Acronis Backup Advanced for Windows Server Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Acronis Backup Advanced for Windows Server an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Acronis Backup Advanced for Windows Server, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Acronis Backup Advanced for Windows Server die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Acronis Backup Advanced for Windows Server. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Acronis Backup Advanced for Windows Server sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Acronis Backup Advanced for Windows Server
- Den Namen des Produzenten und das Produktionsjahr des Geräts Acronis Backup Advanced for Windows Server
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Acronis Backup Advanced for Windows Server
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Acronis Backup Advanced for Windows Server zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Acronis Backup Advanced for Windows Server und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Acronis finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Acronis Backup Advanced for Windows Server zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Acronis Backup Advanced for Windows Server, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Acronis Backup Advanced for Windows Server widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    A c r o n i s B a c k u p A d v a n c e d Version 11.5 Update 6 USER GUIDE APPLIES TO TH E FOLLOW ING PRODUCTS Advanced for Windows Server Advanced for Linux Server Advanced for PC Advanced for VMware / Hyper-V / RHEV / Citrix XenServer / Oracle VM Advanced for Exchange Advanced for SQL Advanced for SharePoint Advanced for Active Directory For Wind[...]

  • Seite 2

    2 Copyright © Acronis International GmbH, 2002- 2015 Copyright Statemen t Copyright © Acr onis Intern ational GmbH, 2002-2015. All rights reser ved. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis International G mbH. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manag er”, “Ac[...]

  • Seite 3

    3 Copyright © Acronis International GmbH, 2002- 2015 Table of contents 1 Introducing Acroni s Backu p ............................................................................................ 11 1.1 What's new in Update 6 .......................................................................................................... 11 1.2 What&[...]

  • Seite 4

    4 Copyright © Acronis International GmbH, 2002- 2015 4 Backup .......................................................................................................................... 55 4.1 Back up now ............................................................................................................................. 55 4.2 Creating a b[...]

  • Seite 5

    5 Copyright © Acronis International GmbH, 2002- 2015 4. 7. 21 S ect or- by -se cto r bac kup ............................................................................................................................. 12 5 4. 7. 22 T ape ma nag eme nt ................................................................................................[...]

  • Seite 6

    6 Copyright © Acronis International GmbH, 2002- 2015 7.3 Removable device s ................................................................................................................ 194 7.4 Tape devices .......................................................................................................................... 195 7. 4. 1 Wha [...]

  • Seite 7

    7 Copyright © Acronis International GmbH, 2002- 2015 9.5 Acronis Startup Rec overy Manager ....................................................................................... 264 9.6 Acronis PXE Server ................................................................................................ ................. 265 9. 6. 1 Acr on is PXE Se[...]

  • Seite 8

    8 Copyright © Acronis International GmbH, 2002- 2015 11 .5 .3 R ecov er ing i ndiv id ual i tems ........................................................................................................................ 305 12 Protecting Micro s oft SQL S erv er with sin gle-pass backup ........................................ 307 12.1 General infor[...]

  • Seite 9

    9 Copyright © Acronis International GmbH, 2002- 2015 14 .6 .8 C lou d b ack up pr oxy ..................................................................................................................................... 342 15 Centralized mana gement ....................................................................................... 344 15.1 U[...]

  • Seite 10

    10 Copyright © Acronis International GmbH, 2002- 2015 17 Glossary ................................................................................................................. 434[...]

  • Seite 11

    11 Copyright © Acronis International GmbH, 2002- 2015 1 I nt rod uc i ng Ac ro ni s B ac ku p 1. 1 W hat 's ne w i n U pda te 6 Improvements added in buil d 43798  Support for Wind ows 10 – Home, Pro, Education, and Enterprise editions. Note At the tim e of this hotfix release, Windows 10 i s not yet gen erally available. The tests were [...]

  • Seite 12

    12 Copyright © Acronis International GmbH, 2002- 2015  Support for Citrix XenServe r 6 .5, Red Ha t Enterprise Vi rtualization 3.4, 3.5, and Or acle VM Server 3.3 (by installing an ag ent into a guest system). Linux  Support for Linux k ernel version 3 .14, 3. 1 5, and 3. 1 6.  Support for Red Hat Enterp rise L inux 7.x, Ubu ntu 14.04 and[...]

  • Seite 13

    13 Copyright © Acronis International GmbH, 2002- 2015  Cloud backup is no w availa ble for machines running Li nux.  Cloud backup subs criptions for Servers and for Virtual Machines are deprecated. Users can renew these subscrip tions to volume subscripti o ns (p. 426). OS support  Support for Wind ows MultiPoint Server 2012 and Windows S[...]

  • Seite 14

    14 Copyright © Acronis International GmbH, 2002- 2015  Use any backup de stination including Acronis Onlin e Backup Storage.  Microsoft SQL Ser v er 2012 is supported, as well as the previ ous Microsoft SQL Server v ersions. Basic support for Windows 8 and Windows Server 2012 (p. 50 )  Install Agent for Wind ows, Agent for SQL (sing le-pa[...]

  • Seite 15

    15 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup supp orts Micros o ft Exchange S erver 2010 as well as Micros o ft Exchan ge Server 2003/2007.  Express full ba c kup method This method is bas ed o n monitoring changes of the Exchange databa se files. Once the initial full backup is taken, all subs equent backups will only b[...]

  • Seite 16

    16 Copyright © Acronis International GmbH, 2002- 2015 Back up and recover v irtual machine s running in a RHEV envir onment. Migrate ph ysical machines to the RHEV en v ironment ( P 2V); and mig rate a virtual m achine fro m a different v irtualization platform to the RHEV platform (V2V). Installation  Remote installation of Acronis Backup &[...]

  • Seite 17

    17 Copyright © Acronis International GmbH, 2002- 2015 Components for centr alized management These components, in cluded in Acronis Backup Advanced, provide centrali zed management capability. Usage of t hese comp o nents is n o t licensed. Console The console pr o vides Grap hical User Interface to other Acronis B ackup componen ts. Usage of the [...]

  • Seite 18

    18 Copyright © Acronis International GmbH, 2002- 2015 Disk backup Disk-level data pr ote ction is based on backing up either a disk o r a volu m e file syste m as a whole, along with all infor m ation n ece ssary for the o perating system to boot; or all the disk se ctors usin g the se ctor- by -sector appro ach (raw m o de.) A backup that contain[...]

  • Seite 19

    19 Copyright © Acronis International GmbH, 2002- 2015 The agent uses Micr osoft VSS to ensure the consist ency of the backed-up data. The agent is included in t he se tup program o f Acronis Backup Advanced. The agent is installed with Agent for Windows (p. 17 ) or on a machin e where Agent for Windows is already installed. 1 . 8 . 7 C o m p o n e[...]

  • Seite 20

    20 Copyright © Acronis International GmbH, 2002- 2015 Components f or Remote In stallatio n need to be install ed o n the machin e with the console or with the management s erver (p. 19 ). D uring installa tion, the setup progra m saves the components in the default location and saves this location path in the r egistry. As a result, the component[...]

  • Seite 21

    21 Copyright © Acronis International GmbH, 2002- 2015 1. 9 Ab o ut u sin g t he pr od uct i n t he tr ia l m od e Before buying an Acr onis Backup license, you may w ant to try the software. This can be d o ne without a license key. To install the product in the trial mode, run th e setup program locally or use the remote installation functionalit[...]

  • Seite 22

    22 Copyright © Acronis International GmbH, 2002- 2015 1. 11 Tec hn ica l Sup po rt Maintenance and Suppor t Program If you need assistanc e with your Acronis produc t, please go t o http://www.acronis.c om/en-us/support/ Product Updates You can download the latest updates for all your regis tered Acronis software prod ucts from our website at any [...]

  • Seite 23

    23 Copyright © Acronis International GmbH, 2002- 2015 2 G ett in g st art ed Step 1. Installation These brief installa tio n instructions enable you to start using the product quickly. For the complete descripti o n of installa tio n methods and procedures, please ref er to the Installation documentation. Before installation, make sure that:  Y[...]

  • Seite 24

    24 Copyright © Acronis International GmbH, 2002- 2015 c. Follow the on-screen ins tructions. Step 2. Running Run Acronis Backup Management Console.  In Windows Start the consol e by selecti ng Acronis Backup fr o m the Start menu .  In Linux Log in as root o r log in as an ordin ary user and th en switch user as required. Start the c o nsole[...]

  • Seite 25

    25 Copyright © Acronis International GmbH, 2002- 2015 Tip. Using the bo o table me dia, yo u can d o off -line ("cold") bac kups in the same way as in the operating system. Create backup plan (p. 55 ) Create a backup plan if you need a long-term backup strategy including backup sc hem es, schedules and conditi ons, timely deleting of bac[...]

  • Seite 26

    26 Copyright © Acronis International GmbH, 2002- 2015  If you opt for st o ring all ba ckup archives in a single or a few network ed locations, create centralized vaults in th ese locations. After a vault is cr eated, you can view and ad minister its content by selectin g Vaults > Centralized > 'Vau lt name' in the Navigation p [...]

  • Seite 27

    27 Copyright © Acronis International GmbH, 2002- 2015 Menu b ar Appears across the top o f the program window. L ets you perform most of operations available in Acro nis Backup. The m enu items change dy namically depending on th e item selected in the Navigation tree and the main area. 2 . 1 . 1 " Na v i g at i o n" p a n e The navigati[...]

  • Seite 28

    28 Copyright © Acronis International GmbH, 2002- 2015  Dashboard . Use this v iew to esti mate at a glance whether th e data is successfully protected on th e machines registered on the m anagement se rver.  Machines with a gents . Use this view to manage machines register ed on the management ser v er.  Backup plans and tasks . Use this [...]

  • Seite 29

    29 Copyright © Acronis International GmbH, 2002- 2015 2 . 1 . 2 M ai n a r ea , v i e w s an d a c t i o n pa g e s The main area is a basi c place where you w o rk with the c o nsole. Here you create, edit and manage backup plans, reco v ery tasks and perf orm other operations. The m ain area displ ays different views and action pages ac co rding[...]

  • Seite 30

    30 Copyright © Acronis International GmbH, 2002- 2015 To D o t he fol lo wing Sort items by any column Click a column's header to sor t items in ascending ord er. Click it once again to sort ite ms in descending o rder. Filter items by p redefined column value In a field below the corr esponding column's head er, select the requ ired val[...]

  • Seite 31

    31 Copyright © Acronis International GmbH, 2002- 2015 Using controls and specifyi ng settings Use active controls to specify a backup plan o r recover y t ask setting s and parameters. By default, such fields as credential s, options, comments, and some others are hidden. Most settings are configured by clicking the respecti ve Show … links. Oth[...]

  • Seite 32

    32 Copyright © Acronis International GmbH, 2002- 2015 If the option is enabled, the credentials for v arious locations that you enter during a console session are saved for use du ring later sessions. In Windo ws, the creden tials are stored in the Windo ws Credential Manager. In Linux, the credentials are st o red in a spe cial encrypted file. If[...]

  • Seite 33

    33 Copyright © Acronis International GmbH, 2002- 2015 Notify when the mana gement console is con nected to a componen t of a different version This option defin es whether to display a pop-up window when a c onsole is connected to an agent/management server and their versions differ. The preset is: Enabled . To make a selection, select or clear th[...]

  • Seite 34

    34 Copyright © Acronis International GmbH, 2002- 2015 3 Un de rs ta ndi ng A cr oni s Ba cku p This section attempts to give its readers a clear understanding of the pr o duct so that the y c an use the product in v arious circu mstances without step- by -step instructions. 3. 1 O wne rs This section explains th e concept of a backup pla n (task) [...]

  • Seite 35

    35 Copyright © Acronis International GmbH, 2002- 2015 enter the credentials ne xt time. The credentials ar e cached independently for each user wh o uses the console on the m achine. Backup plan's creden tials Any backup plan runn ing on a machi ne runs on behalf of a user. In Windows By default, the plan runs under the agent ser v ice acco u[...]

  • Seite 36

    36 Copyright © Acronis International GmbH, 2002- 2015 In Linux You do not need t o specify task cr edentials. In Linux, tasks always run un der the root user acc ount. 3. 3 U ser p riv il ege s o n a m an age d m ac hi ne Windows When managing a machine running Windows, the scope of a user's manage ment rights depends on the user's privi[...]

  • Seite 37

    37 Copyright © Acronis International GmbH, 2002- 2015 of user rights, me m bership in securi ty groups, and the Full Control per m issions o n respective registry keys in the foll owing key: HKEY_ LOCAL_MACHINESOFTWAREAcr o nis. There are no permissions granted on other regi stry keys. The following table lis ts the services of Acronis Backu p c[...]

  • Seite 38

    38 Copyright © Acronis International GmbH, 2002- 2015 S ervi ce na me P urp ose A cco unt us ed by t he ser vi ce P riv il eg es add ed to th e a cc ount U ser ri ght s Gr ou p me mb er shi p P ermi ssi ons on r egis try ke ys SQL Server (ACRONIS) (Auxiliary service; created only if a new SQL server is installed) Running a Microsoft SQL Server tha[...]

  • Seite 39

    39 Copyright © Acronis International GmbH, 2002- 2015 Acronis Scheduler2 Service Providing scheduling for ta sks performed b y Acronis components Local System Dependencies on othe r services The main services depend on Acr o nis Scheduler 2 Service and on the following stan dard Windows services: Remote P rocedure Call (R PC) and Protected Storage[...]

  • Seite 40

    40 Copyright © Acronis International GmbH, 2002- 2015 Incremental backu p An incremental backup stores changes to the data against the latest backup . You need access to other backups fro m the same ar chive to recover data from an incremental backup. An incremental backup is most useful when:  you need the po ssibility to ro ll back to any o n[...]

  • Seite 41

    41 Copyright © Acronis International GmbH, 2002- 2015 A volume backup s to res all fil es and folders o f the sele cted volume independent of their attributes (includ ing hidden and sy stem files), the b oot record, the file all o cation table (FAT ) if it exists, the root and the zero track of the hard disk with the master boot rec ord (MBR). A d[...]

  • Seite 42

    42 Copyright © Acronis International GmbH, 2002- 2015 acrocmd backup disk -- volume=DYN --loc= srv1 backups -- c re dentials=netuser1 ,pass1 -- arc=alldyn_arc This will back up all dyna mic volumes of the l o cal mach ine to a network shar ed folder. Recovering dynamic volumes A dynamic volume can be recovered:  Over any type of e xisting [...]

  • Seite 43

    43 Copyright © Acronis International GmbH, 2002- 2015 Ba ck up (so urc e): Re cov er ed to: Dy na mic v olu me Ba si c v ol ume Dy na mic v olu me Dynamic volume Type as of the target Dynamic volume Type as of the target U nall oca ted sp ace ( dis k gr oup ) Dynamic volume Type as of the source Dynamic volume Simple Ba si c v ol ume or un all oca[...]

  • Seite 44

    44 Copyright © Acronis International GmbH, 2002- 2015 Basic volumes included in logical volumes are shown in the list with N one in the File s y stem colu m n. If you select such volumes, the program will back them up sector- by -sector. Normally this is n ot required. Recovery When recovering logic al volumes, you have two opti ons:  Recoverin[...]

  • Seite 45

    45 Copyright © Acronis International GmbH, 2002- 2015 3. 7. 2.3 Ba ck ing u p h ar dw are RA ID a rr ay s (Li nux ) Hardware RAID arra ys under Linux combine sev eral physical drives to creat e a single partitionab le disk. The special file related to a hardware RAID array is usually located in /dev/a taraid. Yo u can bac k up hardware RAI D array[...]

  • Seite 46

    46 Copyright © Acronis International GmbH, 2002- 2015  The machine has fewer physical disks than the original v olume structure used. Th e software will fail to recreate the volume structure even if th e capacity of the physical disks is en o ugh to fit all the data being rec o vered.  The backup does not contain the volume structu r e infor[...]

  • Seite 47

    47 Copyright © Acronis International GmbH, 2002- 2015 6. If you previously m o unted the backup by using the acrocm d utility, use this u tility again to unmount the bac kup (see "Mounting bac kup volumes" later in t his topic). 7. Return to the m anagement c onsole by pres sing ALT+F1. (Do not reboot th e machine at this point. Other wi[...]

  • Seite 48

    48 Copyright © Acronis International GmbH, 2002- 2015 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgr oup /dev/md0 /dev/md1 lvm vgdisplay The output of th e l vm vgdisplay command will contain lines similar to the f o llowing: --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID[...]

  • Seite 49

    49 Copyright © Acronis International GmbH, 2002- 2015 type: disk Num Partition Flags Size Type GUID ---------- -------------------- -------- -- ---------- ------------- ------ -- Dyn1 my _volgroup-my_lo. .. 4 GB Ext 3 Dyn2 md0 2.007 GB Ext 2 Disk 1 sda 16 GB DT_FIXED 1-1 sda1 Act,Pri 203.9 MB Ext 2 1-2 sda2 Pri 11.72 GB Reiser 1-3 sda3 Pri 1.004 G[...]

  • Seite 50

    50 Copyright © Acronis International GmbH, 2002- 2015  4K native (4Kn ) disks have a 4 -KB logical sect o r size. M odern operating systems can store dat a on these disks, but they generally cannot boot fr om these disks. These disks are commonly external drives with USB conne ction. By running the appropriate comma n d To find out the l ogical[...]

  • Seite 51

    51 Copyright © Acronis International GmbH, 2002- 2015 Th e informa tio n in this sect ion also applies to Window s 8 .1 and Wind ows Server 2012 R2. Limitations  Acronis Disk Direc tor Lite (p. 267) is not av ailable un der Windows 8 and Windows Serv er 2012.  Disk managemen t operati ons under bootable media may w o rk incorrectly if storag[...]

  • Seite 52

    52 Copyright © Acronis International GmbH, 2002- 2015 Data Deduplication In Windows Ser ver 2012, you can enable the Data Dedupli catio n feature f or an NTFS volume. D ata Deduplication reduce s t he used space on the vo lume by storing duplicate fragmen ts of the volum e's files only once. You can back up and recover a data deduplicati on ?[...]

  • Seite 53

    53 Copyright © Acronis International GmbH, 2002- 2015 2. Recover the sys tem. The recovered data will b e unencrypted. 3. Re boot the recover ed system. 4. Turn on BitLocker. If you only need to re cover one parti tion of a multi-partitioned disk, d o so under t he operating system. Recovery under bootable media may mak e the recovered par tition [...]

  • Seite 54

    54 Copyright © Acronis International GmbH, 2002- 2015 About the test message When configurin g SNMP notifications, you can send a test message to check if your settings are correct. The parameters o f the test m essage are as f ollows:  Type of event OID: 1.3.6.1.4.1. 2 4769.100. 200.1.0 Value: "Unknown"  Text description o f the e[...]

  • Seite 55

    55 Copyright © Acronis International GmbH, 2002- 2015 4 B ack up 4. 1 B ac k up now Use the Back up no w feature t o configure and run a one-time backup in a few si mple steps. The backup process will star t immediately after yo u perf o rm the required steps and click OK . For a long-time bac kup strategy that includes schedu les and conditions, [...]

  • Seite 56

    56 Copyright © Acronis International GmbH, 2002- 2015 Select the mod e the removable device w i ll be used i n (p. 194) If the specified l o cation is an RDX dri v e or USB flash drive, select the device mode: Removable med ia or Fixed drive . Backup file namin g, access c redentia l s, archive com ments To access these s et tings, click Sho w bac[...]

  • Seite 57

    57 Copyright © Acronis International GmbH, 2002- 2015 Set up a regular c onv ersion o f a disk or volu me backup to a virtual machine. Plan parameters Plan name [Optional] Enter a uniq ue name for the backup plan . A conscious name lets you identify the plan among others. Backup options [Optional] Configu re parameters of t he backup operation, su[...]

  • Seite 58

    58 Copyright © Acronis International GmbH, 2002- 2015  Microsoft SQL databas es by means of sing le -pass disk an d application backup, if Acronis Backup Agent for S QL is ins talled. Agent for SQL enables you to create applicati o n-aware disk backup s and to recover Microsoft SQL databas es from such backups. For more information, see the &qu[...]

  • Seite 59

    59 Copyright © Acronis International GmbH, 2002- 2015 For more inf o rmation abou t backing up Microsoft Exc hange data see "Backing u p Microsoft Exchange Server data" . 2. In the tree below Data to ba c k up section, selec t the items to back up. To back up all ite m s of the selec ted data type present on a machine, select the ch eck [...]

  • Seite 60

    60 Copyright © Acronis International GmbH, 2002- 2015 4 . 2 . 3 S o u r c e fil e s e x c l u s i o n This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is effe ctive for disk-level backup of NTFS, FAT, Ext3, and Ext4 file sys tems only. This option is effective for file-level ba ckup of all suppo[...]

  • Seite 61

    61 Copyright © Acronis International GmbH, 2002- 2015 Wildcard characters You can use one or more wildcard characters * and ? in the criterion. These chara cters can be used both within the full pa th and in the file or folder name. The asterisk (*) sub stitutes for zero or more chara cters in a file name. F o r exampl e, the criterion Doc*.txt co[...]

  • Seite 62

    62 Copyright © Acronis International GmbH, 2002- 2015 added, deleted or m o dified by an other user or by the program itself acc ording to scheduled operations. Use th e Refresh b utton to refresh the lis t of archives. 3. Naming the new arc hive Once you select the archive destination, the program generates a name for the new archive and displays[...]

  • Seite 63

    63 Copyright © Acronis International GmbH, 2002- 2015 D esti nat ion D etai ls Cloud storage To back up dat a to Acronis Cloud Storage, click Log in and specify the cr edentials to log in to the cloud storage. Then, ex pand th e Cloud storage group an d select the account. Prior to backing u p to the cloud storage, you need to buy a subscription ([...]

  • Seite 64

    64 Copyright © Acronis International GmbH, 2002- 2015 D esti nat ion D etai ls FTP, SFTP To back up dat a to FTP or SFTP, type the server nam e or address in th e Path field as follows: ftp://ftp_server:p ort _number or sftp://sftp_server :port number To establish an active mod e FTP connection , use the followi ng notation: aftp://ftp_server:p or[...]

  • Seite 65

    65 Copyright © Acronis International GmbH, 2002- 2015 Warning: According to the original FTP specifica tion, credentials required for acc ess to FTP servers are transferred through a n etwork as plaintext. This means that th e u ser name and password c an be intercepte d by an eavesdropper using a packet sniffer. 4 . 2 . 6 B a c k u p s c h e m e [...]

  • Seite 66

    66 Copyright © Acronis International GmbH, 2002- 2015  Full - selected by default for all backup locations ( ex cep t for Acronis Cloud Storage).  Incremental . At the firs t time a full backup will be created. The next backups will be incremental. Selected a s the one and only backup ty pe for Acronis Cloud Storage. Note : When the Incremen[...]

  • Seite 67

    67 Copyright © Acronis International GmbH, 2002- 2015 Keep backups Specifies how long you want the b ackups to be stored in th e archive. A term can b e set in hours, days, weeks, mo nths, or years. For month ly backups, y ou can also select Keep indefinitely if yo u want them to be sa ved forever. The default values for each b ackup type are as f[...]

  • Seite 68

    68 Copyright © Acronis International GmbH, 2002- 2015 available through nex t Sunday, January 8; the firs t weekly backup, the on e of Saturday, January 7, will be stored on the syste m until February 7 . Monthly backup s will never be deleted. Limited storage If you do not want to arrange a vast amount of space to store a huge archi v e, you may [...]

  • Seite 69

    69 Copyright © Acronis International GmbH, 2002- 2015  Monthly: 5 years Here, daily incre m ental bac kups will be created on Tuesdays and Thursdays, with weekly and monthly backups perf ormed on Fridays. Note tha t, in order to choose Friday in the We ekly/monthly field, you need to first select it in the Back up on field. Such an archive w o [...]

  • Seite 70

    70 Copyright © Acronis International GmbH, 2002- 2015 P ara met er Me ani ng Clean up arch ive Specifies how to get rid o f old b ackups: either to app ly reten tion rules (p. 100 ) regularly or clean up t he archive during a backu p when the destination lo cation runs out of space. By default, the retention ru les are not specified, which m eans [...]

  • Seite 71

    71 Copyright © Acronis International GmbH, 2002- 2015 Here, all parame ters excep t Schedule in Full ba ckup are left empty. All backup s in the archive are kept indefinitely (n o archiv e cleanup is perfor med). Full and incremental backup plus cleanup With the following s cheme, the archive will c o nsist of weekl y full backups and daily incre [...]

  • Seite 72

    72 Copyright © Acronis International GmbH, 2002- 2015 By default, a bac kup is not deleted a s long as it has depend ent backups that must be kept. For example, if a full ba ckup has become subject to d eletion, but there are incre mental or differential backups that depend on it, the deletion is postponed until all the dependent back ups can be d[...]

  • Seite 73

    73 Copyright © Acronis International GmbH, 2002- 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different le vels have different types:  Last-level (in this case, level 4) bac kups are full;  Backups of intermediat e levels (2, 3) are differential ;  First-level (1) backups are incremental. A cleanup mechanis[...]

  • Seite 74

    74 Copyright © Acronis International GmbH, 2002- 2015 On day 14, the int erv al is fi v e days. It incr eases on subsequent days bef ore decreasing again, and so on. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back peri o d shows how many days we are guaran te ed to have e ven in the w o rst case. For a four-level scheme,[...]

  • Seite 75

    75 Copyright © Acronis International GmbH, 2002- 2015 protection strategy and you prefer to be imm ediately informed whether the backed-up data is not corrupted and c an be s uccessfully recovered, think of starting the validation rig ht after backup creation. 2. What to validate – sel ect either to validate the en tire archive or the latest bac[...]

  • Seite 76

    76 Copyright © Acronis International GmbH, 2002- 2015 To a dd a te xt la bel to a ba ck up: 1. On the Create backup plan (p. 55 ) page, click Sh ow plan's credentials, c omments, l abel . 2. In Label , enter the text label or select it fro m the drop-down m enu. Parameters specificati on P ara met er Va lu e D esc rip tio n acronisTag.label &[...]

  • Seite 77

    77 Copyright © Acronis International GmbH, 2002- 2015 acronisTag.hostna m e = “su perserver.corp.local” acronisTag.os.type = “windows7Server64Gue st” acronisTag.os.servicepa ck = “1” acronisTag.os.sid = “ S -1-5- 21 - 874133492-782267321- 39289498 34” 4 . 2 . 1 0 S e q u e n c e o f o p e r at i o n s i n a b a c k u p p l a n If a[...]

  • Seite 78

    78 Copyright © Acronis International GmbH, 2002- 2015 When you back up t o a locally atta ched RDX drive or US B flash drive, the Name backup files using the archive na me... check box does not appear. Instead, the removable device m ode (p. 194) determines whet her th e standard or si mplified naming scheme will be used. In Linux, the check box a[...]

  • Seite 79

    79 Copyright © Acronis International GmbH, 2002- 2015 4 . 3 . 1 T h e [ D A T E ] v ar i a b l e If you specify the [DATE] variable in the ar chive name, the file nam e of each backup will include tha t backup’s creation da te. When using this variable, th e first backup of a new da y will be a full bac kup. Before creating the n ext full backup[...]

  • Seite 80

    80 Copyright © Acronis International GmbH, 2002- 2015  You want to perfor m a dail y full backup of your machine.  You want to st o re the backup on a l ocally attached USB hard drive in the file MyMachine . tib .  You want each ne w backup to replace the old one. In this scenario, cr eate a backup plan with a daily sche dule. When creati[...]

  • Seite 81

    81 Copyright © Acronis International GmbH, 2002- 2015 4. 3. 3.4 Ex am pl e 4. Da il y f ul l b ac ku ps w ith d ai ly dr iv e s wa ps Consider the follo wing scenario:  You want to perfor m a dail y full backup of your machine.  You want to st o re the backup on a l ocally attached USB hard drive in the file MyMachine . tib .  You have tw[...]

  • Seite 82

    82 Copyright © Acronis International GmbH, 2002- 2015 Result:  Before creating a Mo nday backup (by the first backup pla n), all backups will be d eleted from the currently attached drive.  While one drive is a ttached to the machine, you can keep the other drive off-site for ex tra data protection. In Windows, if you choose to back up to lo[...]

  • Seite 83

    83 Copyright © Acronis International GmbH, 2002- 2015 The scheduler uses lo cal time o f the machine the backup plan exist s o n. Bef ore creating a sch edule, be sure the machin e’s date and time settings ar e correct. Schedule To define when a t ask has t o be executed, you need to specify an event or multiple events. The task will be launched[...]

  • Seite 84

    84 Copyright © Acronis International GmbH, 2002- 2015  What if an event oc c urs w hile the scheduler is waitin g for the condition require d by the previous event? The event will be ignored.  What if the condit i on is no t met for a ve ry long time? If delaying a backup is getting risky, you can f orce the condition (tell the users to log [...]

  • Seite 85

    85 Copyright © Acronis International GmbH, 2002- 2015 "Three-hour time i nterval l asting for three months" s chedule Run the task ever y three hours. The task starts on a c ertain date (say, Sept ember 15, 2009), and end s after three months. The schedule's param eters are thus set up as f o llows. 1. Every: 1 day(s). 2. Every: 3 h[...]

  • Seite 86

    86 Copyright © Acronis International GmbH, 2002- 2015 3. Effective: From: 09/20/20 09 . To: not set . 4 . 4 . 2 W ee k l y s c h e d u l e Weekly schedule is effective in Windows and Linux operating systems. To s pec if y a w eek ly s che dul e In the Schedule are a, se lect the app ropriate paramete r as follows: Every: <...> week(s) on: &l[...]

  • Seite 87

    87 Copyright © Acronis International GmbH, 2002- 2015 on workdays. F o r more det ails, see the Full and incre mental backups plus clean up example in the Custom backup sche me (p. 69 ) section. "Workdays" s chedule Run the task ever y week on wo rkdays : from Monday through Friday. During a workday, the task starts only once at 9 PM. Th[...]

  • Seite 88

    88 Copyright © Acronis International GmbH, 2002- 2015 2. Every 3 hours From 09:00:00 AM until 09:00:00 PM . 3. Effective: From: not set . To: not set . Third schedule 1. Every: 1 wee k(s ) on: Sat, S un . 2. Once at: 09:00:0 0 PM . 3. Effective: From: not set . To: not set . 4 . 4 . 3 M o n th l y s c h e d u l e Monthly schedu le is effective in [...]

  • Seite 89

    89 Copyright © Acronis International GmbH, 2002- 2015 1. Months: <All mo nths> . 2. Days: Last . The task w ill run on the last day of every month despite its actual da te. 3. Once at: 10:00:0 0 PM . 4. Effective: From: empty . To: empty . This schedule is widel y used when creating a custom backup scheme. The "Last day o f every month&[...]

  • Seite 90

    90 Copyright © Acronis International GmbH, 2002- 2015 Second schedu le 1. Months: March , April , May , September , Octo ber , November . 2. On: <All> <All wo r kdays> . 3. Every: 12 ho urs From: 12:00:00 AM Until: 12:00:0 0 PM . 4. Effective: From: 11/01/20 09 . To: not set . Third schedule 1. Months: June , July , August . 2. Days: 1[...]

  • Seite 91

    91 Copyright © Acronis International GmbH, 2002- 2015 One or more bad blo cks that have suddenly appeared on a hard disk usually indic ate that the hard disk drive will so o n fail. Su ppose that you want to create a ba ckup plan that will back up hard disk data as soon as such a situation o ccurs. When Windows d et ects a b ad block on a hard dis[...]

  • Seite 92

    92 Copyright © Acronis International GmbH, 2002- 2015 3. In the Event Pro perties dialog box, view the event's pr operties such as the event source, shown in the Source field ; and the ev ent number, shown in the Event ID field. When you are finish ed, click OK to close the Event Pro perties dialog b o x. 4 . 4 . 5 A d v a n c e d s c h e du [...]

  • Seite 93

    93 Copyright © Acronis International GmbH, 2002- 2015 Second machine : Every day at 09: 00:00 AM Third machine: Ever y day at 09:59:59 AM Example 2 Suppose that you ar e deploying a centraliz ed backup plan with the following schedule to three machines: Run the task: Daily Every: 2 Hour(s) Fro m: 09:00:0 0 AM Until: 11:00:00 AM Distribute start ti[...]

  • Seite 94

    94 Copyright © Acronis International GmbH, 2002- 2015 task anyway. With t his settin g, the program will auto m atically handle the situa tion when the conditions are not met for too long and further d elay ing the backup is undesirab le.  backup task start ti me matters - skip the backup task i f the conditions are not me t at the time when th[...]

  • Seite 95

    95 Copyright © Acronis International GmbH, 2002- 2015 (2) If 9:00 PM co mes but the hos t is unavailable at the moment, the backup task will start on the next workday if the l o cation's h o st is available. (3) If the location's h ost will never be available on workdays at 9:00 PM, the task never starts. 4. 4. 6.3 Fi ts t he t ime i nt [...]

  • Seite 96

    96 Copyright © Acronis International GmbH, 2002- 2015 Enables to put a backup task run on hold until all us ers log off from Wind o ws on t he m anaged machine. Example Run the backup task at 8 PM on the first and thi rd Friday of every month, prefer ably when all users are logged off. If on e of the users is still logged on at 11 PM, run the task[...]

  • Seite 97

    97 Copyright © Acronis International GmbH, 2002- 2015 Similarly, you can c opy or move backups fr om a second location to a third location and so on. Up to five consecutive l ocations are supported (including t he primary one). Note: The replication feature replaces an d enhances the Dual destination option, which was availab le in Acronis Backup [...]

  • Seite 98

    98 Copyright © Acronis International GmbH, 2002- 2015 Notes:  Setting up both c o pying an d mov ing backup s from the same location is n ot possi ble.  With simplified naming of backup files (p. 77 ), nei ther replication nor use of rete ntion rules is available. 4 . 5 . 1 S u p p o r t e d l o c a t i o ns You can copy or move a backup fro[...]

  • Seite 99

    99 Copyright © Acronis International GmbH, 2002- 2015 As follows from the above d escription, the opera tion will be performed only if the machine with the agent is powered on. If the operation is scheduled, the schedule will use that m achine's da te and time. Copying and moving b ackups between managed vaults Copying or moving a backu p fro[...]

  • Seite 100

    100 Copyright © Acronis International GmbH, 2002- 2015 Grandfather-Fath er-Son (GFS) scheme Backups of each t y pe (daily , weekly, and monthly) are retained for the periods you specify in Keep backups , and then del eted. The retention rules ar e applied after creating a backup. They are applied sequenti ally in the primary, the second and all ne[...]

  • Seite 101

    101 Copyright © Acronis International GmbH, 2002- 2015 With these settings, a backup will be stored until it is older than five days and the size o f the archive containin g it exceeds 1 00 GB. b. Number of backups i n the a r chive exceeds . .. If the number of bac kups exceeds the specified v alue, one or more of the oldest backup s will be move[...]

  • Seite 102

    102 Copyright © Acronis International GmbH, 2002- 2015 This mode is not a vailable if you selected the Archi v e size grea ter than rule for a ny archive location except for Acronis Cloud Storage. What you nee d to know about consolidation Please be aware that consoli dation is just a me tho d of deletion but not an alternative to delet ion. The r[...]

  • Seite 103

    103 Copyright © Acronis International GmbH, 2002- 2015 4. 5. 5.3 Ex am pl e 3. Re pl ica tin g ba cku ps t o t h e c lou d st or ag e This example assu mes that you have activated (p. 427) a cloud backup sub scr iption (p. 412) for the machine that you a re backing up. The following scenari o assumes that the amount of data you want to back up is [...]

  • Seite 104

    104 Copyright © Acronis International GmbH, 2002- 2015 4. 5. 5.4 Ex am pl e 4. Mo vi ng ol der b ac ku ps t o tap es Consider the follo wing scenario:  You want to perfor m a dail y backup of your machine.  You want to st o re the backups locally fo r one w ee k.  You want to move th e backups that are older than one week to a tape device[...]

  • Seite 105

    105 Copyright © Acronis International GmbH, 2002- 2015  The storage node copies the backups to the tape de vice. No CPU resource fro m the machin es is taken.  The lifetime of backup s on the hard disk does no t exceed one mo nth. On the tape library, the monthly backups are kept indefinitely. 4. 6 H ow to di sa ble ba ck up cat al ogi ng Ca[...]

  • Seite 106

    106 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Additional settings (p. 107): Ask for the first media whil e backing up to removable media Dest: removable me[...]

  • Seite 107

    107 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p File -level backup snapshot (p. 117 ) - + - + - - File -level security (p. 118 ): Preserve files’ security [...]

  • Seite 108

    108 Copyright © Acronis International GmbH, 2002- 2015 The preset is: Disab l ed . When the option is enabled, backing up to rem o vable media ma y be not possible if the us er is away, because the pr o gram will wait f or someone to press OK in the prompt box. Hence, you should disa ble the prompt when scheduling a backup to rem o vable media. Th[...]

  • Seite 109

    109 Copyright © Acronis International GmbH, 2002- 2015 4 . 7 . 2 A r c h i v e p r o t e c t i o n This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is effe ctive for both disk-level and file-le vel backup. This option defin es whether the arch ive will be protected with a password and whether th[...]

  • Seite 110

    110 Copyright © Acronis International GmbH, 2002- 2015  For a disk-level backup - disks, volumes, files, and f olders.  For a file-level backup - files and folders.  For an Exchange dat abase-level backup - databases o r storage groups and mailboxes (always); folders and e-mails (dep ends on the Microsoft Ex c hange metada ta c ollection [...]

  • Seite 111

    111 Copyright © Acronis International GmbH, 2002- 2015  High – to maximiz e the backup process speed by taking resources from other processes. 4. 7. 4.2 HD D w ri ti ng sp ee d This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is available when an internal (fixed) hard disk of the machine be[...]

  • Seite 112

    112 Copyright © Acronis International GmbH, 2002- 2015 The following set tings are available. Automatic With this setting, A cro nis B ackup will act as follows.  When backing up to a hard disk or a network s hare: A single backup file w ill be create d if the d estination disk's file system allows the estimated file size. The backup will [...]

  • Seite 113

    113 Copyright © Acronis International GmbH, 2002- 2015 compressed files, such as .jpg , .pdf or .mp3. However, formats su ch as .doc or .xls will be compress ed well. To s pec if y the c omp res si on le ve l Select one of the f o llowing:  None – the data will b e copied as is, without any compression. The resulting bac kup size will be maxi[...]

  • Seite 114

    114 Copyright © Acronis International GmbH, 2002- 2015 3. [Optional] Change the default value of the Subje c t field, if necessary. If you back up multip le machines with one centrali zed ba ckup plan and wan t each machine user to receive a separa te DRP e-mail about his/her machin e only: a. Use the %MachineN ame% variable to show the nam e of t[...]

  • Seite 115

    115 Copyright © Acronis International GmbH, 2002- 2015 6. In the SMTP server field , enter the name of the outgo ing mail server (SMTP). 7. In the Port field, set the port of the outgoing m ail serv er. By default, the port is s et to 25 . 8. If the outgoing mail s erver requires authenticati on, enter User name and Passwo rd o f the sender's[...]

  • Seite 116

    116 Copyright © Acronis International GmbH, 2002- 2015 If Acronis Cloud Storage is selected a s the primary, the second, or a fu rther backup location, the option value is automatica lly set to Enabled. Number of at tempts: 300 , regardless of th e default va lue. Ignore bad sectors The preset is: Disab l ed . When the option is disabled, the prog[...]

  • Seite 117

    117 Copyright © Acronis International GmbH, 2002- 2015 4. 7. 10. 2 W in dow s ev en t l og This option is effe ctive only in Windows operating s ystems. This option is not available when operating und er the bootabl e media. This option defin es whether the agen t(s) operating on the manag ed machine have to log e vents of the backup opera tions i[...]

  • Seite 118

    118 Copyright © Acronis International GmbH, 2002- 2015 The snapshot enabl es backing up of all files includin g files o pened f o r exclusive ac cess. The files will be backed up at t he sa m e point in time. Choose t his sett ing only if these factors are critic al, that is, backing up files without a snapshot does n ot make sense. To use a snaps[...]

  • Seite 119

    119 Copyright © Acronis International GmbH, 2002- 2015 4 . 7 . 1 4 L V M s n a p s h o t t i n g This option is effe ctive only for Linux operating s ystems. This option is effecti v e for both dis k -level and file-level backup of volumes managed by Linu x Logical Volu me Manager (LVM). Such v olumes are also called logical volumes. This option d[...]

  • Seite 120

    120 Copyright © Acronis International GmbH, 2002- 2015 To c ha ng e the d efa ul t s ize o f a s na psh ot lo gic al vo lum e: 1. Decide how much un allo ca te d space you want to use. If you are backin g up two or more logical volumes, base y o ur choice on the size of the biggest of the m . Tip: To view the a mount of unallocated sp ace on a vol[...]

  • Seite 121

    121 Copyright © Acronis International GmbH, 2002- 2015  If such folder (a par ent folder) is selected f o r backup, and the Mount points option is enabled, all files located on the mo unted v o lume will be in cluded in the backup. If the Mount points o ption is disabled, the m o unt point i n the backup will be empty. During recovery o f a par[...]

  • Seite 122

    122 Copyright © Acronis International GmbH, 2002- 2015 The option enables you to define the commands t o be aut o matically ex ecute d before and after the backup procedure. The following sche me illust rates when pre/post com mands are executed. Pre -backup command Backup Post-backup command Examples of h ow you can use the pre/p ost commands: ?[...]

  • Seite 123

    123 Copyright © Acronis International GmbH, 2002- 2015 Perform the backup only after the command is successfully executed. Fail the task if the command execution fails. command is executed despite execution failure or success. the command ex ecution and irrespective of the command execution result. * A command is c onsidered failed if its exit c o[...]

  • Seite 124

    124 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y pre /p ost da ta ca pt ure c omm an ds 1. Enable pre/post data capture commands exe cutio n by c hecking th e following opt ions:  Execute before the da ta capture  Execute after the data capture 2. Do any of the follo wing:  Click Edit to specify a new command or a batc[...]

  • Seite 125

    125 Copyright © Acronis International GmbH, 2002- 2015 4. Depending on the r esult you want to obtain, select the appropriate options as described in the table below. 5. Click Test command t o check if th e command is correc t. Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails* Selected Cleared Selected Cleared Do not back u [...]

  • Seite 126

    126 Copyright © Acronis International GmbH, 2002- 2015 level (p. 112) option is set to None ). Use the sector- by -sect o r backup for ba cking up drives with unrecognized or unsup ported file systems and other p roprietary data formats. 4 . 7 . 2 2 T a p e m an a ge m e n t These options ar e effective w hen the backup d estination is a tape devi[...]

  • Seite 127

    127 Copyright © Acronis International GmbH, 2002- 2015 Move a tape back to t he slot after using The preset is: Enabled . If you disable this o ption, a tape will remain in the drive after an operation wi th the tape is completed. If both this option and the Eject tapes after succe s sful backup s option are enabled , t he tape will b e ejected. A[...]

  • Seite 128

    128 Copyright © Acronis International GmbH, 2002- 2015 The program will tr y to execute the failed task again if you select the Restart a failed t ask check box and specify the nu mber of attempts and the tim e interval betwe en the attempts. The program st ops trying as soon as an attempt completes successfu lly OR the specified number o f attemp[...]

  • Seite 129

    129 Copyright © Acronis International GmbH, 2002- 2015 Time diagram: Wa i t until c onditions are met Skip the task executio n Delaying a backup m ight be un acceptable, for example, when you need to back up data stric tly at the specified time. Then it makes sense to skip the backup rather than wait for the conditions, esp ecially if the events o[...]

  • Seite 130

    130 Copyright © Acronis International GmbH, 2002- 2015 VSS will use any a v ailable software-based pr ovider. If one is not found, VSS will try to use the Microsoft Softwar e Shadow C o py provider, and Acronis VSS Provider in turn.  Software - Acroni s VSS Provider VSS will use Acronis VSS Provider.  Software - System pro vider (selected by[...]

  • Seite 131

    131 Copyright © Acronis International GmbH, 2002- 2015  If you use Acronis Ba ckup Agent for Exchange or third -party soft ware for backing up the Exchange Server data. This is because the l o g truncati on will interfere with the c onsecutive transaction log ba ckups.  If you use third-part y softw are fo r backing up th e SQL Server data. [...]

  • Seite 132

    132 Copyright © Acronis International GmbH, 2002- 2015 5 Re co ve ry When it comes t o data recovery, fir st consider the most func tio nal method : connect the console t o the managed ma c hine runn i ng the operating system and create the recovery task. If the machine's opera ti ng sys tem fails to start or you need to reco ver data to bare[...]

  • Seite 133

    133 Copyright © Acronis International GmbH, 2002- 2015 Where to recover This section appears af ter the required backup is selec ted and the type of data t o recover is defined. The para m eters y o u specify here depend on the type of data being recovered. Disks (p. 139) Volumes (p. 143) Files (p. 146) Microsoft Ex change datab ases or storage gr[...]

  • Seite 134

    134 Copyright © Acronis International GmbH, 2002- 2015 5 . 1 . 1 W h a t t o r e c o v e r 1. Specifying the archive loc ation In the Data path field, sp ecify the archive locati on path or click Browse and select the r equired location as described in "Selecting archive locati o n" (p. 135). In Acronis Backup Ad vanced, you can select e[...]

  • Seite 135

    135 Copyright © Acronis International GmbH, 2002- 2015 There are probab ly other times when you m ay need to re cover the MBR, but the above ar e the most common. When recovering the MBR of one disk to an o ther Acronis Backup recovers Track 0, which do es not affect the target disk ’s partition table and partiti o n layout. Acr onis Backup auto[...]

  • Seite 136

    136 Copyright © Acronis International GmbH, 2002- 2015 Lo ca tio n D etai ls FTP, SFTP If the archive is stored on an FTP or SFT P server, type th e server name or address in t he Path field as follows: ftp://ftp_server:p ort _number or sftp:/ /sftp_server:port numbe r To establish an active mod e FTP connection, use the fo llowing nota tion: aftp[...]

  • Seite 137

    137 Copyright © Acronis International GmbH, 2002- 2015  Select Microsoft Ex change Information Store to brow se and search f o r informa tio n stores, individual storage group s or databases in the databas e-lev el backups. Select Microsoft Ex change Mailboxes to browse and s earch for entire mailboxes, public folders, individual fold ers, e-ma[...]

  • Seite 138

    138 Copyright © Acronis International GmbH, 2002- 2015  On a managed m achine: En able cataloging in the Backup catalogin g option ( Optio ns > Machine option s ).  On the managemen t server: Enable cataloging by modifying the Wind o ws regist ry (p. 411).  On the storage n ode(s): Enable cataloging by modifyin g the Windows registry ([...]

  • Seite 139

    139 Copyright © Acronis International GmbH, 2002- 2015  Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that the user name and p assword can be intercepte d by an eavesdropper using a[...]

  • Seite 140

    140 Copyright © Acronis International GmbH, 2002- 2015 virtualization product brand and settings. VMware ES X(i) may have multiple stor ages. A Microsoft Hyper-V ser ver enables creating a new v irtual machine in any local folder. The new virtual machine will be configured au tomatically, the source m achine con figuration being copied where possi[...]

  • Seite 141

    141 Copyright © Acronis International GmbH, 2002- 2015 The software will ke ep the NT signature of th e target disk if it is the same as the N T signature stored in the backup . (In other w o rds, if you rec o ver the disk t o the same disk that was backed up.) Otherwise, the s oftware will generate a ne w NT signature for the target dis k. This i[...]

  • Seite 142

    [...]

  • Seite 143

    143 Copyright © Acronis International GmbH, 2002- 2015 3. Examine the first value in the Sector size (logical/phy sical) line. For example, the output may be the following: Sector size (logical/ physical): 512B/4096B 5. 1. 4.2 S ele ct in g t ar ge t v ol um es Available volume d estinations depend on the agen ts operating on the machin e. Recover[...]

  • Seite 144

    144 Copyright © Acronis International GmbH, 2002- 2015 Recover [Disk #] MBR to: [If the Master Boot Rec ord is selected for recovery] Disk # (p. 144) Choose the disk to re cover the M aste r Boot Record to. NT signature: (p. 140 ) Select the way the disk' s sig nature co ntained in t he MBR will be han dled. The disk sign ature is used by Win[...]

  • Seite 145

    145 Copyright © Acronis International GmbH, 2002- 2015 T yp e A basic MBR disk can contain up to four primary vo lumes o r up to thre e primary volumes and multiple logical driv es. By default, the progra m selects the original volume's type. You can change this setting, if required .  Primary . Informati on about primary volumes is c o nt[...]

  • Seite 146

    146 Copyright © Acronis International GmbH, 2002- 2015 When recovering basi c MBR and GPT vo lumes, y o u can select the alignment method manuall y if the automatic alignment does not satisfy you for s o me reason. Th e following opti o ns are availab le:  Select automati c ally - (Defau lt) recommended. T he s o ftware will aut om atically set[...]

  • Seite 147

    147 Copyright © Acronis International GmbH, 2002- 2015 If you allow files to be overwritten, you still have an option to pre v ent overwriting o f specific files by excluding them from the recovery operation. Recovery exclu si ons (p. 147 ) Specify files and f o lders you do n o t wish to be re cover ed. Re co ver y ex cl us ion s Set up exclusion[...]

  • Seite 148

    148 Copyright © Acronis International GmbH, 2002- 2015  Use current use r credentia ls The task will run under the credentials with which the user who starts the ta sks is logged on. If the task has t o run on sch edule, you will be asked for the cu rrent user's pas sword on completing the tas k creation.  Use the followin g credentials[...]

  • Seite 149

    149 Copyright © Acronis International GmbH, 2002- 2015 Limitations Transferring a Linu x system between UEFI and BIOS is n o t supported. Transferring a Win do ws sys te m between UEFI and BIOS is not supported if a backup is stored in any of these locations :  Acronis Cloud St orage  Tape device  Optical discs (C D s, DVDs, or Blu-ray di[...]

  • Seite 150

    150 Copyright © Acronis International GmbH, 2002- 2015 Or ig i nal s yst em Ta rg et ha rdwa re BI OS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: convertible Solution Recover the operating system to an MBR disk or to an un initialized disk. The target mach ine must support BIOS. Additional steps 1. Before recovery, turn off the[...]

  • Seite 151

    151 Copyright © Acronis International GmbH, 2002- 2015 The following table su mmarizes all cases of re covering disks of a BIOS-based syst em to UEFI-based and vice versa.  Green background means that the system will b e bootable. No user action is required.  Yellow background means that you need to perfor m additional st eps to make the sys[...]

  • Seite 152

    152 Copyright © Acronis International GmbH, 2002- 2015 5. 3 Ac ro ni s A cti ve Re sto re Active Restore is the Acronis proprietary techn ology that brings a system o r a da tabase online immediately after its recovery is started. This section describes the use of Active Restore during an operating system re covery . While bas ed on the same techn[...]

  • Seite 153

    153 Copyright © Acronis International GmbH, 2002- 2015 If you opt for Acr o nis Activ e Restore, th e system will be operational in a short ti me. Users will be able to open the nece ssary files from the storag e and use them while th e rest of the files, which are not immediatel y necessary, are being re covered in the backgroun d. Examples: movi[...]

  • Seite 154

    154 Copyright © Acronis International GmbH, 2002- 2015 Why a recovered operating system may be unboo table  The machine B IOS is config ured to boot from another HDD. Solution : Configure the BIOS to boot from the H D D where the op erating system resides.  The system wa s recovered on dissimilar hardware an d the new hardware is in compatib[...]

  • Seite 155

    155 Copyright © Acronis International GmbH, 2002- 2015 Such system canno t boot b ecause its kernel tries to m o unt the root file system at the LVM volume. Solution : Change the loader configuration and /etc / fstab so that the LVM is not used and reactivate the b oot loader. 5 . 4 . 1 H o w t o r e a c t i v a t e G R U B a n d c h a n g e i t s[...]

  • Seite 156

    156 Copyright © Acronis International GmbH, 2002- 2015 or chroot /mnt/system/ / usr/sbin/grub 9. Specify the disk on which GRUB is l ocated — typically, the boot or ro o t partition: root (hd0,0) 10. Install GRUB. For example, to inst all GRUB in the master bo o t record ( MBR) of th e first disk, run the following com m and: setup (hd0) 11. Exi[...]

  • Seite 157

    157 Copyright © Acronis International GmbH, 2002- 2015 Once you confir m the operation, Acr onis Backup will r e -deploy the factory imag e located in Acronis Secure Zone. This will r ecover the original v o lume layout, the pre -installed Wind ows operating system, and any original third-p arty applications. In ad dition, the software will re mov[...]

  • Seite 158

    158 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk re co ver y Fi le re cov ery (a ls o f ro m a di sk ba ck up) Di sk re co ver y Fi le re cov ery (a ls o f ro m a di sk ba ck up) Di sk re co ver y Fi le re cov ery (a ls o f ro m a di sk ba ck[...]

  • Seite 159

    159 Copyright © Acronis International GmbH, 2002- 2015 The preset is Enab led . This option defin es whether to re cover th e files’ date an d tim e from the ar chive or assign the files the current date and time. Validate backups before recov ery The preset is Disa bled . This option defin es whether to v alidate a bac kup to ensure that the ba[...]

  • Seite 160

    160 Copyright © Acronis International GmbH, 2002- 2015 The option enables you to receive e-mail notifications about the recovery task's s uccessful completion, failure o r when user interaction is required. The preset is: Disab l ed . To c onf ig ur e e -ma il no ti fic at io n 1. Select the Send e-mail notifications check box to a ctivate no[...]

  • Seite 161

    161 Copyright © Acronis International GmbH, 2002- 2015 9. Click Send test e-ma il message to check whether e -mail no tifications w o rk correct ly with the specified settings. 5 . 6 . 3 E r r o r h a n d l i n g These options ar e effective fo r Windows and Linux operating systems and b ootable media. These options enabl e you to specify how to h[...]

  • Seite 162

    162 Copyright © Acronis International GmbH, 2002- 2015  Send SNMP no tifi cations in div idually for r ecovery op eration events – to send th e events of t he recovery operati o ns to the specifi ed SNMP managers.  Types of events to s end – ch o ose the types o f events to be sent: All events , Errors and warnings , or Errors o nly . ?[...]

  • Seite 163

    163 Copyright © Acronis International GmbH, 2002- 2015 5 . 6 . 6 M o u nt p o i n t s This option is effe ctive only in Windows for reco v ering data fr om a file -level back up. Enable the Mount po i nts option to r ecover files and folders that were stored on the mounted volumes and w ere backed up w ith the enabled Moun t points option. For det[...]

  • Seite 164

    164 Copyright © Acronis International GmbH, 2002- 2015 5. Click Test command t o check if th e command is correct. Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails* Selected Cleared Selected Cleared Do not reco ver until the command e xecution is complete Selected Selected Cleared Cleared Re sul t Preset Perform the recovery[...]

  • Seite 165

    165 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y the r eco ver y pro ces s p ri ori ty Select one of the f o llowing:  Low – to minimize r esources taken by the r ecovery process, leaving m ore resour ces to other processes running o n the machine  Normal – to run the r ecovery process with n o rmal speed, all o catin[...]

  • Seite 166

    166 Copyright © Acronis International GmbH, 2002- 2015 6 C onv er si on to a vir tu al ma ch in e Acronis Backup o ffers a nu m ber of ways o f convertin g a disk backup into a virtual m achine. This section helps you c hoose t he method that best fits you r needs and provides step- by -step instructions for conversion. 6. 1 C o nve rsi on me tho [...]

  • Seite 167

    167 Copyright © Acronis International GmbH, 2002- 2015  During conversion which is part of a backup plan (p. 168 ), the s o ftware creat es the virtual machine in addition to creating the backup. The virtual machine has the sa m e configu ratio n as the original machine.  During recovery to t he "Ne w virtual machin e" destination [...]

  • Seite 168

    168 Copyright © Acronis International GmbH, 2002- 2015  Conversion of logical volumes to basic ones may als o prevent the system fro m booting up. For these reason s, if t he m achine uses a custom boot lo ader, you might need to configure the loader to point to the ne w devices and reactivate it. Configuri ng GRUB is normally not n eeded becau[...]

  • Seite 169

    169 Copyright © Acronis International GmbH, 2002- 2015 Storage Choose the storage o n the virtuali zation server or the folder to pla ce the virtual machine files in. Resultant VMs Specify the na m e of the vir tual machine. The default n am e is Backup_of_[Machin e Name] . You can add mor e variable s to the name. The followin g tem plates are su[...]

  • Seite 170

    170 Copyright © Acronis International GmbH, 2002- 2015 You can choose the v irtual machine type: VMware W orkstation, Micro so ft Virtual PC, Red Hat Kernel-based Virtual Machine (KVM) or Red Hat Enterprise Virtualization (RHEV). In the Storage step, yo u ca n select the virtual machine path. What is the machine 's processing power? Conversio[...]

  • Seite 171

    171 Copyright © Acronis International GmbH, 2002- 2015 If you choose to creat e the virtual machine on a virtu alization server The first conversi o n creates a new v irtual mach ine. Any subsequent conversi on works as follows:  If there has been a full backup since the last c o nversion, the virtual machine is re-created from scratch, as desc[...]

  • Seite 172

    172 Copyright © Acronis International GmbH, 2002- 2015 6. 2. 3.1 S tep s to pe rf or m To p er for m a r eco ve ry to a ne w v ir tu al mac hi ne 1. Connect the cons o le to the manage ment server, to a machine where an agent is installed, or to a machine booted fr om a bootable media. 2. Click Recover to o pen the Recove r data (p. 132) page. 3. [...]

  • Seite 173

    173 Copyright © Acronis International GmbH, 2002- 2015 deployed immedia te ly after you cli ck OK . Recovery wil l be performed by that age nt. It will take a license. 3. Click OK to return t o the Recover da ta page. To s el ect t he vir tu al ma chi ne ty pe 1. Choose the Save the virtual machine as a set of fi les option. 2. In the left part of[...]

  • Seite 174

    174 Copyright © Acronis International GmbH, 2002- 2015 Enter the name f o r the new vir tual machine. If the backup w as created by Agent for VMware or Agent for Hyper-V, the software takes t he name from the virtual machine c o nfigu ratio n contained in the backup. Processors Initial setting: if not contained in the backup or if t he backed -up [...]

  • Seite 175

    175 Copyright © Acronis International GmbH, 2002- 2015 6 . 3 . 2 S t ep s t o pe r f o r m To p er for m a r eco ve ry to a ma nu all y c re at ed vir tu al ma ch ine 1. [Optional] When rec overing Windows, prepare Wind ows drivers that correspond to the target virtualization platfor m . For machines runnin g Linux, the n ece ssary dri vers are no[...]

  • Seite 176

    176 Copyright © Acronis International GmbH, 2002- 2015 7 St or in g the b ac ke d u p da ta 7. 1 Va ul ts A vault is a locati o n for stor ing backup archives. For ease of use an d administration, a vault is associated with the archives' metadata. Referring to this metadata makes f or fast and convenient operations with archi ves and backups [...]

  • Seite 177

    177 Copyright © Acronis International GmbH, 2002- 2015 'Vaults' view Vaults (on the naviga tion pane) - top item of the vaul ts tree. Click this ite m to display cen tralized and personal vaults. To perform actions on any vau lt, use the toolbar that is loca ted at the top of the Vaults view. For c entralized vaults, see the Actions o n [...]

  • Seite 178

    178 Copyright © Acronis International GmbH, 2002- 2015 What doe s the icon mean? When browsing archi ves on the Archive view tab, y ou may encounter a backup with the icon. This icon means tha t the b ackup is marked for deletio n but cannot be deleted immediat ely for any of the following reas o ns:  Other backups depend on it, but consolidati[...]

  • Seite 179

    179 Copyright © Acronis International GmbH, 2002- 2015 Fu nc tio nal ity Ma nag ed v aul ts U nman ag ed vau lt s SAN, NAS Yes Yes FTP/SFTP server No Yes 7. 1. 2.1 A ct io ns o n cen tra liz ed va ul ts To a cc ess ac ti ons 1. Connect the cons o le to the manage ment server. 2. In the Navigation pane, click Vaults > Centralized . All the opera[...]

  • Seite 180

    180 Copyright © Acronis International GmbH, 2002- 2015 To Do in the Attachin g a managed vault (p. 185 ) section. Note . Tape-based vaults cannot be attached. Validate a vault 1. Select the vault. 2. Click Validate . You will be taken to the Validat ion (p. 237 ) page with a n already pre -selected vault as a source. The vault validation ch ecks a[...]

  • Seite 181

    181 Copyright © Acronis International GmbH, 2002- 2015 [Optional] Select whether to pr o tect the vaul t with encryption. Anything w ritten to the vault will be encrypted and anything read from it will be decrypted transparently by t he storage node, using a vault-sp ecific encryption key stored o n the storage n ode. A vault located o n a tape d [...]

  • Seite 182

    182 Copyright © Acronis International GmbH, 2002- 2015 Compression [Optional] Select whether to co m press the dedupli cation data stores. This setting is available only if the backward compatibility is turned o n and dedu plication is enabled. User accounts Vault administra tors (p. 183 ) Add groups or user a ccounts that will have administra tor[...]

  • Seite 183

    183 Copyright © Acronis International GmbH, 2002- 2015 stored on the node. If the storage medium is stolen o r accessed by an unauthorized person, the malefactor will n o t be able to de cry pt the vault contents without acces s to the storage node. This encryption ha s nothing to do with the archive en cryption specified by the b ackup plan and p[...]

  • Seite 184

    184 Copyright © Acronis International GmbH, 2002- 2015 You will be pro m pted to specify the domain account credentials, when you enter a user or group name that cannot b e checked using your domain a ccount; for example, if you ar e logged on using a domain account o ther than the domain name you have entere d t o check. Va ul t u se rs Vault use[...]

  • Seite 185

    185 Copyright © Acronis International GmbH, 2002- 2015 Va ul t p at h To s pec if y the pa th wh er e t he u nma na ged v aul t will b e c re at ed 1. Enter the full path to the folder in the Path field or sel ect t he desir ed fo lder in th e folders tree. Unmanaged vaults can be organized:  On Acronis Cloud S to rage.  On a network shar e [...]

  • Seite 186

    186 Copyright © Acronis International GmbH, 2002- 2015 If the vault is dedu plicating, we recommend that you move the deduplication da tabase from the old storage node t o the new one. Otherwise, the software will automaticall y re -create the deduplication database, which m ay take a lo ng time to perform. For the informati o n about t he recomme[...]

  • Seite 187

    187 Copyright © Acronis International GmbH, 2002- 2015 7 . 1 . 3 P e r s o n a l v a ul t s A vault is called per so nal if it w as created usi ng direct co nnection of the console to a managed machine. Personal vaults are specific for each manage d machine. Personal vaults are visible to any user that can l og on to the sy stem. A user' s ri[...]

  • Seite 188

    188 Copyright © Acronis International GmbH, 2002- 2015 To Do for accessing a vault In the appearing d ialog box, provide the credentia ls required for accessing t he vault. Create Acronis Secure Zone Click Creat e Acronis Secure Zon e . The procedure of creating th e Acronis Secure Zone i s described in -depth in the Creating Acronis Secure Zon e [...]

  • Seite 189

    189 Copyright © Acronis International GmbH, 2002- 2015 3. Create a new vaul t. 4. Edit the backup plan s and t asks: redirect their d estination to the new vaul t. 5. Delete the old vault. How can I merge two vaults? Suppose you have two vaults A and B in use. Both v aults are us ed by backup plans. You decid e to leave only vaul t B , moving all [...]

  • Seite 190

    190 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y a n ew ca che f old er in L inu x: Add the following element inside the Confi g uratio n tag in /etc/Acronis / MMS.config : <key name="Catalog"> <value name="Cat alogDir" type="TString">"/home/C atalog/"</value> </key&g[...]

  • Seite 191

    191 Copyright © Acronis International GmbH, 2002- 2015  Offers a cost-effecti ve and han dy method for protecting data fro m software malf unction, virus attack, operat or error.  Since it is internal archi ve storage, it eliminates th e need for a separate media o r n et work connection to back up or recover the data. This is esp ecially us[...]

  • Seite 192

    192 Copyright © Acronis International GmbH, 2002- 2015 7. 2. 1.2 A cr on is S ecu re Z on e S iz e Enter the Acronis Secur e Zone size or drag the slider to select any size between the mini mum and the maximum ones. Th e minimum size is approxima tely 50MB, depending on the g eometry of the hard disk. The maximu m size is equal to the disk's [...]

  • Seite 193

    193 Copyright © Acronis International GmbH, 2002- 2015 As is apparent fro m the abov e, setting the maximum possible zone size is n ot advisable. You will end up with no free space o n an y volume which m ight cau se the o perating sy stem or applications to w o rk unstably and even fail to start. 7 . 2 . 2 M an ag i n g A c r o n i s S e c u r e [...]

  • Seite 194

    194 Copyright © Acronis International GmbH, 2002- 2015 7. 2. 2.3 D ele ti ng A cro ni s Sec ur e Z one To d ele te Ac ro nis S ecu re Zo ne : 1. On the Manage Acronis Secure Zon e page, click Delete . 2. In the Delete Acroni s Secure Zon e window, select volumes to which you want to add the spac e freed from the z o ne and th en click OK . If you [...]

  • Seite 195

    195 Copyright © Acronis International GmbH, 2002- 2015 Fu nc tio nal ity Fi xe d d riv e Re mov abl e m edi a You can set the option t o clean up the arch ive " When there is insufficient space w hile backing up " within th e Custom (p. 69 ) backup scheme. Yes No Simplified naming (p. 77 ) of backup files... ...is unavailable. ...is alwa[...]

  • Seite 196

    196 Copyright © Acronis International GmbH, 2002- 2015 device with several dr ives is attach ed to a storage node, multiple machines can simultaneously back up to tapes. 7. 4. 2.1 C omp at ib il ity w ith R SM a nd th ir d-p ar ty sof tw a re Coexistence with third -party softwa re Acronis Backup cann ot work with tapes on a machi ne where third-p[...]

  • Seite 197

    197 Copyright © Acronis International GmbH, 2002- 2015 3. Add the registry k ey descri bed below. Specify the new location path in th e registry value ArsmDmlDbProto c ol . Registry key: HKEY_ LOCAL_MACHINESOFTWAREAcr o nisARSM Settings Registry value: ArsmD mlDbProtocol Possible data values: Any strin g 0 to 32765 characters long. Descriptio[...]

  • Seite 198

    198 Copyright © Acronis International GmbH, 2002- 2015 Custom scheme Set up the custo m scheme so that it creat es full backu ps with a reasonable frequ ency. Otherwise, if you specify retention rules, the software will no t be able to overwrite tapes as ap propriate. In the retention rul es of the Custom backup sche me (p. 69 ), the If a backup t[...]

  • Seite 199

    199 Copyright © Acronis International GmbH, 2002- 2015 12. Barcode printers are not sup po rted. 7. 4. 2.7 Re ad ab il it y o f ta pes wr it te n by th e old er A cro ni s pro du ct s The following table su mmarizes the readability o f tapes writt en by Acronis True Image Echo, Acronis True Image 9.1, A cro nis Ba ckup & Recovery 10 and Acroni[...]

  • Seite 200

    200 Copyright © Acronis International GmbH, 2002- 2015 4. Click Detect tape de vic es . 5. If your tape devic e is a stan d -alone drive, skip this step. Otherwi se, do the followi ng: a. Click Inventory to det ect the load ed tapes. Select the Full invent orying method. Do n o t select the Move newl y detected ta pes from the 'Unrecognized t[...]

  • Seite 201

    201 Copyright © Acronis International GmbH, 2002- 2015 Tapes sent to the Imported t apes pool contain backups written by Acronis software. Be fore moving such tapes to the Free tapes pool, make sure yo u do not need these bac kups. c. Decide whether y ou want t o back up to th e default Acronis pool (p. 204) or to create a n ew pool (p. 205) . Det[...]

  • Seite 202

    202 Copyright © Acronis International GmbH, 2002- 2015 8. If any of the required tapes are not loaded for s ome reason, the software will show you a message with the identifier of the needed tape. L o ad th e tape, and click Retry to co ntinue the recovery. What if I do not see ba ckups stored on tapes? It may mean that the database with the conte[...]

  • Seite 203

    203 Copyright © Acronis International GmbH, 2002- 2015 9. Select the Unrecogn ized tapes pool. 10. Select the tapes to be resc anned. To select all the tapes of the pool, select the check box next to the Tape name colu mn header. 11. If the t apes c o ntain a pass wo rd-protected ar chive, select the corresp o nding che ck box, and th en specify t[...]

  • Seite 204

    204 Copyright © Acronis International GmbH, 2002- 2015 7 . 4 . 4 T a p e m an a ge m e n t 7. 4. 4.1 D ete ct in g tap e dev ic es When detecting tap e devices, Acronis Backup fin ds tape devices attached t o the machin e and places information about them in the tape management dat abase. Detecting tape dev ices is requ ired:  After you have a [...]

  • Seite 205

    205 Copyright © Acronis International GmbH, 2002- 2015  backups from diff erent dep artments of your company  backups from diff erent machines  backups of syste m volumes and users' data  filled tapes from tap es being written to (p. 205). S epa ra ti ng f ill ed ta pes You may want t o separate filled tapes from incomplet e o nes[...]

  • Seite 206

    206 Copyright © Acronis International GmbH, 2002- 2015 To e dit a po ol : 1. In the Navigation tr ee , clic k Tape managemen t . If con nected to the manag ement ser v er, select the storage node to which your tape device is a tt ached. 2. Select the required pool, and then click Settings . 3. You can change th e pool name (e xcept the na me of th[...]

  • Seite 207

    207 Copyright © Acronis International GmbH, 2002- 2015  You cannot mo ve write-protected and o nce-recorded WORM (Write-Once-Read- Many) tapes to the Free tapes po o l.  Cleaning tapes are alw ays displayed in the Unrecogni z ed tapes pool; y o u cannot mo ve them to any other pool. To m ov e t ape s to an ot her p ool : 1. In the Navigation[...]

  • Seite 208

    208 Copyright © Acronis International GmbH, 2002- 2015 After a tape is eje cte d eith er manually o r automatically (p. 126 ), it is recom mended to write its name on the tape. Er as ing Erasing a tape physicall y deletes all backups stor ed on the tape and rem o ves the in fo rmation about these backups fr o m the dat abase. However the informati[...]

  • Seite 209

    209 Copyright © Acronis International GmbH, 2002- 2015 Note During the in ventorying, do not select th e Move newly detected tapes from the 'Unrecognized tapes' or 'Imported tapes ' pools to the 'Free tapes ' pool check box. 4. Click Rescan . 5. Select the vault where the newly detected archives will be placed. 6. Sel[...]

  • Seite 210

    210 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup reads tags written by Acronis softwar e and analyzes other infor mation about the contents of the lo aded tapes. Select this method to recognize empty tapes and t apes written by Acronis software on an y tape device and any m achine. The following table sh ows pools to which tap[...]

  • Seite 211

    211 Copyright © Acronis International GmbH, 2002- 2015 4. [Optional] Select the Move newly de tected tape s from the 'Un r ecogni z ed tapes' o r 'Imported tapes' poo ls to the 'Free tap es' pool check box. Warning. Only select th is check bo x if you are absolutely sure t hat the data stored on yo ur tapes can be ove[...]

  • Seite 212

    212 Copyright © Acronis International GmbH, 2002- 2015 Personal tape-based vaults Before backing up a m achine to a dire ctly attached tape device, yo u can cr eate a personal vault. If you do not want to , the software will automatically create a personal vault associated with the Acronis pool. If you create m o re than one pers onal vault, tapes[...]

  • Seite 213

    213 Copyright © Acronis International GmbH, 2002- 2015 2. Perform the fast in v entorying (p. 20 9 ) with the Move newly detected tapes fro m the 'Unrecognized ta pes' or 'Imported tapes' po ols to the 'Free tapes' pool check box selected. Result . The loaded tapes are in the Free tapes pool. If some of them are sent [...]

  • Seite 214

    214 Copyright © Acronis International GmbH, 2002- 2015  In Tape poo l , select the pool wh ere yo u will back up to (the Acronis pool or the n ew ly created one). 7. When creating a c entralized backup plan (p. 354):  In Items to back up , s elect the machines you want to back up.  Choose the created vault as the backup destina tion.  [...]

  • Seite 215

    215 Copyright © Acronis International GmbH, 2002- 2015 7. After each backup is created and the tapes with it are ejected, send them t o a secure off-site storage. If you d o not have enoug h free tapes to continu e backups, load ne w tapes and perform steps 2 and 4. Result The machine will b e backed up t o the local folder and to tapes. Tapes wit[...]

  • Seite 216

    216 Copyright © Acronis International GmbH, 2002- 2015 Result The machine will b e backed up t o tapes acc o rding to the s pecified backup scheme. Tapes with full backups will be sent to a secure off-site storage. 7. 5 St or ag e no des The following secti o ns desc ribe how to use Acronis Backup Sto rage Nod e. Storage nodes are a vailable only [...]

  • Seite 217

    217 Copyright © Acronis International GmbH, 2002- 2015 Deduplication A managed vault can be configured as a deduplicating vault. This means that ide ntical data will be backed up to this vaul t only once to minimize net work usage during backup and to minimize storage space taken by the archives. For more infor mation, see the "Deduplication&[...]

  • Seite 218

    218 Copyright © Acronis International GmbH, 2002- 2015 b. Select the storag e node, then click Create vault . The Create centralized vault page will be opened with the pr e-selected storage node. P erform th e remaining steps to create the vault as described in "Creatin g a managed centralized vault" (p. 180). Details. When spe cifying t[...]

  • Seite 219

    219 Copyright © Acronis International GmbH, 2002- 2015 Additional right of machine administrators A vault user who is a member of the Administrat ors group on a machine can v iew and man age any archives created f rom that machine in a managed vault — regardless of the type of that user's account on the storage n o de. Example Suppose that [...]

  • Seite 220

    220 Copyright © Acronis International GmbH, 2002- 2015 To Do storage node. Perform the r emaining steps to create th e vault. View details of the storage node 1. Select the storage no de. 2. Click View details . In the Storage n ode properties (p. 221 ) window (its con tent is duplicated on th e Information panel at the bottom of the Storage nod e[...]

  • Seite 221

    221 Copyright © Acronis International GmbH, 2002- 2015 7. 5. 6.3 S tor ag e no de pr ope rt ie s The Storage node properties window accumulates in fo ur tabs all infor mation on the select ed Acronis Backup St o rage No de. This information is also duplicated on the Information panel. Storage node properties This tab displays the fo llowing inform[...]

  • Seite 222

    222 Copyright © Acronis International GmbH, 2002- 2015 Vaults This tab displays a lis t of vaults managed by the select ed storage node. To update the list of vaults with the most rec ent information from the manag ement server, click Refresh . Indexing This tab lets you exa mine the current status o f indexi ng for the deduplicating va ults of th[...]

  • Seite 223

    223 Copyright © Acronis International GmbH, 2002- 2015 The size of the del et ed dat a is 20 GB, and the size of the re m aining data is 80 GB. The ratio of the deleted to remain ing data is thus 2 0 GB / 80 GB = 0.25, or 25 percen t. The storage node calculat es the relative size of the remaining data as 1 0 0 percent – 25 percent = 75 percent.[...]

  • Seite 224

    224 Copyright © Acronis International GmbH, 2002- 2015 See also the Fast Ope ration Connection Limi t parameter. Backup Queue Li mi t Description: Specifi es the maxi mum number of agents in the s to rage n o de's backup qu eue. Possible values: An y intege r number between 1 and 21474 8 3647 Default value: 50 The backup queue is a list of ag[...]

  • Seite 225

    225 Copyright © Acronis International GmbH, 2002- 2015 A vault database contain s in fo rmation about archives and backups stored in the vault. When you create or attach a vault, the storage node places the database for that vault t o the folder determined by this pa rameter. Changing this pa ram eter does n o t affect the currently existing vault[...]

  • Seite 226

    226 Copyright © Acronis International GmbH, 2002- 2015 When the amount o f free s pace in a vault is equal to t he value in Vault Free Space Wa r ning Lim it or less, a warning is recorded in the storage node's log, indicating the vau lt in question. You can view s to rage n ode warnings in the D ashboard. Vault Free Spa c e Warning Percenta [...]

  • Seite 227

    227 Copyright © Acronis International GmbH, 2002- 2015 The database is s tored on th e storage node in a local f older whose name is specif ied by the by the Vault Metad ata Data base Path parameter. Vault Databa s e Free Space Error L i mit Description: Specifies th e amount of free space on the volume containing a m anaged vault's database,[...]

  • Seite 228

    228 Copyright © Acronis International GmbH, 2002- 2015 of RAM, but leav e at least 2 GB of RAM for the operating system and o ther appli cations. You can change this beha v ior by usin g the DatastoreInd exCacheM emoryPercent and Da tastoreIndexRese rvedMemory parameters. The amount of allo cated memory is calculated bas ed on the following rule :[...]

  • Seite 229

    229 Copyright © Acronis International GmbH, 2002- 2015 The deduplication is per formed on data blocks. Th e block size is 4 KB for disk-lev el backups an d 1 B to 256 KB for file-le vel backups . Each file that is less than 256 KB is consider ed a data block. Files larger than 256 KB are split into 256-KB blocks. Acronis Backup perf o rms d edupli[...]

  • Seite 230

    230 Copyright © Acronis International GmbH, 2002- 2015 Deduplication at targe t After a backup t o a deduplicating v ault is c ompleted, the storage node run s the indexing activi ty. This activity deduplicat es the data in the vault as f o llows: 1. It moves the data bloc ks from the temporary fil e to a special file within the vault , storing du[...]

  • Seite 231

    231 Copyright © Acronis International GmbH, 2002- 2015 Compacting After one or m o re backups o r archives ha v e been d eleted from the vault — either manually or durin g cleanup — the data store may contain blocks which ar e no longer referred to fr om any archive. Such blocks are deleted b y t he co mpacting task, which is a scheduled t ask[...]

  • Seite 232

    232 Copyright © Acronis International GmbH, 2002- 2015 Place the deduplicatio n database and dedup licating vault on separat e physical devices To increase the speed of access to a deduplicati on database, the database and t he vault m ust be located on separat e physic al devices. It is best to all ocate dedicat ed devices for the vault an d the [...]

  • Seite 233

    233 Copyright © Acronis International GmbH, 2002- 2015 64 -bit operating system The storage node must be in stalled in a 64 -bit oper ating system. The machine w ith the s to rage node should not run appli cations that require much sy stem resources; for example, Database Management Syst em s (DB M S) or Enterprise Resource Planning (ERP) syst ems[...]

  • Seite 234

    234 Copyright © Acronis International GmbH, 2002- 2015 Disk-level backup Deduplication of disk bl ocks is not performed if the volume's allocation unit size — also known as cluster size or bloc k size — is not divisib le by 4 KB. Tip: The allocation unit size on most NTFS a nd ext3 volum es is 4 KB. This allows for block -level dedu plica[...]

  • Seite 235

    235 Copyright © Acronis International GmbH, 2002- 2015 This method requires stopping the Acronis St orage Node Service. Both methods use th e same principle: if the s to rage n o de does not find the database, it creates th e database from scra tch. This process length depends on the datastore size and dis k I/O speed. On average, 1 TB of the data[...]

  • Seite 236

    236 Copyright © Acronis International GmbH, 2002- 2015 Deduplication database and datastore are in the same folder 1. Detach the managed v ault. 2. Move the old dedup lication datab ase files to an other folder. 3. Attach the manag ed vault. When att aching, specify the same pa ths, including the same de duplication database pat h. Validating the [...]

  • Seite 237

    237 Copyright © Acronis International GmbH, 2002- 2015 8 O pe rat io ns wi th a rch iv es an d bac ku ps 8. 1 Va li da tin g a rc hiv es a nd ba cku ps Validation is an oper ation that checks the pos sibility of data recovery fr om a backu p. Validation of a fil e backup imitat es recovery o f all files from the backup to a dummy destination. Vali[...]

  • Seite 238

    238 Copyright © Acronis International GmbH, 2002- 2015 Credentials (p. 23 9 ) [Optional] Provide cr edentials for accessing the so urce if the task acc o unt does no t have enough privileges t o access it. When to validate Start validation (p. 2 4 0) Specify when and h ow often to perform validati on. Task parameters Task name [Optional] Enter a u[...]

  • Seite 239

    239 Copyright © Acronis International GmbH, 2002- 2015  To select a centraliz ed vault (either managed or unmanaged), expand the Centralized group and click the vault. If you cannot acc ess a manag ed v ault (for exa m ple, wh en using bootable media), select the Storage nod es group, enter th e storage nod e name in the Path box (by using th e[...]

  • Seite 240

    240 Copyright © Acronis International GmbH, 2002- 2015 According to t he original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that the user name and p assword can be intercepte d by an eavesdropper using a p acket sniffer. 8 . 1 . 5 W h e n t o v a l i d at e As va[...]

  • Seite 241

    241 Copyright © Acronis International GmbH, 2002- 2015 8. 2 E x por tin g arc hiv es a nd ba cku ps The export operati on creates a copy of an archi v e or a self-sufficient part copy of an archive in the location you specify. The original archive remains untouched. The export operati on can be applied to:  A single archive - an e xact archive [...]

  • Seite 242

    242 Copyright © Acronis International GmbH, 2002- 2015 The exported archi ve inherits the o ptions of the original arch ive, including e ncryption and th e password. When exporting a password-protected arch ive, you are prompted for t he password. If the original archive is encrypted, the password is used to encrypt the resulting archive. Source a[...]

  • Seite 243

    243 Copyright © Acronis International GmbH, 2002- 2015 Select the type of objects t o export: Archive - in this case, you need to specify the archi ve only. Backups - you need to specify the archive first, and t hen selec t the desir ed backup(s) in this archive. Browse Select the Archi v e (p. 243) or the Ba ckups (p. 243) . Show access crede nti[...]

  • Seite 244

    244 Copyright © Acronis International GmbH, 2002- 2015 8 . 2 . 3 A c c e s s c r e d e n t i a l s f o r s o u r c e Specify credentials r equired for access to the location where the source archive, or t he backup is stored. To s pec if y cre de nti als 1. Select one of the f o llowing:  Use the current u ser credentials The software will acc [...]

  • Seite 245

    245 Copyright © Acronis International GmbH, 2002- 2015 After entering acc ess crede ntials, the folders on the se rv er become availab le. Click the appropriate folder o n the server. You can access th e server a s an anonymous user if the server enables such access. To do so , click Use anonymous ac c ess instead of e ntering creden tials. Note A[...]

  • Seite 246

    246 Copyright © Acronis International GmbH, 2002- 2015 The software will acc ess the destination using th e cred entials you specify. Use this option if the task account d o es not have access per missions to the destinati on. Specify:  User name . When en tering the name of an Active D irectory user account, be sure to also specify the domain [...]

  • Seite 247

    247 Copyright © Acronis International GmbH, 2002- 2015 Select volumes t o mount an d configure the m ount setting s fo r every v olume: assig n a letter or enter the mount po int, choos e the read/writ e or read only access mode. When you complet e all the required steps, clic k OK to mount the vo lumes. 8 . 3 . 1 A r c h i v e s e l ec t io n To [...]

  • Seite 248

    248 Copyright © Acronis International GmbH, 2002- 2015 Specify:  User name . When en tering the name of an Active D irectory user account, be sure to also specify the domain name (DOMAINUsername or Usern am e@domain ).  Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, c redentials require[...]

  • Seite 249

    249 Copyright © Acronis International GmbH, 2002- 2015 8. 4 O per ati on s ava ila bl e i n va ult s By using vaults, y ou can easil y access archi ves and backup s and perform archive manage ment operations. To p er for m ope ra tio ns wit h ar ch ives a nd ba ck ups 1. In the Navigation pane, select the vault whose archi ves you need to manage. [...]

  • Seite 250

    250 Copyright © Acronis International GmbH, 2002- 2015 8 . 4 . 2 O p e r a t i o n s wi t h b a c k u p s To p er for m any op er at ion wi th a bac ku p 1. In the Navigation pane, select the vault that c o ntains archives. 2. On the Archive v iew tab of the v ault, select the archive. Then, expand the archi ve and click the backup to select i t. [...]

  • Seite 251

    251 Copyright © Acronis International GmbH, 2002- 2015 8 . 4 . 3 C o n v e r t i n g a b a c k u p t o f u l l When the chain o f incremen tal backups in an archive becomes lo ng, con v ersion of an incr emental backup to a full one increases the reliability of your archive. You may also want to convert a differential backup if t here are incremen[...]

  • Seite 252

    25 2 Copyright © Acronis International GmbH, 2002- 2015 Please be aware that consoli dation is just a me tho d of deletion but not an alternative to delet ion. The resulting backup w ill not contain da ta that was present in the deleted backup and was absent from the retained incremental or differential ba ckup. There should be enoug h space in th[...]

  • Seite 253

    253 Copyright © Acronis International GmbH, 2002- 2015 9 B oot ab le me dia Bootable media Bootable media is physical media (CD, DVD, USB flash drive or other re m ovable media supp orted by a machine BIOS as a b oot device) that boots on any PC-compatible machine and e nables you to run Acronis Backup Agent either in a Linux-based environ ment or[...]

  • Seite 254

    254 Copyright © Acronis International GmbH, 2002- 2015  Bootable media based on WinPE versi o ns earlier than 4.0 cannot boot on machi nes that use Unified Extensible Fir mware Interface (UEFI).  When a machine is booted with a PE -based bootable media, you cannot select optical media such as CD, DVD, or Blu-ray Discs (BD) as a backup destin[...]

  • Seite 255

    255 Copyright © Acronis International GmbH, 2002- 2015  If you set, say, 10 s ec. for the bo o table agent, the age nt will launch 10 seconds after the menu is displayed. This enables unattended onsi te operation when booting from a PXE server or WDS/RIS. d. [Optional] Remot e logon settings:  User name and pa ssword to be entered on the con[...]

  • Seite 256

    256 Copyright © Acronis International GmbH, 2002- 2015 Prompts for the video mode t o be used by the b ootable media's graphical user interface. Without the vga param eter, the video mode is de te cted auto matically. vga= mode_number Specifies the vid eo mode t o be used by t he bootable m edia's graphical us er interface. The mode numb[...]

  • Seite 257

    257 Copyright © Acronis International GmbH, 2002- 2015 Uses PCI BIOS calls t o get the interru pt routing table. You m ay want t o use this p arameter if the kernel is unable t o allocate interrupt requests (IRQs) or di scover secondary PCI buses o n the motherboard. These calls might no t work properly on some m achines. But this may be the only [...]

  • Seite 258

    258 Copyright © Acronis International GmbH, 2002- 2015 9. 1. 1.3 Ne tw or k por t While creating bo o table media, y o u have an option to pre-configure the network port that the bootable agent listens for incoming connecti on. Th e choice is av ailable bet ween:  the default port  the currently used po rt  the new port (en te r the po rt[...]

  • Seite 259

    259 Copyright © Acronis International GmbH, 2002- 2015 http://www.micr o soft.co m/downloads/details.aspx?f am ilyid=696D D665 -9F76-4177-A811-39C 26 D3B3B34&displa y lang=en Automated Installa tion Kit (AIK) Supplement for Windows 7 S P 1 (PE 3.1) : http://www.micr o soft.co m/download/en/details.aspx ? id=5188 You can find syste m requiremen[...]

  • Seite 260

    260 Copyright © Acronis International GmbH, 2002- 2015  [Optional] To creat e a 64 -bit bootable media, select the Create x6 4 media check box, if available. A 64-bit m edia is required to boot a machin e that uses Unified Extensible Firmware Interface (UEFI).  The software runs the appropriate script and pr o ceeds to t he next wind ow. Whe[...]

  • Seite 261

    261 Copyright © Acronis International GmbH, 2002- 2015 Configuring network settings To change the net wo rk sett ings for a current session, click Configure ne twork in the startup window. The Network Se tti ngs window that appe ars will allow you to configu re network settings for ea ch network interface card (NIC) of the machine. Changes made du[...]

  • Seite 262

    262 Copyright © Acronis International GmbH, 2002- 2015 3. Backups created using bootable media ha v e simplified file names (p. 77 ). Standard names are assigned to the backup s only if these are added to an existing archive with stan dard file naming, or if the destination does not support simplified fil e names. 4. The Linux-style bo o table med[...]

  • Seite 263

    263 Copyright © Acronis International GmbH, 2002- 2015 2. Click Configure i SCSI/NDAS d ev ices (in a Linux-based media) or Run the iSCSI Setu p (in a PE -based m edia). 3. Specify the IP add ress and port of the iSCSI de vice's host, and the name of the iSCSI in itiato r. 4. If the host requires auth entication, specify the user n ame and pa[...]

  • Seite 264

    264 Copyright © Acronis International GmbH, 2002- 2015 e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautor un zcat hexdump readcd hotp[...]

  • Seite 265

    265 Copyright © Acronis International GmbH, 2002- 2015 Unless you use the GRUB boot loader and it is install ed in the Master Boot Re co rd (MBR), Acr onis Startup Recover y Manager activ ation overwri tes the MBR with its own boot c o de. Thus, yo u may need to reactivate third-party boot loaders if they are installed. Under Linux, when usin g a [...]

  • Seite 266

    266 Copyright © Acronis International GmbH, 2002- 2015 Acronis PXE Server run s as a service immediat ely after installation. Later on it will automatically launch at each sys tem restart. You can stop and start Acronis PXE Server in th e same way as other Windows services. 9 . 6 . 2 S e t t i n g u p a ma c h i n e t o b o o t f r o m PX E For ba[...]

  • Seite 267

    267 Copyright © Acronis International GmbH, 2002- 2015 10 D isk m an ag eme nt Acronis Disk Direc tor Lite is a t o ol for preparin g a machine disk/volume configuration f o r recovering the volume images saved by the Acronis Backup software. Sometimes after t he volum e has been back ed up and its image placed into a safe storage, the machine dis[...]

  • Seite 268

    268 Copyright © Acronis International GmbH, 2002- 2015 1. Back up the disk o n which v olumes will be created or managed. Ha v ing your m ost important data backed up to another hard disk, network share o r rem o vable media will allow you to work on disk volumes being r eassured that your data is safe. 2. Test your disk to ma ke sure it is fully [...]

  • Seite 269

    269 Copyright © Acronis International GmbH, 2002- 2015 10 .5 "D is k m an age men t" vi ew Acronis Disk Direc tor Lite is contr o lled through th e Disk mana g ement view of t he console. The top part of the v iew co ntains a disks and volumes table enabli ng data sorting and colu mns customization and t oolbar. The table presents th e n[...]

  • Seite 270

    270 Copyright © Acronis International GmbH, 2002- 2015 1 0 . 6 . 1 D i s k i ni t i a l i z at i o n If you add any n ew disk to your m achine, Acr onis Disk Director Lite will n otice the configuration change and scan the added disk to include it t o the dis k and volume list. If t he dis k is st ill not initialized or, possibly, has a file struc[...]

  • Seite 271

    271 Copyright © Acronis International GmbH, 2002- 2015 10 .6 .2 .1 Se lec ti ng s ou rc e a nd ta rg et di sk s The program displa ys a list of partitioned disks and asks the user to select t he source disk, from which data will be transferred to another disk. The next step is s election of a disk as target for the clo ning operation. The program [...]

  • Seite 272

    272 Copyright © Acronis International GmbH, 2002- 2015 You have the follo wing two alternatives to retain sy stem b o otability on th e targe t disk volu m e: 1. Copy NT signature – to provide the t arget disk with the source disk NT signatur e matched with the Registry keys als o copied on the target disk. 2. Leave NT signatur e – to keep the[...]

  • Seite 273

    273 Copyright © Acronis International GmbH, 2002- 2015 Dynamic disk conversi on: MBR to GPT Acronis Disk Direc tor Lite does n o t support direct MBR to GPT conversi on for dynamic disk s. Howev er you can perfor m the followin g conversions to reach the g oal using the pr o gram: 1. MBR disk conversion : dynamic to basic (p. 274) using the Conver[...]

  • Seite 274

    274 Copyright © Acronis International GmbH, 2002- 2015 System disk conversio n Acronis Disk Direc tor Lite does n o t require an o peratin g system reboot after basic to dynamic conversion of the dis k, if: 1. There is a single Windows 2008 / Vista operatin g system installed on the dis k. 2. The machine runs this operating system. Basic to dynami[...]

  • Seite 275

    275 Copyright © Acronis International GmbH, 2002- 2015  safe conversion of a dynamic disk to basic when it contains volumes with data for simple and mirrored volu mes  in multiboot syste ms, bootability of a system that was offline during the operation 1 0 . 6 . 7 C h a n g i n g di s k s t a t u s Changing disk status is effective for Windo[...]

  • Seite 276

    276 Copyright © Acronis International GmbH, 2002- 2015  Store backups (image s) of other volumes/disks o n a special volum e;  Install a new operating system (or swap file) o n a new volu m e;  Add new hardwar e to a machine. In Acronis Disk Dire cto r Lite the to o l for creating vo lumes is the Create volume Wiz ard . 10 .7 .1 .1 Ty pe [...]

  • Seite 277

    277 Copyright © Acronis International GmbH, 2002- 2015 and is able to o v ercome the physical dis k size limitations wi th a higher than mirrored disk- to -volume size ratio. 10 .7 .1 .2 Cr ea te v ol um e w iz ar d The Create volume wizard lets you create any typ e of volume (including syst em and active), select a file system, label, assign a le[...]

  • Seite 278

    278 Copyright © Acronis International GmbH, 2002- 2015 To create a RAID- 5 volume :  Select three destinati on disks to create the v o lume o n. After you choose the disks, the wizard will calculate the maximu m size of the resulting v olume, depending on the size of the unalloca ted space on the disks y o u chose and the requ irem ents of the [...]

  • Seite 279

    279 Copyright © Acronis International GmbH, 2002- 2015 If you are creating a ba sic volume, which can be made into a system volu me, this page will be different, giving you the opportunity to select the volume Type — Primary ( Active Primar y ) or Logical . Typically Primary is selected to install an operating s ystem to a volume. Select th e Ac[...]

  • Seite 280

    280 Copyright © Acronis International GmbH, 2002- 2015 1 0 . 7 . 3 S e t a c t i v e v ol u m e If you have several pri mary volumes, you m ust specif y one to be the b oot volume. For this, you can set a volume to be come active. A disk can have o nly one acti v e volume, s o if you set a volume as active, the volum e, which was active bef o re, [...]

  • Seite 281

    281 Copyright © Acronis International GmbH, 2002- 2015 an application v o lume, DAT A — a data volum e, etc., b ut it does not imply that only the type of data stated with the label could be stored on such a v o lume. In Windows, volu me labels are shown in the Explorer disk and folder tree: LABEL 1 (C:), LABEL2( D: ), LABEL3(E:), etc. LABE L1, [...]

  • Seite 282

    282 Copyright © Acronis International GmbH, 2002- 2015 10 .8 Pe ndi ng op er ati ons All operations, which were prepared by the user in manual mode or with the aid of a wizard , are considered pendin g until the user issues the specifi c command for the change s to be made permanent. Until th en, Acronis Disk Director Lit e will only demonstrate t[...]

  • Seite 283

    283 Copyright © Acronis International GmbH, 2002- 2015 11 Pr ot ec ti ng ap pli ca ti on s wit h dis k- le vel b ack up This section describes how to use a disk-level backup to protect applications runn ing on Windows servers. This information is v alid for bo th physical and virtual machin es, no matter if the v irtual machines are backed up at a[...]

  • Seite 284

    284 Copyright © Acronis International GmbH, 2002- 2015 If the application databa ses are located on a nu mber of machines, back up all o f the machines on the same schedule. F o r exampl e, include all of the SQL ser vers belonging to a Shar ePo int farm in a centralized backup plan running on a fixed schedule. Use Volume Shadow C opy (VSS) Micros[...]

  • Seite 285

    285 Copyright © Acronis International GmbH, 2002- 2015 option is effecti v e on a phy sical m achine and on a virtual machine wher e Agent for Windows is installed. Other available s olutions inclu de: 1. Truncating the logs manually or by using a scrip t. For more information, se e "Truncating transaction logs" (p. 2 88) 2. For Microsof[...]

  • Seite 286

    286 Copyright © Acronis International GmbH, 2002- 2015 Create Table ##temp ( Da tabaseName sysname, Na me sysname, ph ysical_name nvarchar(500), si ze decimal (18,2), Fr eeSpace decimal (18,2) ) Exec sp_msforeachdb ' Use [?]; Insert Into ##temp (D atabaseName, Name, phy sical_name, Size, Free Space) Se lect DB_NAME() AS [DatabaseN ame], Name,[...]

  • Seite 287

    287 Copyright © Acronis International GmbH, 2002- 2015 Tracks how far Exchan ge has progressed in writing log ged information to the dat abase file. To find out the dat abase file and log fil e paths, proceed as foll o ws. Exchange 2010 Execute the following commands by using Exchange Manag ement Shell: Get -MailboxDatabase | Format -List -Proper [...]

  • Seite 288

    288 Copyright © Acronis International GmbH, 2002- 2015 11 .1 .1 .4 Sh ar eP oin t da tab as e f il es SharePoint store s content, auxiliary SharePoint se rvices' data and farm configuration in Mi crosoft SQL Server databases. To f ind d ata ba se fi les i n S ha reP oi nt 20 10 or l ate r 1. Open Central Ad mi nistrati on site. 2. Select Upgr[...]

  • Seite 289

    289 Copyright © Acronis International GmbH, 2002- 2015  Log file shrinking . L o g file s hrinking reduces the physical size of a l og file by removing the inac tive virtual log files. Shrin king is most effec tive after log truncation. For more inf o rmation abou t shrinking refer to the foll o wing article: http://technet. m icrosoft.c o m/en[...]

  • Seite 290

    290 Copyright © Acronis International GmbH, 2002- 2015 Where:  myServer - name o f the server  instanceN a me - name of the instan ce  C: mySc r ipt.sq l - path to the scrip t file created in the step 1. To a uto ma te tr ans ac tio n log t ru nca ti on and s hr ink ing f or mu lt ipl e S QL i ns tan ce s If you have more than one instan[...]

  • Seite 291

    291 Copyright © Acronis International GmbH, 2002- 2015 1. Dismount the da tabase (in Exchan ge 2010) or all databases of t he storage gr oup (in Exchange 2003/2007). F o r more inf o rmation, se e:  Exchange 2010 : http://tech net.m icrosoft.c om/en-us/library/bb123903  Exchange 2007 : http://tech net.m icrosoft.c om/en-us/library/bb124936(v[...]

  • Seite 292

    292 Copyright © Acronis International GmbH, 2002- 2015 2. In the mounted v olumes, deter m ine which logs have been committed to the database by using the Eseutil tool. The procedure is described in step 1 of "Log truncation of online databases " above. 3. In the respecti v e online datab ase or storage group, delete all the log files wh[...]

  • Seite 293

    293 Copyright © Acronis International GmbH, 2002- 2015  The volumes where t he Active D irectory databas e and the transaction logs (p. 287) are l ocated  The volume with the SYSVOL folder. The default location of this folder is %Syste mR oot%SYSVOL . To determine the curr ent location of this folder , e xamin e the Sysvol value in the fo l[...]

  • Seite 294

    294 Copyright © Acronis International GmbH, 2002- 2015 To bring a backed-up datab ase back to production, rec over the database files from a dis k backup. For details, see "Recov ering SQL Server databases from a disk backup " (p. 294). If you only need te mpo rary acc ess to th e backed-up databases for da ta mining or data extraction, [...]

  • Seite 295

    295 Copyright © Acronis International GmbH, 2002- 2015 b. Select the volume( s) contain ing the SQL Server database files. F o r the instruc tio ns on h ow to find out the databas e paths, refer to "SQL Server data base files" (p. 285). c. Choose the Read/ write access mod e. d. Specify drive letters that will be assigned to the mounted [...]

  • Seite 296

    296 Copyright © Acronis International GmbH, 2002- 2015 By using Acronis Bac kup, you can recover Exchan ge database files from a disk backup. To bring a database online, mount it. For details, see "Mounting Exchange Server databases " (p. 296). If you need to perfor m granular recovery of individual mailboxes or their ite m s, mount the [...]

  • Seite 297

    297 Copyright © Acronis International GmbH, 2002- 2015 1 1 . 3 . 3 G r a n u l a r r e c o v er y o f m ai l bo x e s RDB (RSG) is a spe cial administrative database (s to rage group) in Exchange Server. It lets y o u extract data from the m o unted ma ilbox database. Th e extracted data can be copied or merged to the existing mailboxes witho ut d[...]

  • Seite 298

    298 Copyright © Acronis International GmbH, 2002- 2015 Steps to perform If the domain has other domain controllers, y o u can perfor m nonauthori tative restore of a lost domain controller in either of these ways:  Recover a domain controller from a backup by using a bootable media. Ensure t hat there is no USN rollback proble m (p. 300).  R[...]

  • Seite 299

    299 Copyright © Acronis International GmbH, 2002- 2015  Changes to Active D irectory that o ccurred af te r the b ackup had been made will be los t.  Re -creation of the d omain controller is not an option.  Even a backup with an expired tombstone lifeti me can be used. You need to recover the volumes that store Active D irectory da tabas[...]

  • Seite 300

    300 Copyright © Acronis International GmbH, 2002- 2015 d. On the General tab, clic k Start . After the service s tarts, click OK . Details. This change is needed because the Acronis agent ser vice on a domain controller run s under a domain user account, but domain us er accoun ts are unavailable in Directory Services Restore Mode. 5. Start Acroni[...]

  • Seite 301

    301 Copyright © Acronis International GmbH, 2002- 2015 A USN rollback is unli ke ly to o ccur when you r ecover an entire domain c ontroller from a VSS-base d disk-level backup. A USN rollback is hig hly probable if any of the f o llowing is true:  A domain controll er was recovered partially: not all di sks or volumes were rec overed or only t[...]

  • Seite 302

    302 Copyright © Acronis International GmbH, 2002- 2015  Value name: Data base restored from backup  Value data: 1 6. Restart the do main controller in normal mode. 7. [Optional] After the domain controller restarts, open Event Viewer, expand Application an d Services Logs , and then select the Directory Serv ices log. In the Directory Servi [...]

  • Seite 303

    303 Copyright © Acronis International GmbH, 2002- 2015 3. If you have reco v ered the databa se to a non-original SQL serv er of the original Sh arePoint farm, attach the reco vered database t o the far m . To do this, run the f o llowing com m and on a fr o nt -end Web server: In SharePoint 20 1 0 or later : Mount -SPContentDatabase <database&[...]

  • Seite 304

    304 Copyright © Acronis International GmbH, 2002- 2015 stsadm.exe -o a ddcontentdb - url <site url> -databas ename <database> -data baseserver <database server> 1 1 . 5 . 2 R e c o v e r i n g c o n f i g u r at i o n a n d s e rv i ce d a t a b a s e s Configuration and se rvice databa ses must be synchronized with other databas[...]

  • Seite 305

    305 Copyright © Acronis International GmbH, 2002- 2015 c. To change the ser ver on which you want to st o p the s erv ice, in the Server list, cli ck Change Server , and then clic k the r equired server name. d. By default, only c o nfigurable ser v ices are displa ye d. To view all s erv ices, in the View list, click All . e. To stop a se rv ice,[...]

  • Seite 306

    306 Copyright © Acronis International GmbH, 2002- 2015 5. Detach the database and unmount the previ o usly mo unted volume as described in steps 7-8 of "Accessing SQL Ser ver databases fr om a disk backup" (p. 294). To r ec ove r S ha reP oi nt it em s from a n una tt ach ed da tab as e 1. Attach the content database to an SQL Server ins[...]

  • Seite 307

    307 Copyright © Acronis International GmbH, 2002- 2015 12 Pr ot ec ti ng Mi cr oso ft S QL Ser ve r wit h si ngl e-p as s b ack up This section describes how to use single-pass disk and application bac kups to protect Microsof t SQL Server data. A single-pass backup operation creates an application- aware disk backup which en ables browsing and re[...]

  • Seite 308

    308 Copyright © Acronis International GmbH, 2002- 2015 Mounting databases By using the agent, you can temporarily attach a ba cked-up database to a running SQL Server instance and use third- party tools t o get various o bjec ts from this database. 1 2 . 1 . 2 S u p p o r t e d o p e r a t i n g s y s t e ms Agent for SQL can be installed in the f[...]

  • Seite 309

    3 09 Copyright © Acronis International GmbH, 2002- 2015 Granting the permissions to the agent During installati o n, the setup pro gram includ es the agent ser vice account in the Backup Operators group. If you ch o ose to create a n ew account for the a gent, this account is also inclu ded in the Administrators gr o up. Therefore , t he agent al [...]

  • Seite 310

    310 Copyright © Acronis International GmbH, 2002- 2015 12 .2 In sta ll ati on of Ag en t for S QL Agent for SQL can o nly be i nstalled o n a m achine runn ing Microsoft SQL Server. Rem o te installation of the agent is no t possible. The agent is included in t he se tup program o f Acronis Backup Advanced. The agent is installed with Agent for Wi[...]

  • Seite 311

    311 Copyright © Acronis International GmbH, 2002- 2015 Follow these recom mendations to ensure that a single- pass backup is successful.  Back up entire ma chines. This will allow y ou to re cover both the operating sy stem and an y SQL database present on a machine. Databases may be s to red on m o re than one disk or volume. To ensure that al[...]

  • Seite 312

    312 Copyright © Acronis International GmbH, 2002- 2015 Leave the setting disabled if you use a third-party appli catio n, such as the SQL Server backup and restore compon ent, for backin g up the SQL Server data. Log truncation and ignoring application errors are mutually exclusive. This pre vents truncating the Microsoft SQL lo g if the applicati[...]

  • Seite 313

    313 Copyright © Acronis International GmbH, 2002- 2015  Rename the re c overed dat abase This setting lets y o u retain the e xisting datab ase. A recovered database will h ave the following name: < o riginal d a tabase name> -Recovere d . If a databas e with this name already exists, the r ecovered database will be named as follows: <[...]

  • Seite 314

    314 Copyright © Acronis International GmbH, 2002- 2015 Active Restore supp o rts the foll o wing backup locations:  A local folder on the machine where the rec o very is p erfo rmed (exc ept optical disks).  Acronis Secure Z o ne.  A network share. To use Active Res to re, enab le it on the Recover data page (p. 132) und er How to r ecove[...]

  • Seite 315

    315 Copyright © Acronis International GmbH, 2002- 2015 12 .5 Mo unt in g S QL Se rve r da tab ase s fro m a sin gle -p ass ba ck up When you mount a bac ked-up SQL database, it is t emporarily attached to your SQL Server in the read-only mode. You can access the database lik e any other databas e of the instance. Mounting databases comes in handy [...]

  • Seite 316

    316 Copyright © Acronis International GmbH, 2002- 2015 If the selected databas e is in use, Acronis Backup for cibly disconnects all users from the database and then unmounts i t. 12 .6 Pr ote ct ing c lu ster ed SQ L Ser ver i ns ta nce s and AA G SQL Server high-av ailability solutions The Windows Serv er Failover Clu ste ring (WSF C) functi o n[...]

  • Seite 317

    318 Copyright © Acronis International GmbH, 2002- 2015 13 Pr ot ec ti ng Mi cr oso ft A cti ve D ir ec tor y wi th si ng le -p ass b ac ku p This section describes how to use single-pass disk and application bac kups to protect the Acti ve Directory Domain Ser vices role of Micros o ft Active Direct o ry. The single-pass ba ckup functionalit y bec[...]

  • Seite 318

    319 Copyright © Acronis International GmbH, 2002- 2015  Acronis Backup f o r Windows Ser ver Essentials  Acronis Backup Advanc ed for VMware / Hyper-V / RH EV / Citrix XenServer / Orac le VM  Acronis Backup Advanc ed Universal License Each of these licens es enables you to install Agent f o r Windows on the same machine. If Agent f or Win[...]

  • Seite 319

    320 Copyright © Acronis International GmbH, 2002- 2015 1 3 . 5 . 1 Re - pr o m o t i n g t h e d o m ai n c o n t r ol l e r This method of rec overing the data is availab le only if the domain has other domain contr o llers. It does not require ha ving a backup. To recover Micros o ft Activ e D irectory, use the Dcpromo tool to demote th e domain[...]

  • Seite 320

    321 Copyright © Acronis International GmbH, 2002- 2015 b. Copy all of the con tents from each of these f o lders to the roo t of the co rresp o nding disk drive. For example , copy the contents from the Drive(C) folder to C:/ and from the Drive ( E) folder to E:/ . Cho o se to overwrite the files, if prompted. Completing the rec overy 1. If the do[...]

  • Seite 321

    322 Copyright © Acronis International GmbH, 2002- 2015 14 A dmi ni st er in g a ma nag ed ma ch in e This section describes the views that are availabl e through the navigati o n tree of t he console connected to a man aged machine and explains h ow to work with each vie w. T his section also covers supplementary operati ons that can be perfor m e[...]

  • Seite 322

    323 Copyright © Acronis International GmbH, 2002- 2015 To Do  Validation task (p. 237 ) View details of a plan /task Click Details . In the respective Plan Det ails (p. 331 ) or Task Deta ils (p. 332) wind ow, review the plan or task details. View plan's/task's log Click Log . You will be taken to the Log (p. 332 ) view containing the[...]

  • Seite 323

    324 Copyright © Acronis International GmbH, 2002- 2015 To Do Edit a plan /task Click Edit . Backup plan ed iting is performed in the sa me way as creation (p. 55 ), except for the following limitation s : It is not always possible to u se all scheme op tions, when editing a backup plan if the created archive is n ot empty (i.e. conta ins backups).[...]

  • Seite 324

    325 Copyright © Acronis International GmbH, 2002- 2015 S tat e H ow i t is de ter min ed H ow to han dl e 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition . This situation is quite n ormal, but delaying a backu p for too long is risky. T[...]

  • Seite 325

    326 Copyright © Acronis International GmbH, 2002- 2015 Once the task is s tarted manuall y or the event spe cified by the schedule oc curs, the task enters either the Running state or t he Waiting state. Running A task changes to the Running s tate when the event specified b y the schedu le occurs AND all the conditions set in the backup plan are [...]

  • Seite 326

    327 Copyright © Acronis International GmbH, 2002- 2015 You can edit plans in the Acronis Backup graphical us er interface when importing them or afte r. Backup plans are exp o rted to .xml files, s o you can edit the exp ort files o f backup plan s (p. 327) with text editors. Passw o rds are e ncrypted in the export files. Usage examples  Agent[...]

  • Seite 327

    328 Copyright © Acronis International GmbH, 2002- 2015 To modify credentials, change the <login> and <pa ssword> tags in the correspondin g sections:  plan's credentials – the <plan><options ><common_parame ters> secti on  access credentials f or the backed-up data – the <pla n><targe t s>&l[...]

  • Seite 328

    329 Copyright © Acronis International GmbH, 2002- 2015 1. Delete the <ID> tag. 2. Edit the value of th e <Path> tag , which c ontains inf ormation about data to back up; f o r example, replace " C: " wi th " D: ". Replacing a directly specified item with a select ion template Inside the <plan ><options>&[...]

  • Seite 329

    330 Copyright © Acronis International GmbH, 2002- 2015 1 4 . 1 . 4 D e p l o y i n g b a c k u p p l a n s a s fi l e s Assume that for so m e reason y o u cannot run Acronis Backup Managem ent Server in your environment, but yo u need t o apply one and the sa me backup plan to m ultiple mach ines. A good decision is to export the backup plan from[...]

  • Seite 330

    331 Copyright © Acronis International GmbH, 2002- 2015 <key name="Import"> <value name="Folde rPath" type="TString"> "/us r/lib/Acronis/Bac kupAndRecovery/import" </value> </key> The change will be app lied after a restart of t he agent. To restart the agent, run t he fo llowing comma[...]

  • Seite 331

    332 Copyright © Acronis International GmbH, 2002- 2015 History The History tab lets you examine the history o f all the backup plan's accomplished activiti es. What to back up The Source tab pro v ides the foll o wing inf o rmation on the data selected for backup :  Source type - the type o f data selected for backing up.  Items to back[...]

  • Seite 332

    333 Copyright © Acronis International GmbH, 2002- 2015 1 4 . 2 . 1 A c t i o ns o n l o g e n t r i e s All the operations des cribed below are perform ed by clicking the corresponding i tems on the log toolbar . These opera tio ns can also be performed with t he context m enu (by right-clicking the l og entry or the activit y). The following is a[...]

  • Seite 333

    334 Copyright © Acronis International GmbH, 2002- 2015 To view details of t he next or t he pre v ious log entry, click the down arrow but to n or corresp o ndingly the up arrow button. To copy the details, click the Copy to clipboard butt on. Log entry data fields A log entry contains the following data fields:  Type - Type of e v ent (Error ;[...]

  • Seite 334

    335 Copyright © Acronis International GmbH, 2002- 2015 To export entire t able contents to a *.txt or *.c sv file, click Save all to file . Configuring alerts Use the following o ptions at the to p of the Ale r ts view to configu re alerts:  Show/hide alert s (p. 31 ) - sp ecify the alert t ypes to display in the Alerts view.  Notifications [...]

  • Seite 335

    336 Copyright © Acronis International GmbH, 2002- 2015  To change a license f or a virtualization host (exc ept for a clustered host), conn ect the console to the management s erver, navigate to Virtual ma c hines > Ho s ts and clus ters , right-click the ho st, and then click Chan g e license .  To change licens es for all of the h osts [...]

  • Seite 336

    337 Copyright © Acronis International GmbH, 2002- 2015 It determines Acr onis Backup behavior when the syst em is shutting down. The s ystem shutdown occurs when the m achine is turned o ff or restart ed. The preset is: Stop r unning ta s ks and shut do w n. If you select Stop run ning tasks and shut do w n , all of the running Acro nis Backup tas[...]

  • Seite 337

    338 Copyright © Acronis International GmbH, 2002- 2015 14 .6 .3 .2 Ti me -ba se d al ert s Last backup This option is effe ctive when the console is co nnected to a managed m achine (p. 443) or to the management ser v er (p. 444 ). The option defines whether to alert if no backup was performed on a given mac hine for a period of time. You can conf[...]

  • Seite 338

    339 Copyright © Acronis International GmbH, 2002- 2015 5. If the outgoing mail s erver requires authenticati on, enter User name and Passwo rd o f the sender's e-mail ac co unt. If the SMTP server do es not require auth entication, leave the User name and Password fields blank. If you are n ot sure wh ether the SMTP ser ver re quires authenti[...]

  • Seite 339

    340 Copyright © Acronis International GmbH, 2002- 2015 You can override the settings set here, exclusively fo r the e v ents that oc cur during backup or during recovery, in the D efault backup and recovery options. In this case, th e settings set here will be effective for opera tio ns ot her than backup and recovery, such as archive validation o[...]

  • Seite 340

    341 Copyright © Acronis International GmbH, 2002- 2015 1. Start > Control Pane l > Add or R emove Pro gr ams > A dd/Remove Windows Com ponents. 2. Select Management an d Monitoring Tools . 3. Click Details. 4. Select the Simple Netw ork Management Protocol check box. 5. Click OK. You might be ask ed fo r lmmib2.dll t hat can be fo und on [...]

  • Seite 341

    342 Copyright © Acronis International GmbH, 2002- 2015  In Windows XP and Ser ver 2003: %ALLUSERSP ROFILE%Application DataAcronisBa c kupAndRecove ry MMS events.db3 .  In Windows Vista an d later versions of Windows: %PRO G RAMDATA%A c ronisBackupAnd Recovery MMS events.db3 .  In Linux: /var/lib/A c ronis/Backup AndRecovery/MMS/e[...]

  • Seite 342

    343 Copyright © Acronis International GmbH, 2002- 2015 To s et up pr ox y s er ver s ett in gs 1. Select the Use a pro xy server check box. 2. In Address , specif y the network name or IP address of the proxy server — for example: proxy.example.com or 192.168.0 .1 3. In Port , specify the p ort number of the proxy ser ver — for example: 80 4. [...]

  • Seite 343

    344 Copyright © Acronis International GmbH, 2002- 2015 15 C en tra li zed m ana ge me nt This section covers o perati o ns that can b e performed centrall y by using the components for centralized manage ment. The content of this se ction is only applicable to Acr onis Backup Advanced. 15 .1 Un der st and in g c en tra li zed m ana ge me nt This s[...]

  • Seite 344

    345 Copyright © Acronis International GmbH, 2002- 2015 Storage Node (p. 4 4 5) and configu re it to m anage a ce ntralized vault or multiple centralized vault s. Such vaults are call ed managed vaults (p. 443). The storage node helps the agent deduplicate (p. 4 39) backups bef ore transferring them to m anaged vaults and dedup licates the backups [...]

  • Seite 345

    346 Copyright © Acronis International GmbH, 2002- 2015 15 .1 .2 .2 Pr iv ile ge s fo r loc a l c onn ect io n Windows Local connection on a machine running Wind o ws can be established by any user who has the "L og on locally" user right on the machin e. Linux Establishing a local c onnection on a machine running Linux, and managing such[...]

  • Seite 346

    347 Copyright © Acronis International GmbH, 2002- 2015 To d is abl e U AC Do one of the foll o wing depend ing on the operating system:  In a Windows op erating system prior to Windo w s 8: Go to Control pane l > View by: S mall icons > User A ccounts > Change User A cc oun t Control Settings , and then move the slider to Never notif y[...]

  • Seite 347

    348 Copyright © Acronis International GmbH, 2002- 2015 2. Add the names of the non-root users, whom you wan t to allow to connect to the machine remotely, to the Acro nis_Trusted group. For exa m ple, to add the existing user user_a to the group, run the foll owing command: usermod -G Acronis_Trusted user_a 3. Edit the file /etc/pa m. d/acro nisag[...]

  • Seite 348

    349 Copyright © Acronis International GmbH, 2002- 2015 Acronis Centralized Admins A user who is a m ember of thi s group is a management ser ver administra tor. Management server administrat o rs can c o nnect to the manag ement server by using Acronis Backup Management Cons o le; they hav e the same m anagem ent rights on the registered machin es[...]

  • Seite 349

    350 Copyright © Acronis International GmbH, 2002- 2015 This section also pro vides information on configurin g communication settings, se lect ing a netw o rk port for com munication, an d m anaging securit y certificates. 15 .1 .3 .1 Se cu re co mm un ica ti on Acronis Backup pro vides the capab ility to secure the data transf erred between its c[...]

  • Seite 350

    351 Copyright © Acronis International GmbH, 2002- 2015 15 .1 .3 .3 Co nf ig uri ng c om mu ni ca tio n se tt ing s You can configu re communication s ettings, such as whether t o encrypt transferred data, f or Acronis Backup component s installed on one or more ma chines, by using Acronis Admini strative Template. For information o n how to l oad [...]

  • Seite 351

    352 Copyright © Acronis International GmbH, 2002- 2015 Linux Specify the port in the /etc/Acronis /Policies/Agent.config file. Restar t the acronis_agent dae mon. Configuring the port in a bootable environment While creating Acronis bootable media, you ha v e the option to pre-configure the network port that will be used by th e Acronis Backup Boo[...]

  • Seite 352

    353 Copyright © Acronis International GmbH, 2002- 2015 "%CommonProgramFiles% Acronis Utils acroniscert" -- reinst all  When using a 64-bit ver sion of Windows: "%CommonProgramFiles( x86)% Acronis Utilsacroniscer t" -- reinstall 4. Restart Windows, or restart the runnin g Acronis services. Non -self-signed certificates[...]

  • Seite 353

    354 Copyright © Acronis International GmbH, 2002- 2015 15 .3 Cr eat in g a c ent ra liz ed ba ck up pl an A centralized backup plan can be applied to both Windows and Linux machines. The steps required fo r the creating centralized backup plan are si milar to creating a backup plan (p. 55 ) except the f ollowing:  When selecting wha t data to b[...]

  • Seite 354

    355 Copyright © Acronis International GmbH, 2002- 2015 Backing up an entir e virtual machine, its disks, o r volumes y ields a standard disk backup (p. 439). In addition, this backup stores the virtual machine configuration. This configuration will be suggested by default when re covering the backup con te nt to a n ew virtual machine. F o r more [...]

  • Seite 355

    356 Copyright © Acronis International GmbH, 2002- 2015  Notes for Linux us ers: Logical volumes and MD devices are shown under Dynamic volumes . For more information ab out backing up such volu m es and devices, see "Backup and recovery of l o gical volu m es and MD de v ices (Linu x)" (p. 43 ).  Note for Linux us ers: We re commen[...]

  • Seite 356

    357 Copyright © Acronis International GmbH, 2002- 2015 Some environmen t v ariables point to Windows folder s. Using such variables instead of full fo lder and file paths ensures tha t proper Windows folders are backed up regardless o f where Wind ows is located on a particular machine. To i ncl ude I n t he Fil es an d f ol der s co lu mn, ty pe [...]

  • Seite 357

    358 Copyright © Acronis International GmbH, 2002- 2015 1 5 . 3 . 3 S e l ec t i o n r u l e s f o r v o l u m e s Define volume sel ect ion rul es, according to which the vo lumes o n the machines included in the centralized backup plan will be backed up. To d efi ne v olu me se lec ti on ru les 1. Select the rule fro m the drop-down list ( o r ty[...]

  • Seite 358

    359 Copyright © Acronis International GmbH, 2002- 2015 To i ncl ude I n t he sel ec tio n rul es box : Co mm ent s First disk Type or select: [Disk 1] Refers to the first disk of the r egistered machine, including all volu mes on that d isk. Li nu x v ol umes First partition on th e first IDE hard disk of a Linux machine Type or select: /d ev/hda1[...]

  • Seite 359

    360 Copyright © Acronis International GmbH, 2002- 2015 case, you can type either /dev/hda3 or /ho m e/usr/do cs in the Volu me field t o perform a disk backup of the third parti tio n. In general, when set ting up a centralized backup plan t o perform v olume backup s of Linux machines, make sure that the paths entered in the selecti o n rules for[...]

  • Seite 360

    361 Copyright © Acronis International GmbH, 2002- 2015 1. Selecting the archiv es destination Choose where to st o re mac hines' archives:  Store all machines' archives in a single lo cation  To back up data t o Acronis Clou d Storage, click Lo g in and specify the cr edentials to log in to the cloud storage. Then, expand the Cloud[...]

  • Seite 361

    362 Copyright © Acronis International GmbH, 2002- 2015  FINDEPT3_SYSTE M BACKUP_Arch ive (1) 1 5 . 3 . 5 C e n t r a l i z e d b a c k u p p l a n ' s c r e de n t i a l s Provide the credentials un der which the centraliz ed tasks will run on the machin es. To s pec if y cre de nti als 1. Select one of the f o llowing:  Use Acronis ser[...]

  • Seite 362

    363 Copyright © Acronis International GmbH, 2002- 2015 /dev/sda1 volu m e. This is b ecause the [SYSTEM] volu m e is not f o und. The plan will get the Error status on Linux mach ines that do not have a SCSI de vice. 15 .4 Ad min is ter in g A cro nis Ba ck up Man ag em ent Se rv er This section describes the views that are availabl e through the [...]

  • Seite 363

    364 Copyright © Acronis International GmbH, 2002- 2015 Applications The Application s section di splays the number of protected and unprotected applications running on the registered machin es. An application on a m achine is c o nsidered prot ected if the respective ag ent is installed on that machine in the trial mode or wi th a license key. If [...]

  • Seite 364

    365 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .2 .1 Ma ch in e g ro up s Machine groups are designed for convenien t protection o f a large number o f ma chines registered on the management s erver. While creating a centralized backup plan, select a group and the plan will be deployed to all machin es of this group. Once a new machi[...]

  • Seite 365

    366 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .2 .2 Ac ti on s o n ma chi ne s Registering machines on the management server Once the machine is added or imported to the All machines with agen ts group, it bec omes registered on the m anagement se rver. Register ed machines are available for deploying centraliz ed backup plans and f[...]

  • Seite 366

    367 Copyright © Acronis International GmbH, 2002- 2015 To Do Add a machine to a nother static group Click Add to another group . In the Add to group (p. 370 ) wind ow, specify the group t o copy the selected machine to. The centralized b ackup p lans of the groups the machin e is a member of will be deployed t o the machine. Fo r mac hin es in cus[...]

  • Seite 367

    368 Copyright © Acronis International GmbH, 2002- 2015 To Do  Upgrading from Acron is Backup to Acron is Backup Advanced Update all information related to the machine Click Synchronize . The management serv er will query the machine an d update the datab ase with the most recent information . Along with synchron izing, the re fresh operation wi[...]

  • Seite 368

    369 Copyright © Acronis International GmbH, 2002- 2015 2. Select from the menu Options > Ma c hine options > Machine management . 3. Select Centralized management and specify the mana gement server where t o register the machine. Refer to "Machine manag ement (p. 342)" for details. S yn chr on iz ing m ac hin es w it h a t ex t f i[...]

  • Seite 369

    370 Copyright © Acronis International GmbH, 2002- 2015 To s yn chr on ize m ach in es w it h a t ex t f il e u si ng com ma nd li ne 1. Log on as a me m ber of the Acron i s Centralized Admi ns security gr oup. 2. In the command pr ompt, change the directory to the folder where Acronis Backu p Management Server has been install ed — by default: [...]

  • Seite 370

    371 Copyright © Acronis International GmbH, 2002- 2015 Machine The tab displays th e followi ng information on the regis te red machine :  Name - name of t he select ed machine (taken from th e Computer name in Wind o ws).  Registration ad dress - compu ter name or IP address of the selected machine. D uring t he registration of a m achine ([...]

  • Seite 371

    372 Copyright © Acronis International GmbH, 2002- 2015 For the list of the o peration s av ailable with m achine's backup plans and tasks, see "Actions on backup plans and tas ks" (p. 322). Filtering and so r ting Filtering and sortin g o f the backup plans and task is performed as described in "Sorting, filterin g and configur[...]

  • Seite 372

    373 Copyright © Acronis International GmbH, 2002- 2015 To Do Click Add machine to AMS . In the Add m achine (p. 368 ) window, select the machin e that needs to b e added to the man agement server. Synchronize machines with a list in the text file This action is enabled on ly for the Machine s with agents view an d for the All machines with agents [...]

  • Seite 373

    374 Copyright © Acronis International GmbH, 2002- 2015 To Do The management con sole will updat e the list of groups from the manage ment server with the most rec ent information. Though t he list of groups is refreshed automatically b ased on events, the dat a may not be retrieved immediately from the manag ement server due to some lat ency. Manu[...]

  • Seite 374

    375 Copyright © Acronis International GmbH, 2002- 2015 These criteria will add to the same group all of th e machines whose operating system is Windows 2003 o r Windows 200 8 and belong to the S ERVERS organizational unit and whose IP addresses are within the range 192.168.1 7 .0 - 192.168.17.5 5 . Or ga n iza ti ona l un it cr it eri on Organizat[...]

  • Seite 375

    376 Copyright © Acronis International GmbH, 2002- 2015 The root folder o f the mac hines tree contains groups of the first le vel . Groups that include other groups are called par ent groups . Groups that are in pa rent groups are called child groups . All th e centralized backup plans created for the paren t group will be depl oyed to the machi n[...]

  • Seite 376

    377 Copyright © Acronis International GmbH, 2002- 2015 To Do The centralized backu p plan cannot be ru n manually, if at least one of the machines included in the plan runs Acron is Backup & Recov ery 10 agent. Stop a backu p plan Click Stop . Stopping the run ning backup plan stops all its task s on all the machine s the plan is deployed to. [...]

  • Seite 377

    378 Copyright © Acronis International GmbH, 2002- 2015  Install and configure Agent for V M ware (Virtual App liance) or Agent for VM ware (Windows). Register the agent on t he manag ement server. Result. The machin e with the agent (the virtual applia nce or the Windows h ost) appears und er Machines with a gents in the All mach i nes with age[...]

  • Seite 378

    379 Copyright © Acronis International GmbH, 2002- 2015 To Do Create a new backup plan , or a task on a registered machine Click New , and select one of the following:  Backup plan (centra lized) (p. 354 )  Recovery task (p. 13 2)  Validation task (p. 237 ) For the recovery or validation tasks creation , you have to specify the r egistered[...]

  • Seite 379

    380 Copyright © Acronis International GmbH, 2002- 2015 To Do Clone a backup plan Click Clone . The clone of the original b ackup plan will b e created with default name " Clone of <original_plan_name > ". The c loned plan will be disabled i mmediately a fter cloning, so that it does not run con currently with the original p lan. Yo[...]

  • Seite 380

    381 Copyright © Acronis International GmbH, 2002- 2015 Accessing the Licenses view To access the License s v iew when conn ected to the manage m ent server, click Licenses in the Navigation pane. To connect to the lic ense server directly: 1. In the Tools menu of t he consol e, select Manage licenses . 2. Specify the na m e or IP add ress of the m[...]

  • Seite 381

    382 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .6 .3 Ex por ti ng l ice ns es Before changing the license ser ver, export the licenses fro m the licens e server th at you plan to change (p. 381). All licen ses are saved into .xml file. Later on, you can import (p. 3 8 1) these licens es to a new license ser v er. To e xp ort l ice ns[...]

  • Seite 382

    383 Copyright © Acronis International GmbH, 2002- 2015 Adds a new license key to the specified license ser ver. You can specify multiple lic ense keys (space separated). --import - file <IP-address or hostname> <fi lename> Imports license k ey s from a .txt o r .eml file. --help Shows usage. 1 5 . 4 . 7 A l e r t s An alert is a messag[...]

  • Seite 383

    384 Copyright © Acronis International GmbH, 2002- 2015 moved to a new o r to the existing inactive group. The number of ass o ciated mac hines ( X ) is reduced for the active group alert and increased for the in active group alert respecti v ely. To obtain infor m ation about ma chines associated with the group alert, click Vie w details . Configu[...]

  • Seite 384

    385 Copyright © Acronis International GmbH, 2002- 2015 The report will c o ntain the information selected, grouped and so rted according to t he templat e settings. Select wheth er to preview the rep o rt in the d efault browser or to save it to the .xml file. If previewed, the rep ort appears in a separate intera ctive window that enables expandi[...]

  • Seite 385

    386 Copyright © Acronis International GmbH, 2002- 2015  Deployment state : The deployment states of the backup plans — for exa mple, Revoking .  Execution state : Th e execution states of the ba ckup plans — for example, Running .  Stat us : The statuses of th e backup plans — OK , Warning , and/ o r Error .  Last finished ti me [...]

  • Seite 386

    387 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .8 .4 Rep or t ab ou t t h e ar ch iv es an d ba cku ps In this view, you c an generate a r eport about the archives that are stored in managed centraliz ed vaults. This rep o rt consists o f one or m o re tables. Filters Under Filters , choos e which archives to include in the report. O[...]

  • Seite 387

    388 Copyright © Acronis International GmbH, 2002- 2015  Specify which table co lumn s to show, and in which ord er.  Select which diagra ms to include in the repor t. T he dia grams show space usage in t he vault s. 15 .4 .8 .6 Rep or t ab ou t t h e ta sk s' ru ns In this view, you c an generate a r eport about the task s t hat existed[...]

  • Seite 388

    389 Copyright © Acronis International GmbH, 2002- 2015 To a llo w a ct iv e con te nt per ma ne ntl y in Internet Explor er 1. On the Tools menu, click In ternet Options , and then click the Advanced tab. 2. Select the Allow active c ontent to run files on My Computer check box under S ecurity . 3. Click OK . in Mozilla Firefox 1. On the Options m[...]

  • Seite 389

    390 Copyright © Acronis International GmbH, 2002- 2015 To Do The log entry's details wil l be displayed. See Log entry details (p. 390 ) for details of the log entry's operation s. Save the selected log entries to a file 1. Display Activities an d select activities or di splay Events an d select log entries. 2. Click Save selected to fil[...]

  • Seite 390

    391 Copyright © Acronis International GmbH, 2002- 2015  Machine - The nam e of the machine where the e v ent has occurred (if an y).  Code - It can be blan k or t he progra m error code if the ev ent type is error. Error code is an integer number that may be used by Acronis supp o rt service to solve the problem.  Module - It can be blan [...]

  • Seite 391

    392 Copyright © Acronis International GmbH, 2002- 2015 The preset is: Disab l ed . When enabled, y o u can specify the keeping period for the ac cepted alerts. The accepted alerts older than this period will b e deleted from the table automatically. Automatically move in active alerts to "Accepted alerts" This option defin es whether to [...]

  • Seite 392

    393 Copyright © Acronis International GmbH, 2002- 2015 credentials are giv en by this option, the progra m will ask you for credentials and save them in this optio n. It is sufficient t o specify the creden tials of a user who is a member of the Domain Users group on the domain. 15 .4 .1 0. 4 E-m ai l set ti ng s The option enables you to configur[...]

  • Seite 393

    394 Copyright © Acronis International GmbH, 2002- 2015 A ler t no ti fic at ion s This option enables yo u to specify when to send e-mail notifica tio ns about alerts which o ccurred on the management s erver and to select the t y pes of aler ts to send. When using this option, ma ke sure that the e -mail sett ings are properly configured in Mana [...]

  • Seite 394

    395 Copyright © Acronis International GmbH, 2002- 2015 Wi nd ow s e ve nt l og This option defin es whether the management server has t o record its o wn log even ts in the Application Event L o g of Win do ws (to see this l o g, run eventv wr.exe or select Control Panel > Administrative tools > Eve nt Viewer ). You can filter the events to [...]

  • Seite 395

    396 Copyright © Acronis International GmbH, 2002- 2015 This parameter can als o be set by using Acronis Admin istrative Template (p. 405). 15 .4 .1 0. 7 Clo ud b ac ku p p ro xy This option is effe ctive only for connection to Acr o nis Cloud St o rage over th e Internet. This option defin es whether the management server will conne ct to the Inte[...]

  • Seite 396

    397 Copyright © Acronis International GmbH, 2002- 2015 15 .5 .1 .1 Ho w t o loa d Ac ro ni s A dm in ist ra ti ve T emp la te The Administrativ e Template, pr o vided by Acr o nis, enables the f ine-tuning of some secu rity related features, includin g encrypted communication setting s. Through the Microsoft Group Policy mechanism, the t emplate p[...]

  • Seite 397

    398 Copyright © Acronis International GmbH, 2002- 2015 15 .5 .1 .2 Ac ro ni s B ac ku p This section of the ad ministrative template spe cifies the connection para meters and event tracing parameters for the followin g Acronis Backup components:  Acronis Backup Man agement Server  Acronis Backup Agent  Acronis Backup St o rage No de Conne[...]

  • Seite 398

    399 Copyright © Acronis International GmbH, 2002- 2015 Do not use The use of SSL c ertificates is disab led. Any connection to a server appli cation which requires the use of SS L c ertifi cate s will not be established. Use if possible The use of SSL c ertificates is enabled . The client will use SSL certifica tes if their use is enabled on the s[...]

  • Seite 399

    400 Copyright © Acronis International GmbH, 2002- 2015 Event tracing paramet ers In Windows, the ev ents occurring in Acronis Bac kup can be recorded into the event log, a file, or both. Each event has a le v el from zero to five based o n the event's s everity, as shown in the following table: Le vel Na me D esc rip tio n 0 Unknown Event who[...]

  • Seite 400

    401 Copyright © Acronis International GmbH, 2002- 2015 Enable Information about the hardware configuration, the most and least used feature s and about any problems will be automatically collected fr om the machine and s ent to Acronis on a regular basis. The end re sults are in tended to provide software i mprovements and enhan ced functionality [...]

  • Seite 401

    402 Copyright © Acronis International GmbH, 2002- 2015 If, during a check for the license k ey (see License Check Inter val earlier in this topic), Acronis Backup Agent could n ot connect to the license s erv er, it will try to rec o nnect onc e in the number of hours gi ven by License Se rver Connect i on Retry Interval . If the value is 0 , no r[...]

  • Seite 402

    403 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enabled Trace Level Description: Specifi es the minimu m level of severity of event s for sending SNMP notificati o ns about them. Only n otifications about events of levels g reater than or equal t o Trace Level will be sent. Possible values: 0 (In te rnal event), 1 (Debuggin g[...]

  • Seite 403

    404 Copyright © Acronis International GmbH, 2002- 2015 The initial size will n ot exceed the available space m inus 50 MB. Pre-allocated storage s ize ( in percent) This setting is effecti ve only when the Pre-allocated s torage size (in Megabytes ) setting is 0 . Description: Specifies th e initial size of the snapsho t storage as a percentage o [...]

  • Seite 404

    405 Copyright © Acronis International GmbH, 2002- 2015 Description: Specifi es whether Acronis Backup Agen t will catalog backups in unmanag ed vaults. Possible values: Ena bled (catalog) or Disabled (do n o t catalog) Default value: Enabled If the value of this parameter is Disabled , the Data view for a vault will n ot display any data when the [...]

  • Seite 405

    406 Copyright © Acronis International GmbH, 2002- 2015 Windows Event Lo g Specifies when t o record Acronis Ba ckup Management Server's e vents into the App licatio n Event Log in Windows. This parameter has t wo settings: Trace State Description: Specifi es whether to record Acronis Ba ckup Management Server's events into the event log.[...]

  • Seite 406

    407 Copyright © Acronis International GmbH, 2002- 2015 This parameter has th e following settings: Maximum Connect i ons Description: Specifi es the maxi mum number of simultaneous sy nchronization connections to keep. Possible values: Any integ er number between 1 and 500 Default value: 200 If the total number o f onlin e registered m achines doe[...]

  • Seite 407

    408 Copyright © Acronis International GmbH, 2002- 2015 Real-Time Monitor ing Description: Specifi es whether to perform real-time m o nitoring of regi ste red m achines instead of using a p olling mechanism. Possible values: Ena ble d or Disabled Default value: Disab led By default, Acr o nis Backup Management Server conne cts to registered m achi[...]

  • Seite 408

    409 Copyright © Acronis International GmbH, 2002- 2015 Snapsho t Storage Specifies the locati on and initial size of the snapsho t storage — a temporary file th at is used when backing up data by taking a snapshot. This file is deleted as so o n as the backup is complete. With the default setting s, the snapshot storage i s created in the temp o[...]

  • Seite 409

    410 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enabled If the value of this parameter is Disabled , all of the f o llowing para meters are ignored. Proxy server add r ess Description: Specifi es the n am e or IP addre ss of the proxy server Possible values: Any string 0 to 32765 characters lo ng Default value: Empty st ring [...]

  • Seite 410

    411 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enab l ed Smart Error Repo r ting Description: Specifi es whether an error message disp layed by the managem ent console will include a link to a re levant Acr o nis Knowledg e Base ar ticle. Possible values: Ena bled (include) or Disabled (do not include) Default value: Enab l [...]

  • Seite 411

    412 Copyright © Acronis International GmbH, 2002- 2015 16 C lou d ba ck up This section provid es detail s about using the Acronis Cloud Backup service. This service enables you to back up your da ta to Acronis Cloud Storage. Acronis Cloud Backup might be unavailab le in your region. To find more information, c lick here: http://www.acroni s.com/e[...]

  • Seite 412

    413 Copyright © Acronis International GmbH, 2002- 2015 For effective us e of t he sto rage spa ce, you have th e option to set up the " Delete backups older than " retention rule. Example You might want to us e the following backup s trate gy for a fil e server. Back up the critic al files twice a day on a sched ule. Set the retention ru[...]

  • Seite 413

    414 Copyright © Acronis International GmbH, 2002- 2015  you want to use pre / post backup o r pre/post data capture commands on the virtual machine  you want to back up ind ividual files and folders of th e virtual machine  you want to rec over files directly t o the virtual m achine’s file system. The machine will b e treate d as a phy[...]

  • Seite 414

    415 Copyright © Acronis International GmbH, 2002- 2015 Windows 8/8.1 – all editi ons except for the Wind ows RT editions (x86, x64) Virtualization produc ts (host-b ased backup of virtual ma chines) VMware ESX(i) 5 .0, 5.1, 5.5 , and 6.0 (H ost-based backup is available only for paid licens es of VMware ESXi.) Windows Server 2 008 (x64) with H y[...]

  • Seite 415

    416 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .7 .4 Wh at i f a n et wor k con n ect io n is lo st du ri ng c lo ud ba cku p or r ec ov er y? The software will try to reach the cloud storage e very 30 seconds. The attemp ts will be stopped as soon as the connec tio n is r esum ed OR a cer tain number of attempts are performed, depen[...]

  • Seite 416

    417 Copyright © Acronis International GmbH, 2002- 2015 Acronis uploads the backup to the cloud storage. After that, you can add increm ental backups to this full backup, either manually or on a schedule. The hard disk drive i s sent back to you but it is not possible to recover from it. However, rec overy from a locally atta ched device is possibl[...]

  • Seite 417

    418 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .8 .8 Ho w d o I per fo rm i nit ia l see di ng? Preparing 1. Ensure that you hav e activated an Acr onis Cloud Backup subscription on the machin e where you will do initial seeding ( skip this step if you have a volume subscription). 2. If you are currently using a trial subscription, e[...]

  • Seite 418

    419 Copyright © Acronis International GmbH, 2002- 2015 Hard drive types Acronis accepts hard disk drives of the following interf ace types: IDE, ATA, SATA, USB connected drives. SCSI drives are not ac cepted. Packaging If possible, use th e original packagin g. Otherwise, packaging m aterials can be o btained at any shipping outlet or s tat ionar [...]

  • Seite 419

    420 Copyright © Acronis International GmbH, 2002- 2015 St ep 4 Using the website o f the ship ping company that you chose, pr epare and print two prepaid shippin g labels: 1. Shipping label for sending your hard drive. This label i s placed on the top of the box. You should send your packag e to one of the Acr onis data centers. The data center ad[...]

  • Seite 420

    421 Copyright © Acronis International GmbH, 2002- 2015 St ep 5 Securely seal the b ox with a sturdy tape. Then, sti ck the shipping labe l for sendin g your hard drive t o the top of the bo x, so the l abel does not wrap around the edge of the package. 16 .1 .8 .1 0 How d o I t ra ck a n Ini ti al Se edi ng o rd er st at us? On the Acronis websit [...]

  • Seite 421

    422 Copyright © Acronis International GmbH, 2002- 2015 specified). If a prepaid shipping label was not pr o vide d with the media, th e media will be discarded.  [Occasional] The orde r is on hold – Your order was pl aced on hold due to technical dif ficulties processing the order. Acr onis is working on resolving these issues.  [Occasiona[...]

  • Seite 422

    423 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .9 .7 Ho w t o bu y a L arg e Sc al e R ec ove ry l ice ns e? You can buy a Large Scale Recovery license fr om an Acronis partner or from the Acronis online store. Having purchased a lic ense from an Acronis partner, you receive a confirmation e-mail wi th a registration code. Lo g in to[...]

  • Seite 423

    424 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .1 0. 1 How d o I a cc es s m y ac cou nt m an ag em en t web pa ge ? Go to http://ww w.acronis.com/en-us/ m y/cloud-back up/co rporat e and log in to y our account (cr eate one if you are not re gistere d). To access this webpag e from Acr onis Backup: 1. On the Actions menu, click Back[...]

  • Seite 424

    425 Copyright © Acronis International GmbH, 2002- 2015 A subscription for v irtual mach ines (now deprecated) can be ren ewed to a server sub scription or to a volume subscription. Volume subscriptions To renew a volume subscri ption, go to the account management webpage, clic k Renew next to the volume subscription, and then follow the on-screen [...]

  • Seite 425

    426 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .1 0. 8 Ca n I c an ce l m y su bsc ri pt ion ? Just wait until the subs cription expires. Refu nds are not available for the clo ud backup subscriptions. 16 .2 Wh er e do I s tar t? Go to http://ww w.acronis.com/en-us/ m y/cloud-back up/co rporat e and log in to y our account (cr eate o[...]

  • Seite 426

    427 Copyright © Acronis International GmbH, 2002- 2015  On the account management webpage, click the c loud backup trial link, and then select t he necessary subscripti o n typ e.  Install Acronis Backup, s tart the product, connect the console to the machine y ou want to back up, click Back up no w or Create b ackup plan , click Location , [...]

  • Seite 427

    428 Copyright © Acronis International GmbH, 2002- 2015 1 6 . 4 . 2 R e a s s i g n i n g a n a c t i v at e d s u b s c ri pt i on Sometimes you may want to use an already ac tiv ated subscription instead of an available subscription. In th ese cases, for ex ample:  You no longer ne ed to back up one of your machin es and you want to reuse that[...]

  • Seite 428

    429 Copyright © Acronis International GmbH, 2002- 2015 All earlier created ba ckups remain intact. You can delete them manually if necess ary. Keep in mind though, backups can be del eted from a subscription o nly by the machine to which the subscription is assigned. In our exa mple, you have the following options. Before reassign ing Delete backu[...]

  • Seite 429

    430 Copyright © Acronis International GmbH, 2002- 2015 To r et rie ve fi les fr om th e c lou d st ora ge: 1. Go to the account m anagement webpage (p. 424 ) and click Recove r files from Acronis Cloud . You will see the list of t he machin es backed up by using t he specified acc o unt. T he list of machines that sha re a volu me subscription app[...]

  • Seite 430

    431 Copyright © Acronis International GmbH, 2002- 2015  Setting up regular c o nversi o n of backups to a virtual machin e Operations with ba c kups :  Validating a backup*  Exporting a backup  Mounting a backup  Replicating or m oving backu ps from the cloud storag e  Converting an incre mental backup to full Operation with arch[...]

  • Seite 431

    432 Copyright © Acronis International GmbH, 2002- 2015 Increase storage quot a Replace a subscripti on with another one that has a greater storage quota. The remaining subscription period is reduced in pr oportion to the capacity increas e. Initial Seeding An extra service that enabl es you to save an initial full backup locally and then se nd it [...]

  • Seite 432

    433 Copyright © Acronis International GmbH, 2002- 2015 Subscription period The period during w hich the subscrip tion remains activated. Yo u can back up and recover the machine during this period. Recovery is possible f or extra 30 days after this peri od ends. Unassign a subscrip tion Make an assigned subscription available agai n. You can unass[...]

  • Seite 433

    434 Copyright © Acronis International GmbH, 2002- 2015 17 G los sa ry A A cr on is A ct ive R est or e The Acronis propri et ary tec hnology that brings a syste m online i m mediately aft er the system recovery is started. The system boots from the backup (p. 439) and the m achine b ecomes operational and r eady to provide necessary services. The [...]

  • Seite 434

    435 Copyright © Acronis International GmbH, 2002- 2015 A ct iv it y An action perform ed by Acronis Backup for achie v ement of s o me user goal. Examples: backing up, recovery, expor ting a backup, catalogin g a vault. An activit y may be initiat ed by a user or by the software itself. Execu tion of a task (p. 446) always cau ses one or more acti[...]

  • Seite 435

    436 Copyright © Acronis International GmbH, 2002- 2015  the backup archive (p. 435) name and location  the backup sche m e (p. 436). This inclu des the backup schedule and [optionally] t he retention rules (p. 445)  [optionally] additional o perations to perform with the backups (replica tio n (p. 445 ), validation (p. 446), conversion t [...]

  • Seite 436

    437 Copyright © Acronis International GmbH, 2002- 2015  access and back up the data that has survived in a c orrupted system  deploy an operating system on bare metal  create basic or dyna m ic vol umes (p. 441) on bare metal  back up sector- by -sector a disk that has an un supported file system  back up offline any data that canno[...]

  • Seite 437

    438 Copyright © Acronis International GmbH, 2002- 2015 C ent ra li ze d v au lt A networked location allotted by the management ser ver (p. 444) administrat o r to serve as s to rage for the backup archi v es (p. 435). A c entralized vault can be m anaged by a storage node (p. 445) or be unmanaged. The t o tal num ber and size of archives stored i[...]

  • Seite 438

    439 Copyright © Acronis International GmbH, 2002- 2015 The centralized cat alo g ava ilable on the management server (p. 444) contains all data st o red on its storage nodes (p. 4 45). Physically, data catal og is stored in catalog files. Every vault uses its own s et of catalog files w hich normally are located dir ectly in the vault. If this is [...]

  • Seite 439

    440 Copyright © Acronis International GmbH, 2002- 2015 D is k ba cku p ( Im ag e) A backup (p. 435) that c ontains a sector-based copy of a disk or a v olume in a pac kaged form. Normally, only s ectors that contain data are c opied. Acronis Backup provides an option to take a raw image, that is, cop y all the d isk se ctors, which enables imaging[...]

  • Seite 440

    441 Copyright © Acronis International GmbH, 2002- 2015 Di sk 1 MBR LDM database 1 MB Di sk 2 Protec-t ive MBR GPT Microsoft Reserved Partition (MSR) LDM database GPT LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks. For more inf o rmation abou t dynamic disks please refe r to the following Microsoft knowle[...]

  • Seite 441

    442 Copyright © Acronis International GmbH, 2002- 2015 E En cr yp te d arc hi ve A backup archive (p. 43 5 ) encrypted a cco rding to the Advanced Encryption Stand ard (AES). When the encryption option and a password for the archive are set in the backup options (p. 435), each bac kup belonging to the archive is encrypted by the agent (p. 435) bef[...]

  • Seite 442

    443 Copyright © Acronis International GmbH, 2002- 2015 In de xi ng An activity (p. 435) perfor m ed by a storage n ode (p . 445) after a backup (p. 435 ) has been sav ed to a deduplicating vault (p. 439) . During indexing, the storage node perform s t he follow ing operations:  Mo ves data bl ocks from the backup to a special file within the va[...]

  • Seite 443

    444 Copyright © Acronis International GmbH, 2002- 2015 M ana ged v au lt A centralized vault (p. 4 37 ) managed by a storage node (p. 445 ) . Archives (p. 435) in a man aged vault can be accessed as f ollows: bsp://node_address/vaul t_name/archive_name/ Physically, managed vaults can reside on a networ k share, SAN, NAS, on a hard dr ive local to [...]

  • Seite 444

    445 Copyright © Acronis International GmbH, 2002- 2015 Re gi st ere d ma ch in e A machine (p. 443) m anaged by a manag ement server (p. 444). A machi ne can be registered on only one management se rver at a time. A machine become s registered as a result of t he registration (p. 445) procedure. Re gi st ra ti on A procedure that adds a managed ma[...]