Many
Manuals
search
Categorias
Marcas
Inicio
ACRONIS
Software De Recuperación De Copia De Seguridad
Acronis Backup & Recovery 10 Advanced Workstation
Guía de usuario
ACRONIS Acronis Backup & Recovery 10 Advanced Workstation Guía de usuario Pagina 26
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
390
Tabla de contenidos
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
26
Copyrig
ht © A
croni
s, In
c., 200
0
-
20
09
The following diagram illustrates the notions discussed abov
e. For more definitions please refer to
the Glossary.
1
2
...
21
22
23
24
25
26
27
28
29
30
31
...
389
390
Advanced Workstation
1
Table of Contents
3
1.2. Getting started
8
Navigation tree
11
Shortcuts bar
12
Actions
13
How to expand/minimize panes
14
Action pages
15
1.3.1. Agent for Windows
17
1.3.1.1. Universal Restore
18
1.3.1.2. Deduplication
18
1.3.3.1. Management Server
19
VMware vCenter integration
20
1.3.3.2. Storage Node
20
1.3.4. Management Console
21
Acronis License Server
22
10 Storage Node
22
1.5. Supported file systems
23
1.6. Hardware requirements
23
1.7. Technical support
24
2.1. Basic concepts
25
Backup using bootable media
27
Full backup
29
Incremental backup
30
Differential backup
30
2.4. Owners and credentials
31
Archive owner
32
2.5. GFS backup scheme
33
The resulting archive: ideal
35
The resulting archive: real
36
Tower of Hanoi overview
37
Tower of Hanoi by Acronis
38
2.7. Retention rules
39
Combination of rules 1 and 2
40
Best practices
41
Backing up dynamic volumes
42
Recovering dynamic volumes
42
2.9. Tape support
44
2.10.1. Acronis Secure Zone
46
Limitation
47
Restore)
48
Limitations
49
Getting Universal Restore
49
Supported operating systems
49
How it works
50
Usage scenarios
50
How to use
50
2.11.1. Basic concepts
51
Setting up the storage node
54
Policy on a machine
57
Policy on a group
57
Backup policy state diagram
62
2.11.6. Deduplication
64
Deduplication database
65
Deduplication at source
65
Deduplication at target
66
What ratio to expect
68
Local connection
69
Remote connection
69
On a domain controller
71
Remote Agent ports
75
Client Encryption options
76
Server Encryption options
77
2.11.8.5. SSL certificates
78
Self-signed certificates
79
Non-self-signed certificates
80
3. Options
81
3.1.3. Time-based alerts
82
3.1.4. Number of tasks
82
3.1.5. Fonts
83
3.2.1. Logging level
83
3.2.2. Log cleanup rules
83
3.2.3. Event tracing
84
3.2.5. Acronis WOL Proxy
85
3.3. Machine options
87
3.3.2. Event tracing
88
3.3.3. Log cleanup rules
90
3.4.1.1. Archive protection
93
3.4.1.3. Pre/Post commands
94
Pre-backup command
95
Post-backup command
96
Pre-data capture command
97
Post-data capture command
97
• Always create a snapshot
98
• Do not create a snapshot
98
Volume shadow copy writers
99
3.4.1.8. Compression level
100
3.4.1.9. Backup performance
100
Backup priority
100
HDD writing speed
101
Network connection speed
101
3.4.1.10. Notifications
102
Windows event log
103
Messenger service (WinPopup)
103
3.4.1.11. Event tracing
103
SNMP notifications
104
3.4.1.13. Backup splitting
105
3.4.1.15. Media components
106
3.4.1.16. Error handling
107
3.4.1.17. Dual destination
108
Skip the task execution
109
3.4.1.20. Tape support
110
Always use a free tape
111
Reset archive bit
112
Use FTP in Active mode
113
3.4.2.1. Pre/Post commands
115
Pre-recovery command
116
Post-recovery command
116
3.4.2.2. Recovery priority
117
3.4.2.4. Notifications
117
3.4.2.5. Event tracing
119
3.4.2.6. Error handling
120
4. Vaults
123
4.1. Centralized vaults
124
Vault toolbar
125
Pie chart with legend
125
Vault content
126
Vault path
128
Vault database path
129
Vault encryption
129
4.1.3. Tape libraries
131
4.1.3.1. Overview
132
4.1.3.2. Hardware
132
4.1.3.3. Limitations
133
4.1.3.4. RSM Media Pools
133
Prerequisites
134
Backing up to tape library
136
Recovering from tape library
136
Inventory
137
Labeling
138
4.1.3.7. Tape support
139
4.1.3.8. Tape rotation
140
Choosing a backup scheme
140
Criteria of the choice
141
Case to analyze
141
GFS Example 1
143
GFS Example 2
146
GFS Example 3
147
ToH Example 1
149
ToH Example 2
150
ToH Example 3
151
Tape planning
152
Tape planning: Example 1
153
Tape planning: Example 2
153
4.1.3.9. What if
154
4.2. Personal vaults
155
4.3. Common operations
158
To show or hide columns
161
5. Scheduling
162
5.1. Daily schedule
163
5.2. Weekly schedule
165
Examples
166
5.3. Monthly schedule
167
Use Wake-On-LAN
170
Parameters
171
5.6. Conditions
173
5.6.1. User is idle
174
5.6.3. Fits time interval
175
5.6.4. User logged off
176
6. Direct management
178
Activities
179
System view
180
Way of working
180
Backup plan execution states
181
Backup plan statuses
182
Task states
182
Task statuses
183
• Backup plan (p. 194)
184
• Recovery task (p. 214)
184
• Validation task (p. 233)
184
Run backup plan
188
Task details
188
Archive
189
Backup plan details
190
6.1.3. Log
191
• Click View Details
192
6.1.3.3. Log entry details
193
6.2. Creating a backup plan
194
How to back up
195
Archive validation
195
Backup options
195
Convert to VM
195
To specify credentials
196
6.2.3. Source type
197
6.2.4. Items to back up
197
6.2.6. Exclusions
199
6.2.7. Archive
200
6.2.9. Backup schemes
202
6.2.9.3. Simple scheme
203
At a glance
206
Example
207
Roll-back period
208
Resulting tasks
211
6.2.10. Archive validation
212
6.3. Recovering data
214
What to recover
215
Where to recover
215
When to recover
215
6.3.1. Task credentials
216
6.3.2. Archive selection
217
6.3.3. Data type
217
6.3.4. Content selection
218
6.3.6.1. Disks
219
Disk destination
220
NT signature
220
6.3.6.2. Volumes
221
MBR destination
222
Volume destination
222
Volume properties
222
Properties
223
Storage
224
Processors
224
6.3.6.5. File destination
225
Exclusions
225
Overwriting
226
6.3.8. When to recover
227
6.3.9. Universal Restore
227
Windows NT/2000/XP/2003
232
Windows Vista/2008
233
6.4.1. Task credentials
234
6.4.2. Archive selection
235
6.4.3. Backup selection
236
6.4.4. Location selection
236
6.5. Mounting an image
237
6.5.1. Archive selection
238
6.5.2. Backup selection
239
6.5.3. Access credentials
239
6.6. Managing mounted images
240
General
242
6.7.1. Task credentials
243
6.7.2. Archive selection
244
6.7.3. Backup selection
245
6.7.5. Location selection
245
2. Using the archives table
246
3. Naming the new archive
246
6.8. Acronis Secure Zone
247
Settings
248
6.10. Bootable media
251
Linux-based bootable media
252
PE-based bootable media
252
Using Bart PE
254
Kernel parameters
255
Network settings
256
Network port
257
2.0 is 512MB
259
To add an iSCSI device
262
To add an NDAS device
262
Linux commands and utilities
263
Mounting backup volumes
267
6.10.6. Acronis PXE Server
268
6.11. Disk management
270
Starting the operations
271
6.11.5. Disk operations
272
Using advanced options
274
System disk conversion
276
6.11.6. Volume operations
278
Types of dynamic volumes
279
Create volume wizard
280
Select destination disks
280
Set the volume size
281
Set the volume options
281
6.11.6.2. Delete volume
282
6.11.6.3. Set active volume
283
6.11.6.6. Format volume
284
6.11.7. Pending operations
285
7. Centralized management
286
7.1.2. Backup policies
288
Machines selection
291
7.1.2.4. Policy details
292
7.1.3. Physical machines
293
Applying policies
295
Grouping actions
295
Other actions
296
To add a machine
297
• installing the agent
297
Text file requirements
298
Adding machines to a group
300
Machine details
300
Plans and tasks
302
Member of
304
Inheritance order
305
7.1.3.2. Actions on groups
306
Adding multiple criteria
307
Move one group to another
309
Editing custom groups
309
Group details
309
7.1.4. Virtual machines
311
Grouping of virtual machines
312
• Host/VA
313
7.1.5. Storage nodes
315
Adding a storage node
317
7.1.6. Tasks
318
7.1.7. Log
320
Local event log
321
Centralized event log
321
Configuring the log table
323
7.1.8. Reporting
324
Generating reports
325
Filters
325
Report view
325
Report coverage
328
7.1.8.8. Column selection
329
7.1.8.9. Report view
329
Connection parameters
342
Event tracing parameters
344
When to modify
346
What to back up
347
Where to back up
347
7.3.1. Policy credentials
349
7.3.2. Items to back up
349
Windows
352
7.3.4. Exclusions
354
7.3.5. Archive
355
7.3.7.1. Back up now scheme
357
7.3.7.3. Simple scheme
358
7.3.8. Archive validation
367
Glossary
368
Backup plan (Plan)
370
Backup policy (Policy)
370
Backup scheme
371
Bootable agent
371
Bootable media
371
Built-in group
371
Centralized backup plan
372
Centralized management
372
Centralized task
372
Centralized vault
372
Cleanup
373
Consolidation
373
Deduplicating vault
373
Deduplication
373
Direct management
374
Disk backup (Image)
374
Disk group
374
Dynamic disk
375
Dynamic group
375
Dynamic volume
376
Encrypted archive
376
Encrypted vault
376
Managed vault
378
Media builder
378
Personal vault
378
Physical machine
378
Storage node-side cleanup
380
Storage node-side validation
380
Tower of Hanoi
380
Unmanaged vault
381
Validation
381
Validation rules
381
Virtual machine
382
Comentarios a estos manuales
Sin comentarios
Publish
Relacionado con productos y manuales para Software De Recuperación De Copia De Seguridad ACRONIS Acronis Backup & Recovery 10 Advanced Workstation
Software De Recuperación De Copia De Seguridad ACRONIS True Image Home 2010 Netbook Edition Guía de usuario
(154 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Workstation Guía de usuario
(369 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition Guía de usuario
(389 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Server, Windows Guía de usuario
(217 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Recovery MS SQL Server - Upgrade AAS to AAP Especificaciones
(94 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS True Image Home 2010 Guía de usuario
(197 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Workstation Guía de usuario
(215 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Server fr/ Windows, AAP, GOV/SV, RNW, PrmMNT, 50-499u, FRE Guía de usuario
(242 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server, AAS, MNT, 5000-12499u, ENG Guía de usuario
(412 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition Guía de usuario
(410 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 UR Advanced Server Manual
(10 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Disk Director 11 Home Guía de usuario
(96 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Guía de instalación
(59 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 9.0 - HOME Guía de usuario
(124 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU Guía de usuario
(182 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 9.0 - HOME Manual de usuario
(16 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 9.0 - HOME Guía de usuario
(31 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 ONLINE STAND-ALONE Guía de usuario
(31 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Guía de instalación
(69 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP RECOVERY 10 MANAGEMENT SERVER REPORTS - Guía de instalación
(31 paginas)
Imprimir documento
Imprimir pagina 26
Comentarios a estos manuales