User's Guide Acronis® Backup & Recovery 10™ Advanced Server Virtual Edition
10 Copyright © Acronis, Inc., 2000-2009 The advanced way of centralized management To make the best use of the centralized management capabilities
100 Copyright © Acronis, Inc., 2000-2009 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the app
Copyright © Acronis, Inc., 2000-2009 101 b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is install
102 Copyright © Acronis, Inc., 2000-2009 On the vCenter Server side When integration is enabled, the vCenter Server will store and show information
Copyright © Acronis, Inc., 2000-2009 103 3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the m
104 Copyright © Acronis, Inc., 2000-2009 The option defines whether the agent(s) operating on the managed machine have to send the log events to th
Copyright © Acronis, Inc., 2000-2009 105 5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operat
106 Copyright © Acronis, Inc., 2000-2009 • The type of the data being backed up (disk, file) • The backup destination (networked location or loca
Copyright © Acronis, Inc., 2000-2009 107 Media components (p. 121) Dest: removable media Dest: removable media Dest: removable media Dest: removabl
108 Copyright © Acronis, Inc., 2000-2009 SNMP (p. 119) + + + + - - 3.4.1.1. Archive protection This option is effective for Windows and Linu
Copyright © Acronis, Inc., 2000-2009 109 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of i
Copyright © Acronis, Inc., 2000-2009 11 Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace
110 Copyright © Acronis, Inc., 2000-2009 • copy an archive to another location after the backup ends. The program does not support interactive com
Copyright © Acronis, Inc., 2000-2009 111 Post-backup command To specify a command/executable file to be executed after the backup is completed 1.
112 Copyright © Acronis, Inc., 2000-2009 o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture c
Copyright © Acronis, Inc., 2000-2009 113 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do n
114 Copyright © Acronis, Inc., 2000-2009 The option determines whether to take snapshots of multiple volumes at the same time or one by one. The pr
Copyright © Acronis, Inc., 2000-2009 115 3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable
116 Copyright © Acronis, Inc., 2000-2009 • Normal – to run the backup process with normal speed, allocating resources on a par with other processe
Copyright © Acronis, Inc., 2000-2009 117 3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about ba
118 Copyright © Acronis, Inc., 2000-2009 • Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct.
Copyright © Acronis, Inc., 2000-2009 119 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one
12 Copyright © Acronis, Inc., 2000-2009 Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on wheth
120 Copyright © Acronis, Inc., 2000-2009 • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP man
Copyright © Acronis, Inc., 2000-2009 121 to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since
122 Copyright © Acronis, Inc., 2000-2009 Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is t
Copyright © Acronis, Inc., 2000-2009 123 the data will be backed up and you will be able to mount the resulting disk backup and extract valid files
124 Copyright © Acronis, Inc., 2000-2009 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
Copyright © Acronis, Inc., 2000-2009 125 The program will try to execute the failed task again if you select the Restart a failed task check box an
126 Copyright © Acronis, Inc., 2000-2009 If the console is connected to the management server The Use a separate tape set option has more precise d
Copyright © Acronis, Inc., 2000-2009 127 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you
128 Copyright © Acronis, Inc., 2000-2009 When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup pro
Copyright © Acronis, Inc., 2000-2009 129 3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is
Copyright © Acronis, Inc., 2000-2009 13 the history of operations logged in the local logs of the registered machines and the storage nodes. Shortc
130 Copyright © Acronis, Inc., 2000-2009 Validate backup archive before recovery + + + + + + Check file system after recovery + - + - + -
Copyright © Acronis, Inc., 2000-2009 131 Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1.
132 Copyright © Acronis, Inc., 2000-2009 3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This op
Copyright © Acronis, Inc., 2000-2009 133 The preset is: Disabled. To configure e-mail notification 1. Select the Send e-mail notifications check b
134 Copyright © Acronis, Inc., 2000-2009 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine
Copyright © Acronis, Inc., 2000-2009 135 SNMP notifications This option is effective for both Windows and Linux operating systems. This option is n
136 Copyright © Acronis, Inc., 2000-2009 Re-attempt, if an error occurs The preset is: Enabled. Number of attempts: 5. Interval between attempts: 3
Copyright © Acronis, Inc., 2000-2009 137 Reboot machine after recovery This option is effective when operating under bootable media. The preset is
Copyright © Acronis, Inc., 2000-2009 138 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault
Copyright © Acronis, Inc., 2000-2009 139 A vault is called personal if it was created using direct connection of the console to a managed machine.
14 Copyright © Acronis, Inc., 2000-2009 Actions Contains a list of common operations that can be performed on a managed machine or on a management
140 Copyright © Acronis, Inc., 2000-2009 Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the mach
Copyright © Acronis, Inc., 2000-2009 141 • [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contain
142 Copyright © Acronis, Inc., 2000-2009 password (if the vault is encrypted) and information in the Comments field. • The Edit unmanaged vault pa
Copyright © Acronis, Inc., 2000-2009 143 4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the followin
144 Copyright © Acronis, Inc., 2000-2009 o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o
Copyright © Acronis, Inc., 2000-2009 145 o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm w
146 Copyright © Acronis, Inc., 2000-2009 To create a new folder for the vault, click Create folder. A vault can be created in an empty folder onl
Copyright © Acronis, Inc., 2000-2009 147 4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acroni
148 Copyright © Acronis, Inc., 2000-2009 If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by sof
Copyright © Acronis, Inc., 2000-2009 149 If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to
Copyright © Acronis, Inc., 2000-2009 15 The management console "remembers" the way the panes' borders are set. When you run the mana
150 Copyright © Acronis, Inc., 2000-2009 Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted,
Copyright © Acronis, Inc., 2000-2009 151 At the Delete operation, the vault content will be deleted from the storage node database without accessin
152 Copyright © Acronis, Inc., 2000-2009 The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction w
Copyright © Acronis, Inc., 2000-2009 153 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage
154 Copyright © Acronis, Inc., 2000-2009 Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the
Copyright © Acronis, Inc., 2000-2009 155 • Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape,
156 Copyright © Acronis, Inc., 2000-2009 Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes
Copyright © Acronis, Inc., 2000-2009 157 • the full size of the data to protect is approximately 320 GB • the approximate size of daily changes o
158 Copyright © Acronis, Inc., 2000-2009 • GFS Example 3 (p. 162). The Use a separate tape set option is selected. All the Always use a free tape
Copyright © Acronis, Inc., 2000-2009 159 • four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of
16 Copyright © Acronis, Inc., 2000-2009 o By clicking in the items in the [Item's name] Actions bar (on the Actions and Tools pane); o By
160 Copyright © Acronis, Inc., 2000-2009 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the
Copyright © Acronis, Inc., 2000-2009 161 GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set opti
162 Copyright © Acronis, Inc., 2000-2009 As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the sec
Copyright © Acronis, Inc., 2000-2009 163 These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of
164 Copyright © Acronis, Inc., 2000-2009 go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it
Copyright © Acronis, Inc., 2000-2009 165 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac
166 Copyright © Acronis, Inc., 2000-2009 The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options.
Copyright © Acronis, Inc., 2000-2009 167 The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the
168 Copyright © Acronis, Inc., 2000-2009 • tape rotation scheme ( frequency of backups, retention rules) • tape-append options • requirements to
Copyright © Acronis, Inc., 2000-2009 169 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compress
Copyright © Acronis, Inc., 2000-2009 17 Action page - Controls Acronis Backup & Recovery 10 remembers the changes you made on the action pages
170 Copyright © Acronis, Inc., 2000-2009 • What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis age
Copyright © Acronis, Inc., 2000-2009 171 name. If you accidentally delete the .meta folder, it will be automatically recreated next time you acces
172 Copyright © Acronis, Inc., 2000-2009 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplica
Copyright © Acronis, Inc., 2000-2009 173 4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the
174 Copyright © Acronis, Inc., 2000-2009 All the operations described below are performed by clicking the corresponding buttons on the toolbar. The
Copyright © Acronis, Inc., 2000-2009 175 Recover a disk/volume as a virtual machine Right-click the disk backup, then select Recover as virtual mac
176 Copyright © Acronis, Inc., 2000-2009 There should be enough space in the vault for temporary files created during consolidation. Backups result
Copyright © Acronis, Inc., 2000-2009 177 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
178 Copyright © Acronis, Inc., 2000-2009 The specified period of time has passed since the last successful backup completed + + The scheduler beha
Copyright © Acronis, Inc., 2000-2009 179 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters a
18 Copyright © Acronis, Inc., 2000-2009 Console The console provides Graphical User Interface and remote connection to the agents and other Acroni
180 Copyright © Acronis, Inc., 2000-2009 The obvious way is to add five simple schedules. If you spend one minute for examination, you can think ou
Copyright © Acronis, Inc., 2000-2009 181 Advanced scheduling settings (p. 187) are available only for machines registered on Acronis Backup & R
182 Copyright © Acronis, Inc., 2000-2009 In the case when the task needs to be run on different days of the weeks with different time intervals, co
Copyright © Acronis, Inc., 2000-2009 183 Months: <...> Select a certain month(s) you want to run the task in. Days: <...> Select spe
184 Copyright © Acronis, Inc., 2000-2009 The schedule's parameters are set up as follows. 1. Months: September, October, November. 2. On: &l
Copyright © Acronis, Inc., 2000-2009 185 Third schedule 1. Months: June, July, August. 2. Days: 1, 15. 3. Once at: 10:00:00 PM. 4. Effective: F
186 Copyright © Acronis, Inc., 2000-2009 When Windows detects a bad block on a hard disk, it records an event with the event source disk and the ev
Copyright © Acronis, Inc., 2000-2009 187 3. In the Event Properties dialog box, view the event's properties such as the event source, shown i
188 Copyright © Acronis, Inc., 2000-2009 First machine: Every day at 09:30:03 AM Second machine: Every day at 09:00:00 AM Third machine: Every day
Copyright © Acronis, Inc., 2000-2009 189 • backup task start time matters - skip the backup task if the conditions are not met at the time when th
Copyright © Acronis, Inc., 2000-2009 19 1.3.1.2. Deduplication This add-on enables the agent to back up data to deduplicating vaults managed by Ac
190 Copyright © Acronis, Inc., 2000-2009 Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location&ap
Copyright © Acronis, Inc., 2000-2009 191 For example: • Event: Daily, Every 1 day(s); Once at 03:00:00 PM. • Condition: Fits time interval, from
192 Copyright © Acronis, Inc., 2000-2009 • Condition: Time since last backup, Time since the last backup: 12 hour(s). • Task start conditions: Wa
Copyright © Acronis, Inc., 2000-2009 193 6. Direct management This section covers operations that can be performed directly on a managed machine b
194 Copyright © Acronis, Inc., 2000-2009 server and run Acronis License Server to manage licenses. Please make sure you have a valid license on Acr
Copyright © Acronis, Inc., 2000-2009 195 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared i
196 Copyright © Acronis, Inc., 2000-2009 unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 202) s
Copyright © Acronis, Inc., 2000-2009 197 Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup pl
198 Copyright © Acronis, Inc., 2000-2009 A task may also change to the Waiting state when the event specified by the schedule occurs but the condit
Copyright © Acronis, Inc., 2000-2009 199 • Edit the local plan to prevent its future failure in case a local plan has failed • Edit the backup po
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2009 can choose not to install the bootable components and perform operations that require reboot using bootable
200 Copyright © Acronis, Inc., 2000-2009 Run a plan/task Click Backup plan Run. In the Run Backup Plan (p. 203) window, select the task you need t
Copyright © Acronis, Inc., 2000-2009 201 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.
202 Copyright © Acronis, Inc., 2000-2009 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'
Copyright © Acronis, Inc., 2000-2009 203 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
204 Copyright © Acronis, Inc., 2000-2009 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover
Copyright © Acronis, Inc., 2000-2009 205 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The
206 Copyright © Acronis, Inc., 2000-2009 Settings The Settings tab displays the following information: • Backup scheme - the selected backup schem
Copyright © Acronis, Inc., 2000-2009 207 Select multiple log entries • non-contiguous: hold down CTRL and click the log entries one by one • cont
208 Copyright © Acronis, Inc., 2000-2009 Sort log entries by date and time Click the column's header to sort the log entries in ascending orde
Copyright © Acronis, Inc., 2000-2009 209 6.2. Creating a backup plan Before creating your first backup plan (p. 389), please familiarize yourself w
Copyright © Acronis, Inc., 2000-2009 21 1. Microsoft SQL Server 2005 Express that comes with the installation package and installs on the same mac
210 Copyright © Acronis, Inc., 2000-2009 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view
Copyright © Acronis, Inc., 2000-2009 211 Host (p. 229) Specify the machine that will perform the conversion. The machine has to have Acronis Backup
212 Copyright © Acronis, Inc., 2000-2009 6.2.3. Source type Select the type of data you want to be backed up on the managed machine. The list of
Copyright © Acronis, Inc., 2000-2009 213 6.2.4. Items to back up The items to backup depend on the source type (p. 212) selected previously. 6.2.
214 Copyright © Acronis, Inc., 2000-2009 A file-based backup is not sufficient for recovery of the operating system. In order to recover your opera
Copyright © Acronis, Inc., 2000-2009 215 machine configuration, stored in a virtual machine backup, will be suggested by default at recovering the
216 Copyright © Acronis, Inc., 2000-2009 You can view file or folder attributes in the file/folder properties or by using the attrib command. For m
Copyright © Acronis, Inc., 2000-2009 217 You can access the server as an anonymous user if the server enables such access. To do so, click Use anon
218 Copyright © Acronis, Inc., 2000-2009 6.2.8. Access credentials for archive location Specify credentials required for access to the location wh
Copyright © Acronis, Inc., 2000-2009 219 • Custom – to create a custom scheme, where you are free to set up a backup strategy in the way your ente
22 Copyright © Acronis, Inc., 2000-2009 Storage node-side cleanup and validation Archives, stored in unmanaged vaults, are maintained by the agents
220 Copyright © Acronis, Inc., 2000-2009 Description Let us suppose that we want to set up a backup plan that will regularly produce a series of da
Copyright © Acronis, Inc., 2000-2009 221 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h
222 Copyright © Acronis, Inc., 2000-2009 Limited storage If you do not want to arrange a vast amount of space to store a huge archive, you may set
Copyright © Acronis, Inc., 2000-2009 223 o Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly
224 Copyright © Acronis, Inc., 2000-2009 Roll-back period The guaranteed number of sessions that one can go back in the archive at any time. Calcu
Copyright © Acronis, Inc., 2000-2009 225 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level doubles the full backup
226 Copyright © Acronis, Inc., 2000-2009 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If th
Copyright © Acronis, Inc., 2000-2009 227 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b
228 Copyright © Acronis, Inc., 2000-2009 As a result, a full backup—originally scheduled at 9:00 PM—may actually start later: as soon as the backup
Copyright © Acronis, Inc., 2000-2009 229 you prefer to be immediately informed whether the backed up data is not corrupted and can be successfully
Copyright © Acronis, Inc., 2000-2009 23 1.3.6. Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool fo
230 Copyright © Acronis, Inc., 2000-2009 Virtual machines resulting from backup are not supposed to be backed up and so do not appear on the manage
Copyright © Acronis, Inc., 2000-2009 231 The system becomes operational and ready to provide necessary services. Thus, the system downtime will be
232 Copyright © Acronis, Inc., 2000-2009 Where to recover This section appears after the required backup is selected and the type of data to recove
Copyright © Acronis, Inc., 2000-2009 233 After any of the settings is changed against the default value, a new line that displays the newly set val
234 Copyright © Acronis, Inc., 2000-2009 o If the archive is stored on a network share, expand the Network folders group, then select the required
Copyright © Acronis, Inc., 2000-2009 235 Selecting an MBR You will usually select the disk's MBR if: o The operating system cannot boot o Th
236 Copyright © Acronis, Inc., 2000-2009 According to the original FTP specification, credentials required for access to FTP servers are transferre
Copyright © Acronis, Inc., 2000-2009 237 NT signature (p. 237) Select the way the recovered disk's signature will be handled. The disk signatu
238 Copyright © Acronis, Inc., 2000-2009 Recover to: Physical machine Available when the Acronis Backup & Recovery 10 Agent for Windows or Agen
Copyright © Acronis, Inc., 2000-2009 239 MBR destination To specify a destination disk: 1. Select the disk to recover the MBR to. 2. Click OK. V
24 Copyright © Acronis, Inc., 2000-2009 • Windows 7 - all editions except for the Starter and Home editions* * Acronis Backup & Recovery 10
240 Copyright © Acronis, Inc., 2000-2009 • Logical. Information about logical volumes is located not in the MBR, but in the extended partition tab
Copyright © Acronis, Inc., 2000-2009 241 6.3.6.4. Virtual machine settings The following virtual machine settings can be configured. Storage Initi
242 Copyright © Acronis, Inc., 2000-2009 C:\Documents\Finance\Reports\, the files will be recovered to the same path. If the folder does not exist,
Copyright © Acronis, Inc., 2000-2009 243 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th
244 Copyright © Acronis, Inc., 2000-2009 To learn more about the Universal Restore technology, see the Universal Restore (p. 58) section. Acronis B
Copyright © Acronis, Inc., 2000-2009 245 Mass storage drivers to install anyway To access this option, select the Advanced view check box. If the t
246 Copyright © Acronis, Inc., 2000-2009 3. In Data type, select Disks or Volumes depending on what you need to convert. 4. In Content, select t
Copyright © Acronis, Inc., 2000-2009 247 • Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,
248 Copyright © Acronis, Inc., 2000-2009 The following is an example of how to reactivate GRUB in case the system disk (volume) is recovered to ide
Copyright © Acronis, Inc., 2000-2009 249 root (hd0,0) 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first d
Copyright © Acronis, Inc., 2000-2009 25 When using the agent on a 64-bit RedHat based distribution, such as RHEL, CentOS, Fedora or Scientific Linu
250 Copyright © Acronis, Inc., 2000-2009 Example 2. The following command assembles the device /dev/md0 combined of the disks /dev/sdb and /dev/sdc
Copyright © Acronis, Inc., 2000-2009 251 • Base: Hexadecimal • Value: FFFFFFFF 4. Quit Registry Editor, and then restart the machine. If this do
252 Copyright © Acronis, Inc., 2000-2009 While successful validation means high probability of successful recovery, it does not check all factors t
Copyright © Acronis, Inc., 2000-2009 253 6.4.1. Task credentials Provide credentials for the account under which the task will run. To specify cre
254 Copyright © Acronis, Inc., 2000-2009 After entering access credentials, the folders on the server become available. Click the appropriate folde
Copyright © Acronis, Inc., 2000-2009 255 deleted or modified by another user or by the program itself according to scheduled operations. Use the Re
256 Copyright © Acronis, Inc., 2000-2009 operation. The mount operation is available when the console is connected to a managed machine running eit
Copyright © Acronis, Inc., 2000-2009 257 If the archive is located on removable media, e.g. DVDs, first insert the last DVD and then insert the dis
258 Copyright © Acronis, Inc., 2000-2009 The program will access the location using the credentials you specify. Use this option if the current use
Copyright © Acronis, Inc., 2000-2009 259 Unmounting images Maintaining the mounted volumes takes considerable system resources. It is recommended t
26 Copyright © Acronis, Inc., 2000-2009 CD-RW/ DVD-RW drive for bootable media creation Acronis Backup & Recovery 10 Agent for Windows Item
260 Copyright © Acronis, Inc., 2000-2009 • exporting an archive or part of an archive to a location where an archive of the same name exists • ex
Copyright © Acronis, Inc., 2000-2009 261 To export an archive or a backup perform the following steps. General Task name [Optional] Enter a unique
262 Copyright © Acronis, Inc., 2000-2009 The task will always run under the credentials you specify, whether started manually or executed on schedu
Copyright © Acronis, Inc., 2000-2009 263 2. In the table to the right of the tree, select the archive. The table displays the names of the archive
264 Copyright © Acronis, Inc., 2000-2009 1. Selecting the export destination Enter the full path to the destination in the Path field, or select t
Copyright © Acronis, Inc., 2000-2009 265 3. Naming the new archive By default, the exported archive inherits the name of the original archive. Beca
266 Copyright © Acronis, Inc., 2000-2009 6.8.1. Creating Acronis Secure Zone You can create Acronis Secure Zone while the operating system is runn
Copyright © Acronis, Inc., 2000-2009 267 • Taking all free space from a system volume may cause the operating system to work unstably and even fai
268 Copyright © Acronis, Inc., 2000-2009 6.8.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 400). Once
Copyright © Acronis, Inc., 2000-2009 269 o dragging the slider and selecting any size between the current and minimum values. The minimum size is
Copyright © Acronis, Inc., 2000-2009 27 Support shall consist of supplying telephone or other electronic support to you in order to help you locate
270 Copyright © Acronis, Inc., 2000-2009 • boot the machine from a separate bootable rescue media • use network boot from Acronis PXE Server or M
Copyright © Acronis, Inc., 2000-2009 271 • PE-based bootable media helps overcome some Linux-related bootable media issues such as support for cer
272 Copyright © Acronis, Inc., 2000-2009 http://www.microsoft.com/downloads/details.aspx?FamilyID=94bb6e34-d890-4932-81a5-5b50c657de08&DisplayL
Copyright © Acronis, Inc., 2000-2009 273 o create CD, DVD or other bootable media such as removable USB flash drives if the hardware BIOS allows f
274 Copyright © Acronis, Inc., 2000-2009 Without this parameter, all startup messages will be displayed, followed by a command prompt. To start the
Copyright © Acronis, Inc., 2000-2009 275 • Subnet mask • Gateway • DNS server • WINS server. Once the bootable agent starts on a machine, the
276 Copyright © Acronis, Inc., 2000-2009 Drivers for Universal Restore While creating bootable media, you have an option to add Windows drivers to
Copyright © Acronis, Inc., 2000-2009 277 2. Start the Bootable Media Builder either from the management console, by selecting Tools > Create B
278 Copyright © Acronis, Inc., 2000-2009 controller, network adapter, tape drive or other device. You will have to repeat this procedure for each d
Copyright © Acronis, Inc., 2000-2009 279 11. Build the Bart PE. 12. Burn the ISO to CD or DVD (if this has not been done yet) or copy to a flash dr
Copyright © Acronis, Inc., 2000-2009 28 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders
280 Copyright © Acronis, Inc., 2000-2009 6.10.3.1. Setting up a display mode For a machine booted from media, a display video mode is detected aut
Copyright © Acronis, Inc., 2000-2009 281 6. Click OK. 6.10.4. List of commands and utilities available in Linux-based bootable media Linux-based
282 Copyright © Acronis, Inc., 2000-2009 fxload mount tar gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart
Copyright © Acronis, Inc., 2000-2009 283 3. In the management console, click Recover. Under the archive contents, Acronis Backup & Recovery 10
284 Copyright © Acronis, Inc., 2000-2009 (Do not reboot the machine at this point. Otherwise, you will have to create the volume structure again.)
Copyright © Acronis, Inc., 2000-2009 285 lvm vgdisplay The output of the lvm vgdisplay command will contain lines similar to the following: --- Vol
286 Copyright © Acronis, Inc., 2000-2009 The output will contain lines similar to the following: Num Idx Partition Flags Start Size Type ----
Copyright © Acronis, Inc., 2000-2009 287 3. Follow the onscreen instructions. Acronis PXE Server runs as a service immediately after installation.
288 Copyright © Acronis, Inc., 2000-2009 6.10.6.4. Work across subnets To enable the Acronis PXE Server to work in another subnet (across the swit
Copyright © Acronis, Inc., 2000-2009 289 Running Acronis Disk Director Lite under Windows If you run Acronis Backup & Recovery 10 Management Co
Copyright © Acronis, Inc., 2000-2009 29 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
290 Copyright © Acronis, Inc., 2000-2009 • From the volume or disk context menu (both in the table and the graphic panel) • From the Disk managem
Copyright © Acronis, Inc., 2000-2009 291 3. In the window, you will be able to set the disk partitioning scheme (MBR or GPT) and the disk type (ba
292 Copyright © Acronis, Inc., 2000-2009 But with the wide range of available hardware it is normal that the target disk would differ in size from
Copyright © Acronis, Inc., 2000-2009 293 4. Wait until the task is finished. 5. Wait until the machine is turned off. 6. Disconnect either the s
294 Copyright © Acronis, Inc., 2000-2009 6.11.5.4. Disk conversion: GPT to MBR If you plan to install an OS that does not support GPT disks, conve
Copyright © Acronis, Inc., 2000-2009 295 1. There is a single Windows 2008/Vista operating system installed on the disk. 2. The machine runs this
296 Copyright © Acronis, Inc., 2000-2009 • in multiboot systems, bootability of a system that was offline during the operation 6.11.5.7. Changin
Copyright © Acronis, Inc., 2000-2009 297 • Install a new operating system (or swap file) on a new volume; • Add new hardware to a machine. In Acr
298 Copyright © Acronis, Inc., 2000-2009 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to-volume siz
Copyright © Acronis, Inc., 2000-2009 299 To create a Striped volume: o Select two or more destination disks to create the volume on. To create a R
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Backu
30 Copyright © Acronis, Inc., 2000-2009 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
300 Copyright © Acronis, Inc., 2000-2009 In setting the cluster size you can choose between any number in the preset amount for each file system.
Copyright © Acronis, Inc., 2000-2009 301 6.11.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volu
302 Copyright © Acronis, Inc., 2000-2009 6.11.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volum
Copyright © Acronis, Inc., 2000-2009 303 The new volume structure will be graphically represented in the Disk management view. If you set a 64K clu
Copyright © Acronis, Inc., 2000-2009 304 7. Centralized management This section covers operations that can be performed centrally by using the co
Copyright © Acronis, Inc., 2000-2009 305 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has l
306 Copyright © Acronis, Inc., 2000-2009 Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recover
Copyright © Acronis, Inc., 2000-2009 307 • Use the Information pane's tabs to view detailed information about the selected policy and perfor
308 Copyright © Acronis, Inc., 2000-2009 o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select a
Copyright © Acronis, Inc., 2000-2009 309 To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is de
Copyright © Acronis, Inc., 2000-2009 31 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
310 Copyright © Acronis, Inc., 2000-2009 The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and
Copyright © Acronis, Inc., 2000-2009 311 Settings The tab displays information about the backup scheme used by the policy and backup options that w
312 Copyright © Acronis, Inc., 2000-2009 The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a
Copyright © Acronis, Inc., 2000-2009 313 7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or i
314 Copyright © Acronis, Inc., 2000-2009 Add a machine to another static group Click Add to another group. In the Add to group (p. 317) window, sp
Copyright © Acronis, Inc., 2000-2009 315 View tasks existing on a machine Click View tasks. The Tasks (p. 337) view will display a list of the tas
316 Copyright © Acronis, Inc., 2000-2009 To perform registration through a local or remote console-agent connection, you have to be connected with
Copyright © Acronis, Inc., 2000-2009 317 A registered machine has to be specified by its registration address, that is, you need to provide exactly
318 Copyright © Acronis, Inc., 2000-2009 The machine being added becomes a member of more than one group. As a result, the backup policies applied
Copyright © Acronis, Inc., 2000-2009 319 o Online - the machine is available for the management server. This means that the management server&ap
32 Copyright © Acronis, Inc., 2000-2009 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
320 Copyright © Acronis, Inc., 2000-2009 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the
Copyright © Acronis, Inc., 2000-2009 321 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all
322 Copyright © Acronis, Inc., 2000-2009 • Task belongs to a backup plan Only tasks that do not belong to a backup plan, such as a recovery task,
Copyright © Acronis, Inc., 2000-2009 323 To Do View details of a group Click View details. You will be taken to the Group details window, where y
324 Copyright © Acronis, Inc., 2000-2009 Filter machines by name. Type a machine's name in the field below the corresponding column's he
Copyright © Acronis, Inc., 2000-2009 325 Move one custom group to another Click Move to. In the Move to group (p. 327) window, specify a group tha
326 Copyright © Acronis, Inc., 2000-2009 a) All the entries of the same criteria are combined by logical addition (OR). For example, the following
Copyright © Acronis, Inc., 2000-2009 327 If you later modify the file, the contents of the group will change accordingly. The file is checked every
328 Copyright © Acronis, Inc., 2000-2009 This information is also duplicated in the Information panel. Group Displays the following information on
Copyright © Acronis, Inc., 2000-2009 329 The following example illustrates how the policy that is applied on the group through inheritance is displ
Copyright © Acronis, Inc., 2000-2009 33 • Back up and recover the entire machine or any data on the machine, with or without using a disk snapshot
330 Copyright © Acronis, Inc., 2000-2009 o Deploy the agent (p. 331) to the ESX/ESXi server or o Install and configure the agent manually as desc
Copyright © Acronis, Inc., 2000-2009 331 You can create both static and dynamic groups of virtual machines. Any virtual machine that is currently a
332 Copyright © Acronis, Inc., 2000-2009 Password for remote connection to the agent: The management server will use this password to establish a t
Copyright © Acronis, Inc., 2000-2009 333 What happens when you remove an agent The virtual appliance that contains the agent will be deleted from t
334 Copyright © Acronis, Inc., 2000-2009 • drastically reduce backup traffic and storage space taken by the archives by using deduplication (p. 77
Copyright © Acronis, Inc., 2000-2009 335 To Do Add a storage node to the management server Click Add. In the Add storage node (p. 336) window, sp
336 Copyright © Acronis, Inc., 2000-2009 Adding a storage node To add a storage node 1. In the IP/Name field, enter the name or the IP address of
Copyright © Acronis, Inc., 2000-2009 337 Vaults This tab displays a list of the vaults, managed by the storage node. To open a managed vault for de
338 Copyright © Acronis, Inc., 2000-2009 The Log (p. 339) view will display a list of the log entries related to the selected task. Run a task Clic
Copyright © Acronis, Inc., 2000-2009 339 Refresh tasks table Click Refresh. The management console will update the list of tasks existing on the m
34 Copyright © Acronis, Inc., 2000-2009 Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When c
340 Copyright © Acronis, Inc., 2000-2009 Local event log A local event log holds information about Acronis Backup & Recovery 10 operations on a
Copyright © Acronis, Inc., 2000-2009 341 7.1.7.1. Actions on log entries All the operations described below are performed by clicking the correspo
342 Copyright © Acronis, Inc., 2000-2009 Filter log entries by type Press or release the following toolbar buttons: to filter error messages to f
Copyright © Acronis, Inc., 2000-2009 343 • Code - Blank or the program error code if the event type is error. Error code is an integer number that
344 Copyright © Acronis, Inc., 2000-2009 Generating reports To start generating a report, select a report template in the Reports view, and then cl
Copyright © Acronis, Inc., 2000-2009 345 Filters Under Filters, choose which backup policies to include in the report. Only the backup policies th
346 Copyright © Acronis, Inc., 2000-2009 Report view Under Report view, choose how the report will look: • Select whether to show all items in a s
Copyright © Acronis, Inc., 2000-2009 347 • Vaults: The list of centralized managed vaults that store the archives. • Machines: The list of regist
348 Copyright © Acronis, Inc., 2000-2009 7.1.8.7. Report about the task activities In this view, you can generate a report about the tasks that ex
Copyright © Acronis, Inc., 2000-2009 349 To allow active content permanently in Internet Explorer 1. On the Tools menu, click Internet Options, an
Copyright © Acronis, Inc., 2000-2009 35 Full backup A full backup stores all data selected for backup. A full backup underlies any archive and form
350 Copyright © Acronis, Inc., 2000-2009 To load the Acronis Administrative Template 1. Run Windows Group Policy Objects Editor (%windir%\system32
Copyright © Acronis, Inc., 2000-2009 351 Possible values: Any integer number between 1 and 2147483647 Default value: 10 Acronis Backup & Recove
352 Copyright © Acronis, Inc., 2000-2009 For example, suppose that two vaults, Vault A and Vault B, are both stored on a disk volume. Suppose furth
Copyright © Acronis, Inc., 2000-2009 353 The database is stored on the storage node in a local folder whose name is specified in Database path when
354 Copyright © Acronis, Inc., 2000-2009 Trace State Description: Specifies whether to record Acronis Backup & Recovery 10 Management Server&ap
Copyright © Acronis, Inc., 2000-2009 355 Synchronization Specifies how Acronis Backup & Recovery 10 Management Server connects to registered ma
356 Copyright © Acronis, Inc., 2000-2009 If there are fewer worker threads than normal-priority machines, the actual interval between synchronizati
Copyright © Acronis, Inc., 2000-2009 357 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att
358 Copyright © Acronis, Inc., 2000-2009 Snapshot Storage Relative Size This setting is effective only when the Snapshot Storage Absolute Size sett
Copyright © Acronis, Inc., 2000-2009 359 Maximum Time Without License Server, as counted from the moment of installation or from the last successfu
36 Copyright © Acronis, Inc., 2000-2009 An incremental or differential backup created after disk defragmentation might be considerably larger than
360 Copyright © Acronis, Inc., 2000-2009 Description: Specifies the minimum level of severity of events to be recorded into the event log. Only eve
Copyright © Acronis, Inc., 2000-2009 361 This parameter is used when creating a backup plan. Changes to this parameter do not affect already exist
362 Copyright © Acronis, Inc., 2000-2009 Select one of the following: Not Configured The component will use the default TCP port number 9876. Enabl
Copyright © Acronis, Inc., 2000-2009 363 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S
364 Copyright © Acronis, Inc., 2000-2009 Each event has a level from zero to five based on the event's severity, as shown in the following tab
Copyright © Acronis, Inc., 2000-2009 365 You will find the description of these parameters in the correspondent topic about configuration through t
366 Copyright © Acronis, Inc., 2000-2009 General Policy name [Optional] Enter a unique name for the backup policy. A conscious name lets you identi
Copyright © Acronis, Inc., 2000-2009 367 Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, create a custo
368 Copyright © Acronis, Inc., 2000-2009 Storage (p. 229) Choose the storage on the virtualization server or the folder to place the virtual machin
Copyright © Acronis, Inc., 2000-2009 369 7.3.2.1. Volumes to back up selection rules Define volume selection rules, according to which the volumes
Copyright © Acronis, Inc., 2000-2009 37 GFS-related settings of the backup plan Start backup at: Back up on: This step creates the total backup sch
370 Copyright © Acronis, Inc., 2000-2009 First partition on the first SCSI hard disk of a Linux machine Type or select: /dev/sda1 sda1 is the stan
Copyright © Acronis, Inc., 2000-2009 371 /dev/hda2, and /dev/hda3, respectively. To perform a disk backup of the, say, third partition, one can typ
372 Copyright © Acronis, Inc., 2000-2009 Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, th
Copyright © Acronis, Inc., 2000-2009 373 The root user's home directory /root Directory for all user-related programs /usr Directory for syste
374 Copyright © Acronis, Inc., 2000-2009 You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero
Copyright © Acronis, Inc., 2000-2009 375 The program generates a common name for the new archives and displays it in the Name field. The name looks
376 Copyright © Acronis, Inc., 2000-2009 7.3.7. Backup scheme selection Choose one of the available backup schemes: • Back up now – to create a
Copyright © Acronis, Inc., 2000-2009 377 7.3.7.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up da
378 Copyright © Acronis, Inc., 2000-2009 • Daily ("Son") backups are incremental. Parameters You can set up the following parameters of
Copyright © Acronis, Inc., 2000-2009 379 Backup scheme parameters can then be set up as follows. • Start backup at: 11:00 PM • Back up on: All da
38 Copyright © Acronis, Inc., 2000-2009 Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays a
380 Copyright © Acronis, Inc., 2000-2009 • Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (dail
Copyright © Acronis, Inc., 2000-2009 381 • One backup of each level is stored at a time • Higher density of more recent backups Parameters You ca
382 Copyright © Acronis, Inc., 2000-2009 Roll-back period The number of days we can go back in the archive is different on different days. The mini
Copyright © Acronis, Inc., 2000-2009 383 7.3.7.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C
384 Copyright © Acronis, Inc., 2000-2009 backup for some reason. Apply the rules (only if the retention rules are set) Specifies when to apply the
Copyright © Acronis, Inc., 2000-2009 385 Incremental: Schedule: Weekly, every workday, at 7:00 PM Differential: Schedule: Weekly, every Saturday, a
386 Copyright © Acronis, Inc., 2000-2009 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks
Copyright © Acronis, Inc., 2000-2009 387 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
388 Copyright © Acronis, Inc., 2000-2009 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and
Copyright © Acronis, Inc., 2000-2009 389 Backup options Configuration parameters of a backup operation (p. 388), such as pre/post backup commands
Copyright © Acronis, Inc., 2000-2009 39 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
390 Copyright © Acronis, Inc., 2000-2009 3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 388) inst
Copyright © Acronis, Inc., 2000-2009 391 A management server has two built-in groups that contain all machines of each type: All physical machines
392 Copyright © Acronis, Inc., 2000-2009 On a machine that is not registered on the management server, a user having the privilege to back up to th
Copyright © Acronis, Inc., 2000-2009 393 Differential backup A differential backup stores changes to the data against the latest full backup (p.
394 Copyright © Acronis, Inc., 2000-2009 and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the
Copyright © Acronis, Inc., 2000-2009 395 • IP address range. A machine remains in a dynamic group as long as the machine meets the group's cr
396 Copyright © Acronis, Inc., 2000-2009 F Full backup A self-sufficient backup (p. 388) containing all data chosen for backup. You do not need ac
Copyright © Acronis, Inc., 2000-2009 397 Managed vault A centralized vault (p. 391) managed by a storage node (p. 398). Archives (p. 388) in a mana
398 Copyright © Acronis, Inc., 2000-2009 Plan See Backup plan (p. 389). Policy See Backup policy (p. 389). R Recovery point Date and time to whic
Copyright © Acronis, Inc., 2000-2009 399 • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
2.14.6. Deduplication ...
40 Copyright © Acronis, Inc., 2000-2009 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
400 Copyright © Acronis, Inc., 2000-2009 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolo
Copyright © Acronis, Inc., 2000-2009 401 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 396) is considered vi
Index A A policy on a machine or a group • 70 About Windows loaders • 249 Access credentials • 256, 257 Access credentials for archive location • 20
Copyright © Acronis, Inc., 2000-2009 403 Archive protection • 106, 108 Archive selection • 231, 233, 252, 253, 256, 261, 262 Archive validation • 2
404 Copyright © Acronis, Inc., 2000-2009 Client and server applications • 89 Cloning method and advanced options • 291 Collecting system informatio
Copyright © Acronis, Inc., 2000-2009 405 Disk group • 45, 393, 395 Disk initialization • 290 Disk management • 47, 231, 288 Disk operations • 290 D
406 Copyright © Acronis, Inc., 2000-2009 How to reactivate GRUB and change its configuration • 247 I Image • 396 Importing machines from a text fil
Copyright © Acronis, Inc., 2000-2009 407 Network port configuration • 91, 93 Network settings • 272, 274 Notifications • 117, 132 NT signature • 23
408 Copyright © Acronis, Inc., 2000-2009 Recovery priority • 129, 132 Registered machine • 97, 391, 397, 398 Registration • 21, 61, 66, 102, 311, 3
Copyright © Acronis, Inc., 2000-2009 409 Tape planning • 155, 167 Example 1 • 168 Example 2 • 168 Tape rotation • 147, 155 Tape support • 54, 107,
Copyright © Acronis, Inc., 2000-2009 41 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
410 Copyright © Acronis, Inc., 2000-2009 Volume destination • 236, 238, 239 Volume operations • 296 Volume properties • 238, 239 Volume selection •
42 Copyright © Acronis, Inc., 2000-2009 • differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern start
Copyright © Acronis, Inc., 2000-2009 43 to this interval and deletes all backups created before that moment. None of the backups created after this
44 Copyright © Acronis, Inc., 2000-2009 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
Copyright © Acronis, Inc., 2000-2009 45 This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you s
46 Copyright © Acronis, Inc., 2000-2009 Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volume
Copyright © Acronis, Inc., 2000-2009 47 Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynam
48 Copyright © Acronis, Inc., 2000-2009 You can back up data of one or more logical volumes and recover it to a previously created logical volume o
Copyright © Acronis, Inc., 2000-2009 49 3-1 hdd1 Pri,Act 63 1219617 Ext3 3-2 Acronis Secure Zone Pri 12196
6. Direct management ... 193 6.1. Administering a managed
50 Copyright © Acronis, Inc., 2000-2009 The system has RAID-1 configured on two basic volumes: sdc1, sdd1. Num Partition Flags St
Copyright © Acronis, Inc., 2000-2009 51 Physical drives that are part of hardware RAID arrays may be listed alongside other disks as if they had a
52 Copyright © Acronis, Inc., 2000-2009 same machine. You will be able to use different backup strategies for the virtual disk and the physical sto
Copyright © Acronis, Inc., 2000-2009 53 retain the LDM/LVM. To do so, you will have to boot the target virtual machine using bootable media (p. 390
54 Copyright © Acronis, Inc., 2000-2009 2.12. Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tap
Copyright © Acronis, Inc., 2000-2009 55 Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7
56 Copyright © Acronis, Inc., 2000-2009 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
Copyright © Acronis, Inc., 2000-2009 57 With the new Acronis Secure Zone behavior, you obtain the ability to: • list archives located in the zone
58 Copyright © Acronis, Inc., 2000-2009 2.13.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recove
Copyright © Acronis, Inc., 2000-2009 59 Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardwa
6.8.1. Creating Acronis Secure Zone ...
60 Copyright © Acronis, Inc., 2000-2009 Limitation The only supported archive location is a local drive, or more precisely, any device available th
Copyright © Acronis, Inc., 2000-2009 61 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Resto
62 Copyright © Acronis, Inc., 2000-2009 Since you connect the console to the management server rather than to each machine and perform all manageme
Copyright © Acronis, Inc., 2000-2009 63 You have to protect each server as a whole, the users' data on the workstations, and the virtual machi
64 Copyright © Acronis, Inc., 2000-2009 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor
Copyright © Acronis, Inc., 2000-2009 65 3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of
66 Copyright © Acronis, Inc., 2000-2009 2.14.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flex
Copyright © Acronis, Inc., 2000-2009 67 • Active Directory organization unit (OU) • IP address range. Multiple criteria can be specified for a dy
68 Copyright © Acronis, Inc., 2000-2009 3, 4, 5, 6 - the salesmen's machines (Windows XP) from the "Sales department" AD organizatio
Copyright © Acronis, Inc., 2000-2009 69 • edit a group, that is: o change the group name o change the group description o change the dynamic m
Copyright © Acronis, Inc., 2000-2009 7 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A
70 Copyright © Acronis, Inc., 2000-2009 management server tracks and displays personal statuses for each machine that it works with, as well as the
Copyright © Acronis, Inc., 2000-2009 71 4. To completely revoke the policy from the machine, revoke it from both the group and the machine. 2.14.
72 Copyright © Acronis, Inc., 2000-2009 2.14.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machi
Copyright © Acronis, Inc., 2000-2009 73 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is
74 Copyright © Acronis, Inc., 2000-2009 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited
Copyright © Acronis, Inc., 2000-2009 75 You may change grouping conditions or the machine may change its properties so that the machine leaves one
76 Copyright © Acronis, Inc., 2000-2009 Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is
Copyright © Acronis, Inc., 2000-2009 77 "Deploying, Deployed". When the deployment completes on both machines, the state will be "De
78 Copyright © Acronis, Inc., 2000-2009 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a du
Copyright © Acronis, Inc., 2000-2009 79 Before sending the item to the vault, the agent queries the deduplication database to determine whether the
8 Copyright © Acronis, Inc., 2000-2009 • Redesigned GUI Dashboard for quick operational decision making Overview of all configured and running op
80 Copyright © Acronis, Inc., 2000-2009 • When performing incremental backups of data that does not change itself, but changes its location. Such
Copyright © Acronis, Inc., 2000-2009 81 What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previou
82 Copyright © Acronis, Inc., 2000-2009 • If you protected the archive with a password Files that were not deduplicated are stored in the archive
Copyright © Acronis, Inc., 2000-2009 83 2.14.7.2. Privileges for local connection Windows Local connection on a machine running Windows can be est
84 Copyright © Acronis, Inc., 2000-2009 2.14.7.4. Privileges for remote connection in Linux Remote connections to a machine running Linux—includin
Copyright © Acronis, Inc., 2000-2009 85 Example 2 The above authentication policy might not work on Linux distributions with kernel version 2.4—inc
86 Copyright © Acronis, Inc., 2000-2009 Management Console; they have the same management rights on the registered machines as users with administr
Copyright © Acronis, Inc., 2000-2009 87 A regular user, such as a member of the Users group on the storage node, can: • Create archives in any cen
88 Copyright © Acronis, Inc., 2000-2009 2.14.7.8. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Back
Copyright © Acronis, Inc., 2000-2009 89 2.14.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acron
Copyright © Acronis, Inc., 2000-2009 9 To start with centralized management: 1. Install Acronis Backup & Recovery 10 Management Server (p. 20)
90 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node
Copyright © Acronis, Inc., 2000-2009 91 Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disable
92 Copyright © Acronis, Inc., 2000-2009 Always use The use of SSL certificates is enabled. The connection will be established only if the use of SS
Copyright © Acronis, Inc., 2000-2009 93 2.14.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network
94 Copyright © Acronis, Inc., 2000-2009 In Windows, the certificate path and the server certificate's file name are specified in the registry
Copyright © Acronis, Inc., 2000-2009 95 Non-self-signed certificates You have the option to use trusted third-party certificates or certificates cr
Copyright © Acronis, Inc., 2000-2009 96 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph
Copyright © Acronis, Inc., 2000-2009 97 The option defines whether to display the pop-up messages about task run results: successful completion, fa
98 Copyright © Acronis, Inc., 2000-2009 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem
Copyright © Acronis, Inc., 2000-2009 99 entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the
Comentarios a estos manuales