Many
Manuals
search
Categorias
Marcas
Inicio
ACRONIS
Software De Recuperación De Copia De Seguridad
Backup & Recovery 10 Advanced Server, AAS, MNT, 5000-12499u, ENG
Guía de usuario
ACRONIS Backup & Recovery 10 Advanced Server, AAS, MNT, 5000-12499u, ENG Guía de usuario Pagina 28
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
412
Tabla de contenidos
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
28
Copyright © Acronis, Inc., 2000
-
2010
The following diag
ram illustrates the notions discuss
ed above. For more definiti
ons please refer to
the Glossary.
1
2
...
23
24
25
26
27
28
29
30
31
32
33
...
411
412
Advanced Server
1
Table of contents
3
1.2 Getting started
9
Navigation tree
12
Shortcuts bar
13
Actions
14
How to expand/minimize panes
15
Action pages
16
Action page - Controls
17
1.3.1 Agent for Windows
18
1.3.2 Agent for Linux
19
1.3.2.1 Deduplication
20
1.3.3.1 Management Server
20
1.3.3.2 Storage Node
21
1.3.4 Management Console
22
1.4 Supported file systems
23
10 Storage Node
24
1.6 System requirements
25
1.7 Technical Support
26
2.1 Basic concepts
27
Backup using bootable media
29
Windows
31
2.3 Owners and credentials
32
Full backup
33
Incremental backup
34
Differential backup
34
2.5 GFS backup scheme
35
The resulting archive: ideal
37
The resulting archive: real
38
Tower of Hanoi overview
39
Tower of Hanoi by Acronis
40
2.7 Retention rules
41
Combination of rules 1 and 2
42
Best practices
43
Backing up dynamic volumes
44
Recovering dynamic volumes
44
2.9.2 Backing up MD devices
46
2.11 Tape support
49
2.12 Support for SNMP
50
2.13.1 Acronis Secure Zone
51
Advantages
52
Limitations
52
Restore)
53
Getting Universal Restore
55
Supported operating systems
55
Limitation
55
How it works
55
Usage scenarios
55
How to use
56
2.14.1 Basic concepts
57
Setting up the storage node
59
2.14.3.4 Example
62
Policy on a machine
65
Policy on a group
65
Backup policy state diagram
69
2.14.6 Deduplication
71
Deduplication database
72
Deduplication at source
72
Deduplication at target
73
Compacting
73
What ratio to expect
74
Local connection
76
Remote connection
76
Example 1
78
Example 2
78
On a domain controller
79
Remote Agent ports
84
Client Encryption options
84
Server Encryption options
85
2.14.8.5 SSL certificates
86
Certificate path
87
Self-signed certificates
87
Non-self-signed certificates
88
3 Options
89
3.1.3 Time-based alerts
90
3.1.4 Number of tasks
90
3.1.5 Fonts
90
3.2.1 Logging level
91
3.2.2 Log cleanup rules
91
3.2.3 Event tracing
92
3.2.5 Acronis WOL Proxy
93
3.2.6 VM protection options
93
3.2.7 Online backup proxy
94
3.3 Machine options
95
3.3.2 Event tracing
96
3.3.3 Log cleanup rules
98
3.3.4 Online backup proxy
98
3.4.1.1 Archive protection
101
3.4.1.3 Pre/Post commands
103
Pre-backup command
104
Post-backup command
104
Pre-data capture command
105
Post-data capture command
106
Always create a snapshot
107
Do not create a snapshot
107
3.4.1.8 Compression level
108
3.4.1.9 Backup performance
109
Backup priority
109
HDD writing speed
109
Network connection speed
110
3.4.1.10 Notifications
110
Messenger service (WinPopup)
111
3.4.1.11 Event tracing
112
Windows event log
112
SNMP notifications
112
3.4.1.13 Backup splitting
113
Fixed size
114
3.4.1.15 Media components
115
3.4.1.16 Error handling
115
3.4.1.17 Dual destination
116
Skip the task execution
117
3.4.1.20 Tape support
118
Always use a free tape
119
Reset archive bit
120
Use FTP in Active mode
121
3.4.2.1 Pre/Post commands
123
Pre-recovery command
123
Post-recovery command
124
3.4.2.2 Recovery priority
124
3.4.2.3 File-level security
125
3.4.2.4 Notifications
125
3.4.2.5 Event tracing
126
3.4.2.6 Error handling
128
3.4.2.7 Additional settings
128
4 Vaults
130
4.1 Centralized vaults
131
Vault toolbar
132
Pie chart with legend
132
Vault content
132
Vault path
135
Vault database path
136
Vault encryption
136
4.1.3 Tape libraries
138
4.1.3.2 Hardware
139
4.1.3.3 Limitations
139
4.1.3.4 RSM Media Pools
140
Prerequisites
141
Backing up to tape library
142
Recovering from tape library
143
Inventory
144
Labeling
145
4.1.3.7 Tape support
145
4.1.3.8 Tape rotation
146
Choosing a backup scheme
147
Criteria of the choice
147
Case to analyze
148
GFS Example 1
149
GFS Example 2
152
GFS Example 3
154
ToH Example 1
156
ToH Example 2
157
ToH Example 3
158
Tape planning
158
Tape planning: Example 1
159
Tape planning: Example 2
160
4.1.3.9 What if
160
4.2 Personal vaults
161
Metadata
162
4.3 Common operations
164
To show or hide columns
167
5 Scheduling
168
5.1 Daily schedule
169
Examples
170
5.2 Weekly schedule
171
5.3 Monthly schedule
173
Parameters
176
Use Wake-On-LAN
177
To specify advanced settings
178
5.7 Conditions
179
5.7.1 User is idle
180
5.7.3 Fits time interval
181
5.7.4 User logged off
182
6 Direct management
184
Activities
185
System view
186
Way of working
186
Backup plan execution states
187
Backup plan statuses
187
Task states
188
Task statuses
189
Backup plan (p. 199)
190
Recovery task (p. 223)
190
Validation task (p. 244)
190
Run backup plan
194
Task details
194
Archive
195
Settings
195
Backup plan details
196
6.1.3 Log
197
6.2 Creating a backup plan
199
General
200
What to backup
200
Where to back up
200
How to back up
201
Archive validation
201
Backup options
201
Convert to VM
201
6.2.3 Source type
202
6.2.4 Items to back up
203
6.2.6 Exclusions
205
6.2.7 Archive
206
6.2.8.1 Usage examples
208
6.2.8.2 The [DATE] variable
211
6.2.10 Backup schemes
212
6.2.10.3 Simple scheme
213
At a glance
216
Example
217
Roll-back period
217
6.2.10.7 Initial seeding
221
6.2.11 Archive validation
222
6.3 Recovering data
223
What to recover
224
Where to recover
225
When to recover
225
Recovery options
225
6.3.1 Task credentials
226
6.3.2 Archive selection
226
6.3.3 Data type
227
6.3.4 Content selection
227
6.3.4.2 Files selection
228
6.3.6 Destination selection
229
Disk destination
230
NT signature
230
6.3.6.2 Volumes
231
MBR destination
232
Volume destination
232
Volume properties
232
6.3.6.5 File destination
234
Recovery exclusions
235
Overwriting
235
6.3.8 When to recover
236
6.3.9 Universal Restore
236
Universal Restore settings
237
Post-conversion operations
239
Windows NT/2000/XP/2003
242
Windows Vista/2008
242
6.4.1 Task credentials
245
6.4.2 Archive selection
246
6.4.3 Backup selection
247
6.4.4 Location selection
247
6.5 Mounting an image
248
6.5.1 Archive selection
249
6.5.2 Backup selection
250
6.5.3 Access credentials
250
6.6 Managing mounted images
251
6.7.1 Task credentials
254
6.7.2 Archive selection
255
6.7.3 Backup selection
256
6.7.5 Location selection
256
2. Using the archives table
257
3. Naming the new archive
257
6.8 Acronis Secure Zone
258
To set up a password
259
To disable password
259
6.8.1.4 Result confirmation
260
6.10 Bootable media
262
Linux-based bootable media
263
PE-based bootable media
263
Using Bart PE
264
Kernel parameters
265
Network settings
267
Network port
268
To add an iSCSI device
272
Linux commands and utilities
273
Mounting backup volumes
277
6.10.6 Acronis PXE Server
278
6.11 Disk management
280
Starting the operations
281
6.11.5 Disk operations
282
6.11.5.2 Basic disk cloning
283
Using advanced options
284
System disk conversion
286
6.11.6 Volume operations
288
Create volume wizard
289
Select destination disks
290
Set the volume size
290
Set the volume options
291
6.11.6.2 Delete volume
292
6.11.6.3 Set active volume
292
6.11.6.6 Format volume
293
6.11.7 Pending operations
294
7 Centralized management
296
7.1.2 Backup policies
298
Machines selection
301
7.1.2.4 Policy details
302
7.1.3 Physical machines
303
7.1.3.1 Actions on machines
304
Applying policies
305
Grouping actions
305
Other actions
306
To add a machine
307
Text file requirements
308
Adding machines to a group
310
Machine details
310
Plans and tasks
312
Member of
314
Inheritance order
315
7.1.3.2 Actions on groups
316
Adding multiple criteria
317
Move one group to another
319
Editing custom groups
319
Group details
319
7.1.4 Virtual machines
320
Grouping of virtual machines
322
7.1.5 Storage nodes
326
Adding a storage node
328
7.1.6 Tasks
329
7.1.7 Log
331
Centralized event log
332
Configuring the log table
334
7.1.8 Reporting
335
Filters
336
Report view
336
7.1.8.8 Column selection
340
7.1.8.9 Report view
340
Connection parameters
352
Event tracing parameters
354
What to back up
357
7.3.1 Policy credentials
359
7.3.2 Items to back up
360
Names for logical volumes
363
7.3.4 Exclusions
365
7.3.5 Archive
366
2. Naming the archives
367
7.3.7.1 Back up now scheme
369
7.3.7.3 Simple scheme
369
Description
370
Resulting tasks
377
7.3.8 Archive validation
378
8 Online backup
379
Server uses a free license
381
8.1.7 Initial Seeding FAQ
382
Hard drive types
384
Packaging
384
To renew a subscription
390
8.2 Where do I start?
391
8.3 Choosing a subscription
391
Trial subscriptions
392
Operations
395
Backup and recovery options
395
8.7 Terminology reference
396
9 Glossary
398
Backup plan (Plan)
400
Backup policy (Policy)
400
Backup scheme
401
Bootable agent
401
Bootable media
401
Built-in group
401
Centralized backup plan
402
Centralized management
402
Centralized task
402
Centralized vault
402
Direct management
404
Disk backup (Image)
404
Disk group
404
Dynamic disk
405
Dynamic group
405
Dynamic volume
406
Encrypted archive
406
Encrypted vault
406
Managed vault
408
Media builder
408
Personal vault
408
Physical machine
408
Storage node-side cleanup
410
Storage node-side validation
410
Tower of Hanoi
410
Unmanaged vault
411
Validation
411
Validation rules
411
Virtual machine
412
Comentarios a estos manuales
Sin comentarios
Publish
Relacionado con productos y manuales para Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server, AAS, MNT, 5000-12499u, ENG
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition Guía de usuario
(410 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 UR Advanced Server Manual
(10 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Disk Director 11 Home Guía de usuario
(96 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Guía de instalación
(59 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 9.0 - HOME Guía de usuario
(124 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Server for Linux, ESD, AAS, UPG, 1u, DEU Guía de usuario
(182 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 9.0 - HOME Manual de usuario
(16 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 9.0 - HOME Guía de usuario
(31 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 ONLINE STAND-ALONE Guía de usuario
(31 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Guía de instalación
(69 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP RECOVERY 10 MANAGEMENT SERVER REPORTS - Guía de instalación
(31 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - INSTALLATION UPDATE 3 Guía de usuario
(16 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Manual de usuario
(10 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS RECOVERY - FOR MICROSOFT EXCHANGE Especificaciones
(88 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS MIGRATE EASY 7.0 Guía de usuario
(78 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 - UPGRADING TO STAND-ALONE EDITIONS Manual de usuario
(23 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS TRUE IMAGE 8.0 Guía de usuario
(81 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER SBS EDITION - INSTALLATION UPDATE 3 Guía de instalación
(33 paginas)
Imprimir documento
Imprimir pagina 28
Comentarios a estos manuales