ACRONIS TIDLBPDES Ficha de datos

Busca en linea o descarga Ficha de datos para Software De Recuperación De Copia De Seguridad ACRONIS TIDLBPDES. Acronis Backup & Recovery 10 Advanced Workstation Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 360
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - User's Guide

Acronis® Backup & Recovery ™ 10 dvanced Workstation A User's Guide

Pagina 2

• Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the All machines group. This way you will dep

Pagina 3 - Table of Contents

• Click Writing speed stated as a percentage of the maximum speed of the destination hard disk, and then drag the slider or select a percentage in t

Pagina 4

o When backup completes successfully – to send a notification when the backup task has completed successfully o When backup fails – to send a notif

Pagina 5

2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported. Under Send notifi

Pagina 6

The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple

Pagina 7

The option defines how a backup can be split. The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis B

Pagina 8 - 1.2. Getting started

Preserve file security settings in archives This option defines whether to back up NTFS permissions for files along with the files. The preset is: E

Pagina 9

changing disk label. Adding this component to the media will enable you to prepare the disk configuration on a machine before recovering the data.

Pagina 10

When dual destination is enabled, the agent will automatically copy each backup being created locally to the secondary destination such as a network

Pagina 11 - Navigation tree

Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up d

Pagina 12 - Shortcuts bar

In addition, the program can try to execute the failed task again. Select the Restart a failed task check box and specify the number of attempts and

Pagina 13 - Actions

Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate

Pagina 14 - How to expand/minimize panes

If the console is connected to the management server The Use a separate tape set option has more precise definitions. So for the backup policy to be

Pagina 15 - Action pages

When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To dis

Pagina 16

When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup process is completed. For example, if the mach

Pagina 17 - 1.3.1. Agent for Windows

Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also from a disk backup) Disk recovery File recovery (also

Pagina 18 - 1.3.3. WinPE ISO Builder

3.4.2.1. Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to

Pagina 19 - 1.3.4.2. Storage Node

Result Preset Perform the recovery only after the command is successfully executed. Fail the task if the command execution failed. Perform the reco

Pagina 20 - 1.3.4.3. PXE Server

• Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine • Normal – to run the

Pagina 21 - 1.3.5. Management Console

o From - type the e-mail address of the user from whom the message will be sent. If you leave this field empty, messages will be constructed as if t

Pagina 22 - 1.6. Technical support

4. Click Send Test WinPopup Message to check if the settings are correct. 3.4.2.5. Event tracing It is possible to duplicate log events of the rec

Pagina 23

To select whether to send the recovery operations events to the SNMP managers: Choose one of the following: • Use the setting set in the Machine opt

Pagina 24 - 2.1. Basic concepts

Views for a management server When the console is connected to a management server, the following views are available in the navigation tree. • [Ma

Pagina 25

Set current date and time for recovered files This option is effective only when recovering files. The preset is Enabled. This option defines whether

Pagina 26 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2009 121 3.4.2.8. VM power management These options are effective for virtual machines residing on the virtualiza

Pagina 27

4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metad

Pagina 28 - Full backup

A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each manag

Pagina 29 - Differential backup

Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the machine where the storage node is installed. Th

Pagina 30 - 2.4. Owners and credentials

• [for managed vaults only] deduplication (p. 64) state (On, Off) • [for managed vaults only] encryption state (Yes, No) Vault content The Vault

Pagina 31 - Archive owner

2 Click Edit. Depending on the vault you select (managed or unmanaged), the respective Edit page will be opened: • The Edit managed vault page le

Pagina 32 - 2.5. GFS backup scheme

4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the following steps Vault Name Specify a unique name fo

Pagina 33

o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o on a Network Attached Storage (NAS) o on

Pagina 34 - The resulting archive: ideal

The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the di

Pagina 35 - The resulting archive: real

Bars '[Item's name]' actions Contains a set of actions that can be performed on the items selected in any of the navigation views. Cli

Pagina 36 - Tower of Hanoi overview

archives in the vault, creates and fills up the database corresponding to the vault, and starts managing the vault. When deleting a managed vault, yo

Pagina 37 - Tower of Hanoi by Acronis

accessing the media. It is possible to view the content of a backup archive located on a tape through the console, even if a tape library is turned o

Pagina 38 - 2.7. Retention rules

4.1.3.3. Limitations Limitations of tape library usage are the following: 1. The consolidation (p. 343) operation is not possible for archives loca

Pagina 39

Recovery 10. The storage node will locate all tapes written in “Acronis” format into the Acronis pool at the Inventory (p. 136) operation. Acronis Ba

Pagina 40 - Combination of rules 1 and 2

Tape library as a managed vault To enable data protection operations using a tape library you have to create a managed vault on the tape library. You

Pagina 41 - Backing up dynamic volumes

Actions with archives on tapes in a library The following are common functions for archive data management for a backup archive selected in the Centr

Pagina 42 - Recovering dynamic volumes

Keep in mind that a data recovery operation may require access to a number of tapes. For example, data recovery from an incremental backup commonly m

Pagina 43 - 2.9. Tape support

Perform the procedure every time you load new tapes into tape library slots. Rescan As stated above the storage node keeps information about tapes a

Pagina 44

4.1.3.7. Tape options These options are effective when the backup destination is a managed vault located on a tape library. Tape options enable you

Pagina 45

• For each full backup The preset is: Disabled. When this option is enabled, each full backup will be written onto a free tape. The tape will be loa

Pagina 46 - 2.10.1. Acronis Secure Zone

Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. &quo

Pagina 47 - Restore)

If your backup archive must provide recovery with daily resolution for the last several days, weekly resolution for the last several weeks and monthl

Pagina 48

Legend for the case example figures Any daily/incremental backup (16 GB) is shown in the figures as a green rectangle: . Weekly/differential backups

Pagina 49 - Limitation

• the Always use a free tape: For each full backup option is cleared • the Always use a free tape: For each incremental backup option is cleared •

Pagina 50 - How to use

Keep in mind, that the Cleanup task is launched after each backup operation for the GFS scheme. This task deletes all the outdated backups. The next

Pagina 51 - 2.11.1. Basic concepts

The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the

Pagina 52

GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set option is selected • the Always use a free tape:

Pagina 53

As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups di

Pagina 54 - Setting up the storage node

These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of the rotation scheme that uses 8 tapes for

Pagina 55

16 weekly sessions so it ensures the roll-back period equal 112 days. Tape rotation for the second case includes 128 daily sessions, i.e. it allows t

Pagina 56

The figure below shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options. The recurring part of the scheme contains

Pagina 57 - Policy on a group

"Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Infor

Pagina 58

• the Always use a free tape: For each incremental backup option is cleared • the Always use a free tape: For each differential backup option is cl

Pagina 59

• the Always use a free tape: For each full backup option is selected • the Always use a free tape: For each incremental backup option is selected

Pagina 60

• average size of incremental backups • average size of differential backups • compression level specified for backing up the data • tape rotatio

Pagina 61

Tape planning: Example 2 Imagine the case with the following features: • full backup size is F_GB • average size of incremental backups is I_GB •

Pagina 62 - Backup policy state diagram

you need to do is to perform the inventory (p. 136) procedure for the managed vault on the library where the tapes were placed to. 2. If you move ta

Pagina 63

Metadata The .meta folder is created during backup in every personal vault. This folder contains additional information about archives and backups s

Pagina 64 - 2.11.6. Deduplication

Bars of the "Actions and tools" pane • [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates ac

Pagina 65 - Deduplication database

4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the vault being created. 2. [Optional] In th

Pagina 66 - What ratio to expect

All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the

Pagina 67 - Deduplication at target

Validate a backup Click Validate. The Validation (p. 230) page will be opened with the pre-selected backup as a source. Validation of a file backup

Pagina 68

Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The b

Pagina 69 - Remote connection

160 Copyright © Acronis, Inc., 2000-2009 To Do Sort backup archives by any column Click the column's header to sort the archives in ascending

Pagina 70

5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’

Pagina 71 - On a domain controller

The specified period of time has passed since the last successful backup completed The scheduler behavior, in case the event occurs but the condition

Pagina 72

Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day

Pagina 73

The obvious way is to add five simple schedules. If you spend one minute for examination, you can think out a more optimal way. As you can see, the t

Pagina 74

To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of we

Pagina 75 - Client Encryption options

week. For more details, see the Full and incremental backups plus cleanup example in the Custom backup scheme (p. 208) section. Several weekly schedu

Pagina 76 - Server Encryption options

5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a monthly schedule In the Schedule area, selec

Pagina 77

This schedule is widely used when creating a custom backup scheme. The "Last day of every month" schedule is added to the full backups, whi

Pagina 78 - • The currently used port

2. On: <All> <All workdays>. 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Effective: From: 11/01/2009. To: not set. Thi

Pagina 79 - 2.11.8.6. SSL certificates

Acronis Backup & Recovery 10 includes three types of components. Components for a managed machine (agents) These are applications that perform da

Pagina 80 - Non-self-signed certificates

Delay values range from zero to the specified maximum delay value, and are determined according to the chosen distribution method. The delay value fo

Pagina 81

5. To enable the use of the Wake-on-LAN functionality, select the Use Wake-on-LAN check box. 6. To distribute the centralized backup tasks' st

Pagina 82 - 3. Options

• Event type: Error • Event ID: 7 Important: To ensure that such a task will complete despite the presence of bad blocks, you must make the task ig

Pagina 83 - 3.1.4. Number of tasks

5.6. Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with respect to certain conditions. Once a specifi

Pagina 84 - 3.2.2. Event tracing

• Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s). As a result, (1) If the user becomes idle before 9P

Pagina 85 - 3.2.2.2. SNMP notifications

specified time interval, or logs off at any other time – do not back up the users' data, i.e. skip task execution. • Event: When logging off, T

Pagina 86 - 3.3. Machine options

176 Copyright © Acronis, Inc., 2000-2009 (1) If all users are logged off at 8PM, the backup task will start at 8PM. (2) If the last user logs off b

Pagina 87 - 3.3.2.2. SNMP notifications

6. Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection

Pagina 88

Check connectivity to the server and run Acronis License Server to manage licenses. license server. Trial period is over Insert a full license key

Pagina 89

Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on thi

Pagina 90

operational machine will be placed in the folder you select. You can start the machine using the respective virtualization software or prepare the ma

Pagina 91 - 3.4.1.1. Archive protection

• Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 183) section for detai

Pagina 92

A backup plan status is derived from the results of the last run of the plans' tasks. State How it is determined How to handle 1 Error At l

Pagina 93 - Pre-backup command

Any running task can put itself into the Need interaction state when it needs human interaction such as changing media or ignoring a read error. The

Pagina 94 - Post-backup command

• Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last result is "Succeeded with warning"

Pagina 95 - Pre-data capture command

Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to be run. Running the backup plan starts t

Pagina 96 - Post-data capture command

Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 193), except for the following limitation

Pagina 97 - • Do not create a snapshot

Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can

Pagina 98 - 3.4.1.8. Compression level

Filter plans/tasks by name or owner. Type a plan's/task's name or an owner's name in the field below the corresponding header name. A

Pagina 99 - HDD writing speed

Types of tasks Task name Description Backup (disk) Backing up disks and volumes Backup (file) Backing up files and folders Backup (virtual machine

Pagina 100 - 3.4.1.10. Notifications

Provides details on the selected backup: when it was created, its type (full, incremental, differential), information on the archive and the vault th

Pagina 101 - Messenger service (WinPopup)

1.3.4.1. Management Server Acronis Backup & Recovery 10 Management Server is the central server that drives data protection within the enterpris

Pagina 102 - SNMP notifications

Destination The Destination tab provides the following information: • Location - name of the vault or path to the folder, where the archive is store

Pagina 103 - 3.4.1.13. Backup splitting

6.1.3.1. Actions on log entries All the operations described below are performed by clicking the corresponding items on the log toolbar. All these

Pagina 104 - Automatic

Filter log entries by type Press or release the following toolbar buttons: to filter error messages to filter warning messages to filter informati

Pagina 105 - 3.4.1.15. Media components

The log entry's details that you copy will have the appearance as follows: ---------------------------Log Entry Details-------------------------

Pagina 106 - 3.4.1.17. Dual destination

Exclusions (p. 197) [Optional] Set up exclusions for the specific types of files you do not wish to back up. To access this option, select the Advanc

Pagina 107 - To use Dual destination:

After that, you might be prompted for the password (p. 195). The plan you have created will be accessible for examination and managing in the Backup

Pagina 108 - Skip the task execution

Disks/volumes Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up disks an

Pagina 109 - 3.4.1.20. Tape options

A disk backup stores all volumes of the selected disk (including hidden volumes such as the vendor's maintenance partitions) and the zero track

Pagina 110 - Always use a free tape

To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidden files and folders Select this check box

Pagina 111 - Reset archive bit

• To back up data to a network share, expand the Network folders group, select the required networked machine and, then click the shared folder. If

Pagina 112

Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron

Pagina 113

Setting up the storage infrastructure Install the storage nodes, add them to the management server (the procedure is similar to the managed machine r

Pagina 114 - Pre-recovery command

Why two or more plans should not back up to the same archive 1. Backing up different sources to the same archive makes using the archive difficult f

Pagina 115 - 3.4.2.2. Recovery priority

• Simple – to schedule when and how often to backup data and specify retention rules. • Grandfather-Father-Son – to use the Grandfather-Father-Son

Pagina 116 - 3.4.2.4. Notifications

Backup Set up the backup schedule - when and how often to back up the data. To learn more about setting up the schedule, see the Scheduling (p. 161)

Pagina 117

Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies the days on which to perform a backup. The

Pagina 118 - 3.4.2.5. Event tracing

• Weekly/monthly: Saturday (for example) • Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly: indefinitely As a result, an archive of da

Pagina 119 - 3.4.2.6. Error handling

Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months. The following GFS scheme suits suc

Pagina 120

Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 162), weekly (p. 164), or monthly (p. 167

Pagina 121

Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to hav

Pagina 122 - 4. Vaults

6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • Custom schedule and retention rules Paramete

Pagina 123 - 4.1. Centralized vaults

Full and incremental backup plus cleanup With the following scheme, the archive will consist of weekly full backups and daily incremental backups. We

Pagina 124 - Pie chart with legend

The network booting: • Eliminates the need to have a technician onsite to install the bootable media (p. 341) into the system that has to be booted

Pagina 125 - Vault content

Cleanup schedule: Monthly, on the Last day of All months, at 10:00 PM By default, a backup is not deleted as long as it has dependent backups that mu

Pagina 126

6.3. Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running th

Pagina 127 - Vault path

Select the archive to recover data from. Data type (p. 214) Applies to: disk recovery Choose the type of data you need to recover from the selected d

Pagina 128 - Vault encryption

Recovery options Settings [Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery commands, recove

Pagina 129

o If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder. If the archive is locate

Pagina 130 - 4.1.3. Tape libraries

6.3.4.1. Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the successive incremental backups by its creati

Pagina 131 - 4.1.3.2. Hardware

6.3.5. Access credentials for location Specify the credentials required for access to the location where the backup archive is stored. To specify cr

Pagina 132 - 4.1.3.4. RSM Media Pools

The new virtual machine will be configured automatically, the source machine configuration being copied where possible. The configuration is displaye

Pagina 133 - Prerequisites

• Recover from backup The program will replace the NT signature of the target hard disk with one from the disk backup. Recovering the disk signature

Pagina 134

[Volume] [Letter]: Disk # /Volume (p. 219) Sequentially map each of the source volumes to a volume or an unallocated space on the destination disk. S

Pagina 135 - Recovering from tape library

• Windows XP Professional x64 Edition, Windows Server 2003/2008/ x64 Editions • Windows Vista all Editions except for Vista Home Basic and Vista Ho

Pagina 136 - Inventory

installed operating system could prevent the machine from booting. You cannot set a logical drive or dynamic volume active. • Logical. Information a

Pagina 137 - Labeling

6.3.6.4. Virtual machine settings The following virtual machine settings can be configured. Storage Initial setting: the default storage of the virt

Pagina 138 - 4.1.3.7. Tape options

C:\Documents\Finance\Reports\, the files will be recovered to the same path. If the folder does not exist, it will be created automatically. o New l

Pagina 139 - Choosing a backup scheme

Overwriting Choose what to do if the program finds in the target folder a file with the same name as in the archive: • Overwrite existing file - thi

Pagina 140 - Case to analyze

To learn more about the Universal Restore technology, see the Universal Restore (p. 47) section. Acronis Backup & Recovery 10 Universal Restore i

Pagina 141 - GFS Example 1

Mass storage drivers to install anyway To access this option, select the Advanced view check box. If the target hardware has a specific mass storage

Pagina 142

3. In Data type, select Disks or Volumes depending on what you need to convert. 4. In Content, select the disks to convert or the volumes with the

Pagina 143

Solution for Windows: Recover the volume once again. When configuring recovery, opt for using Acronis Universal Restore and specify the appropriate H

Pagina 144

6.3.11.1. How to reactivate GRUB or LILO and change its configuration Generally, you should refer to the boot loader manual pages for the appropriat

Pagina 145 - GFS Example 2

b. Edit the record root=/dev/hdXY (or root=/dev/sdXY for a SCSI disk) in the section corresponding to the current kernel. In this record, X – disk n

Pagina 146 - GFS Example 3

Copyright © Acronis, Inc., 2000-2009 23 (i) supply code corrections to you to correct Software malfunctions in order to bring such Software into su

Pagina 147

Note: This procedure requires restarting the machine. Use standard precautions when modifying the registry. 1. In Registry Editor, open the followin

Pagina 148 - ToH Example 1

opened with the pre-selected object as a source. All you need to do is to select when to validate and (optionally) provide a name for the task. To c

Pagina 149 - ToH Example 2

The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name. When entering th

Pagina 150 - ToH Example 3

2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select

Pagina 151 - Tape planning

To specify credentials 1. Select one of the following: o Use the task credentials The program will access the location using the credentials of the

Pagina 152 - Tape planning: Example 1

Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. To mount an image, perform the follow

Pagina 153 - 4.1.3.9. What if

click Use anonymous access instead of entering credentials. As appears from the original FTP specification, credentials required for access to FTP se

Pagina 154 - 4.2. Personal vaults

6.5.4. Volume selection Select the volumes to mount and configure the mounting parameters for each of the selected volumes as follows: 1. Select th

Pagina 155 - Metadata

Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more about the advantages and limitations of the A

Pagina 156

To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone. The unallocated space is selected by defau

Pagina 157 - 4.3. Common operations

2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can us

Pagina 158

Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…". If the system fails to boot, you will be able to s

Pagina 159

6.7.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 352). Once created on a managed machine, the zone is a

Pagina 160 - To show or hide columns

o dragging the slider and selecting any size between the current and minimum values. The minimum size is approximately 50MB, depending on the geomet

Pagina 161 - 5. Scheduling

Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent based on Linux kernel. The agent can boot and p

Pagina 162 - 5.1. Daily schedule

To be able to create or modify PE 2.x images, install Acronis WinPE ISO Builder on a machine where Windows Automated Installation Kit (AIK) is instal

Pagina 163 - Examples

o If you set, say, 10 sec for the bootable agent, the agent will launch 10 seconds after the menu is displayed. This enables unattended onsite opera

Pagina 164 - 5.2. Weekly schedule

Once the bootable agent starts on the server, it retrieves the list of available NICs. This list is sorted by the slots the NICs occupy: the closest

Pagina 165

1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are cre

Pagina 166

• Creating the PE 2 ISO with the plug-in from scratch. • Adding the Acronis Plug-in to a WIM file for any future purpose (manual ISO building, addi

Pagina 167 - 5.3. Monthly schedule

c:\winpe_x86\winpe_x86.iso Adding Acronis Plug-in to WinPE 2.x WIM 1. Select Acronis WinPE ISO Builder from the start menu. 2. Specify path to the

Pagina 168

The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-20

Pagina 169 - Use Wake-on-LAN

6.8.2. Connecting to a machine booted from media Once a machine boots from bootable media, the machine terminal displays a startup window with the I

Pagina 170 - To specify advanced settings

Acronis command line utilities • Acronis • asamba • lash • trueimagecmd • trueimagemnt Linux commands and utilities busybox ifconfig readcd ca

Pagina 171 - Parameters

grub ping umount gunzip pktsetup uuidgen halt poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.8.5. Recovering MD devices and l

Pagina 172

Example Suppose that you previously performed a disk backup of a machine with the following disk configuration: • The machine has two 1-gigabyte and

Pagina 173 - 5.6. Conditions

VG UUID 0qoQ4l-Vk7W-yDG3-uF1l-Q2AL-C0z0-vMeACu 5. Run the following command to create the logical volume; in the -L parameter, specify the size

Pagina 174 - 5.6.3. Fits time interval

trueimagemnt --mount /mnt --filename smb://server/backups/linux_machine.tib -i 4 This command mounts the logical volume DYN1, whose index in the back

Pagina 175 - 5.6.4. User logged off

On a machine that has an operating system on the hard disk, the BIOS must be configured so that the network interface card is either the first boot d

Pagina 176 - Example:

Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk configuration might change due to a HDD repl

Pagina 177 - 6. Direct management

6.9.3. Choosing the operating system for disk management On a machine with two or more operating systems, representation of disks and volumes depend

Pagina 178 - Activities

shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including changing the volume letter or label, are al

Pagina 179 - Way of working

Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan

Pagina 180 - Backup plan statuses

After the disk is initialized, its icon is now shown in green instead of grayed and the necessary new disk information appears. The disk block remain

Pagina 181 - Task states

If the destination is smaller, then the As is option of cloning will be unavailable and proportional resizing of the source disk volumes will be mand

Pagina 182 - Task statuses

If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2. Click to clear the Turn off the machine a

Pagina 183

If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the selected volume, and then click Convert to

Pagina 184

Basic to dynamic conversion of the disk, comprising of system volumes, takes a certain amount of time, and any power loss, unintentional turning off

Pagina 185

6.9.6. Volume operations Acronis Disk Director Lite includes the following operations that can be performed on volumes: • Create Volume (p. 265) -

Pagina 186

each disk in the volume; it means that to create a striped volume, a user will need two or more dynamic disks. The disks in a striped volume don’t ha

Pagina 187 - Task details

• Basic • Simple/Spanned • Striped • Mirrored • RAID-5 You will obtain a brief description of every type of volume for better understanding of

Pagina 188 - Archive

Set the volume size On the third wizard page, you will be able to define the size of the future volume, according to the previously made selections.

Pagina 189 - Backup plan details

To perform the planned operation click Commit in the toolbar, and then click Proceed in the Pending Operations window. If you set a 64K cluster size

Pagina 190 - 6.1.3. Log

The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operatio

Pagina 191

(To finish the added operation you will have to commit (p. 271) it. Exiting the program without committing the pending operations will effectively ca

Pagina 192 - 6.1.3.3. Log entry details

The new label will be graphically represented in the Disk Management view of the console immediately. 6.9.6.6. Format volume You might want to form

Pagina 193 - 6.2. Creating a backup plan

272 Copyright © Acronis, Inc., 2000-2009 The Undo action lets you undo the latest operation in the list. While the list is not empty, this action i

Pagina 194 - How to back up

7. Centralized management This section covers operations that can be performed centrally by using the components for centralized management. The con

Pagina 195 - 6.2.3. Source type

agent will stop working until a successful license check. Vaults with low free space: X View vaults The alert is displayed if at least one centrali

Pagina 196 - 6.2.4. Items to back up

Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history i

Pagina 197 - 6.2.6. Exclusions

Way of working with the backup policies view • Use the toolbar's operational buttons to create new policies, apply the existing policies to mac

Pagina 198 - 6.2.7. Archive

What to do if a policy has the Error status 1. To find out the reason of the failure, do one or more of the following: o Click the Error hyperlink

Pagina 199 - 3. Naming the new archive

7.1.2.3. Actions on backup policies All the operations described below are performed by clicking the corresponding items on the tasks toolbar. The o

Pagina 200 - 6.2.9. Backup schemes

o Groups In the group tree, select the group(s) the policy will be applied to. The right part of the window lists the machines of the selected group

Pagina 201 - 6.2.9.3. Simple scheme

If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery oper

Pagina 202 - Description

Source The tab displays information about the type of source to be backed up and the source selection rules. Destination The tab displays information

Pagina 203

Groups The management server administrator has the ability to group machines. A machine can be a member of more than one group. One or more nested gr

Pagina 204

Way of working with groups • In the Physical machines view, select the group. • Use the toolbar's operational buttons to perform actions on

Pagina 205

Grouping actions To Do Create a custom static or dynamic group Click Create group. In the Create group (p. 293) window, specify the required parame

Pagina 206 - Example

a managed machine and perform all the direct management operations. Other operations View detailed information on a machine Click View details. In t

Pagina 207 - Roll-back period

To register an agent during agent installation, you have to be logged on with the management server administrator's account or provide the serve

Pagina 208

Policy selection To apply the backup policy to the selected machine (group) 1. From the list, select the backup policy that you want to apply to the

Pagina 209

Machine The tab displays the following information on the registered machine: • Name - name of the selected machine (taken from the Computer name in

Pagina 210 - 6.2.10. Archive validation

The Log (p. 302) view will display a list of the log entries related to the selected backup policy. Revoke policy from the machine. Click Revoke. Th

Pagina 211 - 6.3. Recovering data

Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to run. Running the backup plan starts the

Pagina 212 - When to recover

It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental bac

Pagina 213 - 6.3.2. Archive selection

Why can't I edit the backup plan? • The backup plan is currently running. Editing of the currently running backup plan is impossible. • The ba

Pagina 214 - 6.3.4. Content selection

Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as in the Backup plans and tasks view for direct mana

Pagina 215 - 6.3.4.2. Files selection

Filtering and sorting machines To Do Sort machines by any column Click the column's header to sort the machines in ascending order. Click it o

Pagina 216 - 6.3.6.1. Disks

Edit a custom group Click Edit. In the Edit group (p. 295) window, change the required parameters of the group. Move one custom group to another Cli

Pagina 217 - NT signature

Adding multiple criteria Adding multiple criteria forms a condition according to the following rules: a) All the entries of the same criteria are co

Pagina 218 - 6.3.6.2. Volumes

Move one group to another To move the selected group to another group or to the root 1. In the groups tree, click the group to move the selected gro

Pagina 219 - Volume properties

selected backup policy.View tasks of a policy Click View tasks. The Tasks (p. 300) view will display a list of the tasks related to the selected bac

Pagina 220

Storage node enables you to: • relieve managed machines of unnecessary CPU load by using the storage node-side cleanup (p. 350) and storage node-sid

Pagina 221 - 6.3.6.5. File destination

To Do Add a storage node to the management server Click Add. In the Add storage node (p. 299) window, specify the machine the storage node is insta

Pagina 222 - Exclusions

Adding a storage node To add a storage node 1. In the IP/Name field, enter the name or the IP address of the machine the storage node resides on, or

Pagina 223 - 6.3.9. Universal Restore

Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Back

Pagina 224 - Universal Restore settings

specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best guide to selecting the optimal backup scheme.

Pagina 225

Vaults This tab displays a list of the vaults, managed by the storage node. To open a managed vault for detailed examination and to perform operation

Pagina 226

Stop a task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, export

Pagina 227

7.1.5.2. Filtering and sorting tasks The following is a guideline for you to filter and sort tasks. To Do Set a number of tasks to display Select O

Pagina 228

Operations performed using bootable media are logged as well, but the log’s lifetime is limited to a current session. Rebooting eliminates the log, b

Pagina 229 - Windows Vista/2008

Tasks Select a task, and then click View log. The Log view appears with the log entries belonging to the selected task. 7.1.6.1. Actions on log

Pagina 230

7.1.6.2. Filtering and sorting log entries The following is a guideline for you to filter and sort log entries. To Do Display log entries for a giv

Pagina 231 - 6.4.1. Task credentials

• Task - The task the event relates to (if any) • Managed entity type - Type of managed entity where the event has occurred (if any) • Managed ent

Pagina 232 - 6.4.2. Archive selection

You can set one or more parameters via Group Policy by using Acronis Administrative Template. For information on how to apply the administrative temp

Pagina 233 - 6.4.4. Location selection

compacting procedure. Possible values: Any integer number between 0 and 100 Default value: 80 In a deduplicating vault, the contents of all deduplic

Pagina 234 - 6.5. Mounting an image

Note: The parameters Vault Free Space Warning Limit and Vault Free Space Warning Percentage are independent of each other: a warning will be recorde

Pagina 235 - 6.5.1. Archive selection

Tasks that do not belong to a backup plan, such as the recovery task, are owned by the user who has created or last modified the task. Managing a pla

Pagina 236 - 6.5.3. Access credentials

This parameter contains two settings: Trace State Description: Specifies whether to collect the log entries about Acronis Backup & Recovery 10 co

Pagina 237 - 6.7. Acronis Secure Zone

Trace Level Description: Specifies the minimum level of severity of events for sending SNMP notifications about them. Only notifications about events

Pagina 238 - Settings

Default value: 30 The management server's process uses special threads—called worker threads or workers—to perform synchronization for a registe

Pagina 239 - To disable password

Second Connection Attempt Description: Specifies whether to try to connect to a registered machine by using its last-known IP address after an attemp

Pagina 240

full functionality for the number of days specified in Maximum Time Without License Server, as counted from the moment of installation or from the la

Pagina 241

This parameter has two settings: Trace State Description: Specifies whether to record the agent's events into the event log. Possible values: Tr

Pagina 242 - 6.8. Bootable media

Event tracing parameters Parameters called tracing parameters specify when to record notifications about events from Acronis Backup & Recovery 10

Pagina 243 - PE-based bootable media

Default value: 4 (notifications about errors and critical errors will be recorded) 7.1.7.2. Parameters set through GUI The following parameters can

Pagina 244 - Using Bart PE

This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libr

Pagina 245 - Network settings

Specify the path to the location, where the backup archive will be stored, and the archive name. It is advisable that the archive name be unique with

Pagina 246 - Network port

scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials to be able to start the task. 2.5. GFS b

Pagina 247

To specify credentials 1. Select one of the following: o Use Acronis service credentials The tasks will run under the Acronis service account, whet

Pagina 248

System volume Type or select: [System Volume] The system volume contains the hardware-specific files that are needed to start Windows, such as Ntld

Pagina 249

attributes (including hidden and system files), the boot record, the file allocation table (FAT) if it exists, the root and the zero track of the har

Pagina 250

• Partition number on the disk; 1 for the first partition, 2 for the second partition, etc. To guarantee backing up selected disks regardless of the

Pagina 251 - Linux commands and utilities

Windows folder %WINDIR% Points to the folder where Windows is located (for example, C:\Windows) Common data for all user profiles %ALLUSERSPROFILE%

Pagina 252

The program will access the source data using the credentials of the backup policy account specified in the General section. o Use the following cre

Pagina 253

Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and s

Pagina 254 - Mounting backup volumes

So, if the backup policy named, say SYSTEM_BACKUP will be applied to three machines (say, FINDEPT1, FINDEPT2, FINDEPT3), the following three archive

Pagina 255 - 6.8.6. Acronis PXE Server

"fathers") and monthly (referred to as "grandfathers") backups. The expired backups will be deleted automatically. • Tower of Ha

Pagina 256 - 6.9. Disk management

7.2.7.4. Grandfather-Father-Son scheme At a glance • Daily incremental, weekly differential, and monthly full backups • Custom day for weekly and

Pagina 257 - 6.9.1. Basic precautions

The total schedule. Schedule: Workdays at 8:00 PM Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day

Pagina 258 - Displaying operation results

Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in hours, days, weeks, months, or years. For mo

Pagina 259 - 6.9.5. Disk operations

available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Mon

Pagina 260 - 6.9.5.2. Basic disk cloning

• Keep backups: o Daily: 6 months o Weekly: 6 months o Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays

Pagina 261 - Using advanced options

specify the sessions on which the scheme should run. In the discussion below, "days" can be replaced with "scheduled sessions". N

Pagina 262

3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level dou

Pagina 263 - System disk conversion

Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup. For example, the full back

Pagina 264

Also, let all backups older than one year be deleted from the archive, and let the cleanup be performed upon creating a new backup. Retention rules:

Pagina 265 - 6.9.6. Volume operations

Copyright © Acronis, Inc., 2000-2009 337 Resulting tasks Any custom scheme always produces three backup tasks and—in case the retention rules are s

Pagina 266 - Create volume wizard

Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. T

Pagina 267 - Select destination disks

Limitations: cannot be organized on a dynamic disk (p. 345); requires manual configuration of boot loaders, such as LILO and GRUB; requires re-activa

Pagina 268 - Set the volume options

backup and delete all daily backups that are older than you specify. Keep backups: Weekly This step defines the retention rule for weekly backups. T

Pagina 269 - 6.9.6.3. Set active volume

Backup options Configuration parameters of a backup operation (p. 339), such as pre/post backup commands, maximum network bandwidth allotted for the

Pagina 270

3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 339) installed on the machine finds data items using

Pagina 271 - 6.9.7. Pending operations

A management server has two built-in groups that contain all machines of each type: All physical machines (p. 349), All virtual machines (p. 352). Bu

Pagina 272

On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying

Pagina 273 - 7. Centralized management

Differential backup A differential backup stores changes to the data against the latest full backup (p. 347). You need access to the corresponding fu

Pagina 274

and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on t

Pagina 275 - 7.1.2. Backup policies

816307 Best practices for using dynamic disks on Windows Server 2003-based computers http://support.microsoft.com/kb/816307 Dynamic group A group o

Pagina 276

Encrypted vault A managed vault (p. 348) to which anything written is encrypted and anything read is decrypted transparently by the storage node (p.

Pagina 277

M Machine A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boo

Pagina 278 - Machines selection

P Personal vault A local or networked vault (p. 352) created using direct management (p. 344). Once a personal vault is created, a shortcut to it app

Pagina 279 - 7.1.2.4. Policy details

An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly ba

Pagina 280 - 7.1.3. Physical machines

Static group A group of machines which a management server (p. 348) administrator populates by manually adding machines to the group. A machine remai

Pagina 281

T Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 348) when a certain time c

Pagina 282 - Applying policies

352 Copyright © Acronis, Inc., 2000-2009 While the successful validation means a high probability of successful recovery, it does not check all fac

Pagina 283 - Other actions

Index A A policy on a machine or a group • 57 About Windows loaders • 229 Access credentials • 235, 236 Access credentials for archive location • 194

Pagina 284 - • installing the agent

B Back up later scheme • 201, 328 Back up now scheme • 201, 328 Backing up dynamic volumes (Windows) • 41, 211 Backing up to tape library • 135 Backu

Pagina 285

Configuring communication settings • 74, 78 Connecting to a machine booted from media • 250 Console (Acronis Backup & Recovery 10 Management Cons

Pagina 286 - Machine details

F Fast incremental/differential backup • 90, 103 File destination • 212, 221 File-level backup snapshot • 89, 97 File-level security • 90, 104, 105,

Pagina 287

M Machine • 19, 339, 340, 341, 342, 344, 346, 348, 349, 350, 352 Machine details • 280, 281, 284, 286 Machine management • 86, 287 Machine options •

Pagina 288 - Plans and tasks

Policy status on a group • 64 Policy status on a machine • 62 Pop-up messages • 82 Post-backup command • 94 Post-data capture command • 96 Post-recov

Pagina 289

Storage node-side validation • 20, 123, 297, 348, 350 Supported file systems • 22 Supported operating systems • 21 T Tape compatibility table • 44, 1

Pagina 290

An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily

Pagina 291 - Inheritance order

360 Copyright © Acronis, Inc., 2000-2009 VM power management • 121 Volume destination • 217, 219 Volume operations • 265 Volume properties • 219 Vo

Pagina 292 - 7.1.3.2. Actions on groups

For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the following order of moves: The Tower of Hanoi ba

Pagina 293 - • IP range

• differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern starts with a full backup since the very first

Pagina 294 - Adding multiple criteria

to this interval and deletes all backups created before that moment. None of the backups created after this moment will be deleted. 2. Keep the arch

Pagina 295 - Group details

3.1.4. Number of tasks ...

Pagina 296 - 7.1.4. Storage nodes

Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Exampl

Pagina 297 - • Information panel

This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you specify. The consolidation, however, may ta

Pagina 298

Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volumes to the Acronis Secure Zone. trueimagecmd

Pagina 299 - Adding a storage node

Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynamic volume Type as of the target Dynamic vo

Pagina 300 - 7.1.5. Tasks

Backup archives created using different ways of access to tape have different formats. A tape written by a storage node cannot be read by an agent.

Pagina 301

2.9.2. Using a single tape drive A tape drive that is locally attached to a managed machine can be used by local backup plans as a storage device. T

Pagina 302 - 7.1.6. Log

2.10. Proprietary Acronis technologies This section describes the proprietary technologies inherited by Acronis Backup & Recovery 10 from Acroni

Pagina 303 - Centralized event log

For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 154) section. Upgrade from Acronis True Image Ech

Pagina 304

handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. Acronis Back

Pagina 305 - Configuring the log table

Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply it to any Windows image created by Acronis

Pagina 306

6.2.7. Archive ... ...

Pagina 307

How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the

Pagina 308

want the result to be predictable. When recovering a multi-boot system, choose only one system volume and boot volume at a time. 5. Once the system

Pagina 309

Since you connect the console to the management server rather than to each machine and perform all management operations through the central manageme

Pagina 310

You have to protect each server as a whole, the users' data on the workstations, and the virtual machines. You want to be able to track the heal

Pagina 311

5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The storage node enables you to organize the infra

Pagina 312

3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of the servers. The policy deployment state h

Pagina 313

2.11.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flexibility to protect virtual machines in mul

Pagina 314

Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks is created on each machine according to th

Pagina 315

The same policy on a group and on a machine 1. The same policy can be applied to a group and to a machine. Nothing changes on the machine at the se

Pagina 316 - Event tracing parameters

2.11.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a member of only one group beside

Pagina 317 - When to modify

7.1.4. Storage nodes...

Pagina 318 - What to back up

Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is G1's child. The "green" po

Pagina 319 - 7.2.1. Policy credentials

#4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1

Pagina 320 - 7.2.2. Items to back up

the changes are transferred to the machine and the agent deletes the backup plan from it, the policy state on the machine is Revoking. You may change

Pagina 321

The backup tasks will start on schedule as specified by the policy and produce a similar result until all data items appear on the machine or the pol

Pagina 322

deployment completes on one of the machines while it continues on the other, the state will be "Deploying, Deployed". When the deployment c

Pagina 323 - Windows

For example, if a managed vault where deduplication is enabled contains two copies of the same file—whether in the same archive or in different archi

Pagina 324 - To specify credentials

• When backing up in the full backup mode similar data from different sources. Such is the case when you back up operating systems and applications

Pagina 325 - 7.2.4. Exclusions

disk space (say, 1 GB); the files that are specific to each machine occupy the other 50% (another 1 GB). In a deduplicating vault, the size of the fi

Pagina 326 - 7.2.5. Archive

By default, the compacting task runs every Sunday night at 03:00. You can re-schedule the task as described in Operations with storage nodes (p. 297)

Pagina 327

2.11.7. Privileges for centralized management This section describes the users' privileges that are required to manage a machine locally and re

Pagina 328 - 7.2.7.3. Simple scheme

1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare me

Pagina 329

Note: On a remote machine running Windows Vista with enabled User Account Control (UAC)—and which is not part of a domain—only members of the Adminis

Pagina 330

On a domain controller If a machine is a domain controller in an Active Directory domain, the names and default contents of Acronis security groups a

Pagina 331

When creating the accounts, follow these guidelines: • For users whom you want to act as storage node administrators, add their accounts to the Admi

Pagina 332

Component name Service name Necessary user rights Default user account Acronis Backup & Recovery 10 Agent Acronis Managed Machine Service Log

Pagina 333

• Encrypted communication provides secure transfer of information between any two components—for example, between Acronis Backup & Recovery 10 A

Pagina 334

When applied to a single machine, the Administrative Template defines the communication settings for all the components on the machine; when applied

Pagina 335

Not configured The component will use the default settings, which is to use encryption if possible and to trust self-signed SSL certificates (see the

Pagina 336

following option). Enabled Encryption is enabled. In Encryption, select one of the following: Enabled Data transfer will be encrypted if encryption i

Pagina 337 - 7.2.8. Archive validation

Configuring the port in the operating system Windows To be able to change the ports' numbers, load and configure the Administrative Template, pr

Pagina 338 - Glossary

http://msdn2.microsoft.com/en-us/library/aa374177.aspx 2.11.8.6. SSL certificates Acronis Backup & Recovery 10 components use Secure Sockets

Pagina 339

operations • Enterprise level of security Controlling user rights to perform operations and access backups Running services with minimal user rights

Pagina 340 - Backup policy (Policy)

To open the list of a machine's certificates 1. Click Start, then click Run, and then type: mmc 2. In the console, on the File menu, click Add

Pagina 341 - Built-in group

Copyright © Acronis, Inc., 2000-2009 81 (Note quotation marks; substitute the sample thumbprint shown here with that of your certificate.)

Pagina 342 - Centralized vault

3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this s

Pagina 343 - Deduplication

The option defines whether to display the pop-up messages about task run results: successful completion, failure or success with warnings. When displ

Pagina 344 - Disk group

3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts

Pagina 345 - Dynamic disk

3.2.2.1. Windows event log This option defines whether the management server has to record its own log events in the Application Event Log of Window

Pagina 346 - Encrypted archive

3.3. Machine options The machine options define the general behavior of all Acronis Backup & Recovery 10 agents operating on the managed machine,

Pagina 347

3.3.2.1. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootabl

Pagina 348 - Media builder

1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup &

Pagina 349

3.4. Default backup and recovery options 3.4.1. Default backup options Each Acronis agent has its own default backup options. Once an agent is insta

Pagina 350 - Storage node-side validation

The simplified way of centralized management • Backup Using the Back up control, select the machine which you want to back up and then create a back

Pagina 351 - Validation

Backup performance: Backup priority (p. 99) + + - - HDD writing speed (p. 99) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p

Pagina 352 - Virtual machine

Reset archive bit - + - + Reboot after the backup - - + + Create full backups as synthetic backups + + + + Notifications: E-mail (p. 100) + + - -

Pagina 353

3.4.1.2. Source files exclusion This option is effective for Windows and Linux operating systems and bootable media. This option is effective for di

Pagina 354

.tmp files. In this case, all .tmp files in the folder MyFolder will be skipped during the backup process, but the file MyFile.tmp will not be skippe

Pagina 355

Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not back up until the command execution is com

Pagina 356

<------------------------------ Backup ----------------------------> Pre-backup command Pre-data capture command Data capture Po

Pagina 357

execution is complete Result Preset Perform the data capture only after the command is successfully executed. Fail the task if the command executio

Pagina 358

3.4.1.5. File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems. This option defines

Pagina 359

Microsoft Volume Shadow Copy Service (VSS) provides an infrastructure for backing up data on running systems by ensuring coordination between applica

Pagina 360

• Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You may want to select maximum compression when ba

Comentarios a estos manuales

Sin comentarios