ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition Guía de usuario

Busca en linea o descarga Guía de usuario para Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition. Acronis Backup & Recovery 10 Advanced Server Virtual Edition Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 410
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - User's Guide

User's Guide Acronis® Backup & Recovery 10™ Advanced Server Virtual Edition

Pagina 2

10 Copyright © Acronis, Inc., 2000-2009 The advanced way of centralized management To make the best use of the centralized management capabilities

Pagina 3 - Table of Contents

100 Copyright © Acronis, Inc., 2000-2009 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the app

Pagina 4

Copyright © Acronis, Inc., 2000-2009 101 b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is install

Pagina 5

102 Copyright © Acronis, Inc., 2000-2009 On the vCenter Server side When integration is enabled, the vCenter Server will store and show information

Pagina 6

Copyright © Acronis, Inc., 2000-2009 103 3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the m

Pagina 7

104 Copyright © Acronis, Inc., 2000-2009 The option defines whether the agent(s) operating on the managed machine have to send the log events to th

Pagina 8 - 1.2. Getting started

Copyright © Acronis, Inc., 2000-2009 105 5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operat

Pagina 9

106 Copyright © Acronis, Inc., 2000-2009 • The type of the data being backed up (disk, file) • The backup destination (networked location or loca

Pagina 10 - • Using deduplication

Copyright © Acronis, Inc., 2000-2009 107 Media components (p. 121) Dest: removable media Dest: removable media Dest: removable media Dest: removabl

Pagina 11

108 Copyright © Acronis, Inc., 2000-2009 SNMP (p. 119) + + + + - - 3.4.1.1. Archive protection This option is effective for Windows and Linu

Pagina 12 - Navigation tree

Copyright © Acronis, Inc., 2000-2009 109 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of i

Pagina 13 - Shortcuts bar

Copyright © Acronis, Inc., 2000-2009 11 Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace

Pagina 14

110 Copyright © Acronis, Inc., 2000-2009 • copy an archive to another location after the backup ends. The program does not support interactive com

Pagina 15 - "Tasks" view

Copyright © Acronis, Inc., 2000-2009 111 Post-backup command To specify a command/executable file to be executed after the backup is completed 1.

Pagina 16 - Action pages

112 Copyright © Acronis, Inc., 2000-2009 o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture c

Pagina 17

Copyright © Acronis, Inc., 2000-2009 113 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do n

Pagina 18 - 1.3.1. Agent for Windows

114 Copyright © Acronis, Inc., 2000-2009 The option determines whether to take snapshots of multiple volumes at the same time or one by one. The pr

Pagina 19 - 1.3.3. Agent for ESX/ESXi

Copyright © Acronis, Inc., 2000-2009 115 3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable

Pagina 20 - 1.3.5.1. Management Server

116 Copyright © Acronis, Inc., 2000-2009 • Normal – to run the backup process with normal speed, allocating resources on a par with other processe

Pagina 21 - 1.3.5.2. Storage Node

Copyright © Acronis, Inc., 2000-2009 117 3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about ba

Pagina 22 - 1.3.5.4. License Server

118 Copyright © Acronis, Inc., 2000-2009 • Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct.

Pagina 23 - 1.3.6. Management Console

Copyright © Acronis, Inc., 2000-2009 119 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one

Pagina 24

12 Copyright © Acronis, Inc., 2000-2009 Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on wheth

Pagina 25 - 1.6. Hardware requirements

120 Copyright © Acronis, Inc., 2000-2009 • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP man

Pagina 26 - 1.7. Technical support

Copyright © Acronis, Inc., 2000-2009 121 to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since

Pagina 27

122 Copyright © Acronis, Inc., 2000-2009 Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is t

Pagina 28 - 2.1. Basic concepts

Copyright © Acronis, Inc., 2000-2009 123 the data will be backed up and you will be able to mount the resulting disk backup and extract valid files

Pagina 29

124 Copyright © Acronis, Inc., 2000-2009 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Pagina 30 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2009 125 The program will try to execute the failed task again if you select the Restart a failed task check box an

Pagina 31

126 Copyright © Acronis, Inc., 2000-2009 If the console is connected to the management server The Use a separate tape set option has more precise d

Pagina 32

Copyright © Acronis, Inc., 2000-2009 127 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you

Pagina 33 - 2.3. Owners and credentials

128 Copyright © Acronis, Inc., 2000-2009 When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup pro

Pagina 34

Copyright © Acronis, Inc., 2000-2009 129 3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is

Pagina 35 - Differential backup

Copyright © Acronis, Inc., 2000-2009 13 the history of operations logged in the local logs of the registered machines and the storage nodes. Shortc

Pagina 36 - 2.5. GFS backup scheme

130 Copyright © Acronis, Inc., 2000-2009 Validate backup archive before recovery + + + + + + Check file system after recovery + - + - + -

Pagina 37

Copyright © Acronis, Inc., 2000-2009 131 Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1.

Pagina 38 - The resulting archive: ideal

132 Copyright © Acronis, Inc., 2000-2009 3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This op

Pagina 39 - The resulting archive: real

Copyright © Acronis, Inc., 2000-2009 133 The preset is: Disabled. To configure e-mail notification 1. Select the Send e-mail notifications check b

Pagina 40 - Tower of Hanoi overview

134 Copyright © Acronis, Inc., 2000-2009 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine

Pagina 41 - Tower of Hanoi by Acronis

Copyright © Acronis, Inc., 2000-2009 135 SNMP notifications This option is effective for both Windows and Linux operating systems. This option is n

Pagina 42 - 2.7. Retention rules

136 Copyright © Acronis, Inc., 2000-2009 Re-attempt, if an error occurs The preset is: Enabled. Number of attempts: 5. Interval between attempts: 3

Pagina 43

Copyright © Acronis, Inc., 2000-2009 137 Reboot machine after recovery This option is effective when operating under bootable media. The preset is

Pagina 44 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2009 138 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault

Pagina 45 - Backing up dynamic volumes

Copyright © Acronis, Inc., 2000-2009 139 A vault is called personal if it was created using direct connection of the console to a managed machine.

Pagina 46 - Recovering dynamic volumes

14 Copyright © Acronis, Inc., 2000-2009 Actions Contains a list of common operations that can be performed on a managed machine or on a management

Pagina 47

140 Copyright © Acronis, Inc., 2000-2009 Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the mach

Pagina 48

Copyright © Acronis, Inc., 2000-2009 141 • [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contain

Pagina 49 - Software RAID arrays

142 Copyright © Acronis, Inc., 2000-2009 password (if the vault is encrypted) and information in the Comments field. • The Edit unmanaged vault pa

Pagina 50 - Hardware RAID arrays

Copyright © Acronis, Inc., 2000-2009 143 4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the followin

Pagina 51 - Virtual machines backup

144 Copyright © Acronis, Inc., 2000-2009 o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o

Pagina 52 - Guest HDD

Copyright © Acronis, Inc., 2000-2009 145 o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm w

Pagina 53 - Troubleshooting

146 Copyright © Acronis, Inc., 2000-2009 To create a new folder for the vault, click Create folder. A vault can be created in an empty folder onl

Pagina 54 - 2.12. Tape support

Copyright © Acronis, Inc., 2000-2009 147 4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acroni

Pagina 55

148 Copyright © Acronis, Inc., 2000-2009 If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by sof

Pagina 56 - 2.13.1. Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2009 149 If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to

Pagina 57 - Limitation

Copyright © Acronis, Inc., 2000-2009 15 The management console "remembers" the way the panes' borders are set. When you run the mana

Pagina 58 - Restore)

150 Copyright © Acronis, Inc., 2000-2009 Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted,

Pagina 59 - Supported operating systems

Copyright © Acronis, Inc., 2000-2009 151 At the Delete operation, the vault content will be deleted from the storage node database without accessin

Pagina 60 - How to use

152 Copyright © Acronis, Inc., 2000-2009 The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction w

Pagina 61 - 2.14.1. Basic concepts

Copyright © Acronis, Inc., 2000-2009 153 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage

Pagina 62

154 Copyright © Acronis, Inc., 2000-2009 Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the

Pagina 63

Copyright © Acronis, Inc., 2000-2009 155 • Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape,

Pagina 64 - Setting up the storage node

156 Copyright © Acronis, Inc., 2000-2009 Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes

Pagina 65

Copyright © Acronis, Inc., 2000-2009 157 • the full size of the data to protect is approximately 320 GB • the approximate size of daily changes o

Pagina 66

158 Copyright © Acronis, Inc., 2000-2009 • GFS Example 3 (p. 162). The Use a separate tape set option is selected. All the Always use a free tape

Pagina 67 - 2.14.3.4. Example

Copyright © Acronis, Inc., 2000-2009 159 • four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of

Pagina 68

16 Copyright © Acronis, Inc., 2000-2009 o By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane); o By

Pagina 69

160 Copyright © Acronis, Inc., 2000-2009 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the

Pagina 70 - Policy on a group

Copyright © Acronis, Inc., 2000-2009 161 GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set opti

Pagina 71

162 Copyright © Acronis, Inc., 2000-2009 As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the sec

Pagina 72

Copyright © Acronis, Inc., 2000-2009 163 These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of

Pagina 73

164 Copyright © Acronis, Inc., 2000-2009 go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it

Pagina 74

Copyright © Acronis, Inc., 2000-2009 165 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac

Pagina 75 - Backup policy state diagram

166 Copyright © Acronis, Inc., 2000-2009 The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options.

Pagina 76

Copyright © Acronis, Inc., 2000-2009 167 The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the

Pagina 77 - 2.14.6. Deduplication

168 Copyright © Acronis, Inc., 2000-2009 • tape rotation scheme ( frequency of backups, retention rules) • tape-append options • requirements to

Pagina 78 - Deduplication at source

Copyright © Acronis, Inc., 2000-2009 169 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compress

Pagina 79 - Deduplication at target

Copyright © Acronis, Inc., 2000-2009 17 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages

Pagina 80

170 Copyright © Acronis, Inc., 2000-2009 • What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis age

Pagina 81 - What ratio to expect

Copyright © Acronis, Inc., 2000-2009 171 name. If you accidentally delete the .meta folder, it will be automatically recreated next time you acces

Pagina 82 - Remote connection

172 Copyright © Acronis, Inc., 2000-2009 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplica

Pagina 83

Copyright © Acronis, Inc., 2000-2009 173 4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the

Pagina 84 - Example 1

174 Copyright © Acronis, Inc., 2000-2009 All the operations described below are performed by clicking the corresponding buttons on the toolbar. The

Pagina 85 - Example 2

Copyright © Acronis, Inc., 2000-2009 175 Recover a disk/volume as a virtual machine Right-click the disk backup, then select Recover as virtual mac

Pagina 86 - On a domain controller

176 Copyright © Acronis, Inc., 2000-2009 There should be enough space in the vault for temporary files created during consolidation. Backups result

Pagina 87

Copyright © Acronis, Inc., 2000-2009 177 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Pagina 88

178 Copyright © Acronis, Inc., 2000-2009 The specified period of time has passed since the last successful backup completed + + The scheduler beha

Pagina 89

Copyright © Acronis, Inc., 2000-2009 179 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters a

Pagina 90 - Remote Agent ports

18 Copyright © Acronis, Inc., 2000-2009 Console The console provides Graphical User Interface and remote connection to the agents and other Acroni

Pagina 91 - Client Encryption options

180 Copyright © Acronis, Inc., 2000-2009 The obvious way is to add five simple schedules. If you spend one minute for examination, you can think ou

Pagina 92 - Server Encryption options

Copyright © Acronis, Inc., 2000-2009 181 Advanced scheduling settings (p. 187) are available only for machines registered on Acronis Backup & R

Pagina 93 - 2.14.8.5. SSL certificates

182 Copyright © Acronis, Inc., 2000-2009 In the case when the task needs to be run on different days of the weeks with different time intervals, co

Pagina 94 - Self-signed certificates

Copyright © Acronis, Inc., 2000-2009 183 Months: <...> Select a certain month(s) you want to run the task in. Days: <...> Select spe

Pagina 95 - Non-self-signed certificates

184 Copyright © Acronis, Inc., 2000-2009 The schedule's parameters are set up as follows. 1. Months: September, October, November. 2. On: &l

Pagina 96 - 3. Options

Copyright © Acronis, Inc., 2000-2009 185 Third schedule 1. Months: June, July, August. 2. Days: 1, 15. 3. Once at: 10:00:00 PM. 4. Effective: F

Pagina 97 - 3.1.4. Number of tasks

186 Copyright © Acronis, Inc., 2000-2009 When Windows detects a bad block on a hard disk, it records an event with the event source disk and the ev

Pagina 98 - 3.2.2. Log cleanup rules

Copyright © Acronis, Inc., 2000-2009 187 3. In the Event Properties dialog box, view the event's properties such as the event source, shown i

Pagina 99 - 3.2.3. Event tracing

188 Copyright © Acronis, Inc., 2000-2009 First machine: Every day at 09:30:03 AM Second machine: Every day at 09:00:00 AM Third machine: Every day

Pagina 100 - 3.2.5. Acronis WOL Proxy

Copyright © Acronis, Inc., 2000-2009 189 • backup task start time matters - skip the backup task if the conditions are not met at the time when th

Pagina 101

Copyright © Acronis, Inc., 2000-2009 19 1.3.1.2. Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Ac

Pagina 102 - 3.3. Machine options

190 Copyright © Acronis, Inc., 2000-2009 Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location&ap

Pagina 103 - 3.3.2. Event tracing

Copyright © Acronis, Inc., 2000-2009 191 For example: • Event: Daily, Every 1 day(s); Once at 03:00:00 PM. • Condition: Fits time interval, from

Pagina 104 - Windows

192 Copyright © Acronis, Inc., 2000-2009 • Condition: Time since last backup, Time since the last backup: 12 hour(s). • Task start conditions: Wa

Pagina 105 - 3.3.3. Log cleanup rules

Copyright © Acronis, Inc., 2000-2009 193 6. Direct management This section covers operations that can be performed directly on a managed machine b

Pagina 106

194 Copyright © Acronis, Inc., 2000-2009 server and run Acronis License Server to manage licenses. Please make sure you have a valid license on Acr

Pagina 107

Copyright © Acronis, Inc., 2000-2009 195 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared i

Pagina 108 - 3.4.1.1. Archive protection

196 Copyright © Acronis, Inc., 2000-2009 unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 202) s

Pagina 109 - 3.4.1.3. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 197 Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup pl

Pagina 110 - Pre-backup command

198 Copyright © Acronis, Inc., 2000-2009 A task may also change to the Waiting state when the event specified by the schedule occurs but the condit

Pagina 111 - Post-backup command

Copyright © Acronis, Inc., 2000-2009 199 • Edit the local plan to prevent its future failure in case a local plan has failed • Edit the backup po

Pagina 112 - Post-data capture command

Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Pagina 113 - • Do not create a snapshot

20 Copyright © Acronis, Inc., 2000-2009 can choose not to install the bootable components and perform operations that require reboot using bootable

Pagina 114 - Volume shadow copy writers

200 Copyright © Acronis, Inc., 2000-2009 Run a plan/task Click Backup plan Run. In the Run Backup Plan (p. 203) window, select the task you need t

Pagina 115 - Backup priority

Copyright © Acronis, Inc., 2000-2009 201 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Pagina 116 - Network connection speed

202 Copyright © Acronis, Inc., 2000-2009 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Pagina 117 - 3.4.1.10. Notifications

Copyright © Acronis, Inc., 2000-2009 203 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Pagina 118 - Windows event log

204 Copyright © Acronis, Inc., 2000-2009 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover

Pagina 119 - SNMP notifications

Copyright © Acronis, Inc., 2000-2009 205 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The

Pagina 120 - 3.4.1.13. Backup splitting

206 Copyright © Acronis, Inc., 2000-2009 Settings The Settings tab displays the following information: • Backup scheme - the selected backup schem

Pagina 121 - 3.4.1.15. Media components

Copyright © Acronis, Inc., 2000-2009 207 Select multiple log entries • non-contiguous: hold down CTRL and click the log entries one by one • cont

Pagina 122 - 3.4.1.16. Error handling

208 Copyright © Acronis, Inc., 2000-2009 Sort log entries by date and time Click the column's header to sort the log entries in ascending orde

Pagina 123 - 3.4.1.17. Dual destination

Copyright © Acronis, Inc., 2000-2009 209 6.2. Creating a backup plan Before creating your first backup plan (p. 389), please familiarize yourself w

Pagina 124 - Skip the task execution

Copyright © Acronis, Inc., 2000-2009 21 1. Microsoft SQL Server 2005 Express that comes with the installation package and installs on the same mac

Pagina 125 - 3.4.1.20. Tape support

210 Copyright © Acronis, Inc., 2000-2009 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view

Pagina 126 - Always use a free tape

Copyright © Acronis, Inc., 2000-2009 211 Host (p. 229) Specify the machine that will perform the conversion. The machine has to have Acronis Backup

Pagina 127 - Reset archive bit

212 Copyright © Acronis, Inc., 2000-2009 6.2.3. Source type Select the type of data you want to be backed up on the managed machine. The list of

Pagina 128 - Use FTP in Active mode

Copyright © Acronis, Inc., 2000-2009 213 6.2.4. Items to back up The items to backup depend on the source type (p. 212) selected previously. 6.2.

Pagina 129

214 Copyright © Acronis, Inc., 2000-2009 A file-based backup is not sufficient for recovery of the operating system. In order to recover your opera

Pagina 130 - 3.4.2.1. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 215 machine configuration, stored in a virtual machine backup, will be suggested by default at recovering the

Pagina 131 - Post-recovery command

216 Copyright © Acronis, Inc., 2000-2009 You can view file or folder attributes in the file/folder properties or by using the attrib command. For m

Pagina 132 - 3.4.2.4. Notifications

Copyright © Acronis, Inc., 2000-2009 217 You can access the server as an anonymous user if the server enables such access. To do so, click Use anon

Pagina 133

218 Copyright © Acronis, Inc., 2000-2009 6.2.8. Access credentials for archive location Specify credentials required for access to the location wh

Pagina 134 - 3.4.2.5. Event tracing

Copyright © Acronis, Inc., 2000-2009 219 • Custom – to create a custom scheme, where you are free to set up a backup strategy in the way your ente

Pagina 135 - 3.4.2.6. Error handling

22 Copyright © Acronis, Inc., 2000-2009 Storage node-side cleanup and validation Archives, stored in unmanaged vaults, are maintained by the agents

Pagina 136

220 Copyright © Acronis, Inc., 2000-2009 Description Let us suppose that we want to set up a backup plan that will regularly produce a series of da

Pagina 137

Copyright © Acronis, Inc., 2000-2009 221 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h

Pagina 138 - 4. Vaults

222 Copyright © Acronis, Inc., 2000-2009 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, you may set

Pagina 139 - 4.1. Centralized vaults

Copyright © Acronis, Inc., 2000-2009 223 o Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly

Pagina 140 - Pie chart with legend

224 Copyright © Acronis, Inc., 2000-2009 Roll-back period The guaranteed number of sessions that one can go back in the archive at any time. Calcu

Pagina 141 - Vault content

Copyright © Acronis, Inc., 2000-2009 225 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level doubles the full backup

Pagina 142

226 Copyright © Acronis, Inc., 2000-2009 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If th

Pagina 143 - Vault path

Copyright © Acronis, Inc., 2000-2009 227 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b

Pagina 144 - Vault encryption

228 Copyright © Acronis, Inc., 2000-2009 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup

Pagina 145

Copyright © Acronis, Inc., 2000-2009 229 you prefer to be immediately informed whether the backed up data is not corrupted and can be successfully

Pagina 146 - 4.1.3. Tape libraries

Copyright © Acronis, Inc., 2000-2009 23 1.3.6. Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool fo

Pagina 147 - 4.1.3.2. Hardware

230 Copyright © Acronis, Inc., 2000-2009 Virtual machines resulting from backup are not supposed to be backed up and so do not appear on the manage

Pagina 148 - 4.1.3.4. RSM Media Pools

Copyright © Acronis, Inc., 2000-2009 231 The system becomes operational and ready to provide necessary services. Thus, the system downtime will be

Pagina 149 - Prerequisites

232 Copyright © Acronis, Inc., 2000-2009 Where to recover This section appears after the required backup is selected and the type of data to recove

Pagina 150

Copyright © Acronis, Inc., 2000-2009 233 After any of the settings is changed against the default value, a new line that displays the newly set val

Pagina 151 - Recovering from tape library

234 Copyright © Acronis, Inc., 2000-2009 o If the archive is stored on a network share, expand the Network folders group, then select the required

Pagina 152 - Inventory

Copyright © Acronis, Inc., 2000-2009 235 Selecting an MBR You will usually select the disk's MBR if: o The operating system cannot boot o Th

Pagina 153 - Labeling

236 Copyright © Acronis, Inc., 2000-2009 According to the original FTP specification, credentials required for access to FTP servers are transferre

Pagina 154 - 4.1.3.7. Tape support

Copyright © Acronis, Inc., 2000-2009 237 NT signature (p. 237) Select the way the recovered disk's signature will be handled. The disk signatu

Pagina 155 - Choosing a backup scheme

238 Copyright © Acronis, Inc., 2000-2009 Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agen

Pagina 156 - Case to analyze

Copyright © Acronis, Inc., 2000-2009 239 MBR destination To specify a destination disk: 1. Select the disk to recover the MBR to. 2. Click OK. V

Pagina 157

24 Copyright © Acronis, Inc., 2000-2009 • Windows 7 - all editions except for the Starter and Home editions* * Acronis Backup & Recovery 10

Pagina 158 - GFS Example 1

240 Copyright © Acronis, Inc., 2000-2009 • Logical. Information about logical volumes is located not in the MBR, but in the extended partition tab

Pagina 159

Copyright © Acronis, Inc., 2000-2009 241 6.3.6.4. Virtual machine settings The following virtual machine settings can be configured. Storage Initi

Pagina 160

242 Copyright © Acronis, Inc., 2000-2009 C:\Documents\Finance\Reports\, the files will be recovered to the same path. If the folder does not exist,

Pagina 161 - GFS Example 2

Copyright © Acronis, Inc., 2000-2009 243 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th

Pagina 162 - GFS Example 3

244 Copyright © Acronis, Inc., 2000-2009 To learn more about the Universal Restore technology, see the Universal Restore (p. 58) section. Acronis B

Pagina 163

Copyright © Acronis, Inc., 2000-2009 245 Mass storage drivers to install anyway To access this option, select the Advanced view check box. If the t

Pagina 164 - ToH Example 1

246 Copyright © Acronis, Inc., 2000-2009 3. In Data type, select Disks or Volumes depending on what you need to convert. 4. In Content, select t

Pagina 165 - ToH Example 2

Copyright © Acronis, Inc., 2000-2009 247 • Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,

Pagina 166 - ToH Example 3

248 Copyright © Acronis, Inc., 2000-2009 The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered to ide

Pagina 167 - Tape planning

Copyright © Acronis, Inc., 2000-2009 249 root (hd0,0) 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first d

Pagina 168 - Tape planning: Example 2

Copyright © Acronis, Inc., 2000-2009 25 When using the agent on a 64-bit RedHat based distribution, such as RHEL, CentOS, Fedora or Scientific Linu

Pagina 169 - 4.1.3.9. What if

250 Copyright © Acronis, Inc., 2000-2009 Example 2. The following command assembles the device /dev/md0 combined of the disks /dev/sdb and /dev/sdc

Pagina 170 - 4.2. Personal vaults

Copyright © Acronis, Inc., 2000-2009 251 • Base: Hexadecimal • Value: FFFFFFFF 4. Quit Registry Editor, and then restart the machine. If this do

Pagina 171

252 Copyright © Acronis, Inc., 2000-2009 While successful validation means high probability of successful recovery, it does not check all factors t

Pagina 172

Copyright © Acronis, Inc., 2000-2009 253 6.4.1. Task credentials Provide credentials for the account under which the task will run. To specify cre

Pagina 173 - 4.3. Common operations

254 Copyright © Acronis, Inc., 2000-2009 After entering access credentials, the folders on the server become available. Click the appropriate folde

Pagina 174

Copyright © Acronis, Inc., 2000-2009 255 deleted or modified by another user or by the program itself according to scheduled operations. Use the Re

Pagina 175

256 Copyright © Acronis, Inc., 2000-2009 operation. The mount operation is available when the console is connected to a managed machine running eit

Pagina 176 - To show or hide columns

Copyright © Acronis, Inc., 2000-2009 257 If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the dis

Pagina 177 - 5. Scheduling

258 Copyright © Acronis, Inc., 2000-2009 The program will access the location using the credentials you specify. Use this option if the current use

Pagina 178 - 5.1. Daily schedule

Copyright © Acronis, Inc., 2000-2009 259 Unmounting images Maintaining the mounted volumes takes considerable system resources. It is recommended t

Pagina 179 - Examples

26 Copyright © Acronis, Inc., 2000-2009 CD-RW/ DVD-RW drive for bootable media creation Acronis Backup & Recovery 10 Agent for Windows Item

Pagina 180 - 5.2. Weekly schedule

260 Copyright © Acronis, Inc., 2000-2009 • exporting an archive or part of an archive to a location where an archive of the same name exists • ex

Pagina 181

Copyright © Acronis, Inc., 2000-2009 261 To export an archive or a backup perform the following steps. General Task name [Optional] Enter a unique

Pagina 182 - 5.3. Monthly schedule

262 Copyright © Acronis, Inc., 2000-2009 The task will always run under the credentials you specify, whether started manually or executed on schedu

Pagina 183

Copyright © Acronis, Inc., 2000-2009 263 2. In the table to the right of the tree, select the archive. The table displays the names of the archive

Pagina 184

264 Copyright © Acronis, Inc., 2000-2009 1. Selecting the export destination Enter the full path to the destination in the Path field, or select t

Pagina 185 - Parameters

Copyright © Acronis, Inc., 2000-2009 265 3. Naming the new archive By default, the exported archive inherits the name of the original archive. Beca

Pagina 186

266 Copyright © Acronis, Inc., 2000-2009 6.8.1. Creating Acronis Secure Zone You can create Acronis Secure Zone while the operating system is runn

Pagina 187 - Use Wake-On-LAN

Copyright © Acronis, Inc., 2000-2009 267 • Taking all free space from a system volume may cause the operating system to work unstably and even fai

Pagina 188 - 5.6. Conditions

268 Copyright © Acronis, Inc., 2000-2009 6.8.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 400). Once

Pagina 189 - 5.6.1. User is idle

Copyright © Acronis, Inc., 2000-2009 269 o dragging the slider and selecting any size between the current and minimum values. The minimum size is

Pagina 190 - 5.6.3. Fits time interval

Copyright © Acronis, Inc., 2000-2009 27 Support shall consist of supplying telephone or other electronic support to you in order to help you locate

Pagina 191 - 5.6.4. User logged off

270 Copyright © Acronis, Inc., 2000-2009 • boot the machine from a separate bootable rescue media • use network boot from Acronis PXE Server or M

Pagina 192

Copyright © Acronis, Inc., 2000-2009 271 • PE-based bootable media helps overcome some Linux-related bootable media issues such as support for cer

Pagina 193 - 6. Direct management

272 Copyright © Acronis, Inc., 2000-2009 http://www.microsoft.com/downloads/details.aspx?FamilyID=94bb6e34-d890-4932-81a5-5b50c657de08&DisplayL

Pagina 194 - Activities

Copyright © Acronis, Inc., 2000-2009 273 o create CD, DVD or other bootable media such as removable USB flash drives if the hardware BIOS allows f

Pagina 195 - System view

274 Copyright © Acronis, Inc., 2000-2009 Without this parameter, all startup messages will be displayed, followed by a command prompt. To start the

Pagina 196 - Backup plan execution states

Copyright © Acronis, Inc., 2000-2009 275 • Subnet mask • Gateway • DNS server • WINS server. Once the bootable agent starts on a machine, the

Pagina 197 - Task states

276 Copyright © Acronis, Inc., 2000-2009 Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to

Pagina 198 - Task statuses

Copyright © Acronis, Inc., 2000-2009 277 2. Start the Bootable Media Builder either from the management console, by selecting Tools > Create B

Pagina 199 - • Validation task (p. 251)

278 Copyright © Acronis, Inc., 2000-2009 controller, network adapter, tape drive or other device. You will have to repeat this procedure for each d

Pagina 200

Copyright © Acronis, Inc., 2000-2009 279 11. Build the Bart PE. 12. Burn the ISO to CD or DVD (if this has not been done yet) or copy to a flash dr

Pagina 201

Copyright © Acronis, Inc., 2000-2009 28 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders

Pagina 202

280 Copyright © Acronis, Inc., 2000-2009 6.10.3.1. Setting up a display mode For a machine booted from media, a display video mode is detected aut

Pagina 203 - Task details

Copyright © Acronis, Inc., 2000-2009 281 6. Click OK. 6.10.4. List of commands and utilities available in Linux-based bootable media Linux-based

Pagina 204 - Settings

282 Copyright © Acronis, Inc., 2000-2009 fxload mount tar gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart

Pagina 205 - Backup plan details

Copyright © Acronis, Inc., 2000-2009 283 3. In the management console, click Recover. Under the archive contents, Acronis Backup & Recovery 10

Pagina 206 - 6.1.3. Log

284 Copyright © Acronis, Inc., 2000-2009 (Do not reboot the machine at this point. Otherwise, you will have to create the volume structure again.)

Pagina 207 - • Click View Details

Copyright © Acronis, Inc., 2000-2009 285 lvm vgdisplay The output of the lvm vgdisplay command will contain lines similar to the following: --- Vol

Pagina 208 - 6.1.3.3. Log entry details

286 Copyright © Acronis, Inc., 2000-2009 The output will contain lines similar to the following: Num Idx Partition Flags Start Size Type ----

Pagina 209 - 6.2. Creating a backup plan

Copyright © Acronis, Inc., 2000-2009 287 3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation.

Pagina 210 - Convert to VM

288 Copyright © Acronis, Inc., 2000-2009 6.10.6.4. Work across subnets To enable the Acronis PXE Server to work in another subnet (across the swit

Pagina 211 - To specify credentials

Copyright © Acronis, Inc., 2000-2009 289 Running Acronis Disk Director Lite under Windows If you run Acronis Backup & Recovery 10 Management Co

Pagina 212 - 6.2.3. Source type

Copyright © Acronis, Inc., 2000-2009 29 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Pagina 213 - 6.2.4. Items to back up

290 Copyright © Acronis, Inc., 2000-2009 • From the volume or disk context menu (both in the table and the graphic panel) • From the Disk managem

Pagina 214

Copyright © Acronis, Inc., 2000-2009 291 3. In the window, you will be able to set the disk partitioning scheme (MBR or GPT) and the disk type (ba

Pagina 215 - 6.2.6. Exclusions

292 Copyright © Acronis, Inc., 2000-2009 But with the wide range of available hardware it is normal that the target disk would differ in size from

Pagina 216 - 6.2.7. Archive

Copyright © Acronis, Inc., 2000-2009 293 4. Wait until the task is finished. 5. Wait until the machine is turned off. 6. Disconnect either the s

Pagina 217 - 3. Naming the new archive

294 Copyright © Acronis, Inc., 2000-2009 6.11.5.4. Disk conversion: GPT to MBR If you plan to install an OS that does not support GPT disks, conve

Pagina 218 - 6.2.9. Backup schemes

Copyright © Acronis, Inc., 2000-2009 295 1. There is a single Windows 2008/Vista operating system installed on the disk. 2. The machine runs this

Pagina 219 - 6.2.9.3. Simple scheme

296 Copyright © Acronis, Inc., 2000-2009 • in multiboot systems, bootability of a system that was offline during the operation 6.11.5.7. Changin

Pagina 220 - Description

Copyright © Acronis, Inc., 2000-2009 297 • Install a new operating system (or swap file) on a new volume; • Add new hardware to a machine. In Acr

Pagina 221

298 Copyright © Acronis, Inc., 2000-2009 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to-volume siz

Pagina 222

Copyright © Acronis, Inc., 2000-2009 299 To create a Striped volume: o Select two or more destination disks to create the volume on. To create a R

Pagina 223 - At a glance

Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Backu

Pagina 224 - Roll-back period

30 Copyright © Acronis, Inc., 2000-2009 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Pagina 225

300 Copyright © Acronis, Inc., 2000-2009 In setting the cluster size you can choose between any number in the preset amount for each file system.

Pagina 226

Copyright © Acronis, Inc., 2000-2009 301 6.11.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volu

Pagina 227

302 Copyright © Acronis, Inc., 2000-2009 6.11.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volum

Pagina 228 - 6.2.10. Archive validation

Copyright © Acronis, Inc., 2000-2009 303 The new volume structure will be graphically represented in the Disk management view. If you set a 64K clu

Pagina 229

Copyright © Acronis, Inc., 2000-2009 304 7. Centralized management This section covers operations that can be performed centrally by using the co

Pagina 230 - 6.3. Recovering data

Copyright © Acronis, Inc., 2000-2009 305 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has l

Pagina 231 - What to recover

306 Copyright © Acronis, Inc., 2000-2009 Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recover

Pagina 232 - Recovery options

Copyright © Acronis, Inc., 2000-2009 307 • Use the Information pane's tabs to view detailed information about the selected policy and perfor

Pagina 233 - 6.3.2. Archive selection

308 Copyright © Acronis, Inc., 2000-2009 o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select a

Pagina 234 - 6.3.4. Content selection

Copyright © Acronis, Inc., 2000-2009 309 To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is de

Pagina 235 - 6.3.4.2. Files selection

Copyright © Acronis, Inc., 2000-2009 31 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Pagina 236 - 6.3.6.1. Disks

310 Copyright © Acronis, Inc., 2000-2009 The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and

Pagina 237 - 6.3.6.2. Volumes

Copyright © Acronis, Inc., 2000-2009 311 Settings The tab displays information about the backup scheme used by the policy and backup options that w

Pagina 238 - Recover to:

312 Copyright © Acronis, Inc., 2000-2009 The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a

Pagina 239 - Volume properties

Copyright © Acronis, Inc., 2000-2009 313 7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or i

Pagina 240

314 Copyright © Acronis, Inc., 2000-2009 Add a machine to another static group Click Add to another group. In the Add to group (p. 317) window, sp

Pagina 241 - 6.3.6.5. File destination

Copyright © Acronis, Inc., 2000-2009 315 View tasks existing on a machine Click View tasks. The Tasks (p. 337) view will display a list of the tas

Pagina 242 - Exclusions

316 Copyright © Acronis, Inc., 2000-2009 To perform registration through a local or remote console-agent connection, you have to be connected with

Pagina 243 - 6.3.9. Universal Restore

Copyright © Acronis, Inc., 2000-2009 317 A registered machine has to be specified by its registration address, that is, you need to provide exactly

Pagina 244 - Universal Restore settings

318 Copyright © Acronis, Inc., 2000-2009 The machine being added becomes a member of more than one group. As a result, the backup policies applied

Pagina 245

Copyright © Acronis, Inc., 2000-2009 319 o Online - the machine is available for the management server. This means that the management server&ap

Pagina 246

32 Copyright © Acronis, Inc., 2000-2009 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Pagina 247

320 Copyright © Acronis, Inc., 2000-2009 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the

Pagina 248

Copyright © Acronis, Inc., 2000-2009 321 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Pagina 249 - Windows Vista/2008

322 Copyright © Acronis, Inc., 2000-2009 • Task belongs to a backup plan Only tasks that do not belong to a backup plan, such as a recovery task,

Pagina 250

Copyright © Acronis, Inc., 2000-2009 323 To Do View details of a group Click View details. You will be taken to the Group details window, where y

Pagina 251

324 Copyright © Acronis, Inc., 2000-2009 Filter machines by name. Type a machine's name in the field below the corresponding column's he

Pagina 252 - When to validate

Copyright © Acronis, Inc., 2000-2009 325 Move one custom group to another Click Move to. In the Move to group (p. 327) window, specify a group tha

Pagina 253 - 6.4.2. Archive selection

326 Copyright © Acronis, Inc., 2000-2009 a) All the entries of the same criteria are combined by logical addition (OR). For example, the following

Pagina 254 - 6.4.4. Location selection

Copyright © Acronis, Inc., 2000-2009 327 If you later modify the file, the contents of the group will change accordingly. The file is checked every

Pagina 255 - 6.5. Mounting an image

328 Copyright © Acronis, Inc., 2000-2009 This information is also duplicated in the Information panel. Group Displays the following information on

Pagina 256 - 6.5.1. Archive selection

Copyright © Acronis, Inc., 2000-2009 329 The following example illustrates how the policy that is applied on the group through inheritance is displ

Pagina 257 - 6.5.3. Access credentials

Copyright © Acronis, Inc., 2000-2009 33 • Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot

Pagina 258 - 6.6. Managing mounted images

330 Copyright © Acronis, Inc., 2000-2009 o Deploy the agent (p. 331) to the ESX/ESXi server or o Install and configure the agent manually as desc

Pagina 259 - Unmounting images

Copyright © Acronis, Inc., 2000-2009 331 You can create both static and dynamic groups of virtual machines. Any virtual machine that is currently a

Pagina 260

332 Copyright © Acronis, Inc., 2000-2009 Password for remote connection to the agent: The management server will use this password to establish a t

Pagina 261 - 6.7.1. Task credentials

Copyright © Acronis, Inc., 2000-2009 333 What happens when you remove an agent The virtual appliance that contains the agent will be deleted from t

Pagina 262 - 6.7.2. Archive selection

334 Copyright © Acronis, Inc., 2000-2009 • drastically reduce backup traffic and storage space taken by the archives by using deduplication (p. 77

Pagina 263 - 6.7.5. Location selection

Copyright © Acronis, Inc., 2000-2009 335 To Do Add a storage node to the management server Click Add. In the Add storage node (p. 336) window, sp

Pagina 264

336 Copyright © Acronis, Inc., 2000-2009 Adding a storage node To add a storage node 1. In the IP/Name field, enter the name or the IP address of

Pagina 265 - 6.8. Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2009 337 Vaults This tab displays a list of the vaults, managed by the storage node. To open a managed vault for de

Pagina 266

338 Copyright © Acronis, Inc., 2000-2009 The Log (p. 339) view will display a list of the log entries related to the selected task. Run a task Clic

Pagina 267

Copyright © Acronis, Inc., 2000-2009 339 Refresh tasks table Click Refresh. The management console will update the list of tasks existing on the m

Pagina 268

34 Copyright © Acronis, Inc., 2000-2009 Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When c

Pagina 269 - Do not activate

340 Copyright © Acronis, Inc., 2000-2009 Local event log A local event log holds information about Acronis Backup & Recovery 10 operations on a

Pagina 270 - 6.10. Bootable media

Copyright © Acronis, Inc., 2000-2009 341 7.1.7.1. Actions on log entries All the operations described below are performed by clicking the correspo

Pagina 271 - PE-based bootable media

342 Copyright © Acronis, Inc., 2000-2009 Filter log entries by type Press or release the following toolbar buttons: to filter error messages to f

Pagina 272 - Using Bart PE

Copyright © Acronis, Inc., 2000-2009 343 • Code - Blank or the program error code if the event type is error. Error code is an integer number that

Pagina 273 - Kernel parameters

344 Copyright © Acronis, Inc., 2000-2009 Generating reports To start generating a report, select a report template in the Reports view, and then cl

Pagina 274 - Network settings

Copyright © Acronis, Inc., 2000-2009 345 Filters Under Filters, choose which backup policies to include in the report. Only the backup policies th

Pagina 275 - Network port

346 Copyright © Acronis, Inc., 2000-2009 Report view Under Report view, choose how the report will look: • Select whether to show all items in a s

Pagina 276

Copyright © Acronis, Inc., 2000-2009 347 • Vaults: The list of centralized managed vaults that store the archives. • Machines: The list of regist

Pagina 277 - 2.0 is 512MB

348 Copyright © Acronis, Inc., 2000-2009 7.1.8.7. Report about the task activities In this view, you can generate a report about the tasks that ex

Pagina 278

Copyright © Acronis, Inc., 2000-2009 349 To allow active content permanently in Internet Explorer 1. On the Tools menu, click Internet Options, an

Pagina 279

Copyright © Acronis, Inc., 2000-2009 35 Full backup A full backup stores all data selected for backup. A full backup underlies any archive and form

Pagina 280 - To add an NDAS device

350 Copyright © Acronis, Inc., 2000-2009 To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32

Pagina 281 - Linux commands and utilities

Copyright © Acronis, Inc., 2000-2009 351 Possible values: Any integer number between 1 and 2147483647 Default value: 10 Acronis Backup & Recove

Pagina 282

352 Copyright © Acronis, Inc., 2000-2009 For example, suppose that two vaults, Vault A and Vault B, are both stored on a disk volume. Suppose furth

Pagina 283

Copyright © Acronis, Inc., 2000-2009 353 The database is stored on the storage node in a local folder whose name is specified in Database path when

Pagina 284

354 Copyright © Acronis, Inc., 2000-2009 Trace State Description: Specifies whether to record Acronis Backup & Recovery 10 Management Server&ap

Pagina 285 - Mounting backup volumes

Copyright © Acronis, Inc., 2000-2009 355 Synchronization Specifies how Acronis Backup & Recovery 10 Management Server connects to registered ma

Pagina 286 - 6.10.6. Acronis PXE Server

356 Copyright © Acronis, Inc., 2000-2009 If there are fewer worker threads than normal-priority machines, the actual interval between synchronizati

Pagina 287

Copyright © Acronis, Inc., 2000-2009 357 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att

Pagina 288 - 6.11. Disk management

358 Copyright © Acronis, Inc., 2000-2009 Snapshot Storage Relative Size This setting is effective only when the Snapshot Storage Absolute Size sett

Pagina 289 - Starting the operations

Copyright © Acronis, Inc., 2000-2009 359 Maximum Time Without License Server, as counted from the moment of installation or from the last successfu

Pagina 290 - 6.11.5. Disk operations

36 Copyright © Acronis, Inc., 2000-2009 An incremental or differential backup created after disk defragmentation might be considerably larger than

Pagina 291

360 Copyright © Acronis, Inc., 2000-2009 Description: Specifies the minimum level of severity of events to be recorded into the event log. Only eve

Pagina 292 - Using advanced options

Copyright © Acronis, Inc., 2000-2009 361 This parameter is used when creating a backup plan. Changes to this parameter do not affect already exist

Pagina 293

362 Copyright © Acronis, Inc., 2000-2009 Select one of the following: Not Configured The component will use the default TCP port number 9876. Enabl

Pagina 294 - System disk conversion

Copyright © Acronis, Inc., 2000-2009 363 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S

Pagina 295

364 Copyright © Acronis, Inc., 2000-2009 Each event has a level from zero to five based on the event's severity, as shown in the following tab

Pagina 296 - 6.11.6. Volume operations

Copyright © Acronis, Inc., 2000-2009 365 You will find the description of these parameters in the correspondent topic about configuration through t

Pagina 297 - Types of dynamic volumes

366 Copyright © Acronis, Inc., 2000-2009 General Policy name [Optional] Enter a unique name for the backup policy. A conscious name lets you identi

Pagina 298 - Select destination disks

Copyright © Acronis, Inc., 2000-2009 367 Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, create a custo

Pagina 299 - Set the volume options

368 Copyright © Acronis, Inc., 2000-2009 Storage (p. 229) Choose the storage on the virtualization server or the folder to place the virtual machin

Pagina 300 - 6.11.6.2. Delete volume

Copyright © Acronis, Inc., 2000-2009 369 7.3.2.1. Volumes to back up selection rules Define volume selection rules, according to which the volumes

Pagina 301 - 6.11.6.3. Set active volume

Copyright © Acronis, Inc., 2000-2009 37 GFS-related settings of the backup plan Start backup at: Back up on: This step creates the total backup sch

Pagina 302 - 6.11.6.6. Format volume

370 Copyright © Acronis, Inc., 2000-2009 First partition on the first SCSI hard disk of a Linux machine Type or select: /dev/sda1 sda1 is the stan

Pagina 303 - 6.11.7. Pending operations

Copyright © Acronis, Inc., 2000-2009 371 /dev/hda2, and /dev/hda3, respectively. To perform a disk backup of the, say, third partition, one can typ

Pagina 304 - 7. Centralized management

372 Copyright © Acronis, Inc., 2000-2009 Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, th

Pagina 305

Copyright © Acronis, Inc., 2000-2009 373 The root user's home directory /root Directory for all user-related programs /usr Directory for syste

Pagina 306 - 7.1.2. Backup policies

374 Copyright © Acronis, Inc., 2000-2009 You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero

Pagina 307

Copyright © Acronis, Inc., 2000-2009 375 The program generates a common name for the new archives and displays it in the Name field. The name looks

Pagina 308

376 Copyright © Acronis, Inc., 2000-2009 7.3.7. Backup scheme selection Choose one of the available backup schemes: • Back up now – to create a

Pagina 309 - Machines selection

Copyright © Acronis, Inc., 2000-2009 377 7.3.7.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up da

Pagina 310 - 7.1.2.4. Policy details

378 Copyright © Acronis, Inc., 2000-2009 • Daily ("Son") backups are incremental. Parameters You can set up the following parameters of

Pagina 311 - 7.1.3. Physical machines

Copyright © Acronis, Inc., 2000-2009 379 Backup scheme parameters can then be set up as follows. • Start backup at: 11:00 PM • Back up on: All da

Pagina 312

38 Copyright © Acronis, Inc., 2000-2009 Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays a

Pagina 313 - Grouping actions

380 Copyright © Acronis, Inc., 2000-2009 • Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (dail

Pagina 314 - Other actions

Copyright © Acronis, Inc., 2000-2009 381 • One backup of each level is stored at a time • Higher density of more recent backups Parameters You ca

Pagina 315 - • installing the agent

382 Copyright © Acronis, Inc., 2000-2009 Roll-back period The number of days we can go back in the archive is different on different days. The mini

Pagina 316 - Text file requirements

Copyright © Acronis, Inc., 2000-2009 383 7.3.7.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C

Pagina 317

384 Copyright © Acronis, Inc., 2000-2009 backup for some reason. Apply the rules (only if the retention rules are set) Specifies when to apply the

Pagina 318 - Machine details

Copyright © Acronis, Inc., 2000-2009 385 Incremental: Schedule: Weekly, every workday, at 7:00 PM Differential: Schedule: Weekly, every Saturday, a

Pagina 319

386 Copyright © Acronis, Inc., 2000-2009 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks

Pagina 320 - Plans and tasks

Copyright © Acronis, Inc., 2000-2009 387 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Pagina 321

388 Copyright © Acronis, Inc., 2000-2009 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and

Pagina 322

Copyright © Acronis, Inc., 2000-2009 389 Backup options Configuration parameters of a backup operation (p. 388), such as pre/post backup commands

Pagina 323 - Inheritance order

Copyright © Acronis, Inc., 2000-2009 39 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Pagina 324 - 7.1.3.2. Actions on groups

390 Copyright © Acronis, Inc., 2000-2009 3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 388) inst

Pagina 325 - Adding multiple criteria

Copyright © Acronis, Inc., 2000-2009 391 A management server has two built-in groups that contain all machines of each type: All physical machines

Pagina 326

392 Copyright © Acronis, Inc., 2000-2009 On a machine that is not registered on the management server, a user having the privilege to back up to th

Pagina 327 - Group details

Copyright © Acronis, Inc., 2000-2009 393 Differential backup A differential backup stores changes to the data against the latest full backup (p.

Pagina 328

394 Copyright © Acronis, Inc., 2000-2009 and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the

Pagina 329 - 7.1.4. Virtual machines

Copyright © Acronis, Inc., 2000-2009 395 • IP address range. A machine remains in a dynamic group as long as the machine meets the group's cr

Pagina 330 - Grouping of virtual machines

396 Copyright © Acronis, Inc., 2000-2009 F Full backup A self-sufficient backup (p. 388) containing all data chosen for backup. You do not need ac

Pagina 331 - • Host/VA

Copyright © Acronis, Inc., 2000-2009 397 Managed vault A centralized vault (p. 391) managed by a storage node (p. 398). Archives (p. 388) in a mana

Pagina 332

398 Copyright © Acronis, Inc., 2000-2009 Plan See Backup plan (p. 389). Policy See Backup policy (p. 389). R Recovery point Date and time to whic

Pagina 333 - 7.1.5. Storage nodes

Copyright © Acronis, Inc., 2000-2009 399 • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Pagina 334 - • Information panel

2.14.6. Deduplication ...

Pagina 335

40 Copyright © Acronis, Inc., 2000-2009 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at

Pagina 336 - Adding a storage node

400 Copyright © Acronis, Inc., 2000-2009 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolo

Pagina 337 - 7.1.6. Tasks

Copyright © Acronis, Inc., 2000-2009 401 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 396) is considered vi

Pagina 338

Index A A policy on a machine or a group • 70 About Windows loaders • 249 Access credentials • 256, 257 Access credentials for archive location • 20

Pagina 339 - 7.1.7. Log

Copyright © Acronis, Inc., 2000-2009 403 Archive protection • 106, 108 Archive selection • 231, 233, 252, 253, 256, 261, 262 Archive validation • 2

Pagina 340

404 Copyright © Acronis, Inc., 2000-2009 Client and server applications • 89 Cloning method and advanced options • 291 Collecting system informatio

Pagina 341

Copyright © Acronis, Inc., 2000-2009 405 Disk group • 45, 393, 395 Disk initialization • 290 Disk management • 47, 231, 288 Disk operations • 290 D

Pagina 342 - Configuring the log table

406 Copyright © Acronis, Inc., 2000-2009 How to reactivate GRUB and change its configuration • 247 I Image • 396 Importing machines from a text fil

Pagina 343 - 7.1.8. Reporting

Copyright © Acronis, Inc., 2000-2009 407 Network port configuration • 91, 93 Network settings • 272, 274 Notifications • 117, 132 NT signature • 23

Pagina 344 - Report view

408 Copyright © Acronis, Inc., 2000-2009 Recovery priority • 129, 132 Registered machine • 97, 391, 397, 398 Registration • 21, 61, 66, 102, 311, 3

Pagina 345

Copyright © Acronis, Inc., 2000-2009 409 Tape planning • 155, 167 Example 1 • 168 Example 2 • 168 Tape rotation • 147, 155 Tape support • 54, 107,

Pagina 346

Copyright © Acronis, Inc., 2000-2009 41 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Pagina 347 - Report coverage

410 Copyright © Acronis, Inc., 2000-2009 Volume destination • 236, 238, 239 Volume operations • 296 Volume properties • 238, 239 Volume selection •

Pagina 348 - 7.1.8.9. Report view

42 Copyright © Acronis, Inc., 2000-2009 • differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern start

Pagina 349

Copyright © Acronis, Inc., 2000-2009 43 to this interval and deletes all backups created before that moment. None of the backups created after this

Pagina 350

44 Copyright © Acronis, Inc., 2000-2009 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Pagina 351

Copyright © Acronis, Inc., 2000-2009 45 This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you s

Pagina 352

46 Copyright © Acronis, Inc., 2000-2009 Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volume

Pagina 353

Copyright © Acronis, Inc., 2000-2009 47 Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynam

Pagina 354

48 Copyright © Acronis, Inc., 2000-2009 You can back up data of one or more logical volumes and recover it to a previously created logical volume o

Pagina 355

Copyright © Acronis, Inc., 2000-2009 49 3-1 hdd1 Pri,Act 63 1219617 Ext3 3-2 Acronis Secure Zone Pri 12196

Pagina 356

6. Direct management ... 193 6.1. Administering a managed

Pagina 357

50 Copyright © Acronis, Inc., 2000-2009 The system has RAID-1 configured on two basic volumes: sdc1, sdd1. Num Partition Flags St

Pagina 358

Copyright © Acronis, Inc., 2000-2009 51 Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a

Pagina 359

52 Copyright © Acronis, Inc., 2000-2009 same machine. You will be able to use different backup strategies for the virtual disk and the physical sto

Pagina 360

Copyright © Acronis, Inc., 2000-2009 53 retain the LDM/LVM. To do so, you will have to boot the target virtual machine using bootable media (p. 390

Pagina 361 - Connection parameters

54 Copyright © Acronis, Inc., 2000-2009 2.12. Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tap

Pagina 362

Copyright © Acronis, Inc., 2000-2009 55 Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7

Pagina 363 - Event tracing parameters

56 Copyright © Acronis, Inc., 2000-2009 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont

Pagina 364

Copyright © Acronis, Inc., 2000-2009 57 With the new Acronis Secure Zone behavior, you obtain the ability to: • list archives located in the zone

Pagina 365 - When to modify

58 Copyright © Acronis, Inc., 2000-2009 2.13.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recove

Pagina 366 - Where to back up

Copyright © Acronis, Inc., 2000-2009 59 Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardwa

Pagina 367

6.8.1. Creating Acronis Secure Zone ...

Pagina 368 - 7.3.2. Items to back up

60 Copyright © Acronis, Inc., 2000-2009 Limitation The only supported archive location is a local drive, or more precisely, any device available th

Pagina 369

Copyright © Acronis, Inc., 2000-2009 61 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Resto

Pagina 370

62 Copyright © Acronis, Inc., 2000-2009 Since you connect the console to the management server rather than to each machine and perform all manageme

Pagina 371

Copyright © Acronis, Inc., 2000-2009 63 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi

Pagina 372

64 Copyright © Acronis, Inc., 2000-2009 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor

Pagina 373 - 7.3.4. Exclusions

Copyright © Acronis, Inc., 2000-2009 65 3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of

Pagina 374 - 7.3.5. Archive

66 Copyright © Acronis, Inc., 2000-2009 2.14.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flex

Pagina 375

Copyright © Acronis, Inc., 2000-2009 67 • Active Directory organization unit (OU) • IP address range. Multiple criteria can be specified for a dy

Pagina 376 - 7.3.7.1. Back up now scheme

68 Copyright © Acronis, Inc., 2000-2009 3, 4, 5, 6 - the salesmen's machines (Windows XP) from the "Sales department" AD organizatio

Pagina 377 - 7.3.7.3. Simple scheme

Copyright © Acronis, Inc., 2000-2009 69 • edit a group, that is: o change the group name o change the group description o change the dynamic m

Pagina 378

Copyright © Acronis, Inc., 2000-2009 7 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A

Pagina 379

70 Copyright © Acronis, Inc., 2000-2009 management server tracks and displays personal statuses for each machine that it works with, as well as the

Pagina 380

Copyright © Acronis, Inc., 2000-2009 71 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.14.

Pagina 381

72 Copyright © Acronis, Inc., 2000-2009 2.14.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machi

Pagina 382

Copyright © Acronis, Inc., 2000-2009 73 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is

Pagina 383

74 Copyright © Acronis, Inc., 2000-2009 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited

Pagina 384

Copyright © Acronis, Inc., 2000-2009 75 You may change grouping conditions or the machine may change its properties so that the machine leaves one

Pagina 385 - Resulting tasks

76 Copyright © Acronis, Inc., 2000-2009 Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is

Pagina 386 - 7.3.8. Archive validation

Copyright © Acronis, Inc., 2000-2009 77 "Deploying, Deployed". When the deployment completes on both machines, the state will be "De

Pagina 387 - Glossary

78 Copyright © Acronis, Inc., 2000-2009 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a du

Pagina 388

Copyright © Acronis, Inc., 2000-2009 79 Before sending the item to the vault, the agent queries the deduplication database to determine whether the

Pagina 389 - Backup policy (Policy)

8 Copyright © Acronis, Inc., 2000-2009 • Redesigned GUI Dashboard for quick operational decision making Overview of all configured and running op

Pagina 390 - Built-in group

80 Copyright © Acronis, Inc., 2000-2009 • When performing incremental backups of data that does not change itself, but changes its location. Such

Pagina 391 - Centralized vault

Copyright © Acronis, Inc., 2000-2009 81 What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previou

Pagina 392 - Deduplication

82 Copyright © Acronis, Inc., 2000-2009 • If you protected the archive with a password Files that were not deduplicated are stored in the archive

Pagina 393 - Disk group

Copyright © Acronis, Inc., 2000-2009 83 2.14.7.2. Privileges for local connection Windows Local connection on a machine running Windows can be est

Pagina 394 - Dynamic group

84 Copyright © Acronis, Inc., 2000-2009 2.14.7.4. Privileges for remote connection in Linux Remote connections to a machine running Linux—includin

Pagina 395 - Encrypted vault

Copyright © Acronis, Inc., 2000-2009 85 Example 2 The above authentication policy might not work on Linux distributions with kernel version 2.4—inc

Pagina 396

86 Copyright © Acronis, Inc., 2000-2009 Management Console; they have the same management rights on the registered machines as users with administr

Pagina 397 - Physical machine

Copyright © Acronis, Inc., 2000-2009 87 A regular user, such as a member of the Users group on the storage node, can: • Create archives in any cen

Pagina 398

88 Copyright © Acronis, Inc., 2000-2009 2.14.7.8. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Back

Pagina 399 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2009 89 2.14.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acron

Pagina 400 - Validation rules

Copyright © Acronis, Inc., 2000-2009 9 To start with centralized management: 1. Install Acronis Backup & Recovery 10 Management Server (p. 20)

Pagina 401 - Virtual machine

90 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node

Pagina 402

Copyright © Acronis, Inc., 2000-2009 91 Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disable

Pagina 403

92 Copyright © Acronis, Inc., 2000-2009 Always use The use of SSL certificates is enabled. The connection will be established only if the use of SS

Pagina 404

Copyright © Acronis, Inc., 2000-2009 93 2.14.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network

Pagina 405

94 Copyright © Acronis, Inc., 2000-2009 In Windows, the certificate path and the server certificate's file name are specified in the registry

Pagina 406

Copyright © Acronis, Inc., 2000-2009 95 Non-self-signed certificates You have the option to use trusted third-party certificates or certificates cr

Pagina 407

Copyright © Acronis, Inc., 2000-2009 96 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph

Pagina 408

Copyright © Acronis, Inc., 2000-2009 97 The option defines whether to display the pop-up messages about task run results: successful completion, fa

Pagina 409

98 Copyright © Acronis, Inc., 2000-2009 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem

Pagina 410

Copyright © Acronis, Inc., 2000-2009 99 entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the

Comentarios a estos manuales

Sin comentarios