Acronis Backup for Windows Server - User Guide Manual de usuario Pagina 1

Busca en linea o descarga Manual de usuario para Software Acronis Backup for Windows Server - User Guide. Acronis Backup for Windows Server - User Guide User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 269
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - Version 11.5 Update 5

Acronis Backup Version 11.5 Update 5 USER GUIDE APPLIES TO THE FOLLOWING PRODUCTS For Windows Server

Pagina 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2014 Basic support for Windows 8 and Windows Server 2012 (p. 32)  Install Acronis Backup & Rec

Pagina 3 - Table of contents

100 Copyright © Acronis International GmbH, 2002-2014 will suspend the database and flush all caches to ensure that all transactions are completed;

Pagina 4

101 Copyright © Acronis International GmbH, 2002-2014 5 Recovery When it comes to data recovery, first consider the most functional method: connect

Pagina 5

102 Copyright © Acronis International GmbH, 2002-2014 Where to recover This section appears after the required backup is selected and the type of da

Pagina 6

103 Copyright © Acronis International GmbH, 2002-2014 2. Selecting data The backed-up data can be selected using the Data view tab, or the Archive v

Pagina 7

104 Copyright © Acronis International GmbH, 2002-2014 Location Details Machine name Local machine Local folders If the archive is stored in

Pagina 8

105 Copyright © Acronis International GmbH, 2002-2014 4. Do any of the following:  Select the data to recover in the catalog tree, or in the ta

Pagina 9 - OS support

106 Copyright © Acronis International GmbH, 2002-2014 To specify credentials 1. Select one of the following:  Use the task credentials The softwa

Pagina 10

107 Copyright © Acronis International GmbH, 2002-2014 The selected disks will be recovered to the physical disks of the machine the console is conne

Pagina 11 - 1.7.2 Management Console

108 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. All the data stored on the target disk will be replaced by the backed-up data, s

Pagina 12 - 1.9 Supported file systems

109 Copyright © Acronis International GmbH, 2002-2014 1. If the disk or volume is recovered to its original location, the mapping process reproduce

Pagina 13 - 1.10 Technical Support

11 Copyright © Acronis International GmbH, 2002-2014 Console The console provides Graphical User Interface to the agents. Usage of the console is no

Pagina 14 - 2 Getting started

110 Copyright © Acronis International GmbH, 2002-2014 Existing virtual machine Available when the Acronis Backup Agent for Hyper-V or Agent for VMwa

Pagina 15 - Step 6. Management

111 Copyright © Acronis International GmbH, 2002-2014 Be careful! To be on the safe side, it is advisable to assign unique names to the volumes. T

Pagina 16 - Operations with pane

112 Copyright © Acronis International GmbH, 2002-2014 Volume (partition) alignment Acronis Backup automatically eliminates volume misalignment – a s

Pagina 17 - 2.1.2.1 Views

113 Copyright © Acronis International GmbH, 2002-2014 Files and folders will be recovered to the same path(s) as they are in the backup. For example

Pagina 18 - 2.1.2.2 Action pages

114 Copyright © Acronis International GmbH, 2002-2014 By mask (*) *.log F* Excludes all files with the .log extension Excludes all files and folders

Pagina 19 - 2.1.3 Console options

115 Copyright © Acronis International GmbH, 2002-2014 In addition, the operating system itself is sensitive to the type of firmware. When performing

Pagina 20 - 2.1.3.4 Pop-up messages

116 Copyright © Acronis International GmbH, 2002-2014 If the initialization may result in bootability loss, the software takes the partitioning styl

Pagina 21

117 Copyright © Acronis International GmbH, 2002-2014 The ability of the recovered system to boot up in different modes depends on the operating sys

Pagina 22 - 3.1 Owners

118 Copyright © Acronis International GmbH, 2002-2014 Original system Target hardware BIOS UEFI UEFI OS: non- convertible The target disk will be in

Pagina 23 - Task credentials

119 Copyright © Acronis International GmbH, 2002-2014 Usage scenarios 1. The system uptime is one of the efficiency criteria. Examples: Client-orie

Pagina 24 - Services of Acronis Backup

12 Copyright © Acronis International GmbH, 2002-2014 1.8 About using the product in the trial mode Before buying an Acronis Backup license, you may

Pagina 25

120 Copyright © Acronis International GmbH, 2002-2014 5.4 Bootability troubleshooting If a system was bootable at the time of backup, you expect th

Pagina 26 - Incremental backup

121 Copyright © Acronis International GmbH, 2002-2014 Solution: Reactivate the boot loader. You might also need to fix the loader configuration file

Pagina 27

122 Copyright © Acronis International GmbH, 2002-2014  The device on which the Linux kernel is located—typically, this is the boot partition or th

Pagina 28 - (Windows)

123 Copyright © Acronis International GmbH, 2002-2014 5.5 Reverting a Windows system to its factory settings If your Windows operating system was d

Pagina 29

124 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also

Pagina 30 - By disk specification

125 Copyright © Acronis International GmbH, 2002-2014 Set current date and time for recovered files This option is effective only when recovering fi

Pagina 31 - 3.10 Support for SNMP

126 Copyright © Acronis International GmbH, 2002-2014  When recovery completes successfully.  When recovery fails.  When user interaction is r

Pagina 32 - About the test message

127 Copyright © Acronis International GmbH, 2002-2014 Do not show messages and dialogs while processing (silent mode) The preset is: Disabled. With

Pagina 33 - Data Deduplication

128 Copyright © Acronis International GmbH, 2002-2014  Community – type the name of SNMP community to which both the host running SNMP management

Pagina 34

129 Copyright © Acronis International GmbH, 2002-2014 This option is effective only when you select for backup a folder that is higher in the folder

Pagina 35 - 4 Backup

13 Copyright © Acronis International GmbH, 2002-2014 1.10 Technical Support Maintenance and Support Program If you need assistance with your Acroni

Pagina 36 - Plan parameters

130 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the recovery only after the command is successfully executed. Fail the task if

Pagina 37

131 Copyright © Acronis International GmbH, 2002-2014 6 Conversion to a virtual machine Acronis Backup offers a number of ways of converting a disk

Pagina 38

132 Copyright © Acronis International GmbH, 2002-2014  During conversion which is part of a backup plan (p. 133), the software creates the virtual

Pagina 39 - Exclusion examples

133 Copyright © Acronis International GmbH, 2002-2014  Conversion of logical volumes to basic ones may also prevent the system from booting up. Fo

Pagina 40 - 1. Selecting the destination

134 Copyright © Acronis International GmbH, 2002-2014 Storage Choose the storage on the virtualization server or the folder to place the virtual mac

Pagina 41

135 Copyright © Acronis International GmbH, 2002-2014 You can choose the virtual machine type: VMware Workstation, Microsoft Virtual PC, Red Hat Ker

Pagina 42 - 4.2.6 Backup schemes

136 Copyright © Acronis International GmbH, 2002-2014 If you choose to create the virtual machine on a virtualization server The first conversion cr

Pagina 43 - 4.2.6.1 Simple scheme

137 Copyright © Acronis International GmbH, 2002-2014 6.2.3.1 Steps to perform To perform a recovery to a new virtual machine 1. Connect the conso

Pagina 44 - Parameters

138 Copyright © Acronis International GmbH, 2002-2014 deployed immediately after you click OK. Recovery will be performed by that agent. It will tak

Pagina 45 - Examples

139 Copyright © Acronis International GmbH, 2002-2014 Enter the name for the new virtual machine. If the backup was created by Agent for VMware or A

Pagina 46

14 Copyright © Acronis International GmbH, 2002-2014 2 Getting started Step 1. Installation These brief installation instructions enable you to

Pagina 47 - At a glance

140 Copyright © Acronis International GmbH, 2002-2014 6.3.2 Steps to perform To perform a recovery to a manually created virtual machine 1. [Optio

Pagina 48

141 Copyright © Acronis International GmbH, 2002-2014 7 Storing the backed up data 7.1 Vaults A vault is a location for storing backup archives. F

Pagina 49

142 Copyright © Acronis International GmbH, 2002-2014 7.1.1 Working with vaults This section briefly describes the main GUI elements of the selecte

Pagina 50 - Roll-back period

143 Copyright © Acronis International GmbH, 2002-2014 personal vault available to all users that can log on the system. Personal vaults are created

Pagina 51 - 4.2.6.5 Manual start

144 Copyright © Acronis International GmbH, 2002-2014 vault. Delete a vault Click Delete. The deleting operation actually removes only a shortcut

Pagina 52 - 4.2.7 Archive validation

145 Copyright © Acronis International GmbH, 2002-2014 7.2 Acronis Secure Zone Acronis Secure Zone is a secure partition that enables keeping backup

Pagina 53 - Parameters specification

146 Copyright © Acronis International GmbH, 2002-2014 The Acronis Secure Zone cannot be organized on a dynamic disk. To allocate space for Acronis S

Pagina 54

147 Copyright © Acronis International GmbH, 2002-2014  Acronis Secure Zone is always created at the end of the hard disk. When calculating the fin

Pagina 55

148 Copyright © Acronis International GmbH, 2002-2014 7.2.2.2 Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acro

Pagina 56 - 4.3.1 The [DATE] variable

149 Copyright © Acronis International GmbH, 2002-2014 When you back up using the Back up now feature or under bootable media, the removable device i

Pagina 57 - 4.3.3 Usage examples

15 Copyright © Acronis International GmbH, 2002-2014 Step 5. Recovery Recover (p. 101) To recover data, you need to select the backed-up data

Pagina 58

150 Copyright © Acronis International GmbH, 2002-2014 8 Operations with archives and backups 8.1 Validating archives and backups Validation is an

Pagina 59

151 Copyright © Acronis International GmbH, 2002-2014 Credentials (p. 152) [Optional] Provide credentials for accessing the source if the task accou

Pagina 60 - 4.4 Scheduling

152 Copyright © Acronis International GmbH, 2002-2014  To select a network share, expand the Network folders group, select the required networked

Pagina 61 - 4.4.1 Daily schedule

153 Copyright © Acronis International GmbH, 2002-2014 Specify the appropriate parameters as follows:  Date and time - the date and time when to st

Pagina 62

154 Copyright © Acronis International GmbH, 2002-2014 Example. When backing up data to a remote location through an unstable or low-bandwidth networ

Pagina 63 - 4.4.2 Weekly schedule

155 Copyright © Acronis International GmbH, 2002-2014 To access the Export page first select a validation object: an archive or a backup. 1. Select

Pagina 64

156 Copyright © Acronis International GmbH, 2002-2014 2. In the table to the right of the tree, select the archive. The table displays the names of

Pagina 65 - 4.4.3 Monthly schedule

157 Copyright © Acronis International GmbH, 2002-2014  To export data to a network share, expand the Network folders group, select the required ne

Pagina 66

158 Copyright © Acronis International GmbH, 2002-2014 The software will access the destination using the credentials you specify. Use this option if

Pagina 67

159 Copyright © Acronis International GmbH, 2002-2014 Select volumes to mount and configure the mount settings for every volume: assign a letter or

Pagina 68

16 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup Management Console - Welcome screen Key elements of the console workspace Name

Pagina 69 - 4.4.5 Conditions

160 Copyright © Acronis International GmbH, 2002-2014 2. Click OK. According to the original FTP specification, credentials required for access to

Pagina 70 - Example:

161 Copyright © Acronis International GmbH, 2002-2014 To perform operations with archives and backups 1. In the Navigation pane, select the vault w

Pagina 71 - 4.4.5.4 Users logged off

162 Copyright © Acronis International GmbH, 2002-2014 2. On the Archive view tab of the vault, select the archive. Then, expand the archive and cli

Pagina 72

163 Copyright © Acronis International GmbH, 2002-2014 8.4.3 Converting a backup to full When the chain of incremental backups in an archive becomes

Pagina 73 - 4.5.1 Supported locations

164 Copyright © Acronis International GmbH, 2002-2014 Please be aware that consolidation is just a method of deletion but not an alternative to dele

Pagina 74 - Simple scheme

165 Copyright © Acronis International GmbH, 2002-2014 9 Bootable media Bootable media Bootable media is physical media (CD, DVD, USB flash drive or

Pagina 75 - Custom scheme

166 Copyright © Acronis International GmbH, 2002-2014  When a machine is booted with a PE-based bootable media, you cannot select optical media su

Pagina 76 -  Consolidate these backups

167 Copyright © Acronis International GmbH, 2002-2014  User name and password to be entered on the console side at the connection to the agent. If

Pagina 77 - 4.5.5 Usage examples

168 Copyright © Acronis International GmbH, 2002-2014 Specifies the video mode to be used by the bootable media's graphical user interface. The

Pagina 78

169 Copyright © Acronis International GmbH, 2002-2014 9.1.1.2 Network settings While creating Acronis bootable media, you have an option to pre-con

Pagina 79 - 4.7 Default backup options

17 Copyright © Acronis International GmbH, 2002-2014 How to change the panes' borders 1. Point to the pane's border. 2. When the pointer

Pagina 80

170 Copyright © Acronis International GmbH, 2002-2014 If the port has not been pre-configured, the agent uses the default port number (9876.) This p

Pagina 81 - 4.7.1 Additional settings

171 Copyright © Acronis International GmbH, 2002-2014 4. Install Microsoft Core XML (MSXML) 5.0 or 6.0 Parser from this kit. 5. Install Windows AI

Pagina 82 - 4.7.3 Backup cataloging

172 Copyright © Acronis International GmbH, 2002-2014 5. [Optional] Select whether to enable or disable remote connections to a machine booted from

Pagina 83 - 4.7.4 Backup performance

173 Copyright © Acronis International GmbH, 2002-2014 Adding VLANs In the Network Settings window, you can add virtual local area networks (VLANs).

Pagina 84 - 4.7.5 Backup splitting

174 Copyright © Acronis International GmbH, 2002-2014 9.3.1 Setting up a display mode For a machine booted from media, a display video mode is dete

Pagina 85 - 4.7.6 Compression level

175 Copyright © Acronis International GmbH, 2002-2014 9.4 List of commands and utilities available in Linux-based bootable media Linux-based bootab

Pagina 86

176 Copyright © Acronis International GmbH, 2002-2014 grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 9.5

Pagina 87 - 4.7.8 E-mail notifications

177 Copyright © Acronis International GmbH, 2002-2014 10 Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume co

Pagina 88 - 4.7.9 Error handling

178 Copyright © Acronis International GmbH, 2002-2014 1. Back up the disk on which volumes will be created or managed. Having your most important d

Pagina 89 - 4.7.10 Event tracing

179 Copyright © Acronis International GmbH, 2002-2014 10.5 "Disk management" view Acronis Disk Director Lite is controlled through the Di

Pagina 90

18 Copyright © Acronis International GmbH, 2002-2014 Sorting, filtering and configuring table items The following is a guideline to sort, filter and

Pagina 91 - 4.7.14 Media components

180 Copyright © Acronis International GmbH, 2002-2014 10.6.1 Disk initialization If you add any new disk to your machine, Acronis Disk Director Lit

Pagina 92 - 4.7.15 Mount points

181 Copyright © Acronis International GmbH, 2002-2014 10.6.2.1 Selecting source and target disks The program displays a list of partitioned disks a

Pagina 93 - 4.7.17 Pre/Post commands

182 Copyright © Acronis International GmbH, 2002-2014 You have the following two alternatives to retain system bootability on the target disk volume

Pagina 94 - 4.7.17.1 Pre-backup command

183 Copyright © Acronis International GmbH, 2002-2014 Dynamic disk conversion: MBR to GPT Acronis Disk Director Lite does not support direct MBR t

Pagina 95

184 Copyright © Acronis International GmbH, 2002-2014 System disk conversion Acronis Disk Director Lite does not require an operating system reboot

Pagina 96

185 Copyright © Acronis International GmbH, 2002-2014  safe conversion of a dynamic disk to basic when it contains volumes with data for simple an

Pagina 97

186 Copyright © Acronis International GmbH, 2002-2014  Store backups (images) of other volumes/disks on a special volume;  Install a new operati

Pagina 98

187 Copyright © Acronis International GmbH, 2002-2014 and is able to overcome the physical disk size limitations with a higher than mirrored disk-to

Pagina 99 - Skip the task execution

188 Copyright © Acronis International GmbH, 2002-2014 To create a RAID-5 volume:  Select three destination disks to create the volume on. After yo

Pagina 100 - Enabling VSS Full backup

189 Copyright © Acronis International GmbH, 2002-2014 If you are creating a basic volume, which can be made into a system volume, this page will be

Pagina 101 - 5 Recovery

19 Copyright © Acronis International GmbH, 2002-2014 Using controls and specifying settings Use active controls to specify a backup plan or recovery

Pagina 102 - 5.1.1 What to recover

190 Copyright © Acronis International GmbH, 2002-2014 10.7.3 Set active volume If you have several primary volumes, you must specify one to be the

Pagina 103 - 2. Selecting data

191 Copyright © Acronis International GmbH, 2002-2014 an application volume, DATA — a data volume, etc., but it does not imply that only the type of

Pagina 104 - 5.1.1.2 Data catalog

192 Copyright © Acronis International GmbH, 2002-2014 10.8 Pending operations All operations, which were prepared by the user in manual mode or wit

Pagina 105

193 Copyright © Acronis International GmbH, 2002-2014 11 Protecting applications with disk-level backup This section describes how to use a disk-lev

Pagina 106 - 5.1.4 Where to recover

194 Copyright © Acronis International GmbH, 2002-2014 If the application databases are located on a number of machines, back up all of the machines

Pagina 107 - Disk destination

195 Copyright © Acronis International GmbH, 2002-2014 option is effective on a physical machine and on a virtual machine where Agent for Windows is

Pagina 108 - NT signature

196 Copyright © Acronis International GmbH, 2002-2014 Create Table ##temp ( DatabaseName sysname, Name sysname, physical_name nvarchar(5

Pagina 109 - Recover to:

197 Copyright © Acronis International GmbH, 2002-2014 Tracks how far Exchange has progressed in writing logged information to the database file. To

Pagina 110 - Volume destination

198 Copyright © Acronis International GmbH, 2002-2014 11.1.1.4 SharePoint database files SharePoint stores content, auxiliary SharePoint services&a

Pagina 111 - File system

199 Copyright © Acronis International GmbH, 2002-2014  Log file shrinking. Log file shrinking reduces the physical size of a log file by removing

Pagina 112 - Volume (partition) alignment

2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr

Pagina 113 - Recovery exclusions

20 Copyright © Acronis International GmbH, 2002-2014 If the option is enabled, the credentials for various locations that you enter during a console

Pagina 114 - 5.1.6 Task credentials

200 Copyright © Acronis International GmbH, 2002-2014 Where:  myServer - name of the server  instanceName - name of the instance  C:\myScrip

Pagina 115 - 5.2.1 Recovering volumes

201 Copyright © Acronis International GmbH, 2002-2014 1. Dismount the database (in Exchange 2010) or all databases of the storage group (in Exchang

Pagina 116 - 5.2.2 Recovering disks

202 Copyright © Acronis International GmbH, 2002-2014 2. In the mounted volumes, determine which logs have been committed to the database by using

Pagina 117

203 Copyright © Acronis International GmbH, 2002-2014  The volumes where the Active Directory database and the transaction logs (p. 197) are locat

Pagina 118 - 5.3 Acronis Active Restore

204 Copyright © Acronis International GmbH, 2002-2014 To bring a backed-up database back to production, recover the database files from a disk backu

Pagina 119 - How to use

205 Copyright © Acronis International GmbH, 2002-2014 b. Select the volume(s) containing the SQL Server database files. For the instructions on how

Pagina 120

206 Copyright © Acronis International GmbH, 2002-2014 By using Acronis Backup, you can recover Exchange database files from a disk backup. To bring

Pagina 121

207 Copyright © Acronis International GmbH, 2002-2014 11.3.3 Granular recovery of mailboxes RDB (RSG) is a special administrative database (storage

Pagina 122 - 5.4.2 About Windows loaders

208 Copyright © Acronis International GmbH, 2002-2014 Steps to perform If the domain has other domain controllers, you can perform nonauthoritative

Pagina 123

209 Copyright © Acronis International GmbH, 2002-2014  Changes to Active Directory that occurred after the backup had been made will be lost. 

Pagina 124 - 5.6.1 Additional settings

21 Copyright © Acronis International GmbH, 2002-2014 The preset is: Enabled. To make a selection, select or clear the Notify when the management con

Pagina 125 - 5.6.2 E-mail notifications

210 Copyright © Acronis International GmbH, 2002-2014 d. On the General tab, click Start. After the service starts, click OK. Details. This change

Pagina 126 - 5.6.3 Error handling

211 Copyright © Acronis International GmbH, 2002-2014 A USN rollback is unlikely to occur when you recover an entire domain controller from a VSS-ba

Pagina 127 - 5.6.4 Event tracing

212 Copyright © Acronis International GmbH, 2002-2014  Value name: Database restored from backup  Value data: 1 6. Restart the domain controlle

Pagina 128 - 5.6.6 Mount points

213 Copyright © Acronis International GmbH, 2002-2014 3. If you have recovered the database to a non-original SQL server of the original SharePoint

Pagina 129 - 5.6.7 Pre/Post commands

214 Copyright © Acronis International GmbH, 2002-2014 stsadm.exe -o addcontentdb -url <site url> -databasename <database> -databaseserve

Pagina 130 - 5.6.8 Recovery priority

215 Copyright © Acronis International GmbH, 2002-2014 c. To change the server on which you want to stop the service, in the Server list, click Chan

Pagina 131 - 6.1 Conversion methods

216 Copyright © Acronis International GmbH, 2002-2014 To recover SharePoint items from an unattached database 1. Attach the content database to an

Pagina 132 - Custom loader reactivation

217 Copyright © Acronis International GmbH, 2002-2014 12 Administering a managed machine This section describes the views that are available through

Pagina 133 - 6.2.2.1 Conversion settings

218 Copyright © Acronis International GmbH, 2002-2014 To Do View details of a plan/task Click Details. In the respective Plan Details (p. 226) or

Pagina 134

219 Copyright © Acronis International GmbH, 2002-2014 To Do Edit a plan/task Click Edit. Backup plan editing is performed in the same way as crea

Pagina 135 - Storage space

22 Copyright © Acronis International GmbH, 2002-2014 3 Understanding Acronis Backup This section attempts to give its readers a clear understanding

Pagina 136

220 Copyright © Acronis International GmbH, 2002-2014 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At

Pagina 137 - 6.2.3.1 Steps to perform

221 Copyright © Acronis International GmbH, 2002-2014 A task changes to the Running state when the event specified by the schedule occurs AND all th

Pagina 138

222 Copyright © Acronis International GmbH, 2002-2014  Deploying of a backup plan to multiple machines You want to use the same backup plan on mul

Pagina 139 - Choosing the disk interface

223 Copyright © Acronis International GmbH, 2002-2014 To change the encrypted password 1. In the command line, run the acronis_encrypt utility: acr

Pagina 140 - 6.3.2 Steps to perform

224 Copyright © Acronis International GmbH, 2002-2014 1. Add the <rules_type> tag with "disks" or "files" value, dependin

Pagina 141 - 7.1 Vaults

225 Copyright © Acronis International GmbH, 2002-2014 folder, the agent imports the backup plan from that file. If you change (or delete) an .xml fi

Pagina 142 - 7.1.2 Personal vaults

226 Copyright © Acronis International GmbH, 2002-2014 12.1.5 Backup plan details The Backup plan details window (also duplicated on the Information

Pagina 143 - Metadata

227 Copyright © Acronis International GmbH, 2002-2014  Name - name of the archive.  Location - name of the vault or path to the folder, where th

Pagina 144 - Creating a personal vault

228 Copyright © Acronis International GmbH, 2002-2014 Select multiple log entries  non-contiguous: hold down CTRL and click the log entries one by

Pagina 145 - 7.2 Acronis Secure Zone

229 Copyright © Acronis International GmbH, 2002-2014  Code - It can be blank or the program error code if the event type is error. Error code is

Pagina 146 - 7.2.1.4 Result confirmation

23 Copyright © Acronis International GmbH, 2002-2014 Backup plan's credentials Any backup plan running on a machine runs on behalf of a user. I

Pagina 147

230 Copyright © Acronis International GmbH, 2002-2014 12.4 Changing a license By changing the license, you switch a product from trial mode to full

Pagina 148 - 7.3 Removable devices

231 Copyright © Acronis International GmbH, 2002-2014 12.6 Adjusting machine options The machine options define the general behavior of all Acronis

Pagina 149

232 Copyright © Acronis International GmbH, 2002-2014 When enabled, you can specify the keeping period for the accepted alerts. The accepted alerts

Pagina 150 - What to validate

233 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encr

Pagina 151 - 8.1.3 Vault selection

234 Copyright © Acronis International GmbH, 2002-2014 This option is not available when operating under the bootable media. The option defines wheth

Pagina 152 - 8.1.5 When to validate

235 Copyright © Acronis International GmbH, 2002-2014 Linux To receive SNMP messages on a machine running Linux, the net-snmp (for RHEL and SUSE) or

Pagina 153 - 8.1.6 Task credentials

236 Copyright © Acronis International GmbH, 2002-2014 When the option is enabled, the program compares the actual log size with the maximum size aft

Pagina 154

237 Copyright © Acronis International GmbH, 2002-2014 13 Cloud backup This section provides details about using the Acronis Cloud Backup service. Th

Pagina 155 - 8.2.1 Archive selection

238 Copyright © Acronis International GmbH, 2002-2014 Example You might want to use the following backup strategy for a file server. Back up the c

Pagina 156 - 8.2.4 Destination selection

239 Copyright © Acronis International GmbH, 2002-2014 Windows Vista – all editions except for Vista Home Basic and Vista Home Premium (x86, x64) Win

Pagina 157 - 3. Naming the new archive

24 Copyright © Acronis International GmbH, 2002-2014 3.3 User privileges on a managed machine When managing a machine running Windows, the scope of

Pagina 158 - 8.3 Mounting an image

240 Copyright © Acronis International GmbH, 2002-2014 13.1.6.4 What if a network connection is lost during cloud backup or recovery? The software w

Pagina 159 - 8.3.3 Access credentials

241 Copyright © Acronis International GmbH, 2002-2014 Acronis uploads the backup to the cloud storage. After that, you can add incremental backups t

Pagina 160 - 8.3.4 Volume selection

242 Copyright © Acronis International GmbH, 2002-2014 13.1.7.8 How do I perform initial seeding? Preparing 1. Ensure that you have activated an Ac

Pagina 161

243 Copyright © Acronis International GmbH, 2002-2014 Hard drive types Acronis accepts hard disk drives of the following interface types: IDE, ATA,

Pagina 162

244 Copyright © Acronis International GmbH, 2002-2014 Step 4 Using the website of the shipping company that you chose, prepare and print two prepa

Pagina 163 - Limitations

245 Copyright © Acronis International GmbH, 2002-2014 Step 5 Securely seal the box with a sturdy tape. Then, stick the shipping label for sending yo

Pagina 164

246 Copyright © Acronis International GmbH, 2002-2014 specified). If a prepaid shipping label was not provided with the media, the media will be dis

Pagina 165 - 9 Bootable media

247 Copyright © Acronis International GmbH, 2002-2014 13.1.8.7 How to buy a Large Scale Recovery license? You can buy a Large Scale Recovery licens

Pagina 166

248 Copyright © Acronis International GmbH, 2002-2014 13.1.9.1 How do I access my account management webpage? Go to http://www.acronis.com/my/cloud

Pagina 167 - 9.1.1.1 Kernel parameters

249 Copyright © Acronis International GmbH, 2002-2014 Volume subscriptions To renew a volume subscription, go to the account management webpage, cli

Pagina 168

25 Copyright © Acronis International GmbH, 2002-2014 Service name Purpose Account used by the service Privileges added to the account User rights Gr

Pagina 169 - 9.1.1.3 Network port

250 Copyright © Acronis International GmbH, 2002-2014 13.1.9.8 Can I cancel my subscription? Just wait until the subscription expires. Refunds are

Pagina 170

251 Copyright © Acronis International GmbH, 2002-2014  Install Acronis Backup on the machine you want to back up, start the product, click Back up

Pagina 171

252 Copyright © Acronis International GmbH, 2002-2014 Example The diagram below shows what happens if you reassign a subscription to a different mac

Pagina 172 - Configuring network settings

253 Copyright © Acronis International GmbH, 2002-2014 2. On the Options menu, click Machine options. 3. Click Cloud backup proxy. 4. Enter the pr

Pagina 173 - Adding VLANs

254 Copyright © Acronis International GmbH, 2002-2014 13.7 Limitations of the cloud storage Unlike other types of storage available in Acronis Back

Pagina 174 - To add an NDAS device

255 Copyright © Acronis International GmbH, 2002-2014 Assign a subscription to a machine Reserve a subscription for a particular machine in order to

Pagina 175 - Linux-based bootable media

256 Copyright © Acronis International GmbH, 2002-2014 Renew a subscription Assign a subscription of the same type and with the same or a larger stor

Pagina 176 - Do not activate

257 Copyright © Acronis International GmbH, 2002-2014 14 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system o

Pagina 177 - 10 Disk management

258 Copyright © Acronis International GmbH, 2002-2014 Activity An action performed by Acronis Backup for achievement of some user goal. Examples: b

Pagina 178

259 Copyright © Acronis International GmbH, 2002-2014  the backup archive (p. 258) name and location  the backup scheme (p. 259). This includes

Pagina 179 - 10.6 Disk operations

26 Copyright © Acronis International GmbH, 2002-2014 3.5 Full, incremental and differential backups Acronis Backup provides the capability to use p

Pagina 180 - 10.6.2 Basic disk cloning

260 Copyright © Acronis International GmbH, 2002-2014  access and back up the data that has survived in a corrupted system  deploy an operating

Pagina 181 - Using advanced options

261 Copyright © Acronis International GmbH, 2002-2014 Centralized vault A networked location allotted by the management server (p. 266) administrato

Pagina 182

262 Copyright © Acronis International GmbH, 2002-2014 The centralized catalog available on the management server (p. 266) contains all data stored o

Pagina 183

263 Copyright © Acronis International GmbH, 2002-2014 Disk backup (Image) A backup (p. 258) that contains a sector-based copy of a disk or a volume

Pagina 184 - System disk conversion

264 Copyright © Acronis International GmbH, 2002-2014 LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) di

Pagina 185 - 10.7 Volume operations

265 Copyright © Acronis International GmbH, 2002-2014 In case the storage medium is stolen or accessed by an unauthorized person, the malefactor wil

Pagina 186

266 Copyright © Acronis International GmbH, 2002-2014 Indexing can be thought of as "deduplication at target", as opposed to "dedupli

Pagina 187 - Select destination disks

267 Copyright © Acronis International GmbH, 2002-2014 Management server (Acronis Backup Management Server) A central server that drives data protect

Pagina 188 - Set the volume options

268 Copyright © Acronis International GmbH, 2002-2014 Replenishable pool A tape pool that is allowed to take tapes from the Free tapes pool when req

Pagina 189 - 10.7.2 Delete volume

269 Copyright © Acronis International GmbH, 2002-2014 Tower of Hanoi A popular backup scheme (p. 259) aimed to maintain the optimal balance between

Pagina 190 - 10.7.5 Change volume label

27 Copyright © Acronis International GmbH, 2002-2014 Differential backup A differential backup stores changes to the data against the latest full ba

Pagina 191 - 10.7.6 Format volume

28 Copyright © Acronis International GmbH, 2002-2014 Linux A volume backup stores all files and directories of the selected volume independent of th

Pagina 192 - 10.8 Pending operations

29 Copyright © Acronis International GmbH, 2002-2014 simple/spanned, striped, mirrored, RAID 0+1, RAID-5) will not change. The target volume size ha

Pagina 193 - Back up entire machines

3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Introducing Acronis Backup ...

Pagina 194 - Truncating transaction logs

30 Copyright © Acronis International GmbH, 2002-2014 Acronis Backup includes a handy disk management utility which enables you to perform the above

Pagina 195

31 Copyright © Acronis International GmbH, 2002-2014  Microsoft BitLocker Drive Encryption  McAfee Endpoint Encryption  PGP Whole Disk Encrypt

Pagina 196 -  Checkpoint file (.chk)

32 Copyright © Acronis International GmbH, 2002-2014 The value may be "Information", "Warning", 'Error" and "Unkn

Pagina 197 - Exchange 2003

33 Copyright © Acronis International GmbH, 2002-2014 WinPE 4.0 and WinPE 5.0 Acronis Media Builder can create bootable media based on these versions

Pagina 198

34 Copyright © Acronis International GmbH, 2002-2014 3.12 Support for UEFI-based machines Acronis Backup can back up and recover machines that use

Pagina 199

35 Copyright © Acronis International GmbH, 2002-2014 4 Backup 4.1 Back up now Use the Back up now feature to configure and run a one-time backup i

Pagina 200

36 Copyright © Acronis International GmbH, 2002-2014 Select the mode the removable device will be used in (p. 148) If the specified location is an R

Pagina 201

37 Copyright © Acronis International GmbH, 2002-2014 [Optional] Enter a unique name for the backup plan. A conscious name lets you identify the plan

Pagina 202 - Volumes to back up

38 Copyright © Acronis International GmbH, 2002-2014 A file-level backup is not sufficient for recovery of the operating system. Choose file backup

Pagina 203 - Considerations for backup

39 Copyright © Acronis International GmbH, 2002-2014 Exclude all hidden files and folders Select this check box to skip files and folders that have

Pagina 204

4 Copyright © Acronis International GmbH, 2002-2014 4.2.6 Backup schemes ...

Pagina 205 - To attach a database

40 Copyright © Acronis International GmbH, 2002-2014 By name F.log F Excludes all files named "F.log" Excludes all folders named "F&q

Pagina 206

41 Copyright © Acronis International GmbH, 2002-2014 By selecting the existing archive, you are meddling in the area of another backup plan that use

Pagina 207

42 Copyright © Acronis International GmbH, 2002-2014 Destination Details FTP, SFTP To back up data to FTP or SFTP, type the server name or address

Pagina 208 - Recovery vs. re-creation

43 Copyright © Acronis International GmbH, 2002-2014 backup will be performed and select from these days the day of weekly/monthly backup. Then you

Pagina 209

44 Copyright © Acronis International GmbH, 2002-2014  Custom retention periods for backups of each type Description Let us suppose that we want to

Pagina 210 - Ntdsutil

45 Copyright © Acronis International GmbH, 2002-2014 Backup type Specifies the types of daily, weekly and monthly backups.  Always full - all the

Pagina 211 - USN rollback

46 Copyright © Acronis International GmbH, 2002-2014  Back up on: Workdays  Weekly/monthly: Friday  Keep backups:  Daily: 1 week  Weekly:

Pagina 212

47 Copyright © Acronis International GmbH, 2002-2014  Monthly: indefinitely Backup is thus performed only on Fridays. This makes Friday the only c

Pagina 213

48 Copyright © Acronis International GmbH, 2002-2014 Zone. This setting is not applicable to FTP and SFTP servers. This setting enables deletion of

Pagina 214

49 Copyright © Acronis International GmbH, 2002-2014 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demo

Pagina 215

5 Copyright © Acronis International GmbH, 2002-2014 5.1.5 When to recover ...

Pagina 216

50 Copyright © Acronis International GmbH, 2002-2014 schedule: a backup task will be run every 1 day at 10 AM) as well as more complex schedules (ex

Pagina 217 - 12.1 Backup plans and tasks

51 Copyright © Acronis International GmbH, 2002-2014 Number of levels Full backup every On different days, can go back Roll-back period 2 2 days 1 t

Pagina 218

52 Copyright © Acronis International GmbH, 2002-2014 4.2.6.6 Initial seeding This backup scheme is available when Acronis Cloud Storage is selected

Pagina 219

53 Copyright © Acronis International GmbH, 2002-2014 2. Specify:  User name. When entering the name of an Active Directory user account, be sure

Pagina 220 - 12.1.2.3 Task states

54 Copyright © Acronis International GmbH, 2002-2014 Windows 2000 Professional win2000ProGuest Windows 2000 Server win2000ServGuest Windows 2000 Adv

Pagina 221 - 12.1.2.4 Task statuses

55 Copyright © Acronis International GmbH, 2002-2014 Backup cataloging can be a time-consuming process. It is performed in parallel with the followi

Pagina 222 - How to modify credentials

56 Copyright © Acronis International GmbH, 2002-2014 Restrictions When using simplified file naming, the following functionality is not available: 

Pagina 223

57 Copyright © Acronis International GmbH, 2002-2014 This is because the full backups created at midnight were replaced by new full backups of the s

Pagina 224 - How it works

58 Copyright © Acronis International GmbH, 2002-2014 4.3.3.3 Example 3. Hourly backups within a day Consider the following scenario:  You want to

Pagina 225 - Editing the export file

59 Copyright © Acronis International GmbH, 2002-2014  You have two such drives. Either of them has drive letter D in the operating system when att

Pagina 226 - 12.1.5 Backup plan details

6 Copyright © Acronis International GmbH, 2002-2014 8.2.5 Access credentials for destination ...

Pagina 227 - 12.2 Log

60 Copyright © Acronis International GmbH, 2002-2014  The full backup of January 31, 2012, will be stored as ServerFiles[2012-01-31].tib.  The 1

Pagina 228 - 12.2.2 Log entry details

61 Copyright © Acronis International GmbH, 2002-2014 Condition: run the task only if User is idle (a screen saver is running or the machine is locke

Pagina 229 - 12.3 Alerts

62 Copyright © Acronis International GmbH, 2002-2014 Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's p

Pagina 230 - 12.4 Changing a license

63 Copyright © Acronis International GmbH, 2002-2014 First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00

Pagina 231 - 12.6.3 Alerts

64 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Fri. 2. Once at: 10:00:00 PM. 3. Effective: From: 05/13/2009. The ta

Pagina 232 - 12.6.4 E-mail settings

65 Copyright © Acronis International GmbH, 2002-2014 1. Every: 1 week(s) on: Mon, Fri. 2. Every: 9 hours From: 12:00:00 PM Until: 09:00:00 PM. 3.

Pagina 233 - 12.6.5 Event tracing

66 Copyright © Acronis International GmbH, 2002-2014 Examples "Last day of every month" schedule Run the task once at 10 PM on the last da

Pagina 234 - Windows

67 Copyright © Acronis International GmbH, 2002-2014 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2

Pagina 235 - 12.6.6 Log cleanup rules

68 Copyright © Acronis International GmbH, 2002-2014 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers

Pagina 236 - 12.6.7 Cloud backup proxy

69 Copyright © Acronis International GmbH, 2002-2014 To view properties of an event, including the event source and event number 1. In Event Viewer

Pagina 237 - 13 Cloud backup

7 Copyright © Acronis International GmbH, 2002-2014 11.1.2 Truncating transaction logs ...

Pagina 238 - Server operating systems

70 Copyright © Acronis International GmbH, 2002-2014 (1) If the user becomes idle before 9PM, the backup task will start at 9PM. (2) If the user bec

Pagina 239

71 Copyright © Acronis International GmbH, 2002-2014 (1) if the user logs off between 04:30:00 PM and 10:00:00 PM, the backup task will start immedi

Pagina 240 - 13.1.7 Initial Seeding FAQ

72 Copyright © Acronis International GmbH, 2002-2014 Example: Run the backup task at system startup, but only if more than 12 hours have passed sinc

Pagina 241

73 Copyright © Acronis International GmbH, 2002-2014  Using Acronis Cloud Backup to protect data from a natural disaster (p. 77) Replicate the arc

Pagina 242 - Creating subsequent backups

74 Copyright © Acronis International GmbH, 2002-2014 Restrictions  Copying or moving backups to and from optical discs (CD, DVD, Blu-ray discs) is

Pagina 243 - Packaging

75 Copyright © Acronis International GmbH, 2002-2014 The retention rules are applied after creating a backup. They are applied sequentially in the p

Pagina 244

76 Copyright © Acronis International GmbH, 2002-2014 You will be able to specify the location where to move the backups and set up retention rules f

Pagina 245

77 Copyright © Acronis International GmbH, 2002-2014 4.5.5 Usage examples This section provides examples of how you can replicate backups and set u

Pagina 246

78 Copyright © Acronis International GmbH, 2002-2014  You want to occasionally back up your machine to a local folder.  You want to keep a copy

Pagina 247

79 Copyright © Acronis International GmbH, 2002-2014 4.7 Default backup options Each Acronis agent has its own default backup options. Once an agen

Pagina 248

8 Copyright © Acronis International GmbH, 2002-2014 13.1.7 Initial Seeding FAQ ...

Pagina 249 - Machine subscriptions

80 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu

Pagina 250 - 13.2 Where do I start?

81 Copyright © Acronis International GmbH, 2002-2014 Agent for Windows Bootable media (Linux-based or PE-based) Disk backup File backup Disk backu

Pagina 251

82 Copyright © Acronis International GmbH, 2002-2014 For example, if the machine boots from a hard disk drive by default and you select this check b

Pagina 252 - Example

83 Copyright © Acronis International GmbH, 2002-2014 The preset is: Full cataloging. If you select Full cataloging, the backup contents are cataloge

Pagina 253

84 Copyright © Acronis International GmbH, 2002-2014 This option is available when an internal (fixed) hard disk of the machine being backed up is s

Pagina 254 - 13.8 Terminology reference

85 Copyright © Acronis International GmbH, 2002-2014  When backing up to a hard disk or a network share: A single backup file will be created if t

Pagina 255

86 Copyright © Acronis International GmbH, 2002-2014  None – the data will be copied as is, without any compression. The resulting backup size wil

Pagina 256 - Unassign a subscription

87 Copyright © Acronis International GmbH, 2002-2014 2. Click Browse to specify a location for the DRP files. 4.7.8 E-mail notifications This opt

Pagina 257 - 14 Glossary

88 Copyright © Acronis International GmbH, 2002-2014 b. Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encry

Pagina 258 -  what data to back up

89 Copyright © Acronis International GmbH, 2002-2014 4.7.10 Event tracing It is possible to duplicate log events of the backup operations, performe

Pagina 259 - Bootable media

9 Copyright © Acronis International GmbH, 2002-2014 1 Introducing Acronis Backup 1.1 What's new in Update 5  The most recent operating syst

Pagina 260 - Centralized task

90 Copyright © Acronis International GmbH, 2002-2014  Use the setting set in the Machine options – to use the setting specified for the machine. F

Pagina 261 - Data catalog

91 Copyright © Acronis International GmbH, 2002-2014 4.7.13 File-level security These options are effective only for file-level backup in Windows o

Pagina 262 - Disaster recovery plan (DRP)

92 Copyright © Acronis International GmbH, 2002-2014  Acronis Bootable Agent and One-Click Restore. The One-Click Restore is the minimal addition

Pagina 263 - Dynamic disk

93 Copyright © Acronis International GmbH, 2002-2014 This option applies to disk-level backup. This option also applies to file-level backup when th

Pagina 264 - Encrypted vault

94 Copyright © Acronis International GmbH, 2002-2014 4.7.17.1 Pre-backup command To specify a command/batch file to be executed before the backup p

Pagina 265

95 Copyright © Acronis International GmbH, 2002-2014 The option enables you to define the commands to be automatically executed before and after dat

Pagina 266

96 Copyright © Acronis International GmbH, 2002-2014 Preset Perform the data capture only after the command is successfully executed. Fail the task

Pagina 267

97 Copyright © Acronis International GmbH, 2002-2014 moment. The operations that had started before the inactivity time began continue without inter

Pagina 268

98 Copyright © Acronis International GmbH, 2002-2014 If the task fails because of a mistake in the backup plan, you can edit the plan while the task

Pagina 269

99 Copyright © Acronis International GmbH, 2002-2014 Skip the task execution Delaying a backup might be unacceptable, for example, when you need to

Comentarios a estos manuales

Sin comentarios