220 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis

Strona 137 - Choosing the disk interface

221 Copyright © Acronis International GmbH, 2002-2014 12.1.8.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens

Strona 138 - 6.3.2 Steps to perform

222 Copyright © Acronis International GmbH, 2002-2014 12.1.9.1 How do I access my account management webpage? Go to http://www.acronis.com/my/cloud

Strona 139 - 7.1 Vaults

223 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli

Strona 140 - 7.1.2 Personal vaults

224 Copyright © Acronis International GmbH, 2002-2014 12.1.9.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are

Strona 141 - Metadata

225 Copyright © Acronis International GmbH, 2002-2014  Install Acronis Backup on the machine you want to back up, start the product, click Back up

Strona 142 - Creating a personal vault

226 Copyright © Acronis International GmbH, 2002-2014 Example The diagram below shows what happens if you reassign a subscription to a different mac

Strona 143 - 7.2 Acronis Secure Zone

227 Copyright © Acronis International GmbH, 2002-2014 2. On the Options menu, click Machine options. 3. Click Cloud backup proxy. 4. Enter the pr

Strona 144 - 7.2.1.4 Result confirmation

228 Copyright © Acronis International GmbH, 2002-2014 12.7 Limitations of the cloud storage Unlike other types of storage available in Acronis Back

Strona 145

229 Copyright © Acronis International GmbH, 2002-2014 Assign a subscription to a machine Reserve a subscription for a particular machine in order to

Strona 146 - 7.3 Removable devices

23 Copyright © Acronis International GmbH, 2002-2014 3.3 User privileges on a managed machine When managing a machine running Windows, the scope of

Strona 147

230 Copyright © Acronis International GmbH, 2002-2014 Renew a subscription Assign a subscription of the same type and with the same or a larger stor

Strona 148 - What to validate

231 Copyright © Acronis International GmbH, 2002-2014 13 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o

Strona 149 - 8.1.3 Vault selection

232 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b

Strona 150 - 8.1.5 When to validate

233 Copyright © Acronis International GmbH, 2002-2014  the backup archive (p. 232) name and location  the backup scheme (p. 233). This includes

Strona 151 - 8.1.6 Task credentials

234 Copyright © Acronis International GmbH, 2002-2014  access and back up the data that has survived in a corrupted system  deploy an operating

Strona 152

235 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 240) administrato

Strona 153 - 8.2.1 Archive selection

236 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 240) contains all data stored o

Strona 154 - 8.2.4 Destination selection

237 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 232) that contains a sector-based copy of a disk or a volume

Strona 155 - 3. Naming the new archive

238 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di

Strona 156 - 8.3 Mounting an image

239 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil

Strona 157 - 8.3.3 Access credentials

24 Copyright © Acronis International GmbH, 2002-2014 Service name Purpose Account used by the service Privileges added to the account User rights Gr

Strona 158 - 8.3.4 Volume selection

240 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli

Strona 159

241 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect

Strona 160

242 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req

Strona 161 - Limitations

243 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 233) aimed to maintain the optimal balance between

Strona 162

25 Copyright © Acronis International GmbH, 2002-2014 3.5 Full, incremental and differential backups Acronis Backup provides the capability to use p

Strona 163 - 9 Bootable media

26 Copyright © Acronis International GmbH, 2002-2014 Differential backup A differential backup stores changes to the data against the latest full ba

Strona 164

27 Copyright © Acronis International GmbH, 2002-2014 Linux A volume backup stores all files and directories of the selected volume independent of th

Strona 165 - 9.1.1.1 Kernel parameters

28 Copyright © Acronis International GmbH, 2002-2014 simple/spanned, striped, mirrored, RAID 0+1, RAID-5) will not change. The target volume size ha

Strona 166

29 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup includes a handy disk management utility which enables you to perform the above

Strona 167 - 9.1.1.3 Network port

3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...

Strona 168

30 Copyright © Acronis International GmbH, 2002-2014 For details about transferring Windows machines between UEFI and BIOS, see "Recovering BIO

Strona 169

31 Copyright © Acronis International GmbH, 2002-2014 3.11 Compatibility with encryption software Acronis Backup fully retains its functionality whe

Strona 170 - Configuring network settings

32 Copyright © Acronis International GmbH, 2002-2014 3.12 Support for SNMP SNMP objects Acronis Backup provides the following Simple Network Manag

Strona 171 - Adding VLANs

33 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i

Strona 172 - To add an NDAS device

34 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 146) If the specified location is an R

Strona 173 - Linux-based bootable media

35 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan

Strona 174 - Do not activate

36 Copyright © Acronis International GmbH, 2002-2014 A file-level backup is not sufficient for recovery of the operating system. Choose file backup

Strona 175 - 10 Disk management

37 Copyright © Acronis International GmbH, 2002-2014 Exclude all hidden files and folders Select this check box to skip files and folders that have

Strona 176

38 Copyright © Acronis International GmbH, 2002-2014 By name F.log F Excludes all files named "F.log" Excludes all folders named "F&q

Strona 177 - 10.6 Disk operations

39 Copyright © Acronis International GmbH, 2002-2014 By selecting the existing archive, you are meddling in the area of another backup plan that use

Strona 178 - 10.6.2 Basic disk cloning

4 Copyright © Acronis International GmbH, 2002-2014 4.2.6 Backup schemes ...

Strona 179 - Using advanced options

40 Copyright © Acronis International GmbH, 2002-2014 Destination Details FTP, SFTP To back up data to FTP or SFTP, type the server name or address

Strona 180

41 Copyright © Acronis International GmbH, 2002-2014 backup will be performed and select from these days the day of weekly/monthly backup. Then you

Strona 181

42 Copyright © Acronis International GmbH, 2002-2014  Custom retention periods for backups of each type Description Let us suppose that we want to

Strona 182 - System disk conversion

43 Copyright © Acronis International GmbH, 2002-2014 Backup type Specifies the types of daily, weekly and monthly backups.  Always full - all the

Strona 183 - 10.7 Volume operations

44 Copyright © Acronis International GmbH, 2002-2014  Back up on: Workdays  Weekly/monthly: Friday  Keep backups:  Daily: 1 week  Weekly:

Strona 184

45 Copyright © Acronis International GmbH, 2002-2014  Monthly: indefinitely Backup is thus performed only on Fridays. This makes Friday the only c

Strona 185 - Select destination disks

46 Copyright © Acronis International GmbH, 2002-2014 Zone. This setting is not applicable to FTP and SFTP servers. This setting enables deletion of

Strona 186 - Set the volume options

47 Copyright © Acronis International GmbH, 2002-2014 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demo

Strona 187 - 10.7.2 Delete volume

48 Copyright © Acronis International GmbH, 2002-2014 schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (ex

Strona 188 - 10.7.5 Change volume label

49 Copyright © Acronis International GmbH, 2002-2014 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 t

Strona 189 - 10.7.6 Format volume

5 Copyright © Acronis International GmbH, 2002-2014 5.1.5 When to recover ...

Strona 190 - 10.8 Pending operations

50 Copyright © Acronis International GmbH, 2002-2014 4.2.6.6 Initial seeding This backup scheme is available when Acronis Cloud Storage is selected

Strona 191 - 11.1 Backup plans and tasks

51 Copyright © Acronis International GmbH, 2002-2014 2. Specify:  User name. When entering the name of an Active Directory user account, be sure

Strona 192

52 Copyright © Acronis International GmbH, 2002-2014 Windows 2000 Professional win2000ProGuest Windows 2000 Server win2000ServGuest Windows 2000 Adv

Strona 193

53 Copyright © Acronis International GmbH, 2002-2014 Backup cataloging can be a time-consuming process. It is performed in parallel with the followi

Strona 194 - 11.1.2.3 Task states

54 Copyright © Acronis International GmbH, 2002-2014 Restrictions When using simplified file naming, the following functionality is not available: 

Strona 195 - 11.1.2.4 Task statuses

55 Copyright © Acronis International GmbH, 2002-2014 This is because the full backups created at midnight were replaced by new full backups of the s

Strona 196 - How to modify credentials

56 Copyright © Acronis International GmbH, 2002-2014 4.3.3.3 Example 3. Hourly backups within a day Consider the following scenario:  You want to

Strona 197

57 Copyright © Acronis International GmbH, 2002-2014  You have two such drives. Either of them has drive letter D in the operating system when att

Strona 198 - How it works

58 Copyright © Acronis International GmbH, 2002-2014  The full backup of January 31, 2012, will be stored as ServerFiles[2012-01-31].tib.  The 1

Strona 199 - Editing the export file

59 Copyright © Acronis International GmbH, 2002-2014 Condition: run the task only if User is idle (a screen saver is running or the machine is locke

Strona 200 - 11.1.5 Backup plan details

6 Copyright © Acronis International GmbH, 2002-2014 8.2.5 Access credentials for destination ...

Strona 201 - 11.2 Log

60 Copyright © Acronis International GmbH, 2002-2014 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's p

Strona 202 - 11.2.2 Log entry details

61 Copyright © Acronis International GmbH, 2002-2014 First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00

Strona 203 - 11.3 Alerts

62 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Fri. 2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The ta

Strona 204 - 11.4 Changing a license

63 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3.

Strona 205 - 11.6.3 Alerts

64 Copyright © Acronis International GmbH, 2002-2014 Examples "Last day of every month" schedule Run the task once at 10 PM on the last da

Strona 206 - 11.6.4 E-mail settings

65 Copyright © Acronis International GmbH, 2002-2014 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2

Strona 207 - 11.6.5 Event tracing

66 Copyright © Acronis International GmbH, 2002-2014 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers

Strona 208 - Windows

67 Copyright © Acronis International GmbH, 2002-2014 To view properties of an event, including the event source and event number 1. In Event Viewer

Strona 209 - 11.6.6 Log cleanup rules

68 Copyright © Acronis International GmbH, 2002-2014 (1) If the user becomes idle before 9PM, the backup task will start at 9PM. (2) If the user bec

Strona 210 - 11.6.7 Cloud backup proxy

69 Copyright © Acronis International GmbH, 2002-2014 (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immedi

Strona 211 - 12 Cloud backup

7 Copyright © Acronis International GmbH, 2002-2014 11.1.2 States and statuses of backup plans and tasks ...

Strona 212 - Server operating systems

70 Copyright © Acronis International GmbH, 2002-2014 Example: Run the backup task at system startup, but only if more than 12 hours have passed sinc

Strona 213

71 Copyright © Acronis International GmbH, 2002-2014  Using Acronis Cloud Backup to protect data from a natural disaster (p. 75) Replicate the arc

Strona 214 - 12.1.7 Initial Seeding FAQ

72 Copyright © Acronis International GmbH, 2002-2014 Restrictions  Copying or moving backups to and from optical discs (CD, DVD, Blu-ray discs) is

Strona 215

73 Copyright © Acronis International GmbH, 2002-2014 The retention rules are applied after creating a backup. They are applied sequentially in the p

Strona 216 - Creating subsequent backups

74 Copyright © Acronis International GmbH, 2002-2014 You will be able to specify the location where to move the backups and set up retention rules f

Strona 217 - Packaging

75 Copyright © Acronis International GmbH, 2002-2014 4.5.5 Usage examples This section provides examples of how you can replicate backups and set u

Strona 218

76 Copyright © Acronis International GmbH, 2002-2014  You want to occasionally back up your machine to a local folder.  You want to keep a copy

Strona 219

77 Copyright © Acronis International GmbH, 2002-2014 4.7 Default backup options Each Acronis agent has its own default backup options. Once an agen

Strona 220

78 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu

Strona 221

79 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu

Strona 222

8 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5  The most recent operating syst

Strona 223 - Machine subscriptions

80 Copyright © Acronis International GmbH, 2002-2014 For example, if the machine boots from a hard disk drive by default and you select this check b

Strona 224 - 12.2 Where do I start?

81 Copyright © Acronis International GmbH, 2002-2014 The preset is: Full cataloging. If you select Full cataloging, the backup contents are cataloge

Strona 225

82 Copyright © Acronis International GmbH, 2002-2014 This option is available when an internal (fixed) hard disk of the machine being backed up is s

Strona 226 - Example

83 Copyright © Acronis International GmbH, 2002-2014  When backing up to a hard disk or a network share: A single backup file will be created if t

Strona 227

84 Copyright © Acronis International GmbH, 2002-2014  None – the data will be copied as is, without any compression. The resulting backup size wil

Strona 228 - 12.8 Terminology reference

85 Copyright © Acronis International GmbH, 2002-2014 2. Click Browse to specify a location for the DRP files. 4.7.8 E-mail notifications This opt

Strona 229

86 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encry

Strona 230 - Unassign a subscription

87 Copyright © Acronis International GmbH, 2002-2014 4.7.10 Event tracing It is possible to duplicate log events of the backup operations, performe

Strona 231 - 13 Glossary

88 Copyright © Acronis International GmbH, 2002-2014  Use the setting set in the Machine options – to use the setting specified for the machine. F

Strona 232 -  what data to back up

89 Copyright © Acronis International GmbH, 2002-2014 4.7.13 File-level security These options are effective only for file-level backup in Windows o

Strona 233 - Bootable media

9 Copyright © Acronis International GmbH, 2002-2014 Basic support for Windows 8 (p. 30)  Install Acronis Backup & Recovery 11.5 in Windows 8.

Strona 234 - Centralized task

90 Copyright © Acronis International GmbH, 2002-2014  Acronis Bootable Agent and One-Click Restore. The One-Click Restore is the minimal addition

Strona 235 - Data catalog

91 Copyright © Acronis International GmbH, 2002-2014 This option applies to disk-level backup. This option also applies to file-level backup when th

Strona 236 - Disaster recovery plan (DRP)

92 Copyright © Acronis International GmbH, 2002-2014 4.7.17.1 Pre-backup command To specify a command/batch file to be executed before the backup p

Strona 237 - Dynamic disk

93 Copyright © Acronis International GmbH, 2002-2014 The option enables you to define the commands to be automatically executed before and after dat

Strona 238 - Encrypted vault

94 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the data capture only after the command is successfully executed. Fail the task

Strona 239

95 Copyright © Acronis International GmbH, 2002-2014 moment. The operations that had started before the inactivity time began continue without inter

Strona 240

96 Copyright © Acronis International GmbH, 2002-2014 If the task fails because of a mistake in the backup plan, you can edit the plan while the task

Strona 241

97 Copyright © Acronis International GmbH, 2002-2014 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to

Strona 242

98 Copyright © Acronis International GmbH, 2002-2014 will suspend the database and flush all caches to ensure that all transactions are completed; a

Strona 243

99 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect

Komentarze do niniejszej Instrukcji

Brak uwag