User's Guide Acronis® Backup & Recovery ™ 10 Server for Windows
10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac
100 Copyright © Acronis, Inc., 2000-2010 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition. This situation is quite
Copyright © Acronis, Inc., 2000-2010 101 Task states A task can be in one of the following states: Idle; Waiting; Running; Stopping; Need interacti
102 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta
Copyright © Acronis, Inc., 2000-2010 103 Working with backup plans and tasks Actions on backup plans and tasks The following is a guideline for you
104 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all
Copyright © Acronis, Inc., 2000-2010 105 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.
106 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'
Copyright © Acronis, Inc., 2000-2010 107 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
108 Copyright © Acronis, Inc., 2000-2010 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove
Copyright © Acronis, Inc., 2000-2010 109 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i
Copyright © Acronis, Inc., 2000-2010 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
110 Copyright © Acronis, Inc., 2000-2010 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m
Copyright © Acronis, Inc., 2000-2010 111 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click
112 Copyright © Acronis, Inc., 2000-2010 Log entry details Displays detailed information on the log entry you have selected and lets you copy the d
Copyright © Acronis, Inc., 2000-2010 113 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo
114 Copyright © Acronis, Inc., 2000-2010 After any of the settings is changed against the default value, a new line that displays the newly set val
Copyright © Acronis, Inc., 2000-2010 115 To specify credentials 1. Select one of the following: Run under the current user The tasks will run u
116 Copyright © Acronis, Inc., 2000-2010 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for the disks a
Copyright © Acronis, Inc., 2000-2010 117 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going
118 Copyright © Acronis, Inc., 2000-2010 By name File1.log Excludes all files named File1.log. By path C:\Finance\test.log Excludes the file na
Copyright © Acronis, Inc., 2000-2010 119 unique within the selected location. If you are satisfied with the automatically generated name, click OK.
12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
120 Copyright © Acronis, Inc., 2000-2010 6.2.9 Backup schemes Choose one of the available backup schemes: Back up now – to create a backup task
Copyright © Acronis, Inc., 2000-2010 121 To set up the simple backup scheme, specify the appropriate settings as follows. Backup Set up the backup
122 Copyright © Acronis, Inc., 2000-2010 Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in h
Copyright © Acronis, Inc., 2000-2010 123 Be able to recover an accidentally deleted or inadvertently modified file if this has been discovered r
124 Copyright © Acronis, Inc., 2000-2010 Start backup at: 12:00 PM Back up on: Friday Weekly/monthly: Friday Keep backups: Daily: 1
Copyright © Acronis, Inc., 2000-2010 125 Backups of different levels have different types: Last-level (in this case, level 4) backups are full;
126 Copyright © Acronis, Inc., 2000-2010 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back perio
Copyright © Acronis, Inc., 2000-2010 127 This setting enables deletion of the last backup in the archive, in case your storage device cannot accomm
128 Copyright © Acronis, Inc., 2000-2010 Suppose that we need a scheme that will produce monthly full backups, weekly differential backups, and dai
Copyright © Acronis, Inc., 2000-2010 129 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks
Copyright © Acronis, Inc., 2000-2010 13 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron
130 Copyright © Acronis, Inc., 2000-2010 Which agent is installed on the host? The resulting virtual machine type and location depend on the agent
Copyright © Acronis, Inc., 2000-2010 131 If the managed machine's operating system fails to start or you need to recover data to bare metal, b
132 Copyright © Acronis, Inc., 2000-2010 [Optional] Provide credentials for the archive location if the task account does not have the right to acc
Copyright © Acronis, Inc., 2000-2010 133 default one. When the default value is set, the line disappears and so you always see only the settings th
134 Copyright © Acronis, Inc., 2000-2010 If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as
Copyright © Acronis, Inc., 2000-2010 135 There are probably other times when you may need to recover the MBR, but the above are the most common. Wh
136 Copyright © Acronis, Inc., 2000-2010 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Physical mach
Copyright © Acronis, Inc., 2000-2010 137 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot
138 Copyright © Acronis, Inc., 2000-2010 The new virtual machine will be configured automatically, the source machine configuration being copied wh
Copyright © Acronis, Inc., 2000-2010 139 Volume properties Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and
14 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil
140 Copyright © Acronis, Inc., 2000-2010 Virtual machine type / virtualization server selection The new virtual machine can be created either on a
Copyright © Acronis, Inc., 2000-2010 141 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of
142 Copyright © Acronis, Inc., 2000-2010 Overwriting Choose what to do if the program finds in the target folder a file with the same name as in th
Copyright © Acronis, Inc., 2000-2010 143 you have chosen to use Acronis Active Restore (p. 197) because these features are primarily meant for i
144 Copyright © Acronis, Inc., 2000-2010 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec
Copyright © Acronis, Inc., 2000-2010 145 The same type of machines with the same name cannot be created in the same folder. Change either the VM na
146 Copyright © Acronis, Inc., 2000-2010 Solution: Boot the machine from the Acronis Disk Director's bootable media and select in the menu Too
Copyright © Acronis, Inc., 2000-2010 147 cp /mnt/system/boot/grub/menu.lst /mnt/system/boot/grub/menu.lst.backup or cp /mnt/system/boot/grub/grub
148 Copyright © Acronis, Inc., 2000-2010 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot sector, t
Copyright © Acronis, Inc., 2000-2010 149 If this does not resolve the problem, or for more details on adding these registry settings, see the corre
Copyright © Acronis, Inc., 2000-2010 15 XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di
150 Copyright © Acronis, Inc., 2000-2010 Vault (p. 151) - select a vault (or other location), which archives to validate. Access Credentials (p. 15
Copyright © Acronis, Inc., 2000-2010 151 If the archive is stored on a network share, expand the Network folders group, then select the required
152 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre
Copyright © Acronis, Inc., 2000-2010 153 On schedule - to schedule the task. To learn more about how to configure the scheduling parameters, ple
154 Copyright © Acronis, Inc., 2000-2010 If the archive is stored in a local folder on the machine, expand the Local folders group and click the
Copyright © Acronis, Inc., 2000-2010 155 The program will access the location using the credentials you specify. Use this option if the current use
156 Copyright © Acronis, Inc., 2000-2010 To unmount an image, select it in the table and click Unmount. To unmount all the mounted volumes, click
Copyright © Acronis, Inc., 2000-2010 157 Source and destination locations When the console is connected to a managed machine, you can export an arc
158 Copyright © Acronis, Inc., 2000-2010 Archive (p. 133) - in that case, you need to specify the archive only. Backups (p. 159) - specify the arch
Copyright © Acronis, Inc., 2000-2010 159 If the archive is stored in a local folder on the machine, expand the Local folders group and click the
16 Copyright © Acronis, Inc., 2000-2010 Linux-based 256 MB 130 MB 1.7 Technical support As part of a purchased annual Support charge you are
160 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials of the task account specified in the General se
Copyright © Acronis, Inc., 2000-2010 161 2. Using the archives table To assist you with choosing the right destination, the table on the right disp
162 Copyright © Acronis, Inc., 2000-2010 To learn more about the advantages and limitations of the Acronis Secure Zone, see the Acronis Secure Zone
Copyright © Acronis, Inc., 2000-2010 163 Taking all free space from a system volume may cause the operating system to work unstably and even fai
164 Copyright © Acronis, Inc., 2000-2010 If you have used the Acronis Secure Zone before, please note a radical change in the zone functionality. T
Copyright © Acronis, Inc., 2000-2010 165 2. In the Delete Acronis Secure Zone window, select volumes to which you want to add the space freed from
166 Copyright © Acronis, Inc., 2000-2010 recover an operating system that cannot start access and back up the data that has survived in a cor
Copyright © Acronis, Inc., 2000-2010 167 A media with Linux-style volume handling displays the volumes as, for example, hda1 and sdb2. It tries
168 Copyright © Acronis, Inc., 2000-2010 Using Bart PE You can create a Bart PE image with Acronis Plug-in using the Bart PE Builder. Please refer
Copyright © Acronis, Inc., 2000-2010 169 You also can specify any of these parameters by pressing F11 while in the boot menu. Parameters When speci
Copyright © Acronis, Inc., 2000-2010 17 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
170 Copyright © Acronis, Inc., 2000-2010 module_name=off Disables the module whose name is given by module_name. For example, to disable the use of
Copyright © Acronis, Inc., 2000-2010 171 You can customize bootable media for any machine, and not only for the machine where the media is created.
172 Copyright © Acronis, Inc., 2000-2010 To add drivers: 1. Click Add and browse to the INF file or a folder that contains INF files. 2. Select
Copyright © Acronis, Inc., 2000-2010 173 Adding Acronis Plug-in to WinPE 2.x or 3.0 ISO To add Acronis Plug-in to WinPE 2.x or 3.0 ISO: 1. When ad
174 Copyright © Acronis, Inc., 2000-2010 export_license.bat 5. Copy the contents of the current folder—by default: C:\Program Files\Acronis\Boota
Copyright © Acronis, Inc., 2000-2010 175 6. Tasks cannot be scheduled; in fact, tasks are not created at all. If you need to repeat the operation,
176 Copyright © Acronis, Inc., 2000-2010 2. Click Configure iSCSI/NDAS devices. 3. In NDAS devices, click Add device. 4. Specify the 20-characte
Copyright © Acronis, Inc., 2000-2010 177 fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs p
178 Copyright © Acronis, Inc., 2000-2010 4. Click Details in the area with that message. 5. Review the volume structure, and then click Apply RAI
Copyright © Acronis, Inc., 2000-2010 179 Example Suppose that you previously performed a disk backup of a machine with the following disk configura
18 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
180 Copyright © Acronis, Inc., 2000-2010 5. Run the following command to create the logical volume; in the -L parameter, specify the size given by
Copyright © Acronis, Inc., 2000-2010 181 6.11 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configurati
182 Copyright © Acronis, Inc., 2000-2010 Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare
Copyright © Acronis, Inc., 2000-2010 183 Displaying operation results The results of any disk or volume operation, you have just planned, are immed
184 Copyright © Acronis, Inc., 2000-2010 If you decide to change the disk settings it can be done later using the standard Acronis Disk Director Li
Copyright © Acronis, Inc., 2000-2010 185 the source disk data to the target disk is impossible even with the proportional resizing of the volumes,
186 Copyright © Acronis, Inc., 2000-2010 Disk conversion: MBR to GPT You would want to convert an MBR basic disk to a GPT basic disk in the followi
Copyright © Acronis, Inc., 2000-2010 187 (To finish the added operation you will have to commit (p. 195) it. Exiting the program without committing
188 Copyright © Acronis, Inc., 2000-2010 dynamic disks (all volume types except Simple volumes), then you will be warned here about the possible da
Copyright © Acronis, Inc., 2000-2010 189 Create Volume (p. 189) - Creates a new volume with the help of the Create Volume Wizard. Delete Volu
Copyright © Acronis, Inc., 2000-2010 19 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
190 Copyright © Acronis, Inc., 2000-2010 Striped volumes are created for improved performance, not for their better reliability - they do not conta
Copyright © Acronis, Inc., 2000-2010 191 If the current operating system, installed on this machine, does not support the selected type of volume ,
192 Copyright © Acronis, Inc., 2000-2010 For basic volumes if some unallocated space is left on the disk, you also will be able to choose the posit
Copyright © Acronis, Inc., 2000-2010 193 After a volume is deleted, its space is added to unallocated disk space. It can be used for creation of a
194 Copyright © Acronis, Inc., 2000-2010 If you need to change a letter assigned to a volume by the operating system: 1. Select a volume to change
Copyright © Acronis, Inc., 2000-2010 195 In the text window you will be able to enter the volume label, if necessary: by default this window is emp
196 Copyright © Acronis, Inc., 2000-2010 This option is available under bootable media and for machines where Agent for Windows, Agent for Linux or
Copyright © Acronis, Inc., 2000-2010 197 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
198 Copyright © Acronis, Inc., 2000-2010 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e
Copyright © Acronis, Inc., 2000-2010 199 Backup options Configuration parameters of a backup operation (p. 198), such as pre/post backup commands,
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
200 Copyright © Acronis, Inc., 2000-2010 5. On each machine, the agent installed on the machine creates a backup plan (p. 199) using other rules s
Copyright © Acronis, Inc., 2000-2010 201 built-in group except for deleting the machine from the management server. Virtual machines are deleted as
202 Copyright © Acronis, Inc., 2000-2010 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 199) that produc
Copyright © Acronis, Inc., 2000-2010 203 operations are configured on the management server (p. 207) and propagated by the server to the managed ma
204 Copyright © Acronis, Inc., 2000-2010 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with
Copyright © Acronis, Inc., 2000-2010 205 Dynamic volume Any volume located on dynamic disks (p. 203), or more precisely, on a disk group (p. 203)
206 Copyright © Acronis, Inc., 2000-2010 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 200) aimed to maintain the optimal balance bet
Copyright © Acronis, Inc., 2000-2010 207 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n
208 Copyright © Acronis, Inc., 2000-2010 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi
Copyright © Acronis, Inc., 2000-2010 209 Since the cleanup schedule exists on the machine (p. 206) the agent (p. 197) resides on, and therefore use
Copyright © Acronis, Inc., 2000-2010 21 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
210 Copyright © Acronis, Inc., 2000-2010 the image being recovered is located in Acronis Secure Zone (p. 197) or when using Acronis Active Re
Copyright © Acronis, Inc., 2000-2010 211 Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Win
Index A About Windows loaders • 152 Access credentials • 158, 159 Access credentials for archive location • 118, 124 Access credentials for destinat
Copyright © Acronis, Inc., 2000-2010 213 Basic precautions • 186 Bootability troubleshooting • 150 Bootable agent • 39, 170, 202, 205 Bootable medi
214 Copyright © Acronis, Inc., 2000-2010 Disk management • 36, 136, 186 Disk operations • 188 Disks • 136, 140 Disks/volumes selection • 139 Driver
Copyright © Acronis, Inc., 2000-2010 215 M Machine • 203, 204, 205, 206, 208, 209, 211, 212, 213, 214, 215 Machine options • 46, 61, 62, 75, 76 Mai
216 Copyright © Acronis, Inc., 2000-2010 Run backup plan • 107, 111 Running Acronis Disk Director Lite • 186 S Scheduling • 66, 87, 125, 134, 157 S
Copyright © Acronis, Inc., 2000-2010 217 Validation • 18, 203, 214, 215 Validation rules • 204, 215 Vault • 18, 39, 168, 210, 212, 215 Vaults • 34,
22 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
Copyright © Acronis, Inc., 2000-2010 23 Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Mediu
24 Copyright © Acronis, Inc., 2000-2010 Click Cancel and create your own plan or task. The original task will remain intact. Continue editing
Copyright © Acronis, Inc., 2000-2010 25 how many tapes you need to enable recovery with the desired resolution (time interval between recovery p
26 Copyright © Acronis, Inc., 2000-2010 Acronis uses incremental and differential backups that help save storage space and optimize the cleanup so
Copyright © Acronis, Inc., 2000-2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
28 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
Copyright © Acronis, Inc., 2000-2010 29 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...6 1.1 A
30 Copyright © Acronis, Inc., 2000-2010 the scheme forces every backup level to keep only the most recent backup, other backups from the level h
Copyright © Acronis, Inc., 2000-2010 31 to this interval and deletes all backups created before that moment. None of the backups created after this
32 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
Copyright © Acronis, Inc., 2000-2010 33 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
34 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to una
Copyright © Acronis, Inc., 2000-2010 35 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing
36 Copyright © Acronis, Inc., 2000-2010 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE
Copyright © Acronis, Inc., 2000-2010 37 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
38 Copyright © Acronis, Inc., 2000-2010 mount a disk backup to copy files from the backup to a physical disk safely delete archives and backu
Copyright © Acronis, Inc., 2000-2010 39 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac
4 Vaults ... 77 4.1
40 Copyright © Acronis, Inc., 2000-2010 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w
Copyright © Acronis, Inc., 2000-2010 41 Because serving requests is performed simultaneously with recovery, the system operation can slow down even
42 Copyright © Acronis, Inc., 2000-2010
Copyright © Acronis, Inc., 2000-2010 43 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
44 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
Copyright © Acronis, Inc., 2000-2010 45 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
46 Copyright © Acronis, Inc., 2000-2010 All events - all events (information, warnings and errors) Errors and warnings Errors only. To dis
Copyright © Acronis, Inc., 2000-2010 47 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine running
48 Copyright © Acronis, Inc., 2000-2010 Initially the option is configured during the Acronis Backup & Recovery 10 agent installation. This set
Copyright © Acronis, Inc., 2000-2010 49 Compression level (p. 56) + + + + Backup performance: Backup priority (p. 57) + + - - HDD writing spe
6.4 Validating vaults, archives and backups ...149 6.4.1 Task credent
50 Copyright © Acronis, Inc., 2000-2010 E-mail (p. 58) + + - - Win Pop-up (p. 59) + + - - Event tracing: Windows events log (p. 60) + + -
Copyright © Acronis, Inc., 2000-2010 51 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of it
52 Copyright © Acronis, Inc., 2000-2010 The program does not support interactive commands, i.e. commands that require user input (for example, &quo
Copyright © Acronis, Inc., 2000-2010 53 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i
54 Copyright © Acronis, Inc., 2000-2010 4. Depending on the result you want to obtain, select the appropriate options as described in the table be
Copyright © Acronis, Inc., 2000-2010 55 File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operati
56 Copyright © Acronis, Inc., 2000-2010 The preset is: Create snapshots using VSS Acronis Backup & Recovery 10 will select the VSS provider aut
Copyright © Acronis, Inc., 2000-2010 57 Backup performance Use this group of options to specify the amount of network and system resources to alloc
58 Copyright © Acronis, Inc., 2000-2010 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server
Copyright © Acronis, Inc., 2000-2010 59 Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types a
Copyright © Acronis, Inc., 2000-2010 6 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
60 Copyright © Acronis, Inc., 2000-2010 Event tracing It is possible to duplicate log events of the backup operations, performed on the managed mac
Copyright © Acronis, Inc., 2000-2010 61 Send SNMP notifications individually for backup operation events – to send the events of the backup oper
62 Copyright © Acronis, Inc., 2000-2010 When backing up to removable media (CD, DVD or a tape device locally attached to the managed machine):
Copyright © Acronis, Inc., 2000-2010 63 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.
64 Copyright © Acronis, Inc., 2000-2010 When the option is disabled, the program will display a pop-up window each time it comes across a bad secto
Copyright © Acronis, Inc., 2000-2010 65 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
66 Copyright © Acronis, Inc., 2000-2010 trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depen
Copyright © Acronis, Inc., 2000-2010 67 the prompt when scheduling a backup to removable media. Then, if the removable media is available (for exam
68 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information
Copyright © Acronis, Inc., 2000-2010 69 File-level security (p. 71): Recover files with their security settings - + - + Error handling (p. 74):
Copyright © Acronis, Inc., 2000-2010 7 Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the G
70 Copyright © Acronis, Inc., 2000-2010 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options: E
Copyright © Acronis, Inc., 2000-2010 71 When the check box is not selected, the command execution result does not affect the task execution failure
72 Copyright © Acronis, Inc., 2000-2010 The option enables you to receive e-mail notifications about the recovery task's successful completion
Copyright © Acronis, Inc., 2000-2010 73 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine e
74 Copyright © Acronis, Inc., 2000-2010 This option is not available when operating under the bootable media. The option defines whether the agent(
Copyright © Acronis, Inc., 2000-2010 75 For example, if the network location becomes unavailable or not reachable, the program will attempt to reac
76 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.
Copyright © Acronis, Inc., 2000-2010 77 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is
78 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to
Copyright © Acronis, Inc., 2000-2010 79 Vault content The Vault content section contains the archives table and toolbar. The archives table display
8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o
80 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault
Copyright © Acronis, Inc., 2000-2010 81 3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree,
82 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes
Copyright © Acronis, Inc., 2000-2010 83 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap
Copyright © Acronis, Inc., 2000-2010 84 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a
Copyright © Acronis, Inc., 2000-2010 85 What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not c
86 Copyright © Acronis, Inc., 2000-2010 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P
Copyright © Acronis, Inc., 2000-2010 87 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.
88 Copyright © Acronis, Inc., 2000-2010 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still b
Copyright © Acronis, Inc., 2000-2010 89 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 0
Copyright © Acronis, Inc., 2000-2010 9 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel
90 Copyright © Acronis, Inc., 2000-2010 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every m
Copyright © Acronis, Inc., 2000-2010 91 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not
92 Copyright © Acronis, Inc., 2000-2010 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block
Copyright © Acronis, Inc., 2000-2010 93 To view properties of an event, including the event source and event number 1. In Event Viewer, click the
94 Copyright © Acronis, Inc., 2000-2010 Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If
Copyright © Acronis, Inc., 2000-2010 95 time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that the b
96 Copyright © Acronis, Inc., 2000-2010 (2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the user h
Copyright © Acronis, Inc., 2000-2010 97 6 Direct management This section covers operations that can be performed directly on a managed machine by
98 Copyright © Acronis, Inc., 2000-2010 No backups have been created for X days Back up now The Dashboard warns you that no data was backed up on
Copyright © Acronis, Inc., 2000-2010 99 A backup plan is a set of rules that specify how the given data will be protected on a given machine. Physi
Comentarios a estos manuales