User's Guide Acronis® Backup & Recovery ™ 10 Advanced Workstation
10 Copyright © Acronis, Inc., 2000-2010 1.2.1 Using the management console As soon as the console connects to a managed machine (p. 355) or to a m
100 Copyright © Acronis, Inc., 2000-2010 To completely eliminate this kind of problem, disable preserving file security settings in archives. The r
Copyright © Acronis, Inc., 2000-2010 101 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se
102 Copyright © Acronis, Inc., 2000-2010 You might have to provide the access credentials for the secondary destination. Enter the credentials on p
Copyright © Acronis, Inc., 2000-2010 103 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up dat
104 Copyright © Acronis, Inc., 2000-2010 Separate tape set is a tape set which contains only backups of the specific protected data. Other backups
Copyright © Acronis, Inc., 2000-2010 105 Additional settings Specify the additional settings for the backup operation by selecting or clearing the
106 Copyright © Acronis, Inc., 2000-2010 Restart the machine automatically after backup is finished This option is available only when operating un
Copyright © Acronis, Inc., 2000-2010 107 3.4.2 Default recovery options Each Acronis agent has its own default recovery options. Once an agent is
108 Copyright © Acronis, Inc., 2000-2010 Check fi l e system after recovery + - + - Reboot machine automatically if it is required for recovery
Copyright © Acronis, Inc., 2000-2010 109 4. Depending on the result you want to obtain, select the appropriate options as described in the table b
Copyright © Acronis, Inc., 2000-2010 11 "Navigation" pane The navigation pane includes the Navigation tree and the Shortcuts bar. Navigat
110 Copyright © Acronis, Inc., 2000-2010 To specify the recovery process priority Select one of the following: Low – to minimize resources taken
Copyright © Acronis, Inc., 2000-2010 111 Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types
112 Copyright © Acronis, Inc., 2000-2010 Windows event log This option is effective only in Windows operating systems. This option is not availab
Copyright © Acronis, Inc., 2000-2010 113 Types of events to send – choose the types of events to be sent: All events, Errors and warnings, or Er
114 Copyright © Acronis, Inc., 2000-2010 This option defines whether to validate a backup to ensure that the backup is not corrupted, before data i
Copyright © Acronis, Inc., 2000-2010 115 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i
116 Copyright © Acronis, Inc., 2000-2010 Way of working with the "Vaults" view Vaults (on the navigation pane) - top element of the vau
Copyright © Acronis, Inc., 2000-2010 117 To learn more about privileges depending on the user rights, see the User privileges on a storage node (p
118 Copyright © Acronis, Inc., 2000-2010 Operations with backups (p. 149) Filtering and sorting archives (p. 150) Bars of the "Actions and too
Copyright © Acronis, Inc., 2000-2010 119 another storage node. Explore an unmanaged va ul t 1. Select the unmanaged vault. 2. Click Explore. Th
12 Copyright © Acronis, Inc., 2000-2010 the history of operations logged in the local logs of the registered machines and the storage node s. Short
120 Copyright © Acronis, Inc., 2000-2010 Path (p. 120) Specify where the vault will be created. Managed centralized vaults can reside on a network
Copyright © Acronis, Inc., 2000-2010 121 To create a new folder for the database, click Create folder. 2. Click OK. When choosing a folder for th
122 Copyright © Acronis, Inc., 2000-2010 Enter the distinctive description of the vault. Type Select the Unmanaged type. Path (p. 122) Specify whe
Copyright © Acronis, Inc., 2000-2010 123 For the vault that was encrypted, provide the encryption password. After you have performed all the requir
124 Copyright © Acronis, Inc., 2000-2010 Hardware A tape library (robotic library) is a high-capacity storage device that contains the following:
Copyright © Acronis, Inc., 2000-2010 125 System media pools include Free pool, Import pool and Unrecognized pool. The System pools hold media that
126 Copyright © Acronis, Inc., 2000-2010 1. Click Administrative Tools > Server Manager > Features > Add Feature. 2. Select the Removabl
Copyright © Acronis, Inc., 2000-2010 127 It should be noted, these functions have some specific features for a tape library. So the Edit operation
128 Copyright © Acronis, Inc., 2000-2010 When recovering, you start creating a recovery task, select the tape device vault, and select the archive
Copyright © Acronis, Inc., 2000-2010 129 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage
Copyright © Acronis, Inc., 2000-2010 13 All the actions can also be accessed in the Actions menu. "Actions" bar on a managed machine a
130 Copyright © Acronis, Inc., 2000-2010 To define your own label for a tape, select a related data field, type in a new label, click Eject tape, w
Copyright © Acronis, Inc., 2000-2010 131 Always use a free tape If you leave the options below unchanged, then each backup will be written onto the
132 Copyright © Acronis, Inc., 2000-2010 If your backup archive must provide recovery with daily resolution for the last several days, weekly resol
Copyright © Acronis, Inc., 2000-2010 133 Weekly/differential backups (40 GB) are displayed as a blue rectangle: . Any full monthly backup (320 GB)
134 Copyright © Acronis, Inc., 2000-2010 loaded especially for backing up the data. The tape is marked with number 01 in the figure below. In accor
Copyright © Acronis, Inc., 2000-2010 135 Below, the figure shows the deleted backups as actual, but demonstrates tape usage during the whole year f
136 Copyright © Acronis, Inc., 2000-2010 The full backup stored on tape 01 is deleted after the next full backup is created onto both tapes 23 and
Copyright © Acronis, Inc., 2000-2010 137 If all the backups have to be kept during the year, the archive will require 28 tapes. As the GFS backup
138 Copyright © Acronis, Inc., 2000-2010 This figure demonstrates that the GFS Example 2 tape rotation scheme is more suitable for the case than GF
Copyright © Acronis, Inc., 2000-2010 139 The main drawback is the large number of required tapes that is used 5-10%. If we have to keep a daily bac
14 Copyright © Acronis, Inc., 2000-2010 and action pages according the items you select in the menu, Navigation tree, or on the Actions and Tools p
140 Copyright © Acronis, Inc., 2000-2010 the Use a separate tape set option is selected the Always use a free tape: For each full backup opti
Copyright © Acronis, Inc., 2000-2010 141 the Use a separate tape set option is selected the Always use a free tape: For each full backup opti
142 Copyright © Acronis, Inc., 2000-2010 the Always use a free tape: For each full backup option is selected the Always use a free tape: For
Copyright © Acronis, Inc., 2000-2010 143 compression level specified for backing up the data tape rotation scheme ( frequency of backups, ret
144 Copyright © Acronis, Inc., 2000-2010 compression level provides CL average reduction coefficient selected tape rotation scheme is Custom
Copyright © Acronis, Inc., 2000-2010 145 node cannot be read by an agent in a locally attached tape device. However the storage node can read tapes
146 Copyright © Acronis, Inc., 2000-2010 Vault toolbar The toolbar contains operational buttons that let you perform operations with the selected p
Copyright © Acronis, Inc., 2000-2010 147 The following is a guideline for you to perform operations with personal vaults. To Do Create a pers ona
148 Copyright © Acronis, Inc., 2000-2010 Merging and moving personal vaults What if I need to move the existing vault from a one place to another?
Copyright © Acronis, Inc., 2000-2010 149 or multiple archives 2. Click Delete. The program duplicates your selection in the Backups deletion (p.
Copyright © Acronis, Inc., 2000-2010 15 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
150 Copyright © Acronis, Inc., 2000-2010 i f need be (sel ect th e check boxes for th e des ired backups ), then confi rm the del etion. Del ete a
Copyright © Acronis, Inc., 2000-2010 151 To show or hide columns 1. Right-click any column header to open the context menu. The menu items that ar
Copyright © Acronis, Inc., 2000-2010 152 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
Copyright © Acronis, Inc., 2000-2010 153 What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not
154 Copyright © Acronis, Inc., 2000-2010 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6
Copyright © Acronis, Inc., 2000-2010 155 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.
156 Copyright © Acronis, Inc., 2000-2010 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still
Copyright © Acronis, Inc., 2000-2010 157 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From
158 Copyright © Acronis, Inc., 2000-2010 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every
Copyright © Acronis, Inc., 2000-2010 159 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: no
16 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a full list of
160 Copyright © Acronis, Inc., 2000-2010 The delay value for each machine is determined when the policy is deployed to the machine, and remains the
Copyright © Acronis, Inc., 2000-2010 161 You can schedule a backup task to start when a certain Windows event has been recorded in one of the event
162 Copyright © Acronis, Inc., 2000-2010 WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When c
Copyright © Acronis, Inc., 2000-2010 163 Example: It is required to run the backup task after free space on the managed machine is changed by at le
164 Copyright © Acronis, Inc., 2000-2010 As a result, (1) If 9:00 PM comes and the location's host is available, the backup task starts right
Copyright © Acronis, Inc., 2000-2010 165 5.6.4 User logged off Applies to: Windows Enables to put a backup task run on hold until all users log of
Copyright © Acronis, Inc., 2000-2010 166 6 Direct management This section covers operations that can be performed directly on a managed machine by
Copyright © Acronis, Inc., 2000-2010 167 Pl eas e make sure you have a valid license on Acronis Li cens e Server. working. Trial version of produc
168 Copyright © Acronis, Inc., 2000-2010 Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "War
Copyright © Acronis, Inc., 2000-2010 169 Use the Information panel to review detailed information on the selected plan (task). The panel is coll
Copyright © Acronis, Inc., 2000-2010 17 File backup File-level data protection is based on backing up files and folders residing on the machine whe
170 Copyright © Acronis, Inc., 2000-2010 Otherwi se, s ee 2 following: Remove the r eas on of the fa il ure -> [optionall y] Start the faile
Copyright © Acronis, Inc., 2000-2010 171 The user can stop a running task or a task that needs interaction. The task changes to the Stopping state
172 Copyright © Acronis, Inc., 2000-2010 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you
Copyright © Acronis, Inc., 2000-2010 173 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all
174 Copyright © Acronis, Inc., 2000-2010 Edit a plan/tas k Click Backup plan Edit. Backup plan editing is performed in the same way as crea tion (
Copyright © Acronis, Inc., 2000-2010 175 Del ete a pl an/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan&apo
176 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has si x columns that are displ ayed,
Copyright © Acronis, Inc., 2000-2010 177 Recovery (fi l e) Fil e a nd folder recovery Recovery (vol ume) Recovery of volumes from a disk backup
178 Copyright © Acronis, Inc., 2000-2010 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i
Copyright © Acronis, Inc., 2000-2010 179 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m
18 Copyright © Acronis, Inc., 2000-2010 the ability to manage storage nodes (p. 357). If there are multiple management servers on the network,
180 Copyright © Acronis, Inc., 2000-2010 Save the sel ected l og entries to a fil e 1. Select a single log entry or multiple log entries. 2. Cli
Copyright © Acronis, Inc., 2000-2010 181 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d
182 Copyright © Acronis, Inc., 2000-2010 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo
Copyright © Acronis, Inc., 2000-2010 183 After any of the settings is changed against the default value, a new line that displays the newly set val
184 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Run under the current user The tasks will run u
Copyright © Acronis, Inc., 2000-2010 185 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks a
186 Copyright © Acronis, Inc., 2000-2010 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going
Copyright © Acronis, Inc., 2000-2010 187 By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file na
188 Copyright © Acronis, Inc., 2000-2010 unique within the selected location. If you are satisfied with the automatically generated name, click OK.
Copyright © Acronis, Inc., 2000-2010 189 6.2.9 Backup schemes Choose one of the available backup schemes: Back up now – to create a backup task
Copyright © Acronis, Inc., 2000-2010 19 Setting up the storage infrastructure Install the storage nodes, add them to the management server (the pro
190 Copyright © Acronis, Inc., 2000-2010 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup
Copyright © Acronis, Inc., 2000-2010 191 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h
192 Copyright © Acronis, Inc., 2000-2010 Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered r
Copyright © Acronis, Inc., 2000-2010 193 Start backup at: 12:00 PM Back up on: Friday Weekly/monthly: Friday Keep backups: Daily: 1
194 Copyright © Acronis, Inc., 2000-2010 Backups of different levels have different types: Last-level (in this case, level 4) backups are full;
Copyright © Acronis, Inc., 2000-2010 195 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back perio
196 Copyright © Acronis, Inc., 2000-2010 This setting enables deletion of the last backup in the archive, in case your storage device cannot accomm
Copyright © Acronis, Inc., 2000-2010 197 Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and dai
198 Copyright © Acronis, Inc., 2000-2010 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks
Copyright © Acronis, Inc., 2000-2010 199 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 During group operations, reduces the time required for booting multiple machines as compared to using ph
200 Copyright © Acronis, Inc., 2000-2010 If the managed machine's operating system fails to start or you need to recover data to bare metal, b
Copyright © Acronis, Inc., 2000-2010 201 [Optional] Provide credentials for the archive location if the task account does not have the right to acc
202 Copyright © Acronis, Inc., 2000-2010 default one. When the default value is set, the line disappears and so you always see only the settings th
Copyright © Acronis, Inc., 2000-2010 203 If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
204 Copyright © Acronis, Inc., 2000-2010 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh
Copyright © Acronis, Inc., 2000-2010 205 Disks Available disk destinations de pend on the agents operati ng on the machine. Recover to: Physical ma
206 Copyright © Acronis, Inc., 2000-2010 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot
Copyright © Acronis, Inc., 2000-2010 207 The new virtual machine will be configured automatically, the source machine configuration being copied wh
208 Copyright © Acronis, Inc., 2000-2010 Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and
Copyright © Acronis, Inc., 2000-2010 209 Virtual machine type / virtualization server selection The new virtual machine can be created either on a
Copyright © Acronis, Inc., 2000-2010 21 2. Enable Acronis WOL Proxy in the Management server options as fol lows: a. Select the Use the following
210 Copyright © Acronis, Inc., 2000-2010 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of
Copyright © Acronis, Inc., 2000-2010 211 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th
212 Copyright © Acronis, Inc., 2000-2010 you have chosen to use Acronis Active Restore (p. 346) because these features are primarily meant for i
Copyright © Acronis, Inc., 2000-2010 213 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec
214 Copyright © Acronis, Inc., 2000-2010 The same type of machines with the same name cannot be created in the same folder. Change either the VM na
Copyright © Acronis, Inc., 2000-2010 215 Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Too
216 Copyright © Acronis, Inc., 2000-2010 cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub
Copyright © Acronis, Inc., 2000-2010 217 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, t
218 Copyright © Acronis, Inc., 2000-2010 Validation of an archive will validate all the archive's backups. A vault (or a location) validation
Copyright © Acronis, Inc., 2000-2010 219 6.4.1 Task credentials Provi de credentials for the account under whi ch the task wil l run. To specify c
22 Copyright © Acronis, Inc., 2000-2010 Windows Vista - all editions Windows 7 - all editions Acronis Backup & Recovery 10 Management Ser
220 Copyright © Acronis, Inc., 2000-2010 You can access the server as an anonymous user if the server enables such access. To do so, click Use anon
Copyright © Acronis, Inc., 2000-2010 221 6.4.5 Access credentials for source Specify the credentials required for access to the location where the
222 Copyright © Acronis, Inc., 2000-2010 Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not poss
Copyright © Acronis, Inc., 2000-2010 223 If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
224 Copyright © Acronis, Inc., 2000-2010 6.5.4 Volume selection Select the volumes to mount and configure the mounting parameters for each of the
Copyright © Acronis, Inc., 2000-2010 225 a single backup - an archive consisting of a single full backup will be created. The export of an incre
226 Copyright © Acronis, Inc., 2000-2010 export from a managed vault. The export is performed by the storage node that manages the vault. The de
Copyright © Acronis, Inc., 2000-2010 227 Where to export Archive (p. 229) Enter the path to the location where the new archive will be created. Be
228 Copyright © Acronis, Inc., 2000-2010 If the archive is stored on a network share, expand the Network folders group, then select the required
Copyright © Acronis, Inc., 2000-2010 229 The program will access the location using the credentials you specify. Use this option if the task accoun
Copyright © Acronis, Inc., 2000-2010 23 Storage Node 100 MB 150 MB 150 MB When using a tape library, space required for tapes database: approx.
230 Copyright © Acronis, Inc., 2000-2010 Network folders group to export data to a network share. If the network share requires access credentia
Copyright © Acronis, Inc., 2000-2010 231 6.8 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup archives on
232 Copyright © Acronis, Inc., 2000-2010 Acronis Secure Zone Size Enter the Acronis Secure Zone size or drag the slider to select any size between
Copyright © Acronis, Inc., 2000-2010 233 As is apparent from the above, setting the maximum possible zone size is not advisable. You will end up w
234 Copyright © Acronis, Inc., 2000-2010 dragging the slider and selecting any size between the current and minimum values. The minimum size is
Copyright © Acronis, Inc., 2000-2010 235 6.10 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB drive or other media s
236 Copyright © Acronis, Inc., 2000-2010 6.10.1 How to create bootable media To enable creating physical media, the machine must have a CD/DVD rec
Copyright © Acronis, Inc., 2000-2010 237 3. Install the Microsoft .NET Framework v.2.0 from this kit (NETFXx86 or NETFXx64, depending on your hard
238 Copyright © Acronis, Inc., 2000-2010 8. [optional] Windows system drivers to be used by Acronis Universal Restore (p. 240). This window appear
Copyright © Acronis, Inc., 2000-2010 239 nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing
Copyright © Acronis, Inc., 2000-2010 24 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
240 Copyright © Acronis, Inc., 2000-2010 customized. When you select an existing NIC in the wizard window, its settings are selected for saving on
Copyright © Acronis, Inc., 2000-2010 241 The drivers will be placed in the visible Drivers folder on the bootable media. The drivers are not loaded
242 Copyright © Acronis, Inc., 2000-2010 Adding the Acronis Plug-in to a WIM file for any future purpose (manual ISO building, adding other tool
Copyright © Acronis, Inc., 2000-2010 243 Building Bart PE with Acronis Plug-in from Windows distribution 1. Get the Bart PE builder. 2. Install B
244 Copyright © Acronis, Inc., 2000-2010 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. 2. The Linu
Copyright © Acronis, Inc., 2000-2010 245 2. Click Configure iSCSI/NDAS devices (in a Linux-based media) or Run the iSCSI Setup (in a PE-based medi
246 Copyright © Acronis, Inc., 2000-2010 dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap
Copyright © Acronis, Inc., 2000-2010 247 If disk configuration has changed. An MD device or a logical volume resides on one or more disks, each of
248 Copyright © Acronis, Inc., 2000-2010 6. If you previously mounted the backup by using the trueimagemnt utility, use this utility again to unmo
Copyright © Acronis, Inc., 2000-2010 249 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgroup /dev/md0 /dev/md1 lvm vgdisplay The output of the
Copyright © Acronis, Inc., 2000-2010 25 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
250 Copyright © Acronis, Inc., 2000-2010 Num Idx Partition Flags Start Size Type ---- --- --------- ----- ----- --------- ------ Disk 1:
Copyright © Acronis, Inc., 2000-2010 251 Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS supports netwo
252 Copyright © Acronis, Inc., 2000-2010 Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk c
Copyright © Acronis, Inc., 2000-2010 253 6.11.3 Choosing the operating system for disk management On a machine with two or more operating systems,
254 Copyright © Acronis, Inc., 2000-2010 6.11.5 Disk operations Acronis Disk Director Lite includes the following operations that can be performed
Copyright © Acronis, Inc., 2000-2010 255 case, the reason for the Clone basic disk operation can be summed up as the necessity to transfer all the
256 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commi t (p. 266) it. Exiting the program without committin
Copyright © Acronis, Inc., 2000-2010 257 2. Right-click on the selected volume, and then click Convert to GPT in the context menu. You will receiv
258 Copyright © Acronis, Inc., 2000-2010 If you need to convert a basic disk to dynamic: 1. Select the basic disk to convert to dynamic. 2. Right
Copyright © Acronis, Inc., 2000-2010 259 In some cases the possible unallocated space and the proposed maximum volume size might differ (e.g. when
26 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
260 Copyright © Acronis, Inc., 2000-2010 The full version of Acronis Disk Director will provide more tools and utilities for working with volumes.
Copyright © Acronis, Inc., 2000-2010 261 Mirrored-Striped Volume A faul t-tolerant volume, also sometimes called RAID 1+0, combining the advantage
262 Copyright © Acronis, Inc., 2000-2010 To create a basic volume: Select a destination disk and specify the unallocated space to create the bas
Copyright © Acronis, Inc., 2000-2010 263 The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the volume size
264 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commi t (p. 266) it. Exiting the program without committin
Copyright © Acronis, Inc., 2000-2010 265 Change volume label The volume label is an optional attribute. It is a name assigned to a volume for easie
266 Copyright © Acronis, Inc., 2000-2010 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the
Copyright © Acronis, Inc., 2000-2010 267 7 Centralized management This section covers operations that can be performed centrally by using the comp
268 Copyright © Acronis, Inc., 2000-2010 l ess than 10% free space. View vaults wi ll take you to the Centralized vaults (p . 117) vi ew wh ere y
Copyright © Acronis, Inc., 2000-2010 269 Statistics for the selected date are displayed to the right of the chart. All the statistics fiel ds are
Copyright © Acronis, Inc., 2000-2010 27 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
270 Copyright © Acronis, Inc., 2000-2010 Backup policy deployment states A backup policy deployment state is a combination of the policy deployment
Copyright © Acronis, Inc., 2000-2010 271 In the Log view, apply the Error filter if there are too many log entries. You can also sort the "e
272 Copyright © Acronis, Inc., 2000-2010 Edit a policy Click Edit. Editing policies is performed in the same way as c r ea ti n g (p. 326). Once t
Copyright © Acronis, Inc., 2000-2010 273 Filter backup policies by name/own er Type a pol icy's name / owner's name in the fields below
274 Copyright © Acronis, Inc., 2000-2010 machine (group). Vi ew l og of the machi ne (group) Click View log. The Log (p . 301) view will display a
Copyright © Acronis, Inc., 2000-2010 275 existing machines' properties and will analyze every newly registered machine. The machine that meets
276 Copyright © Acronis, Inc., 2000-2010 In the Import machines from file (p. 280) window, browse for a .txt or .csv fil e, containing the names (o
Copyright © Acronis, Inc., 2000-2010 277 actions will be performed on the machine as soon as the machine becomes available to the management server
278 Copyright © Acronis, Inc., 2000-2010 Note for Virtual Edition users: When adding a VMware ESX/ESXi host, enter the IP of the virtual appliance
Copyright © Acronis, Inc., 2000-2010 279 Deletes and then tries again to add registered machines that are present in the list, but their current
28 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
280 Copyright © Acronis, Inc., 2000-2010 {username password} belong to a user who is a member of the Administrators group on all machines listed
Copyright © Acronis, Inc., 2000-2010 281 Once the machines appear in the group, the policy that was applied to the group (if any), is deployed to t
282 Copyright © Acronis, Inc., 2000-2010 Backup policies Displays a list of backup policies applied to the selected machine and lets the management
Copyright © Acronis, Inc., 2000-2010 283 You will be taken to the Log (p. 179) view containing the list of the plan-r el a ted l og entri es. Clic
284 Copyright © Acronis, Inc., 2000-2010 Edit a plan/tas k Click Backup plan Edit. Backup plan editing is performed in the same way as crea tion (
Copyright © Acronis, Inc., 2000-2010 285 Task belongs to a backup plan A task belonging to a backup plan cannot be deleted separately from the p
286 Copyright © Acronis, Inc., 2000-2010 You can create a dynamic group based on the list of the hosted virtual machines. To do this, click Create
Copyright © Acronis, Inc., 2000-2010 287 Create a cus tom static or a dynamic group Click Create group. In the Create group (p. 287) window, speci
288 Copyright © Acronis, Inc., 2000-2010 All the machines running the selected operating system will be members of the dynamic group. Organizati
Copyright © Acronis, Inc., 2000-2010 289 Select an organizational unit from the Active Directory tree by clicking Browse, or typing it manually. If
Copyright © Acronis, Inc., 2000-2010 29 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
290 Copyright © Acronis, Inc., 2000-2010 Changing the type of group will result in its conversion. Any custom group can be converted to a dynamic g
Copyright © Acronis, Inc., 2000-2010 291 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the
292 Copyright © Acronis, Inc., 2000-2010 3. Register (p. 277) the Hyper-V host on the management server. If the machine is already registered, ski
Copyright © Acronis, Inc., 2000-2010 293 Grouping of virtual machines The Virtual machines section of the navigation tree contains one built-in gro
294 Copyright © Acronis, Inc., 2000-2010 Deploying and updating Agent for ESX/ESXi Acronis Backup & Recovery 10 Management Server provides an e
Copyright © Acronis, Inc., 2000-2010 295 The management server will use this account to establish a trusted relationship with the agent during regi
296 Copyright © Acronis, Inc., 2000-2010 Server 3 uses storages B, C, D The VA can be deployed to either C or D. If there is no storage shared b
Copyright © Acronis, Inc., 2000-2010 297 For information about user rights on a storage node and in its managed vaults, see User rights on a storag
298 Copyright © Acronis, Inc., 2000-2010 Vi ew details of the storage node Click View details. In the Storage node details (p . 298) window (the
Copyright © Acronis, Inc., 2000-2010 299 Online - the storage node is available for the management server. This means that the last management s
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1
30 Copyright © Acronis, Inc., 2000-2010 Storage space Maxi mal Medium Minimal Creation ti me Maxi mal Medium Minimal Recovery ti me Minimal M
300 Copyright © Acronis, Inc., 2000-2010 the backup plan will run. View details of a task Click View details. In the Tasks details (p. 176) window
Copyright © Acronis, Inc., 2000-2010 301 Each storage node has a built-in service task called a compacting task. This task cannot be deleted. Thi
302 Copyright © Acronis, Inc., 2000-2010 added to the log. When the software executes a task, it adds multiple entries saying what it is currently
Copyright © Acronis, Inc., 2000-2010 303 Actions on log entries All the operations described below are performed by clicking the corresponding item
304 Copyright © Acronis, Inc., 2000-2010 Fil ter l og entries by type Press or release the following toolbar buttons: to filter error messages
Copyright © Acronis, Inc., 2000-2010 305 Message - The event text description. The log entry's details that you copy will have the followin
306 Copyright © Acronis, Inc., 2000-2010 The report will contain the information selected, grouped and sorted according to the template settings. T
Copyright © Acronis, Inc., 2000-2010 307 Schedule: The types of the backup poli cies' sche dules—Manual and/or Scheduled. Manual schedule m
308 Copyright © Acronis, Inc., 2000-2010 Filters Under Filters, choose which tasks to include in the report. Only the tasks that meet all filter cr
Copyright © Acronis, Inc., 2000-2010 309 Report view Under Report view, choose how the report will look: Select whether to show all items in a s
Copyright © Acronis, Inc., 2000-2010 31 Click Cancel and create your own plan or task. The original task will remain intact. Continue editing
310 Copyright © Acronis, Inc., 2000-2010 Backup policies (centralized tasks only): The backup policies on which the tasks are based. The default
Copyright © Acronis, Inc., 2000-2010 311 By using the graphical user interface (GUI) By modifying the Windows registry In Linux, instead of u
312 Copyright © Acronis, Inc., 2000-2010 http://msdn2.microsoft.com/en-us/library/aa374177.aspx Acronis Backup & Recovery 10 Storage Node Th
Copyright © Acronis, Inc., 2000-2010 313 Vault Warnings and Limits Specifies the amount of free space in a vault (both as an absolute value and as
314 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the amount of free space, in megabytes, on the volume containing a managed vault&ap
Copyright © Acronis, Inc., 2000-2010 315 Specifies how to clean up the centralized event log stored in the management server's reporting datab
316 Copyright © Acronis, Inc., 2000-2010 Description: Specifies the network name or IP address of the SNMP server. Possible values: Any string 0 to
Copyright © Acronis, Inc., 2000-2010 317 Default value: 120 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for
318 Copyright © Acronis, Inc., 2000-2010 Offline Period Threshold (in seconds) Description: Specifies the maximum interval, in seconds, between att
Copyright © Acronis, Inc., 2000-2010 319 If this setting is 0, the snapshot storage will not be created. The initial size will not exceed the avail
32 Copyright © Acronis, Inc., 2000-2010 how many tapes you need to enable recovery with the desired resolution (time interval between recovery p
320 Copyright © Acronis, Inc., 2000-2010 If the value is 0, no reconnection attempts will be performed; the agent will only check for the license a
Copyright © Acronis, Inc., 2000-2010 321 Description: Specifies the minimum level of severity of events for sending SNMP notifications about them.
322 Copyright © Acronis, Inc., 2000-2010 Possible values: Any integer number between 0 and 100 Default value: 50 If this setting is 0, the snapshot
Copyright © Acronis, Inc., 2000-2010 323 Authentication parameters Selecting the Trust self-signed certificates check box allows the client to conn
324 Copyright © Acronis, Inc., 2000-2010 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S
Copyright © Acronis, Inc., 2000-2010 325 Specifies whether the machine where the Acronis Backup & Recovery 10 component is installed will parti
326 Copyright © Acronis, Inc., 2000-2010 This database contains a list of vaults that are managed by the storage node, other than tape vaults (see
Copyright © Acronis, Inc., 2000-2010 327 Where to back up Archive (p. 334) Specify the path to the location, where the backup archive will be store
328 Copyright © Acronis, Inc., 2000-2010 When to convert (p. 198) [Optional] Specify whether to convert every full, every incremental or every diff
Copyright © Acronis, Inc., 2000-2010 329 7.3.2 Items to back up Specify selection rules for backing up items, selected in the Source type field o
Copyright © Acronis, Inc., 2000-2010 33 Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so
330 Copyright © Acronis, Inc., 2000-2010 All fixed volumes Type or s elect: [Fixed Volumes] Ref ers to al l volumes other than remova bl e media
Copyright © Acronis, Inc., 2000-2010 331 Ope rati ng systems starti ng from Windows 7 and Windows Server 2008 R2 create a dedicated system volume c
332 Copyright © Acronis, Inc., 2000-2010 /dev/mda1 Files to back up selection rules Define file selection rules, according to which the files and
Copyright © Acronis, Inc., 2000-2010 333 All files on all volumes on a machine [All Files] Points to all files on all volumes of the machine. All
334 Copyright © Acronis, Inc., 2000-2010 Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden at
Copyright © Acronis, Inc., 2000-2010 335 Enter the full path to the folder in the Path field. This path will be created on each machine the policy
336 Copyright © Acronis, Inc., 2000-2010 Password. The password for the account. 2. Click OK. Warning: According to the original FTP specificat
Copyright © Acronis, Inc., 2000-2010 337 The task w ill be started manually Select this check box, if you do not need to put the backup task on a
338 Copyright © Acronis, Inc., 2000-2010 Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies
Copyright © Acronis, Inc., 2000-2010 339 Weekly: 1 month Monthly: indefinitely As a result, an archive of daily, weekly, and monthly backups
34 Copyright © Acronis, Inc., 2000-2010 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
340 Copyright © Acronis, Inc., 2000-2010 Keep backups: Daily: 6 months Weekly: 6 months Monthly: 5 years Here, daily incremental backup
Copyright © Acronis, Inc., 2000-2010 341 l evel s you sel ect. See the exampl e bel ow for details. Example Schedule parameters are set as follows
342 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup
Copyright © Acronis, Inc., 2000-2010 343 When there is insufficient space while backing up The archive will be cleaned up only during backup and on
344 Copyright © Acronis, Inc., 2000-2010 Retention rules: Delete backups older than 12 months Apply the rules: After backing up By default, a one-y
Copyright © Acronis, Inc., 2000-2010 345 In the first of the previous examples, we set up a schedule only for full backups. However, the scheme wil
Copyright © Acronis, Inc., 2000-2010 346 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
Copyright © Acronis, Inc., 2000-2010 347 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e
348 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 347), such as pre/post backup commands,
Copyright © Acronis, Inc., 2000-2010 349 5. On each machine, the agent installed on the machine creates a backup plan (p. 348) using other rules s
Copyright © Acronis, Inc., 2000-2010 35 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
350 Copyright © Acronis, Inc., 2000-2010 built-in group except for deleting the machine from the management server. Virtual machines are deleted as
Copyright © Acronis, Inc., 2000-2010 351 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 348) that produc
352 Copyright © Acronis, Inc., 2000-2010 operations are configured on the management server (p. 356) and propagated by the server to the managed ma
Copyright © Acronis, Inc., 2000-2010 353 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with
354 Copyright © Acronis, Inc., 2000-2010 Dynamic volume Any volume located on dynamic disks (p. 352), or more precisely, on a disk group (p. 352)
Copyright © Acronis, Inc., 2000-2010 355 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 349) aimed to maintain the optimal balance bet
356 Copyright © Acronis, Inc., 2000-2010 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n
Copyright © Acronis, Inc., 2000-2010 357 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi
358 Copyright © Acronis, Inc., 2000-2010 Since the cleanup schedule exists on the machi ne (p. 355) the age nt (p. 346) resi des on, and therefore
Copyright © Acronis, Inc., 2000-2010 359 the image being recovered is located in Acronis Secure Zone (p. 346) or when using Acronis Active Re
36 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
360 Copyright © Acronis, Inc., 2000-2010 Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Win
Index A A policy on a machine or a group • 55 About Windows loaders • 223 Access credentials • 229, 230 Access credentials for archive location • 18
362 Copyright © Acronis, Inc., 2000-2010 At Windows Event Log event • 165 Attaching a managed vault • 123, 127 B Back up later scheme • 196, 349 Ba
Copyright © Acronis, Inc., 2000-2010 363 Components for centralized management • 17 Compression level • 88, 96 Conditions • 104, 167 Configuring Ac
364 Copyright © Acronis, Inc., 2000-2010 Drivers for Universal Restore • 245, 247 Dual destination • 45, 88, 103 Dynamic disk • 41, 360, 366, 367,
Copyright © Acronis, Inc., 2000-2010 365 Inventory • 129, 133, 149 Items to back up • 188, 191, 337, 340 K Kernel parameters • 244, 245 L Labeling
366 Copyright © Acronis, Inc., 2000-2010 Overview • 62, 109, 120, 124, 127, 306 Overwriting • 217 Owners and credentials • 31, 150, 209, 226, 234,
Copyright © Acronis, Inc., 2000-2010 367 Run backup plan • 178, 182, 291 Running Acronis Disk Director Lite • 259 S Scheduling • 104, 157, 196, 205
368 Copyright © Acronis, Inc., 2000-2010 Time since last backup • 170 Time-based alerts • 79 ToH Example 1 • 144, 145, 148 ToH Example 2 • 144, 146
Copyright © Acronis, Inc., 2000-2010 369 Working with the • 120, 121, 151, 274
Copyright © Acronis, Inc., 2000-2010 37 the scheme forces every backup level to keep only the most recent backup, other backups from the level h
38 Copyright © Acronis, Inc., 2000-2010 to this interval and deletes all backups created before that moment. None of the backups created after this
Copyright © Acronis, Inc., 2000-2010 39 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
3.1.3 Ti me-based al erts...
40 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
Copyright © Acronis, Inc., 2000-2010 41 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to un
42 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v
Copyright © Acronis, Inc., 2000-2010 43 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux AT
44 Copyright © Acronis, Inc., 2000-2010 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
Copyright © Acronis, Inc., 2000-2010 45 mount a disk backup to copy files from the backup to a physical disk safely delete archives and backu
46 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac
Copyright © Acronis, Inc., 2000-2010 47 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w
48 Copyright © Acronis, Inc., 2000-2010 Because serving requests is performed simultaneously with recovery, the system operation can slow down even
Copyright © Acronis, Inc., 2000-2010 49 2.11 Understanding centralized management This section contains an overview of centralized data protection
6.2 Creating a backup plan ... 181 6.2.1 Why is the
50 Copyright © Acronis, Inc., 2000-2010 backup traffic and saving storage space. The storage node also undertakes operations with archives (such as
Copyright © Acronis, Inc., 2000-2010 51 3. Install Acronis Backup & Recovery 10 Agent on each of the machines to back up the machine's di
52 Copyright © Acronis, Inc., 2000-2010 before relocation, etc. In our example, there is no need to back up entire servers on a regular basis. You
Copyright © Acronis, Inc., 2000-2010 53 Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX/ESXi provides the flexibili
54 Copyright © Acronis, Inc., 2000-2010 Revoking a policy is the reverse action to the aggregate of applying and deploying. Revoking removes the co
Copyright © Acronis, Inc., 2000-2010 55 2. A policy, revoked from the group, remains on the machine. 3. A policy, revoked from the machine, remai
56 Copyright © Acronis, Inc., 2000-2010 Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a
Copyright © Acronis, Inc., 2000-2010 57 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is
58 Copyright © Acronis, Inc., 2000-2010 #5 or #6 "green" "orange" "blue" Inherited Inherited Inherited All machines
Copyright © Acronis, Inc., 2000-2010 59 Backup policy state diagram Policy status on a machine To see this parameter, select any group of machine
6.10.4 List of commands and utilities available in Linux-bas ed boota bl e media ...245 6.10.5 Recove
60 Copyright © Acronis, Inc., 2000-2010 /dev/sda1 volume (since the [System] volume is not found). The policy will get the Error status on Linux ma
Copyright © Acronis, Inc., 2000-2010 61 Cumulative state and status of a policy In addition to the deployment state and status as related to a spec
62 Copyright © Acronis, Inc., 2000-2010 Performed in the vault after a backup is completed. The storage node analyses the vault's archives and
Copyright © Acronis, Inc., 2000-2010 63 1. It moves the items (disk blocks or files) from the archives to a special folder within the vault, stori
64 Copyright © Acronis, Inc., 2000-2010 Indexing of a backup requires that the vault have free space with a minimum size of 1.1 multiplied by th
Copyright © Acronis, Inc., 2000-2010 65 If the volume is a compressed volume If the volume's allocation unit size—also known as cluster
66 Copyright © Acronis, Inc., 2000-2010 Remote connection A remote connection is established between Acronis Backup & Recovery 10 Management Co
Copyright © Acronis, Inc., 2000-2010 67 A user who is a member of this group can manage the machine remotely by using Acronis Backup & Recovery
68 Copyright © Acronis, Inc., 2000-2010 View and manage archives owned by the user A user who is a member of the Administrators group on the sto
Copyright © Acronis, Inc., 2000-2010 69 Alternatively, when creating a backup policy, the management server administrator has the option to explici
Copyright © Acronis, Inc., 2000-2010 7 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
70 Copyright © Acronis, Inc., 2000-2010 The Acronis Remote Agent Service provides connectivity among Acronis components. It runs under the Netwo
Copyright © Acronis, Inc., 2000-2010 71 Acronis Backup & Recovery 10 Agent Yes Yes Acronis Backup & Recovery 10 Managemen t Server Yes
72 Copyright © Acronis, Inc., 2000-2010 The component will use the specified port; type the port number in the Server TCP Port box. Disabled The sa
Copyright © Acronis, Inc., 2000-2010 73 Server Encryption options Specifies whether to encrypt the transferred data when the component acts as a se
74 Copyright © Acronis, Inc., 2000-2010 Configuring the port in the operating system Windows To be able to change the ports' numbers, load and
Copyright © Acronis, Inc., 2000-2010 75 3. In the Add/Remove Snap-in dialog box, click Add. 4. In the Add Standalone Snap-in dialog box, double-c
Copyright © Acronis, Inc., 2000-2010 76 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
Copyright © Acronis, Inc., 2000-2010 77 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
78 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
Copyright © Acronis, Inc., 2000-2010 79 3.2.3 Event tracing You can configure the management server to log events in the Application Event Log of
8 Copyright © Acronis, Inc., 2000-2010 Restricted remote access to a backup agent Secure communication between the product components Using third-
80 Copyright © Acronis, Inc., 2000-2010 3.2.4 Domain access credentials This option determines the user name and password that the management ser
Copyright © Acronis, Inc., 2000-2010 81 VMware vCenter integration This option defines whether to show virtual machines managed by a VMware vCenter
82 Copyright © Acronis, Inc., 2000-2010 To access the machine options, connect the console to the managed machine and then select Options > Mach
Copyright © Acronis, Inc., 2000-2010 83 This option defines whether the agent(s) operating on the managed machine have to log events in the Applica
84 Copyright © Acronis, Inc., 2000-2010 Types of events to send – choose the types of events: All events, Errors and warnings, or Errors only.
Copyright © Acronis, Inc., 2000-2010 85 3.3.4 Customer Experience Program This option defines whether the machine will participate in the Acronis
86 Copyright © Acronis, Inc., 2000-2010 Source fil es excl usi on (p. 88) + + + + Pre/Post backup commands (p. 89) + + PE onl y PE onl y Pre/
Copyright © Acronis, Inc., 2000-2010 87 Overwrite data on a tape without prompting user for confirmation Dest: Tape Dest: Tape Dest: Tape Dest:
88 Copyright © Acronis, Inc., 2000-2010 Source files exclusion This option is effective for Windows and Linux operating systems and bootable media
Copyright © Acronis, Inc., 2000-2010 89 Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable me
Copyright © Acronis, Inc., 2000-2010 9 To recover the entire machine or the operating system that fails to start, use the bootable media (p. 349).
90 Copyright © Acronis, Inc., 2000-2010 Perform the backup onl y after the command i s successfull y executed. Fai l the task if the command exec
Copyright © Acronis, Inc., 2000-2010 91 Execute after the data capture 2. Do any of the following: Click Edit to specify a new command or a
92 Copyright © Acronis, Inc., 2000-2010 Do not back up until the command exe cution is complete Sel ected Sel ected Cl ea red Cl ea red Result
Copyright © Acronis, Inc., 2000-2010 93 When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously.
94 Copyright © Acronis, Inc., 2000-2010 compressed files, such as .jpg, .pdf or .mp3. However, formats such as .doc or .xls will be compressed well
Copyright © Acronis, Inc., 2000-2010 95 Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating
96 Copyright © Acronis, Inc., 2000-2010 2. In the E-mail addresses field, type the e-mail address to which notifications will be sent. You can ent
Copyright © Acronis, Inc., 2000-2010 97 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple
98 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 provides the following Simple Network Management Protocol (SNMP) objects t
Copyright © Acronis, Inc., 2000-2010 99 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows. When backing up to a
Comentarios a estos manuales