Update 3 Acronis® Backup & Recovery ™ 10 Server for Linux User's Guide
10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac
100 Copyright © Acronis, Inc., 2000-2010 Validation (if selected) - events before or after which the validation is performed, and validation sch
101 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following Click View Details. T
102 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I
103 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for
104 Copyright © Acronis, Inc., 2000-2010 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view
105 Copyright © Acronis, Inc., 2000-2010 The tasks will run under the credentials with which the user who starts the tasks is logged on. If any of
106 Copyright © Acronis, Inc., 2000-2010 6.2.4.1 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for th
107 Copyright © Acronis, Inc., 2000-2010 Use the table in the right part of the window to browse and select the nested items. Selecting the check b
108 Copyright © Acronis, Inc., 2000-2010 The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*.t
109 Copyright © Acronis, Inc., 2000-2010 To back up data to a personal vault, expand the Personal group and click the vault. To back up data
11 Copyright © Acronis, Inc., 2000-2010 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
110 Copyright © Acronis, Inc., 2000-2010 Backup plans that operate with the same archive should back up the same data items (say, both plans back u
111 Copyright © Acronis, Inc., 2000-2010 You want to store the backup locally in the file MyMachine.tib. You want each new backup to replace
112 Copyright © Acronis, Inc., 2000-2010 You want to perform daily full backups of your machine to the file MyMachine.tib on an external hard di
113 Copyright © Acronis, Inc., 2000-2010 a) When creating the first backup plan, specify ServerFiles([DATE]) as the archive name, select the Name
114 Copyright © Acronis, Inc., 2000-2010 This is because the full backups created at midnight were replaced by new full backups of the same day. 6
115 Copyright © Acronis, Inc., 2000-2010 "fathers") and monthly (referred to as "grandfathers") backups. The expired backups wi
116 Copyright © Acronis, Inc., 2000-2010 6.2.10.4 Grandfather-Father-Son scheme At a glance Daily incremental, weekly differential, and monthly
117 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h
118 Copyright © Acronis, Inc., 2000-2010 Suppose that you need to: Perform backups at the end of each working day Be able to recover an accid
119 Copyright © Acronis, Inc., 2000-2010 No daily backups Consider a more exotic GFS scheme: Start backup at: 12:00 PM Back up on: Friday
12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
120 Copyright © Acronis, Inc., 2000-2010 This is how the first 14 days (or 14 sessions) of this scheme's schedule look. Shaded numbers denote
121 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 4 1 2 1 3 1 2 1 4 1 2 1 3 This gives us only a four
122 Copyright © Acronis, Inc., 2000-2010 delete the last full backup with all dependent incremental/differential backups If there is only one fu
123 Copyright © Acronis, Inc., 2000-2010 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates th
124 Copyright © Acronis, Inc., 2000-2010 Differential backup, runs manually You can run any of these backup tasks by selecting it from the list
125 Copyright © Acronis, Inc., 2000-2010 What to recover Archive (p. 126) Select the archive to recover data from. Data type (p. 127) Applies to: d
126 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Run under the current user The task will run un
127 Copyright © Acronis, Inc., 2000-2010 After entering access credentials, the folders on the server become available. Click the appropriate folde
128 Copyright © Acronis, Inc., 2000-2010 The disk geometry is different to that stored in the backup. There are probably other times when you ma
129 Copyright © Acronis, Inc., 2000-2010 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Phys
13 Copyright © Acronis, Inc., 2000-2010 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron
130 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 creates scheduled tasks using the signature of the source hard disk. I
131 Copyright © Acronis, Inc., 2000-2010 When using bootable media Disk letters seen under Windows-style bootable media might differ from the way W
132 Copyright © Acronis, Inc., 2000-2010 Older operating systems (MS-DOS, Windows 95 and Windows NT 3.x, 4.x) do not support FAT32 and will not be
133 Copyright © Acronis, Inc., 2000-2010 By mask (?) F???.log Excludes all .log files with names consisting of four symbols and starting with &qu
134 Copyright © Acronis, Inc., 2000-2010 6.3.8 When to recover Select when to start the recovery task: Recover now - the recovery task will be
135 Copyright © Acronis, Inc., 2000-2010 The system was recovered on dissimilar hardware and the new hardware is incompatible with the most crit
136 Copyright © Acronis, Inc., 2000-2010 Solution: Change the loader configuration and /etc/fstab so that the LVM is not used and reactivate the bo
137 Copyright © Acronis, Inc., 2000-2010 chroot /mnt/system/ /usr/sbin/grub 9. Specify the disk on which GRUB is located—typically, the boot or ro
138 Copyright © Acronis, Inc., 2000-2010 To create a validation task, perform the following steps. General Task name [Optional] Enter a unique name
139 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma
14 Copyright © Acronis, Inc., 2000-2010 1.3.2 Management Console Acronis Backup & Recovery 10 Management Console is an administrative tool for
140 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o
141 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun
142 Copyright © Acronis, Inc., 2000-2010 Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med
143 Copyright © Acronis, Inc., 2000-2010 ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port
144 Copyright © Acronis, Inc., 2000-2010 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers
145 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient
146 Copyright © Acronis, Inc., 2000-2010 The resulting archive's options The exported archive inherits the options of the original archive, in
147 Copyright © Acronis, Inc., 2000-2010 Task credentials (p. 147) [Optional] The export task will run on behalf of the user who is creating the ta
148 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma
149 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o
15 Copyright © Acronis, Inc., 2000-2010 pam.i386 libselinux.i386 libsepol.i386 These packages should be available in the repository of your Linux d
150 Copyright © Acronis, Inc., 2000-2010 To export data to a personal vault, expand the Personal vaults group and click the vault. To export
151 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Use the task credentials The program will acces
152 Copyright © Acronis, Inc., 2000-2010 6.8.1.1 Acronis Secure Zone Disk The Acronis Secure Zone can be located on any fixed hard drive. Acronis
153 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi
154 Copyright © Acronis, Inc., 2000-2010 3. Specify the new size of the zone by: dragging the slider and selecting any size between the current
155 Copyright © Acronis, Inc., 2000-2010 (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by
156 Copyright © Acronis, Inc., 2000-2010 PE-based bootable media PE-based bootable media contains a minimal Windows system called Windows Preinstal
157 Copyright © Acronis, Inc., 2000-2010 build an ISO image of a bootable disc to burn it later on a blank disc upload the selected component
158 Copyright © Acronis, Inc., 2000-2010 nousb2 Disables USB 2.0 support. USB 1.1 devices still work with this parameter. This parameter allows you
159 Copyright © Acronis, Inc., 2000-2010 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i
16 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
160 Copyright © Acronis, Inc., 2000-2010 Local connection Acronis Backup & Recovery 10 Management Console is always present on the bootable med
161 Copyright © Acronis, Inc., 2000-2010 6.10.3.2 Configuring iSCSI and NDAS devices This section describes how to configure Internet Small Comput
162 Copyright © Acronis, Inc., 2000-2010 Linux commands and utilities busybox ifconfig rm cat init rmmod cdrecord insmod route chmod iscsiadm scp c
163 Copyright © Acronis, Inc., 2000-2010 You can create the volume structure in either of the following ways: Automatically in Linux-based boota
164 Copyright © Acronis, Inc., 2000-2010 6.10.5.2 Creating the volume structure manually The following are a general procedure for recovering MD d
165 Copyright © Acronis, Inc., 2000-2010 The following picture illustrates this configuration. Do the following to recover data from this archive.
166 Copyright © Acronis, Inc., 2000-2010 2. In Archive, click Change and then specify the name of the archive. 3. In Backup, click Change and the
167 Copyright © Acronis, Inc., 2000-2010 To collect system information 1. In the management console, select from the top menu Help > Collect sy
168 Copyright © Acronis, Inc., 2000-2010 7 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
169 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup
17 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
170 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 169), such as pre/post backup commands,
171 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 169) installed on the machine finds data items using the selection rule
172 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre
173 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 169) from a backup archive (p. 169) in order to get rid of outdated backups o
174 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 177) using the direc
175 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/
176 Copyright © Acronis, Inc., 2000-2010 the administrator changes the criteria so that the machine does not meet them anymore. There is no way
177 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 169) containing all data chosen for backup. You do not need acc
178 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 172) managed by a storage node (p. 179). Archives (p. 169) in a mana
179 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 170). Policy See Backup policy (p. 170). R Recovery point Date and time to whic
18 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
180 Copyright © Acronis, Inc., 2000-2010 prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
181 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog
182 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 177) is considered vi
19 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
21 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
22 Copyright © Acronis, Inc., 2000-2010 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Crea
23 Copyright © Acronis, Inc., 2000-2010 Plan's credentials and task credentials Any task running on a machine runs on behalf of a user. When c
24 Copyright © Acronis, Inc., 2000-2010 GFS by Acronis With Acronis Backup & Recovery 10, you can easily set up a backup plan that will regular
25 Copyright © Acronis, Inc., 2000-2010 Assume you select Friday for Weekly/Monthly backup. Here is the real schedule of the backup tasks that will
26 Copyright © Acronis, Inc., 2000-2010 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
27 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
28 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
29 Copyright © Acronis, Inc., 2000-2010 the pattern starts with a full backup since the very first backup cannot be incremental the scheme fo
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...6 1.1 A
30 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules
31 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
32 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
33 Copyright © Acronis, Inc., 2000-2010 When recovering a logical volume over a basic (MBR) disk or volume. You can resize the resulting volume
34 Copyright © Acronis, Inc., 2000-2010 Either operation saves the machine’s logical volume structure to the /etc/Acronis directory. Make sure that
35 Copyright © Acronis, Inc., 2000-2010 trueimagecmd --partition:1-1,1-2,1-3,dyn1,dyn2 --filename:/home/backup.tib --create If you select Disk 3, v
36 Copyright © Acronis, Inc., 2000-2010 ABR10 + + + + Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 -
37 Copyright © Acronis, Inc., 2000-2010 select the backup. After recovery is started, you will be prompted for other tapes if the tapes are needed
38 Copyright © Acronis, Inc., 2000-2010 Value: "?00000000" 2.12 Proprietary Acronis technologies This section describes the proprietary
39 Copyright © Acronis, Inc., 2000-2010 For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 71) sec
3.3 Default backup and recovery options ...44 3.3.1 Default bac
40 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
41 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
42 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
43 Copyright © Acronis, Inc., 2000-2010 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appr
44 Copyright © Acronis, Inc., 2000-2010 When the option is enabled, the program compares the actual log size with the maximum size after every 100
45 Copyright © Acronis, Inc., 2000-2010 Backup performance: Backup priority (p. 52) + + - - HDD writing speed (p. 52) Dest: HDD Dest: HDD Dest
46 Copyright © Acronis, Inc., 2000-2010 3.3.1.1 Archive protection This option is effective for Windows and Linux operating systems and bootable m
47 Copyright © Acronis, Inc., 2000-2010 You can view file or folder attributes in the file/folder properties or by using the attrib command. For mo
48 Copyright © Acronis, Inc., 2000-2010 The option enables you to define the commands to be automatically executed before and after the backup proc
49 Copyright © Acronis, Inc., 2000-2010 successfully executed. Fail the task if the command execution fails. execution failure or success. irrespec
6.4.2 Archive selection ...
50 Copyright © Acronis, Inc., 2000-2010 Click Edit to specify a new command or a batch file Select the existing command or the batch file fro
51 Copyright © Acronis, Inc., 2000-2010 command execution is complete Result Preset Continue the backup only after the command is successfully ex
52 Copyright © Acronis, Inc., 2000-2010 To specify the compression level Select one of the following: None – the data will be copied as is, with
53 Copyright © Acronis, Inc., 2000-2010 The preset is: Maximum. To set the desired HDD writing speed for backup Do any of the following: Click W
54 Copyright © Acronis, Inc., 2000-2010 3. Under Send notifications, select the appropriate check boxes as follows: When backup completes succe
55 Copyright © Acronis, Inc., 2000-2010 2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple
56 Copyright © Acronis, Inc., 2000-2010 3.3.1.10 Fast incremental/differential backup The option is effective in Windows and Linux operating syste
57 Copyright © Acronis, Inc., 2000-2010 3.3.1.12 Media components This option is effective for both Windows and Linux operating systems, when the
58 Copyright © Acronis, Inc., 2000-2010 Ignore bad sectors The preset is: Disabled. When the option is disabled, the program will display a pop-up
59 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior in case a backup task is about to start (the scheduled time com
6 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
60 Copyright © Acronis, Inc., 2000-2010 This option determines the program behavior when any of the backup plan's tasks fails. The preset is n
61 Copyright © Acronis, Inc., 2000-2010 The option defines whether to display the Insert First Media prompt when backing up to removable media. The
62 Copyright © Acronis, Inc., 2000-2010 Turning off deduplication at source may lead to faster backup processes but greater network traffic and hea
63 Copyright © Acronis, Inc., 2000-2010 Agent for Linux Bootable media (Linux-based or PE-based) Disk recovery File recovery (also from a disk b
64 Copyright © Acronis, Inc., 2000-2010 Example of how you can use the pre/post commands: launch the Checkdisk command in order to find and fix
65 Copyright © Acronis, Inc., 2000-2010 Post-recovery command To specify a command/executable file to be executed after the recovery is completed 1
66 Copyright © Acronis, Inc., 2000-2010 3.3.2.4 Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about recov
67 Copyright © Acronis, Inc., 2000-2010 Messenger service (WinPopup) This option is effective for Windows and Linux operating systems. This option
68 Copyright © Acronis, Inc., 2000-2010 Send SNMP notifications individually for recovery operation events – to send the events of the recovery
69 Copyright © Acronis, Inc., 2000-2010 Validate backup before recovery The preset is Disabled. This option defines whether to validate a backup to
7 Copyright © Acronis, Inc., 2000-2010 Where to go from here For what to do next see "Basic concepts (p. 16)". For understanding of the G
70 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is
71 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to
72 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display
73 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault
74 Copyright © Acronis, Inc., 2000-2010 2. Move the archives to vault B manually by means of a third-party file manager. 3. Edit the backup plans
75 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes
76 Copyright © Acronis, Inc., 2000-2010 What happens if I delete a backup that is a base of an incremental or differential backup? To preserve arch
77 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a
78 Copyright © Acronis, Inc., 2000-2010 5.1 Daily schedule Daily schedule is effective in Windows and Linux operating systems. To specify a daily
79 Copyright © Acronis, Inc., 2000-2010 2. Every: 3 hours From: 12:00:00 AM (midnight) Until: 09:00:00 PM - thus, the task will be performed 8 tim
8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o
80 Copyright © Acronis, Inc., 2000-2010 5.2 Weekly schedule Weekly schedule is effective in Windows and Linux operating systems. To specify a week
81 Copyright © Acronis, Inc., 2000-2010 Run the task every week on workdays: from Monday through Friday. During a workday, the task starts only onc
82 Copyright © Acronis, Inc., 2000-2010 From: not set. To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3.
83 Copyright © Acronis, Inc., 2000-2010 2. Days: Last. The task will run on the last day of every month despite its actual date. 3. Once at: 10:0
84 Copyright © Acronis, Inc., 2000-2010 Second schedule 1. Months: March, April, May, September, October, November. 2. On: <All> <All wo
85 Copyright © Acronis, Inc., 2000-2010 Example: Backing up data to the networked location is performed on workdays at 9:00 PM. If the location&apo
86 Copyright © Acronis, Inc., 2000-2010 Condition: Fits time interval, from 06:00:00 PM until 11:59:59 PM. In this case, whether and when the ta
87 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by
88 Copyright © Acronis, Inc., 2000-2010 Create now will launch the Bootable Media Builder (p. 178). No backups have been created for X days Back u
89 Copyright © Acronis, Inc., 2000-2010 Alternatively, you can review the task execution states in the Backup plans and tasks (p. 89) view and spec
9 Copyright © Acronis, Inc., 2000-2010 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel
90 Copyright © Acronis, Inc., 2000-2010 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one
91 Copyright © Acronis, Inc., 2000-2010 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK i
92 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A tas
93 Copyright © Acronis, Inc., 2000-2010 6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline
94 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all t
95 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.
96 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan's
97 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, othe
98 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery
99 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The
Comentarios a estos manuales