Acronis Backup Advanced Universal License manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 445 pages
- N/A
Aller à la page of
Les manuels d’utilisation similaires
-
Software Licenses & extens
Acronis Snap Deploy 5
146 pages -
Software Licenses & extens
Acronis True Image Home 2010
204 pages -
Software Licenses & extens
Acronis Backup Advanced Universal License
445 pages -
Software Licenses & extens
Acronis Backup Advanced for Windows Server
444 pages -
Software Licenses & extens
Acronis Backup to Cloud
2 pages
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Acronis Backup Advanced Universal License. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Acronis Backup Advanced Universal License ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Acronis Backup Advanced Universal License décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Acronis Backup Advanced Universal License devrait contenir:
- informations sur les caractéristiques techniques du dispositif Acronis Backup Advanced Universal License
- nom du fabricant et année de fabrication Acronis Backup Advanced Universal License
- instructions d'utilisation, de réglage et d’entretien de l'équipement Acronis Backup Advanced Universal License
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Acronis Backup Advanced Universal License ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Acronis Backup Advanced Universal License et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Acronis en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Acronis Backup Advanced Universal License, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Acronis Backup Advanced Universal License, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Acronis Backup Advanced Universal License. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
A c r o n i s B a c k u p A d v a n c e d Version 11.5 Update 6 USER GUIDE APPLIES TO TH E FOLLOW ING PRODUCTS Advanced for Windows Server Advanced for Linux Server Advanced for PC Advanced for VMware / Hyper-V / RHEV / Citrix XenServer / Oracle VM Advanced for Exchange Advanced for SQL Advanced for SharePoint Advanced for Active Directory For Wind[...]
-
Page 2
2 Copyright © Acronis International GmbH, 2002- 2015 Copyright Statemen t Copyright © Acr onis Intern ational GmbH, 2002-2015. All rights reser ved. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis International G mbH. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manag er”, “Ac[...]
-
Page 3
3 Copyright © Acronis International GmbH, 2002- 2015 Table of contents 1 Introducing Acroni s Backu p ............................................................................................ 11 1.1 What's new in Update 6 .......................................................................................................... 11 1.2 What&[...]
-
Page 4
4 Copyright © Acronis International GmbH, 2002- 2015 4 Backup .......................................................................................................................... 55 4.1 Back up now ............................................................................................................................. 55 4.2 Creating a b[...]
-
Page 5
5 Copyright © Acronis International GmbH, 2002- 2015 4. 7. 21 S ect or- by -se cto r bac kup ............................................................................................................................. 12 5 4. 7. 22 T ape ma nag eme nt ................................................................................................[...]
-
Page 6
6 Copyright © Acronis International GmbH, 2002- 2015 7.3 Removable device s ................................................................................................................ 194 7.4 Tape devices .......................................................................................................................... 195 7. 4. 1 Wha [...]
-
Page 7
7 Copyright © Acronis International GmbH, 2002- 2015 9.5 Acronis Startup Rec overy Manager ....................................................................................... 264 9.6 Acronis PXE Server ................................................................................................ ................. 265 9. 6. 1 Acr on is PXE Se[...]
-
Page 8
8 Copyright © Acronis International GmbH, 2002- 2015 11 .5 .3 R ecov er ing i ndiv id ual i tems ........................................................................................................................ 305 12 Protecting Micro s oft SQL S erv er with sin gle-pass backup ........................................ 307 12.1 General infor[...]
-
Page 9
9 Copyright © Acronis International GmbH, 2002- 2015 14 .6 .8 C lou d b ack up pr oxy ..................................................................................................................................... 342 15 Centralized mana gement ....................................................................................... 344 15.1 U[...]
-
Page 10
10 Copyright © Acronis International GmbH, 2002- 2015 17 Glossary ................................................................................................................. 434[...]
-
Page 11
11 Copyright © Acronis International GmbH, 2002- 2015 1 I nt rod uc i ng Ac ro ni s B ac ku p 1. 1 W hat 's ne w i n U pda te 6 Improvements added in buil d 43798 Support for Wind ows 10 – Home, Pro, Education, and Enterprise editions. Note At the tim e of this hotfix release, Windows 10 i s not yet gen erally available. The tests were [...]
-
Page 12
12 Copyright © Acronis International GmbH, 2002- 2015 Support for Citrix XenServe r 6 .5, Red Ha t Enterprise Vi rtualization 3.4, 3.5, and Or acle VM Server 3.3 (by installing an ag ent into a guest system). Linux Support for Linux k ernel version 3 .14, 3. 1 5, and 3. 1 6. Support for Red Hat Enterp rise L inux 7.x, Ubu ntu 14.04 and[...]
-
Page 13
13 Copyright © Acronis International GmbH, 2002- 2015 Cloud backup is no w availa ble for machines running Li nux. Cloud backup subs criptions for Servers and for Virtual Machines are deprecated. Users can renew these subscrip tions to volume subscripti o ns (p. 426). OS support Support for Wind ows MultiPoint Server 2012 and Windows S[...]
-
Page 14
14 Copyright © Acronis International GmbH, 2002- 2015 Use any backup de stination including Acronis Onlin e Backup Storage. Microsoft SQL Ser v er 2012 is supported, as well as the previ ous Microsoft SQL Server v ersions. Basic support for Windows 8 and Windows Server 2012 (p. 50 ) Install Agent for Wind ows, Agent for SQL (sing le-pa[...]
-
Page 15
15 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup supp orts Micros o ft Exchange S erver 2010 as well as Micros o ft Exchan ge Server 2003/2007. Express full ba c kup method This method is bas ed o n monitoring changes of the Exchange databa se files. Once the initial full backup is taken, all subs equent backups will only b[...]
-
Page 16
16 Copyright © Acronis International GmbH, 2002- 2015 Back up and recover v irtual machine s running in a RHEV envir onment. Migrate ph ysical machines to the RHEV en v ironment ( P 2V); and mig rate a virtual m achine fro m a different v irtualization platform to the RHEV platform (V2V). Installation Remote installation of Acronis Backup &[...]
-
Page 17
17 Copyright © Acronis International GmbH, 2002- 2015 Components for centr alized management These components, in cluded in Acronis Backup Advanced, provide centrali zed management capability. Usage of t hese comp o nents is n o t licensed. Console The console pr o vides Grap hical User Interface to other Acronis B ackup componen ts. Usage of the [...]
-
Page 18
18 Copyright © Acronis International GmbH, 2002- 2015 Disk backup Disk-level data pr ote ction is based on backing up either a disk o r a volu m e file syste m as a whole, along with all infor m ation n ece ssary for the o perating system to boot; or all the disk se ctors usin g the se ctor- by -sector appro ach (raw m o de.) A backup that contain[...]
-
Page 19
19 Copyright © Acronis International GmbH, 2002- 2015 The agent uses Micr osoft VSS to ensure the consist ency of the backed-up data. The agent is included in t he se tup program o f Acronis Backup Advanced. The agent is installed with Agent for Windows (p. 17 ) or on a machin e where Agent for Windows is already installed. 1 . 8 . 7 C o m p o n e[...]
-
Page 20
20 Copyright © Acronis International GmbH, 2002- 2015 Components f or Remote In stallatio n need to be install ed o n the machin e with the console or with the management s erver (p. 19 ). D uring installa tion, the setup progra m saves the components in the default location and saves this location path in the r egistry. As a result, the component[...]
-
Page 21
21 Copyright © Acronis International GmbH, 2002- 2015 1. 9 Ab o ut u sin g t he pr od uct i n t he tr ia l m od e Before buying an Acr onis Backup license, you may w ant to try the software. This can be d o ne without a license key. To install the product in the trial mode, run th e setup program locally or use the remote installation functionalit[...]
-
Page 22
22 Copyright © Acronis International GmbH, 2002- 2015 1. 11 Tec hn ica l Sup po rt Maintenance and Suppor t Program If you need assistanc e with your Acronis produc t, please go t o http://www.acronis.c om/en-us/support/ Product Updates You can download the latest updates for all your regis tered Acronis software prod ucts from our website at any [...]
-
Page 23
23 Copyright © Acronis International GmbH, 2002- 2015 2 G ett in g st art ed Step 1. Installation These brief installa tio n instructions enable you to start using the product quickly. For the complete descripti o n of installa tio n methods and procedures, please ref er to the Installation documentation. Before installation, make sure that: Y[...]
-
Page 24
24 Copyright © Acronis International GmbH, 2002- 2015 c. Follow the on-screen ins tructions. Step 2. Running Run Acronis Backup Management Console. In Windows Start the consol e by selecti ng Acronis Backup fr o m the Start menu . In Linux Log in as root o r log in as an ordin ary user and th en switch user as required. Start the c o nsole[...]
-
Page 25
25 Copyright © Acronis International GmbH, 2002- 2015 Tip. Using the bo o table me dia, yo u can d o off -line ("cold") bac kups in the same way as in the operating system. Create backup plan (p. 55 ) Create a backup plan if you need a long-term backup strategy including backup sc hem es, schedules and conditi ons, timely deleting of bac[...]
-
Page 26
26 Copyright © Acronis International GmbH, 2002- 2015 If you opt for st o ring all ba ckup archives in a single or a few network ed locations, create centralized vaults in th ese locations. After a vault is cr eated, you can view and ad minister its content by selectin g Vaults > Centralized > 'Vau lt name' in the Navigation p [...]
-
Page 27
27 Copyright © Acronis International GmbH, 2002- 2015 Menu b ar Appears across the top o f the program window. L ets you perform most of operations available in Acro nis Backup. The m enu items change dy namically depending on th e item selected in the Navigation tree and the main area. 2 . 1 . 1 " Na v i g at i o n" p a n e The navigati[...]
-
Page 28
28 Copyright © Acronis International GmbH, 2002- 2015 Dashboard . Use this v iew to esti mate at a glance whether th e data is successfully protected on th e machines registered on the m anagement se rver. Machines with a gents . Use this view to manage machines register ed on the management ser v er. Backup plans and tasks . Use this [...]
-
Page 29
29 Copyright © Acronis International GmbH, 2002- 2015 2 . 1 . 2 M ai n a r ea , v i e w s an d a c t i o n pa g e s The main area is a basi c place where you w o rk with the c o nsole. Here you create, edit and manage backup plans, reco v ery tasks and perf orm other operations. The m ain area displ ays different views and action pages ac co rding[...]
-
Page 30
30 Copyright © Acronis International GmbH, 2002- 2015 To D o t he fol lo wing Sort items by any column Click a column's header to sor t items in ascending ord er. Click it once again to sort ite ms in descending o rder. Filter items by p redefined column value In a field below the corr esponding column's head er, select the requ ired val[...]
-
Page 31
31 Copyright © Acronis International GmbH, 2002- 2015 Using controls and specifyi ng settings Use active controls to specify a backup plan o r recover y t ask setting s and parameters. By default, such fields as credential s, options, comments, and some others are hidden. Most settings are configured by clicking the respecti ve Show … links. Oth[...]
-
Page 32
32 Copyright © Acronis International GmbH, 2002- 2015 If the option is enabled, the credentials for v arious locations that you enter during a console session are saved for use du ring later sessions. In Windo ws, the creden tials are stored in the Windo ws Credential Manager. In Linux, the credentials are st o red in a spe cial encrypted file. If[...]
-
Page 33
33 Copyright © Acronis International GmbH, 2002- 2015 Notify when the mana gement console is con nected to a componen t of a different version This option defin es whether to display a pop-up window when a c onsole is connected to an agent/management server and their versions differ. The preset is: Enabled . To make a selection, select or clear th[...]
-
Page 34
34 Copyright © Acronis International GmbH, 2002- 2015 3 Un de rs ta ndi ng A cr oni s Ba cku p This section attempts to give its readers a clear understanding of the pr o duct so that the y c an use the product in v arious circu mstances without step- by -step instructions. 3. 1 O wne rs This section explains th e concept of a backup pla n (task) [...]
-
Page 35
35 Copyright © Acronis International GmbH, 2002- 2015 enter the credentials ne xt time. The credentials ar e cached independently for each user wh o uses the console on the m achine. Backup plan's creden tials Any backup plan runn ing on a machi ne runs on behalf of a user. In Windows By default, the plan runs under the agent ser v ice acco u[...]
-
Page 36
36 Copyright © Acronis International GmbH, 2002- 2015 In Linux You do not need t o specify task cr edentials. In Linux, tasks always run un der the root user acc ount. 3. 3 U ser p riv il ege s o n a m an age d m ac hi ne Windows When managing a machine running Windows, the scope of a user's manage ment rights depends on the user's privi[...]
-
Page 37
37 Copyright © Acronis International GmbH, 2002- 2015 of user rights, me m bership in securi ty groups, and the Full Control per m issions o n respective registry keys in the foll owing key: HKEY_ LOCAL_MACHINESOFTWAREAcr o nis. There are no permissions granted on other regi stry keys. The following table lis ts the services of Acronis Backu p c[...]
-
Page 38
38 Copyright © Acronis International GmbH, 2002- 2015 S ervi ce na me P urp ose A cco unt us ed by t he ser vi ce P riv il eg es add ed to th e a cc ount U ser ri ght s Gr ou p me mb er shi p P ermi ssi ons on r egis try ke ys SQL Server (ACRONIS) (Auxiliary service; created only if a new SQL server is installed) Running a Microsoft SQL Server tha[...]
-
Page 39
39 Copyright © Acronis International GmbH, 2002- 2015 Acronis Scheduler2 Service Providing scheduling for ta sks performed b y Acronis components Local System Dependencies on othe r services The main services depend on Acr o nis Scheduler 2 Service and on the following stan dard Windows services: Remote P rocedure Call (R PC) and Protected Storage[...]
-
Page 40
40 Copyright © Acronis International GmbH, 2002- 2015 Incremental backu p An incremental backup stores changes to the data against the latest backup . You need access to other backups fro m the same ar chive to recover data from an incremental backup. An incremental backup is most useful when: you need the po ssibility to ro ll back to any o n[...]
-
Page 41
41 Copyright © Acronis International GmbH, 2002- 2015 A volume backup s to res all fil es and folders o f the sele cted volume independent of their attributes (includ ing hidden and sy stem files), the b oot record, the file all o cation table (FAT ) if it exists, the root and the zero track of the hard disk with the master boot rec ord (MBR). A d[...]
-
Page 42
42 Copyright © Acronis International GmbH, 2002- 2015 acrocmd backup disk -- volume=DYN --loc= srv1 backups -- c re dentials=netuser1 ,pass1 -- arc=alldyn_arc This will back up all dyna mic volumes of the l o cal mach ine to a network shar ed folder. Recovering dynamic volumes A dynamic volume can be recovered: Over any type of e xisting [...]
-
Page 43
43 Copyright © Acronis International GmbH, 2002- 2015 Ba ck up (so urc e): Re cov er ed to: Dy na mic v olu me Ba si c v ol ume Dy na mic v olu me Dynamic volume Type as of the target Dynamic volume Type as of the target U nall oca ted sp ace ( dis k gr oup ) Dynamic volume Type as of the source Dynamic volume Simple Ba si c v ol ume or un all oca[...]
-
Page 44
44 Copyright © Acronis International GmbH, 2002- 2015 Basic volumes included in logical volumes are shown in the list with N one in the File s y stem colu m n. If you select such volumes, the program will back them up sector- by -sector. Normally this is n ot required. Recovery When recovering logic al volumes, you have two opti ons: Recoverin[...]
-
Page 45
45 Copyright © Acronis International GmbH, 2002- 2015 3. 7. 2.3 Ba ck ing u p h ar dw are RA ID a rr ay s (Li nux ) Hardware RAID arra ys under Linux combine sev eral physical drives to creat e a single partitionab le disk. The special file related to a hardware RAID array is usually located in /dev/a taraid. Yo u can bac k up hardware RAI D array[...]
-
Page 46
46 Copyright © Acronis International GmbH, 2002- 2015 The machine has fewer physical disks than the original v olume structure used. Th e software will fail to recreate the volume structure even if th e capacity of the physical disks is en o ugh to fit all the data being rec o vered. The backup does not contain the volume structu r e infor[...]
-
Page 47
47 Copyright © Acronis International GmbH, 2002- 2015 6. If you previously m o unted the backup by using the acrocm d utility, use this u tility again to unmount the bac kup (see "Mounting bac kup volumes" later in t his topic). 7. Return to the m anagement c onsole by pres sing ALT+F1. (Do not reboot th e machine at this point. Other wi[...]
-
Page 48
48 Copyright © Acronis International GmbH, 2002- 2015 lvm pvcreate /dev/md0 /dev/md1 lvm vgcreate my_volgr oup /dev/md0 /dev/md1 lvm vgdisplay The output of th e l vm vgdisplay command will contain lines similar to the f o llowing: --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID[...]
-
Page 49
49 Copyright © Acronis International GmbH, 2002- 2015 type: disk Num Partition Flags Size Type GUID ---------- -------------------- -------- -- ---------- ------------- ------ -- Dyn1 my _volgroup-my_lo. .. 4 GB Ext 3 Dyn2 md0 2.007 GB Ext 2 Disk 1 sda 16 GB DT_FIXED 1-1 sda1 Act,Pri 203.9 MB Ext 2 1-2 sda2 Pri 11.72 GB Reiser 1-3 sda3 Pri 1.004 G[...]
-
Page 50
50 Copyright © Acronis International GmbH, 2002- 2015 4K native (4Kn ) disks have a 4 -KB logical sect o r size. M odern operating systems can store dat a on these disks, but they generally cannot boot fr om these disks. These disks are commonly external drives with USB conne ction. By running the appropriate comma n d To find out the l ogical[...]
-
Page 51
51 Copyright © Acronis International GmbH, 2002- 2015 Th e informa tio n in this sect ion also applies to Window s 8 .1 and Wind ows Server 2012 R2. Limitations Acronis Disk Direc tor Lite (p. 267) is not av ailable un der Windows 8 and Windows Serv er 2012. Disk managemen t operati ons under bootable media may w o rk incorrectly if storag[...]
-
Page 52
52 Copyright © Acronis International GmbH, 2002- 2015 Data Deduplication In Windows Ser ver 2012, you can enable the Data Dedupli catio n feature f or an NTFS volume. D ata Deduplication reduce s t he used space on the vo lume by storing duplicate fragmen ts of the volum e's files only once. You can back up and recover a data deduplicati on ?[...]
-
Page 53
53 Copyright © Acronis International GmbH, 2002- 2015 2. Recover the sys tem. The recovered data will b e unencrypted. 3. Re boot the recover ed system. 4. Turn on BitLocker. If you only need to re cover one parti tion of a multi-partitioned disk, d o so under t he operating system. Recovery under bootable media may mak e the recovered par tition [...]
-
Page 54
54 Copyright © Acronis International GmbH, 2002- 2015 About the test message When configurin g SNMP notifications, you can send a test message to check if your settings are correct. The parameters o f the test m essage are as f ollows: Type of event OID: 1.3.6.1.4.1. 2 4769.100. 200.1.0 Value: "Unknown" Text description o f the e[...]
-
Page 55
55 Copyright © Acronis International GmbH, 2002- 2015 4 B ack up 4. 1 B ac k up now Use the Back up no w feature t o configure and run a one-time backup in a few si mple steps. The backup process will star t immediately after yo u perf o rm the required steps and click OK . For a long-time bac kup strategy that includes schedu les and conditions, [...]
-
Page 56
56 Copyright © Acronis International GmbH, 2002- 2015 Select the mod e the removable device w i ll be used i n (p. 194) If the specified l o cation is an RDX dri v e or USB flash drive, select the device mode: Removable med ia or Fixed drive . Backup file namin g, access c redentia l s, archive com ments To access these s et tings, click Sho w bac[...]
-
Page 57
57 Copyright © Acronis International GmbH, 2002- 2015 Set up a regular c onv ersion o f a disk or volu me backup to a virtual machine. Plan parameters Plan name [Optional] Enter a uniq ue name for the backup plan . A conscious name lets you identify the plan among others. Backup options [Optional] Configu re parameters of t he backup operation, su[...]
-
Page 58
58 Copyright © Acronis International GmbH, 2002- 2015 Microsoft SQL databas es by means of sing le -pass disk an d application backup, if Acronis Backup Agent for S QL is ins talled. Agent for SQL enables you to create applicati o n-aware disk backup s and to recover Microsoft SQL databas es from such backups. For more information, see the &qu[...]
-
Page 59
59 Copyright © Acronis International GmbH, 2002- 2015 For more inf o rmation abou t backing up Microsoft Exc hange data see "Backing u p Microsoft Exchange Server data" . 2. In the tree below Data to ba c k up section, selec t the items to back up. To back up all ite m s of the selec ted data type present on a machine, select the ch eck [...]
-
Page 60
60 Copyright © Acronis International GmbH, 2002- 2015 4 . 2 . 3 S o u r c e fil e s e x c l u s i o n This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is effe ctive for disk-level backup of NTFS, FAT, Ext3, and Ext4 file sys tems only. This option is effective for file-level ba ckup of all suppo[...]
-
Page 61
61 Copyright © Acronis International GmbH, 2002- 2015 Wildcard characters You can use one or more wildcard characters * and ? in the criterion. These chara cters can be used both within the full pa th and in the file or folder name. The asterisk (*) sub stitutes for zero or more chara cters in a file name. F o r exampl e, the criterion Doc*.txt co[...]
-
Page 62
62 Copyright © Acronis International GmbH, 2002- 2015 added, deleted or m o dified by an other user or by the program itself acc ording to scheduled operations. Use th e Refresh b utton to refresh the lis t of archives. 3. Naming the new arc hive Once you select the archive destination, the program generates a name for the new archive and displays[...]
-
Page 63
63 Copyright © Acronis International GmbH, 2002- 2015 D esti nat ion D etai ls Cloud storage To back up dat a to Acronis Cloud Storage, click Log in and specify the cr edentials to log in to the cloud storage. Then, ex pand th e Cloud storage group an d select the account. Prior to backing u p to the cloud storage, you need to buy a subscription ([...]
-
Page 64
64 Copyright © Acronis International GmbH, 2002- 2015 D esti nat ion D etai ls FTP, SFTP To back up dat a to FTP or SFTP, type the server nam e or address in th e Path field as follows: ftp://ftp_server:p ort _number or sftp://sftp_server :port number To establish an active mod e FTP connection , use the followi ng notation: aftp://ftp_server:p or[...]
-
Page 65
65 Copyright © Acronis International GmbH, 2002- 2015 Warning: According to the original FTP specifica tion, credentials required for acc ess to FTP servers are transferred through a n etwork as plaintext. This means that th e u ser name and password c an be intercepte d by an eavesdropper using a packet sniffer. 4 . 2 . 6 B a c k u p s c h e m e [...]
-
Page 66
66 Copyright © Acronis International GmbH, 2002- 2015 Full - selected by default for all backup locations ( ex cep t for Acronis Cloud Storage). Incremental . At the firs t time a full backup will be created. The next backups will be incremental. Selected a s the one and only backup ty pe for Acronis Cloud Storage. Note : When the Incremen[...]
-
Page 67
67 Copyright © Acronis International GmbH, 2002- 2015 Keep backups Specifies how long you want the b ackups to be stored in th e archive. A term can b e set in hours, days, weeks, mo nths, or years. For month ly backups, y ou can also select Keep indefinitely if yo u want them to be sa ved forever. The default values for each b ackup type are as f[...]
-
Page 68
68 Copyright © Acronis International GmbH, 2002- 2015 available through nex t Sunday, January 8; the firs t weekly backup, the on e of Saturday, January 7, will be stored on the syste m until February 7 . Monthly backup s will never be deleted. Limited storage If you do not want to arrange a vast amount of space to store a huge archi v e, you may [...]
-
Page 69
69 Copyright © Acronis International GmbH, 2002- 2015 Monthly: 5 years Here, daily incre m ental bac kups will be created on Tuesdays and Thursdays, with weekly and monthly backups perf ormed on Fridays. Note tha t, in order to choose Friday in the We ekly/monthly field, you need to first select it in the Back up on field. Such an archive w o [...]
-
Page 70
70 Copyright © Acronis International GmbH, 2002- 2015 P ara met er Me ani ng Clean up arch ive Specifies how to get rid o f old b ackups: either to app ly reten tion rules (p. 100 ) regularly or clean up t he archive during a backu p when the destination lo cation runs out of space. By default, the retention ru les are not specified, which m eans [...]
-
Page 71
71 Copyright © Acronis International GmbH, 2002- 2015 Here, all parame ters excep t Schedule in Full ba ckup are left empty. All backup s in the archive are kept indefinitely (n o archiv e cleanup is perfor med). Full and incremental backup plus cleanup With the following s cheme, the archive will c o nsist of weekl y full backups and daily incre [...]
-
Page 72
72 Copyright © Acronis International GmbH, 2002- 2015 By default, a bac kup is not deleted a s long as it has depend ent backups that must be kept. For example, if a full ba ckup has become subject to d eletion, but there are incre mental or differential backups that depend on it, the deletion is postponed until all the dependent back ups can be d[...]
-
Page 73
73 Copyright © Acronis International GmbH, 2002- 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 Backups of different le vels have different types: Last-level (in this case, level 4) bac kups are full; Backups of intermediat e levels (2, 3) are differential ; First-level (1) backups are incremental. A cleanup mechanis[...]
-
Page 74
74 Copyright © Acronis International GmbH, 2002- 2015 On day 14, the int erv al is fi v e days. It incr eases on subsequent days bef ore decreasing again, and so on. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1 3 1 The roll-back peri o d shows how many days we are guaran te ed to have e ven in the w o rst case. For a four-level scheme,[...]
-
Page 75
75 Copyright © Acronis International GmbH, 2002- 2015 protection strategy and you prefer to be imm ediately informed whether the backed-up data is not corrupted and c an be s uccessfully recovered, think of starting the validation rig ht after backup creation. 2. What to validate – sel ect either to validate the en tire archive or the latest bac[...]
-
Page 76
76 Copyright © Acronis International GmbH, 2002- 2015 To a dd a te xt la bel to a ba ck up: 1. On the Create backup plan (p. 55 ) page, click Sh ow plan's credentials, c omments, l abel . 2. In Label , enter the text label or select it fro m the drop-down m enu. Parameters specificati on P ara met er Va lu e D esc rip tio n acronisTag.label &[...]
-
Page 77
77 Copyright © Acronis International GmbH, 2002- 2015 acronisTag.hostna m e = “su perserver.corp.local” acronisTag.os.type = “windows7Server64Gue st” acronisTag.os.servicepa ck = “1” acronisTag.os.sid = “ S -1-5- 21 - 874133492-782267321- 39289498 34” 4 . 2 . 1 0 S e q u e n c e o f o p e r at i o n s i n a b a c k u p p l a n If a[...]
-
Page 78
78 Copyright © Acronis International GmbH, 2002- 2015 When you back up t o a locally atta ched RDX drive or US B flash drive, the Name backup files using the archive na me... check box does not appear. Instead, the removable device m ode (p. 194) determines whet her th e standard or si mplified naming scheme will be used. In Linux, the check box a[...]
-
Page 79
79 Copyright © Acronis International GmbH, 2002- 2015 4 . 3 . 1 T h e [ D A T E ] v ar i a b l e If you specify the [DATE] variable in the ar chive name, the file nam e of each backup will include tha t backup’s creation da te. When using this variable, th e first backup of a new da y will be a full bac kup. Before creating the n ext full backup[...]
-
Page 80
80 Copyright © Acronis International GmbH, 2002- 2015 You want to perfor m a dail y full backup of your machine. You want to st o re the backup on a l ocally attached USB hard drive in the file MyMachine . tib . You want each ne w backup to replace the old one. In this scenario, cr eate a backup plan with a daily sche dule. When creati[...]
-
Page 81
81 Copyright © Acronis International GmbH, 2002- 2015 4. 3. 3.4 Ex am pl e 4. Da il y f ul l b ac ku ps w ith d ai ly dr iv e s wa ps Consider the follo wing scenario: You want to perfor m a dail y full backup of your machine. You want to st o re the backup on a l ocally attached USB hard drive in the file MyMachine . tib . You have tw[...]
-
Page 82
82 Copyright © Acronis International GmbH, 2002- 2015 Result: Before creating a Mo nday backup (by the first backup pla n), all backups will be d eleted from the currently attached drive. While one drive is a ttached to the machine, you can keep the other drive off-site for ex tra data protection. In Windows, if you choose to back up to lo[...]
-
Page 83
83 Copyright © Acronis International GmbH, 2002- 2015 The scheduler uses lo cal time o f the machine the backup plan exist s o n. Bef ore creating a sch edule, be sure the machin e’s date and time settings ar e correct. Schedule To define when a t ask has t o be executed, you need to specify an event or multiple events. The task will be launched[...]
-
Page 84
84 Copyright © Acronis International GmbH, 2002- 2015 What if an event oc c urs w hile the scheduler is waitin g for the condition require d by the previous event? The event will be ignored. What if the condit i on is no t met for a ve ry long time? If delaying a backup is getting risky, you can f orce the condition (tell the users to log [...]
-
Page 85
85 Copyright © Acronis International GmbH, 2002- 2015 "Three-hour time i nterval l asting for three months" s chedule Run the task ever y three hours. The task starts on a c ertain date (say, Sept ember 15, 2009), and end s after three months. The schedule's param eters are thus set up as f o llows. 1. Every: 1 day(s). 2. Every: 3 h[...]
-
Page 86
86 Copyright © Acronis International GmbH, 2002- 2015 3. Effective: From: 09/20/20 09 . To: not set . 4 . 4 . 2 W ee k l y s c h e d u l e Weekly schedule is effective in Windows and Linux operating systems. To s pec if y a w eek ly s che dul e In the Schedule are a, se lect the app ropriate paramete r as follows: Every: <...> week(s) on: &l[...]
-
Page 87
87 Copyright © Acronis International GmbH, 2002- 2015 on workdays. F o r more det ails, see the Full and incre mental backups plus clean up example in the Custom backup sche me (p. 69 ) section. "Workdays" s chedule Run the task ever y week on wo rkdays : from Monday through Friday. During a workday, the task starts only once at 9 PM. Th[...]
-
Page 88
88 Copyright © Acronis International GmbH, 2002- 2015 2. Every 3 hours From 09:00:00 AM until 09:00:00 PM . 3. Effective: From: not set . To: not set . Third schedule 1. Every: 1 wee k(s ) on: Sat, S un . 2. Once at: 09:00:0 0 PM . 3. Effective: From: not set . To: not set . 4 . 4 . 3 M o n th l y s c h e d u l e Monthly schedu le is effective in [...]
-
Page 89
89 Copyright © Acronis International GmbH, 2002- 2015 1. Months: <All mo nths> . 2. Days: Last . The task w ill run on the last day of every month despite its actual da te. 3. Once at: 10:00:0 0 PM . 4. Effective: From: empty . To: empty . This schedule is widel y used when creating a custom backup scheme. The "Last day o f every month&[...]
-
Page 90
90 Copyright © Acronis International GmbH, 2002- 2015 Second schedu le 1. Months: March , April , May , September , Octo ber , November . 2. On: <All> <All wo r kdays> . 3. Every: 12 ho urs From: 12:00:00 AM Until: 12:00:0 0 PM . 4. Effective: From: 11/01/20 09 . To: not set . Third schedule 1. Months: June , July , August . 2. Days: 1[...]
-
Page 91
91 Copyright © Acronis International GmbH, 2002- 2015 One or more bad blo cks that have suddenly appeared on a hard disk usually indic ate that the hard disk drive will so o n fail. Su ppose that you want to create a ba ckup plan that will back up hard disk data as soon as such a situation o ccurs. When Windows d et ects a b ad block on a hard dis[...]
-
Page 92
92 Copyright © Acronis International GmbH, 2002- 2015 3. In the Event Pro perties dialog box, view the event's pr operties such as the event source, shown in the Source field ; and the ev ent number, shown in the Event ID field. When you are finish ed, click OK to close the Event Pro perties dialog b o x. 4 . 4 . 5 A d v a n c e d s c h e du [...]
-
Page 93
93 Copyright © Acronis International GmbH, 2002- 2015 Second machine : Every day at 09: 00:00 AM Third machine: Ever y day at 09:59:59 AM Example 2 Suppose that you ar e deploying a centraliz ed backup plan with the following schedule to three machines: Run the task: Daily Every: 2 Hour(s) Fro m: 09:00:0 0 AM Until: 11:00:00 AM Distribute start ti[...]
-
Page 94
94 Copyright © Acronis International GmbH, 2002- 2015 task anyway. With t his settin g, the program will auto m atically handle the situa tion when the conditions are not met for too long and further d elay ing the backup is undesirab le. backup task start ti me matters - skip the backup task i f the conditions are not me t at the time when th[...]
-
Page 95
95 Copyright © Acronis International GmbH, 2002- 2015 (2) If 9:00 PM co mes but the hos t is unavailable at the moment, the backup task will start on the next workday if the l o cation's h o st is available. (3) If the location's h ost will never be available on workdays at 9:00 PM, the task never starts. 4. 4. 6.3 Fi ts t he t ime i nt [...]
-
Page 96
96 Copyright © Acronis International GmbH, 2002- 2015 Enables to put a backup task run on hold until all us ers log off from Wind o ws on t he m anaged machine. Example Run the backup task at 8 PM on the first and thi rd Friday of every month, prefer ably when all users are logged off. If on e of the users is still logged on at 11 PM, run the task[...]
-
Page 97
97 Copyright © Acronis International GmbH, 2002- 2015 Similarly, you can c opy or move backups fr om a second location to a third location and so on. Up to five consecutive l ocations are supported (including t he primary one). Note: The replication feature replaces an d enhances the Dual destination option, which was availab le in Acronis Backup [...]
-
Page 98
98 Copyright © Acronis International GmbH, 2002- 2015 Notes: Setting up both c o pying an d mov ing backup s from the same location is n ot possi ble. With simplified naming of backup files (p. 77 ), nei ther replication nor use of rete ntion rules is available. 4 . 5 . 1 S u p p o r t e d l o c a t i o ns You can copy or move a backup fro[...]
-
Page 99
99 Copyright © Acronis International GmbH, 2002- 2015 As follows from the above d escription, the opera tion will be performed only if the machine with the agent is powered on. If the operation is scheduled, the schedule will use that m achine's da te and time. Copying and moving b ackups between managed vaults Copying or moving a backu p fro[...]
-
Page 100
100 Copyright © Acronis International GmbH, 2002- 2015 Grandfather-Fath er-Son (GFS) scheme Backups of each t y pe (daily , weekly, and monthly) are retained for the periods you specify in Keep backups , and then del eted. The retention rules ar e applied after creating a backup. They are applied sequenti ally in the primary, the second and all ne[...]
-
Page 101
101 Copyright © Acronis International GmbH, 2002- 2015 With these settings, a backup will be stored until it is older than five days and the size o f the archive containin g it exceeds 1 00 GB. b. Number of backups i n the a r chive exceeds . .. If the number of bac kups exceeds the specified v alue, one or more of the oldest backup s will be move[...]
-
Page 102
102 Copyright © Acronis International GmbH, 2002- 2015 This mode is not a vailable if you selected the Archi v e size grea ter than rule for a ny archive location except for Acronis Cloud Storage. What you nee d to know about consolidation Please be aware that consoli dation is just a me tho d of deletion but not an alternative to delet ion. The r[...]
-
Page 103
103 Copyright © Acronis International GmbH, 2002- 2015 4. 5. 5.3 Ex am pl e 3. Re pl ica tin g ba cku ps t o t h e c lou d st or ag e This example assu mes that you have activated (p. 427) a cloud backup sub scr iption (p. 412) for the machine that you a re backing up. The following scenari o assumes that the amount of data you want to back up is [...]
-
Page 104
104 Copyright © Acronis International GmbH, 2002- 2015 4. 5. 5.4 Ex am pl e 4. Mo vi ng ol der b ac ku ps t o tap es Consider the follo wing scenario: You want to perfor m a dail y backup of your machine. You want to st o re the backups locally fo r one w ee k. You want to move th e backups that are older than one week to a tape device[...]
-
Page 105
105 Copyright © Acronis International GmbH, 2002- 2015 The storage node copies the backups to the tape de vice. No CPU resource fro m the machin es is taken. The lifetime of backup s on the hard disk does no t exceed one mo nth. On the tape library, the monthly backups are kept indefinitely. 4. 6 H ow to di sa ble ba ck up cat al ogi ng Ca[...]
-
Page 106
106 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Additional settings (p. 107): Ask for the first media whil e backing up to removable media Dest: removable me[...]
-
Page 107
107 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p Di sk ba cku p Fi le ba cku p File -level backup snapshot (p. 117 ) - + - + - - File -level security (p. 118 ): Preserve files’ security [...]
-
Page 108
108 Copyright © Acronis International GmbH, 2002- 2015 The preset is: Disab l ed . When the option is enabled, backing up to rem o vable media ma y be not possible if the us er is away, because the pr o gram will wait f or someone to press OK in the prompt box. Hence, you should disa ble the prompt when scheduling a backup to rem o vable media. Th[...]
-
Page 109
109 Copyright © Acronis International GmbH, 2002- 2015 4 . 7 . 2 A r c h i v e p r o t e c t i o n This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is effe ctive for both disk-level and file-le vel backup. This option defin es whether the arch ive will be protected with a password and whether th[...]
-
Page 110
110 Copyright © Acronis International GmbH, 2002- 2015 For a disk-level backup - disks, volumes, files, and f olders. For a file-level backup - files and folders. For an Exchange dat abase-level backup - databases o r storage groups and mailboxes (always); folders and e-mails (dep ends on the Microsoft Ex c hange metada ta c ollection [...]
-
Page 111
111 Copyright © Acronis International GmbH, 2002- 2015 High – to maximiz e the backup process speed by taking resources from other processes. 4. 7. 4.2 HD D w ri ti ng sp ee d This option is effe ctive for Windows and Linux o perati ng systems and bo o table media. This option is available when an internal (fixed) hard disk of the machine be[...]
-
Page 112
112 Copyright © Acronis International GmbH, 2002- 2015 The following set tings are available. Automatic With this setting, A cro nis B ackup will act as follows. When backing up to a hard disk or a network s hare: A single backup file w ill be create d if the d estination disk's file system allows the estimated file size. The backup will [...]
-
Page 113
113 Copyright © Acronis International GmbH, 2002- 2015 compressed files, such as .jpg , .pdf or .mp3. However, formats su ch as .doc or .xls will be compress ed well. To s pec if y the c omp res si on le ve l Select one of the f o llowing: None – the data will b e copied as is, without any compression. The resulting bac kup size will be maxi[...]
-
Page 114
114 Copyright © Acronis International GmbH, 2002- 2015 3. [Optional] Change the default value of the Subje c t field, if necessary. If you back up multip le machines with one centrali zed ba ckup plan and wan t each machine user to receive a separa te DRP e-mail about his/her machin e only: a. Use the %MachineN ame% variable to show the nam e of t[...]
-
Page 115
115 Copyright © Acronis International GmbH, 2002- 2015 6. In the SMTP server field , enter the name of the outgo ing mail server (SMTP). 7. In the Port field, set the port of the outgoing m ail serv er. By default, the port is s et to 25 . 8. If the outgoing mail s erver requires authenticati on, enter User name and Passwo rd o f the sender's[...]
-
Page 116
116 Copyright © Acronis International GmbH, 2002- 2015 If Acronis Cloud Storage is selected a s the primary, the second, or a fu rther backup location, the option value is automatica lly set to Enabled. Number of at tempts: 300 , regardless of th e default va lue. Ignore bad sectors The preset is: Disab l ed . When the option is disabled, the prog[...]
-
Page 117
117 Copyright © Acronis International GmbH, 2002- 2015 4. 7. 10. 2 W in dow s ev en t l og This option is effe ctive only in Windows operating s ystems. This option is not available when operating und er the bootabl e media. This option defin es whether the agen t(s) operating on the manag ed machine have to log e vents of the backup opera tions i[...]
-
Page 118
118 Copyright © Acronis International GmbH, 2002- 2015 The snapshot enabl es backing up of all files includin g files o pened f o r exclusive ac cess. The files will be backed up at t he sa m e point in time. Choose t his sett ing only if these factors are critic al, that is, backing up files without a snapshot does n ot make sense. To use a snaps[...]
-
Page 119
119 Copyright © Acronis International GmbH, 2002- 2015 4 . 7 . 1 4 L V M s n a p s h o t t i n g This option is effe ctive only for Linux operating s ystems. This option is effecti v e for both dis k -level and file-level backup of volumes managed by Linu x Logical Volu me Manager (LVM). Such v olumes are also called logical volumes. This option d[...]
-
Page 120
120 Copyright © Acronis International GmbH, 2002- 2015 To c ha ng e the d efa ul t s ize o f a s na psh ot lo gic al vo lum e: 1. Decide how much un allo ca te d space you want to use. If you are backin g up two or more logical volumes, base y o ur choice on the size of the biggest of the m . Tip: To view the a mount of unallocated sp ace on a vol[...]
-
Page 121
121 Copyright © Acronis International GmbH, 2002- 2015 If such folder (a par ent folder) is selected f o r backup, and the Mount points option is enabled, all files located on the mo unted v o lume will be in cluded in the backup. If the Mount points o ption is disabled, the m o unt point i n the backup will be empty. During recovery o f a par[...]
-
Page 122
122 Copyright © Acronis International GmbH, 2002- 2015 The option enables you to define the commands t o be aut o matically ex ecute d before and after the backup procedure. The following sche me illust rates when pre/post com mands are executed. Pre -backup command Backup Post-backup command Examples of h ow you can use the pre/p ost commands: ?[...]
-
Page 123
123 Copyright © Acronis International GmbH, 2002- 2015 Perform the backup only after the command is successfully executed. Fail the task if the command execution fails. command is executed despite execution failure or success. the command ex ecution and irrespective of the command execution result. * A command is c onsidered failed if its exit c o[...]
-
Page 124
124 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y pre /p ost da ta ca pt ure c omm an ds 1. Enable pre/post data capture commands exe cutio n by c hecking th e following opt ions: Execute before the da ta capture Execute after the data capture 2. Do any of the follo wing: Click Edit to specify a new command or a batc[...]
-
Page 125
125 Copyright © Acronis International GmbH, 2002- 2015 4. Depending on the r esult you want to obtain, select the appropriate options as described in the table below. 5. Click Test command t o check if th e command is correc t. Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails* Selected Cleared Selected Cleared Do not back u [...]
-
Page 126
126 Copyright © Acronis International GmbH, 2002- 2015 level (p. 112) option is set to None ). Use the sector- by -sect o r backup for ba cking up drives with unrecognized or unsup ported file systems and other p roprietary data formats. 4 . 7 . 2 2 T a p e m an a ge m e n t These options ar e effective w hen the backup d estination is a tape devi[...]
-
Page 127
127 Copyright © Acronis International GmbH, 2002- 2015 Move a tape back to t he slot after using The preset is: Enabled . If you disable this o ption, a tape will remain in the drive after an operation wi th the tape is completed. If both this option and the Eject tapes after succe s sful backup s option are enabled , t he tape will b e ejected. A[...]
-
Page 128
128 Copyright © Acronis International GmbH, 2002- 2015 The program will tr y to execute the failed task again if you select the Restart a failed t ask check box and specify the nu mber of attempts and the tim e interval betwe en the attempts. The program st ops trying as soon as an attempt completes successfu lly OR the specified number o f attemp[...]
-
Page 129
129 Copyright © Acronis International GmbH, 2002- 2015 Time diagram: Wa i t until c onditions are met Skip the task executio n Delaying a backup m ight be un acceptable, for example, when you need to back up data stric tly at the specified time. Then it makes sense to skip the backup rather than wait for the conditions, esp ecially if the events o[...]
-
Page 130
130 Copyright © Acronis International GmbH, 2002- 2015 VSS will use any a v ailable software-based pr ovider. If one is not found, VSS will try to use the Microsoft Softwar e Shadow C o py provider, and Acronis VSS Provider in turn. Software - Acroni s VSS Provider VSS will use Acronis VSS Provider. Software - System pro vider (selected by[...]
-
Page 131
131 Copyright © Acronis International GmbH, 2002- 2015 If you use Acronis Ba ckup Agent for Exchange or third -party soft ware for backing up the Exchange Server data. This is because the l o g truncati on will interfere with the c onsecutive transaction log ba ckups. If you use third-part y softw are fo r backing up th e SQL Server data. [...]
-
Page 132
132 Copyright © Acronis International GmbH, 2002- 2015 5 Re co ve ry When it comes t o data recovery, fir st consider the most func tio nal method : connect the console t o the managed ma c hine runn i ng the operating system and create the recovery task. If the machine's opera ti ng sys tem fails to start or you need to reco ver data to bare[...]
-
Page 133
133 Copyright © Acronis International GmbH, 2002- 2015 Where to recover This section appears af ter the required backup is selec ted and the type of data t o recover is defined. The para m eters y o u specify here depend on the type of data being recovered. Disks (p. 139) Volumes (p. 143) Files (p. 146) Microsoft Ex change datab ases or storage gr[...]
-
Page 134
134 Copyright © Acronis International GmbH, 2002- 2015 5 . 1 . 1 W h a t t o r e c o v e r 1. Specifying the archive loc ation In the Data path field, sp ecify the archive locati on path or click Browse and select the r equired location as described in "Selecting archive locati o n" (p. 135). In Acronis Backup Ad vanced, you can select e[...]
-
Page 135
135 Copyright © Acronis International GmbH, 2002- 2015 There are probab ly other times when you m ay need to re cover the MBR, but the above ar e the most common. When recovering the MBR of one disk to an o ther Acronis Backup recovers Track 0, which do es not affect the target disk ’s partition table and partiti o n layout. Acr onis Backup auto[...]
-
Page 136
136 Copyright © Acronis International GmbH, 2002- 2015 Lo ca tio n D etai ls FTP, SFTP If the archive is stored on an FTP or SFT P server, type th e server name or address in t he Path field as follows: ftp://ftp_server:p ort _number or sftp:/ /sftp_server:port numbe r To establish an active mod e FTP connection, use the fo llowing nota tion: aftp[...]
-
Page 137
137 Copyright © Acronis International GmbH, 2002- 2015 Select Microsoft Ex change Information Store to brow se and search f o r informa tio n stores, individual storage group s or databases in the databas e-lev el backups. Select Microsoft Ex change Mailboxes to browse and s earch for entire mailboxes, public folders, individual fold ers, e-ma[...]
-
Page 138
138 Copyright © Acronis International GmbH, 2002- 2015 On a managed m achine: En able cataloging in the Backup catalogin g option ( Optio ns > Machine option s ). On the managemen t server: Enable cataloging by modifying the Wind o ws regist ry (p. 411). On the storage n ode(s): Enable cataloging by modifyin g the Windows registry ([...]
-
Page 139
139 Copyright © Acronis International GmbH, 2002- 2015 Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that the user name and p assword can be intercepte d by an eavesdropper using a[...]
-
Page 140
140 Copyright © Acronis International GmbH, 2002- 2015 virtualization product brand and settings. VMware ES X(i) may have multiple stor ages. A Microsoft Hyper-V ser ver enables creating a new v irtual machine in any local folder. The new virtual machine will be configured au tomatically, the source m achine con figuration being copied where possi[...]
-
Page 141
141 Copyright © Acronis International GmbH, 2002- 2015 The software will ke ep the NT signature of th e target disk if it is the same as the N T signature stored in the backup . (In other w o rds, if you rec o ver the disk t o the same disk that was backed up.) Otherwise, the s oftware will generate a ne w NT signature for the target dis k. This i[...]
-
Page 142
[...]
-
Page 143
143 Copyright © Acronis International GmbH, 2002- 2015 3. Examine the first value in the Sector size (logical/phy sical) line. For example, the output may be the following: Sector size (logical/ physical): 512B/4096B 5. 1. 4.2 S ele ct in g t ar ge t v ol um es Available volume d estinations depend on the agen ts operating on the machin e. Recover[...]
-
Page 144
144 Copyright © Acronis International GmbH, 2002- 2015 Recover [Disk #] MBR to: [If the Master Boot Rec ord is selected for recovery] Disk # (p. 144) Choose the disk to re cover the M aste r Boot Record to. NT signature: (p. 140 ) Select the way the disk' s sig nature co ntained in t he MBR will be han dled. The disk sign ature is used by Win[...]
-
Page 145
145 Copyright © Acronis International GmbH, 2002- 2015 T yp e A basic MBR disk can contain up to four primary vo lumes o r up to thre e primary volumes and multiple logical driv es. By default, the progra m selects the original volume's type. You can change this setting, if required . Primary . Informati on about primary volumes is c o nt[...]
-
Page 146
146 Copyright © Acronis International GmbH, 2002- 2015 When recovering basi c MBR and GPT vo lumes, y o u can select the alignment method manuall y if the automatic alignment does not satisfy you for s o me reason. Th e following opti o ns are availab le: Select automati c ally - (Defau lt) recommended. T he s o ftware will aut om atically set[...]
-
Page 147
147 Copyright © Acronis International GmbH, 2002- 2015 If you allow files to be overwritten, you still have an option to pre v ent overwriting o f specific files by excluding them from the recovery operation. Recovery exclu si ons (p. 147 ) Specify files and f o lders you do n o t wish to be re cover ed. Re co ver y ex cl us ion s Set up exclusion[...]
-
Page 148
148 Copyright © Acronis International GmbH, 2002- 2015 Use current use r credentia ls The task will run under the credentials with which the user who starts the ta sks is logged on. If the task has t o run on sch edule, you will be asked for the cu rrent user's pas sword on completing the tas k creation. Use the followin g credentials[...]
-
Page 149
149 Copyright © Acronis International GmbH, 2002- 2015 Limitations Transferring a Linu x system between UEFI and BIOS is n o t supported. Transferring a Win do ws sys te m between UEFI and BIOS is not supported if a backup is stored in any of these locations : Acronis Cloud St orage Tape device Optical discs (C D s, DVDs, or Blu-ray di[...]
-
Page 150
150 Copyright © Acronis International GmbH, 2002- 2015 Or ig i nal s yst em Ta rg et ha rdwa re BI OS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: convertible Solution Recover the operating system to an MBR disk or to an un initialized disk. The target mach ine must support BIOS. Additional steps 1. Before recovery, turn off the[...]
-
Page 151
151 Copyright © Acronis International GmbH, 2002- 2015 The following table su mmarizes all cases of re covering disks of a BIOS-based syst em to UEFI-based and vice versa. Green background means that the system will b e bootable. No user action is required. Yellow background means that you need to perfor m additional st eps to make the sys[...]
-
Page 152
152 Copyright © Acronis International GmbH, 2002- 2015 5. 3 Ac ro ni s A cti ve Re sto re Active Restore is the Acronis proprietary techn ology that brings a system o r a da tabase online immediately after its recovery is started. This section describes the use of Active Restore during an operating system re covery . While bas ed on the same techn[...]
-
Page 153
153 Copyright © Acronis International GmbH, 2002- 2015 If you opt for Acr o nis Activ e Restore, th e system will be operational in a short ti me. Users will be able to open the nece ssary files from the storag e and use them while th e rest of the files, which are not immediatel y necessary, are being re covered in the backgroun d. Examples: movi[...]
-
Page 154
154 Copyright © Acronis International GmbH, 2002- 2015 Why a recovered operating system may be unboo table The machine B IOS is config ured to boot from another HDD. Solution : Configure the BIOS to boot from the H D D where the op erating system resides. The system wa s recovered on dissimilar hardware an d the new hardware is in compatib[...]
-
Page 155
155 Copyright © Acronis International GmbH, 2002- 2015 Such system canno t boot b ecause its kernel tries to m o unt the root file system at the LVM volume. Solution : Change the loader configuration and /etc / fstab so that the LVM is not used and reactivate the b oot loader. 5 . 4 . 1 H o w t o r e a c t i v a t e G R U B a n d c h a n g e i t s[...]
-
Page 156
156 Copyright © Acronis International GmbH, 2002- 2015 or chroot /mnt/system/ / usr/sbin/grub 9. Specify the disk on which GRUB is l ocated — typically, the boot or ro o t partition: root (hd0,0) 10. Install GRUB. For example, to inst all GRUB in the master bo o t record ( MBR) of th e first disk, run the following com m and: setup (hd0) 11. Exi[...]
-
Page 157
157 Copyright © Acronis International GmbH, 2002- 2015 Once you confir m the operation, Acr onis Backup will r e -deploy the factory imag e located in Acronis Secure Zone. This will r ecover the original v o lume layout, the pre -installed Wind ows operating system, and any original third-p arty applications. In ad dition, the software will re mov[...]
-
Page 158
158 Copyright © Acronis International GmbH, 2002- 2015 Ag en t f or Wi ndow s Ag en t f or Li nux Bo ot abl e m edi a (L in ux- bas ed or PE- bas ed) Di sk re co ver y Fi le re cov ery (a ls o f ro m a di sk ba ck up) Di sk re co ver y Fi le re cov ery (a ls o f ro m a di sk ba ck up) Di sk re co ver y Fi le re cov ery (a ls o f ro m a di sk ba ck[...]
-
Page 159
159 Copyright © Acronis International GmbH, 2002- 2015 The preset is Enab led . This option defin es whether to re cover th e files’ date an d tim e from the ar chive or assign the files the current date and time. Validate backups before recov ery The preset is Disa bled . This option defin es whether to v alidate a bac kup to ensure that the ba[...]
-
Page 160
160 Copyright © Acronis International GmbH, 2002- 2015 The option enables you to receive e-mail notifications about the recovery task's s uccessful completion, failure o r when user interaction is required. The preset is: Disab l ed . To c onf ig ur e e -ma il no ti fic at io n 1. Select the Send e-mail notifications check box to a ctivate no[...]
-
Page 161
161 Copyright © Acronis International GmbH, 2002- 2015 9. Click Send test e-ma il message to check whether e -mail no tifications w o rk correct ly with the specified settings. 5 . 6 . 3 E r r o r h a n d l i n g These options ar e effective fo r Windows and Linux operating systems and b ootable media. These options enabl e you to specify how to h[...]
-
Page 162
162 Copyright © Acronis International GmbH, 2002- 2015 Send SNMP no tifi cations in div idually for r ecovery op eration events – to send th e events of t he recovery operati o ns to the specifi ed SNMP managers. Types of events to s end – ch o ose the types o f events to be sent: All events , Errors and warnings , or Errors o nly . ?[...]
-
Page 163
163 Copyright © Acronis International GmbH, 2002- 2015 5 . 6 . 6 M o u nt p o i n t s This option is effe ctive only in Windows for reco v ering data fr om a file -level back up. Enable the Mount po i nts option to r ecover files and folders that were stored on the mounted volumes and w ere backed up w ith the enabled Moun t points option. For det[...]
-
Page 164
164 Copyright © Acronis International GmbH, 2002- 2015 5. Click Test command t o check if th e command is correct. Ch ec k b ox S ele cti on Fail the task if the c ommand execution fails* Selected Cleared Selected Cleared Do not reco ver until the command e xecution is complete Selected Selected Cleared Cleared Re sul t Preset Perform the recovery[...]
-
Page 165
165 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y the r eco ver y pro ces s p ri ori ty Select one of the f o llowing: Low – to minimize r esources taken by the r ecovery process, leaving m ore resour ces to other processes running o n the machine Normal – to run the r ecovery process with n o rmal speed, all o catin[...]
-
Page 166
166 Copyright © Acronis International GmbH, 2002- 2015 6 C onv er si on to a vir tu al ma ch in e Acronis Backup o ffers a nu m ber of ways o f convertin g a disk backup into a virtual m achine. This section helps you c hoose t he method that best fits you r needs and provides step- by -step instructions for conversion. 6. 1 C o nve rsi on me tho [...]
-
Page 167
167 Copyright © Acronis International GmbH, 2002- 2015 During conversion which is part of a backup plan (p. 168 ), the s o ftware creat es the virtual machine in addition to creating the backup. The virtual machine has the sa m e configu ratio n as the original machine. During recovery to t he "Ne w virtual machin e" destination [...]
-
Page 168
168 Copyright © Acronis International GmbH, 2002- 2015 Conversion of logical volumes to basic ones may als o prevent the system fro m booting up. For these reason s, if t he m achine uses a custom boot lo ader, you might need to configure the loader to point to the ne w devices and reactivate it. Configuri ng GRUB is normally not n eeded becau[...]
-
Page 169
169 Copyright © Acronis International GmbH, 2002- 2015 Storage Choose the storage o n the virtuali zation server or the folder to pla ce the virtual machine files in. Resultant VMs Specify the na m e of the vir tual machine. The default n am e is Backup_of_[Machin e Name] . You can add mor e variable s to the name. The followin g tem plates are su[...]
-
Page 170
170 Copyright © Acronis International GmbH, 2002- 2015 You can choose the v irtual machine type: VMware W orkstation, Micro so ft Virtual PC, Red Hat Kernel-based Virtual Machine (KVM) or Red Hat Enterprise Virtualization (RHEV). In the Storage step, yo u ca n select the virtual machine path. What is the machine 's processing power? Conversio[...]
-
Page 171
171 Copyright © Acronis International GmbH, 2002- 2015 If you choose to creat e the virtual machine on a virtu alization server The first conversi o n creates a new v irtual mach ine. Any subsequent conversi on works as follows: If there has been a full backup since the last c o nversion, the virtual machine is re-created from scratch, as desc[...]
-
Page 172
172 Copyright © Acronis International GmbH, 2002- 2015 6. 2. 3.1 S tep s to pe rf or m To p er for m a r eco ve ry to a ne w v ir tu al mac hi ne 1. Connect the cons o le to the manage ment server, to a machine where an agent is installed, or to a machine booted fr om a bootable media. 2. Click Recover to o pen the Recove r data (p. 132) page. 3. [...]
-
Page 173
173 Copyright © Acronis International GmbH, 2002- 2015 deployed immedia te ly after you cli ck OK . Recovery wil l be performed by that age nt. It will take a license. 3. Click OK to return t o the Recover da ta page. To s el ect t he vir tu al ma chi ne ty pe 1. Choose the Save the virtual machine as a set of fi les option. 2. In the left part of[...]
-
Page 174
174 Copyright © Acronis International GmbH, 2002- 2015 Enter the name f o r the new vir tual machine. If the backup w as created by Agent for VMware or Agent for Hyper-V, the software takes t he name from the virtual machine c o nfigu ratio n contained in the backup. Processors Initial setting: if not contained in the backup or if t he backed -up [...]
-
Page 175
175 Copyright © Acronis International GmbH, 2002- 2015 6 . 3 . 2 S t ep s t o pe r f o r m To p er for m a r eco ve ry to a ma nu all y c re at ed vir tu al ma ch ine 1. [Optional] When rec overing Windows, prepare Wind ows drivers that correspond to the target virtualization platfor m . For machines runnin g Linux, the n ece ssary dri vers are no[...]
-
Page 176
176 Copyright © Acronis International GmbH, 2002- 2015 7 St or in g the b ac ke d u p da ta 7. 1 Va ul ts A vault is a locati o n for stor ing backup archives. For ease of use an d administration, a vault is associated with the archives' metadata. Referring to this metadata makes f or fast and convenient operations with archi ves and backups [...]
-
Page 177
177 Copyright © Acronis International GmbH, 2002- 2015 'Vaults' view Vaults (on the naviga tion pane) - top item of the vaul ts tree. Click this ite m to display cen tralized and personal vaults. To perform actions on any vau lt, use the toolbar that is loca ted at the top of the Vaults view. For c entralized vaults, see the Actions o n [...]
-
Page 178
178 Copyright © Acronis International GmbH, 2002- 2015 What doe s the icon mean? When browsing archi ves on the Archive view tab, y ou may encounter a backup with the icon. This icon means tha t the b ackup is marked for deletio n but cannot be deleted immediat ely for any of the following reas o ns: Other backups depend on it, but consolidati[...]
-
Page 179
179 Copyright © Acronis International GmbH, 2002- 2015 Fu nc tio nal ity Ma nag ed v aul ts U nman ag ed vau lt s SAN, NAS Yes Yes FTP/SFTP server No Yes 7. 1. 2.1 A ct io ns o n cen tra liz ed va ul ts To a cc ess ac ti ons 1. Connect the cons o le to the manage ment server. 2. In the Navigation pane, click Vaults > Centralized . All the opera[...]
-
Page 180
180 Copyright © Acronis International GmbH, 2002- 2015 To Do in the Attachin g a managed vault (p. 185 ) section. Note . Tape-based vaults cannot be attached. Validate a vault 1. Select the vault. 2. Click Validate . You will be taken to the Validat ion (p. 237 ) page with a n already pre -selected vault as a source. The vault validation ch ecks a[...]
-
Page 181
181 Copyright © Acronis International GmbH, 2002- 2015 [Optional] Select whether to pr o tect the vaul t with encryption. Anything w ritten to the vault will be encrypted and anything read from it will be decrypted transparently by t he storage node, using a vault-sp ecific encryption key stored o n the storage n ode. A vault located o n a tape d [...]
-
Page 182
182 Copyright © Acronis International GmbH, 2002- 2015 Compression [Optional] Select whether to co m press the dedupli cation data stores. This setting is available only if the backward compatibility is turned o n and dedu plication is enabled. User accounts Vault administra tors (p. 183 ) Add groups or user a ccounts that will have administra tor[...]
-
Page 183
183 Copyright © Acronis International GmbH, 2002- 2015 stored on the node. If the storage medium is stolen o r accessed by an unauthorized person, the malefactor will n o t be able to de cry pt the vault contents without acces s to the storage node. This encryption ha s nothing to do with the archive en cryption specified by the b ackup plan and p[...]
-
Page 184
184 Copyright © Acronis International GmbH, 2002- 2015 You will be pro m pted to specify the domain account credentials, when you enter a user or group name that cannot b e checked using your domain a ccount; for example, if you ar e logged on using a domain account o ther than the domain name you have entere d t o check. Va ul t u se rs Vault use[...]
-
Page 185
185 Copyright © Acronis International GmbH, 2002- 2015 Va ul t p at h To s pec if y the pa th wh er e t he u nma na ged v aul t will b e c re at ed 1. Enter the full path to the folder in the Path field or sel ect t he desir ed fo lder in th e folders tree. Unmanaged vaults can be organized: On Acronis Cloud S to rage. On a network shar e [...]
-
Page 186
186 Copyright © Acronis International GmbH, 2002- 2015 If the vault is dedu plicating, we recommend that you move the deduplication da tabase from the old storage node t o the new one. Otherwise, the software will automaticall y re -create the deduplication database, which m ay take a lo ng time to perform. For the informati o n about t he recomme[...]
-
Page 187
187 Copyright © Acronis International GmbH, 2002- 2015 7 . 1 . 3 P e r s o n a l v a ul t s A vault is called per so nal if it w as created usi ng direct co nnection of the console to a managed machine. Personal vaults are specific for each manage d machine. Personal vaults are visible to any user that can l og on to the sy stem. A user' s ri[...]
-
Page 188
188 Copyright © Acronis International GmbH, 2002- 2015 To Do for accessing a vault In the appearing d ialog box, provide the credentia ls required for accessing t he vault. Create Acronis Secure Zone Click Creat e Acronis Secure Zon e . The procedure of creating th e Acronis Secure Zone i s described in -depth in the Creating Acronis Secure Zon e [...]
-
Page 189
189 Copyright © Acronis International GmbH, 2002- 2015 3. Create a new vaul t. 4. Edit the backup plan s and t asks: redirect their d estination to the new vaul t. 5. Delete the old vault. How can I merge two vaults? Suppose you have two vaults A and B in use. Both v aults are us ed by backup plans. You decid e to leave only vaul t B , moving all [...]
-
Page 190
190 Copyright © Acronis International GmbH, 2002- 2015 To s pec if y a n ew ca che f old er in L inu x: Add the following element inside the Confi g uratio n tag in /etc/Acronis / MMS.config : <key name="Catalog"> <value name="Cat alogDir" type="TString">"/home/C atalog/"</value> </key&g[...]
-
Page 191
191 Copyright © Acronis International GmbH, 2002- 2015 Offers a cost-effecti ve and han dy method for protecting data fro m software malf unction, virus attack, operat or error. Since it is internal archi ve storage, it eliminates th e need for a separate media o r n et work connection to back up or recover the data. This is esp ecially us[...]
-
Page 192
192 Copyright © Acronis International GmbH, 2002- 2015 7. 2. 1.2 A cr on is S ecu re Z on e S iz e Enter the Acronis Secur e Zone size or drag the slider to select any size between the mini mum and the maximum ones. Th e minimum size is approxima tely 50MB, depending on the g eometry of the hard disk. The maximu m size is equal to the disk's [...]
-
Page 193
193 Copyright © Acronis International GmbH, 2002- 2015 As is apparent fro m the abov e, setting the maximum possible zone size is n ot advisable. You will end up with no free space o n an y volume which m ight cau se the o perating sy stem or applications to w o rk unstably and even fail to start. 7 . 2 . 2 M an ag i n g A c r o n i s S e c u r e [...]
-
Page 194
194 Copyright © Acronis International GmbH, 2002- 2015 7. 2. 2.3 D ele ti ng A cro ni s Sec ur e Z one To d ele te Ac ro nis S ecu re Zo ne : 1. On the Manage Acronis Secure Zon e page, click Delete . 2. In the Delete Acroni s Secure Zon e window, select volumes to which you want to add the spac e freed from the z o ne and th en click OK . If you [...]
-
Page 195
195 Copyright © Acronis International GmbH, 2002- 2015 Fu nc tio nal ity Fi xe d d riv e Re mov abl e m edi a You can set the option t o clean up the arch ive " When there is insufficient space w hile backing up " within th e Custom (p. 69 ) backup scheme. Yes No Simplified naming (p. 77 ) of backup files... ...is unavailable. ...is alwa[...]
-
Page 196
196 Copyright © Acronis International GmbH, 2002- 2015 device with several dr ives is attach ed to a storage node, multiple machines can simultaneously back up to tapes. 7. 4. 2.1 C omp at ib il ity w ith R SM a nd th ir d-p ar ty sof tw a re Coexistence with third -party softwa re Acronis Backup cann ot work with tapes on a machi ne where third-p[...]
-
Page 197
197 Copyright © Acronis International GmbH, 2002- 2015 3. Add the registry k ey descri bed below. Specify the new location path in th e registry value ArsmDmlDbProto c ol . Registry key: HKEY_ LOCAL_MACHINESOFTWAREAcr o nisARSM Settings Registry value: ArsmD mlDbProtocol Possible data values: Any strin g 0 to 32765 characters long. Descriptio[...]
-
Page 198
198 Copyright © Acronis International GmbH, 2002- 2015 Custom scheme Set up the custo m scheme so that it creat es full backu ps with a reasonable frequ ency. Otherwise, if you specify retention rules, the software will no t be able to overwrite tapes as ap propriate. In the retention rul es of the Custom backup sche me (p. 69 ), the If a backup t[...]
-
Page 199
199 Copyright © Acronis International GmbH, 2002- 2015 12. Barcode printers are not sup po rted. 7. 4. 2.7 Re ad ab il it y o f ta pes wr it te n by th e old er A cro ni s pro du ct s The following table su mmarizes the readability o f tapes writt en by Acronis True Image Echo, Acronis True Image 9.1, A cro nis Ba ckup & Recovery 10 and Acroni[...]
-
Page 200
200 Copyright © Acronis International GmbH, 2002- 2015 4. Click Detect tape de vic es . 5. If your tape devic e is a stan d -alone drive, skip this step. Otherwi se, do the followi ng: a. Click Inventory to det ect the load ed tapes. Select the Full invent orying method. Do n o t select the Move newl y detected ta pes from the 'Unrecognized t[...]
-
Page 201
201 Copyright © Acronis International GmbH, 2002- 2015 Tapes sent to the Imported t apes pool contain backups written by Acronis software. Be fore moving such tapes to the Free tapes pool, make sure yo u do not need these bac kups. c. Decide whether y ou want t o back up to th e default Acronis pool (p. 204) or to create a n ew pool (p. 205) . Det[...]
-
Page 202
202 Copyright © Acronis International GmbH, 2002- 2015 8. If any of the required tapes are not loaded for s ome reason, the software will show you a message with the identifier of the needed tape. L o ad th e tape, and click Retry to co ntinue the recovery. What if I do not see ba ckups stored on tapes? It may mean that the database with the conte[...]
-
Page 203
203 Copyright © Acronis International GmbH, 2002- 2015 9. Select the Unrecogn ized tapes pool. 10. Select the tapes to be resc anned. To select all the tapes of the pool, select the check box next to the Tape name colu mn header. 11. If the t apes c o ntain a pass wo rd-protected ar chive, select the corresp o nding che ck box, and th en specify t[...]
-
Page 204
204 Copyright © Acronis International GmbH, 2002- 2015 7 . 4 . 4 T a p e m an a ge m e n t 7. 4. 4.1 D ete ct in g tap e dev ic es When detecting tap e devices, Acronis Backup fin ds tape devices attached t o the machin e and places information about them in the tape management dat abase. Detecting tape dev ices is requ ired: After you have a [...]
-
Page 205
205 Copyright © Acronis International GmbH, 2002- 2015 backups from diff erent dep artments of your company backups from diff erent machines backups of syste m volumes and users' data filled tapes from tap es being written to (p. 205). S epa ra ti ng f ill ed ta pes You may want t o separate filled tapes from incomplet e o nes[...]
-
Page 206
206 Copyright © Acronis International GmbH, 2002- 2015 To e dit a po ol : 1. In the Navigation tr ee , clic k Tape managemen t . If con nected to the manag ement ser v er, select the storage node to which your tape device is a tt ached. 2. Select the required pool, and then click Settings . 3. You can change th e pool name (e xcept the na me of th[...]
-
Page 207
207 Copyright © Acronis International GmbH, 2002- 2015 You cannot mo ve write-protected and o nce-recorded WORM (Write-Once-Read- Many) tapes to the Free tapes po o l. Cleaning tapes are alw ays displayed in the Unrecogni z ed tapes pool; y o u cannot mo ve them to any other pool. To m ov e t ape s to an ot her p ool : 1. In the Navigation[...]
-
Page 208
208 Copyright © Acronis International GmbH, 2002- 2015 After a tape is eje cte d eith er manually o r automatically (p. 126 ), it is recom mended to write its name on the tape. Er as ing Erasing a tape physicall y deletes all backups stor ed on the tape and rem o ves the in fo rmation about these backups fr o m the dat abase. However the informati[...]
-
Page 209
209 Copyright © Acronis International GmbH, 2002- 2015 Note During the in ventorying, do not select th e Move newly detected tapes from the 'Unrecognized tapes' or 'Imported tapes ' pools to the 'Free tapes ' pool check box. 4. Click Rescan . 5. Select the vault where the newly detected archives will be placed. 6. Sel[...]
-
Page 210
210 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup reads tags written by Acronis softwar e and analyzes other infor mation about the contents of the lo aded tapes. Select this method to recognize empty tapes and t apes written by Acronis software on an y tape device and any m achine. The following table sh ows pools to which tap[...]
-
Page 211
211 Copyright © Acronis International GmbH, 2002- 2015 4. [Optional] Select the Move newly de tected tape s from the 'Un r ecogni z ed tapes' o r 'Imported tapes' poo ls to the 'Free tap es' pool check box. Warning. Only select th is check bo x if you are absolutely sure t hat the data stored on yo ur tapes can be ove[...]
-
Page 212
212 Copyright © Acronis International GmbH, 2002- 2015 Personal tape-based vaults Before backing up a m achine to a dire ctly attached tape device, yo u can cr eate a personal vault. If you do not want to , the software will automatically create a personal vault associated with the Acronis pool. If you create m o re than one pers onal vault, tapes[...]
-
Page 213
213 Copyright © Acronis International GmbH, 2002- 2015 2. Perform the fast in v entorying (p. 20 9 ) with the Move newly detected tapes fro m the 'Unrecognized ta pes' or 'Imported tapes' po ols to the 'Free tapes' pool check box selected. Result . The loaded tapes are in the Free tapes pool. If some of them are sent [...]
-
Page 214
214 Copyright © Acronis International GmbH, 2002- 2015 In Tape poo l , select the pool wh ere yo u will back up to (the Acronis pool or the n ew ly created one). 7. When creating a c entralized backup plan (p. 354): In Items to back up , s elect the machines you want to back up. Choose the created vault as the backup destina tion. [...]
-
Page 215
215 Copyright © Acronis International GmbH, 2002- 2015 7. After each backup is created and the tapes with it are ejected, send them t o a secure off-site storage. If you d o not have enoug h free tapes to continu e backups, load ne w tapes and perform steps 2 and 4. Result The machine will b e backed up t o the local folder and to tapes. Tapes wit[...]
-
Page 216
216 Copyright © Acronis International GmbH, 2002- 2015 Result The machine will b e backed up t o tapes acc o rding to the s pecified backup scheme. Tapes with full backups will be sent to a secure off-site storage. 7. 5 St or ag e no des The following secti o ns desc ribe how to use Acronis Backup Sto rage Nod e. Storage nodes are a vailable only [...]
-
Page 217
217 Copyright © Acronis International GmbH, 2002- 2015 Deduplication A managed vault can be configured as a deduplicating vault. This means that ide ntical data will be backed up to this vaul t only once to minimize net work usage during backup and to minimize storage space taken by the archives. For more infor mation, see the "Deduplication&[...]
-
Page 218
218 Copyright © Acronis International GmbH, 2002- 2015 b. Select the storag e node, then click Create vault . The Create centralized vault page will be opened with the pr e-selected storage node. P erform th e remaining steps to create the vault as described in "Creatin g a managed centralized vault" (p. 180). Details. When spe cifying t[...]
-
Page 219
219 Copyright © Acronis International GmbH, 2002- 2015 Additional right of machine administrators A vault user who is a member of the Administrat ors group on a machine can v iew and man age any archives created f rom that machine in a managed vault — regardless of the type of that user's account on the storage n o de. Example Suppose that [...]
-
Page 220
220 Copyright © Acronis International GmbH, 2002- 2015 To Do storage node. Perform the r emaining steps to create th e vault. View details of the storage node 1. Select the storage no de. 2. Click View details . In the Storage n ode properties (p. 221 ) window (its con tent is duplicated on th e Information panel at the bottom of the Storage nod e[...]
-
Page 221
221 Copyright © Acronis International GmbH, 2002- 2015 7. 5. 6.3 S tor ag e no de pr ope rt ie s The Storage node properties window accumulates in fo ur tabs all infor mation on the select ed Acronis Backup St o rage No de. This information is also duplicated on the Information panel. Storage node properties This tab displays the fo llowing inform[...]
-
Page 222
222 Copyright © Acronis International GmbH, 2002- 2015 Vaults This tab displays a lis t of vaults managed by the select ed storage node. To update the list of vaults with the most rec ent information from the manag ement server, click Refresh . Indexing This tab lets you exa mine the current status o f indexi ng for the deduplicating va ults of th[...]
-
Page 223
223 Copyright © Acronis International GmbH, 2002- 2015 The size of the del et ed dat a is 20 GB, and the size of the re m aining data is 80 GB. The ratio of the deleted to remain ing data is thus 2 0 GB / 80 GB = 0.25, or 25 percen t. The storage node calculat es the relative size of the remaining data as 1 0 0 percent – 25 percent = 75 percent.[...]
-
Page 224
224 Copyright © Acronis International GmbH, 2002- 2015 See also the Fast Ope ration Connection Limi t parameter. Backup Queue Li mi t Description: Specifi es the maxi mum number of agents in the s to rage n o de's backup qu eue. Possible values: An y intege r number between 1 and 21474 8 3647 Default value: 50 The backup queue is a list of ag[...]
-
Page 225
225 Copyright © Acronis International GmbH, 2002- 2015 A vault database contain s in fo rmation about archives and backups stored in the vault. When you create or attach a vault, the storage node places the database for that vault t o the folder determined by this pa rameter. Changing this pa ram eter does n o t affect the currently existing vault[...]
-
Page 226
226 Copyright © Acronis International GmbH, 2002- 2015 When the amount o f free s pace in a vault is equal to t he value in Vault Free Space Wa r ning Lim it or less, a warning is recorded in the storage node's log, indicating the vau lt in question. You can view s to rage n ode warnings in the D ashboard. Vault Free Spa c e Warning Percenta [...]
-
Page 227
227 Copyright © Acronis International GmbH, 2002- 2015 The database is s tored on th e storage node in a local f older whose name is specif ied by the by the Vault Metad ata Data base Path parameter. Vault Databa s e Free Space Error L i mit Description: Specifies th e amount of free space on the volume containing a m anaged vault's database,[...]
-
Page 228
228 Copyright © Acronis International GmbH, 2002- 2015 of RAM, but leav e at least 2 GB of RAM for the operating system and o ther appli cations. You can change this beha v ior by usin g the DatastoreInd exCacheM emoryPercent and Da tastoreIndexRese rvedMemory parameters. The amount of allo cated memory is calculated bas ed on the following rule :[...]
-
Page 229
229 Copyright © Acronis International GmbH, 2002- 2015 The deduplication is per formed on data blocks. Th e block size is 4 KB for disk-lev el backups an d 1 B to 256 KB for file-le vel backups . Each file that is less than 256 KB is consider ed a data block. Files larger than 256 KB are split into 256-KB blocks. Acronis Backup perf o rms d edupli[...]
-
Page 230
230 Copyright © Acronis International GmbH, 2002- 2015 Deduplication at targe t After a backup t o a deduplicating v ault is c ompleted, the storage node run s the indexing activi ty. This activity deduplicat es the data in the vault as f o llows: 1. It moves the data bloc ks from the temporary fil e to a special file within the vault , storing du[...]
-
Page 231
231 Copyright © Acronis International GmbH, 2002- 2015 Compacting After one or m o re backups o r archives ha v e been d eleted from the vault — either manually or durin g cleanup — the data store may contain blocks which ar e no longer referred to fr om any archive. Such blocks are deleted b y t he co mpacting task, which is a scheduled t ask[...]
-
Page 232
232 Copyright © Acronis International GmbH, 2002- 2015 Place the deduplicatio n database and dedup licating vault on separat e physical devices To increase the speed of access to a deduplicati on database, the database and t he vault m ust be located on separat e physic al devices. It is best to all ocate dedicat ed devices for the vault an d the [...]
-
Page 233
233 Copyright © Acronis International GmbH, 2002- 2015 64 -bit operating system The storage node must be in stalled in a 64 -bit oper ating system. The machine w ith the s to rage node should not run appli cations that require much sy stem resources; for example, Database Management Syst em s (DB M S) or Enterprise Resource Planning (ERP) syst ems[...]
-
Page 234
234 Copyright © Acronis International GmbH, 2002- 2015 Disk-level backup Deduplication of disk bl ocks is not performed if the volume's allocation unit size — also known as cluster size or bloc k size — is not divisib le by 4 KB. Tip: The allocation unit size on most NTFS a nd ext3 volum es is 4 KB. This allows for block -level dedu plica[...]
-
Page 235
235 Copyright © Acronis International GmbH, 2002- 2015 This method requires stopping the Acronis St orage Node Service. Both methods use th e same principle: if the s to rage n o de does not find the database, it creates th e database from scra tch. This process length depends on the datastore size and dis k I/O speed. On average, 1 TB of the data[...]
-
Page 236
236 Copyright © Acronis International GmbH, 2002- 2015 Deduplication database and datastore are in the same folder 1. Detach the managed v ault. 2. Move the old dedup lication datab ase files to an other folder. 3. Attach the manag ed vault. When att aching, specify the same pa ths, including the same de duplication database pat h. Validating the [...]
-
Page 237
237 Copyright © Acronis International GmbH, 2002- 2015 8 O pe rat io ns wi th a rch iv es an d bac ku ps 8. 1 Va li da tin g a rc hiv es a nd ba cku ps Validation is an oper ation that checks the pos sibility of data recovery fr om a backu p. Validation of a fil e backup imitat es recovery o f all files from the backup to a dummy destination. Vali[...]
-
Page 238
238 Copyright © Acronis International GmbH, 2002- 2015 Credentials (p. 23 9 ) [Optional] Provide cr edentials for accessing the so urce if the task acc o unt does no t have enough privileges t o access it. When to validate Start validation (p. 2 4 0) Specify when and h ow often to perform validati on. Task parameters Task name [Optional] Enter a u[...]
-
Page 239
239 Copyright © Acronis International GmbH, 2002- 2015 To select a centraliz ed vault (either managed or unmanaged), expand the Centralized group and click the vault. If you cannot acc ess a manag ed v ault (for exa m ple, wh en using bootable media), select the Storage nod es group, enter th e storage nod e name in the Path box (by using th e[...]
-
Page 240
240 Copyright © Acronis International GmbH, 2002- 2015 According to t he original FTP specification, c redentials required for access to FTP se rvers are transferred through a ne twork as plaintext. This means that the user name and p assword can be intercepte d by an eavesdropper using a p acket sniffer. 8 . 1 . 5 W h e n t o v a l i d at e As va[...]
-
Page 241
241 Copyright © Acronis International GmbH, 2002- 2015 8. 2 E x por tin g arc hiv es a nd ba cku ps The export operati on creates a copy of an archi v e or a self-sufficient part copy of an archive in the location you specify. The original archive remains untouched. The export operati on can be applied to: A single archive - an e xact archive [...]
-
Page 242
242 Copyright © Acronis International GmbH, 2002- 2015 The exported archi ve inherits the o ptions of the original arch ive, including e ncryption and th e password. When exporting a password-protected arch ive, you are prompted for t he password. If the original archive is encrypted, the password is used to encrypt the resulting archive. Source a[...]
-
Page 243
243 Copyright © Acronis International GmbH, 2002- 2015 Select the type of objects t o export: Archive - in this case, you need to specify the archi ve only. Backups - you need to specify the archive first, and t hen selec t the desir ed backup(s) in this archive. Browse Select the Archi v e (p. 243) or the Ba ckups (p. 243) . Show access crede nti[...]
-
Page 244
244 Copyright © Acronis International GmbH, 2002- 2015 8 . 2 . 3 A c c e s s c r e d e n t i a l s f o r s o u r c e Specify credentials r equired for access to the location where the source archive, or t he backup is stored. To s pec if y cre de nti als 1. Select one of the f o llowing: Use the current u ser credentials The software will acc [...]
-
Page 245
245 Copyright © Acronis International GmbH, 2002- 2015 After entering acc ess crede ntials, the folders on the se rv er become availab le. Click the appropriate folder o n the server. You can access th e server a s an anonymous user if the server enables such access. To do so , click Use anonymous ac c ess instead of e ntering creden tials. Note A[...]
-
Page 246
246 Copyright © Acronis International GmbH, 2002- 2015 The software will acc ess the destination using th e cred entials you specify. Use this option if the task account d o es not have access per missions to the destinati on. Specify: User name . When en tering the name of an Active D irectory user account, be sure to also specify the domain [...]
-
Page 247
247 Copyright © Acronis International GmbH, 2002- 2015 Select volumes t o mount an d configure the m ount setting s fo r every v olume: assig n a letter or enter the mount po int, choos e the read/writ e or read only access mode. When you complet e all the required steps, clic k OK to mount the vo lumes. 8 . 3 . 1 A r c h i v e s e l ec t io n To [...]
-
Page 248
248 Copyright © Acronis International GmbH, 2002- 2015 Specify: User name . When en tering the name of an Active D irectory user account, be sure to also specify the domain name (DOMAINUsername or Usern am e@domain ). Password . The passw ord for the account. 2. Click OK . According to t he original FTP specification, c redentials require[...]
-
Page 249
249 Copyright © Acronis International GmbH, 2002- 2015 8. 4 O per ati on s ava ila bl e i n va ult s By using vaults, y ou can easil y access archi ves and backup s and perform archive manage ment operations. To p er for m ope ra tio ns wit h ar ch ives a nd ba ck ups 1. In the Navigation pane, select the vault whose archi ves you need to manage. [...]
-
Page 250
250 Copyright © Acronis International GmbH, 2002- 2015 8 . 4 . 2 O p e r a t i o n s wi t h b a c k u p s To p er for m any op er at ion wi th a bac ku p 1. In the Navigation pane, select the vault that c o ntains archives. 2. On the Archive v iew tab of the v ault, select the archive. Then, expand the archi ve and click the backup to select i t. [...]
-
Page 251
251 Copyright © Acronis International GmbH, 2002- 2015 8 . 4 . 3 C o n v e r t i n g a b a c k u p t o f u l l When the chain o f incremen tal backups in an archive becomes lo ng, con v ersion of an incr emental backup to a full one increases the reliability of your archive. You may also want to convert a differential backup if t here are incremen[...]
-
Page 252
25 2 Copyright © Acronis International GmbH, 2002- 2015 Please be aware that consoli dation is just a me tho d of deletion but not an alternative to delet ion. The resulting backup w ill not contain da ta that was present in the deleted backup and was absent from the retained incremental or differential ba ckup. There should be enoug h space in th[...]
-
Page 253
253 Copyright © Acronis International GmbH, 2002- 2015 9 B oot ab le me dia Bootable media Bootable media is physical media (CD, DVD, USB flash drive or other re m ovable media supp orted by a machine BIOS as a b oot device) that boots on any PC-compatible machine and e nables you to run Acronis Backup Agent either in a Linux-based environ ment or[...]
-
Page 254
254 Copyright © Acronis International GmbH, 2002- 2015 Bootable media based on WinPE versi o ns earlier than 4.0 cannot boot on machi nes that use Unified Extensible Fir mware Interface (UEFI). When a machine is booted with a PE -based bootable media, you cannot select optical media such as CD, DVD, or Blu-ray Discs (BD) as a backup destin[...]
-
Page 255
255 Copyright © Acronis International GmbH, 2002- 2015 If you set, say, 10 s ec. for the bo o table agent, the age nt will launch 10 seconds after the menu is displayed. This enables unattended onsi te operation when booting from a PXE server or WDS/RIS. d. [Optional] Remot e logon settings: User name and pa ssword to be entered on the con[...]
-
Page 256
256 Copyright © Acronis International GmbH, 2002- 2015 Prompts for the video mode t o be used by the b ootable media's graphical user interface. Without the vga param eter, the video mode is de te cted auto matically. vga= mode_number Specifies the vid eo mode t o be used by t he bootable m edia's graphical us er interface. The mode numb[...]
-
Page 257
257 Copyright © Acronis International GmbH, 2002- 2015 Uses PCI BIOS calls t o get the interru pt routing table. You m ay want t o use this p arameter if the kernel is unable t o allocate interrupt requests (IRQs) or di scover secondary PCI buses o n the motherboard. These calls might no t work properly on some m achines. But this may be the only [...]
-
Page 258
258 Copyright © Acronis International GmbH, 2002- 2015 9. 1. 1.3 Ne tw or k por t While creating bo o table media, y o u have an option to pre-configure the network port that the bootable agent listens for incoming connecti on. Th e choice is av ailable bet ween: the default port the currently used po rt the new port (en te r the po rt[...]
-
Page 259
259 Copyright © Acronis International GmbH, 2002- 2015 http://www.micr o soft.co m/downloads/details.aspx?f am ilyid=696D D665 -9F76-4177-A811-39C 26 D3B3B34&displa y lang=en Automated Installa tion Kit (AIK) Supplement for Windows 7 S P 1 (PE 3.1) : http://www.micr o soft.co m/download/en/details.aspx ? id=5188 You can find syste m requiremen[...]
-
Page 260
260 Copyright © Acronis International GmbH, 2002- 2015 [Optional] To creat e a 64 -bit bootable media, select the Create x6 4 media check box, if available. A 64-bit m edia is required to boot a machin e that uses Unified Extensible Firmware Interface (UEFI). The software runs the appropriate script and pr o ceeds to t he next wind ow. Whe[...]
-
Page 261
261 Copyright © Acronis International GmbH, 2002- 2015 Configuring network settings To change the net wo rk sett ings for a current session, click Configure ne twork in the startup window. The Network Se tti ngs window that appe ars will allow you to configu re network settings for ea ch network interface card (NIC) of the machine. Changes made du[...]
-
Page 262
262 Copyright © Acronis International GmbH, 2002- 2015 3. Backups created using bootable media ha v e simplified file names (p. 77 ). Standard names are assigned to the backup s only if these are added to an existing archive with stan dard file naming, or if the destination does not support simplified fil e names. 4. The Linux-style bo o table med[...]
-
Page 263
263 Copyright © Acronis International GmbH, 2002- 2015 2. Click Configure i SCSI/NDAS d ev ices (in a Linux-based media) or Run the iSCSI Setu p (in a PE -based m edia). 3. Specify the IP add ress and port of the iSCSI de vice's host, and the name of the iSCSI in itiato r. 4. If the host requires auth entication, specify the user n ame and pa[...]
-
Page 264
264 Copyright © Acronis International GmbH, 2002- 2015 e2fsck mkdir strace e2label mke2fs swapoff echo mknod swapon egrep mkswap sysinfo fdisk more tar fsck mount tune2fs fxload mtx udev gawk mv udevinfo gpm pccardctl udevstart grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautor un zcat hexdump readcd hotp[...]
-
Page 265
265 Copyright © Acronis International GmbH, 2002- 2015 Unless you use the GRUB boot loader and it is install ed in the Master Boot Re co rd (MBR), Acr onis Startup Recover y Manager activ ation overwri tes the MBR with its own boot c o de. Thus, yo u may need to reactivate third-party boot loaders if they are installed. Under Linux, when usin g a [...]
-
Page 266
266 Copyright © Acronis International GmbH, 2002- 2015 Acronis PXE Server run s as a service immediat ely after installation. Later on it will automatically launch at each sys tem restart. You can stop and start Acronis PXE Server in th e same way as other Windows services. 9 . 6 . 2 S e t t i n g u p a ma c h i n e t o b o o t f r o m PX E For ba[...]
-
Page 267
267 Copyright © Acronis International GmbH, 2002- 2015 10 D isk m an ag eme nt Acronis Disk Direc tor Lite is a t o ol for preparin g a machine disk/volume configuration f o r recovering the volume images saved by the Acronis Backup software. Sometimes after t he volum e has been back ed up and its image placed into a safe storage, the machine dis[...]
-
Page 268
268 Copyright © Acronis International GmbH, 2002- 2015 1. Back up the disk o n which v olumes will be created or managed. Ha v ing your m ost important data backed up to another hard disk, network share o r rem o vable media will allow you to work on disk volumes being r eassured that your data is safe. 2. Test your disk to ma ke sure it is fully [...]
-
Page 269
269 Copyright © Acronis International GmbH, 2002- 2015 10 .5 "D is k m an age men t" vi ew Acronis Disk Direc tor Lite is contr o lled through th e Disk mana g ement view of t he console. The top part of the v iew co ntains a disks and volumes table enabli ng data sorting and colu mns customization and t oolbar. The table presents th e n[...]
-
Page 270
270 Copyright © Acronis International GmbH, 2002- 2015 1 0 . 6 . 1 D i s k i ni t i a l i z at i o n If you add any n ew disk to your m achine, Acr onis Disk Director Lite will n otice the configuration change and scan the added disk to include it t o the dis k and volume list. If t he dis k is st ill not initialized or, possibly, has a file struc[...]
-
Page 271
271 Copyright © Acronis International GmbH, 2002- 2015 10 .6 .2 .1 Se lec ti ng s ou rc e a nd ta rg et di sk s The program displa ys a list of partitioned disks and asks the user to select t he source disk, from which data will be transferred to another disk. The next step is s election of a disk as target for the clo ning operation. The program [...]
-
Page 272
272 Copyright © Acronis International GmbH, 2002- 2015 You have the follo wing two alternatives to retain sy stem b o otability on th e targe t disk volu m e: 1. Copy NT signature – to provide the t arget disk with the source disk NT signatur e matched with the Registry keys als o copied on the target disk. 2. Leave NT signatur e – to keep the[...]
-
Page 273
273 Copyright © Acronis International GmbH, 2002- 2015 Dynamic disk conversi on: MBR to GPT Acronis Disk Direc tor Lite does n o t support direct MBR to GPT conversi on for dynamic disk s. Howev er you can perfor m the followin g conversions to reach the g oal using the pr o gram: 1. MBR disk conversion : dynamic to basic (p. 274) using the Conver[...]
-
Page 274
274 Copyright © Acronis International GmbH, 2002- 2015 System disk conversio n Acronis Disk Direc tor Lite does n o t require an o peratin g system reboot after basic to dynamic conversion of the dis k, if: 1. There is a single Windows 2008 / Vista operatin g system installed on the dis k. 2. The machine runs this operating system. Basic to dynami[...]
-
Page 275
275 Copyright © Acronis International GmbH, 2002- 2015 safe conversion of a dynamic disk to basic when it contains volumes with data for simple and mirrored volu mes in multiboot syste ms, bootability of a system that was offline during the operation 1 0 . 6 . 7 C h a n g i n g di s k s t a t u s Changing disk status is effective for Windo[...]
-
Page 276
276 Copyright © Acronis International GmbH, 2002- 2015 Store backups (image s) of other volumes/disks o n a special volum e; Install a new operating system (or swap file) o n a new volu m e; Add new hardwar e to a machine. In Acronis Disk Dire cto r Lite the to o l for creating vo lumes is the Create volume Wiz ard . 10 .7 .1 .1 Ty pe [...]
-
Page 277
277 Copyright © Acronis International GmbH, 2002- 2015 and is able to o v ercome the physical dis k size limitations wi th a higher than mirrored disk- to -volume size ratio. 10 .7 .1 .2 Cr ea te v ol um e w iz ar d The Create volume wizard lets you create any typ e of volume (including syst em and active), select a file system, label, assign a le[...]
-
Page 278
278 Copyright © Acronis International GmbH, 2002- 2015 To create a RAID- 5 volume : Select three destinati on disks to create the v o lume o n. After you choose the disks, the wizard will calculate the maximu m size of the resulting v olume, depending on the size of the unalloca ted space on the disks y o u chose and the requ irem ents of the [...]
-
Page 279
279 Copyright © Acronis International GmbH, 2002- 2015 If you are creating a ba sic volume, which can be made into a system volu me, this page will be different, giving you the opportunity to select the volume Type — Primary ( Active Primar y ) or Logical . Typically Primary is selected to install an operating s ystem to a volume. Select th e Ac[...]
-
Page 280
280 Copyright © Acronis International GmbH, 2002- 2015 1 0 . 7 . 3 S e t a c t i v e v ol u m e If you have several pri mary volumes, you m ust specif y one to be the b oot volume. For this, you can set a volume to be come active. A disk can have o nly one acti v e volume, s o if you set a volume as active, the volum e, which was active bef o re, [...]
-
Page 281
281 Copyright © Acronis International GmbH, 2002- 2015 an application v o lume, DAT A — a data volum e, etc., b ut it does not imply that only the type of data stated with the label could be stored on such a v o lume. In Windows, volu me labels are shown in the Explorer disk and folder tree: LABEL 1 (C:), LABEL2( D: ), LABEL3(E:), etc. LABE L1, [...]
-
Page 282
282 Copyright © Acronis International GmbH, 2002- 2015 10 .8 Pe ndi ng op er ati ons All operations, which were prepared by the user in manual mode or with the aid of a wizard , are considered pendin g until the user issues the specifi c command for the change s to be made permanent. Until th en, Acronis Disk Director Lit e will only demonstrate t[...]
-
Page 283
283 Copyright © Acronis International GmbH, 2002- 2015 11 Pr ot ec ti ng ap pli ca ti on s wit h dis k- le vel b ack up This section describes how to use a disk-level backup to protect applications runn ing on Windows servers. This information is v alid for bo th physical and virtual machin es, no matter if the v irtual machines are backed up at a[...]
-
Page 284
284 Copyright © Acronis International GmbH, 2002- 2015 If the application databa ses are located on a nu mber of machines, back up all o f the machines on the same schedule. F o r exampl e, include all of the SQL ser vers belonging to a Shar ePo int farm in a centralized backup plan running on a fixed schedule. Use Volume Shadow C opy (VSS) Micros[...]
-
Page 285
285 Copyright © Acronis International GmbH, 2002- 2015 option is effecti v e on a phy sical m achine and on a virtual machine wher e Agent for Windows is installed. Other available s olutions inclu de: 1. Truncating the logs manually or by using a scrip t. For more information, se e "Truncating transaction logs" (p. 2 88) 2. For Microsof[...]
-
Page 286
286 Copyright © Acronis International GmbH, 2002- 2015 Create Table ##temp ( Da tabaseName sysname, Na me sysname, ph ysical_name nvarchar(500), si ze decimal (18,2), Fr eeSpace decimal (18,2) ) Exec sp_msforeachdb ' Use [?]; Insert Into ##temp (D atabaseName, Name, phy sical_name, Size, Free Space) Se lect DB_NAME() AS [DatabaseN ame], Name,[...]
-
Page 287
287 Copyright © Acronis International GmbH, 2002- 2015 Tracks how far Exchan ge has progressed in writing log ged information to the dat abase file. To find out the dat abase file and log fil e paths, proceed as foll o ws. Exchange 2010 Execute the following commands by using Exchange Manag ement Shell: Get -MailboxDatabase | Format -List -Proper [...]
-
Page 288
288 Copyright © Acronis International GmbH, 2002- 2015 11 .1 .1 .4 Sh ar eP oin t da tab as e f il es SharePoint store s content, auxiliary SharePoint se rvices' data and farm configuration in Mi crosoft SQL Server databases. To f ind d ata ba se fi les i n S ha reP oi nt 20 10 or l ate r 1. Open Central Ad mi nistrati on site. 2. Select Upgr[...]
-
Page 289
289 Copyright © Acronis International GmbH, 2002- 2015 Log file shrinking . L o g file s hrinking reduces the physical size of a l og file by removing the inac tive virtual log files. Shrin king is most effec tive after log truncation. For more inf o rmation abou t shrinking refer to the foll o wing article: http://technet. m icrosoft.c o m/en[...]
-
Page 290
290 Copyright © Acronis International GmbH, 2002- 2015 Where: myServer - name o f the server instanceN a me - name of the instan ce C: mySc r ipt.sq l - path to the scrip t file created in the step 1. To a uto ma te tr ans ac tio n log t ru nca ti on and s hr ink ing f or mu lt ipl e S QL i ns tan ce s If you have more than one instan[...]
-
Page 291
291 Copyright © Acronis International GmbH, 2002- 2015 1. Dismount the da tabase (in Exchan ge 2010) or all databases of t he storage gr oup (in Exchange 2003/2007). F o r more inf o rmation, se e: Exchange 2010 : http://tech net.m icrosoft.c om/en-us/library/bb123903 Exchange 2007 : http://tech net.m icrosoft.c om/en-us/library/bb124936(v[...]
-
Page 292
292 Copyright © Acronis International GmbH, 2002- 2015 2. In the mounted v olumes, deter m ine which logs have been committed to the database by using the Eseutil tool. The procedure is described in step 1 of "Log truncation of online databases " above. 3. In the respecti v e online datab ase or storage group, delete all the log files wh[...]
-
Page 293
293 Copyright © Acronis International GmbH, 2002- 2015 The volumes where t he Active D irectory databas e and the transaction logs (p. 287) are l ocated The volume with the SYSVOL folder. The default location of this folder is %Syste mR oot%SYSVOL . To determine the curr ent location of this folder , e xamin e the Sysvol value in the fo l[...]
-
Page 294
294 Copyright © Acronis International GmbH, 2002- 2015 To bring a backed-up datab ase back to production, rec over the database files from a dis k backup. For details, see "Recov ering SQL Server databases from a disk backup " (p. 294). If you only need te mpo rary acc ess to th e backed-up databases for da ta mining or data extraction, [...]
-
Page 295
295 Copyright © Acronis International GmbH, 2002- 2015 b. Select the volume( s) contain ing the SQL Server database files. F o r the instruc tio ns on h ow to find out the databas e paths, refer to "SQL Server data base files" (p. 285). c. Choose the Read/ write access mod e. d. Specify drive letters that will be assigned to the mounted [...]
-
Page 296
296 Copyright © Acronis International GmbH, 2002- 2015 By using Acronis Bac kup, you can recover Exchan ge database files from a disk backup. To bring a database online, mount it. For details, see "Mounting Exchange Server databases " (p. 296). If you need to perfor m granular recovery of individual mailboxes or their ite m s, mount the [...]
-
Page 297
297 Copyright © Acronis International GmbH, 2002- 2015 1 1 . 3 . 3 G r a n u l a r r e c o v er y o f m ai l bo x e s RDB (RSG) is a spe cial administrative database (s to rage group) in Exchange Server. It lets y o u extract data from the m o unted ma ilbox database. Th e extracted data can be copied or merged to the existing mailboxes witho ut d[...]
-
Page 298
298 Copyright © Acronis International GmbH, 2002- 2015 Steps to perform If the domain has other domain controllers, y o u can perfor m nonauthori tative restore of a lost domain controller in either of these ways: Recover a domain controller from a backup by using a bootable media. Ensure t hat there is no USN rollback proble m (p. 300). R[...]
-
Page 299
299 Copyright © Acronis International GmbH, 2002- 2015 Changes to Active D irectory that o ccurred af te r the b ackup had been made will be los t. Re -creation of the d omain controller is not an option. Even a backup with an expired tombstone lifeti me can be used. You need to recover the volumes that store Active D irectory da tabas[...]
-
Page 300
300 Copyright © Acronis International GmbH, 2002- 2015 d. On the General tab, clic k Start . After the service s tarts, click OK . Details. This change is needed because the Acronis agent ser vice on a domain controller run s under a domain user account, but domain us er accoun ts are unavailable in Directory Services Restore Mode. 5. Start Acroni[...]
-
Page 301
301 Copyright © Acronis International GmbH, 2002- 2015 A USN rollback is unli ke ly to o ccur when you r ecover an entire domain c ontroller from a VSS-base d disk-level backup. A USN rollback is hig hly probable if any of the f o llowing is true: A domain controll er was recovered partially: not all di sks or volumes were rec overed or only t[...]
-
Page 302
302 Copyright © Acronis International GmbH, 2002- 2015 Value name: Data base restored from backup Value data: 1 6. Restart the do main controller in normal mode. 7. [Optional] After the domain controller restarts, open Event Viewer, expand Application an d Services Logs , and then select the Directory Serv ices log. In the Directory Servi [...]
-
Page 303
303 Copyright © Acronis International GmbH, 2002- 2015 3. If you have reco v ered the databa se to a non-original SQL serv er of the original Sh arePoint farm, attach the reco vered database t o the far m . To do this, run the f o llowing com m and on a fr o nt -end Web server: In SharePoint 20 1 0 or later : Mount -SPContentDatabase <database&[...]
-
Page 304
304 Copyright © Acronis International GmbH, 2002- 2015 stsadm.exe -o a ddcontentdb - url <site url> -databas ename <database> -data baseserver <database server> 1 1 . 5 . 2 R e c o v e r i n g c o n f i g u r at i o n a n d s e rv i ce d a t a b a s e s Configuration and se rvice databa ses must be synchronized with other databas[...]
-
Page 305
305 Copyright © Acronis International GmbH, 2002- 2015 c. To change the ser ver on which you want to st o p the s erv ice, in the Server list, cli ck Change Server , and then clic k the r equired server name. d. By default, only c o nfigurable ser v ices are displa ye d. To view all s erv ices, in the View list, click All . e. To stop a se rv ice,[...]
-
Page 306
306 Copyright © Acronis International GmbH, 2002- 2015 5. Detach the database and unmount the previ o usly mo unted volume as described in steps 7-8 of "Accessing SQL Ser ver databases fr om a disk backup" (p. 294). To r ec ove r S ha reP oi nt it em s from a n una tt ach ed da tab as e 1. Attach the content database to an SQL Server ins[...]
-
Page 307
307 Copyright © Acronis International GmbH, 2002- 2015 12 Pr ot ec ti ng Mi cr oso ft S QL Ser ve r wit h si ngl e-p as s b ack up This section describes how to use single-pass disk and application bac kups to protect Microsof t SQL Server data. A single-pass backup operation creates an application- aware disk backup which en ables browsing and re[...]
-
Page 308
308 Copyright © Acronis International GmbH, 2002- 2015 Mounting databases By using the agent, you can temporarily attach a ba cked-up database to a running SQL Server instance and use third- party tools t o get various o bjec ts from this database. 1 2 . 1 . 2 S u p p o r t e d o p e r a t i n g s y s t e ms Agent for SQL can be installed in the f[...]
-
Page 309
3 09 Copyright © Acronis International GmbH, 2002- 2015 Granting the permissions to the agent During installati o n, the setup pro gram includ es the agent ser vice account in the Backup Operators group. If you ch o ose to create a n ew account for the a gent, this account is also inclu ded in the Administrators gr o up. Therefore , t he agent al [...]
-
Page 310
310 Copyright © Acronis International GmbH, 2002- 2015 12 .2 In sta ll ati on of Ag en t for S QL Agent for SQL can o nly be i nstalled o n a m achine runn ing Microsoft SQL Server. Rem o te installation of the agent is no t possible. The agent is included in t he se tup program o f Acronis Backup Advanced. The agent is installed with Agent for Wi[...]
-
Page 311
311 Copyright © Acronis International GmbH, 2002- 2015 Follow these recom mendations to ensure that a single- pass backup is successful. Back up entire ma chines. This will allow y ou to re cover both the operating sy stem and an y SQL database present on a machine. Databases may be s to red on m o re than one disk or volume. To ensure that al[...]
-
Page 312
312 Copyright © Acronis International GmbH, 2002- 2015 Leave the setting disabled if you use a third-party appli catio n, such as the SQL Server backup and restore compon ent, for backin g up the SQL Server data. Log truncation and ignoring application errors are mutually exclusive. This pre vents truncating the Microsoft SQL lo g if the applicati[...]
-
Page 313
313 Copyright © Acronis International GmbH, 2002- 2015 Rename the re c overed dat abase This setting lets y o u retain the e xisting datab ase. A recovered database will h ave the following name: < o riginal d a tabase name> -Recovere d . If a databas e with this name already exists, the r ecovered database will be named as follows: <[...]
-
Page 314
314 Copyright © Acronis International GmbH, 2002- 2015 Active Restore supp o rts the foll o wing backup locations: A local folder on the machine where the rec o very is p erfo rmed (exc ept optical disks). Acronis Secure Z o ne. A network share. To use Active Res to re, enab le it on the Recover data page (p. 132) und er How to r ecove[...]
-
Page 315
315 Copyright © Acronis International GmbH, 2002- 2015 12 .5 Mo unt in g S QL Se rve r da tab ase s fro m a sin gle -p ass ba ck up When you mount a bac ked-up SQL database, it is t emporarily attached to your SQL Server in the read-only mode. You can access the database lik e any other databas e of the instance. Mounting databases comes in handy [...]
-
Page 316
316 Copyright © Acronis International GmbH, 2002- 2015 If the selected databas e is in use, Acronis Backup for cibly disconnects all users from the database and then unmounts i t. 12 .6 Pr ote ct ing c lu ster ed SQ L Ser ver i ns ta nce s and AA G SQL Server high-av ailability solutions The Windows Serv er Failover Clu ste ring (WSF C) functi o n[...]
-
Page 317
318 Copyright © Acronis International GmbH, 2002- 2015 13 Pr ot ec ti ng Mi cr oso ft A cti ve D ir ec tor y wi th si ng le -p ass b ac ku p This section describes how to use single-pass disk and application bac kups to protect the Acti ve Directory Domain Ser vices role of Micros o ft Active Direct o ry. The single-pass ba ckup functionalit y bec[...]
-
Page 318
319 Copyright © Acronis International GmbH, 2002- 2015 Acronis Backup f o r Windows Ser ver Essentials Acronis Backup Advanc ed for VMware / Hyper-V / RH EV / Citrix XenServer / Orac le VM Acronis Backup Advanc ed Universal License Each of these licens es enables you to install Agent f o r Windows on the same machine. If Agent f or Win[...]
-
Page 319
320 Copyright © Acronis International GmbH, 2002- 2015 1 3 . 5 . 1 Re - pr o m o t i n g t h e d o m ai n c o n t r ol l e r This method of rec overing the data is availab le only if the domain has other domain contr o llers. It does not require ha ving a backup. To recover Micros o ft Activ e D irectory, use the Dcpromo tool to demote th e domain[...]
-
Page 320
321 Copyright © Acronis International GmbH, 2002- 2015 b. Copy all of the con tents from each of these f o lders to the roo t of the co rresp o nding disk drive. For example , copy the contents from the Drive(C) folder to C:/ and from the Drive ( E) folder to E:/ . Cho o se to overwrite the files, if prompted. Completing the rec overy 1. If the do[...]
-
Page 321
322 Copyright © Acronis International GmbH, 2002- 2015 14 A dmi ni st er in g a ma nag ed ma ch in e This section describes the views that are availabl e through the navigati o n tree of t he console connected to a man aged machine and explains h ow to work with each vie w. T his section also covers supplementary operati ons that can be perfor m e[...]
-
Page 322
323 Copyright © Acronis International GmbH, 2002- 2015 To Do Validation task (p. 237 ) View details of a plan /task Click Details . In the respective Plan Det ails (p. 331 ) or Task Deta ils (p. 332) wind ow, review the plan or task details. View plan's/task's log Click Log . You will be taken to the Log (p. 332 ) view containing the[...]
-
Page 323
324 Copyright © Acronis International GmbH, 2002- 2015 To Do Edit a plan /task Click Edit . Backup plan ed iting is performed in the sa me way as creation (p. 55 ), except for the following limitation s : It is not always possible to u se all scheme op tions, when editing a backup plan if the created archive is n ot empty (i.e. conta ins backups).[...]
-
Page 324
325 Copyright © Acronis International GmbH, 2002- 2015 S tat e H ow i t is de ter min ed H ow to han dl e 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition . This situation is quite n ormal, but delaying a backu p for too long is risky. T[...]
-
Page 325
326 Copyright © Acronis International GmbH, 2002- 2015 Once the task is s tarted manuall y or the event spe cified by the schedule oc curs, the task enters either the Running state or t he Waiting state. Running A task changes to the Running s tate when the event specified b y the schedu le occurs AND all the conditions set in the backup plan are [...]
-
Page 326
327 Copyright © Acronis International GmbH, 2002- 2015 You can edit plans in the Acronis Backup graphical us er interface when importing them or afte r. Backup plans are exp o rted to .xml files, s o you can edit the exp ort files o f backup plan s (p. 327) with text editors. Passw o rds are e ncrypted in the export files. Usage examples Agent[...]
-
Page 327
328 Copyright © Acronis International GmbH, 2002- 2015 To modify credentials, change the <login> and <pa ssword> tags in the correspondin g sections: plan's credentials – the <plan><options ><common_parame ters> secti on access credentials f or the backed-up data – the <pla n><targe t s>&l[...]
-
Page 328
329 Copyright © Acronis International GmbH, 2002- 2015 1. Delete the <ID> tag. 2. Edit the value of th e <Path> tag , which c ontains inf ormation about data to back up; f o r example, replace " C: " wi th " D: ". Replacing a directly specified item with a select ion template Inside the <plan ><options>&[...]
-
Page 329
330 Copyright © Acronis International GmbH, 2002- 2015 1 4 . 1 . 4 D e p l o y i n g b a c k u p p l a n s a s fi l e s Assume that for so m e reason y o u cannot run Acronis Backup Managem ent Server in your environment, but yo u need t o apply one and the sa me backup plan to m ultiple mach ines. A good decision is to export the backup plan from[...]
-
Page 330
331 Copyright © Acronis International GmbH, 2002- 2015 <key name="Import"> <value name="Folde rPath" type="TString"> "/us r/lib/Acronis/Bac kupAndRecovery/import" </value> </key> The change will be app lied after a restart of t he agent. To restart the agent, run t he fo llowing comma[...]
-
Page 331
332 Copyright © Acronis International GmbH, 2002- 2015 History The History tab lets you examine the history o f all the backup plan's accomplished activiti es. What to back up The Source tab pro v ides the foll o wing inf o rmation on the data selected for backup : Source type - the type o f data selected for backing up. Items to back[...]
-
Page 332
333 Copyright © Acronis International GmbH, 2002- 2015 1 4 . 2 . 1 A c t i o ns o n l o g e n t r i e s All the operations des cribed below are perform ed by clicking the corresponding i tems on the log toolbar . These opera tio ns can also be performed with t he context m enu (by right-clicking the l og entry or the activit y). The following is a[...]
-
Page 333
334 Copyright © Acronis International GmbH, 2002- 2015 To view details of t he next or t he pre v ious log entry, click the down arrow but to n or corresp o ndingly the up arrow button. To copy the details, click the Copy to clipboard butt on. Log entry data fields A log entry contains the following data fields: Type - Type of e v ent (Error ;[...]
-
Page 334
335 Copyright © Acronis International GmbH, 2002- 2015 To export entire t able contents to a *.txt or *.c sv file, click Save all to file . Configuring alerts Use the following o ptions at the to p of the Ale r ts view to configu re alerts: Show/hide alert s (p. 31 ) - sp ecify the alert t ypes to display in the Alerts view. Notifications [...]
-
Page 335
336 Copyright © Acronis International GmbH, 2002- 2015 To change a license f or a virtualization host (exc ept for a clustered host), conn ect the console to the management s erver, navigate to Virtual ma c hines > Ho s ts and clus ters , right-click the ho st, and then click Chan g e license . To change licens es for all of the h osts [...]
-
Page 336
337 Copyright © Acronis International GmbH, 2002- 2015 It determines Acr onis Backup behavior when the syst em is shutting down. The s ystem shutdown occurs when the m achine is turned o ff or restart ed. The preset is: Stop r unning ta s ks and shut do w n. If you select Stop run ning tasks and shut do w n , all of the running Acro nis Backup tas[...]
-
Page 337
338 Copyright © Acronis International GmbH, 2002- 2015 14 .6 .3 .2 Ti me -ba se d al ert s Last backup This option is effe ctive when the console is co nnected to a managed m achine (p. 443) or to the management ser v er (p. 444 ). The option defines whether to alert if no backup was performed on a given mac hine for a period of time. You can conf[...]
-
Page 338
339 Copyright © Acronis International GmbH, 2002- 2015 5. If the outgoing mail s erver requires authenticati on, enter User name and Passwo rd o f the sender's e-mail ac co unt. If the SMTP server do es not require auth entication, leave the User name and Password fields blank. If you are n ot sure wh ether the SMTP ser ver re quires authenti[...]
-
Page 339
340 Copyright © Acronis International GmbH, 2002- 2015 You can override the settings set here, exclusively fo r the e v ents that oc cur during backup or during recovery, in the D efault backup and recovery options. In this case, th e settings set here will be effective for opera tio ns ot her than backup and recovery, such as archive validation o[...]
-
Page 340
341 Copyright © Acronis International GmbH, 2002- 2015 1. Start > Control Pane l > Add or R emove Pro gr ams > A dd/Remove Windows Com ponents. 2. Select Management an d Monitoring Tools . 3. Click Details. 4. Select the Simple Netw ork Management Protocol check box. 5. Click OK. You might be ask ed fo r lmmib2.dll t hat can be fo und on [...]
-
Page 341
342 Copyright © Acronis International GmbH, 2002- 2015 In Windows XP and Ser ver 2003: %ALLUSERSP ROFILE%Application DataAcronisBa c kupAndRecove ry MMS events.db3 . In Windows Vista an d later versions of Windows: %PRO G RAMDATA%A c ronisBackupAnd Recovery MMS events.db3 . In Linux: /var/lib/A c ronis/Backup AndRecovery/MMS/e[...]
-
Page 342
343 Copyright © Acronis International GmbH, 2002- 2015 To s et up pr ox y s er ver s ett in gs 1. Select the Use a pro xy server check box. 2. In Address , specif y the network name or IP address of the proxy server — for example: proxy.example.com or 192.168.0 .1 3. In Port , specify the p ort number of the proxy ser ver — for example: 80 4. [...]
-
Page 343
344 Copyright © Acronis International GmbH, 2002- 2015 15 C en tra li zed m ana ge me nt This section covers o perati o ns that can b e performed centrall y by using the components for centralized manage ment. The content of this se ction is only applicable to Acr onis Backup Advanced. 15 .1 Un der st and in g c en tra li zed m ana ge me nt This s[...]
-
Page 344
345 Copyright © Acronis International GmbH, 2002- 2015 Storage Node (p. 4 4 5) and configu re it to m anage a ce ntralized vault or multiple centralized vault s. Such vaults are call ed managed vaults (p. 443). The storage node helps the agent deduplicate (p. 4 39) backups bef ore transferring them to m anaged vaults and dedup licates the backups [...]
-
Page 345
346 Copyright © Acronis International GmbH, 2002- 2015 15 .1 .2 .2 Pr iv ile ge s fo r loc a l c onn ect io n Windows Local connection on a machine running Wind o ws can be established by any user who has the "L og on locally" user right on the machin e. Linux Establishing a local c onnection on a machine running Linux, and managing such[...]
-
Page 346
347 Copyright © Acronis International GmbH, 2002- 2015 To d is abl e U AC Do one of the foll o wing depend ing on the operating system: In a Windows op erating system prior to Windo w s 8: Go to Control pane l > View by: S mall icons > User A ccounts > Change User A cc oun t Control Settings , and then move the slider to Never notif y[...]
-
Page 347
348 Copyright © Acronis International GmbH, 2002- 2015 2. Add the names of the non-root users, whom you wan t to allow to connect to the machine remotely, to the Acro nis_Trusted group. For exa m ple, to add the existing user user_a to the group, run the foll owing command: usermod -G Acronis_Trusted user_a 3. Edit the file /etc/pa m. d/acro nisag[...]
-
Page 348
349 Copyright © Acronis International GmbH, 2002- 2015 Acronis Centralized Admins A user who is a m ember of thi s group is a management ser ver administra tor. Management server administrat o rs can c o nnect to the manag ement server by using Acronis Backup Management Cons o le; they hav e the same m anagem ent rights on the registered machin es[...]
-
Page 349
350 Copyright © Acronis International GmbH, 2002- 2015 This section also pro vides information on configurin g communication settings, se lect ing a netw o rk port for com munication, an d m anaging securit y certificates. 15 .1 .3 .1 Se cu re co mm un ica ti on Acronis Backup pro vides the capab ility to secure the data transf erred between its c[...]
-
Page 350
351 Copyright © Acronis International GmbH, 2002- 2015 15 .1 .3 .3 Co nf ig uri ng c om mu ni ca tio n se tt ing s You can configu re communication s ettings, such as whether t o encrypt transferred data, f or Acronis Backup component s installed on one or more ma chines, by using Acronis Admini strative Template. For information o n how to l oad [...]
-
Page 351
352 Copyright © Acronis International GmbH, 2002- 2015 Linux Specify the port in the /etc/Acronis /Policies/Agent.config file. Restar t the acronis_agent dae mon. Configuring the port in a bootable environment While creating Acronis bootable media, you ha v e the option to pre-configure the network port that will be used by th e Acronis Backup Boo[...]
-
Page 352
353 Copyright © Acronis International GmbH, 2002- 2015 "%CommonProgramFiles% Acronis Utils acroniscert" -- reinst all When using a 64-bit ver sion of Windows: "%CommonProgramFiles( x86)% Acronis Utilsacroniscer t" -- reinstall 4. Restart Windows, or restart the runnin g Acronis services. Non -self-signed certificates[...]
-
Page 353
354 Copyright © Acronis International GmbH, 2002- 2015 15 .3 Cr eat in g a c ent ra liz ed ba ck up pl an A centralized backup plan can be applied to both Windows and Linux machines. The steps required fo r the creating centralized backup plan are si milar to creating a backup plan (p. 55 ) except the f ollowing: When selecting wha t data to b[...]
-
Page 354
355 Copyright © Acronis International GmbH, 2002- 2015 Backing up an entir e virtual machine, its disks, o r volumes y ields a standard disk backup (p. 439). In addition, this backup stores the virtual machine configuration. This configuration will be suggested by default when re covering the backup con te nt to a n ew virtual machine. F o r more [...]
-
Page 355
356 Copyright © Acronis International GmbH, 2002- 2015 Notes for Linux us ers: Logical volumes and MD devices are shown under Dynamic volumes . For more information ab out backing up such volu m es and devices, see "Backup and recovery of l o gical volu m es and MD de v ices (Linu x)" (p. 43 ). Note for Linux us ers: We re commen[...]
-
Page 356
357 Copyright © Acronis International GmbH, 2002- 2015 Some environmen t v ariables point to Windows folder s. Using such variables instead of full fo lder and file paths ensures tha t proper Windows folders are backed up regardless o f where Wind ows is located on a particular machine. To i ncl ude I n t he Fil es an d f ol der s co lu mn, ty pe [...]
-
Page 357
358 Copyright © Acronis International GmbH, 2002- 2015 1 5 . 3 . 3 S e l ec t i o n r u l e s f o r v o l u m e s Define volume sel ect ion rul es, according to which the vo lumes o n the machines included in the centralized backup plan will be backed up. To d efi ne v olu me se lec ti on ru les 1. Select the rule fro m the drop-down list ( o r ty[...]
-
Page 358
359 Copyright © Acronis International GmbH, 2002- 2015 To i ncl ude I n t he sel ec tio n rul es box : Co mm ent s First disk Type or select: [Disk 1] Refers to the first disk of the r egistered machine, including all volu mes on that d isk. Li nu x v ol umes First partition on th e first IDE hard disk of a Linux machine Type or select: /d ev/hda1[...]
-
Page 359
360 Copyright © Acronis International GmbH, 2002- 2015 case, you can type either /dev/hda3 or /ho m e/usr/do cs in the Volu me field t o perform a disk backup of the third parti tio n. In general, when set ting up a centralized backup plan t o perform v olume backup s of Linux machines, make sure that the paths entered in the selecti o n rules for[...]
-
Page 360
361 Copyright © Acronis International GmbH, 2002- 2015 1. Selecting the archiv es destination Choose where to st o re mac hines' archives: Store all machines' archives in a single lo cation To back up data t o Acronis Clou d Storage, click Lo g in and specify the cr edentials to log in to the cloud storage. Then, expand the Cloud[...]
-
Page 361
362 Copyright © Acronis International GmbH, 2002- 2015 FINDEPT3_SYSTE M BACKUP_Arch ive (1) 1 5 . 3 . 5 C e n t r a l i z e d b a c k u p p l a n ' s c r e de n t i a l s Provide the credentials un der which the centraliz ed tasks will run on the machin es. To s pec if y cre de nti als 1. Select one of the f o llowing: Use Acronis ser[...]
-
Page 362
363 Copyright © Acronis International GmbH, 2002- 2015 /dev/sda1 volu m e. This is b ecause the [SYSTEM] volu m e is not f o und. The plan will get the Error status on Linux mach ines that do not have a SCSI de vice. 15 .4 Ad min is ter in g A cro nis Ba ck up Man ag em ent Se rv er This section describes the views that are availabl e through the [...]
-
Page 363
364 Copyright © Acronis International GmbH, 2002- 2015 Applications The Application s section di splays the number of protected and unprotected applications running on the registered machin es. An application on a m achine is c o nsidered prot ected if the respective ag ent is installed on that machine in the trial mode or wi th a license key. If [...]
-
Page 364
365 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .2 .1 Ma ch in e g ro up s Machine groups are designed for convenien t protection o f a large number o f ma chines registered on the management s erver. While creating a centralized backup plan, select a group and the plan will be deployed to all machin es of this group. Once a new machi[...]
-
Page 365
366 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .2 .2 Ac ti on s o n ma chi ne s Registering machines on the management server Once the machine is added or imported to the All machines with agen ts group, it bec omes registered on the m anagement se rver. Register ed machines are available for deploying centraliz ed backup plans and f[...]
-
Page 366
367 Copyright © Acronis International GmbH, 2002- 2015 To Do Add a machine to a nother static group Click Add to another group . In the Add to group (p. 370 ) wind ow, specify the group t o copy the selected machine to. The centralized b ackup p lans of the groups the machin e is a member of will be deployed t o the machine. Fo r mac hin es in cus[...]
-
Page 367
368 Copyright © Acronis International GmbH, 2002- 2015 To Do Upgrading from Acron is Backup to Acron is Backup Advanced Update all information related to the machine Click Synchronize . The management serv er will query the machine an d update the datab ase with the most recent information . Along with synchron izing, the re fresh operation wi[...]
-
Page 368
369 Copyright © Acronis International GmbH, 2002- 2015 2. Select from the menu Options > Ma c hine options > Machine management . 3. Select Centralized management and specify the mana gement server where t o register the machine. Refer to "Machine manag ement (p. 342)" for details. S yn chr on iz ing m ac hin es w it h a t ex t f i[...]
-
Page 369
370 Copyright © Acronis International GmbH, 2002- 2015 To s yn chr on ize m ach in es w it h a t ex t f il e u si ng com ma nd li ne 1. Log on as a me m ber of the Acron i s Centralized Admi ns security gr oup. 2. In the command pr ompt, change the directory to the folder where Acronis Backu p Management Server has been install ed — by default: [...]
-
Page 370
371 Copyright © Acronis International GmbH, 2002- 2015 Machine The tab displays th e followi ng information on the regis te red machine : Name - name of t he select ed machine (taken from th e Computer name in Wind o ws). Registration ad dress - compu ter name or IP address of the selected machine. D uring t he registration of a m achine ([...]
-
Page 371
372 Copyright © Acronis International GmbH, 2002- 2015 For the list of the o peration s av ailable with m achine's backup plans and tasks, see "Actions on backup plans and tas ks" (p. 322). Filtering and so r ting Filtering and sortin g o f the backup plans and task is performed as described in "Sorting, filterin g and configur[...]
-
Page 372
373 Copyright © Acronis International GmbH, 2002- 2015 To Do Click Add machine to AMS . In the Add m achine (p. 368 ) window, select the machin e that needs to b e added to the man agement server. Synchronize machines with a list in the text file This action is enabled on ly for the Machine s with agents view an d for the All machines with agents [...]
-
Page 373
374 Copyright © Acronis International GmbH, 2002- 2015 To Do The management con sole will updat e the list of groups from the manage ment server with the most rec ent information. Though t he list of groups is refreshed automatically b ased on events, the dat a may not be retrieved immediately from the manag ement server due to some lat ency. Manu[...]
-
Page 374
375 Copyright © Acronis International GmbH, 2002- 2015 These criteria will add to the same group all of th e machines whose operating system is Windows 2003 o r Windows 200 8 and belong to the S ERVERS organizational unit and whose IP addresses are within the range 192.168.1 7 .0 - 192.168.17.5 5 . Or ga n iza ti ona l un it cr it eri on Organizat[...]
-
Page 375
376 Copyright © Acronis International GmbH, 2002- 2015 The root folder o f the mac hines tree contains groups of the first le vel . Groups that include other groups are called par ent groups . Groups that are in pa rent groups are called child groups . All th e centralized backup plans created for the paren t group will be depl oyed to the machi n[...]
-
Page 376
377 Copyright © Acronis International GmbH, 2002- 2015 To Do The centralized backu p plan cannot be ru n manually, if at least one of the machines included in the plan runs Acron is Backup & Recov ery 10 agent. Stop a backu p plan Click Stop . Stopping the run ning backup plan stops all its task s on all the machine s the plan is deployed to. [...]
-
Page 377
378 Copyright © Acronis International GmbH, 2002- 2015 Install and configure Agent for V M ware (Virtual App liance) or Agent for VM ware (Windows). Register the agent on t he manag ement server. Result. The machin e with the agent (the virtual applia nce or the Windows h ost) appears und er Machines with a gents in the All mach i nes with age[...]
-
Page 378
379 Copyright © Acronis International GmbH, 2002- 2015 To Do Create a new backup plan , or a task on a registered machine Click New , and select one of the following: Backup plan (centra lized) (p. 354 ) Recovery task (p. 13 2) Validation task (p. 237 ) For the recovery or validation tasks creation , you have to specify the r egistered[...]
-
Page 379
380 Copyright © Acronis International GmbH, 2002- 2015 To Do Clone a backup plan Click Clone . The clone of the original b ackup plan will b e created with default name " Clone of <original_plan_name > ". The c loned plan will be disabled i mmediately a fter cloning, so that it does not run con currently with the original p lan. Yo[...]
-
Page 380
381 Copyright © Acronis International GmbH, 2002- 2015 Accessing the Licenses view To access the License s v iew when conn ected to the manage m ent server, click Licenses in the Navigation pane. To connect to the lic ense server directly: 1. In the Tools menu of t he consol e, select Manage licenses . 2. Specify the na m e or IP add ress of the m[...]
-
Page 381
382 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .6 .3 Ex por ti ng l ice ns es Before changing the license ser ver, export the licenses fro m the licens e server th at you plan to change (p. 381). All licen ses are saved into .xml file. Later on, you can import (p. 3 8 1) these licens es to a new license ser v er. To e xp ort l ice ns[...]
-
Page 382
383 Copyright © Acronis International GmbH, 2002- 2015 Adds a new license key to the specified license ser ver. You can specify multiple lic ense keys (space separated). --import - file <IP-address or hostname> <fi lename> Imports license k ey s from a .txt o r .eml file. --help Shows usage. 1 5 . 4 . 7 A l e r t s An alert is a messag[...]
-
Page 383
384 Copyright © Acronis International GmbH, 2002- 2015 moved to a new o r to the existing inactive group. The number of ass o ciated mac hines ( X ) is reduced for the active group alert and increased for the in active group alert respecti v ely. To obtain infor m ation about ma chines associated with the group alert, click Vie w details . Configu[...]
-
Page 384
385 Copyright © Acronis International GmbH, 2002- 2015 The report will c o ntain the information selected, grouped and so rted according to t he templat e settings. Select wheth er to preview the rep o rt in the d efault browser or to save it to the .xml file. If previewed, the rep ort appears in a separate intera ctive window that enables expandi[...]
-
Page 385
386 Copyright © Acronis International GmbH, 2002- 2015 Deployment state : The deployment states of the backup plans — for exa mple, Revoking . Execution state : Th e execution states of the ba ckup plans — for example, Running . Stat us : The statuses of th e backup plans — OK , Warning , and/ o r Error . Last finished ti me [...]
-
Page 386
387 Copyright © Acronis International GmbH, 2002- 2015 15 .4 .8 .4 Rep or t ab ou t t h e ar ch iv es an d ba cku ps In this view, you c an generate a r eport about the archives that are stored in managed centraliz ed vaults. This rep o rt consists o f one or m o re tables. Filters Under Filters , choos e which archives to include in the report. O[...]
-
Page 387
388 Copyright © Acronis International GmbH, 2002- 2015 Specify which table co lumn s to show, and in which ord er. Select which diagra ms to include in the repor t. T he dia grams show space usage in t he vault s. 15 .4 .8 .6 Rep or t ab ou t t h e ta sk s' ru ns In this view, you c an generate a r eport about the task s t hat existed[...]
-
Page 388
389 Copyright © Acronis International GmbH, 2002- 2015 To a llo w a ct iv e con te nt per ma ne ntl y in Internet Explor er 1. On the Tools menu, click In ternet Options , and then click the Advanced tab. 2. Select the Allow active c ontent to run files on My Computer check box under S ecurity . 3. Click OK . in Mozilla Firefox 1. On the Options m[...]
-
Page 389
390 Copyright © Acronis International GmbH, 2002- 2015 To Do The log entry's details wil l be displayed. See Log entry details (p. 390 ) for details of the log entry's operation s. Save the selected log entries to a file 1. Display Activities an d select activities or di splay Events an d select log entries. 2. Click Save selected to fil[...]
-
Page 390
391 Copyright © Acronis International GmbH, 2002- 2015 Machine - The nam e of the machine where the e v ent has occurred (if an y). Code - It can be blan k or t he progra m error code if the ev ent type is error. Error code is an integer number that may be used by Acronis supp o rt service to solve the problem. Module - It can be blan [...]
-
Page 391
392 Copyright © Acronis International GmbH, 2002- 2015 The preset is: Disab l ed . When enabled, y o u can specify the keeping period for the ac cepted alerts. The accepted alerts older than this period will b e deleted from the table automatically. Automatically move in active alerts to "Accepted alerts" This option defin es whether to [...]
-
Page 392
393 Copyright © Acronis International GmbH, 2002- 2015 credentials are giv en by this option, the progra m will ask you for credentials and save them in this optio n. It is sufficient t o specify the creden tials of a user who is a member of the Domain Users group on the domain. 15 .4 .1 0. 4 E-m ai l set ti ng s The option enables you to configur[...]
-
Page 393
394 Copyright © Acronis International GmbH, 2002- 2015 A ler t no ti fic at ion s This option enables yo u to specify when to send e-mail notifica tio ns about alerts which o ccurred on the management s erver and to select the t y pes of aler ts to send. When using this option, ma ke sure that the e -mail sett ings are properly configured in Mana [...]
-
Page 394
395 Copyright © Acronis International GmbH, 2002- 2015 Wi nd ow s e ve nt l og This option defin es whether the management server has t o record its o wn log even ts in the Application Event L o g of Win do ws (to see this l o g, run eventv wr.exe or select Control Panel > Administrative tools > Eve nt Viewer ). You can filter the events to [...]
-
Page 395
396 Copyright © Acronis International GmbH, 2002- 2015 This parameter can als o be set by using Acronis Admin istrative Template (p. 405). 15 .4 .1 0. 7 Clo ud b ac ku p p ro xy This option is effe ctive only for connection to Acr o nis Cloud St o rage over th e Internet. This option defin es whether the management server will conne ct to the Inte[...]
-
Page 396
397 Copyright © Acronis International GmbH, 2002- 2015 15 .5 .1 .1 Ho w t o loa d Ac ro ni s A dm in ist ra ti ve T emp la te The Administrativ e Template, pr o vided by Acr o nis, enables the f ine-tuning of some secu rity related features, includin g encrypted communication setting s. Through the Microsoft Group Policy mechanism, the t emplate p[...]
-
Page 397
398 Copyright © Acronis International GmbH, 2002- 2015 15 .5 .1 .2 Ac ro ni s B ac ku p This section of the ad ministrative template spe cifies the connection para meters and event tracing parameters for the followin g Acronis Backup components: Acronis Backup Man agement Server Acronis Backup Agent Acronis Backup St o rage No de Conne[...]
-
Page 398
399 Copyright © Acronis International GmbH, 2002- 2015 Do not use The use of SSL c ertificates is disab led. Any connection to a server appli cation which requires the use of SS L c ertifi cate s will not be established. Use if possible The use of SSL c ertificates is enabled . The client will use SSL certifica tes if their use is enabled on the s[...]
-
Page 399
400 Copyright © Acronis International GmbH, 2002- 2015 Event tracing paramet ers In Windows, the ev ents occurring in Acronis Bac kup can be recorded into the event log, a file, or both. Each event has a le v el from zero to five based o n the event's s everity, as shown in the following table: Le vel Na me D esc rip tio n 0 Unknown Event who[...]
-
Page 400
401 Copyright © Acronis International GmbH, 2002- 2015 Enable Information about the hardware configuration, the most and least used feature s and about any problems will be automatically collected fr om the machine and s ent to Acronis on a regular basis. The end re sults are in tended to provide software i mprovements and enhan ced functionality [...]
-
Page 401
402 Copyright © Acronis International GmbH, 2002- 2015 If, during a check for the license k ey (see License Check Inter val earlier in this topic), Acronis Backup Agent could n ot connect to the license s erv er, it will try to rec o nnect onc e in the number of hours gi ven by License Se rver Connect i on Retry Interval . If the value is 0 , no r[...]
-
Page 402
403 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enabled Trace Level Description: Specifi es the minimu m level of severity of event s for sending SNMP notificati o ns about them. Only n otifications about events of levels g reater than or equal t o Trace Level will be sent. Possible values: 0 (In te rnal event), 1 (Debuggin g[...]
-
Page 403
404 Copyright © Acronis International GmbH, 2002- 2015 The initial size will n ot exceed the available space m inus 50 MB. Pre-allocated storage s ize ( in percent) This setting is effecti ve only when the Pre-allocated s torage size (in Megabytes ) setting is 0 . Description: Specifies th e initial size of the snapsho t storage as a percentage o [...]
-
Page 404
405 Copyright © Acronis International GmbH, 2002- 2015 Description: Specifi es whether Acronis Backup Agen t will catalog backups in unmanag ed vaults. Possible values: Ena bled (catalog) or Disabled (do n o t catalog) Default value: Enabled If the value of this parameter is Disabled , the Data view for a vault will n ot display any data when the [...]
-
Page 405
406 Copyright © Acronis International GmbH, 2002- 2015 Windows Event Lo g Specifies when t o record Acronis Ba ckup Management Server's e vents into the App licatio n Event Log in Windows. This parameter has t wo settings: Trace State Description: Specifi es whether to record Acronis Ba ckup Management Server's events into the event log.[...]
-
Page 406
407 Copyright © Acronis International GmbH, 2002- 2015 This parameter has th e following settings: Maximum Connect i ons Description: Specifi es the maxi mum number of simultaneous sy nchronization connections to keep. Possible values: Any integ er number between 1 and 500 Default value: 200 If the total number o f onlin e registered m achines doe[...]
-
Page 407
408 Copyright © Acronis International GmbH, 2002- 2015 Real-Time Monitor ing Description: Specifi es whether to perform real-time m o nitoring of regi ste red m achines instead of using a p olling mechanism. Possible values: Ena ble d or Disabled Default value: Disab led By default, Acr o nis Backup Management Server conne cts to registered m achi[...]
-
Page 408
409 Copyright © Acronis International GmbH, 2002- 2015 Snapsho t Storage Specifies the locati on and initial size of the snapsho t storage — a temporary file th at is used when backing up data by taking a snapshot. This file is deleted as so o n as the backup is complete. With the default setting s, the snapshot storage i s created in the temp o[...]
-
Page 409
410 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enabled If the value of this parameter is Disabled , all of the f o llowing para meters are ignored. Proxy server add r ess Description: Specifi es the n am e or IP addre ss of the proxy server Possible values: Any string 0 to 32765 characters lo ng Default value: Empty st ring [...]
-
Page 410
411 Copyright © Acronis International GmbH, 2002- 2015 Default value: Enab l ed Smart Error Repo r ting Description: Specifi es whether an error message disp layed by the managem ent console will include a link to a re levant Acr o nis Knowledg e Base ar ticle. Possible values: Ena bled (include) or Disabled (do not include) Default value: Enab l [...]
-
Page 411
412 Copyright © Acronis International GmbH, 2002- 2015 16 C lou d ba ck up This section provid es detail s about using the Acronis Cloud Backup service. This service enables you to back up your da ta to Acronis Cloud Storage. Acronis Cloud Backup might be unavailab le in your region. To find more information, c lick here: http://www.acroni s.com/e[...]
-
Page 412
413 Copyright © Acronis International GmbH, 2002- 2015 For effective us e of t he sto rage spa ce, you have th e option to set up the " Delete backups older than " retention rule. Example You might want to us e the following backup s trate gy for a fil e server. Back up the critic al files twice a day on a sched ule. Set the retention ru[...]
-
Page 413
414 Copyright © Acronis International GmbH, 2002- 2015 you want to use pre / post backup o r pre/post data capture commands on the virtual machine you want to back up ind ividual files and folders of th e virtual machine you want to rec over files directly t o the virtual m achine’s file system. The machine will b e treate d as a phy[...]
-
Page 414
415 Copyright © Acronis International GmbH, 2002- 2015 Windows 8/8.1 – all editi ons except for the Wind ows RT editions (x86, x64) Virtualization produc ts (host-b ased backup of virtual ma chines) VMware ESX(i) 5 .0, 5.1, 5.5 , and 6.0 (H ost-based backup is available only for paid licens es of VMware ESXi.) Windows Server 2 008 (x64) with H y[...]
-
Page 415
416 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .7 .4 Wh at i f a n et wor k con n ect io n is lo st du ri ng c lo ud ba cku p or r ec ov er y? The software will try to reach the cloud storage e very 30 seconds. The attemp ts will be stopped as soon as the connec tio n is r esum ed OR a cer tain number of attempts are performed, depen[...]
-
Page 416
417 Copyright © Acronis International GmbH, 2002- 2015 Acronis uploads the backup to the cloud storage. After that, you can add increm ental backups to this full backup, either manually or on a schedule. The hard disk drive i s sent back to you but it is not possible to recover from it. However, rec overy from a locally atta ched device is possibl[...]
-
Page 417
418 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .8 .8 Ho w d o I per fo rm i nit ia l see di ng? Preparing 1. Ensure that you hav e activated an Acr onis Cloud Backup subscription on the machin e where you will do initial seeding ( skip this step if you have a volume subscription). 2. If you are currently using a trial subscription, e[...]
-
Page 418
419 Copyright © Acronis International GmbH, 2002- 2015 Hard drive types Acronis accepts hard disk drives of the following interf ace types: IDE, ATA, SATA, USB connected drives. SCSI drives are not ac cepted. Packaging If possible, use th e original packagin g. Otherwise, packaging m aterials can be o btained at any shipping outlet or s tat ionar [...]
-
Page 419
420 Copyright © Acronis International GmbH, 2002- 2015 St ep 4 Using the website o f the ship ping company that you chose, pr epare and print two prepaid shippin g labels: 1. Shipping label for sending your hard drive. This label i s placed on the top of the box. You should send your packag e to one of the Acr onis data centers. The data center ad[...]
-
Page 420
421 Copyright © Acronis International GmbH, 2002- 2015 St ep 5 Securely seal the b ox with a sturdy tape. Then, sti ck the shipping labe l for sendin g your hard drive t o the top of the bo x, so the l abel does not wrap around the edge of the package. 16 .1 .8 .1 0 How d o I t ra ck a n Ini ti al Se edi ng o rd er st at us? On the Acronis websit [...]
-
Page 421
422 Copyright © Acronis International GmbH, 2002- 2015 specified). If a prepaid shipping label was not pr o vide d with the media, th e media will be discarded. [Occasional] The orde r is on hold – Your order was pl aced on hold due to technical dif ficulties processing the order. Acr onis is working on resolving these issues. [Occasiona[...]
-
Page 422
423 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .9 .7 Ho w t o bu y a L arg e Sc al e R ec ove ry l ice ns e? You can buy a Large Scale Recovery license fr om an Acronis partner or from the Acronis online store. Having purchased a lic ense from an Acronis partner, you receive a confirmation e-mail wi th a registration code. Lo g in to[...]
-
Page 423
424 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .1 0. 1 How d o I a cc es s m y ac cou nt m an ag em en t web pa ge ? Go to http://ww w.acronis.com/en-us/ m y/cloud-back up/co rporat e and log in to y our account (cr eate one if you are not re gistere d). To access this webpag e from Acr onis Backup: 1. On the Actions menu, click Back[...]
-
Page 424
425 Copyright © Acronis International GmbH, 2002- 2015 A subscription for v irtual mach ines (now deprecated) can be ren ewed to a server sub scription or to a volume subscription. Volume subscriptions To renew a volume subscri ption, go to the account management webpage, clic k Renew next to the volume subscription, and then follow the on-screen [...]
-
Page 425
426 Copyright © Acronis International GmbH, 2002- 2015 16 .1 .1 0. 8 Ca n I c an ce l m y su bsc ri pt ion ? Just wait until the subs cription expires. Refu nds are not available for the clo ud backup subscriptions. 16 .2 Wh er e do I s tar t? Go to http://ww w.acronis.com/en-us/ m y/cloud-back up/co rporat e and log in to y our account (cr eate o[...]
-
Page 426
427 Copyright © Acronis International GmbH, 2002- 2015 On the account management webpage, click the c loud backup trial link, and then select t he necessary subscripti o n typ e. Install Acronis Backup, s tart the product, connect the console to the machine y ou want to back up, click Back up no w or Create b ackup plan , click Location , [...]
-
Page 427
428 Copyright © Acronis International GmbH, 2002- 2015 1 6 . 4 . 2 R e a s s i g n i n g a n a c t i v at e d s u b s c ri pt i on Sometimes you may want to use an already ac tiv ated subscription instead of an available subscription. In th ese cases, for ex ample: You no longer ne ed to back up one of your machin es and you want to reuse that[...]
-
Page 428
429 Copyright © Acronis International GmbH, 2002- 2015 All earlier created ba ckups remain intact. You can delete them manually if necess ary. Keep in mind though, backups can be del eted from a subscription o nly by the machine to which the subscription is assigned. In our exa mple, you have the following options. Before reassign ing Delete backu[...]
-
Page 429
430 Copyright © Acronis International GmbH, 2002- 2015 To r et rie ve fi les fr om th e c lou d st ora ge: 1. Go to the account m anagement webpage (p. 424 ) and click Recove r files from Acronis Cloud . You will see the list of t he machin es backed up by using t he specified acc o unt. T he list of machines that sha re a volu me subscription app[...]
-
Page 430
431 Copyright © Acronis International GmbH, 2002- 2015 Setting up regular c o nversi o n of backups to a virtual machin e Operations with ba c kups : Validating a backup* Exporting a backup Mounting a backup Replicating or m oving backu ps from the cloud storag e Converting an incre mental backup to full Operation with arch[...]
-
Page 431
432 Copyright © Acronis International GmbH, 2002- 2015 Increase storage quot a Replace a subscripti on with another one that has a greater storage quota. The remaining subscription period is reduced in pr oportion to the capacity increas e. Initial Seeding An extra service that enabl es you to save an initial full backup locally and then se nd it [...]
-
Page 432
433 Copyright © Acronis International GmbH, 2002- 2015 Subscription period The period during w hich the subscrip tion remains activated. Yo u can back up and recover the machine during this period. Recovery is possible f or extra 30 days after this peri od ends. Unassign a subscrip tion Make an assigned subscription available agai n. You can unass[...]
-
Page 433
434 Copyright © Acronis International GmbH, 2002- 2015 17 G los sa ry A A cr on is A ct ive R est or e The Acronis propri et ary tec hnology that brings a syste m online i m mediately aft er the system recovery is started. The system boots from the backup (p. 439) and the m achine b ecomes operational and r eady to provide necessary services. The [...]
-
Page 434
435 Copyright © Acronis International GmbH, 2002- 2015 A ct iv it y An action perform ed by Acronis Backup for achie v ement of s o me user goal. Examples: backing up, recovery, expor ting a backup, catalogin g a vault. An activit y may be initiat ed by a user or by the software itself. Execu tion of a task (p. 446) always cau ses one or more acti[...]
-
Page 435
436 Copyright © Acronis International GmbH, 2002- 2015 the backup archive (p. 435) name and location the backup sche m e (p. 436). This inclu des the backup schedule and [optionally] t he retention rules (p. 445) [optionally] additional o perations to perform with the backups (replica tio n (p. 445 ), validation (p. 446), conversion t [...]
-
Page 436
437 Copyright © Acronis International GmbH, 2002- 2015 access and back up the data that has survived in a c orrupted system deploy an operating system on bare metal create basic or dyna m ic vol umes (p. 441) on bare metal back up sector- by -sector a disk that has an un supported file system back up offline any data that canno[...]
-
Page 437
438 Copyright © Acronis International GmbH, 2002- 2015 C ent ra li ze d v au lt A networked location allotted by the management ser ver (p. 444) administrat o r to serve as s to rage for the backup archi v es (p. 435). A c entralized vault can be m anaged by a storage node (p. 445) or be unmanaged. The t o tal num ber and size of archives stored i[...]
-
Page 438
439 Copyright © Acronis International GmbH, 2002- 2015 The centralized cat alo g ava ilable on the management server (p. 444) contains all data st o red on its storage nodes (p. 4 45). Physically, data catal og is stored in catalog files. Every vault uses its own s et of catalog files w hich normally are located dir ectly in the vault. If this is [...]
-
Page 439
440 Copyright © Acronis International GmbH, 2002- 2015 D is k ba cku p ( Im ag e) A backup (p. 435) that c ontains a sector-based copy of a disk or a v olume in a pac kaged form. Normally, only s ectors that contain data are c opied. Acronis Backup provides an option to take a raw image, that is, cop y all the d isk se ctors, which enables imaging[...]
-
Page 440
441 Copyright © Acronis International GmbH, 2002- 2015 Di sk 1 MBR LDM database 1 MB Di sk 2 Protec-t ive MBR GPT Microsoft Reserved Partition (MSR) LDM database GPT LDM Metadata partition 1 MB Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks. For more inf o rmation abou t dynamic disks please refe r to the following Microsoft knowle[...]
-
Page 441
442 Copyright © Acronis International GmbH, 2002- 2015 E En cr yp te d arc hi ve A backup archive (p. 43 5 ) encrypted a cco rding to the Advanced Encryption Stand ard (AES). When the encryption option and a password for the archive are set in the backup options (p. 435), each bac kup belonging to the archive is encrypted by the agent (p. 435) bef[...]
-
Page 442
443 Copyright © Acronis International GmbH, 2002- 2015 In de xi ng An activity (p. 435) perfor m ed by a storage n ode (p . 445) after a backup (p. 435 ) has been sav ed to a deduplicating vault (p. 439) . During indexing, the storage node perform s t he follow ing operations: Mo ves data bl ocks from the backup to a special file within the va[...]
-
Page 443
444 Copyright © Acronis International GmbH, 2002- 2015 M ana ged v au lt A centralized vault (p. 4 37 ) managed by a storage node (p. 445 ) . Archives (p. 435) in a man aged vault can be accessed as f ollows: bsp://node_address/vaul t_name/archive_name/ Physically, managed vaults can reside on a networ k share, SAN, NAS, on a hard dr ive local to [...]
-
Page 444
445 Copyright © Acronis International GmbH, 2002- 2015 Re gi st ere d ma ch in e A machine (p. 443) m anaged by a manag ement server (p. 444). A machi ne can be registered on only one management se rver at a time. A machine become s registered as a result of t he registration (p. 445) procedure. Re gi st ra ti on A procedure that adds a managed ma[...]
-
Page 445
446 Copyright © Acronis International GmbH, 2002- 2015 relieve managed machines (p. 443) of unnecessary C PU load by performing cleanup (p. 438), validation (p. 446) and other operations with backup archives (p. 435) which otherwise would be performed by agents (p. 435) drastically reduce bac kup traffic and storage spa ce taken by the arc[...]