Acronis Tillbpens Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 186 Seiten
- N/A
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Backup Software
Acronis Backup & Recovery 10
401 Seiten -
Backup Software
Acronis Backup & Recovery 11
379 Seiten -
Backup Software
Acronis Backup & Recovery 10 Advanced Workstation
369 Seiten 3.24 mb -
Backup Software
Acronis True Image Unlimited 2015
19 Seiten -
Backup Software
Acronis True Image 2015
19 Seiten -
Backup Software
Acronis True Image 2016
161 Seiten -
Backup Software
Acronis DDULB2ENS
127 Seiten -
Backup Software
Acronis Disk Director 11 Home
96 Seiten
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Acronis Tillbpens an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Acronis Tillbpens, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Acronis Tillbpens die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Acronis Tillbpens. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Acronis Tillbpens sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Acronis Tillbpens
- Den Namen des Produzenten und das Produktionsjahr des Geräts Acronis Tillbpens
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Acronis Tillbpens
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Acronis Tillbpens zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Acronis Tillbpens und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Acronis finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Acronis Tillbpens zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Acronis Tillbpens, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Acronis Tillbpens widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
User's Gui de Acronis® Backup & Recovery ™ 10 Server for Linux[...]
-
Seite 2
Copyr ight © Acronis, Inc. , 2000 - 2009. All rights reserved. “Acronis” and “Acronis Secu re Zone” are registered trad emarks of Acronis, Inc. "Acro nis Compute with Confidence ", “Acro nis Sta rtup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trad emarks of Acronis, Inc. Linux is a registered tra[...]
-
Seite 3
Table of Con tent s 1. Intro ducin g Acro nis® Back u p & Reco ve ry™ 1 0 ......................................................... 6 1.1. Acronis Ba ckup & Reco very 10 over view ............................................................................ 6 1.2. Getting st arted ..........................................................[...]
-
Seite 4
4.2. Common o perat ions ......................................................................................................... 80 4.2.1 . Operations with archives stor ed in a vault .............................................................................................. 80 4.2.2 . Operations with backu ps .................................[...]
-
Seite 5
6.6. Managing mo unted image s ............................................................................................ 151 6.7. Acroni s Secure Zone ........................................................................................................ 152 6.7.1 . Creat ing A cron is S ecur e Zo ne ............................................[...]
-
Seite 6
Copyright © Acr onis, Inc., 2000 - 20 09 6 1. Introduc ing A cronis® Ba ckup & Re cove ry™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Ac ronis’ pat ented disk im aging and bare met al resto re technologies, Acronis Backu p & Recovery 1 0 succe eds Acronis Tr ue Imag e Echo as th e next gen eration disaster re covery so[...]
-
Seite 7
Copyright © Acr onis, Inc., 2000 - 20 09 7 Linux Log in as root or log in as an ordinary user and then switch user as required. Start the console with th e comm and /usr/sbin/acronis_con sole 3. Connec t the console to t he machin e where the agent is installe d. Where to go f rom here For wha t to do ne xt see " Basic concept s ( p. 17 )&quo[...]
-
Seite 8
8 Copyright © Acr onis, Inc., 2000 - 20 09 Key elem ents of the cons ole wo rkspac e Name Desc r ipt ion Navigation pane Contains the Navigation tree and the S hortcuts bar and lets you navigate to the di fferen t view s (se e the Navigation pane ( p. 8 ) section .) Actions and tools pane Contains bars w ith a set of actions that can be performed [...]
-
Seite 9
Copyright © Acr onis, Inc., 2000 - 20 09 9 Shortcuts bar The Shor tcu ts bar appears under the navigation t ree. It offers you an easy and conve nient way of conne ction to the mac hines in demand by adding them as shortcuts . To add a shortcut to a machine 1. Connec t the console to a managed machi ne. 2. In the navigation tree, right - click the[...]
-
Seite 10
10 Copyright © Acr onis, Inc., 2000 - 20 09 Actions Contains a list of common operations that can be p erformed on a managed machine or on a management server. Alway s the same for all views. Clicking the operation opens the respective actio n page (see the Action pages ( p. 12 ) section.) All the actions can also be access ed in the Acti ons menu[...]
-
Seite 11
Copyright © Acr onis, Inc., 2000 - 20 09 11 2. When the po inter become s a double - headed arr o w, dra g the p ointer to move th e border. The manageme nt console "rememb ers" the way the panes' bor ders are set. Whe n you run the management console next time, all the panes' b orders will have the sam e positi o n that was se[...]
-
Seite 12
12 Copyright © Acr onis, Inc., 2000 - 20 09 • Perform actions on the selected item. There are several ways of performing the same ac tion on selected i tems: o By c licking t he buttons o n the t able too lbar; o By clicking in the items in th e [Item's name] Act ion s bar ( on the Acti ons and T ools pane); o By selectin g th e items in th[...]
-
Seite 13
Copyright © Acr onis, Inc., 2000 - 20 09 13 Action page - Co ntrols 1.3. Acronis Bac kup & R ecovery 10 componen ts This sec tion contains a list of Acr onis Backup & Reco very 10 components with a brief description of their functionality. Compon ents f or a ma naged machi ne ( agen ts) These are applicat ions that perform dat a backup, re[...]
-
Seite 14
14 Copyright © Acr onis, Inc., 2000 - 20 09 1.3.1 .1. Bootab le compon ents and m edia bu ilder Bootable c ompon ents of t he agen t enabl e operati ons w ith reboot, such as recovery of the volume containing the curren tly active operating syste m. Once the operati ons are completed, the machin e boots int o the operati ng sys tem again . Th e bo[...]
-
Seite 15
Copyright © Acr onis, Inc., 2000 - 20 09 15 Remote connection to the age nt is not poss ible. 1.5. Suppor te d file systems Acronis Backup & Recovery 10 can back up and recov er the following file systems with the fo llowing limitations: • FAT1 6/32 • NTFS • Ext2/Ext3 • ReiserFS3 - particular files cannot be recovered fr om disk backup[...]
-
Seite 16
16 Copyright © Acr onis, Inc., 2000 - 20 09 or (ii) supply code correc tions to correct insubstantial problems at the next general release of the Software. More information about contacting Acronis Te chnical Support is available a t the following link: http:// www.Acron is.com/enterpr ise/suppo rt/[...]
-
Seite 17
Copyright © Acr onis, Inc., 2000 - 20 09 17 2. Understa nding Ac ronis Backup & Reco very 1 0 This se ction att empts to give its r eaders a cl ear under standing of th e produ ct s o that th ey can use th e prod uct in various circumstances without step - by - step instr uctions. 2.1. Basi c co ncep ts Please familiarize yourself with the bas[...]
-
Seite 18
18 Copyright © Acr onis, Inc., 2000 - 20 09 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary.[...]
-
Seite 19
Copyright © Acr onis, Inc., 2000 - 20 09 19 Backup using b ootable media You ca n boot t he machine usin g the bo otable medi a, co nfigure t he backup operation i n the same way as a simple backup plan and execut e the operation. This will help you extrac t files and logical volumes from a system that failed to boot, take an image of the offlin e[...]
-
Seite 20
20 Copyright © Acr onis, Inc., 2000 - 20 09 parallel recovery) first appeared in Acr onis Backup & Rec overy 10; the previous Acronis products do not prov ide it. Recovery u sing boot able me dia Recovery o ver a volu m e locked by the op erating sy stem, such as the volu me where the operati ng system resides, requires a rebo ot to the b oota[...]
-
Seite 21
Copyright © Acr onis, Inc., 2000 - 20 09 21 If the machine fails to boot or y ou need to recover data to bare m etal, you boo t the m achine using the boo table med ia an d co nfigur e the rec o very oper ation in the same way as the recovery task. The following diagram illustrates the rec overy using the bootable media. 2.2. Full , incr emen ta l[...]
-
Seite 22
22 Copyright © Acr onis, Inc., 2000 - 20 09 of only full backups. A full backup is self - sufficient - you do not need acce ss to any other ba ckup to recover data from a full ba ckup. It is wid ely accep ted tha t a full ba ckup is the sl owest t o do but the fastest t o restor e. With Acroni s techno logie s, recovery from an incremental backup [...]
-
Seite 23
Copyright © Acr onis, Inc., 2000 - 20 09 23 An incremental or differential backup created after di sk defragmentation mi ght be consider ably larger than usual because defr agmentation changes file locations on the di sk and the backup ref lects these changes . It is recommended that y ou re - create a f ull backup af ter dis k defragmentati on. T[...]
-
Seite 24
24 Copyright © Acr onis, Inc., 2000 - 20 09 warning each time you are trying to edit a plan (task) last modified by another u ser. On seeing the warning, yo u have two o ptions: • Click Canc el and create you r own plan or task. The original task will remain intac t. • Continue editing. You will have to enter all credentials required for the p[...]
-
Seite 25
Copyright © Acr onis, Inc., 2000 - 20 09 25 the rete ntion periods for the da ily, monthly and wee kly backups. The daily ba ckups are referred t o as “sons”; w eekly ba ckups ar e referred to as “ fathers ”; th e longes t lived m onthly b ackups ar e called “grandfathers”. GFS as a t ape r otatio n schem e GFS was initially created an[...]
-
Seite 26
26 Copyright © Acr onis, Inc., 2000 - 20 09 Select a day of the w eek from the days s elect ed in the pr evious s tep. Each 1st, 2nd an d 3rd backup cr eated o n this day o f the week will b e consi dered as a weekly back up. Each 4th backu p creat ed on this day o f the week wi ll be consi dered as a monthl y backup. Bac kups created o n the othe[...]
-
Seite 27
Copyright © Acr onis, Inc., 2000 - 20 09 27 Keep backups: Week ly This step def ines the rete ntion rule for weekly bac kups. The cleanup task w ill run after each weekly bac kup and delet e all weekl y backups tha t are older tha n you sp ecify. Th e week ly backups' r etent ion period canno t be less than t he daily bac kups' rete ntio[...]
-
Seite 28
28 Copyright © Acr onis, Inc., 2000 - 20 09 An ideal archi ve created according to the GF S scheme. Schedul e: Workda ys a t 8:00 PM Weekl y/Monthl y: Friday Keep dai ly backups: 7 days Keep weekly backups: 2 weeks Keep month ly ba ckups: 6 months Starting from the third week, weekly backup s will be regularly deleted. After 6 months, monthl y bac[...]
-
Seite 29
Copyright © Acr onis, Inc., 2000 - 20 09 29 The backup s that outl ive their nominal lifeti me because of dep endenci es are marked pink. The initia l full backup will be deleted as soon as all differential and incremental backups based on this backu p are dele ted. An archive created acco rding to the GFS scheme by Acro nis Backup & Recovery [...]
-
Seite 30
30 Copyright © Acr onis, Inc., 2000 - 20 09 other move ( moves 1, 3, 5 , 7 , 9, 11...), the second rin g at intervals of four m oves (mov es 2, 6, 10...), the third ring at intervals of eight moves (moves 4, 12...), and so on. For exam ple, if there ar e five rings labeled A, B, C, D , and E in the puzzle, the solu tion gives the following order o[...]
-
Seite 31
Copyright © Acr onis, Inc., 2000 - 20 09 31 • incremental backups on first level (A) - to gain time an d storage savings for the most frequent backup o perations; but data recovery fr om such backups takes longer bec ause it generally requires a ccess to three ba ckups • full backups on the last level (E for five - le vel pa ttern) - the rare [...]
-
Seite 32
32 Copyright © Acr onis, Inc., 2000 - 20 09 2.7. Retention rules The backups p roduced by a backup pl an make an archive. The two ret ention rules described in this section en able y o u to li mit the ar chive siz e and set the lifetime (retenti on period) of th e backups. 1. Delete b ackups older than This is a time interval counted back fro m t [...]
-
Seite 33
Copyright © Acr onis, Inc., 2000 - 20 09 33 There is a certain risk tha t all but one backup will be deleted if the maximum archive siz e is set improperly (too small) or a regular backup turn s out to be t o o large. T o protec t the recen t backups from deleti o n, selec t the Never dele te backups younger than ch eck bo x and specif y the ma xi[...]
-
Seite 34
34 Copyright © Acr onis, Inc., 2000 - 20 09 When de letion of a backup affects other backups, o ne of the following rules is ap plied: • Retain t he backup unti l all dependent backups become s ubject t o deletion The o utdated back up will b e ke pt until a ll backu ps tha t depen d on it a lso be come out dated. T hen all the chain will be del[...]
-
Seite 35
Copyright © Acr onis, Inc., 2000 - 20 09 35 You can back up data of one or more logical volumes and recover it to a previously created logic al volume or a basic (M BR) disk or volume; likewise, it is also pos sible to recover the data of a basic volume to a lo gical volume . In each case, the program stor es and recov ers volu me c ontents onl y.[...]
-
Seite 36
36 Copyright © Acr onis, Inc., 2000 - 20 09 The system has three physical d isks (Disk 1, Dis k 2, and Disk 3). Tw o logical volumes, DYN1 and D YN2, are arranged across basic volumes 1 - 2 and 2 - 1. Disk 3 includes Ac ronis Se cure Zone which i s not normally backed up. To back up the l o gical v olume DYN1, s elect th e volum e DYN1. To back up[...]
-
Seite 37
Copyright © Acr onis, Inc., 2000 - 20 09 37 Unallocated 1 16771859 Unallocated Disk 3: 3- 1 sdc1 Pri 63 16755732 Ext3 Unallocated 16755795 16065 Unallocated Disk 4: 4- 1 sdd1 Pri 63 16755732 None Unallocated 16755795 16065 Unallocated Disk 5: Table 0 Table Unallocated 1 16771859 Unallocated Dynamic & GPT Volumes: DYN1 md0 33511168 Ext3 Disk: 5[...]
-
Seite 38
38 Copyright © Acr onis, Inc., 2000 - 20 09 2.10. Tape suppo rt Acronis Backup & Recove ry 10 supports tape libraries, aut oloaders, SCSI and USB tape drives as storage devices. A tape dev ice can be locally attached to a managed m achine ( in this case , the Acronis Backup & Reco very 10 A gent wr ites an d read s the ta pes) or access ed[...]
-
Seite 39
Copyright © Acr onis, Inc., 2000 - 20 09 39 Storage Node ABR10 - - - + 2.10.2. Using a sing le tape d rive A tape drive that is locally attached to a m anaged machine can be us ed by local backu p plans as a storage device. The functionality of a locall y attached autoloader or tape libr ary is limited to the ordinary tap e drive. This means th at[...]
-
Seite 40
40 Copyright © Acr onis, Inc., 2000 - 20 09 Recov ery f rom a loc all y attach ed tape devi ce Before crea ting a recovery task, insert or m ount the tape con taini ng the ba ckup you n eed t o recover. When creatin g a recover y task, select the tape d evic e from th e list of available locations and then select the b ackup. A fter rec overy is s[...]
-
Seite 41
Copyright © Acr onis, Inc., 2000 - 20 09 41 schemes with autom atic clea nup to bac k up to the zone, o r delete o utdated ba ckups manua lly using the archive management f unctionality. With the ne w Acronis Sec ure Zone behavio r, you obtain the abil it y to : • list arc hives loca ted in the zone and ba ckups contai ned in each arc hive • e[...]
-
Seite 42
42 Copyright © Acr onis, Inc., 2000 - 20 09 • Cannot be organized on a d y namic disk or a disk using the GPT partitioning style. • Requires manual co nfiguration of boot loaders, such as LILO and GR UB, after activati on. • Requires re - activation of th ird - party loaders after activation.[...]
-
Seite 43
Copyright © Acr onis, Inc., 2000 - 20 09 43 3. Opt ions This se ction cov ers Acro nis Backup & R ecovery 10 o ptio ns that can be configured using G raphical Us er Interfac e. The content of th is section i s applic able to bo th stand - alone and adv anced e ditions o f Acroni s Backup & Recove ry 10. 3.1. Cons ole op t ions The consol e[...]
-
Seite 44
44 Copyright © Acr onis, Inc., 2000 - 20 09 The option d efin es whet her to disp lay the pop - up messag es ab out task r un results: succ essful completion, failure or success with warnings. When displaying of pop - up m essages is disabled, you can revi ew the t ask exe cuti on states and results in the Tasks vie w . The pres et is: Enabled for[...]
-
Seite 45
Copyright © Acr onis, Inc., 2000 - 20 09 45 3.1.5. Fo n t s This opti on is effe ctive wh en the c onsole is c o nnected to a manag ed machi ne or to the manage men t server. The option d efines the f onts to be u sed in t he Graphical User Interface of Acronis Backup & Recove ry 10. The Menu setting a ffects the drop - down and cont ext menu [...]
-
Seite 46
46 Copyright © Acr onis, Inc., 2000 - 20 09 You ca n further overr ide the sett ings set in th e default backup a nd recover y options, whe n c rea ti ng a backup plan or a recovery task. The settings you obtain in this case will be p lan - specific or task - specific. Acronis Backup & Recovery 1 0 provides the following Simple Network Managem[...]
-
Seite 47
Copyright © Acr onis, Inc., 2000 - 20 09 47 Linux To rece ive SNMP messages o n a machine running Linux, the net - snmp (f o r RHEL and S USE) or th e snmpd (for Debian) packag e has to be installed. SNMP ca n be co nfigured using the snm pconf comm and. The default configuration files are located in the /etc /snmp di rector y: • /etc/ snmp/snmp[...]
-
Seite 48
48 Copyright © Acr onis, Inc., 2000 - 20 09 Pre/Post b ackup commands ( p. 51 ) + + - - Pre/Post data capture comman ds ( p. 52 ) + + - - File - level backup s napshot ( p. 55 ) - + - - Compre ssio n level ( p. 55 ) + + + + Backu p perfo rmanc e: Backup pr iority ( p. 56 ) + + - - HDD writing sp eed ( p. 56 ) Dest: HDD Dest: HDD Dest: HDD Dest: HD[...]
-
Seite 49
Copyright © Acr onis, Inc., 2000 - 20 09 49 Ask for fi rst m edia wh il e creating back up archive s on remova ble medi a Dest : remova ble media Dest : remova ble media Dest : remova ble media Dest : remova ble media Validate backup afte r creation - - + + Re boot after the backup - - + + Create full backups as synthet ic backups + + + + Notifica[...]
-
Seite 50
50 Copyright © Acr onis, Inc., 2000 - 20 09 3.3.1 .2. Source fil es exc lusio n This o ption is effect ive for Window s and Linux ope rating systems and boo table media. This option is effective for disk - level backup of NTFS and FAT file systems only. This option is effective for file - level backup of all supported file sys tems. The o ption de[...]
-
Seite 51
Copyright © Acr onis, Inc., 2000 - 20 09 51 The above setti ngs are not effective f or the fil es or folders that wer e explicitly selected for backup. For example, assume that you s elected the folder MyFolder and the f ile MyFile.tmp out side that folder, and s elected to skip al l .tmp files . In this case, all . tmp files in the folder MyFolde[...]
-
Seite 52
52 Copyright © Acr onis, Inc., 2000 - 20 09 5. Click Test c ommand to check if the command is c orrect. Check box Sele ct io n Fail the ta sk if t he command execution fail s Select ed Clea red Select ed Clear ed Do not ba ck up unti l the command exec ution is complete Select ed S elected Clear ed Clear ed Result Preset Perfor m the backup only a[...]
-
Seite 53
Copyright © Acr onis, Inc., 2000 - 20 09 53 The follo wing sch eme illu st rates when the p re/pos t data c apture command s are e xecuted. < -- -------------------- -------- Bac kup -------------------- -------- > Pre - backup comman d Pre - data capture comman d Data capture Post - data capture comman d Post - backup comman d If the Vo lum[...]
-
Seite 54
54 Copyright © Acr onis, Inc., 2000 - 20 09 Che ck box Sele ct io n Fail the backup tas k if the command exec ution fai ls Select ed Cleared Select ed Cleared Do not perf orm the data capture u ntil the comman d execution is complete Select ed Select ed Clear ed Clear ed Result Preset Perfor m the d ata capture o nl y after the comma nd i s succes[...]
-
Seite 55
Copyright © Acr onis, Inc., 2000 - 20 09 55 execut ed. D elete the TIB fi le an d tempor ary fil es an d fail th e task i f the comman d ex ecutio n fails. or su ccess. comman d execution re sult. 3.3.1 .5. File - level backup sn apshot This option is effective only for fil e - level ba ckup in Windows and Linux operati ng systems. This o ption de[...]
-
Seite 56
56 Copyright © Acr onis, Inc., 2000 - 20 09 • None – the data will b e copied as is, with out any compression. Th e resulting b ackup size will be maximal. • Norm al – recom mended in most cases. • High – the resulting backup size will typically be le ss than for the Normal level. • Maximum – the data will be com pressed as much as[...]
-
Seite 57
Copyright © Acr onis, Inc., 2000 - 20 09 57 The pres et is: Maximum. To set the desired HDD writing speed for backup Do any of t he following: • Click Wr iting speed s tated as a per centage of the maximum speed of the desti nation hard di sk , and then drag the slider or select a percentage in the box • Click Writ ing speed s tated in kil oby[...]
-
Seite 58
58 Copyright © Acr onis, Inc., 2000 - 20 09 To configure e - ma il notification 1. Select the Send e - mail notific ations check box t o activ ate notif ications. 2. In the E- mai l addres ses field , type the e - mail address to which notifications will be sent. You can enter several addresses se parated by semicolons. 3. Under Send noti fi c ati[...]
-
Seite 59
Copyright © Acr onis, Inc., 2000 - 20 09 59 The o ption e nables y ou to receive W inPopup notific atio ns about the backup task 's su ccessfu l completion, failure or need for int eraction. The pres et is: Disabled. Before confi guring WinPop up notifications, make sur e the Messenger ser vice is sta rted on b oth the machine exe cuting the [...]
-
Seite 60
60 Copyright © Acr onis, Inc., 2000 - 20 09 • Use the s etting set i n the Machi ne options – to use the setting specif ied for th e machine. F or more information refer to Machine option s ( p. 45 ). • Send SNMP notif ications indivi dually for back up operation ev ents – to send t he events of th e backup o peratio ns to the specified SN[...]
-
Seite 61
Copyright © Acr onis, Inc., 2000 - 20 09 61 not allow th e estimated fil e size. Such migh t be the case when the b ackup is placed on FAT16 and FAT32 file systems that hav e a 4GB file size limit. If the destin ation d isk runs o ut of free s pace wh ile crea ting the b ackup, the task enters the Need interac tion state. You have the ability t o [...]
-
Seite 62
62 Copyright © Acr onis, Inc., 2000 - 20 09 • Acronis D isk Dire ctor Lite is a disk m anagement tool that enables such operations as clo ning disks; creating, de leti ng and conve rting basic and dynami c volumes; a nd some a dditio nal operations such as converting a disk partitioning style from MBR to G PT and vice versa or changing disk labe[...]
-
Seite 63
Copyright © Acr onis, Inc., 2000 - 20 09 63 folder or network share . Manage d vaults and FTP servers ar e not support ed as secon dary destina tions . The pres et is: Disabled. When dual destination is enabled, the agent will automatically copy each backup being created locally to the secondary destinati o n such as a networ k share. Onc e the ba[...]
-
Seite 64
64 Copyright © Acr onis, Inc., 2000 - 20 09 To handl e the situatio n when the cond itions are not me t for too long an d further del aying the backup is becoming risky, you can set the time interval after which the task will run irrespective of the condition. Selec t the Run the task anyway after check box an d specif y the time in terval. Th e t[...]
-
Seite 65
Copyright © Acr onis, Inc., 2000 - 20 09 65 Continu e ex ecuti ng th e b ackup plan The plan's tasks will be executed on sc hedule as though the failure d id not occur. In addi tion, the pr o gram ca n try to execute th e fai led task again. Select th e Restart a fai led task che ck box and s pecif y the nu mber of attemp ts and the ti me int[...]
-
Seite 66
66 Copyright © Acr onis, Inc., 2000 - 20 09 Ask f or t he fi rs t medi a wh ile ba cking up to removable m edia This option is effective only when bac king up to rem ovable media. The optio n defines whether t o display the I nsert First Media prom pt when backing up to rem ovable media. The pres et is: Enabled . When the option i s enabled, ba ck[...]
-
Seite 67
Copyright © Acr onis, Inc., 2000 - 20 09 67 D eduplicate the backup onl y after transferri ng it to the vault (do n ot deduplica te at source) This o ption is e ffective for Window s and Lin ux operating sy stems and bootable media, when the backup de stinatio n is a deduplicati ng vault. The pres et is: Disabled . Enabling t his opt ion tur ns of[...]
-
Seite 68
68 Copyright © Acr onis, Inc., 2000 - 20 09 Agent for Linux Bootable media (Linux - based or PE - based ) Dis k recovery File recovery (also from a disk backup) Dis k recovery File recovery (also from a disk backup) Pre/Post reco very comman ds ( p. 69 ) + + PE only PE only Recovery priori ty ( p. 70 ) + + - - File - level s ecurity ( p. 71 ): Rec[...]
-
Seite 69
Copyright © Acr onis, Inc., 2000 - 20 09 69 3.3.2 .1. Pre/Po st comm ands This o ption is effect ive for Window s and Linux ope rating system s and PE - based bootable media. The option en ables you to d efine the co mmands t o be auto maticall y executed before and after the data recovery. Exam ple of how you can use the pre/post comman ds: • l[...]
-
Seite 70
70 Copyright © Acr onis, Inc., 2000 - 20 09 Result Preset Perfor m the rec ove ry only after t he comman d is successfully execut ed. F ail th e task if the command executi on fai led . Perfor m th e recover y after the comma nd i s execut ed d espite executi on fai lur e or su ccess. N/A Perfor m the recover y concurre ntly with the comma nd exec[...]
-
Seite 71
Copyright © Acr onis, Inc., 2000 - 20 09 71 To spe cify t he re cov ery pr oce ss prio rit y Select one o f the f o llowing : • Low – to m inimiz e resour ces taken by the reco very p rocess, lea ving more r esources t o other proce sses running o n the machine • Norm al – to run the recovery process with normal speed, allocating resources[...]
-
Seite 72
72 Copyright © Acr onis, Inc., 2000 - 20 09 5. Click A dditional e- mail param eters , to configure additional e - mail parameters as follows, then click OK : o From - type the e - mail address of the user from whom the message will be sent. If you leave this field empt y, mess ages wi ll be con structed as if they ar e from the des ti nation addr[...]
-
Seite 73
Copyright © Acr onis, Inc., 2000 - 20 09 73 o When recove ry comp letes su ccessfu lly – to send n otificati on when the recovery ta sk ha s completed successfully o When recov ery fails – to send n otificati on when the r ecover y task has fail ed. The When user i nteract ion is r equir ed c he ck bo x – to send not ificatio n during the op[...]
-
Seite 74
74 Copyright © Acr onis, Inc., 2000 - 20 09 3.3.2 .6. Error ha ndling These opti o ns ar e effecti ve for Windo ws and Linux op erating sys tems and bo otable m edia. These option s enable you to specify how to handle e rrors that might occur durin g recovery. Do not sho w mess ages and dialog s while p roces sing (sil ent mode) The pres et is: Di[...]
-
Seite 75
Copyright © Acr onis, Inc., 2000 - 20 09 75 When op erating u nder b ootable media, this option is not effecti ve for the NTFS file syste m . The pres et is Disabled . This opti on defin es wheth er to check th e integ rity o f the fi le syste m afte r a disk or volume rec overy. Restar t mach in e aut omati cal ly if i t is requi red f or r ecov [...]
-
Seite 76
Copyright © Acr onis, Inc., 2000 - 20 09 76 4. Vaul ts A vault is a location for storing backup archives. F or ease of use and admin istration, a vault is associated with the archives' metadata. Referring to this metadata m akes for fast and c onvenient opera tions wit h arc hives and ba ckups store d in the vault. A vault can be organized on[...]
-
Seite 77
Copyright © Acr onis, Inc., 2000 - 20 09 77 A vault is called personal if it was cre ated using direct conne ction of t he console to a ma naged machine. Personal vaults are specific for each m anaged machine. Way of wo rki ng wit h th e "Vaul ts" view Vault s (o n the navigatio n pane) - top element of th e vaul ts tree. Click this it e[...]
-
Seite 78
78 Copyright © Acr onis, Inc., 2000 - 20 09 4.1.1. W orking w ith the "Personal vault" view This section briefly describes the main elements of th e Personal v ault view, and suggests the ways to work with them. Vault to olb ar The toolbar c ontains operation al buttons that let yo u perform o perations w ith the se lected pe rsonal vaul[...]
-
Seite 79
Copyright © Acr onis, Inc., 2000 - 20 09 79 • [Archiv e Name] The A c ti on s bar is available when you sele ct an archive in the archives ta b le . Duplicates actions of the archives toolbar. • [Back up Name] The Ac ti on s bar is av ailable when you expand the ar chive and click on an y of its backups. Duplicates actions of the ar chives too[...]
-
Seite 80
80 Copyright © Acr onis, Inc., 2000 - 20 09 4.1.2 .1. Creating a person al vaul t To create a personal vaul t 1. In the N am e field, t ype a name for the v ault being creat ed. 2. [Optio nal] In the C omm ents field, add a descript ion of the vault. 3. In the Pat h field, click Chang e... In the opene d Pers onal Vault Path wi ndow, spe cify a pa[...]
-
Seite 81
Copyright © Acr onis, Inc., 2000 - 20 09 81 All the o perat ions desc ribed belo w are perfo rmed by cli cking the corres ponding butto ns on t he toolbar. These operations can be also accessed fr o m the [Ar c hi v e n am e] ac ti o ns ba r (on t he Ac ti ons and tools pan e) and from the [Archiv e name] actions item of the main men u res pective[...]
-
Seite 82
82 Copyright © Acr onis, Inc., 2000 - 20 09 as a virtual machin e The Recover data ( p. 130 ) p age will b e o pened with t he pre - selected backup as a source . S elect the locati on and the type of new virt ual machine and then proc eed as wit h regular disk or volu me recovery. Validate a backup Click Valida te . The Va lidat ion ( p. 144 ) pa[...]
-
Seite 83
Copyright © Acr onis, Inc., 2000 - 20 09 83 4.2.4. Filtering and s orting archives The following is a guideline for you to filter and sort archives in the archives table. To Do Sort back up archiv es by any column Click the colum n 's header to sort the ar chives in ascendi ng order . Click it once again to sort the archives in descendin g or[...]
-
Seite 84
Copyright © Acr onis, Inc., 2000 - 20 09 84 5. Sche duling Acronis scheduler helps the administrator ada pt backup plans to the co mpany’s dail y rout ine and each employee’s work style. The plans’ tasks will be launched systematically keepin g the critical data safely pr otected. The schedu ler uses local ti m e of th e machin e the ba ckup[...]
-
Seite 85
Copyright © Acr onis, Inc., 2000 - 2009 85 • What if the c ondition i s not met for a very long time? If delaying a backup is getting risky, you can force the condition (tell t he users to log off) or run the task manually. To automatically handle this situatio n, you can set the time interval after which the task will run regard less of the con[...]
-
Seite 86
86 Copyright © Acr onis, Inc., 2000 - 20 09 From: not set . The tas k will be started on the cu rren t day, if it ha s been create d be fore 6PM. If you have crea ted the task a fter 6 PM, th e task will be star ted for the f irst ti me on th e next day a t 6 PM. To: not set . The task will be performed for an ind efinite number of days. "Thr[...]
-
Seite 87
Copyright © Acr onis, Inc., 2000 - 2009 87 From: 08:0 0:00 AM Until: 12:00:0 0 PM . 3. Effective: From: 09/2 0/20 09 . To: not set . Second dail y schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:0 0:00 P M Until: 0 7:00:00 PM . 3. Effective: From: 09/2 0/20 09 . To: not set . 5.2. Weekly schedu le Weekly sch edule is effec tive in Windo[...]
-
Seite 88
88 Copyright © Acr onis, Inc., 2000 - 20 09 Examp les "One day in t he week" schedule Run the task every Friday at 10PM, starting from a certain date (say 05/14 /2009) and ending after six mo nt hs . The schedu le's p arameter s are thus s et up as fo ll ows . 1. Every: 1 week(s) on: Fri . 2. Once at: 10:00: 00 PM . 3. Effective: Fr[...]
-
Seite 89
Copyright © Acr onis, Inc., 2000 - 2009 89 For exam ple, you need t he task to be run with the fo llowing s chedule: • Monda y: twi ce at 12 PM (noo n) and 9 PM • Tuesday: every 3 hour s from 9 AM t ill 9 PM • Wednesday : every 3 hours fr om 9 AM till 9 PM • Thursday: every 3 hours from 9 AM till 9 PM • Friday: twice at 12 PM and 9 PM ( [...]
-
Seite 90
90 Copyright © Acr onis, Inc., 2000 - 20 09 Month s: <...> Select a certa in month(s) you want to r un the tas k in. Days: <.. .> Select specif ic days of the month to run the tas k on. You c an also select the last day of the m onth, irrespective of its act ual date. On: <...> <. ..> Select specif ic days of the weeks to r[...]
-
Seite 91
Copyright © Acr onis, Inc., 2000 - 2009 91 Run the t ask o n all wo rkdays during the nort hern autum n seaso ns of 20 09 and 201 0. During a workday, the task is per formed every 6 h ours from 12 AM (midnight) till 6 PM. The schedu le's p arameter s are set up a s foll o ws. 1. Month s: September, October, November . 2. On: <all > <[...]
-
Seite 92
92 Copyright © Acr onis, Inc., 2000 - 20 09 4. Effective: From: 11/0 1/20 09 . To: not set . Thir d schedul e 1. Month s: June , July , August . 2. Days: 1 , 15 . 3. Once at: 10:00: 00 PM . 4. Effective: From: 11/0 1/20 09 . To: not set . 5.4. Cond iti ons Conditions add more flex ib ility to the scheduler, en abling to execut e bac kup ta sks wit[...]
-
Seite 93
Copyright © Acr onis, Inc., 2000 - 2009 93 Examp le: Backing u p data to th e networked loca tion is perf o rmed on workdays a t 9PM. If the locati o n is not available at that moment ( for instance, d ue to maintenance work), skip t he backup and wait for t he next wor kday to start th e t ask. It is assumed that the backup task should not b e st[...]
-
Seite 94
94 Copyright © Acr onis, Inc., 2000 - 20 09 What if... What if a tas k is schedule d to be execut ed at a cert ain time and t his time i s outside the s pecified tim e interval ? For example: • Ev ent: Dail y , Eve ry 1 day(s); Once at 03: 00:0 0 PM . • Condition: Fits time int erval , from 06:00:0 0 PM until 11:5 9:59 PM . In this ca se, whet[...]
-
Seite 95
Copyright © Acr onis, Inc., 2000 - 20 09 95 6. Direc t man agement This section covers operations tha t can be performe d directly on a managed machine by using th e direct console - agent conn ect io n. The co ntent of thi s sect ion is applic able t o both st and - alone and advance d edition s of Acronis Back up & Recovery 10. 6.1. Administ[...]
-
Seite 96
96 Copyright © Acr onis, Inc., 2000 - 20 09 unavailab le, or the licen se key data was cor rupted. Check connecti vit y to the serve r and run Acronis Licens e Ser ver to manag e licenses. to th e licens e serv er being unavail able. You may also want t o ensur e that the li censes a re pr esen t on t he licens e ser ver. Trial period i s over Ins[...]
-
Seite 97
Copyright © Acr onis, Inc., 2000 - 20 09 97 Acti vitie s The calenda r lets you explore the h istory of the A cronis Backu p & Rec o very 1 0 agent's activi ties on the machi ne. Right - c lick on any hi ghlighted da te and se lect View lo g to see the list of log entries filtered by date. On the Vi e w section (at the right of the calend[...]
-
Seite 98
98 Copyright © Acr onis, Inc., 2000 - 20 09 98 ). A backup plan state is a cumulative state of the plan's tasks.The st atus of a backu p plan ( p. 99 ) helps y ou to esti mate wh ether th e data is suc cessfull y protec ted. A task is a se t o f sequ entia l actions to be performed on a machine when a certain time comes o r certain ev ent occ[...]
-
Seite 99
Copyright © Acr onis, Inc., 2000 - 20 09 99 3 Wait ing At least one task is waiting. Otherwi se, see 4. Waiting for con dition. Th is situati on is quit e norm al, but delaying a backup for too long is risky. The solution may be to set the ma ximu m del ay o r for ce the co ndit ion ( tell th e user to log off, enab le the r equ ired n etwork conn[...]
-
Seite 100
100 Copyright © Acr onis, Inc., 2000 - 20 09 3 OK All the tasks ar e complet ed su cces sfully . No action is re quired. Note that a bac kup plan c an be OK in case non e of th e task s has b een started yet or some o f the tasks are stoppe d or being stopped. T hese s ituations are considered as norm al. Task st ate s A task can be in one of the [...]
-
Seite 101
Copyright © Acr onis, Inc., 2000 - 20 09 101 Task state diagram Task stat uses A task can have one of the following statuses: E rror ; Warning ; OK . A task s tatus i s deri ved fro m the resu lt of the las t run of the tas k. Status How it is determ ined How to handle 1 Error Last result is "Fai led " Ident ify th e failed task - > C[...]
-
Seite 102
102 Copyright © Acr onis, Inc., 2000 - 20 09 "Stoppe d" has bee n start ed, but has not finis hed yet and so its result is not available. 6.1.2 .2. Working with bac kup pl ans and tasks Actions on b ackup p lans and t asks The following is a guideline for you to perform operations with backup p lans and tasks. To Do View detail s of a pl[...]
-
Seite 103
Copyright © Acr onis, Inc., 2000 - 20 09 103 Stop a plan/task Backup pl an Click Sto p . Stopping the running backup plan stops all its tasks. Thus, all t he task ope rations will be a bort ed. Task Click Sto p . What will happen i f I stop the task? Gene rally, stoppi ng the tas k aborts its ope ration ( backup, re covery, v alidation, exporti ng[...]
-
Seite 104
104 Copyright © Acr onis, Inc., 2000 - 20 09 Without the Admini strator priv ileges on the mac hine, a us er ca nnot edit plans ow ned by other user s. • The bac kup plan has a c entral ized ori gin. Direc t editing of centrali zed backup plans is not poss ible. You nee d to edit the original b ackup p olicy. Task Click Ed it . Why can't I [...]
-
Seite 105
Copyright © Acr onis, Inc., 2000 - 20 09 105 Why can't I delete t he task? • Task belongs to a bac kup plan A task bel onging to a backup plan ca nnot be delet ed separately f rom the p lan. Edi t the pla n to remove t he task or delet e the entir e pl an. • Do not hav e the appr opriate privile ge Without the Administ rator priv ileges o[...]
-
Seite 106
106 Copyright © Acr onis, Inc., 2000 - 20 09 To run a task of the select ed backup plan 1. Select the task o f the back up pl an you need to run. T o m ake cert ain of your selec tion, check the task information gathered in tabs at the bottom of the window. This information is also duplicat ed in the Task details ( p. 10 6 ) window. 2. Click OK . [...]
-
Seite 107
Copyright © Acr onis, Inc., 2000 - 20 09 107 Types of tas ks Task n ame Desc r ipt ion Backup (disk) Backing up disks and volum es Backup (file ) Backing up files and fold ers Backup (virtua l machine ) Backing up an entire virtual machin e or its volume s Reco very (di sk) Disk backup recovery Recovery (file ) File an d fold er rec overy Recover [...]
-
Seite 108
108 Copyright © Acr onis, Inc., 2000 - 20 09 Backup The Ba ckup tab is available for recovery, ba ckup validation, and export tasks. Provides d etails on the sel ected backup: when it was cr eated, its t ype (full, incremental, differe ntial), inform ation on the ar chive and the vau lt the back up is stored in. Settings The Settings tab displays [...]
-
Seite 109
Copyright © Acr onis, Inc., 2000 - 20 09 109 Source The Source tab provides the following infor mation on the data selected for backu p: • Source t ype - the type of data ( p. 115 ) select ed for ba cking up. • Items to bac k up - items s elected to back up and their size. Destinatio n The Destinati on tab provides the following inf ormation: [...]
-
Seite 110
110 Copyright © Acr onis, Inc., 2000 - 20 09 View Ac tio n Dashbo ard In the cal endar, ri ght - cl ick on any hig hlighte d date, and then s elect View lo g . The Log view appe ars with t he lis t of log e ntries al ready f iltered by t he date i n questi on. Backup pl ans and tasks Select a backup plan or a task, and then click View lo g . The L[...]
-
Seite 111
Copyright © Acr onis, Inc., 2000 - 20 09 111 Delete all the log entrie s Click Clear Log . All th e log ent ries will b e del eted from th e log, and a new lo g en try wil l be cr eated . It will c ontain inf ormati on about who de lete d the ent ries and w hen. 6.1.3 .2. Filtering a nd sorting log entrie s The following is a guideline for you to [...]
-
Seite 112
112 Copyright © Acr onis, Inc., 2000 - 20 09 Log en try d ata fields A local log entry contains t he following data fields: • Type - type of event (Err or; Warning; Information) • Date - date and ti me of the e vent occurre nce • Backup pl an - the backup plan the event relates to (if an y) • Task - the task th e event rela tes to (i f any[...]
-
Seite 113
Copyright © Acr onis, Inc., 2000 - 20 09 113 Comments [Optio nal] Ty pe a desc ription o f the ba ckup plan. T o ac cess this option, sele ct the Advanced view che ck box. What t o back up Source t ype ( p. 1 15 ) Select th e type of data to back up . The t y pe of da ta depends on the agents ins talled on the machine . Items to bac kup ( p. 115 )[...]
-
Seite 114
114 Copyright © Acr onis, Inc., 2000 - 20 09 Archiv e validatio n When to vali date ( p. 130 ) [Optional] Define when and h ow often to perform validation and whether to validate the entire archive or the latest backup in the archive. Backup options Settings [Optional] Configure paramete rs of t he backup oper ation, suc h as pre/ post bac kup com[...]
-
Seite 115
Copyright © Acr onis, Inc., 2000 - 20 09 115 The tasks will always run under the credentials you specify, whether started manually or exec uted on schedule . Specify: • User nam e . When enteri ng the na me of an Active Dir ectory user accoun t, be sur e to also specify the domain name ( DOM AIN Username or Username@d omain) • Passwo rd . Th[...]
-
Seite 116
116 Copyright © Acr onis, Inc., 2000 - 20 09 If your oper ating system and its loader resi de on differ ent volumes, always include both v olumes in the backup. The volumes mus t al so be recovered t ogether; otherwi se there is a high risk that the operating system will n ot st art. 2. [Optional] To create an ex act copy of a disk or volume on a [...]
-
Seite 117
Copyright © Acr onis, Inc., 2000 - 20 09 117 Use the table in the righ t part of the window t o browse an d sel ect the nested items. Selectin g th e check box b eside the Name column’s header automatically selects all items in the table. Clearing this check box automatically deselects all ite ms. 3. Click OK . 6.2.5. Access cred entials for sou[...]
-
Seite 118
118 Copyright © Acr onis, Inc., 2000 - 20 09 the list ; use the A dd , Edit , Remove and Remove All bu ttons to c reate the list of f ile masks . You can use one or m ore wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero or more characters in a file name; for exa mple, the file mas k Doc*.txt yi el ds f iles such as[...]
-
Seite 119
Copyright © Acr onis, Inc., 2000 - 20 09 119 After enterin g ac cess cr edentials, the fold ers on the ser ver beco me ava ilable. C lick the appropriate folder on t he server. You can access the server as an anony mous user if the server enables such acce ss. To do so, clic k Use anonym ous acc ess instead of entering credential s. As appears fro[...]
-
Seite 120
120 Copyright © Acr onis, Inc., 2000 - 20 09 to one back up plan can be easily de leted along with the backups belongi ng to the other. You should especially not expect the classic b ehavior of the GFS and Tower of Hanoi b ackup schemes. Norma lly, each com plex backup plan sh ould back up to its own arc hive. 6.2.8. Access cred entials for archiv[...]
-
Seite 121
Copyright © Acr onis, Inc., 2000 - 20 09 121 • Tower of Hanoi – to us e the Towe r of Hanoi backup sc heme, w here yo u schedule w hen and ho w ofte n to back up (se ssions) and se lect the number of backup lev els (up to 16). In this s cheme, the data can be bac ked up more than once a day. By setti ng up the backup s chedule and s electing b[...]
-
Seite 122
122 Copyright © Acr onis, Inc., 2000 - 20 09 6.2.9 .4. Grandfa ther - Fat her - Son scheme At a glan ce • Daily incremental, weekly differen tial, an d monthly full bac kups • Custom day for weekly and mont hly backups • Custom retention pe riods for bac kups of each typ e Description Let us suppose that we want to set up a backup plan that [...]
-
Seite 123
Copyright © Acr onis, Inc., 2000 - 20 09 123 Keep backups: Speci fies how long you w ant the bac kups to be stored in the archiv e. A term can be set in hours , days, week s, months, or years. For month ly backups, you c an also se lect Keep indefini tely if you want them to be saved forever. The default values for each b ackup type are as foll ow[...]
-
Seite 124
124 Copyright © Acr onis, Inc., 2000 - 20 09 available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, w ill be stored o n the s ystem u ntil F ebruary 7. Monthly ba ckups will nev er be delete d. Limited storage If you do no t want to arrange a v ast amount of space to sto re a huge archive, yo u may set u[...]
-
Seite 125
Copyright © Acr onis, Inc., 2000 - 20 09 125 • Back up on: Tuesday , Thursday, Friday • Weekly/ monthly : Friday • Keep ba ckups: o Daily: 6 months o Weekly: 6 months o Monthl y: 5 y ears Here, da ily inc rementa l backups wil l be cre ated on Tu esdays and T hursdays , with wee kly and mont hly backups pe rformed o n Fridays. Note that, in [...]
-
Seite 126
126 Copyright © Acr onis, Inc., 2000 - 20 09 Schedule Se t up a daily ( p. 85 ) , weekl y ( p . 87 ), o r monthly ( p. 89 ) schedule. Setting up schedule parameters allows creating simple schedu les (example of a simple daily schedule: a backup task will be run every 1 day at 10 AM) as well as more c omplex schedules (example of a co mplex daily s[...]
-
Seite 127
Copyright © Acr onis, Inc., 2000 - 20 09 127 Number of lev els Full backup every On different days, can go back Roll - back period 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 day s 8 to 23 days 8 days 6 32 days 16 to 47 day s 16 days Adding a lev el double s the full backup a nd roll - back p eriods. To[...]
-
Seite 128
128 Copyright © Acr onis, Inc., 2000 - 20 09 Param eters Paramet er M eani ng Full backup Speci fies on what s chedule and under whi ch conditi ons to p erfo rm a full backup. For ex ample, the full bac kup can be s et up to run e very Sunday at 1: 00 AM a s soon as all us ers are logged off. Incre mental Specifies o n what sc hedule and under whi[...]
-
Seite 129
Copyright © Acr onis, Inc., 2000 - 20 09 129 Full bac kup: Schedule: We ekly , every Friday , at 10: 00 PM Full bac kup: Condit ions: User is logged off Incr emental: Schedul e: Weekly, every workday , at 9:00 PM Also, let all backups olde r than one year be deleted from the archive, and let the cleanup b e perfo rmed upon cre ating a new backu p.[...]
-
Seite 130
130 Copyright © Acr onis, Inc., 2000 - 20 09 Resulti ng t asks Any cust om scheme al ways pro duces three backup tasks a nd — in case the retention rules are specified — a clea nup task. Each task is listed in the list of tasks eith er as Scheduled (if the s chedule has been set up) or as Manual (i f the sche dule has not been set up ). You ca[...]
-
Seite 131
Copyright © Acr onis, Inc., 2000 - 20 09 131 If th e manage d mach ine's operating system fail s to start o r you need to rec over data to bare met al , b oot the ma chine from th e boo table media ( p. 169 ) or using Acronis Startup Recovery Manager ( p. 41 ). Then , creat e a recovery tas k. Before recovering Linux Softw are RAI D devices, [...]
-
Seite 132
132 Copyright © Acr onis, Inc., 2000 - 20 09 You may ha ve to sp ecify c redentials for the d estin ation. S kip this s tep when op erating on a machine booted with boot able media. Access c redenti als ( p. 140 ) [Opt ional ] Pr ovi de cred entials for the destinati o n if the task c redentials do not enab le recover y of the selected data. To ac[...]
-
Seite 133
Copyright © Acr onis, Inc., 2000 - 20 09 133 • Passwo rd . The password for t he account. 2. Click OK . To learn more about u sing credentials in Acr o nis Backup & Recovery 10, see the Owners and credentials ( p. 23 ) section. To learn more about operations a vailable depe nding on the user privil eges, see the User privileges on a managed [...]
-
Seite 134
134 Copyright © Acr onis, Inc., 2000 - 20 09 While yo u are revi ewing the lo catio n content , archives ca n be added, deleted or modif ied by another us er o r by th e program itself accord ing to sc heduled opera tions. Us e the Re fresh button to refresh the list of archives. You can s witch b etwe en displaying arc hives by name s and display[...]
-
Seite 135
Copyright © Acr onis, Inc., 2000 - 20 09 135 6.3.4 .2. Files selection To select a backup and files to recover: 1. Sel ect one of the su ccessiv e incre mental b ackups b y its creation date /time. Th us, you c an rev ert the files /folders t o a specific m oment in time. 2. Specify the f iles an d fold ers to r ecover b y selectin g th e correspo[...]
-
Seite 136
136 Copyright © Acr onis, Inc., 2000 - 20 09 Recover t o: Physic al machine The selected dis ks will be reco vered t o the ph ysical di sks of the machin e the c onsole is connected to. On sele cting this, y ou pr oceed t o the regu la r disk mapping proc edure desc ribed belo w. Disk #: Disk # (MODEL) ( p. 137 ) Select th e destin ation d isk for[...]
-
Seite 137
Copyright © Acr onis, Inc., 2000 - 20 09 137 o Acr onis B ackup & Recovery 1 0 creates sche duled ta sks using the signa ture of the so urce hard disk. If you r ecover th e same dis k signatu re, you do n't need to re - create or e dit the tasks created pr ev iously. o Some installed applications use disk signature for lice nsing and oth [...]
-
Seite 138
138 Copyright © Acr onis, Inc., 2000 - 20 09 Volum e propert ies Resizing and relocating When recovering a volume to a basic MBR disk, you can resize and relocate the volume by dragging i t or its borders with a mouse or by entering corresponding values in the appropriate fields. Using this feature, you can r edistribute the disk spa ce between th[...]
-
Seite 139
Copyright © Acr onis, Inc., 2000 - 20 09 139 Logica l driv e lette r (fo r Wind ows on ly) Assign a letter t o the re covered volu me. Select the desired letter fr om a drop - down list. • With the default A UTO s election , the firs t unused lette r will be assign ed to th e volume. • If you selec t NO, no le tter will b e assign ed to the re[...]
-
Seite 140
140 Copyright © Acr onis, Inc., 2000 - 20 09 The questi o n mark ( ? ) sub stitutes f or exactl y one ch aracter in a file na m e; for example, th e file mas k Do c?.t xt y ields files such as D oc1.txt and Docs.txt — but not the files Doc.t xt or Doc 11.txt Exclusion exam ples Criterion Ex ample Desc r ipt ion By name File1. log Excludes all fi[...]
-
Seite 141
Copyright © Acr onis, Inc., 2000 - 20 09 141 The program will access the destination using the credentials you specify. Use t his option if the task a ccount d oes not ha ve access per missions t o the des tination. Specify: • User nam e . When enteri ng the na me of an Active Dir ectory user accoun t, be sur e to also specify the domain name ( [...]
-
Seite 142
142 Copyright © Acr onis, Inc., 2000 - 20 09 Soluti on : Recover th e volume onc e again a long wi th t he MBR of the corresp onding d isk. • The sy st em us es Acr oni s OS Sele ct or Because t he Master Boot Reco rd (MBR) can be changed during t he system recovery , Acronis OS Selec tor , which uses the M BR, might become inoperable . If this [...]
-
Seite 143
Copyright © Acr onis, Inc., 2000 - 20 09 143 GRU B 1. Boot the machine from th e Linux rescue CD or Linux installation CD. The install ed sys tem and th e syste m on th e CD must ha ve the same k ernel v ersi on. The Lin ux distribu tion does n ot have to be the same. Op t for bo ot withou t RAM disk (with out the installer ): linux noinitrd root=[...]
-
Seite 144
1 44 Copyright © Acr onis, Inc., 2000 - 20 09 X – disk number ( a for the first disk, b f o r the second disk, etc.) Y – number of the pa rtition on t his disk Change X a nd Y accord ing t o the new locati o n of the root. For exa mple: root=/ dev/hda1 c. Save the configuration file. 3. Execute the command for activating LILO: # lilo 4. Eject [...]
-
Seite 145
Copyright © Acr onis, Inc., 2000 - 20 09 145 [Optional] The validation task will run on behalf o f the user who is creating the task. Yo u can change th e task cred entia ls if necessa ry. To a ccess th is option, select the Advanc ed view check b ox. What t o val idat e Validate Choose an o bject to v alidate: Archi ve ( p. 146 ) - in tha t case,[...]
-
Seite 146
146 Copyright © Acr onis, Inc., 2000 - 20 09 T o learn more about operations available depending on the user privileges, see the User privileges on a managed machine ( p. 23 ) section. 6.4.2. Archive selecti on Selec ting th e ar chi ve 1. Enter th e full path to th e lo cation in the Path field, o r select the desired f older in the folders tree [...]
-
Seite 147
Copyright © Acr onis, Inc., 2000 - 20 09 147 3. Click OK . 6.4.3. Backup select ion To specify a backup to val idate 1. In the uppe r pane, select a backup by its cre ation date/tim e. The botto m part of the window di splays the se lected backup co ntent, ass isting yo u to find the right back up. 2. Click OK . 6.4.4. Location selection To select[...]
-
Seite 148
148 Copyright © Acr onis, Inc., 2000 - 20 09 The program will access th e location using the cred entials of the tas k account specified in the General s ection. o Use th e follo wing cred entials The program will access th e location using the crede ntials you specify. Use this option if the task acco unt does not ha ve access pe rmissions to the[...]
-
Seite 149
Copyright © Acr onis, Inc., 2000 - 20 09 149 Limita tio n: Mounting of volume backups s tored on Acronis B ackup & Recover y 10 Storage Node is not poss ible. To mount an image, perform the following steps. Source Archi ve ( p. 149 ) Specify the path to the a rchive locatio n and select the arc hive co ntaining disk backups. Backup ( p . 150 )[...]
-
Seite 150
150 Copyright © Acr onis, Inc., 2000 - 20 09 If the port number is not sp ec ified, port 21 is used for FTP and port 22 is used for SFTP. After en terin g acc ess credentials, the f olders on the ser ver become available. Click the appropriate folder on t he server. You can a ccess th e server as an anon ymous u ser if the ser ver enables such acc[...]
-
Seite 151
Copyright © Acr onis, Inc., 2000 - 20 09 151 • User nam e . When enteri ng the na me o f an Active Directory user account, be sure to also specify the domain name ( DOMAIN Username or Username@d omain) • Passwo rd . The password for t he account. 2. Click OK . As appears from the original FTP specif ication, credenti als required f or access[...]
-
Seite 152
152 Copyright © Acr onis, Inc., 2000 - 20 09 Unmounting im ages Maintaini ng the mounted volumes tak es consi derabl e syste m resour ces. It is re commended tha t you unmoun t the vo lumes after the neces sary ope rations are c ompl eted. If no t unmo unted ma nually, a volume will remain mount ed until the operating system re s tarts. To unmount[...]
-
Seite 153
Copyright © Acr onis, Inc., 2000 - 20 09 153 record instead of the MBR before activation. Otherwise, reconfigure these boot loaders manually after activation. To disable Acr onis Startup Reco very Manag er, selec t Do not activ ate . You can activate Acronis Startup Recovery Manager later from the Manage Ac ronis Secure Zone ( p. 15 5 ) pa ge . Af[...]
-
Seite 154
154 Copyright © Acr onis, Inc., 2000 - 20 09 To set up a password 1. Choos e Use pass word . 2. In the Ent er the passwor d field, type a new pass word. 3. In the C onfirm the passwor d field, re - type the pa ssword. 4. Click OK . To disable password 1. Choos e Do not use . 2. Click OK . 6.7.1 .4. Acronis S tart up Reco very Manag er Acronis Star[...]
-
Seite 155
Copyright © Acr onis, Inc., 2000 - 20 09 155 • Acronis Secure Zone is always created at the end of the hard disk. When ca lculating the final l ayout of the volumes, the program will first use unall ocated space at the end. • If there is n o or not enou gh una llocated space a t the end of the disk, b ut there is u nallocated space be tween vo[...]
-
Seite 156
156 Copyright © Acr onis, Inc., 2000 - 20 09 o dragging the slider a nd selecting any size between the cur rent and maximum value s. The maximum size is equal to the disk’s unallocat ed space plus the total free space of all selected partitions; o typing an exact value in the Acronis Secure Zone Size fi eld. When increasing the size of the z o n[...]
-
Seite 157
Copyright © Acr onis, Inc., 2000 - 20 09 157 6.8. Bootable med ia Bootabl e m edia Bootabl e media is phy sical media (CD, DVD , USB drive or other me dia supported by a mac hin e BI OS as a b oot devi ce) that b oots on an y PC - c ompatibl e machine and e nables you to run Acro nis Ba ckup & Recovery 1 0 Agen t either in a Linux - based en v[...]
-
Seite 158
158 Copyright © Acr onis, Inc., 2000 - 20 09 • PE - based bootable media hel ps ov ercome some Linux - related bootable media issues such as support for certain RAID contr ollers or certain levels of RAID arrays only. Media based on PE 2.x, that is, Windows Vista or Windows Server 2008 kernel, allows for dynamic loading of the necessary device d[...]
-
Seite 159
Copyright © Acr onis, Inc., 2000 - 20 09 159 7. [optional] Windows system drivers to be used by Acronis Universal Restore . This window appears only if the Acronis Universal Restore add - on is installed and a me dia other than PXE o r WDS/RIS is selected. 8. Path to the media ISO file or the name or IP an d credentials for PXE or WDS/RIS. 6.8.1 .[...]
-
Seite 160
160 Copyright © Acr onis, Inc., 2000 - 20 09 Sizeable data for recovery co uld be transf erred through t he seco nd NIC, inclu ded in the dedicated backup network by means of static TCP/IP settings. 6.8.1 .2. Network po rt While c reating boot able medi a, you have an o ption to pre - configure th e netw o rk port that th e bootable agent listens [...]
-
Seite 161
Copyright © Acr onis, Inc., 2000 - 20 09 161 5. The log lifetim e is limited to the curren t session. You c an save the enti re log or the filtered log entries to a file. 6. Centralized vaults are not d isplayed in the folder tree of the A rchive window. To access a managed vault, type the following string in the Path field: bsp:// node_address /v[...]
-
Seite 162
162 Copyright © Acr onis, Inc., 2000 - 20 09 egrep mknod swapoff fdisk mkswap swapon fsck more sysinfo fxload mount tar gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount gunzip pktsetup uuidgen halt poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.8.5. Recov ering MD d evices an d logica l vo[...]
-
Seite 163
Copyright © Acr onis, Inc., 2000 - 20 09 163 Note: Logical Volume Manager utilities such as pvcreate and vgcreate , which are nor mally avail able in Linux, are not incl uded in the bootable media envir onment, s o you need to use the lvm utility with a correspondent command: lvm pvcreate , lvm vgcreat e , etc. 6. If you previ ously mounte d the b[...]
-
Seite 164
164 Copyright © Acr onis, Inc., 2000 - 20 09 1. Boot t he machine from a Linux - bas ed boot able media. 2. In the manage ment cons ole, pr ess CTR L +ALT+F 2. 3. Run the f o llowing comman ds to create th e MD d evice s: mdadm -- create /dev/md 0 --level=1 --raid - devices=2 /d ev/sd[ab] mdadm -- create /dev/m d1 --level=1 --raid - dev ices=2 /de[...]
-
Seite 165
Copyright © Acr onis, Inc., 2000 - 20 09 165 Mounting backup v olumes You may want to mount a volume stored in a disk bac kup, for example, to view some files in it before starting the recovery. To mount a backup volume 1. Use the -- list command t o list th e volum es which are s tored in the ba ckup. For exa mple: trueimagecmd --list -- filename[...]
-
Seite 166
Copyright © Acr onis, Inc., 2000 - 20 09 166 Glo ssary A Acronis Active Resto re The Acronis p roprieta ry t echnolog y that bring s a syste m online immedia tely after the sys tem recover y is started. Th e sys tem boots fr om the backup ( p. 172 ) and th e mach ine becom es o peratio nal and ready to provide necessary services. The data required[...]
-
Seite 167
Copyright © Acr onis, Inc., 2000 - 20 09 167 Acronis Startup Recovery Manager is especially useful for m obile users. If a failure occurs, the use r reboots the machine, hits F 11 on prompt "Press F11 for Acronis Startup Recov ery Manager…" and performs data recovery in t he same way as with ordin ary bootable media. Limitations: canno[...]
-
Seite 168
168 Copyright © Acr onis, Inc., 2000 - 20 09 Backu p opera tion An opera tion th at creat es a copy of the d ata tha t exi sts on a m achine's ( p. 17 6 ) hard disk for the purpose of recovering or re verting the data t o a specified date and time. Backup o ptions Configuration parameters of a backup oper ation ( p. 1 68 ), such a s pre/post [...]
-
Seite 169
Copyright © Acr onis, Inc., 2000 - 20 09 169 By applying a policy to a gro up of machines, the administrator deploys multiple backup plans with a single action. The workflow when using policies is as f ollows. 1. The administrator creates a b ackup policy. 2. The administrator applies th e policy to a group of mac hines or a single machine ( p. 17[...]
-
Seite 170
170 Copyright © Acr onis, Inc., 2000 - 20 09 • deploy an o perating system on bare metal • create basic or dynamic vo lumes ( p. 174 ) on bare met al • back up sect or - by - secto r a disk that has an uns upported fi le sy st em • back up o ffline a ny data that ca nnot be backed up online because o f restri cted acce ss, being perman ent[...]
-
Seite 171
Copyright © Acr onis, Inc., 2000 - 20 09 171 Centrali zed va ult A networked loca tion all otted by th e management s erver ( p. 17 6 ) administrator to serve as storag e for the backup arc hives ( p. 1 67 ) . A centralize d vault can be m anaged by a st o rag e node ( p. 1 78 ) or be unmanaged. The total number and size of archives stored in a ce[...]
-
Seite 172
172 Copyright © Acr onis, Inc., 2000 - 20 09 D Dedupli cating va ult A managed vault ( p. 176 ) in which dedupli cation ( p. 172 ) is en abled. Deduplicat ion A method of storing dif ferent duplic ate s of the same i nfo rmation only once. Acroni s Backup & Recove ry 10 can apply t he deduplicat ion tech nology to bac kup archive s ( p. 167 ) [...]
-
Seite 173
Copyright © Acr onis, Inc., 2000 - 20 09 173 Disk group A number of dynam ic disks ( p. 173 ) that sto re the common configuration da t a in their LDM databases and therefore can be m anaged as a wh o le. Normally, all d ynamic disks created within the same machine ( p. 176 ) are mem bers of the same disk grou p. As soon as the firs t dyna mic dis[...]
-
Seite 174
174 Copyright © Acr onis, Inc., 2000 - 20 09 Dis k 1 MBR LDM database 1 MB Dis k 2 Protec - tive MBR GPT Micro so ft Reser ved Partition (MSR) LDM database GPT LDM Metadata partition 1 MB Dyna mic dis ks organi zed on MBR (Dis k 1) and G PT (Di sk 2) di sks. For more information abou t dynamic disks please refer t o the following Microsoft kno wle[...]
-
Seite 175
Copyright © Acr onis, Inc., 2000 - 20 09 175 Dynamic vol ume Any vo lume locat ed on dynam ic disks ( p. 173 ), or more precisely, on a disk group ( p. 172 ). Dyna mic volumes can span multiple disks. Dynamic volumes are usually c onfigured depend ing on the desired goal: • to inc rease the volum e size (a spanned volume) • to reduce the ac ce[...]
-
Seite 176
176 Copyright © Acr onis, Inc., 2000 - 20 09 I Image The same as Disk backup ( p. 172 ). Increme ntal bac kup A backup ( p. 16 7 ) that st ores chan ges to the da ta agai nst the latest backup. Y ou need access to oth er backups f rom the same archive ( p. 167 ) to restore data from an incr emental backu p. L Local bac kup pl an A backup pla n ( p[...]
-
Seite 177
Copyright © Acr onis, Inc., 2000 - 20 09 177 Manageme nt serve r (Acro nis Back up & Re cover y 10 Manag ement Se rver) A central ser ver that drives da ta prot ection with in th e enterpris e network. Acronis Backu p & Recover y 10 Man agement Server pr ovides the administrator with: • a single entry point to the Acronis Backup & Re[...]
-
Seite 178
178 Copyright © Acr onis, Inc., 2000 - 20 09 Regi stered machine A m achine ( p. 17 6 ) managed by a management s erver ( p. 176 ) . A machine can be regist ered o n o nly one manage ment serv er at a time. A mach ine beco mes regist ered as a resu lt of the registration ( p. 178 ) procedure . Registratio n A proce dure that adds a managed m achin[...]
-
Seite 179
Copyright © Acr onis, Inc., 2000 - 20 09 179 Since th e cleanup sc hedule exis ts on the mach ine ( p. 176 ) the agen t ( p. 167 ) res ides o n, and therefore uses the machine’ s time and events, the agen t has to in itiate the s torage n ode - side cleanup e very time the schedul ed time or even t comes. To do so, the agent must b e online. The[...]
-
Seite 180
180 Copyright © Acr onis, Inc., 2000 - 20 09 • when the m achine is booted w ith Acronis Startup Recovery Manager ( p. 166 ) (using F11) or • the imag e being re covered is l ocated in Acronis Secure Zo ne ( p. 16 6 ) or • when usin g Acronis Acti ve Restore ( p. 166 ), because these features are primarily m eant for instant data recovery on[...]
-
Seite 181
Copyright © Acr onis, Inc., 2000 - 20 09 181 W WinPE (W indows Pr einstall atio n Enviro nment) A minimal Windows system bas ed on any of the f ollowing kernels: • Wind ows XP Pr ofes si onal wi th Ser vice Pack 2 ( PE 1.5) • Windows Server 2003 wit h Service Pack 1 (PE 1.6) • Windows Vista (PE 2.0) • Window s Vista SP1 and Windo ws Server[...]
-
Seite 182
Inde x A Access credentials • 149, 150 Access credentials for archive location • 113, 120 Access credentials for destination • 132, 140 Access credentials for location • 131, 135 Access credentials for source • 113, 117, 145, 147 Acronis Active Restore • 39, 166 , 180 Acronis Backup & Recovery 10 components • 13 Acronis Backup &am[...]
-
Seite 183
Copyright © Acr onis, Inc., 2000 - 20 09 183 Bootable components and media builder • 14 Bootable media • 14, 17, 61, 96, 131, 154, 157, 166, 169, 172, 177 Bootable Media Builder • 158 Built - in group • 170 C Centralized backup plan • 40, 168, 169, 170 Centralized management • 170, 171, 172 Centralized task • 169, 170, 172 Centralize[...]
-
Seite 184
184 Copyright © Acr onis, Inc., 2000 - 20 09 Filtering and sorting archives • 78, 83 Filtering and sorting backup plans and tasks • 98, 105 Filtering and sorting log entries • 109, 111 Fits time interval • 93 Fonts • 45 Full backup • 167, 169, 171, 172 , 175 Full, incremental and differential backups • 17, 21, 121 G Getting started ?[...]
-
Seite 185
Copyright © Acr onis, Inc., 2000 - 20 09 185 Options • 43 Overwriting • 140 Owners and credentials • 23, 77, 133, 145 P Password for Acronis Secure Zone • 152 , 153 Personal vault • 166, 172, 177 Personal vaults • 41, 77 Physical machine • 170, 177 Plan • 177 Policy • 177 Pop - up messages • 43 Post - back up command • 52 Pos[...]
-
Seite 186
186 Copyright © Acr onis, Inc., 2000 - 20 09 Temporarily disabling a backup plan • 80, 106 Time since last backup • 94 Tim e- based alerts • 44 Tower of Hanoi • 169, 17 9 Tower of Hanoi backup s cheme • 29, 179 Tower of Hanoi scheme • 125 U Understanding Acronis Backup & Recovery 10 • 17 Understanding states and statuses • 98 U[...]