Update 3 Acronis® Backup & Recovery ™ 10 Workstation User's Guide
10 Copyright © Acronis, Inc., 2000-2010 1.2.1.2 "Actions and tools" pane The Actions and tools pane enables you to easily and efficientl
100 Copyright © Acronis, Inc., 2000-2010 5.6.5 Time since last backup Applies to: Windows, Linux Enables to put a backup task run on hold until t
101 Copyright © Acronis, Inc., 2000-2010 6 Direct management This section covers operations that can be performed directly on a managed machine by
102 Copyright © Acronis, Inc., 2000-2010 Create now will launch the Bootable Media Builder (p. 237). No backups have been created for X days Back
103 Copyright © Acronis, Inc., 2000-2010 Alternatively, you can review the task execution states in the Backup plans and tasks (p. 103) view and sp
104 Copyright © Acronis, Inc., 2000-2010 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one ta
105 Copyright © Acronis, Inc., 2000-2010 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK in
106 Copyright © Acronis, Inc., 2000-2010 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta
107 Copyright © Acronis, Inc., 2000-2010 6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guidelin
108 Copyright © Acronis, Inc., 2000-2010 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all
109 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p
11 Copyright © Acronis, Inc., 2000-2010 "Actions" bar on a managed machine and on a management server Tools Contains a list of the Acr
110 Copyright © Acronis, Inc., 2000-2010 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos
111 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
112 Copyright © Acronis, Inc., 2000-2010 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recovery o
113 Copyright © Acronis, Inc., 2000-2010 Progress The Progress tab is available while the task is running. It is common for all types of tasks. The
114 Copyright © Acronis, Inc., 2000-2010 Validation (if selected) - events before or after which the validation is performed, and validation sch
115 Copyright © Acronis, Inc., 2000-2010 View a log entry’s details 1. Select a log entry. 2. Do one of the following Click View Details. Th
116 Copyright © Acronis, Inc., 2000-2010 Configuring the log table By default, the table has seven columns that are displayed, others are hidden. I
117 Copyright © Acronis, Inc., 2000-2010 To create a backup plan, perform the following steps. General Plan name [Optional] Enter a unique name for
118 Copyright © Acronis, Inc., 2000-2010 Access credentials (p. 128) [Optional] Provide credentials for the location if the plan account does not h
119 Copyright © Acronis, Inc., 2000-2010 Virtualization server (p. 139) Here you select the resulting virtual machine type and location. Available
12 Copyright © Acronis, Inc., 2000-2010 and action pages according the items you select in the menu, Navigation tree, or on the Actions and Tools p
120 Copyright © Acronis, Inc., 2000-2010 Files Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Sel
121 Copyright © Acronis, Inc., 2000-2010 Windows The swap file (pagefile.sys) and the file that keeps the RAM content when the machine goes into hi
122 Copyright © Acronis, Inc., 2000-2010 6.2.6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For exampl
123 Copyright © Acronis, Inc., 2000-2010 Windows By file path C:\Finance\F.log Excludes the file named "F.log" located in the folder C:\
124 Copyright © Acronis, Inc., 2000-2010 To back up data to a locally attached tape device, expand the Tape drives group, then click the require
125 Copyright © Acronis, Inc., 2000-2010 This behavior can be suppressed by adding the [Date] variable (p. 128) to the archive name. If you do not
126 Copyright © Acronis, Inc., 2000-2010 Your script can move older backups based on the date stamp. See also “The *Date+ variable” (p. 128). E
127 Copyright © Acronis, Inc., 2000-2010 You want to swap the drives each Monday, so that one drive contains backups of the current week (Monday
128 Copyright © Acronis, Inc., 2000-2010 6.2.8.2 The [DATE] variable If you specify the [DATE] variable in the archive name, the file name of each
129 Copyright © Acronis, Inc., 2000-2010 The program will access the source data using the credentials of the backup plan account specified in the
13 Copyright © Acronis, Inc., 2000-2010 Action pages An action page appears in the main area when clicking any action item in the Actions menu, or
130 Copyright © Acronis, Inc., 2000-2010 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.
131 Copyright © Acronis, Inc., 2000-2010 Feb 5—Feb 11 D D D D W - - Feb 12—Feb 18 D D D D W - - Feb 19—Feb 25 D D D D M - - Feb 26—Mar 4 D D D D W
132 Copyright © Acronis, Inc., 2000-2010 Keep monthly backups indefinitely. Backup scheme parameters can then be set up as follows. Start bac
133 Copyright © Acronis, Inc., 2000-2010 Have a weekly summary of file changes since last month (Friday weekly differential backup). Have a m
134 Copyright © Acronis, Inc., 2000-2010 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p.
135 Copyright © Acronis, Inc., 2000-2010 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 to 2 days 1
136 Copyright © Acronis, Inc., 2000-2010 Incremental Specifies on what schedule and under which conditions to perform an incremental backup. If the
137 Copyright © Acronis, Inc., 2000-2010 Examples Weekly full backup The following scheme yields a full backup performed every Friday night. Full b
138 Copyright © Acronis, Inc., 2000-2010 Finally, we create retention rules for the archive: let us retain only backups that are no older than six
139 Copyright © Acronis, Inc., 2000-2010 Validation of the archive will validate all the archive’s backups and may take a long time and a lot of sy
14 Copyright © Acronis, Inc., 2000-2010 Acronis Backup & Recovery 10 remembers the changes you made on the action pages. For example, if you st
140 Copyright © Acronis, Inc., 2000-2010 Agent for Hyper-V is installed on the host You can choose between creating a virtual machine on the Hy
141 Copyright © Acronis, Inc., 2000-2010 A dynamic volume can be recovered over an existing volume, to unallocated space of a disk group, or to una
142 Copyright © Acronis, Inc., 2000-2010 after the recovery is started. The operating system boots from the backup image and the machine becomes op
143 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Run under the current user The task will run un
144 Copyright © Acronis, Inc., 2000-2010 After entering access credentials, the folders on the server become available. Click the appropriate folde
145 Copyright © Acronis, Inc., 2000-2010 The disk geometry is different to that stored in the backup. There are probably other times when you ma
146 Copyright © Acronis, Inc., 2000-2010 6.3.6.1 Disks Available disk destinations depend on the agents operating on the machine. Recover to: Phys
147 Copyright © Acronis, Inc., 2000-2010 NT signature When the MBR is selected along with the disk backup, you need to retain operating system boot
148 Copyright © Acronis, Inc., 2000-2010 If Acronis Backup & Recovery 10 Agent for Hyper-V or Agent for ESX/ESXi is installed. These agents en
149 Copyright © Acronis, Inc., 2000-2010 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. The Linux-styl
15 Copyright © Acronis, Inc., 2000-2010 File backup File-level data protection is based on backing up files and folders residing on the machine whe
150 Copyright © Acronis, Inc., 2000-2010 Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter
151 Copyright © Acronis, Inc., 2000-2010 set by the virtualization product. You can add virtual disks to the machine configuration or, in some case
152 Copyright © Acronis, Inc., 2000-2010 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders with names
153 Copyright © Acronis, Inc., 2000-2010 Password. The password for the account. 2. Click OK. 6.3.8 When to recover Select when to start the
154 Copyright © Acronis, Inc., 2000-2010 Universal Restore settings Automatic driver search Specify where the program will search for the Hardware
155 Copyright © Acronis, Inc., 2000-2010 With Acronis Backup & Recovery 10 Agent for Windows, you can recover a disk (volume) backup to a new v
156 Copyright © Acronis, Inc., 2000-2010 You will be taken to the Backup plans and tasks view where you can examine the state and progress of the r
157 Copyright © Acronis, Inc., 2000-2010 One part of the GRUB loader resides either in the first several sectors of the disk or in the first severa
158 Copyright © Acronis, Inc., 2000-2010 cp /mnt/system/boot/grub/grub.conf /mnt/system/boot/grub/grub.conf.backup 5. Edit the /mnt/system/boot/gr
159 Copyright © Acronis, Inc., 2000-2010 6.3.11.2 About Windows loaders Windows NT/2000/XP/2003 A part of the loader resides in the partition boot
16 Copyright © Acronis, Inc., 2000-2010 NTFS Ext2/Ext3/Ext4 ReiserFS3 - particular files cannot be recovered from disk backups located on
160 Copyright © Acronis, Inc., 2000-2010 To create a validation task, perform the following steps. General Task name [Optional] Enter a unique name
161 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma
162 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o
163 Copyright © Acronis, Inc., 2000-2010 The program will access the location using the credentials you specify. Use this option if the task accoun
164 Copyright © Acronis, Inc., 2000-2010 Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med
165 Copyright © Acronis, Inc., 2000-2010 ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port
166 Copyright © Acronis, Inc., 2000-2010 2. Click OK. According to the original FTP specification, credentials required for access to FTP servers
167 Copyright © Acronis, Inc., 2000-2010 6.7 Exporting archives and backups The export operation creates a copy of an archive or a self-sufficient
168 Copyright © Acronis, Inc., 2000-2010 The resulting archive's options The exported archive inherits the options of the original archive, in
169 Copyright © Acronis, Inc., 2000-2010 Task credentials (p. 169) [Optional] The export task will run on behalf of the user who is creating the ta
17 Copyright © Acronis, Inc., 2000-2010 Workstation 80 MB 1 GB 500 MB 1024*768 pixels or higher Bootable Media Builder (Windows) 80 MB 700 MB 300
170 Copyright © Acronis, Inc., 2000-2010 To learn more about operations available depending on the user privileges, see the User privileges on a ma
171 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o
172 Copyright © Acronis, Inc., 2000-2010 To export data to a personal vault, expand the Personal vaults group and click the vault. To export
173 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Use the task credentials The program will acces
174 Copyright © Acronis, Inc., 2000-2010 6.8.1.1 Acronis Secure Zone Disk The Acronis Secure Zone can be located on any fixed hard drive. Acronis
175 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi
176 Copyright © Acronis, Inc., 2000-2010 3. Specify the new size of the zone by: dragging the slider and selecting any size between the current
177 Copyright © Acronis, Inc., 2000-2010 (if you have GRUB). If the system fails to boot, you will be able to start the bootable rescue utility, by
178 Copyright © Acronis, Inc., 2000-2010 PE-based bootable media PE-based bootable media contains a minimal Windows system called Windows Preinstal
179 Copyright © Acronis, Inc., 2000-2010 Bootable Media or, as a separate component. The wizard will guide you through the necessary operations. Pl
18 Copyright © Acronis, Inc., 2000-2010 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
180 Copyright © Acronis, Inc., 2000-2010 If not configured, the Acronis loader waits for someone to select whether to boot the operating system
181 Copyright © Acronis, Inc., 2000-2010 vga=mode_number Specifies the video mode to be used by the bootable media's graphical user interface.
182 Copyright © Acronis, Inc., 2000-2010 These calls might not work properly on some machines. But this may be the only way to get the interrupt ro
183 Copyright © Acronis, Inc., 2000-2010 the default port the currently used port the new port (enter the port number). If the port has no
184 Copyright © Acronis, Inc., 2000-2010 To add Acronis Plug-in to WinPE 1.x: 1. Unpack all files of your WinPE 1.x ISO to a separate folder on th
185 Copyright © Acronis, Inc., 2000-2010 4. Specify network settings (p. 182) for the machine network adapters or choose DHCP auto configuration.
186 Copyright © Acronis, Inc., 2000-2010 11. Specify the output folder and the full path to the resulting ISO file including the file name or the m
187 Copyright © Acronis, Inc., 2000-2010 After entering access credentials, you will see a list of archives located in the vault. 6.10.3.1 Settin
188 Copyright © Acronis, Inc., 2000-2010 6.10.4 List of commands and utilities available in Linux-based bootable media Linux-based bootable media
189 Copyright © Acronis, Inc., 2000-2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdu
19 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
190 Copyright © Acronis, Inc., 2000-2010 To create the volume structure by using a script 1. Boot the machine from a Linux-based bootable media. 2
191 Copyright © Acronis, Inc., 2000-2010 Example Suppose that you previously performed a disk backup of a machine with the following disk configura
192 Copyright © Acronis, Inc., 2000-2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size
193 Copyright © Acronis, Inc., 2000-2010 2. Use the --mount command, specifying the volume's index in the -i parameter. For example: trueimag
194 Copyright © Acronis, Inc., 2000-2010 6.11.2 Running Acronis Disk Director Lite You can run Acronis Disk Director Lite under Windows or start i
195 Copyright © Acronis, Inc., 2000-2010 Starting the operations Any operation can be launched: From the volume or disk context menu (both in th
196 Copyright © Acronis, Inc., 2000-2010 3. In the window, you will be able to set the disk partitioning scheme (MBR or GPT) and the disk type (ba
197 Copyright © Acronis, Inc., 2000-2010 But with the wide range of available hardware it is normal that the target disk would differ in size from
198 Copyright © Acronis, Inc., 2000-2010 5. Wait until the machine is turned off. 6. Disconnect either the source or the target hard disk drive f
199 Copyright © Acronis, Inc., 2000-2010 If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
200 Copyright © Acronis, Inc., 2000-2010 6.11.5.6 Disk conversion: dynamic to basic You would want to convert dynamic disks back to basic ones, e
201 Copyright © Acronis, Inc., 2000-2010 Online The online status means that a disk is accessible in the read-write mode. This is the normal dis
202 Copyright © Acronis, Inc., 2000-2010 Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can
203 Copyright © Acronis, Inc., 2000-2010 Its pages will enable you to enter operation parameters, proceeding step-by-step further on and return to
204 Copyright © Acronis, Inc., 2000-2010 If you are creating a dynamic volume and select one or several basic disks, as its destination, you will r
205 Copyright © Acronis, Inc., 2000-2010 A Basic disk can contain up to four primary volumes. If they already exist, the disk will have to be conve
206 Copyright © Acronis, Inc., 2000-2010 Please note, that due to setting the new active volume, the former active volume letter might be changed a
207 Copyright © Acronis, Inc., 2000-2010 3. By clicking OK in the Change label window, you'll add the pending operation of changing the volum
208 Copyright © Acronis, Inc., 2000-2010 The Disk management view contains the toolbar with icons to launch the Undo, Redo and Commit actions inten
209 Copyright © Acronis, Inc., 2000-2010 7 Online backup This section provides details about using the Acronis Backup & Recovery 10 Online ser
21 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
210 Copyright © Acronis, Inc., 2000-2010 7.1.3 How long will my backups be kept in the online storage? Your backups remain in the online storage
211 Copyright © Acronis, Inc., 2000-2010 7.1.5.3 Can I use Acronis Universal Restore when recovering a system from the online storage? Yes. Acroni
212 Copyright © Acronis, Inc., 2000-2010 7.1.6.1 What is Initial Seeding? Initial Seeding is an extra service that lets you save an initial full b
213 Copyright © Acronis, Inc., 2000-2010 Having purchased a license from an Acronis partner, you receive a confirmation e-mail with a registration
214 Copyright © Acronis, Inc., 2000-2010 Packaging If possible, use the original packaging. Otherwise, packaging materials can be obtained at any s
215 Copyright © Acronis, Inc., 2000-2010 Step 4 Choose the transport company that you will use for shipping. On this company's web site, pre
216 Copyright © Acronis, Inc., 2000-2010 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending your hard driv
217 Copyright © Acronis, Inc., 2000-2010 The order has been completed. The media has been returned (or: Returning the media was not requested) –
218 Copyright © Acronis, Inc., 2000-2010 7.1.7.6 Can I obtain backups taken from a number of machines on a single hard drive? No. A separate hard
219 Copyright © Acronis, Inc., 2000-2010 7.1.8 Subscription lifecycle FAQ This section explains a subscription lifecycle and subscription operatio
22 Copyright © Acronis, Inc., 2000-2010 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
220 Copyright © Acronis, Inc., 2000-2010 An expired subscription can be renewed within five days after expiration. In such cases, the new subscript
221 Copyright © Acronis, Inc., 2000-2010 7.2 Where do I start? On the Acronis Web site, log in to your account (create one if you are not register
222 Copyright © Acronis, Inc., 2000-2010 the backup will fail. With a server subscription, you can only back up the Windows host. With a subscripti
223 Copyright © Acronis, Inc., 2000-2010 Reassigning a subscription does not restart its subscription period. To assign an activated subscription t
224 Copyright © Acronis, Inc., 2000-2010 After reassigning Delete backups from Subscription 1 using Machine 2. You cannot delete backups from Subsc
225 Copyright © Acronis, Inc., 2000-2010 Dual destination (p. 67) By using the Backup performance > Network connection speed option, you can
226 Copyright © Acronis, Inc., 2000-2010 Reassign a subscription Assign a subscription that is already activated, to a different machine. Registrat
227 Copyright © Acronis, Inc., 2000-2010 8 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
228 Copyright © Acronis, Inc., 2000-2010 Limitation: requires re-activation of loaders other than Windows loaders and GRUB. Agent (Acronis Backup
229 Copyright © Acronis, Inc., 2000-2010 Backup options Configuration parameters of a backup operation (p. 228), such as pre/post backup commands,
23 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
230 Copyright © Acronis, Inc., 2000-2010 4. On each machine, the agent (p. 228) installed on the machine finds data items using the selection rule
231 Copyright © Acronis, Inc., 2000-2010 Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be cre
232 Copyright © Acronis, Inc., 2000-2010 Cleanup Deleting backups (p. 228) from a backup archive (p. 228) in order to get rid of outdated backups o
233 Copyright © Acronis, Inc., 2000-2010 Direct management Any management operation that is performed on a managed machine (p. 236) using the direc
234 Copyright © Acronis, Inc., 2000-2010 222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/
235 Copyright © Acronis, Inc., 2000-2010 the administrator changes the criteria so that the machine does not meet them anymore. There is no way
236 Copyright © Acronis, Inc., 2000-2010 F Full backup A self-sufficient backup (p. 228) containing all data chosen for backup. You do not need acc
237 Copyright © Acronis, Inc., 2000-2010 Managed vault A centralized vault (p. 231) managed by a storage node (p. 238). Archives (p. 228) in a mana
238 Copyright © Acronis, Inc., 2000-2010 Plan See Backup plan (p. 229). Policy See Backup policy (p. 229). R Recovery point Date and time to whic
239 Copyright © Acronis, Inc., 2000-2010 prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
24 Copyright © Acronis, Inc., 2000-2010 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Creation
240 Copyright © Acronis, Inc., 2000-2010 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolog
241 Copyright © Acronis, Inc., 2000-2010 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 236) is considered vi
25 Copyright © Acronis, Inc., 2000-2010 When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task
26 Copyright © Acronis, Inc., 2000-2010 “sons”; weekly backups are referred to as “fathers”; the longest lived monthly backups are called “grandfat
27 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
28 Copyright © Acronis, Inc., 2000-2010 “D” stands for the backup that is considered Daily. “W” stands for the backup that is considered Weekly. “M
29 Copyright © Acronis, Inc., 2000-2010 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ...7 1.1 A
30 Copyright © Acronis, Inc., 2000-2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
31 Copyright © Acronis, Inc., 2000-2010 the pattern starts with a full backup since the very first backup cannot be incremental the scheme fo
32 Copyright © Acronis, Inc., 2000-2010 1. Delete backups older than This is a time interval counted back from the moment when the retention rules
33 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
34 Copyright © Acronis, Inc., 2000-2010 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
35 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to una
36 Copyright © Acronis, Inc., 2000-2010 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v
37 Copyright © Acronis, Inc., 2000-2010 device (tape drive or tape library) by... Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - -
38 Copyright © Acronis, Inc., 2000-2010 6. Acronis Active Restore (p. 227) is not available when recovering from a tape. Recovery from a locally a
39 Copyright © Acronis, Inc., 2000-2010 Type of event OID: 1.3.6.1.4.1.24769.100.200.1.0 Value: "Unknown" Text description of the e
3.3.1 Default backup options ...
40 Copyright © Acronis, Inc., 2000-2010 With the new Acronis Secure Zone behavior, you obtain the ability to: list archives located in the zone
41 Copyright © Acronis, Inc., 2000-2010 2.11.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recover
42 Copyright © Acronis, Inc., 2000-2010 Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply i
43 Copyright © Acronis, Inc., 2000-2010 How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. A
44 Copyright © Acronis, Inc., 2000-2010 5. Once the system recovery is started, the operating system boots from the backup. The Acronis Active Res
45 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphi
46 Copyright © Acronis, Inc., 2000-2010 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
47 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
48 Copyright © Acronis, Inc., 2000-2010 Use the Types of events to log check box to filter the events to be logged in the Application Event Log of
49 Copyright © Acronis, Inc., 2000-2010 3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine
6.3.8 When to recover ...
50 Copyright © Acronis, Inc., 2000-2010 3. In Port, specify the port number of the proxy server—for example: 80 4. If the proxy server requires a
51 Copyright © Acronis, Inc., 2000-2010 Availability of the backup options The set of available backup options depends on: The environment the a
52 Copyright © Acronis, Inc., 2000-2010 Media components (p. 66) Dest: removable media Dest: removable media - - Error handling (p. 66): Do not sho
53 Copyright © Acronis, Inc., 2000-2010 To protect the archive from unauthorized access 1. Select the Set password for the archive check box. 2.
54 Copyright © Acronis, Inc., 2000-2010 Exclude files matching the following criteria Select this check box to skip files and folders whose name
55 Copyright © Acronis, Inc., 2000-2010 The following scheme illustrates when pre/post commands are executed. Pre-backup command Backup Post-backup
56 Copyright © Acronis, Inc., 2000-2010 execution fails. Post-backup command To specify a command/executable file to be executed after the backup
57 Copyright © Acronis, Inc., 2000-2010 3. Click OK. Pre-data capture command To specify a command/batch file to be executed before data capture
58 Copyright © Acronis, Inc., 2000-2010 Result Preset Continue the backup only after the command is successfully executed. Delete the TIB file and
59 Copyright © Acronis, Inc., 2000-2010 When this option is set to Enable, snapshots of all volumes being backed up will be created simultaneously.
7.1.7 Large Scale Recovery FAQ ...
60 Copyright © Acronis, Inc., 2000-2010 The optimal data compression level depends on the type of data being backed up. For example, even maximum c
61 Copyright © Acronis, Inc., 2000-2010 Backing up to a fixed hard disk (for example, to Acronis Secure Zone) may slow performance of the operating
62 Copyright © Acronis, Inc., 2000-2010 To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notificatio
63 Copyright © Acronis, Inc., 2000-2010 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the ser
64 Copyright © Acronis, Inc., 2000-2010 The option defines whether the agent(s) operating on the managed machine have to send the log events of the
65 Copyright © Acronis, Inc., 2000-2010 Automatic With this setting, Acronis Backup & Recovery 10 will act as follows. When backing up to a
66 Copyright © Acronis, Inc., 2000-2010 To completely eliminate this kind of problem, disable preserving file security settings in archives. The re
67 Copyright © Acronis, Inc., 2000-2010 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can set
68 Copyright © Acronis, Inc., 2000-2010 You might have to provide the access credentials for the secondary destination. Enter the credentials on pr
69 Copyright © Acronis, Inc., 2000-2010 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up data
7 Copyright © Acronis, Inc., 2000-2010 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
70 Copyright © Acronis, Inc., 2000-2010 This option is effective when backing up to a removable media (CD, DVD, tape or floppy disk.) The preset i
71 Copyright © Acronis, Inc., 2000-2010 This option is effective for Windows and Linux operating systems and bootable media, when the backup destin
72 Copyright © Acronis, Inc., 2000-2010 The environment the agent operates in (Windows, bootable media) The type of data being recovered (dis
73 Copyright © Acronis, Inc., 2000-2010 SNMP (p. 77) + + - - 3.3.2.1 Pre/Post commands This option is effective for Windows and Linux operating s
74 Copyright © Acronis, Inc., 2000-2010 command is successfully executed. Fail the task if the command execution failed. executed despite execution
75 Copyright © Acronis, Inc., 2000-2010 The preset is: Recover files with their security settings. If the file NTFS permissions were preserved duri
76 Copyright © Acronis, Inc., 2000-2010 Port – set the port of the SMTP server. By default, the port is set to 25. User name – enter the user
77 Copyright © Acronis, Inc., 2000-2010 To select whether to log the recovery operations events in the Application Event Log of Windows: Select one
78 Copyright © Acronis, Inc., 2000-2010 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With the silent mo
79 Copyright © Acronis, Inc., 2000-2010 The option defines whether to reboot the machine automatically if it is required for recovery. Such might b
8 Copyright © Acronis, Inc., 2000-2010 3. Connect the console to the machine where the agent is installed. Where to go from here For what to do ne
80 Copyright © Acronis, Inc., 2000-2010 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is
81 Copyright © Acronis, Inc., 2000-2010 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to
82 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display
83 Copyright © Acronis, Inc., 2000-2010 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vaul
84 Copyright © Acronis, Inc., 2000-2010 2. Move the archives to vault B manually by means of a third-party file manager. 3. Edit the backup plans
85 Copyright © Acronis, Inc., 2000-2010 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes
86 Copyright © Acronis, Inc., 2000-2010 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap
87 Copyright © Acronis, Inc., 2000-2010 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a
88 Copyright © Acronis, Inc., 2000-2010 The specified period of time has passed since the last successful backup completed The scheduler behavior,
89 Copyright © Acronis, Inc., 2000-2010 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters ar
9 Copyright © Acronis, Inc., 2000-2010 tree, or on the Actions and Tools pane. Menu bar Appears across the top of the program window and lets you
90 Copyright © Acronis, Inc., 2000-2010 task's recurrences is 4 hours, and between the third, fourth and fifth is 2 hours. In this case, the o
91 Copyright © Acronis, Inc., 2000-2010 Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certai
92 Copyright © Acronis, Inc., 2000-2010 Thursday: every 3 hours from 9 AM till 9 PM Friday: twice at 12 PM and 9 PM (i.e. same as on Monday)
93 Copyright © Acronis, Inc., 2000-2010 Every: <...> From: <...> Until: <...> Set up how many times the task will be run during t
94 Copyright © Acronis, Inc., 2000-2010 To: 12/01/2010. Actually the task will end on the last workday of November. By setting up this date we just
95 Copyright © Acronis, Inc., 2000-2010 For example, you may want to set up a backup plan that will automatically perform an emergency full backup
96 Copyright © Acronis, Inc., 2000-2010 WindowsUpdateClient and event number 18 into the System log; the type of this event is Information. When cr
97 Copyright © Acronis, Inc., 2000-2010 5.6 Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with res
98 Copyright © Acronis, Inc., 2000-2010 Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s). As a resu
99 Copyright © Acronis, Inc., 2000-2010 Condition: Fits the time interval, from 04:30:00 PM until 10:00:00 PM. Task start conditions: Skip th
Comentarios a estos manuales