Many
Manuals
search
Categorias
Marcas
Inicio
ACRONIS
Software De Recuperación De Copia De Seguridad
Backup & Recovery 11
Guía de usuario
ACRONIS Backup & Recovery 11 Guía de usuario Pagina 238
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
379
Tabla de contenidos
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
238
Copyr
i
ght ©
Acronis
,
In
c., 2000-20
1
1
acronis
asamba
lash
Linux commands
and utilities
busybox
ifco
nfig
rm
cat
init
rmmod
cdre
cord
insmod
route
chmod
iscs
iadm
scp
chown
kill
scsi_id
chroot
kpartx
sed
cp
ln
sg_m
ap26
dd
ls
sh
df
lspci
sleep
dmesg
lvm
ssh
dmraid
mdadm
sshd
e2fsck
mkdir
strace
e2label
mke2fs
swapoff
echo
mknod
swapon
egrep
mkswap
sysinfo
fdisk
more
tar
fsck
mount
tune2fs
fxload
mtx
udev
gawk
mv
udev
info
gpm
pcca
rdctl
udev
start
grep
ping
umount
grow
isofs
pkts
etup
uuidgen
grub
powe
roff
vconfig
gunzip
ps
vi
halt
raid
autorun
zcat
hexdump
readcd
hotplug
reboot
1
2
...
233
234
235
236
237
238
239
240
241
242
243
...
378
379
User Guide
1
Table of contents
3
All editions
9
All advanced editions
10
Virtual Edition
11
1.2.1 Agent for Windows
12
1.2.2 Agent for Linux
13
1.2.4 Agent for Hyper-V
14
1.2.6 Management Console
15
1.3 Supported file systems
16
1.4 Technical Support
17
2 Getting started
18
Step 2. Running
19
Step 3. Bootable media
19
Step 4. Connection
19
Step 5. Backup
19
Step 6. Recovery
20
Step 7. Management
20
Navigation tree
22
Shortcuts bar
23
2.1.2.1 Views
24
2.1.2.2 Action pages
25
Action page - Controls
26
2.1.3 Console options
27
2.1.3.4 Pop-up messages
28
2.1.3.5 Startup page
29
3.1 Owners and credentials
30
Full backup
32
Incremental backup
32
Differential backup
33
Backing up dynamic volumes
34
Recovering dynamic volumes
34
(Linux)
36
Mounting backup volumes
41
Common installation rule
42
Common backup rule
42
3.7 Support for SNMP
43
Value: "?00000000"
44
4 Backup
45
How to back up
46
Plan parameters
46
To specify credentials
50
4.2.5 Backup schemes
51
4.2.5.2 Run now scheme
52
Examples
53
At a glance
55
Parameters
55
Roll-back period
59
4.2.5.6 Manual start
60
4.2.5.7 Initial seeding
60
1. Selecting the destination
61
4.2.7 Archive validation
63
Parameters specification
64
4.3.1 Usage examples
66
4.4 Scheduling
69
Schedule
70
Condition
70
4.4.1 Daily schedule
71
first at 8 AM
72
second at 12 PM (noon)
72
third at 3 PM
72
fourth at 5 PM
72
fifth at 7 PM
72
4.4.2 Weekly schedule
73
4.4.3 Monthly schedule
75
Use Wake-on-LAN
79
4.4.7 Conditions
81
4.4.7.1 User is idle
82
4.4.7.3 Fits time interval
82
4.4.7.4 User logged off
83
Example:
84
4.5.1 Supported locations
85
Restrictions
86
Simple scheme
87
Tower of Hanoi scheme
87
Custom scheme
87
4.5.6 Usage examples
89
Convert to virtual machine
92
4.7 Default backup options
95
4.7.1 Additional settings
97
4.7.2 Archive protection
98
4.7.3 Backup cataloging
99
4.7.4 Backup performance
100
4.7.5 Backup splitting
101
4.7.6 Compression level
102
4.7.8 Error handling
103
4.7.9 Event tracing
104
4.7.12 File-level security
106
4.7.13 LVM snapshotting
106
4.7.14 Media components
107
4.7.15 Mount points
108
4.7.17 Notifications
109
4.7.18 Pre/Post commands
110
4.7.18.1 Pre-backup command
111
4.7.22 Tape management
114
Eject tape
115
Always use a free tape
115
Skip the task execution
117
Use VSS
117
Do not use VSS
118
Volume shadow copy writers
118
5 Recovery
119
Where to recover
120
When to recover
120
Task parameters
120
5.1.1 What to recover
121
5.1.1.2 Data catalog
123
5.1.4 Where to recover
125
Recover to:
126
Disks/volumes
126
Disk #:
126
Disk destination
127
NT signature
127
MBR destination
129
Volume destination
129
Changing volume properties
130
Size and location
130
File system
130
Volume (partition) alignment
131
Recovery exclusions
132
5.1.5 When to recover
133
5.1.6 Task credentials
133
During recovery
134
Without recovery
135
Preparation
135
Universal Restore settings
136
The recovery process
136
5.3.1 Recovering volumes
138
5.3.2 Recovering disks
139
5.4 Acronis Active Restore
141
Supported operating systems
142
Limitation
142
How it works
142
Usage scenarios
142
How to use
142
Post-conversion operations
144
Storage
145
Processors
146
5.6.2 About Windows loaders
149
5.7.1 Additional settings
151
5.7.2 Error handling
152
5.7.3 Event tracing
152
5.7.4 File-level security
153
5.7.5 Mount points
154
5.7.6 Notifications
154
5.7.7 Pre/Post commands
155
5.7.8 Recovery priority
157
6.1 Vaults
158
6.1.1 Working with vaults
159
6.1.2 Centralized vaults
160
User accounts
163
Vault path
164
Deduplication database path
164
Vault encryption
164
Vault administrators
165
Vault users
165
6.1.3 Personal vaults
167
Metadata
168
Creating a personal vault
169
6.2 Acronis Secure Zone
170
To set up a password
171
To disable password
171
6.2.1.4 Result confirmation
172
6.3 Tape devices
173
6.3.2.2 Supported hardware
174
Backup options
175
Backup schemes
175
6.3.2.5 Parallel operations
176
6.3.2.6 Limitations
176
Prerequisites
177
Before backing up
177
Results
178
Backing up
178
6.3.4 Tape management
181
6.3.4.2 Tape pools
182
Separating filled tapes
182
Creating a pool
183
Editing a pool
183
Deleting a pool
183
Renaming
184
Changing pool
184
Moving to another slot
184
Ejecting
185
Erasing
185
Rescanning
186
Inventorying
187
Removing
188
6.3.5 Vaults on tapes
189
6.3.6 Usage examples
190
Sequence of actions
191
6.4 Storage nodes
193
Cleanup and validation
194
Deduplication
194
Encryption
194
Setting up the storage node
195
Backup to the storage node
195
Managing storage nodes
195
To access actions
197
Storage node properties
198
Template
199
Other parameters
201
6.4.7 Deduplication
204
Deduplication database
205
Deduplication at source
205
Deduplication at target
206
Compacting
207
File-level backup
210
What to validate
211
7.1.1 Archive selection
212
7.1.2 Backup selection
212
7.1.3 Vault selection
212
7.1.5 When to validate
213
7.1.6 Task credentials
214
What to export
216
7.2.1 Archive selection
217
7.2.2 Backup selection
217
7.2.4 Destination selection
218
2. Using the archives table
219
3. Naming the new archive
219
7.3 Mounting an image
220
7.3.1 Archive selection
221
7.3.2 Backup selection
222
7.3.3 Access credentials
222
7.3.4 Volume selection
222
Exploring images
223
Unmounting images
223
8 Bootable media
227
Linux-based bootable media
228
PE-based bootable media
228
Using Bart PE
229
8.1.1.1 Kernel parameters
230
8.1.1.2 Network settings
231
8.1.1.3 Network port
232
\winpe_x86\ISO
235
Linux commands and utilities
238
8.6 Acronis PXE Server
239
8.6.3 Work across subnets
241
9 Disk management
242
9.6 Disk operations
244
9.6.2 Basic disk cloning
245
Using advanced options
246
System disk conversion
249
9.7 Volume operations
250
Select destination disks
252
Set the volume size
253
Set the volume options
253
9.7.2 Delete volume
254
9.7.3 Set active volume
255
9.7.4 Change volume letter
255
9.7.5 Change volume label
256
9.7.6 Format volume
256
9.8 Pending operations
257
10.1 Backup plans and tasks
258
10.1.2.3 Task states
262
10.1.2.4 Task statuses
262
Usage examples
263
Adjusting credentials
263
Steps to perform
263
Example
265
Editing the export file
266
10.1.5 Backup plan details
267
10.2 Log
269
10.3 Alerts
270
Accepting alerts
271
Configuring alerts
271
10.5.2 Alerts
272
10.5.3 E-mail notifications
273
10.5.4 Event tracing
274
Windows
275
10.5.5 Log cleanup rules
276
10.5.6 Machine management
276
10.5.7 Online backup proxy
277
11 Centralized management
279
Local connection
280
Remote connection
280
Example 1
282
Example 2
283
On a domain controller
284
New accounts
285
Existing accounts
285
Tips for further usage
285
11.1.3.5 SSL certificates
288
Self-signed certificates
289
Non-self-signed certificates
289
Note on Windows machines
294
2. Naming the archives
297
Management Server
298
11.3.2 Machines with agents
299
11.3.2.1 Machine groups
300
Grouping actions
302
Direct management
302
Other actions
303
Text file requirements
304
Adding machines to a group
305
Machine details
306
11.3.2.3 Actions on groups
308
Adding multiple criteria
309
Move one group to another
311
Editing custom groups
311
Group details
311
11.3.3 Virtual machines
312
Typical workflow
313
Recovery task (p. 119)
314
Validation task (p. 211)
314
11.3.5 Storage nodes
315
11.3.6 Licenses
316
11.3.6.3 Exporting licenses
317
11.3.6.4 Removing licenses
317
11.3.6.5 Revoking licenses
317
11.3.7 Reporting
318
Filters
319
Report view
319
Report coverage
321
11.3.7.7 Column selection
322
11.3.8 Alerts
323
11.3.9 Log
324
Click Details
325
11.3.10.1 Acronis WOL Proxy
326
11.3.10.2 Alerts
327
Alert management
327
Time-based alerts
327
Alert notifications
328
11.3.10.5 Event tracing
329
Windows event log
329
SNMP notifications
330
11.3.10.6 Logging level
330
Log cleanup rules
330
Connection parameters
342
Event tracing parameters
344
12 Online backup
346
Server uses a free license
347
12.1.7 Initial Seeding FAQ
349
Hard drive types
351
Packaging
351
To renew a subscription
357
To increase a storage quota
358
12.2 Where do I start?
359
Trial subscriptions
360
Operations
363
12.7 Terminology reference
364
13 Glossary
366
Backup plan (Plan)
368
Backup scheme
368
Bootable agent
368
Bootable media
369
Built-in group
369
Cataloging
369
Centralized backup plan
369
Centralized management
369
Centralized task
370
Centralized vault
370
Cleanup
370
Consolidation
370
Data catalog
371
Deduplicating vault
371
Disaster recovery plan (DRP)
372
Disk backup (Image)
372
Disk group
372
Dynamic disk
373
Dynamic group
373
Machine
376
Managed machine
376
Managed vault
376
Media builder
376
Virtual machine
379
Comentarios a estos manuales
Sin comentarios
Publish
Relacionado con productos y manuales para Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 11
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Guía de usuario
(404 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Recovery for MS Exchange, AAS, MNT, 5000-12499u Especificaciones
(116 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Recovery MS Exchange SBS Edition Especificaciones
(117 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Recovery for MS SQL Server, ESD, 1u, Standard, FRE Especificaciones
(93 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 11 Server f/Windows, 1srv, 1y, Level I, DEU Guía de usuario
(240 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Workstation, AAP, GOV/SV, L1, 50-499u, DEU Guía de usuario
(241 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Guía de usuario
(381 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server, UR, AAS, RNW, L2, 500-1249u, FRE Guía de usuario
(402 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Workstation Guía de usuario
(226 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS True Image Home 2011, Win, Mini Box, 1PC, EN Guía de usuario
(217 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Disk Director Server 10.0, AAP, MNT, L4, 2500-4999u, FRE Guía de usuario
(96 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Disk Director 11 Home Guía de usuario
(87 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition Manual
(17 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS True Image Home 2011 Netbook Edition, Win, MiniBox, DEU + 2GB USB-Stick Guía de usuario
(166 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Adv Workstation, AAS, RNW Std MNT, 50-499u, ENG Guía de usuario
(402 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Snap Deploy 3 for PCs, ESD, 1u, STD, FRE Especificaciones
(103 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Workstation Guía de usuario
(216 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Acronis Backup & Recovery 10 Advanced Workstation Guía de usuario
(390 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS True Image Home 2010 Netbook Edition Guía de usuario
(154 paginas)
Software De Recuperación De Copia De Seguridad ACRONIS Backup & Recovery 10 Advanced Workstation Guía de usuario
(369 paginas)
Imprimir documento
Imprimir pagina 238
Comentarios a estos manuales