Acronis Backup & Recovery 10 Advanced Workstation Universal Restore manual
- Read online or download the manual
- 241 pages
- N/A
Go to page of
Similar user manuals
-
Backup Software
Acronis vmProtect 6
95 pages -
Backup Software
Acronis Backup & Recovery 10 Advanced Workstation Universal Restore
241 pages -
Backup Software
Acronis Backup & Recovery 10 Server
242 pages -
Backup Software
Acronis Backup & Recovery 11 Server
240 pages -
Backup Software
Acronis Backup & Recovery 10 Advanced Server SBS Edition
402 pages 4.71 mb -
Backup Software
Acronis Backup & Recovery 11
379 pages -
Backup Software
Acronis Tillbpens
186 pages -
Backup Software
Acronis Backup & Recovery 10 Advanced Server w/ Deduplication, 2500-4999u
410 pages
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore should contain:
- informations concerning technical data of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore
- name of the manufacturer and a year of construction of the Acronis Backup & Recovery 10 Advanced Workstation Universal Restore item
- rules of operation, control and maintenance of the Acronis Backup & Recovery 10 Advanced Workstation Universal Restore item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Acronis service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Acronis Backup & Recovery 10 Advanced Workstation Universal Restore.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Acronis Backup & Recovery 10 Advanced Workstation Universal Restore item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
Update 3 A c r o n i s ® B a c k u p & R e c o v e r y ™ 1 0 W o r k s t a t i o n User's Guide[...]
-
Page 2
Copyright © Acr onis, Inc., 2000 -2010. All righ ts reserv ed. “Acronis” and “Acr onis Sec ure Zone” are r egistered trad emarks of Acr onis, Inc. "Acronis Compute with Confid ence", “Acronis Startup Recovery Manager ”, “Acro nis Active Rest ore” and the Acronis l ogo are trademar ks of Acronis, Inc. Linux is a registered[...]
-
Page 3
Table of contents 1 Introducing Acro nis® Backu p & Recovery™ 10 ........................................................................ 7 1.1 Acronis Backup & Rec overy 10 overview .................................................................................. 7 1.2 Getting started ...................................................[...]
-
Page 4
3. 3. 1 De fa ul t b ac ku p opt ion s ................................................................................................................................ . 50 3. 3. 2 De fa ul t r ec ove ry opt io ns .............................................................................................................................. 71 4 Vaul[...]
-
Page 5
6. 3. 8 Wh en t o r ec ove r ................................................................................................................................ ......... 153 6. 3. 9 U niv er sa l Re st ore ........................................................................................................................................ 153 6. 3.[...]
-
Page 6
7. 1. 7 La rg e S cal e R eco ve ry F AQ .......................................................................................................................... 21 7 7. 1. 8 Su bs cri pti on li fe cy cl e FA Q .......................................................................................................................... 219 7.2 Where [...]
-
Page 7
7 Copyright © Acronis, Inc., 2000 - 2010 1 I ntr od uci ng A cr oni s® B ac kup & R ec ove ry™ 10 1. 1 Ac ron is Ba cku p & R eco ve ry 10 o ver vie w Based on Acronis’ paten ted disk imaging and bare metal restore techn o logies, Acr o nis Backup & Recovery 10 succe eds Acronis True Image Echo as th e next generation disast er re[...]
-
Page 8
8 Copyright © Acronis, Inc., 2000 - 2010 3. Connect the cons ole to the machine w here th e agent is installed. Where to go from here For what to d o next see "Basic c o ncepts (p. 18 )". For understanding of t he G UI elements see the next s ect ion. 1 . 2 . 1 U s i n g t h e ma n a ge m e n t c o n s ol e As soon as the cons o le conn [...]
-
Page 9
9 Copyright © Acronis, Inc., 2000 - 2010 tree, or on the Action s and Tools pan e. Menu b ar Appears across the top o f the program window and lets you perform all the operations, available on bo th panes. Menu items change dy namically. 1024x768 or high er display resolution is required for c o mfortab le work with the management console. 1. 2. 1[...]
-
Page 10
10 Copyright © Acronis, Inc., 2000 - 2010 1. 2. 1.2 "A ct io ns an d to ols " p an e The Actions and t ools pan e enables y o u to easil y and efficientl y work wi th Acronis Backup & Recovery 10. The pan e's bars provide quick acc ess to p rogram's operations and t ools. All items of the Actions and too l s bar are duplica[...]
-
Page 11
11 Copyright © Acronis, Inc., 2000 - 2010 "Actions" bar on a managed machine and on a management server Tools Contains a list of th e Acroni s tools. Always the same ac ro ss all the pr ogram views. All the tools can al so be ac cessed in the Tools menu. "Tools" bar Help Contains a list of help to pics. Differ ent views and act[...]
-
Page 12
12 Copyright © Acronis, Inc., 2000 - 2010 and action pages ac co rding the items you select in the m enu, Navigation tre e, or on the Actions and Tools pane. Vi ew s A view appears on the main area when clickin g any item in the Navigat ion tree in the Navigation pane (p. 9). "Tasks" view Common way of worki ng with views Generally, ever[...]
-
Page 13
13 Copyright © Acronis, Inc., 2000 - 2010 A cti on p ag es An action page app ears in the main area when clicking any action i tem in the Actions menu, or in the Actions bar on th e Action s and to ols pa ne. It contains steps yo u need t o perfor m in order to create and launch any task, or a backup plan, or backup p olicy. Action page - Create b[...]
-
Page 14
14 Copyright © Acronis, Inc., 2000 - 2010 Acronis Backup & Rec overy 10 remembers the changes y ou made on the acti on pages. For example, if you started to cr eate a backup plan, and then f o r any reas o n switch ed to another view with o ut accomplishing the plan creation, you can click the Back navigati on button on the menu. Or, if y ou h[...]
-
Page 15
15 Copyright © Acronis, Inc., 2000 - 2010 File backup File -level data protecti o n is based on backing up files and folders r esiding on the machine wher e the agent is installed or o n a ne tw ork shar e. Files can be recovered to t heir orig inal lo cation or to anoth er place. It is possible to recover all files and folders that were backed up[...]
-
Page 16
16 Copyright © Acronis, Inc., 2000 - 2010 NTFS Ext2/Ext3/Ext4 ReiserFS3 - particular files cannot be recovered fr om disk backups located o n Acr onis Backup & Recovery 10 Storag e Node ReiserFS4 - volu m e rec overy without the vo lu m e resiz e capability; particular files cannot be recovered from disk backups located o n Acr[...]
-
Page 17
17 Copyright © Acronis, Inc., 2000 - 2010 Workstation 80 MB 1 GB 500 MB 1024*768 pixels or higher Bootable Media Builder (Windows) 80 MB 700 MB 300 MB Bootable media Me dia t ype Me mo ry I SO i mage si ze A ddi tio nal Based on Windows PE 512 MB 300 MB Linux-based 256 MB 130 MB 1. 7 Tec hn ic al S upp ort Maintenance and Sup port Program If you n[...]
-
Page 18
18 Copyright © Acronis, Inc., 2000 - 2010 2 Un de rs ta n din g Acr on is B ack up & Re co ver y 10 This section attempts to give its readers a clear un derstanding of the produc t so that the y can use the product in vari ous circumstanc es without step- by -step instructions. 2. 1 Ba sic co nc ept s Please familiariz e yo urs elf with the ba[...]
-
Page 19
19 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates the notions discusse d above. For more definiti ons please refer to the Glossary.[...]
-
Page 20
20 Copyright © Acronis, Inc., 2000 - 2010 Backup using bootable media You can boot the m achine u sing the bootable media, configure th e backup operation in the sa m e way as a simple backup plan and execute the o peratio n. This will help you extract files and logical volumes from a sy stem that failed to boot, take an image of the offline syste[...]
-
Page 21
21 Copyright © Acronis, Inc., 2000 - 2010 The following diag ram illustrates data recovery und er the operating system (onli ne). No backup can proceed on the machin e while the recovery opera tion is taking place. If requ ired, you can connect the console to an o ther ma chine and configure a recover y o perati o n on that m achin e. T his abilit[...]
-
Page 22
22 Copyright © Acronis, Inc., 2000 - 2010 If the machine fail s to boot or you need to rec ov er dat a to bare metal, you boot th e machine using the bootable media and config ure the recovery operation in th e same wa y as the recovery task. The following diagram illustrates the recovery using the bootable media. 2. 2 Ful l, i ncr em en tal a nd [...]
-
Page 23
23 Copyright © Acronis, Inc., 2000 - 2010 It is widely accept ed that a full backup is the slowes t to do but the fastest to restore. With Acr onis technologies, rec overy from an incremental bac kup may be n ot slower than recovery from a full on e. A full backup is m o st useful when: you need to roll bac k the system to its initial st ate ?[...]
-
Page 24
24 Copyright © Acronis, Inc., 2000 - 2010 P ar ame ter Fu ll ba cku p Di ff ere nti al ba cku p I nc re ment al ba cku p Storage space Maximal Medium Minimal Creation time Maximal Medium Minimal Recovery time Minimal Medium Maximal 2. 3 Us er pri vi leg es on a ma na ge d m ac hin e When managing a machine running Windows, the scope of a user&apos[...]
-
Page 25
25 Copyright © Acronis, Inc., 2000 - 2010 When a user opens a plan or task for editing, which is owned by another user, all passwords set in the task are clear ed. This prevents the "modif y settings, lea ve passw o rds" trick. T he program displays a warning each ti me you are trying to edit a plan (task) last modified by another user. [...]
-
Page 26
26 Copyright © Acronis, Inc., 2000 - 2010 “sons”; weekly bac kups are referred to as “fath ers”; t he longest li ved monthly backups are called “grandfathers”. GFS as a tape rotation schem e GFS was initially cr eated and is often referred to as a tape rotati on scheme. Tape rotation sch emes, as such, do not provide au tomation. They [...]
-
Page 27
27 Copyright © Acronis, Inc., 2000 - 2010 The schedule m arked out according to th e GFS scheme. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Acronis uses incre mental and differential backups tha t help save storage space a nd optimize the cleanup so that cons o lidati on is not needed. In t erms of backup methods, w eekly backup is dif[...]
-
Page 28
28 Copyright © Acronis, Inc., 2000 - 2010 “D” stands for the backup that is c onsidered Dail y. “W” stands for the backup tha t is considered Weekly. “M” stand s for the backup that is considered Mo nthl y. An ideal archive created according to the GFS schem e. Schedule: Workd ays at 8:00 PM Weekly/Monthly: Frida y Keep daily backups: [...]
-
Page 29
29 Copyright © Acronis, Inc., 2000 - 2010 The backups that outlive their nomin al lifetime be cause of dependencies are marked pink. The initial full backup will be deleted as soon as all differential and incremental backups ba sed on this backup are deleted. An archive create d according to the GFS sche me by Acronis Backup & Reco very 10. Sc[...]
-
Page 30
30 Copyright © Acronis, Inc., 2000 - 2010 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gi ves the following order o f moves: The Tower of Hanoi backup scheme is based on th e same patterns. I t operates with Sessions instead of Moves and with Backup levels instead of Rings . Commonly an N-le v el sche [...]
-
Page 31
31 Copyright © Acronis, Inc., 2000 - 2010 the pattern starts with a ful l backup since the very first backup cannot be incremental the scheme f o rces every backup level t o keep o nly the most recent backup, other backups from the level have to be delete d; however backup deletion is postponed in cases where the backup is a base for anoth[...]
-
Page 32
32 Copyright © Acronis, Inc., 2000 - 2010 1. Delete backups older tha n This is a time inter v al count ed back from the moment when the retention rules are app lied. Every time a retention rul e is applied, the progra m c alcula tes the date and time in the past corresponding to this interval and del etes all backups created b efo re that m oment[...]
-
Page 33
33 Copyright © Acronis, Inc., 2000 - 2010 Combination of rules 1 and 2 You can limit bo th the backu ps’ lifetime and the archi ve size. The diagra m below i llustrates the resulting rule. Example Delete backups o lder than = 3 Months Keep the archive size within = 200GB Never delete bac kups younger than = 10 Days Every time the retention r[...]
-
Page 34
34 Copyright © Acronis, Inc., 2000 - 2010 Please be aware t hat cons olidation is just a method of deletio n bu t not an alt ernative to deletion. The resulting backup w ill n o t contain da ta that was present in the deleted backup and was absent from the r et ained incremental or differential backup . Backups resulting from consolidation always [...]
-
Page 35
35 Copyright © Acronis, Inc., 2000 - 2010 Recovering dynamic v olumes A dynamic volu m e can be r ecovered over any type o f existing v olume to unallocated space o f a di sk group to unallocated space o f a b asic disk. Recovery over an ex isting volume When a dynamic volume is recovered over an existing v olume, eithe r basic or dyna[...]
-
Page 36
36 Copyright © Acronis, Inc., 2000 - 2010 U na ll oc ate d s pa ce (b as ic GPT di sk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and re sizing volum es during recovery You can resize the r esulting basic volume, both M BR a nd GPT, during recovery, or change the volume's location o n the di sk. A resulting dynamic v olume can [...]
-
Page 37
37 Copyright © Acronis, Inc., 2000 - 2010 de vi ce (ta pe dr iv e o r t ap e li br ary ) by. .. Agent for Windows ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 + + + + ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Ta pe w ri tt en on a ta pe dev ic e th ro ugh ... Backup Server ATIE 9.1 + + + + ATIE 9.[...]
-
Page 38
38 Copyright © Acronis, Inc., 2000 - 2010 6. Acronis Active Re store (p. 227) is n o t available when recovering fro m a tape. Recovery from a loc ally attached tape devi ce Before creating a r ecovery task, insert or m o unt the ta pe co ntain ing the backup you need to rec over. When creating a r ecovery task, select the tape device from the lis[...]
-
Page 39
39 Copyright © Acronis, Inc., 2000 - 2010 Type of event OID: 1.3.6.1.4.1.24 769.100.200.1.0 Value: "Unknown" Text description o f the e vent OID: 1.3.6.1.4.1.24 769.100.200.2.0 Value: "?000000 00 " 2. 11 Pr op rie ta ry A cro ni s t ec hno log ie s This section describes the proprietary technologies in herited by Acroni[...]
-
Page 40
40 Copyright © Acronis, Inc., 2000 - 2010 With the new Acronis Secure Zone behavior, y ou obtain the abil ity to: list archives locat ed in the z o ne and backups co ntain ed in each archive examine a backup 's content mount a disk backup to copy files fr om t he backup to a physical disk safely delete archi ves and backups fr[...]
-
Page 41
41 Copyright © Acronis, Inc., 2000 - 2010 2 . 1 1 . 3 U n i v e r s a l R e s t o r e ( A c r o n i s B a c k u p & R ec o v e r y 10 U n i v e rs a l R e s t o r e ) Acronis Backup & Rec overy 10 Universal Rest o re is the Acro nis pr oprietary techn ology that helps recover and boot up Windows on dissimilar hardware o r a virtual machine[...]
-
Page 42
42 Copyright © Acronis, Inc., 2000 - 2010 Universal Restore and Micro soft Sysprep Universal Restor e is not a system preparation tool. Yo u can apply it t o any Windows image cr eated by Acronis product s, includin g images of systems prepared with Microsoft System Preparati on Tool (Sysprep). The f o llowing is an example of using both tools on [...]
-
Page 43
43 Copyright © Acronis, Inc., 2000 - 2010 How it works When configurin g a recovery operation, you selec t disks or volumes to rec o ver fr o m a backup . Acronis Backup & Rec overy 10 scans the selec ted disks or volumes in the backup . If this scan finds a supported operating system, the Acronis Ac tive Restore option be comes available. If [...]
-
Page 44
44 Copyright © Acronis, Inc., 2000 - 2010 5. Once the system r ecovery is started, the operating system boots from the bac kup. The Acronis Active Restore ic o n appear s in the system tray. The machin e beco m es operation al and ready to provide necessary se rvice s. The im m ediate user sees the drive tree and ic o ns and can open files or laun[...]
-
Page 45
45 Copyright © Acronis, Inc., 2000 - 2010 3 O p ti on s This section covers Acronis Backup & Recover y 10 opti o ns that can be configured using Graphical User Interface. The c o ntent o f this se ctio n is applicab le to both stand-alone and a dv anced edi tio ns of Acronis Backup & Rec overy 10. 3. 1 Co nso le op tio ns The console optio[...]
-
Page 46
46 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Enabled for all results. To make a settin g fo r each result (successful completion, failu re or succes s with warni ngs) individually, sel ect or clear the resp ective check box. 3 . 1 . 3 T i m e - b as e d al e r t s Last backup This option is effec tive whe n the console is connected to [...]
-
Page 47
47 Copyright © Acronis, Inc., 2000 - 2010 The option defines th e fonts to be used in the Grap hical User Interface of Acronis Backup & Recovery 10. The Menu settin g affects the drop-down and context m enus. The Application setting affects the other GUI ele m ents. The preset is: Sy stem Default font f o r both the menus and the application i[...]
-
Page 48
48 Copyright © Acronis, Inc., 2000 - 2010 Use the Types of e v ents to log check b ox to filter the events to be l ogged in the Appli catio n Event Log of Wind ows: All events - all ev ents (inf ormation, warni ngs and errors) Errors and warn i ngs Errors only . To disable this opti on, clear the Log events check b ox. 3. 2. 1.2 S NM P[...]
-
Page 49
49 Copyright © Acronis, Inc., 2000 - 2010 3. 2. 1.3 S ett in g up SN MP s erv ic es on t he re ce iv ing m ac hi ne Windows To install the SNM P se rvic e on a machine running Win do ws: 1. Start > Control Pane l > Add or Remove Prog rams > Add/Remove W indows Com ponents. 2. Select Management and Monitoring Tools. 3. Click Details. 4. Se[...]
-
Page 50
50 Copyright © Acronis, Inc., 2000 - 2010 3. In Port , specify the p ort number of the proxy ser v er — for exa m ple: 80 4. If the proxy server requires authentication, specify the credentials in User name and Password . 5. To test the prox y server se ttings, click Test connection . If you do not kno w the proxy s erver settings, contact your [...]
-
Page 51
51 Copyright © Acronis, Inc., 2000 - 2010 Availability of the backup options The set of availab le backup opti ons depends on: The environment the agent opera tes in (Windows, bootable m edia) The type of the data b eing backed up (disk, file) The backup destinati on (networked location or l o cal dis k) The backup sche m e (Back u[...]
-
Page 52
52 Copyright © Acronis, Inc., 2000 - 2010 Media components (p. 66 ) Dest: removable media Dest: removable media - - Error handling (p. 66 ): Do not show message s and dialogs while processing (silent mode) + + + + Re -attempt if an error occur s + + + + Ignore bad sectors + + + + Dual destination (p. 67 ) Dest: local Dest: local - - Task start con[...]
-
Page 53
53 Copyright © Acronis, Inc., 2000 - 2010 To p rot ec t t he ar ch ive f r om u na ut hor ize d acc es s 1. Select the Set pas sw ord for the archive check bo x. 2. In the Enter the pa s sword field , t ype a pass word. 3. In the Confirm the password field, re-type the passw ord. 4. Select one of the f o llowing: Do not encrypt – the ar chiv[...]
-
Page 54
54 Copyright © Acronis, Inc., 2000 - 2010 Exclude files mat ching the following cr i teria Select this check b ox to skip files and folders whos e names match any of the c riteria — called file masks — in the list ; use the Add , Edit , Remove and Re mov e All buttons to create the list of fil e masks. You can use one or more wildcard char[...]
-
Page 55
55 Copyright © Acronis, Inc., 2000 - 2010 The following sche me illustrates when pre/po st com mands are executed. Pre -backup command Backup Post-backup command Examples of how you can use the pre/ post commands: delete some temp orary files from the disk befor e starting backup configure a third-p arty anti virus product to be started ea[...]
-
Page 56
56 Copyright © Acronis, Inc., 2000 - 2010 execution fails. P ost -b ack u p c om man d To s pec if y a c omm an d/e xec ut ab le fi le to b e e xec ut ed a fte r the b ack up is c omp le ted 1. In the Command field , type a command or br owse to a batch file. 2. In the Working di r ectory field, specif y a path to a directory where the command/bat[...]
-
Page 57
57 Copyright © Acronis, Inc., 2000 - 2010 3. Click OK . P re- da ta ca pt ur e c om man d To s pec if y a c omm an d/b atc h fil e to be ex ec ute d b ef or e dat a cap tu re 1. In the Command field , type a command or br owse to a batch file. The program does not support interactive com m ands, i.e. co mmands that requ ire user input (f o r examp[...]
-
Page 58
58 Copyright © Acronis, Inc., 2000 - 2010 Re sul t Preset Continue the backu p only after the command is successfully executed. Delete the TIB file and temporary files and fail the task if the command execution fails. Continue the backup after the command is executed despite command execution failure or success. N/ A Continue the backup concu rren[...]
-
Page 59
59 Copyright © Acronis, Inc., 2000 - 2010 When this option is s et to Enable , snapshots of all v o lumes being backed up will be crea te d simultaneously. Use this option to create a time -consis te nt backup o f data span ned across mul tiple volumes, for instanc e for an Oracle database. When this option is s et to Disable , the volume s' [...]
-
Page 60
60 Copyright © Acronis, Inc., 2000 - 2010 The optimal data c ompression level d epends on the type of data being backed up . For example, even maximum compr ession will not significantly r e duce the archive size if the archive contains essentially compressed files, such as .jpg, .pdf or .mp3. However , formats such as .doc or .xls w ill be co mpr[...]
-
Page 61
61 Copyright © Acronis, Inc., 2000 - 2010 Backing up to a fi xe d hard disk (for example , to Acronis Secure Zone ) may slow p erfo rmance o f the operating system and applications b ecause of the la rge amounts of data that need s t o be written to the disk. You can limi t the hard disk usage b y the backup process to the desir ed level. The pres[...]
-
Page 62
62 Copyright © Acronis, Inc., 2000 - 2010 To c onf ig ure e -ma il n ot ifi ca tio n 1. Select the Send e- mail notificat ions check b o x to acti vate notifications. 2. In the E-mail addres ses fiel d, ty pe the e -mail add ress to which notifications will b e sent. You can enter several addres ses separated by semic o lons. 3. Under Send no tifi[...]
-
Page 63
63 Copyright © Acronis, Inc., 2000 - 2010 The Messenger ser v ice is n ot started by default in the Micr osoft Windows Serv er 2003 family. Change the servi ce Startup mode to Automatic and sta rt the service. To c onf ig ure W inP op up not if ica ti ons : 1. Select the Send WinPo pup notifications check box. 2. In the Machine name fi eld, enter [...]
-
Page 64
64 Copyright © Acronis, Inc., 2000 - 2010 The option defines whether the agent(s) operating o n the managed machine ha ve to send the log events of the backup operations to the specified Si mple Network Manage ment Protocol (SNMP) managers. You can ch oo se the types of events to be sent. For detailed infor mation about using SNMP with Acronis Bac[...]
-
Page 65
65 Copyright © Acronis, Inc., 2000 - 2010 Automatic With this setting, A cro nis Backup & Rec o very 1 0 will a ct as foll o ws. When backing up to a hard disk: A single backup file w ill b e created if the destination d isk's file system allows the est imated fil e size. The backup will aut omatically be split into several files if t[...]
-
Page 66
66 Copyright © Acronis, Inc., 2000 - 2010 To completely eli minate this kind of proble m, disable preserving fil e security se tt ings in archives. The recovered files and fo lders will always inherit the per m issions fr om the folder to which they are recovered or fr o m the dis k, if recovered to the root. Alternatively, y o u can disa ble reco[...]
-
Page 67
67 Copyright © Acronis, Inc., 2000 - 2010 When a recoverab le e rror o ccurs, the pr ogram re-attempts to perfor m the unsuccessful operation. You can set the tim e interv al and the number of attempts. The atte m pts will be stopped as soon as the operation succ ee ds OR the s pecifi ed number of att em pts is perf ormed, depending o n which come[...]
-
Page 68
68 Copyright © Acronis, Inc., 2000 - 2010 You might have to provide the access credentials for the sec ondary destinati o n. Enter th e credentials on prompt. 3. 3. 1.1 8 T ask s ta rt co nd iti on s This option is effec tive in Wind o ws and Linux o perati ng systems. This option is not avail able when o perating under bootable media. This option[...]
-
Page 69
69 Copyright © Acronis, Inc., 2000 - 2010 Skip the task executio n Delaying a backup m ight b e unacceptable, for example, when you need to back u p data strictly at the specified time. Then i t makes sense to skip the backup rather than wait for t he con ditions, especially if the events occur r elatively often. 3. 3. 1.1 9 T ask f ai lur e h an [...]
-
Page 70
70 Copyright © Acronis, Inc., 2000 - 2010 This option is effec tive whe n backing up to a removable media (C D , DVD, tape o r f loppy disk.) The preset is: Disab l ed. The destination CD /D VD ca n be ejected or the tape can be dism o unted after the backup is completed. Ask for the first media while backing up to removable media This option is e[...]
-
Page 71
71 Copyright © Acronis, Inc., 2000 - 2010 This option is effec tive for Win do ws and Linu x operati ng systems and bootable media, when the backup destination is a deduplicating vault. The preset is: Disab l ed . Enabling this opti o n turns off dedup licating backup s at source, meaning that ded uplication will be performed by Acr o nis Back up [...]
-
Page 72
72 Copyright © Acronis, Inc., 2000 - 2010 The environment the agent opera tes in (Windows, bootable m edia) The type of data bein g recovered (disk, file) The operating syst em being recovered fr o m the disk backup The following table su mmarizes the availability o f the recovery options. Ag en t f or Wi nd ows Bo ot abl e medi a (L i[...]
-
Page 73
73 Copyright © Acronis, Inc., 2000 - 2010 SNMP (p. 77 ) + + - - 3. 3. 2.1 P re/ Po st c om ma nd s This option is effec tive for Win do ws and Linu x operati ng systems and PE-based bootable media. The option enables y ou to define the commands to be aut o matically e xecuted befo re and after the data recovery. Example of how y ou can us e the pr[...]
-
Page 74
74 Copyright © Acronis, Inc., 2000 - 2010 command is successfully executed. Fail the task if the command execution failed. executed despite execution failure or success. the command execution and irrespective of the command execution result. P ost -r ec ove ry co mm an d To s pec if y a c omm an d/e xec ut ab le fi le to b e e xec ute d af te r th[...]
-
Page 75
75 Copyright © Acronis, Inc., 2000 - 2010 The preset is: Recove r files with their securi ty setting s . If the file NTFS per m issions were preserved during bac kup (p. 65 ), you can ch oo se w hether t o recover the permi ssions or let the files inhe rit the NTFS permissions fr om the folder to which the y are recovered. 3. 3. 2.4 No ti fi cat i[...]
-
Page 76
76 Copyright © Acronis, Inc., 2000 - 2010 Port – set the port o f the S M TP server. By default, the port is set t o 25. User name – enter th e user name. Password – enter the password. Click Send test e-ma il mes sage to check if the settings are correct. M ess en ge r s er vi ce (W in P opu p) This option is effec tive for Win [...]
-
Page 77
77 Copyright © Acronis, Inc., 2000 - 2010 To s el ect wh et her t o l og th e r ec ove ry op er ati ons ev en ts in th e Ap pl ic at io n E ve nt L og of Wi nd ows : Select one of the f o llowing: Use the setting set in the Machine options – to use the setting specified for the machine. For more information refer to Machine options (p. 47 ).[...]
-
Page 78
78 Copyright © Acronis, Inc., 2000 - 2010 Do not show message s and dialogs while processing (silen t mode) The preset is: Disab l ed . With the silent m o de enabled , the progra m will autom atically handle situations re quiring user interaction where p ossible. If an operation canno t con tinue without user interacti o n, it will fail. Details [...]
-
Page 79
79 Copyright © Acronis, Inc., 2000 - 2010 The option defines whether to reboot the machin e auto m atically if i t is required for recover y. Such might be the case when a volume locked by th e operating system has to b e recovered. Reboot machine after recovery This option is effec tive whe n o perating under bootable media. The preset is Disa bl[...]
-
Page 80
80 Copyright © Acronis, Inc., 2000 - 2010 4 Va ul ts A vault is a locati o n for stor ing backup archives. For ease of use and administration, a vault is associated with the archives' metadata. Referring to this metadata ma kes for fas t and convenient operations with archi ves and backups stored in the vault. A vault can be organ ized on a l[...]
-
Page 81
81 Copyright © Acronis, Inc., 2000 - 2010 4. 1 Per so nal v aul ts A vault is called p erso nal if it was created using direct co nnection of t he c o nsole t o a managed machine. Personal vaults are specific for each m anag ed machine. Personal vaults are visible to any user that can l og on to the system. A user's ri ght to back up to a per[...]
-
Page 82
82 Copyright © Acronis, In c., 2000- 2010 Vault content The Vault conten t section contain s the archives t able and toolbar. The archives t able displays archives and backups tha t are stored in the vault. U se the archives toolbar to perform actions on the selected archi ves and backup s. The list of ba ckups is expanded by clicking the "pl[...]
-
Page 83
83 Copyright © Acronis, Inc., 2000 - 2010 Explore a vault's content Click Explore . In the ap pearing Explorer window, examine the selected vault's content. Validate a vault Click Validate . You will be taken to the Validation (p. 159 ) page, where th is vault is already pre - selected as a source. The vault validation checks al l the ar[...]
-
Page 84
84 Copyright © Acronis, In c., 2000- 2010 2. Move the archive s to vault B manually by means of a t hird-party file manager. 3. Edit the backup plan s that use vault A : redirec t their destination to vault B . 4. In the vaults tree, select vault B to check whethe r the arch ives are displa y ed. If not, click Refresh . 5. Delete vault A . 4. 2 Co[...]
-
Page 85
85 Copyright © Acronis, Inc., 2000 - 2010 All the operations des cribed below are perform ed by clicking the corresponding butto ns on the toolbar. These operations can be als o accessed from the '[Backup name]' action s bar (on the A ctions and tools pane) and fr om the '[Backup name]' a ctions item of the m ain menu. The foll[...]
-
Page 86
86 Copyright © Acronis, In c., 2000- 2010 The filters in this wind ow are from the archives list of the vault view. Thus, if some filters hav e been applied to the archi v es list, only the archives and back ups corresponding to these filters are display ed here. To see all content, cle an all the filter fields. What happens if I delete a backup t[...]
-
Page 87
87 Copyright © Acronis, Inc., 2000 - 2010 5 Sc he du lin g Acronis scheduler help s the adminis trator adapt backup plans to the co m pany’s daily routin e and each employee’s wo rk styl e. The plans’ tasks will be l aunched systema tically keeping t he critical data safely protected. The scheduler uses lo cal ti m e of the m achine t he bac[...]
-
Page 88
88 Copyright © Acronis, Inc., 2000 - 2010 The specified period of tim e has passed sinc e the last successful backup completed The scheduler beha vio r, in case the event occurs but t he co nditi o n (or an y of multiple conditions) is not met is defin ed by the Task start conditions (p. 68 ) backup option. What-ifs What if an event o cc urs ([...]
-
Page 89
89 Copyright © Acronis, Inc., 2000 - 2010 Examples "Simple" daily s chedule Run the task ever y day at 6PM. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 day(s). 2. Once at: 06:00:0 0 PM . 3. Effective: From: not set . The t ask will be started on the current day, if it has been created b efo re 6PM. If you ha[...]
-
Page 90
90 Copyright © Acronis, Inc., 2000 - 2010 task's recurrences is 4 hours, and between the third , fourth and fifth is 2 hours. In t his case, the optimal way is t o add two s chedules to the task. First daily sched ule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM . 3. Effective: From: 09/20/2 009 . To: not set . [...]
-
Page 91
91 Copyright © Acronis, Inc., 2000 - 2010 Examples "One day in the week" schedule Run the task ever y Frida y at 10PM, s tarting from a certain date (say 05/14/2009) and ending after si x months. The schedule's param eters are thus set up as foll o ws. 1. Every: 1 we ek (s) on: Fr i . 2. Once at: 10:00:0 0 PM . 3. Effective: From: 0[...]
-
Page 92
92 Copyright © Acronis, Inc., 2000 - 2010 Thursday: every 3 h ours from 9 AM till 9 PM Friday: twice at 1 2 PM and 9 PM (i.e. sa me as on Mon day) Saturday: once at 9 PM Sunday: once at 9 PM Combining the identical times, the following three schedules can be added t o the task: First schedule 1. Every: 1 week(s) on : Mon , Fri . 2.[...]
-
Page 93
93 Copyright © Acronis, Inc., 2000 - 2010 Every: <...> From: <...> Until: <...> Set up how many t imes the task will be run during the spec ified time interval. For example, setting the ta sk frequency to Every 1 hour Fro m 10:00:00 AM until 10:00:00 PM allo ws the task to be run 12 times from 10 AM to 10 PM during one day . In t[...]
-
Page 94
94 Copyright © Acronis, Inc., 2000 - 2010 To: 12/01/2010 . A ctually the task will end on the last workday of November. By setting up this date we just define that the task must be discon tinued in 20 10, after autu m n end s in the northern hemispher e. Several monthl y schedu les for one task In the case when the task needs to be run on differen[...]
-
Page 95
95 Copyright © Acronis, Inc., 2000 - 2010 For example, you may want to set up a backup plan that will aut omatically perform an emergency full backup of your data a s soon as Windows disc o vers that yo ur hard dis k drive is about to fail. Parameters Log name Specifies the na me of t he l og. Select the name of a standard log ( Application , S ec[...]
-
Page 96
96 Copyright © Acronis, Inc., 2000 - 2010 WindowsUpdateCl ient and event number 18 in to the System log; the type o f this event is Information . When creating the plan, type or select the follo wing in the Schedule area: Log name : S y stem Event source : Microsoft-W indows-Window sUpdateClient Event type : Information Event ID : [...]
-
Page 97
97 Copyright © Acronis, Inc., 2000 - 2010 5. 6 Co ndi tio ns Conditions add more flex ib ility to t he sch eduler, enabling to execu te backup t ask s w ith respec t to certain conditi o ns. Once a specified event occurs (see the " Scheduling (p. 87 )" section for the list o f available events), the schedu ler check s the specified condi[...]
-
Page 98
98 Copyright © Acronis, Inc., 2000 - 2010 Task start conditi o ns: Wait until the conditions are me t , Run the task anyway af ter 2 hour(s). As a result, (1) If the user bec omes idle before 9PM, th e backup task will start at 9PM. (2) If the user bec omes idle between 9PM and 11PM, the backup task will start i mmediately after the user becom[...]
-
Page 99
99 Copyright © Acronis, Inc., 2000 - 2010 Condition: Fits the time interval , from 04:30:00 PM un til 1 0:00:0 0 PM . Task start conditi o ns: Skip the task execution . As a result, (1) if the user l o gs off betw een 04:30:00 PM and 10:00: 00 PM, the backup task will start immediately following the logg ing off. (2) if the user l o gs off[...]
-
Page 100
100 Copyright © Acronis, Inc., 2000 - 2010 5 . 6 . 5 T i m e s i n c e l a s t b ac k u p Applies to: Windows, Linu x Enables to put a backup t as k run on hold until the specifi ed time interval since the last successful backup completion pas ses. Example: Run the backup task at system startup, but only if more than 12 hours have passe d since t [...]
-
Page 101
101 Copyright © Acronis, Inc., 2000 - 2010 6 D i rec t ma nag em en t This section covers o perati ons t hat can be perform ed directly on a managed m achin e by using the direct console-agent co nne ction. The content of this s ection is applicable to both stand-alo ne and advanced editions o f Acron is Backup & Recovery 10. 6. 1 Ad mi nist e[...]
-
Page 102
102 Copyright © Acronis, Inc., 2000 - 2010 Create now will launch the Boota ble Media Builder (p. 237 ). No backups h ave been created for X days Back up now The Dashboard warn s you that no data was backed up on the machine for a relativ ely long period of time. Back up now will take you to Create a Backup Plan page where you can instantly config[...]
-
Page 103
103 Copyright © Acronis, Inc., 2000 - 2010 Alternatively, y o u can revi ew the task execution sta te s in the Backup pla ns and tasks (p. 103) view and specify your decisi on on each task in the Informat ion panel (or in the Task de tail s (p. 111 ) window). 6 . 1 . 2 B a c k u p p l a n s a n d t as k s The Backup plans an d tasks view keeps you[...]
-
Page 104
104 Copyright © Acronis, Inc., 2000 - 2010 2 Running At least one task is running. Otherwise, see 3. No action is required. 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition . This situation is qu ite normal, b ut delaying a backu p for too long is risky. The solution may be to set the maximum delay o r force the cond[...]
-
Page 105
105 Copyright © Acronis, Inc., 2000 - 2010 3 OK All the tasks are completed successfully. No action is required. No te that a backup plan can be OK in case none of the tasks has b een started yet or some of the tasks are stopped or b eing stopped. These situation s are considered as normal. T ask s ta tes A task can be in one o f the following sta[...]
-
Page 106
106 Copyright © Acronis, Inc., 2000 - 2010 Task state diagram T ask s ta tus es A task can have o ne of the fo llowing status es: Error ; Warning ; OK . A task status is deri ved from the result of the last run of the task. S tat us H ow it i s d ete rmi ned H ow to han dle 1 Error Last result is "Failed" Identify the failed task -> C[...]
-
Page 107
107 Copyright © Acronis, Inc., 2000 - 2010 6. 1. 2.2 Wo rk in g w it h ba cku p pla n s an d tas ks A cti on s on ba ck up pl an s a n d ta sks The following is a guid eline for you to perfor m operations with ba ckup plans and task s. To Do Create a new backup plan, or a task Click New , then select one of the following: Backup plan (p. 116 )[...]
-
Page 108
108 Copyright © Acronis, Inc., 2000 - 2010 Stop a plan/ta sk Backup plan Click Stop . Stopping the run ning backup plan stops all its tasks. Thu s, all the task operations will be aborted. Task Click Stop . What will happen if I stop the task? Generally, stopping t he task aborts its operation (backu p, recovery, validation, exporting, conversion,[...]
-
Page 109
109 Copyright © Acronis, Inc., 2000 - 2010 Edit a plan /task Backup plan Click Edit . Backup plan ed iting is performed in the same way as creat ion (p. 116 ), except for the following limitat ions : It is not always possible to u se all scheme option s, when e diting a backup p lan if the created archive is not e mpty (i.e. contains b ackups). 1.[...]
-
Page 110
110 Copyright © Acronis, Inc., 2000 - 2010 Delete a plan/task Backup plan Click Delete . What will happen if I delete the backup plan? The plan's deletion delet es all its tasks. Why can't I de lete the backup plan? The backup plan is in the "Running" state A backup plan cannot be deleted, if at least one of it s tasks is r[...]
-
Page 111
111 Copyright © Acronis, Inc., 2000 - 2010 Configuring backup pl ans and the tasks table By default, the table has six columns that are disp layed, others are hidden. If required , you can hide the displayed c o lumns and show hid den ones. To s how o r hi de co lum ns 1. Right-click any c o lumn hea der to open the context menu. The menu items th[...]
-
Page 112
112 Copyright © Acronis, Inc., 2000 - 2010 Recovery (disk) Disk backup recove ry Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes fro m a disk backup Recovery (MBR) Master boot record recov ery Recovery (disk to existing V M) Recovery of a disk/volum e backup to an existing virtual machine Recovery (disk to ne w VM) R[...]
-
Page 113
113 Copyright © Acronis, Inc., 2000 - 2010 Progress The Progress tab is a vailable while the task i s running. It is common for all ty pes of tasks. The tab provides informati o n ab out task progr ess, elapsed time and other para meters. Ba cku p pla n d et ai ls The Backup plan de tails window (also duplicat ed on the Information panel) aggr ega[...]
-
Page 114
114 Copyright © Acronis, Inc., 2000 - 2010 Validation (if select ed) - events b efore or after which the validation is perf o rmed , and validation schedule. Backup options - backup options changed against the default values. 6 . 1 . 3 Log The Log stores th e history of operations performed b y Acronis Bac kup & Recovery 10 on the mach[...]
-
Page 115
115 Copyright © Acronis, Inc., 2000 - 2010 View a log entry’s details 1. Select a log entry . 2. Do one of the follow ing Click View Details . Th e log entry's details will be d isplayed in a separate window. Expand t he Information panel, by clicking th e chevron. Save the selected log entries to a file 1. Select a single lo g entr[...]
-
Page 116
116 Copyright © Acronis, Inc., 2000 - 2010 Configuring the log ta ble By default, the table has seven columns that are displ ayed, others are hidden. If required, you can hide the shown colu mns and show the hidden ones. To s how o r hi de co lum ns 1. Right-click any c o lumn h eader to open the co ntex t menu. The menu ite m s that are ticked of[...]
-
Page 117
117 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a b ac ku p pla n, pe rf orm t he fol lo win g ste ps . General Plan name [Optional] Enter a uniq ue name for the backup pla n. A consci o us name let s you id entify the plan among others. Plan's credentials (p. 119) [Optional] The backup plan will run on behalf of th e user who is creat[...]
-
Page 118
118 Copyright © Acronis, Inc., 2000 - 2010 Access credentials (p. 128) [Optional] Provide credentials for the location if the pl an account does not have a ccess permissions to the l ocation. To access this opti o n, sele ct the Advanced v iew check box. Archive comments [Optional] Enter c omments on the archive. To a ccess this opti o n, select t[...]
-
Page 119
119 Copyright © Acronis, Inc., 2000 - 2010 Virtualization server (p. 139) Here you select the resulting virtual machine type and location. Available o ptions depend o n the host you selec te d in the pre v ious step. Storage (p. 139) Choose the storage o n the virtualization server or the folder to place th e virtual machine files in. Resultant VM[...]
-
Page 120
120 Copyright © Acronis, Inc., 2000 - 2010 Files Available if the Acr o nis Bac kup & Recovery 10 Agent for Wind ows (or for Linux) is install ed. Select this option to back up specific fil es and folders. If you are not conc erned about recovery of the op erating system along with all the settings and applications, but pla n to keep safe only[...]
-
Page 121
121 Copyright © Acronis, Inc., 2000 - 2010 Windows The swap file (pag efile.sys) and the file that keeps the RAM content when the machi ne goes into hibernation (hiberfil.s ys) are not backed up. After rec overy, the files will be re-cre ate d in the appropriate place with the zero size. A volume backup s to res all o ther files and f olders of th[...]
-
Page 122
122 Copyright © Acronis, Inc., 2000 - 2010 6 . 2 . 6 E x c l u s i o ns Set up exclusions fo r the sp ecific types of files you do not wish to back up. For example, yo u may n o t want database, hidden and system files and folder s, as well as files with specific extensions, to be stored in the archiv e. To s pec if y w hi ch f il es a nd fol de r[...]
-
Page 123
123 Copyright © Acronis, Inc., 2000 - 2010 Wi nd ows By file path C: FinanceF.log Excludes the file named " F.log" located in the folder C: Finance By folder path C: FinanceF Excludes the folder C: FinanceF (be sure to spe cify the full path starting from th e disk letter) Li nux By file path /home/user/Finance/F. log Excludes th[...]
-
Page 124
124 Copyright © Acronis, Inc., 2000 - 2010 To back up data to a l ocally attached tape device, ex pan d the Tape drives group, then click the required device. 2. Using the archives table To assist you with choosing the right destinati on, the table displays the na m es of the archives contained in each l o cation you select. While you are revi[...]
-
Page 125
125 Copyright © Acronis, Inc., 2000 - 2010 This behavior can be sup pressed by adding the [Dat e] variable (p. 128) to the arc hive name. If you do not select the Name ba c kup files us i ng the archive name... check box: Each backup will hav e a unique file name with th e exact time stamp and the backup type; for example: MyData_ 2010_03_26_1[...]
-
Page 126
126 Copyright © Acronis, Inc., 2000 - 2010 Your script can m o ve older backups based on the date stamp. See also “The *Date+ variable” (p. 128 ). Ex am pl e 3 . Ho ur ly ba ck up s w it hi n a da y Consider the follo wing scenario: You want to perfor m hourl y backups of your server's c ritical files every day. You want the f[...]
-
Page 127
127 Copyright © Acronis, Inc., 2000 - 2010 You want to swap th e drive s each Monday, so that on e drive contains backups of the curr ent week (Monda y through Sund ay), and the other dri ve those of the previous wee k. In this scenario, you need to create two bac kup plans as follows: a) When creating the first bac kup plan, specify MyMachin [...]
-
Page 128
128 Copyright © Acronis, Inc., 2000 - 2010 6. 2. 8.2 T he [D AT E] va ri ab le If you specify the [DATE] variable in the arch ive name, the file name of each backup will include that backup’s creation da te. When using this variable, th e first backup o f a ne w day will b e a full backup. Before crea ting the next full backup, the sof tware del[...]
-
Page 129
129 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the source data usi ng the cre dentials of the backup plan account specified in the Gen eral section. Use the followin g creden tials The program will ac cess the source data usi ng the cre dentials you specify. Use this opti on if the plan account d o es not have access permi[...]
-
Page 130
130 Copyright © Acronis, Inc., 2000 - 2010 In the Backup type fi eld, select whether y ou want to create a full, incremental or differential backup (p. 22 ). 6. 2. 10. 2 Ba ck u p la t er s ch eme With the Back up later scheme, the backup will be perf ormed only once, at the da te and ti me you specify. Specify the appropria te settings as follows[...]
-
Page 131
131 Copyright © Acronis, Inc., 2000 - 2010 Feb 5 — Feb 11 D D D D W - - Feb 12 — Feb 18 D D D D W - - Feb 19 — Feb 25 D D D D M - - Feb 26 — Mar 4 D D D D W - - Daily backups run e v ery workday except Frid ay, which is left for weekly and monthly backups. Monthly backups run every fourth Frida y, and weekly backups run on all other Friday[...]
-
Page 132
132 Copyright © Acronis, Inc., 2000 - 2010 Keep monthly ba ckups indefinitely. Backup scheme para meters can then be s et up as foll o ws. Start backup at: 11: 00 PM Back up on: All days Weekly/monthly : Saturday (for example) Keep backups: Daily: 1 week Wee kly: 1 mon th Monthly: indefinite ly As a result, an archi[...]
-
Page 133
133 Copyright © Acronis, Inc., 2000 - 2010 Have a weekl y summary o f file chan ges since las t mo nth (Fri day weekly differential backup ). Have a monthly ful l backup of your files. Moreover, assu m e that yo u w ant to r etain access t o all backup s, including the daily ones, f or at least six months. The following GFS sch eme suits s[...]
-
Page 134
134 Copyright © Acronis, Inc., 2000 - 2010 Parameters You can set up the f o llowin g parameters of a Tower of Hanoi schem e. Schedule Set up a d aily (p. 88 ), weekly (p. 90 ), or monthly (p . 92 ) schedule. Setting up schedule parameters allows creating simple schedules (exa mple of a simple daily schedule : a backup task will be run every 1 day[...]
-
Page 135
135 Copyright © Acronis, Inc., 2000 - 2010 Nu mbe r of l evel s Fu ll ba cku p ev ery On di ff ere nt da ys, c an go ba ck Ro ll- bac k pe ri od 2 2 days 1 to 2 days 1 day 3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level d oubles the full backup and roll-back peri[...]
-
Page 136
136 Copyright © Acronis, Inc., 2000 - 2010 Incremen tal Specifies on what schedule an d under which conditions to perform an incremental backup . If the archive contain s no backups at the time of the task ru n, a full b ackup is created instead of the in cremental backup . Differential Specifies on what sch edule and un der which conditions to pe[...]
-
Page 137
137 Copyright © Acronis, Inc., 2000 - 2010 Examples Weekly full backup The following sche m e yield s a full backup pe rformed every Friday nigh t. Full backup : Schedule: We ekly , every Friday , at 10:00 PM Here, all param et ers excep t Schedu l e in Full ba c kup a re left e mpty. All backups i n the archive are kept indefinitely (no archi ve [...]
-
Page 138
138 Copyright © Acronis, Inc., 2000 - 2010 Finally, we create r etention rules for the archiv e: let us retain only backups that are no older than six months, and let the cleanup be performed after each backup task and also on th e last day of every month. Retention rules : Delete ba ckups o lde r than 6 months Apply the rule s : After ba cking up[...]
-
Page 139
139 Copyright © Acronis, Inc., 2000 - 2010 Validation of the archi ve will validate all the archive’s backup s and m ay take a long time and a l o t of system res ources. 3. Validation sche dule (appears only if you have selected the on schedule in step 1) - set the schedule of validation. F or more information see t he Scheduling (p. 87 ) sec t[...]
-
Page 140
140 Copyright © Acronis, Inc., 2000 - 2010 Agent for Hyper-V is installed on the host You can choose bet ween creating a virtual m achine on the Hyper -V serve r and creating a VMware Workstati on, Microsoft Virtual PC o r Parall els Workstation machine in the folder you select. Virtual machines cr eated on the Hyper-V server as a result of ba[...]
-
Page 141
141 Copyright © Acronis, Inc., 2000 - 2010 A dynamic volume can be recover ed over an existing volum e, to unallocated space of a disk grou p, or to unallocated space o f a b asic disk. To learn more ab o ut recovering d ynamic volumes, please turn to the Microsoft L D M (Dyna mic volumes) (p. 34 ) section. Acronis Backup & Rec overy 10 Agent [...]
-
Page 142
142 Copyright © Acronis, Inc., 2000 - 2010 after the recover y is start ed. The operating system bo o ts from th e backup image and the machine bec omes operation al and ready to pro v ide n ece ssary servi ces. The data required to serve incoming r equests is recovered with the hig hest priority; everything e lse is recovered in the background. S[...]
-
Page 143
143 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y c re den ti als 1. Select one of the f o llowing: Run under the current user The task will run under the credentials with which the u ser who star ts the ta sks is logged on. If the task has to run o n sc hedule, you will be asked for the c urrent user's passw ord on completing the [...]
-
Page 144
144 Copyright © Acronis, Inc., 2000 - 2010 After entering acc ess credentials, the folders on the server become available. Clic k the appropriate folder o n the s erv er. You can access th e server as an anonymous user if the server enables such access. To do so, click Use ano nymous access instead o f entering credentials. According to t he origi[...]
-
Page 145
145 Copyright © Acronis, Inc., 2000 - 2010 The disk geometry is different to that stored in t he ba ckup. There are probab ly other times when you may n eed to recover the MBR, bu t the above are the mos t common. When recovering th e MBR of one disk to another Ac ronis Backup & Recovery 1 0 recovers T rack 0 , which does not affe ct the t[...]
-
Page 146
146 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 6.1 D isk s Available disk destinati ons depend on the agents op erating on the machine. Recover to: Physical mach i ne Available when the Ac ronis Backup & Recovery 1 0 Agent for Windows or Agent fo r L inux is installed. The selected disks will be recovered to th e physical disks of the machin[...]
-
Page 147
147 Copyright © Acronis, Inc., 2000 - 2010 NT si gn at ure When the MBR is s elected along with the disk backup , you need to retain opera ting system bootability on th e target di sk volume. The operating s y stem must have the system volume information (e.g. v o lu me letter) ma tched with the disk NT signature, which is kept in the MBR disk rec[...]
-
Page 148
148 Copyright © Acronis, Inc., 2000 - 2010 If Acronis Backup & Recovery 10 Agen t for Hyper-V or Agent for ESX/ESXi is instal led. These agents enab le creatin g a new virtual machine on the vir tualization server you specif y . The new virtual machine will be configured au tomaticall y , the s o urce machine configuration being copied where p[...]
-
Page 149
149 Copyright © Acronis, Inc., 2000 - 2010 Be careful! To be o n the safe side, it is ad visable to assign unique nam es to the volumes. The Linux-style bo o table medi a shows local disks and volu m es as un mo unted (sd a1, sda2...). Vo lu me pr op er tie s Resizing and relocating When recovering a volume to a basic MBR disk, y ou c an resize an[...]
-
Page 150
150 Copyright © Acronis, Inc., 2000 - 2010 Logical drive letter (for Windows only) Assign a letter to the recovered volume. Select the desired letter fro m a drop-down list. With the default AU TO selection, the first unused le tt er will be assigned to the volume. If you select NO, no letter will be assigned to the reco v ered v olume, hi[...]
-
Page 151
151 Copyright © Acronis, Inc., 2000 - 2010 set by the virtualizati on product. You can add virtual disks to the machine c o nfig uration or, in some ca ses, delete the pro p osed disks. Implementatio n of Xen machines is based on Mic rosoft Virtual PC and inhe rits its limitations: up to 3 IDE d isks and 1 processor. SCSI disks are not suppo rted.[...]
-
Page 152
152 Copyright © Acronis, Inc., 2000 - 2010 By mask (*) *.log F* Excludes all files with th e .log extension Excludes all files and folder s with names starting w ith "F" (such as folders F, F1 a nd files F.log, F1.log) By mask (?) F???.log Excludes all .log files with n ames consisting of four symbols and starting w ith "F" Wi [...]
-
Page 153
153 Copyright © Acronis, Inc., 2000 - 2010 Password . The passw ord for the account. 2. Click OK . 6 . 3 . 8 W h e n t o r e c o v e r Select when to start the recovery task: Recover now - the r ecovery task will be started i mmediately after you click the final OK . Recover later - the recovery task will be started at the date and tim[...]
-
Page 154
154 Copyright © Acronis, Inc., 2000 - 2010 Universal Restore settings Automatic driver search Specify where the pr ogram will search for the Hardware Abstraction Layer (HA L), HDD controller driver and netw ork adapter driver( s): - If the drivers are o n a ven dor's disc or other removable media, turn on the Sea r ch removab le media . - If [...]
-
Page 155
155 Copyright © Acronis, Inc., 2000 - 2010 With Acronis Backu p & Recover y 10 Agent for Windo w s , you can recov er a disk (volu m e) backup to a new virtual machine o f a ny o f the f o llowing types: V Mware Workstati on, Microsoft Virtual PC, Parallels Workstation or Citrix XenServer Open Vir tual Appliance (OVA). Files of the new v irtua[...]
-
Page 156
156 Copyright © Acronis, Inc., 2000 - 2010 You will be taken to the Backup plans and task s view where you can examine the state and pr ogress of the recover y task. Post-conversion oper ations The resulting machin e always has SCSI disk interfa ce and basic MBR volu m es. If t he m achin e uses a custom boot l oader, you migh t need to config ure[...]
-
Page 157
157 Copyright © Acronis, Inc., 2000 - 2010 One part of the GRUB l oader resides either in th e first several sectors of the disk or in the first several sec to rs of the volume. The rest is on the file system of one of the vo lumes. System bootability can be recovered aut omatically only when the GRUB resides in the first several sectors o f the d[...]
-
Page 158
158 Copyright © Acronis, Inc., 2000 - 2010 cp /mnt/system/boot /grub/grub.conf /mnt/s ystem/boot/grub/grub.c onf.backup 5. Edit the /mnt/sys tem/boot/grub/menu.lst file (for Debian, Ubuntu, and SUSE Li nux distributions) or the /mnt/system/boot/gru b/grub.conf file (for Fedora and Red Hat Enterprise Linux distributions ) — for example, as f ollo[...]
-
Page 159
159 Copyright © Acronis, Inc., 2000 - 2010 6. 3. 11. 2 A bou t Win dow s loa de rs Windows NT/2000/XP /2003 A part of the loader resides in the partition bo ot sector, the r est is in the files ntldr, boot.ini, ntdetect.com, ntbo o tdd.sys. boot.i ni is a text file that contains the l oader configuration. Exampl e: [boot loader] timeout=30 default[...]
-
Page 160
160 Copyright © Acronis, Inc., 2000 - 2010 To c re ate a v al ida ti on tas k, pe rf orm t he fo llo win g s te ps . General Task name [Optional] Enter a uniq ue name for the validati o n task. A co nscious na me lets you quickly identify the task a mong the others. Credentials (p. 16 0 ) [Optional] The valida tion task will run on behalf of the u[...]
-
Page 161
161 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out operations available depend ing on the user privileges, s ee the User privileges o n a managed machi ne (p. 24 ) se ction. 6 . 4 . 2 A r c h i v e s e l ec t i o n Selecting the archive 1. Enter the full path to the l ocation in the Path fi eld, or select the desired f older in the fo[...]
-
Page 162
162 Copyright © Acronis, Inc., 2000 - 2010 While you are re v iewing the locati o n content, archives can be ad ded, dele te d or m odified by another user or by t he pro gram itself according to sch eduled operations. Use the Refresh button to refresh the lis t of archives. 3. Click OK . 6 . 4 . 3 B a c k u p s e l e c t i o n To s pec if y a b a[...]
-
Page 163
163 Copyright © Acronis, Inc., 2000 - 2010 The program will ac cess the location using t he credentials y o u specify. U se this option if the task account does no t have access permissions to the l o cation. Y o u might ne ed to provide special credentials f o r a ne two rk shar e or a storage node vault. Specify: User name . When ent ering t[...]
-
Page 164
164 Copyright © Acronis, Inc., 2000 - 2010 Offline virus c lean : if a mac hine is attacked, the administrato r shuts it down, boots with b ootable media and creates an i mage. Then, the administrat or mounts this image in read /write mode, scans and cleans it with an antivirus program, and fina lly recovers the machine. Error check : if r[...]
-
Page 165
165 Copyright © Acronis, Inc., 2000 - 2010 ftp://ftp_server:p ort _number or sftp://sftp_ server:port number If the port number is n ot specified, port 21 is used for FTP and port 22 is used for SF TP. After entering acc ess credentials, the folders on t he se rver becom e available. Click the appropriate folder o n the s erver. You can access th [...]
-
Page 166
166 Copyright © Acronis, Inc., 2000 - 2010 2. Click OK . According to t he original FTP specification, crede ntials required for access to FTP servers are transfer red through a ne twork as plaintext. This means that th e user name and password can b e intercepted by an eavesdropper using a p acket sniffer. 6 . 5 . 4 V o l u m e s e l e c t i o n [...]
-
Page 167
167 Copyright © Acronis, Inc., 2000 - 2010 6. 7 Ex por tin g arc hiv es a nd b ack ups The export operati on creates a copy of an archi ve or a self-sufficient part copy of an archive in the location you specify. The original archive re m ains untouched . The export operati on can be applied to: a single archi v e - an exact archive copy will [...]
-
Page 168
168 Copyright © Acronis, Inc., 2000 - 2010 The resulting ar chive's options The exported archi ve inher its t he opti o ns of th e original archive , including encryption and th e password. When exporting a password-protected arch ive, you are prompted for t he password. If the original archive is encrypted, the password is used to encrypt th[...]
-
Page 169
169 Copyright © Acronis, Inc., 2000 - 2010 Task credential s (p. 169) [Optional] The exp o rt task will run on behalf of the us er who is creating the task. You can change the task credentia ls if necessary. To acc ess this option, select the Advanced v iew check box. What to export Export Select an object to e xport : Archive (p. 143 ) - in tha t[...]
-
Page 170
170 Copyright © Acronis, Inc., 2000 - 2010 To learn more ab out operations available dependin g on the user pri v ileges, s ee the User privileg es on a managed machi ne (p. 24 ) se ction. 6 . 7 . 2 A r c h i v e s e l ec t i o n Selecting the archive 1. Enter the full path to the l ocation in the Path fi eld, or select the desired f older in the [...]
-
Page 171
171 Copyright © Acronis, Inc., 2000 - 2010 While you are re v iewing the location c o ntent, archiv es can be added, deleted o r modifi ed by another user or by t he pro gram itself according to sch eduled operations. Use the Refresh button to refresh the lis t of archives. 3. Click OK . 6 . 7 . 3 B a c k u p s e l e c t i o n To s pec if y a b ac[...]
-
Page 172
172 Copyright © Acronis, Inc., 2000 - 2010 To export data t o a person al v ault, expand th e Person al v aults gr o up and click the vault. To export data t o a local fol der on the machine, expan d the Local folders gr oup and click the required folder. To export data t o a networ k share, expand the Network folde rs group, select th[...]
-
Page 173
173 Copyright © Acronis, Inc., 2000 - 2010 To s pec if y c re den ti als 1. Select one of the f o llowing: Use the task cred entials The program will ac cess the location using t he creden tials of the task account sp ecified in the General section. Use the followin g creden tials The program will ac cess the location using the creden tial[...]
-
Page 174
174 Copyright © Acronis, Inc., 2000 - 2010 6. 8. 1.1 A cro ni s Se cur e Zo n e D is k The Acronis Secur e Zone ca n be located on any fixed hard drive. Acronis Secure Zone is always created at the end of the hard disk. A machine can ha ve only one Acronis Secur e Zone. Acronis Secure Zone is crea ted using unallocated space, if available, or at t[...]
-
Page 175
175 Copyright © Acronis, Inc., 2000 - 2010 6. 8. 1.4 Re su lt c onf ir ma t io n The Result confir mation window displays the expecte d partition layout accordin g to the settings y ou have chosen. Click OK , if you are satisfied with the lay o ut and the Acr onis Secure Zone creation will start. How the settings you make will be processed This he[...]
-
Page 176
176 Copyright © Acronis, Inc., 2000 - 2010 3. Specify the ne w size of the z o ne by: dragging the slid er and s electing any size between the current and maxi mum values. The maximum size is e qual to the disk’s unallocated space plus the total free space o f all sele cted partitions; typing an exact valu e in the Acronis S ecure Zone S[...]
-
Page 177
177 Copyright © Acronis, Inc., 2000 - 2010 (if you have GRUB). If th e system fails to boot, y ou will be abl e to start the b ootable rescue utility, by pressing F11 or by s electing it from the menu, respec tively. The system disk (or, the /bo ot partition in Linux) sho uld have at least 70 MB of free spa ce to activate Acronis Startup Reco very[...]
-
Page 178
178 Copyright © Acronis, Inc., 2000 - 2010 PE -based bootabl e media PE -based bo o table m edia contains a minimal Win dows system call ed Windows Preinstallation Environment (Win PE) and Acronis Plug-in for WinP E, that is, a modification o f Acronis Bac kup & Recovery 10 Agent that can run in the preinstallation environment. WinPE proved to[...]
-
Page 179
179 Copyright © Acronis, Inc., 2000 - 2010 Bootable Med ia or, as a sep arate componen t. The wizard will guide yo u through the necessary operations. Pleas e refer t o Adding the Acronis Plug-in to WinPE 1.x (p. 183) for d et ails. To be able to crea te or m odify PE 2.x or 3.0 images, in st all Bootable Media Bui lder on a machine where Windows [...]
-
Page 180
180 Copyright © Acronis, Inc., 2000 - 2010 If not configured, the Acronis loader waits for som eone to select whether to b oot the operating system (if present) or t he Acronis component. If you set, say, 10 sec. for th e bootable agent, the age nt will launch 10 seconds after th e menu is displayed. This enables unattended onsit e operati[...]
-
Page 181
181 Copyright © Acronis, Inc., 2000 - 2010 vga= mode_number Specifies the vid eo mode to be used by the bootable media's graphical user inte rface. The mode number is given b y mode_ number in the hexadecimal for m at — for exa mple: vga=0x318 Screen resolution and t he number of colors correspon ding to a mode number may be diff erent on d[...]
-
Page 182
182 Copyright © Acronis, Inc., 2000 - 2010 These calls might no t work properly on some m achine s. But this may be the only way to get the interrupt routing t able. Ne tw or k s ett in gs While creating Acr onis bootable media, you have an option to pre-configure net wo rk c onnections that will be used b y the bo otable agent. The f ollowing par[...]
-
Page 183
183 Copyright © Acronis, Inc., 2000 - 2010 the default port the currently us ed po rt the new port (en te r the p ort number). If the port has not b ee n pr e-configured, the agen t uses the default port number (987 6.) This port is also used as defaul t by the Acro nis Backup & Recovery 10 Manage ment Console. D riv er s f or Un i[...]
-
Page 184
184 Copyright © Acronis, Inc., 2000 - 2010 To a dd Ac ro nis P lug -i n to Win PE 1 .x: 1. Unpack all files of your WinPE 1.x ISO to a separate fo lder on the hard disk. 2. Start the Bootabl e Media Buil der either from the management console, b y se lect ing Tools > Create Bootable Med i a or, as a separate c o mponent. 3. Select Bootable med [...]
-
Page 185
185 Copyright © Acronis, Inc., 2000 - 2010 4. Specify network setting s (p. 182) for the machine n etwork adapters or choos e DHCP auto configuration. 5. [optional] Specify Win dows drivers to be added t o Win do ws PE. Once you boot a machine into Windows PE, the drivers can help you access the device wher e the backup ar chive is located. Click [...]
-
Page 186
186 Copyright © Acronis, Inc., 2000 - 2010 11. Specify the output f o lder a nd the full path to the resul ting ISO file including the fil e name or the media to create. 12. Build the Bart PE. 13. Burn the ISO to CD or D VD (if t his has n o t been d one yet) or copy to a flash drive. Once the machine b oots into the Bart PE and y ou conf igure th[...]
-
Page 187
187 Copyright © Acronis, Inc., 2000 - 2010 After entering acc ess credentials, you will see a lis t of archives located in the vault. 6. 10. 3. 1 S ett in g up a di sp lay m ode For a machine bo o ted from m edia, a display v ideo mode is detected automaticall y based on the hardware configuration (monitor and graphics card specifications). If, fo[...]
-
Page 188
188 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 0 . 4 L i s t o f c o m ma n d s an d u t i l i t i e s a v ai l a bl e i n L i n u x - ba s e d b o o t a b l e m e d i a Linux-based bootabl e media contains the foll owing command s and command line utilities , which you can use when runnin g a command shell. To start the command sh ell, press CT[...]
-
Page 189
189 Copyright © Acronis, Inc., 2000 - 2010 grep ping umount growisofs pktsetup uuidgen grub poweroff vconfig gunzip ps vi halt raidautorun zcat hexdump readcd hotplug reboot 6 . 1 0 . 5 R e c o v e r i n g M D de v i c e s a n d l o g i c a l v o l u m e s To recover MD d ev ices, known as Linux Software RAID, and/ o r devic es creat ed by Logical[...]
-
Page 190
190 Copyright © Acronis, Inc., 2000 - 2010 To c re ate t he vo lu me st ruc tu re by us ing a sc ri pt 1. Boot the machine fr om a Linux-based bootable medi a. 2. Click Acronis Bo otable Agent . Then, click Run man agement console . 3. On the toolbar, cli ck Ac tion s , and then click Sta r t shell . Alterna tively, you can press CTRL+ALT+F2. 4. R[...]
-
Page 191
191 Copyright © Acronis, Inc., 2000 - 2010 Example Suppose that you pre vio usly perf ormed a disk backup of a machine with the following disk configuration: The machine has two 1-gigabyte and tw o 2-gigab y te SCSI hard disks, mounted on /dev/sda , /dev/sdb , /dev/ sdc , and /dev/sdd , r espectively. The first and second pairs of hard dis[...]
-
Page 192
192 Copyright © Acronis, Inc., 2000 - 2010 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size 1.99 GB ... VG UUID 0qoQ4l-Vk7W- yDG3 -uF1l-Q2AL-C0z0- vMeACu 5. Run the following c omman d to create the logical volu me; in the -L para meter, sp ecify the size given by VG Size : lvm lvcreate -L1.99G -- n[...]
-
Page 193
193 Copyright © Acronis, Inc., 2000 - 2010 2. Use the -- mount c ommand, specifying the volume's index in the -i param et er. For e xample: trueimagemnt -- mount / mnt -- filename smb://server/backups/linu x_machine.tib - i 4 This command mounts the logical volume DYN 1, whose index in the backup is 4, on the mount point /mnt. To u nmo un t a[...]
-
Page 194
194 Copyright © Acronis, Inc., 2000 - 2010 6 . 1 1 . 2 R u n n i n g A c r o n i s Di s k D i r ec t o r L i t e You can run Acronis D isk Director Lite under Windows or start it from a bootable media. Running Acronis Disk Director Lite under Windows If you run Acronis Backup & Recover y 10 Management Console, and connect it to a manag ed mach[...]
-
Page 195
195 Copyright © Acronis, Inc., 2000 - 2010 Starting the operations Any operation can be launched: From the volum e or disk context menu (both in the table and the graphic pan el) From the Disk mana g emen t menu of the co nsole From the Operation s bar o n the Actions and T ools pa ne Note that the list o f available operations in the [...]
-
Page 196
196 Copyright © Acronis, Inc., 2000 - 2010 3. In the window, y o u will b e able to set the disk partitioning scheme ( MBR or GPT) and the disk type (basic or dyna mic). The new disk state will be graphically represented in the Disk Managemen t view of the c onsole immediatel y. 4. By clicking OK , you'll add a pending operation of the disk i[...]
-
Page 197
197 Copyright © Acronis, Inc., 2000 - 2010 But with the wide rang e of available hard ware it is n o rmal tha t the target disk would differ in size from the source. If th e destination is larger, th en it would be advisable t o resize t he so urce disk volumes to a void leaving un allocated space on the targ et disk by sel ect ing the Proportion [...]
-
Page 198
198 Copyright © Acronis, Inc., 2000 - 2010 5. Wait until the machin e is t urned off. 6. Disconnect either t he sour ce or the target hard disk drive fr om the machine. 7. Start up the machin e. If y ou ne ed to le ave a n N T s ig nat ur e: 1. Click to clear th e Copy NT signature check box, if nece ssary. 2. Click to clear th e Turn off t he mac[...]
-
Page 199
199 Copyright © Acronis, Inc., 2000 - 2010 If you need to conver t a GPT disk to MBR: 1. Select a GPT disk to conver t to MBR. 2. Right-click on the se lected volume, and then click Convert to MBR in the context menu. You will receive a warning window, stating that you ar e about to convert G PT into MBR. You will be explain ed the chan ges that w[...]
-
Page 200
200 Copyright © Acronis, Inc., 2000 - 2010 6. 11. 5. 6 D isk c on ve rs io n: dy na mi c t o b as ic You would want to co nvert dynami c disks back to basic ones, e.g. if you want to start using an OS o n your machine that does not support dyna m ic disks. If y ou ne ed to co nve rt a dy nam ic dis k to b asi c: 1. Select the dynamic disk to conve[...]
-
Page 201
201 Copyright © Acronis, Inc., 2000 - 2010 Online The online status means that a disk is accessible in the read -write m ode. This is t he nor mal disk status. If you need a dis k to be accessible in the r ead -only mode, select the disk a nd then change its status to offlin e by sel ecting Change disk status to offline from the Ope rations me[...]
-
Page 202
202 Copyright © Acronis, Inc., 2000 - 2010 T ype s of dy na mi c v olu me s Simple Volume A volume created fr om free space on a single physi cal disk. It can consist of one region on the disk or several regi o ns, vir tually united by the Logical Disk Manager (LDM). It pr ovides no additional reliabilit y, no speed improvement , nor extr a size. [...]
-
Page 203
203 Copyright © Acronis, Inc., 2000 - 2010 Its pages will enable you to enter operation para meters, proceeding step- by -step further on and return to any previ o us step if necessary to change any previo usly s elected options. To help you wi th your choices, each par ameter is supplemented with detailed instructions. If you want to c reate a v [...]
-
Page 204
204 Copyright © Acronis, Inc., 2000 - 2010 If you are creating a dynamic volume and select one or several basic disks, as its destinati on, you will receive a warning t hat the selected disk will be con verted to dynamic automa tically. If need be, you will b e prompted to add the necessar y number of disks to your s elec tion, ac co rding t o the[...]
-
Page 205
205 Copyright © Acronis, Inc., 2000 - 2010 A Basic disk can c ontain up to four primary vo lumes. If they already exist, t he disk will have to be converted into dynamic, oth erwise or Active and Primary options will be disabled and you will only be able to se lect the Logical volume type. The warning message will advise you that a n OS installed [...]
-
Page 206
206 Copyright © Acronis, Inc., 2000 - 2010 Please note, t hat due to setting the new active volume, the former active volume le tter mig ht be cha nged and some o f the installed programs might stop run ning. 3. If another active volume is presen t in the syst em , you will receive the warning th at the previ o us active volume will have to b e se[...]
-
Page 207
207 Copyright © Acronis, Inc., 2000 - 2010 3. By clicking OK in the C hang e label window, you'll add the pendin g o perati on of changing the volume label . If when setting a n ew volume label you use c haracters that are unsupported b y the currently installed operating system, you will get the appropriate warnin g and the OK bu tton will b[...]
-
Page 208
208 Copyright © Acronis, Inc., 2000 - 2010 The Disk mana g ement vie w contains th e toolbar with icons to launch t he Undo , Redo and Com mit actions intended f o r pendi ng op erations. Th ese actions might also b e launched from the Disk management menu o f the console. All planned opera tio ns are added to the pendin g operation list. The Undo[...]
-
Page 209
209 Copyright © Acronis, Inc., 2000 - 2010 7 O n lin e bac ku p This section provid es detail s about using the Acronis B ackup & Recovery 10 Online service. This service enables y o u to do online backups to Acronis Onli ne Backup Storage. Acronis Backup & Re covery 10 Online m ight be unava ilable in your region. To find more information[...]
-
Page 210
210 Copyright © Acronis, Inc., 2000 - 2010 7 . 1 . 3 H o w l o n g w i l l m y b a c k u ps b e k e p t i n t h e o n l i n e s t o r a g e ? Your backups remain in the onlin e storag e until y ou de lete the m or until th e subscription expires. Recovering data fr om the online storage is possible fo r 30 days f ollowing the subscrip tio n expira[...]
-
Page 211
211 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 5.3 C an I us e A cr on is Un iv er sal R est or e whe n rec ov er in g a s ys tem f rom t he on li ne st ora ge? Yes. Acronis Uni v ersal Res tore is alwa ys available whe n recovering a system fro m the online st orage. Using Acronis Univers al Restore when recovering from other types of storage w[...]
-
Page 212
212 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 6.1 Wh at i s In it ia l See din g? Initial Seeding is an extra service that lets y o u save an initial full backup locally an d then send it to Acronis on a hard dis k drive. Acronis uploads the backup to the online storage. After that, you can add incr emental backups to this full backup, either m[...]
-
Page 213
213 Copyright © Acronis, Inc., 2000 - 2010 Having purchased a li cense from an Acronis partner, you receive a confirmation e-mail wi th a registration code. Clic k Enter new registration cod e on the same w eb page an d register the license. The license beco m es availa ble o n the Init i al Seed ing / Recovery tab. A license purchased in Acronis [...]
-
Page 214
214 Copyright © Acronis, Inc., 2000 - 2010 Packaging If possible, use the original packaging. Other wise, pack aging materials can be ob tained at any shipping outlet or s tationary store. The following are inst ructions about how to packag e your hard disk drive. St ep 1 Delicately rem o ve your har d disk drive from the machi ne. St ep 2 Place t[...]
-
Page 215
215 Copyright © Acronis, Inc., 2000 - 2010 St ep 4 Choose the transp o rt comp any that you will use for shi pping. On this compan y's web site, prepare and print two prepaid ship ping labels: 1. Shipping label for sending your hard drive. This lab el is placed on the top of the bo x. You sh o uld send your packag e to one of the Acr o nis da[...]
-
Page 216
216 Copyright © Acronis, Inc., 2000 - 2010 St ep 5 Securely seal the b ox with a sturdy tape. Then, stick t he shippin g label fo r sendin g your hard drive t o the top of the box, s o t he l abel does not wrap around the edge of the package. 7. 1. 6.1 0 Ho w do I tr ac k a n I ni tia l S ee din g or der s t at us ? On the Acronis Web si te, the I[...]
-
Page 217
217 Copyright © Acronis, Inc., 2000 - 2010 The order has been c ompl eted. The media has been retu rned (or: Returning th e media was not requested ) – Your m edia has been shipped bac k (the carrier and the tracking number are specified). If a prepaid shipping label was not pr o vide d with the media, the media will be discarded. [Occas[...]
-
Page 218
218 Copyright © Acronis, Inc., 2000 - 2010 7. 1. 7.6 C an I ob ta in ba ck ups t ake n fr om a nu mbe r of ma ch in es on a s ing le h ard d ri v e? No. A separate hard dri ve is required for ea ch machin e. 7. 1. 7.7 Ho w to b uy a L ar ge Sc al e R ec ove ry l ic en se ? You can buy a Large S cale Recovery license fro m an Acronis partner or in [...]
-
Page 219
219 Copyright © Acronis, Inc., 2000 - 2010 7 . 1 . 8 S u b s c r i p t i o n l i f e cy c l e F A Q This section explains a subscription lifecycle and subsc ription operations that you can perf orm on your account management Web pag e. 7. 1. 8.1 Ho w to a cc es s my ac cou n t m an ag eme nt We b p ag e? To access this Web pag e from the Acronis W[...]
-
Page 220
220 Copyright © Acronis, Inc., 2000 - 2010 An expired subscripti o n can be renewed within five days after expirati on. In such cases, the new subscription will be a ctivated immediately. Re ne wi n g a s in gl e s ub s cri pt io n To r en ew a s ubs cr ip tio n 1. Go to the account m anage ment Web page. 2. Make sure that you ha ve an available s[...]
-
Page 221
22 1 Copyright © Acronis, Inc., 2000 - 2010 7. 2 Wh er e do I st art ? On the Acronis Web si te, log in to your account ( create one if you are not regi stered yet) and navigate to Online ba c kup > Fo r Business . This is your acc ount management Web page . Here you can get a trial subscripti on, locate an Acronis par tner or buy subscrip tion[...]
-
Page 222
222 Copyright © Acronis, Inc., 2000 - 2010 the backup will fail. Wi th a server subscription, y ou ca n o nly back up the Wind o ws host. With a subscription for virtual machin es, you can bac k up bot h the Windows host and its virtual machines. Trial subscriptions You can get one free workstation subscription, ser ver subscription, or subscripti[...]
-
Page 223
223 Copyright © Acronis, Inc., 2000 - 2010 Reassigning a subscripti on does not restart its subscription peri od. To a ss ign an a ct iva ted s ubs cri pt ion t o a m ac hi ne 1. On the machine t o which y o u want t o assign an acti vated subscription, go t o the subscription activation windo w. 2. From Activated sub scriptio ns , select the acti[...]
-
Page 224
224 Copyright © Acronis, Inc., 2000 - 2010 After reassignin g Delete backups fr om Subscription 1 using Ma chine 2. You cannot d elete backups from Subscripti o n 2, unless you assign this subscription to any machin e. 7. 5 Co nfi gur in g p ro x y s et tin gs If the machine conne cts to the Internet through a pr oxy server, configure Acr o nis Ba[...]
-
Page 225
225 Copyright © Acronis, Inc., 2000 - 2010 Dual destinat i on (p. 67 ) By using the Ba c kup perfo rmance > Network c onnecti on speed option, y o u can v ary the transferring speed as kilobytes per second, but not as a percentag e. Command-line mode Acronis Backup & Rec overy 10 command-line utiliti es do not support online back up. 7.[...]
-
Page 226
226 Copyright © Acronis, Inc., 2000 - 2010 Reassign a subscriptio n Assign a subscription that is already activated, t o a different m achine. Registration co de A character string f o r regist ering a subscription or lice nse that was bough t from an Acronis partner. When you purchase such subscriptions o r licenses, you receive a confirma tio n [...]
-
Page 227
227 Copyright © Acronis, Inc., 2000 - 2010 8 G los sa ry A A cro ni s Act iv e Res tor e The Acronis propri et ary t echnology that brings a syste m online immediately af te r the s y stem recovery is started. T he sys te m boots from the backup (p. 233) and the machine becomes operational and r eady to provide necessary servic es. The data requir[...]
-
Page 228
228 Copyright © Acronis, Inc., 2000 - 2010 Limitation: requir es re -acti vation of loaders other tha n Windows loaders and GR UB. A gen t (A cr on is B ack up & Re cov er y 10 A ge nt ) An application tha t perfor m s data backup and recovery and enables other management operati ons on the machine (p. 2 36), such as tas k management and opera[...]
-
Page 229
229 Copyright © Acronis, Inc., 2000 - 2010 Ba cku p opt io ns Configuration para meters of a backup o perati on (p. 228), such as pre/post backup command s, maximum networ k bandwi dth allotted for the backup strea m or data compression level. Back up options are a part o f a backu p plan (p. 229 ). Ba cku p pla n ( Pl an ) A set of rules that spe[...]
-
Page 230
230 Copyright © Acronis, Inc., 2000 - 2010 4. On each machine, the agent (p. 228 ) installed o n the m achine finds da ta items using the sel ect ion rules. For example, if the selection rule is [A ll volumes], the entire machin e will be back ed up. 5. On each machine, the agen t installed on th e machine create s a backup plan (p. 229) using oth[...]
-
Page 231
231 Copyright © Acronis, Inc., 2000 - 2010 Built-in groups canno t be deleted, moved to other groups or manuall y modified. Custom groups cannot be created within built-in groups. There is n o way to remove a physical machine from the built-in group exc ept for re m oving the machine from the managem ent server. Virtual machin es are removed as a [...]
-
Page 232
232 Copyright © Acronis, Inc., 2000 - 2010 C lea nu p Deleting backups (p. 2 28) from a backup archive (p. 228) in order to get rid o f outdated backups o r prevent the archiv e from exceeding the desir ed size. Cleanup consists in app lying to an archive the ret ention rules set by the backup plan (p. 22 9) that produces the archi v e. This o per[...]
-
Page 233
233 Copyright © Acronis, Inc., 2000 - 2010 D ire ct ma nag em en t Any management o peratio n that is performed on a managed machine (p. 236 ) using the direc t console (p. 232)-agen t (p. 228) connection (as oppo sed to centralized manageme nt (p. 231) when the operations are c o nfigured o n the manag ement server (p. 237) and propagat ed by the[...]
-
Page 234
234 Copyright © Acronis, Inc., 2000 - 2010 222189 Descripti on o f Dis k Groups in Windows Disk Management http://support.micr o soft.c o m/kb/222 1 89/EN-US/ D yna mi c di sk A hard disk manag ed by Log ical D isk Manag er (LDM) that is available in Window s starting with Windows 2000. L DM helps flexibly all ocate volumes on a storage de vice fo[...]
-
Page 235
235 Copyright © Acronis, Inc., 2000 - 2010 the administrat or changes the crit eria so that the mach ine does not meet them anymore. There is no way t o remove a m achine from a dynamic group manually except for deleting the machine from th e management server. D yna mi c v ol um e Any volume l ocated on dynamic dis ks (p. 23 4 ), or mor e pre[...]
-
Page 236
236 Copyright © Acronis, Inc., 2000 - 2010 F Fu ll ba cku p A self-sufficient backup (p. 228) c o ntaining all da ta chosen for backup. Y o u do not need a ccess to any other backup to r ecove r th e data from a full backup. G GF S ( Gr and fa th er -Fa t h er-S on ) A popular backup sche me (p. 23 0) aimed to main tain the optimal balance betwe e[...]
-
Page 237
237 Copyright © Acronis, Inc., 2000 - 2010 M ana ge d va ult A centralized vault (p. 231) managed by a storag e no de (p. 238 ). Archiv es (p. 228) in a man aged vault can be accessed as f o llows : bsp://node_address/vault_ name/archive_name/ Physically, managed vaults can reside on a net wo rk sh are, SAN, NAS, on a hard drive l o cal to the sto[...]
-
Page 238
238 Copyright © Acronis, Inc., 2000 - 2010 P lan See Backup plan (p. 2 2 9 ). P oli cy See Backup policy (p. 229 ). R Re co ver y po in t Date and time to w hich th e backed up dat a can be reverted to. Re gi st ere d ma ch in e A machine (p. 236) managed by a manage ment server (p. 237). A machine can be registered on o nly one management se rver[...]
-
Page 239
239 Copyright © Acronis, Inc., 2000 - 2010 prevent access to the backup archives, even in c ase the storage medium is stolen or access ed by a malefactor, by usin g encrypted vaults (p. 235 ). S tor ag e nod e- sid e cl ea nu p Cleanup (p. 23 1) performe d by a storag e node (p. 2 38) acc o rding to the backup plan s (p. 229) that produce the [...]
-
Page 240
240 Copyright © Acronis, Inc., 2000 - 2010 U Un iv er sa l R es tor e (Ac ro ni s Bac ku p & R eco ve ry 1 0 U ni ve rsa l R es to r e) The Acronis propri et ary t echnology that helps boot up W indows o n dissimila r hardware o r a virtual machine. The Uni versal Restore handles differences in devices that are critical f o r the op erating sy[...]
-
Page 241
241 Copyright © Acronis, Inc., 2000 - 2010 Vi rt ua l m ach in e On Acronis Backup & Recover y 10 Manag ement Server, a machine (p. 236) i s considered virtual if it can be backed up fr om the virtualization host without in stalling an agent (p. 228) on the machin e. A virtual machine ap pears on the management se rver after registration of th[...]