Acronis Backup & Recovery 11 инструкция обслуживания
- Просмотреть online или скачать инструкцию
- 379 страниц
- N/A
Идти на страницу of
Похожие руководства по эксплуатации
-
Backup Software
Acronis Backup & Recovery 10 Advanced Server Virtual Edition
17 страниц -
Backup Software
Acronis Backup & Recovery 10 Workstation
241 страниц -
Backup Software
Acronis True Image Home 2011
217 страниц -
Backup Software
Acronis Recovery for MS SQL Server
93 страниц -
Backup Software
Acronis Backup & Recovery 10 Server
242 страниц -
Backup Software
Acronis Snap Deploy 3 for Server
103 страниц -
Backup Software
Acronis Disk Director 11 Home
96 страниц -
Backup Software
Acronis Backup & Recovery 10 Advanced Server SBS Edition
402 страниц 4.71 mb
Хорошее руководство по эксплуатации
Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Acronis Backup & Recovery 11. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Acronis Backup & Recovery 11 или обучающее видео для пользователей. Условием остается четкая и понятная форма.
Что такое руководство?
Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Acronis Backup & Recovery 11 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.
К сожалению немного пользователей находит время для чтения инструкций Acronis Backup & Recovery 11, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.
Из чего должно состоять идеальное руководство по эксплуатации?
Прежде всего в инструкции Acronis Backup & Recovery 11 должна находится:
- информация относительно технических данных устройства Acronis Backup & Recovery 11
- название производителя и год производства оборудования Acronis Backup & Recovery 11
- правила обслуживания, настройки и ухода за оборудованием Acronis Backup & Recovery 11
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам
Почему мы не читаем инструкций?
Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Acronis Backup & Recovery 11 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Acronis Backup & Recovery 11 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Acronis, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Acronis Backup & Recovery 11, как это часто бывает в случае бумажной версии.
Почему стоит читать инструкции?
Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Acronis Backup & Recovery 11, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.
После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Acronis Backup & Recovery 11. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.
Содержание руководства
-
Страница 1
A c r o n i s B a c k u p & R e c o v e r y 1 1 Update 0 User Guide Applies to th e followin g edit i ons: Advanc ed Server Virtual E dition Advanc ed Server SBS Edition Advanc ed Workstation Server f o r Linux Server f o r Window s Workstati o n[...]
-
Страница 2
2 Copyr i ght © Acronis , In c., 2000-20 1 1 Copyright © Acronis, Inc . , 2000-2011. All rights reserve d. [...]
-
Страница 3
3 Copyr i ght © Acronis , In c., 2000-20 1 1 Table o f conten ts 1 Introducing Acro nis Backup & Rec o very 11 ................................ ................................................ 9 1.1 What's new in Acron i s Backup & Recovery 1 1 ....................................................................... 9 1.2 Acronis Bac k[...]
-
Страница 4
4 Copyr i ght © Acronis , In c., 2000-20 1 1 4 .3 .2 T he [D AT E] va ria b le ................................................................................................................................ 69 4 .3 .3 Ba ck up s pl it ti ng an d s i mp lif ie d fi le na m ing .......................................................................[...]
-
Страница 5
5 Copyr i ght © Acronis , In c., 2000-20 1 1 5 .1 .5 W he n t o rec ov er ................................ ................................................................................................... 133 5 .1 .6 T as k cre de nt ia ls ...........................................................................................................[...]
-
Страница 6
6 Copyr i ght © Acronis , In c., 2000-20 1 1 7 .1 .1 A rch iv e s el ect io n ................................................................................................................................ ... 212 7 .1 .2 Ba ck up s ele ct io n .......................................................................................................[...]
-
Страница 7
7 Copyr i ght © Acronis , In c., 2000-20 1 1 9 .6 .3 Di sk co n ver si on : MBR t o G PT ................................ ............................................................................... 247 9 .6 .4 Di sk co n ver si on : GPT t o MB R ...................................................................................................[...]
-
Страница 8
8 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1. 3 .4 Ba ck up p lan s an d ta sk s ................................................................................................ ......................... 313 1 1. 3 .5 S to rag e no des .............................................................................................................[...]
-
Страница 9
9 Copyr i ght © Acronis , In c., 2000-20 1 1 1 In tro duc in g Acro n is Back up & Rec ove ry 1 1 1. 1 Wh at 's n ew in Ac ro nis B a ck up & Re cov er y 11 Acronis Bac kup & Recovery 11 builds on t he su ccess that Acro nis Backup & Recovery 1 0 has established by bring i ng enterprise-class capabili ti es to the small busine[...]
-
Страница 10
10 Copyr i ght © Acronis , In c., 2000-20 1 1 Using boo table media, you c an apply Acronis Universal Restore to an operating system without performing the rec overy. Linux L VM support (p. 36 ) LVM stru cture i s saved in a backup and can be recovered. Acronis Un iversal Restore for Li n ux systems (p. 137) Recover L inux systems to dissi[...]
-
Страница 11
11 Copyr i ght © Acronis , In c., 2000-20 1 1 When installing an agent, you can enter the license key i nstead of specifyi ng the l icense server. As soon as the machine is registered on th e managem ent server, the key will be added t o the li st of licenses hand l ed by t he server. The managemen t server w eb page for components i nstallati[...]
-
Страница 12
12 Copyr i ght © Acronis , In c., 2000-20 1 1 Console The c onsole provides Graphical User Interfac e and remote c onne ction to the agent s and other Acronis Bac kup & Recovery 11 component s. Usage of the co nsole is not licensed. Bootable media builder With boo table media builder, you c an create bootab le m edia in order t o use the ag en[...]
-
Страница 13
13 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 2.1 .1 U ni ver sal R esto re The Universal Restore ad d-on enables you to use the restore t o dissim ilar hardware func tionali ty on the mac hi ne where t he agent is installed and c reate bootable media with this fu nctio nality. Universa l Restore han dl es differences in d ev ices that are crit[...]
-
Страница 14
14 Copyr i ght © Acronis , In c., 2000-20 1 1 For o ff-loaded bac kup, Agent for VMware vSphere ESX(i) (Windows) can be installed on a machine running Windows . Acronis Bac kup & Recovery 11 Agent for VM ware vSph ere ESX(i) is referred as A gent for ESX(i) later in this do cument. 1 . 2 . 4 A g e n t f o r H y p e r - V Acronis Bac kup &a[...]
-
Страница 15
15 Copyr i ght © Acronis , In c., 2000-20 1 1 The st orage nodes enable creat i ng highly scalable and flexi ble, in terms of the hardware suppor t, storage infrast ruct ure. Up to 5 0 sto rage nodes can be set up, ea ch being able to manage up to 20 vaults. The ad ministrator c ontrols the storage n odes centrally from t he Acronis Backup & R[...]
-
Страница 16
16 Copyr i ght © Acronis , In c., 2000-20 1 1 The c onsole has two distributions: for installation on Windows and install ation o n Linux. While bot h distributions enab l e conn ection to any Acro ni s Backup & Recovery 1 1 agent and Acronis Bac kup & Recovery 11 Management Server, we reco m m end t hat you use the conso le for Windows if[...]
-
Страница 17
17 Copyr i ght © Acronis , In c., 2000-20 1 1 1. 4 Te ch ni ca l S upp or t Maintenance and Support Program If you need assi stance with your Acronis product , please go to http://www.acronis.com/support/ Product Updates You can download the latest updates fo r all your registered Acronis soft ware product s from our website at any time after logg[...]
-
Страница 18
18 Copyr i ght © Acronis , In c., 2000-20 1 1 2 G ett ing st ar ted Step 1. Installation These brief installation i nstruct i ons enable yo u to st art u si ng the pro duc t qu i ckly. For th e complete d escription o f installation methods an d procedures, please refer to t he Installation document ation. Before installation, make sure that: [...]
-
Страница 19
19 Copyr i ght © Acronis , In c., 2000-20 1 1 a. Run t he setup program and c l ick Install Acr onis Backup & Recovery 1 1 . b. After ac cepting the t erm s of the license a greem ent, select t he Connect to remote machines check box. c. Follow th e on-screen instruc tions. Step 2. Running Run Acro ni s Backup & Recovery 1 1 Management Con[...]
-
Страница 20
20 Copyr i ght © Acronis , In c., 2000-20 1 1 To save your mac h ine to a fi le: Under Where to back up , c l ick Location , an d select the location where the backup will be saved. Click OK t o confirm your sel ection. Click OK at the bot tom of the window to start the backup. Tip. Using the bo otable media, you c an do off-li ne ("cold"[...]
-
Страница 21
21 Copyr i ght © Acronis , In c., 2000-20 1 1 Administering t h e manag ement server Use the Machines w ith agents view t o manage machines registered on the management server. To effec tiv ely work w i th a l arge number of mach i nes, organize t hem into groups (p. 300 ). Use the Virtual m achines (p. 312 ) view to manage supported vi rt[...]
-
Страница 22
22 Copyr i ght © Acronis , In c., 2000-20 1 1 Key elements of the console wo rkspac e Na me D es cri pti on Navigati o n pane Contains the Navig at i o n tree and th e Shortcut s ba r . Lets you navi g ate to the different views. For deta il s, see Navigati on pane ( p. 22 ). Main area Here you configu r e and m onitor bac k up, recovery and othe [...]
-
Страница 23
23 Copyr i ght © Acronis , In c., 2000-20 1 1 Mounted i mages . This no de is displaye d if at least one volume is mount ed. Use this view to manage mounted i mages. Views for a management serve r When th e console is connect ed to a management serv er, the fo l lowing vi ews are avai lable in t he navigation tree. The Short l ist displays [...]
-
Страница 24
24 Copyr i ght © Acronis , In c., 2000-20 1 1 Operations with pane Ho w to ex pa nd/ min im iz e p an es By default, the Navigation pane appears expanded. You might need to minimize the pane in order to free some additional workspace. To do this, click the chevron ( ). T he pane wi ll be min i mized and the c hevron changes its direction ( ). Clic[...]
-
Страница 25
25 Copyr i ght © Acronis , In c., 2000-20 1 1 In the information pan el (collapsed by d efaul t), v iew the item's detail s. To expan d the panel, cli ck the arro w mark ( ). Perform act i ons on the selected item. Th ere are several ways of performing the same action on selected items: By clicking the buttons o n the table too l [...]
-
Страница 26
26 Copyr i ght © Acronis , In c., 2000-20 1 1 Action p a ge - Create backup pla n Using controls and specifying s ettings Use active co ntrols to specify a bac kup plan or recovery t ask settings and paramet ers. By default, such fi elds as credent i als, opt i ons, comment s, an d some others are hidden. Most settings are configured by cli cking [...]
-
Страница 27
27 Copyr i ght © Acronis , In c., 2000-20 1 1 Navigati o n b uttons 2 . 1 . 3 C o n s o l e o p t i o n s The c onsole options define the way information is repr ese nted in the Grap hi cal User Interfac e of Acronis Bac kup & Recovery 11. To access the conso l e options, select Options > C o nsole options from the t op menu. 2. 1.3 .1 Al e[...]
-
Страница 28
28 Copyr i ght © Acronis , In c., 2000-20 1 1 To make a selection, choose the font fr om the respec ti v e co mbo-box and set the fon t's pro per ties. You can preview the fo nt's appearanc e by clicking B rowse to the ri ght. 2. 1.3 .4 Po p-u p m essa g es These o ptions are effective when the console is c onne cted to a managed mac hi [...]
-
Страница 29
29 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Enabled for all results. To make a sett i ng for eac h result (succ essful c ompletion, fai lure or suc cess with warnings) individually, sel ect o r clear the respective c heck box. 2. 1.3 .5 S tart up pa ge This opt i on defines whet her to show the Welc o me screen or the Dashboard vi[...]
-
Страница 30
30 Copyr i ght © Acronis , In c., 2000-20 1 1 3 U nde rst and ing Ac ron is Bac kup & Rec ov ery 1 1 This sect i on at tempts to gi ve its readers a clear unders tanding of the product so t ha t they can use the pro duc t in various circumst ances without step- by - step inst ructions. 3. 1 O wne rs an d cre de ntia ls This sect i on explains [...]
-
Страница 31
31 Copyr i ght © Acronis , In c., 2000-20 1 1 1. In the P lan parameters (or Task parameter s ) section, cli ck Show plan 's cr ed entials, c o mments , label (or S how task c redentials ). 2. Click Pl a n's (Task) cre d entials . 3. Enter the credent i als under which the pl an (task) will run. Scheduled or p ostponed start The plan (ta[...]
-
Страница 32
32 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 3 F ul l , i ncr e me nta l a nd d i ffe ren tia l ba ck ups Acronis Bac kup & Recovery 11 provides the capabili ty to use popular backup schemes, such as Grandfather-Fa ther-Son and Tower of Hanoi, as well as to create cus tom bac kup s chemes. All bac kup schemes are b ased on full, increment [...]
-
Страница 33
33 Copyr i ght © Acronis , In c., 2000-20 1 1 Differential backup A differential backup stores changes to t he data against th e latest full backup . Yo u need access to the c orresponding full backup to recover the data from a d i fferential backup. A d i fferent i al backup i s most useful when: you are interested in sav ing only the most re[...]
-
Страница 34
34 Copyr i ght © Acronis , In c., 2000-20 1 1 Linux A volume backup stores all files and folders of the select ed volume independent of their attribut es; a boot record an d the file system super block. A disk backup sto res all disk volumes as we l l as the zero track wi th the master boo t reco rd. 3. 5 A bo ut dy na mic a nd log ic al v o l ume[...]
-
Страница 35
35 Copyr i ght © Acronis , In c., 2000-20 1 1 When reco v ering a dynamic volu me to disk group unall ocat ed space, the so ftware preserves the volume's original type and size. If the disk group configuration does not allow for t he origi nal volume type, the volume will be reco v ered as a si mple or spanned volume. I f this volume does not[...]
-
Страница 36
36 Copyr i ght © Acronis , In c., 2000-20 1 1 3 . 5 . 2 B a c k u p a n d r e c o v e r y o f l o g i c a l v o l u m e s a n d MD d e v i c e s ( L i n u x ) This sect i on explains how y ou wou l d back up and rec o ver volumes managed by Linux Logical Volume Manager (LVM ), called logical volumes; and multiple -disk (MD) devices, c al led Linux[...]
-
Страница 37
37 Copyr i ght © Acronis , In c., 2000-20 1 1 For det ai led instruct i ons on h ow to recover l ogical volumes, see Recovering MD devices and logi cal volumes (p. 38 ). 3. 5.2 .2 B ack ing up MD dev ic es MD d ev ices, kno wn as Linux Software RAID, c ombine s everal volumes and m ake sol i d block devices ( /dev/md0, /dev/md1, ... , /d ev/md31 )[...]
-
Страница 38
38 Copyr i ght © Acronis , In c., 2000-20 1 1 automat i cally assembled follow i ng the reboot. To v iew or ch ang e the partition type, use a disk partitioning ut i lity suc h as fdisk . Otherwise (suc h as in the sec ond example), perfo rm the recovery from boo table media. No reboot wi ll be required in t hat c ase. In boo table media, you [...]
-
Страница 39
39 Copyr i ght © Acronis , In c., 2000-20 1 1 To crea t e t he vo lum e str uc tur e manu al ly 1. Boot the machine fro m a L inux-based bootable media. 2. Click Acronis Ba ckup & Rec ov ery 11 . T hen, cli ck Run managemen t console . 3. On t he toolbar, click Actions , and then click Start s hell . Al ternative l y, you can press CTRL+ALT+F2[...]
-
Страница 40
40 Copyr i ght © Acronis , In c., 2000-20 1 1 Th e following picture illust rates this co nfiguration. Do t he followi ng to recover data from t hi s archive. Step 1: Cr eating the volume structure 1. Boot the machine fro m a L inux-based bootable media. 2. In the management con sol e, press C TRL+ALT+F2 . 3. Run t he followi ng commands to create[...]
-
Страница 41
41 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In Archive , click Change and then specify the name of the archive. 3. In Backup , click Cha ng e and then select t he backup from which y ou want to recover dat a. 4. In Data type , selec t Volumes . 5. In Items to recover , select the c heck box next to my_volgroup -my_l o gvol . 6. Under Where to[...]
-
Страница 42
42 Copyr i ght © Acronis , In c., 2000-20 1 1 3. 6 C omp at ib il ity wi th e ncry pt io n s of tw ar e Acronis Bac kup & Recovery 11 fully retains its func tion ality when interac ting with fil e -level encryption software. Disk-level encryption software encrypt s data on the fly. This is why data contained in t he backup is not encrypted. Di[...]
-
Страница 43
43 Copyr i ght © Acronis , In c., 2000-20 1 1 You can recover an encrypted system part i tion by u si n g boot abl e media only. If the rec overed system fails to bo ot , rebu ild Master Boot Record as described in t he f ollowi ng Restoring Wind[...]
-
Страница 44
44 Copyr i ght © Acronis , In c., 2000-20 1 1 OID: 1. 3.6.1.4.1.2476 9. 100.20 0.2.0 Value: "? 00000000"[...]
-
Страница 45
45 Copyr i ght © Acronis , In c., 2000-20 1 1 4 Ba cku p 4. 1 B ac k u p now Use the Back up now featu re to co nfi gure and ru n a one-tim e backup in a few simple steps. The backup process will start immediately aft er you perform the requ i red steps and click OK . For a l ong-time backup strategy that includes schedu l es and c onditions, time[...]
-
Страница 46
46 Copyr i ght © Acronis , In c., 2000-20 1 1 To access these settings, cli ck Show backup fil e naming, acce ss credentials, archive com ments . File n aming (p. 65 ) [Opt i onal] Select t he Name backup files usi n g the archive n ame, as in Acronis T rue Im ag e Echo, rather th an auto-generated n ames check box if you want to use simpli fied f[...]
-
Страница 47
47 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Configure parameters o f the backup operat i on, such as pre/post backup commands, maxi mum network bandwi dth al located for t he backup stream or t he backup archive co mpression level. If you d o not hing in t his section, the default values (p. 95 ) will be used. After any o f the sett[...]
-
Страница 48
48 Copyr i ght © Acronis , In c., 2000-20 1 1 In order t o recover your operat i ng system along with all the settings and applications, you have to perform a disk bac kup. Virtual machines Available if Acro ni s Backup & Recovery 1 1 Agent for E S X(i) or Acronis Bac kup & Recovery 11 Hyper-V is installed. Select t hi s opt i on to bac k [...]
-
Страница 49
49 Copyr i ght © Acronis , In c., 2000-20 1 1 Use the following cr edentials The pro g ram will access t he source dat a using the c red entials you specify. Use this opt i on if t he plan's acco unt does n o t have access permissions t o the data. Specify: User na me . When ent eri ng the n am e of an Ac tive Direc tory user account,[...]
-
Страница 50
50 Copyr i ght © Acronis , In c., 2000-20 1 1 C ri ter i on E xa mpl e D es cri pti on W i ndow s an d Li nu x By name F.log F Excludes a l l files named "F.log" Excludes a l l folders named "F" By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith &q[...]
-
Страница 51
51 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . Warning: Acc ordi n g to t h e ori g inal FTP spec i fic ation, cred entials require d for access to FTP servers are transferred throu gh a network a s pl aintext. Th is me a ns th a t th e user na me and password can be i nter cepted b y an eavesdr opper using a packet sniffer. 4 . 2 . 5[...]
-
Страница 52
52 Copyr i ght © Acronis , In c., 2000-20 1 1 To access this set ting , click Show backup type, 2 nd l o cation, vali d ation, c o nvert to virtual machine . Select t he backup type. Full - sel ected by default for all backup loc ations (except for Ac ronis Online Backup St orage). Increm enta l . At the fi rst t i me a full backup wil l b[...]
-
Страница 53
53 Copyr i ght © Acronis , In c., 2000-20 1 1 Start back up at Specifies when to start a backup. The default v alue is 12:0 0 PM. Back u p on Specifies t he days on whi ch to perfor m a backu p. The defau lt value is Workdays . Weekly/M onth l y Specifies which of the days selected in the Back u p on field you want to reserve for weekly and monthl[...]
-
Страница 54
54 Copyr i ght © Acronis , In c., 2000-20 1 1 Keep backup s: Daily: 1 w eek Weekly: 1 month Mont hl y: indefinitely As a result, an archive of dai ly, weekly, and m onthly bac kups will be c reated. Daily backups will be available for seven days since creation. For instan ce, a daily backup o f Sunday, January 1, will be available [...]
-
Страница 55
55 Copyr i ght © Acronis , In c., 2000-20 1 1 Start backup at: 11:30 PM Back up on: Tuesday, Thursday, Friday Weekly/monthly: Fr iday Keep backup s: Daily: 6 m on ths Weekly: 6 months Mont hl y: 5 y ears Here, daily incre mental backups will be creat ed on Tue sdays and Thursdays, with week ly and monthly bac kups perfo[...]
-
Страница 56
56 Copyr i ght © Acronis , In c., 2000-20 1 1 Dif ferential backu p schedule Specifies on what schedule and under which conditions to p er form a differ ential backup. If the arch i ve conta i ns no fu ll backups at the time of the task run, a full backup i s created instead of the dif ferential backup . Clean u p archive Specifies ho w to get rid[...]
-
Страница 57
57 Copyr i ght © Acronis , In c., 2000-20 1 1 Examples Weekly full backu p The fo l lowing scheme yields a fu ll backup p erformed every Friday night. Full backup : Schedule: Weekl y , every Fri d ay , at 10:00 PM Here, all parameters exc ept Schedule in Full ba ckup are l eft empty. Al l backup s in the arch i ve are kept indefinitely (no archive[...]
-
Страница 58
58 Copyr i ght © Acronis , In c., 2000-20 1 1 Finally, we create retent i on rules for the arc hi ve: let us retain o nl y backups tha t are no older th an six months, and let the cleanup be performed aft er each backup task and also on the l ast day o f every month. Retention rules : Delete backups o l der than 6 months Apply the rules : After ba[...]
-
Страница 59
59 Copyr i ght © Acronis , In c., 2000-20 1 1 Recur: Every 1 day Frequency: Once at 6 PM Number o f levels : 4 Backup type : Fu l l/Differentia l /Increment al This is how the first 14 days (or 14 sessions) o f this scheme's schedule look. Sh aded numbers denot e backup l evels. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 4 1 2 1 3 1 2 1 4 1 2 1[...]
-
Страница 60
60 Copyr i ght © Acronis , In c., 2000-20 1 1 A new level 3 differential backup has not yet b een crea ted, so the b ackup of day fi ve is still stored. Since it depends on the full backup of day on e, that backup is available as we l l. Th is enables us t o go as far b ack as 11 days, which is t he best- case scenar i o. The fo l lowing day, howe[...]
-
Страница 61
61 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Selecting the destination In the P ath field, enter the full path to the d estination, or select t he desired destination i n the location tree as described in " Sel ecting bac kup destinations" (p. 61 ). 2. Using the archives table To assist you wi th choosing th e rig ht dest i nation, t[...]
-
Страница 62
62 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Onli ne backup storage To back up da ta to Acronis O nline Backup Sto rage, c lick Log i n and spe c ify the cred enti als to log in to the onl ine storage. Then, expand the Online b a ckup sto ra ge group and se l ect the account . Prior to ba cki n g up to the onl i ne sto[...]
-
Страница 63
63 Copyr i ght © Acronis , In c., 2000-20 1 1 D es tin ati on D et ai l s Stora ge nodes When you need to back up data to a stora ge node that i s no t registe r ed on t he managem ent serve r, or when operat ing on a mach ine booted wit h bootab l e media: To access a managed vault, type the following st ring in the Path fie l d: bsp://n o de[...]
-
Страница 64
64 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Click OK . To learn more abou t operations av ailable depending on the user privileges, see the Users' privileges on a m anaged machine (p. 31 ) sec tion. 4 . 2 . 9 L a b e l ( P r e s e r v i n g m a c h i n e p r o p e r t i e s i n a b a c k u p ) Any time data on a machine is bac ke d up, i[...]
-
Страница 65
65 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows XP All Editions winXPP roGuest Windows XP All Editions (64 bit ) winXPP ro64Guest Windows Se rver 2003, Al l Editions winNetStanda rdGuest Windows Se rver 2003, Al l Editions (64 bit) winNetStanda rd64Guest Windows 200 8 winLonghor nG ues t Windows 200 8 (64 bit) winLonghor n64Guest Windows Vi [...]
-
Страница 66
66 Copyr i ght © Acronis , In c., 2000-20 1 1 This behavior is useful when you rotat e USB hard drives and want each drive to keep a single full backup (p. 67 ) or all backups created during a week (p. 67 ). But you might end up with no backups i f a full bac kup to your only drive fails. This behavior c an be suppressed by adding the [Date] vari [...]
-
Страница 67
67 Copyr i ght © Acronis , In c., 2000-20 1 1 Result: The bac kups of January 1, 201 1 , January 2, 20 11, and s o on, are st ored respectively as MyMach i ne-1.1.2011.t ib, MyM achine-1.2. 2011 . tib, and so on. Your script can move older bac kups based on the date stamp. See also [...]
-
Страница 68
68 Copyr i ght © Acronis , In c., 2000-20 1 1 You want to back up to the arc hiv e MyMachine on an external h ard disk drive . You have two such drives. Either of them has drive letter D in the operating system when attac hed to the mac hi ne. You want to swap the drives each Monday , so that one drive c ontai ns backup s of the curren[...]
-
Страница 69
69 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 3 . 2 T h e [ D A T E ] v a r i a b l e If you spec i fy the [DATE] variable in t he archive name, t he fil e name of each backup wi ll include that When using th i s variable, the first bac kup of a n ew day wil l be a fu l l b[...]
-
Страница 70
70 Copyr i ght © Acronis , In c., 2000-20 1 1 The sc heduler uses local time of the machine th e bac k up plan exists on. Befo re creat i ng a sch edul e, be sure t h Schedule To define when a task has[...]
-
Страница 71
71 Copyr i ght © Acronis , In c., 2000-20 1 1 What- ifs What if an event o ccurs (and a con d ition, if a n y, is me t) whil e the previous task run has not completed? The event will be ignored. What if an event o ccurs while the sc h eduler i s waiting for the con dition required by the previous event? The event will be ignored. What [...]
-
Страница 72
72 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: not s et . The t ask wil l be start ed on the current day, if it has b ee n creat ed before 6PM . If you have c reated the task aft er 6 PM, the task will be s tarted for the fi rst t i me on the next day a t 6 PM. To: no t set . T he task will be performed for an indefinite nu m [...]
-
Страница 73
73 Copyr i ght © Acronis , In c., 2000-20 1 1 To: no t set . Second dail y schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 0 3:00:00 PM Until: 07 :00:00 PM . 3. Effect i ve: From: 0 9/20/2009 . To: no t set . 4 . 4 . 2 W e e k l y s c h e d u l e Weekly sc hedule i s effect i ve in Windows and Linux operating systems . To sp eci fy a w eek[...]
-
Страница 74
74 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Effect i ve: From: 0 5/13/2009 . The t ask wil l be start ed on the nea rest Friday at 10 PM. To: 1 1/13/200 9 . The task will be performed for the last time on this date, bu t the task it self will still be availabl e in th e Tasks view after th is date. (If th i s date were not a Friday, th e task[...]
-
Страница 75
75 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Every: 9 hours From: 1 2:00:00 PM Until: 09 :00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Second sched u le 1. Every 1 week(s) on: Tu e , Wed , T hu . 2. Every 3 hours From 09 : 00:00 AM u ntil 09:00:00 PM . 3. Effect i ve: From: not s et . To: no t set . Third schedule 1. Every: 1 wee[...]
-
Страница 76
76 Copyr i ght © Acronis , In c., 2000-20 1 1 Advanced sc heduli ng settings (p. 79 ) are availab l e only for machines registered on A cronis Bac kup & Recovery 11 Management Server. To specify these settings, c l ick Cha nge in the Adv a nced settings area. All the settings you made are di splayed in the Result field at the bo ttom o f the w[...]
-
Страница 77
77 Copyr i ght © Acronis , In c., 2000-20 1 1 During nort hern spring and aut umn, the task runs every 12 hours on all workdays. During nort hern summer, the task runs every first and fifteenth o f every month at 10 PM. Thus, the following three sc hedules are added to the task. Firs t s chedule 1. Mont hs: December , January , Fe bruary .[...]
-
Страница 78
78 Copyr i ght © Acronis , In c., 2000-20 1 1 Event type Specifies the ev ent t y pe: Error , Warning , Info rmation , Audit success , o r Audit fa ilure . Event ID Specifies the ev ent number, which typically identifies the particular kind of events among events from th e same source. For example, an Error event with E vent source disk an d E ven[...]
-
Страница 79
79 Copyr i ght © Acronis , In c., 2000-20 1 1 How to view events in Event viewe r T o ope n a l og i n E ve nt Vi ewe r 1. On t he Desktop or in the Start menu, right-click My Computer , and t hen click Manage . 2. In the C ompu ter M a nagement console, expan d System To ols , an d then expand Event Viewer . 3. In Event Vi ewer , click the n am e[...]
-
Страница 80
80 Copyr i ght © Acronis , In c., 2000-20 1 1 Distribute start time within the tim e window When th i s setting is enabled, the backup task on each registered machine w ill start wi th a specifi c delay from th e start time set in th e backup plan. T hi s distributes the tasks' actual st art times wi thin a time interval. You m ay want t o us[...]
-
Страница 81
81 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy a dv an ced s et ti ng s 1. Connect to the manag ement server or to a mac hi ne regi stered on i t, and then start creat i ng a backup pl an. 2. In How to back up , select t he Simpl e, T ower of Hanoi, or Custom scheme, and then c li ck Schedule to specify a schedule for the scheme. 3. Un[...]
-
Страница 82
82 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 4.7 .1 U se r i s i dle Applies to: Windows "User is idle" means t hat a screen saver is running on the managed mac hine or t he machine is locked. Example: Run t he backup task on the manag ed machine every d ay at 9PM, preferably when the user is idle. If the user i s still active by 11P[...]
-
Страница 83
83 Copyr i ght © Acronis , In c., 2000-20 1 1 Example A company uses different locations on the same network-attac hed s torage for backing up users data and servers. Th e workday st arts at 8AM and end s a t 5 PM. Users' data should be backed up as soon as the users log off, but not earl ier than 4 : 30 PM and not later t han 10 PM. Every da[...]
-
Страница 84
84 Copyr i ght © Acronis , In c., 2000-20 1 1 Task st art conditions: Wait until th e conditions are met , Run the task anyway after 3 hour(s). As a result, (1) If all users are l ogged o ff at 8PM, t he backup task will start at 8PM. (2) If t he last u ser logs off b etween 8PM and 11PM, the backup task will start im mediately aft er the user[...]
-
Страница 85
85 Copyr i ght © Acronis , In c., 2000-20 1 1 The fo l lowing picture illustrat es this example. Usage sc enarios Reliable d isaster recovery (p. 90 ) Store y our bac kups both on-site (fo r imm ediate reco very) and off-site (t o secure the backups from local st orage fail ure or a natural disaster). Keeping only the latest r ecovery poin[...]
-
Страница 86
86 Copyr i ght © Acronis , In c., 2000-20 1 1 A local folder o n a fixed or removable drive A network folder An FTP o r SFTP server Acronis Bac kup & Recovery 11 Storage Node Acronis Secu re Zone You can cop y or move a bac kup to any of these l ocations: A local folder o n a fixed or removable drive A network folde[...]
-
Страница 87
87 Copyr i ght © Acronis , In c., 2000-20 1 1 If allowed by the backup sch eme, you can al so spec i fy when to aut omatically delete t he backups from each of the locations. 4 . 5 . 3 S e t t i n g u p r e t e n t i o n o f b a c k u p s You can set ret ention rules for backups when creating a backup plan (p. 45 ). The available retention rules d[...]
-
Страница 88
88 Copyr i ght © Acronis , In c., 2000-20 1 1 You can cho ose to apply the ret ention rules before c re ating a backup, af ter c reating a bac kup , on a schedule, or combine th ese options. For the second an d next loc ations, creating a bac kup means copying or movi ng a bac kup there from the previous locat i on. 4 . 5 . 4 R e t e n t i o n r u[...]
-
Страница 89
89 Copyr i ght © Acronis , In c., 2000-20 1 1 The o utda ted bac kup will be kept until all backups t hat depend o n it also become out da ted. Then, all the chain wil l be deleted at once during the reg ular cleanup. If you chose moving outdat ed ba ckups to the n ex t location, th e ba ckup will b e cop i ed there without delay. Only its deletio[...]
-
Страница 90
90 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 5.6 .1 Ex am ple 1. Rep li cati ng bac kup s t o a n etwo rk f old er Consider the fo l lowing scenar i o: You want to perform a full backup of your machine manually. You want to store the backups i n Acronis Secu re Zone (p. 170 ) on the mach i ne. You want to store a copy of the backup[...]
-
Страница 91
91 Copyr i ght © Acronis , In c., 2000-20 1 1 the P ath fi eld. Under Rete ntion rules , select Move backups older than 1 week . Then, specify the tape d evice in the 2 n d location field. Make sure that the tape device is ready t o work. The preparation steps are described i n the "Backing up a m achine t o a directly at tac hed t ape device[...]
-
Страница 92
92 Copyr i ght © Acronis , In c., 2000-20 1 1 Restric tion s Conversion is not avai lable on machines running Linux. Conversion of a backup from t he f ollowing locat i ons is not available: CD, DVD, tape devices and Acronis On l ine Backup St orage. If you have set up copying or moving backup s to o ther locations (p. 84 ), you can no[...]
-
Страница 93
93 Copyr i ght © Acronis , In c., 2000-20 1 1 or Hyper-V virtual mac hi ne is bac ked up at a hypervisor level), the task wil l be creat ed on the machine where t he agent is. The t arget virtual machine must be powered off b y the time of conversion, otherwise the conversion task will fail. If this hap pens, you c an restart the conversion t ask [...]
-
Страница 94
94 Copyr i ght © Acronis , In c., 2000-20 1 1 Storage space Disks of t he resulting virtual machine will use as much storage spa ce as the ori ginal data oc cupies. Assuming that the original disk size is 100 GB and t he d isk stores 1 0 GB of data, th e corresponding virtual disk w i ll oc cupy ab ou t 10 GB. VM ware calls this format " thin[...]
-
Страница 95
95 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7 De f a ult ba ck up opt i ons Each Acronis agent has i ts own default b a ckup opt ions. Onc e an agent is installed, the default op tions have pre-defined value s, which are referred to as presets in the document ation. When c reating a backup pl an, y ou can either use a default o ption , or ove[...]
-
Страница 96
96 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up HDD writing spee d (p. 100 ) Dest: HD D Dest: HD D Dest: HD D Dest: HD D Dest: HD D Dest: HD D Network c[...]
-
Страница 97
97 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up D is k b ack u p F il e bac k up Pre/Post ba ckup comman ds (p. 110 ) + + + + PE only PE only Pre/Post data capture commands (p. 112 ) + [...]
-
Страница 98
98 Copyr i ght © Acronis , In c., 2000-20 1 1 When th e Reset archive bit check box is selected, A cronis Backup & Recovery 11 will reset the archive bits o f all files being b acked u p. Acronis Bac kup & Reco very 11 itself does no t use the archive bit value. When perform ing incremental o r differential backup, it det ermines whether a[...]
-
Страница 99
99 Copyr i ght © Acronis , In c., 2000-20 1 1 When you specify an already ex isting archive as the destinat i on of the backup plan. When you edi t a backup plan t hat has already resulted in a backup. The preset is: Disabled. To pro te ct the a rch iv e f ro m u nau tho ri ze d a cc ess 1. Select t he Set password for the a rchive check b[...]
-
Страница 100
100 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 4 B a c k u p p e r f o r m a n c e Use this group of options to spec i fy the am ount of network and syst em resourc es to allocate to the backup process. Bac kup performance options mi ght have a m ore or l es s not i ceable effect on the speed of the ba ckup process. T hi s depends on the o[...]
-
Страница 101
101 Copyr i ght © Acronis , In c., 2000-20 1 1 4. 7.4 .3 Ne tw ork con ne c t ion sp eed This opt i on is effec tive for Windows and Linux operat i ng systems an d boo table media. This opt i on is available when a loc ation on the n etwor k (network sha re, managed vault or an FTP/SFTP server) is selected as the backup destination. The o ption de[...]
-
Страница 102
102 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixed size Enter the desired file size or sel ect it fro m the drop-down list. The bac kup wil l then b e spli t into multiple files of t he specified size. T hi s comes in handy when creating a bac kup that you plan to burn to multiple CDs or DVD s later on. You mig ht also want to split the ba ckup [...]
-
Страница 103
103 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding informatio n to a DRP tem plate You can append additional information to a DRP template i f you are we ll familiar with XML and HTML. T he default path s to the DRP template are: %ProgramFil es% AcronisBackupA nd Recover y drp.xsl - in 32-bit Windows %ProgramFil es(x86)%AcronisBack[...]
-
Страница 104
104 Copyr i ght © Acronis , In c., 2000-20 1 1 Ignore bad sectors The preset is: Disabled . When th e option is disabled, the program will display a pop-up window each time it c omes across a bad sec tor and ask for a user d ecision as t o whether to cont i nue or stop the ba ckup pro cedure. In order t o ba ck up the valid information o n a rapid[...]
-
Страница 105
105 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on is no t availabl e when o perating under the boot able medi a. This opt i on defines whet her the agent(s) o perating on the managed mach i ne have to log events of the bac kup operations in the A pplication E vent Log of Windows (t o see this log, ru n eventv wr.exe or select Control Pa[...]
-
Страница 106
106 Copyr i ght © Acronis , In c., 2000-20 1 1 plan has t o run under the acc o unt with the A dministrator or Ba ckup O perat or privileges. If a snapshot cannot be taken, the backup will fail. Create a snapshot if it is possible Back up fil es directly if t aking a snapshot is not possible. Do not create a snapshot Always bac k up files [...]
-
Страница 107
107 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on defines ho w to take and to work with a snapshot o f a logical volume. Use of snapsho ts ensures a t i me-consistent backup of volumes whose dat a may change during t he backup process. The preset is: Acronis Backup & Recovery 11 Tip: We rec o mme n d ch a nging t h e pres et only if[...]
-
Страница 108
108 Copyr i ght © Acronis , In c., 2000-20 1 1 4 . 7 . 1 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r a file -level bac kup of a data sour ce that inc ludes mounted v olumes or clust er shared volumes. This opt i on is effec tive only when yo u select for backu p a fo lder that is higher in t he folder hierarchy than th[...]
-
Страница 109
109 Copyr i ght © Acronis , In c., 2000-20 1 1 When th i s option i s set to Disable , the volumes' sna ps hots will be taken one after the other. As a result, if the d ata spans ac ross several volumes, t he re sulting backup m ay be no t consistent. 4 . 7 . 1 7 N o t i f i c a t i o n s Acronis Bac kup & Recovery 11 provides the abi lit[...]
-
Страница 110
110 Copyr i ght © Acronis , In c., 2000-20 1 1 Pass word ent er the password. d. Click OK . 11. Click Send test e -mail message to check if t he settings are c orrect. 4. 7.1 7.2 Me sse ng er ser vic e ( Win Po pup) This opt i on is effec tive for Windows and Linux operat i ng systems o n the sending machine an d only for Windows on the re[...]
-
Страница 111
111 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram does n ot support interac tive commands, i.e. commands that require user i nput (for example, "pau se"). To sp eci fy p re /p ost c omm and s 1. Enable pre/post commands execu tion by checking the following opt i ons: Execute b efore the backup Execute a fter the backup[...]
-
Страница 112
112 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Ar g uments field, spec i fy the command execution arguments, if required. 4. Select t he Fail the task if the c o mmand exec u tion fails check bo x if successful execu tion of the command is critical for you. The co m mand is considered failed if its exit code is not equal to zero. If the [...]
-
Страница 113
113 Copyr i ght © Acronis , In c., 2000-20 1 1 2. In the Worki n g direc to ry field, specify a p ath to a directory where t he command/batch file will be execut ed. 3. In the Ar g uments ?[...]
-
Страница 114
114 Copyr i ght © Acronis , In c., 2000-20 1 1 successful ly executed. Delete the TIB file and temporary files and fail the tas k if the command execution fails. execution f ai lure or success . command execution result. * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 4 . 7 . 2 0 R e p l i ca t i o n / c l e a n u p i [...]
-
Страница 115
115 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption applies to backing up to a sto rag e node. Eject tape The preset is: Disabled . When th i s check box is selected, the software will ejec t tapes after a successful bac kup and/or when a tape i s full. Always use a free tape By default, the software tries t o write a ba ckup onto a tape c [...]
-
Страница 116
116 Copyr i ght © Acronis , In c., 2000-20 1 1 The pro g ram will try to execute the fai led task again if you sel ect t he Restart a failed tas k check box and spec i fy the n umber of attempts and th e time interval bet ween the attempts. The program stops trying as soo n as an attempt completes suc cessfull y OR the spec i fied number of attemp[...]
-
Страница 117
11 7 Cop yright © Acr o nis, In c., 200 0 -2011 Time d iagram: Wait until con ditio n s are met Skip the task execution Delaying a b ackup might be un acceptable, for example, when you need to back up data strict l y at the specified time . Then it makes sense t o skip the bac kup ra ther than wai t for the co nditions, especial ly if the event s [...]
-
Страница 118
118 Copyr i ght © Acronis , In c., 2000-20 1 1 Software - Acronis VSS Pr ovider VSS will use Acronis VSS Provi der for taking snapshots. Software - Sy stem p rovider VSS will use the sy stem provider (M i crosoft Software Shadow Copy pro vi der) for t aki ng snapshot s. Software - A software provider VSS will use any avai l able so ftw[...]
-
Страница 119
119 Copyr i ght © Acronis , In c., 2000-20 1 1 5 Re cov er y When it c omes to data rec overy, first consider the mos t functional method : connect the console t o the managed m a chine running t he operating system and c reate the recovery task. If the mac hi ne's operating sys tem fails to start or you need to recover data to bare m etal , [...]
-
Страница 120
120 Copyr i ght © Acronis , In c., 2000-20 1 1 Select dat a to recover. Access c redentials (p. 125 ) [Opt i onal] Provide credent i als for t he archive location i f the task accou n t does not have the right to access it. To access t his op tion, click Show access cred entials . Where to recover This sect i on app ears after the requi red bac ku[...]
-
Страница 121
121 Copyr i ght © Acronis , In c., 2000-20 1 1 [Optional] Universal Re s tore for Wind ows/Linux Applies to: sy stem disk or vo l ume recovery. Using Acronis Univers a l Restore req uires a separate license. Universal Restore for Windows/Linux (p. 134 ) Use Acronis Un i versal Resto re when you need to recover and boo t up an operat i ng systems o[...]
-
Страница 122
122 Copyr i ght © Acronis , In c., 2000-20 1 1 You are recovering custo m or non-Windows boo t load ers (such as L I LO and GRUB). The disk geometry i s different t o that s tored in t he backup. There are probably other t i mes when you m ay need to recover the MBR, but the ab ove are the most common. When reco v ering the M BR of one dis[...]
-
Страница 123
123 Copyr i ght © Acronis , In c., 2000-20 1 1 Lo ca ti on D et ai l s FTP, SF TP If the arch i ve is stored on an FTP or SFTP ser ver , type the server na m e or address in the Path field as follows: ftp://ftp_se rver:port _n umber or sftp : //sf t p_serve r:po rt number If the port nu m ber is not specified, port 21 i s used for FTP a nd port 22[...]
-
Страница 124
124 Copyr i ght © Acronis , In c., 2000-20 1 1 In the search string, type t he information that helps t o i dentify the requi red dat a items (this can be a mac hi ne name, a file or folder name, or a disk label) and t he n click Search . You can use the asterisks (*) and question marks (?) wildcards. As a result, in the Search window, y ou wi[...]
-
Страница 125
125 Copyr i ght © Acronis , In c., 2000-20 1 1 Solution: To be able to bro wse such dat a , connect direct ly to a machine, sel ect the required personal vault and then select Data view . 5 . 1 . 2 A c c e s s c r e d e n t i a l s f o r l o c a t i o n Specify th e credentials required for access to the locat ion where t he backup is stored. To s[...]
-
Страница 126
126 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 1.4 .1 S ele ctin g targ et dis ks Available disk o r volume destinations depend on the agents operat i ng on t he machine. Recover to: Physical machine Available when the Acronis Backup & Recovery 11 Agent fo r Windows or A gen t for Li nu x is installed. The select ed disks wil l be recovered[...]
-
Страница 127
127 Copyr i ght © Acronis , In c., 2000-20 1 1 D isk d esti nat ion To sp eci fy a d est ina ti on di sk : 1. Select a di sk where you want the select ed disk to rec o ver to. Th e destination disk's space should be at l east t he same size as the uncompressed i mage data. 2. Click OK . All the data store d o n the targ et disk will be replac[...]
-
Страница 128
128 Copyr i ght © Acronis , In c., 2000-20 1 1 Also, you have to map the volumes manually if t hey are Linux logical volumes, or Linux soft ware RAI D (MD d ev ices). For more information on recovering logical volumes and MD devices, see Recovering MD d ev ices and logical volumes (p . 38 ). The au tomatic mapping is performed as follows. 1. If th[...]
-
Страница 129
129 Copyr i ght © Acronis , In c., 2000-20 1 1 Available when the Acronis Backup & Recovery 11 Agent fo r Hyper-V or Agent fo r ESX(i) is installed. On select i ng this, you specify the v irtualization server and the target v irtual machine. Then you proceed to the reg ular volume mappin g proc edure described below. Please b e aware t ha t t [...]
-
Страница 130
130 Copyr i ght © Acronis , In c., 2000-20 1 1 Be careful ! To be on the saf e side, it is advisable t o a ssi gn unique nam es to the volumes. The L i nux-style boot abl e media shows loc al disks and volumes as unmount ed (sda1, sda 2.. .). Ch ang in g v olu me p ro pert i es S iz e an d l ocat i o n When reco v ering a volume to a basic MBR d i[...]
-
Страница 131
131 Copyr i ght © Acronis , In c., 2000-20 1 1 Vo lu me ( pa rtit ion ) a li gnm ent Acronis Bac kup & Recovery 11 automat i cally eliminates v olume misalignment a situation, when volume clusters are not aligned with disk sect ors. The misalignment occurs when recoveri ng volumes created wi th t he Cyl inder/Head/Secto r (CH S) addressi n[...]
-
Страница 132
132 Copyr i ght © Acronis , In c., 2000-20 1 1 Files and folders wi l l be recovered to the same path(s) as they are in t he ba ckup. Fo r example, if you h av e backed up all fil es and folders in C: DocumentsF i nanceReports , the files will be recovered to t he same path. If t he folder does not exist, it will be created automat i cally. ?[...]
-
Страница 133
133 Copyr i ght © Acronis , In c., 2000-20 1 1 By mask ( *) *.log F* Excludes a l l files wi th the .log extens ion Excludes a l l files a nd folders w i th nam es starting w ith "F" (such as folders F, F1 and f iles F .l og, F1. log) By mask ( ?) F?? ?.l og Excludes a l l .log files with names cons i stin g of four symbols and s ta r ti[...]
-
Страница 134
134 Copyr i ght © Acronis , In c., 2000-20 1 1 To learn more abou t using credent i als in Acronis Backup & Recovery 1 1 , see t he Owners and credent ials (p. 30 ) section. To learn more abou t operations av ailable depending on the user privileges, see the User privileges on a managed mach ine section. 5. 2 A cro ni s U niv e rsa l R es tor [...]
-
Страница 135
135 Copyr i ght © Acronis , In c., 2000-20 1 1 Sometimes Universa l Restore i s applied i n the background bec ause the soft war e knows what dri vers or modules are required for the suppor ted virtual mac hi nes. These c ases are as follows: recovering a system to a new virtual machine recovering a system to any virtual mach i ne by means[...]
-
Страница 136
136 Copyr i ght © Acronis , In c., 2000-20 1 1 Universal Restore settings Automatic driver search Specify where t he program will search for the Hardware Abst raction Layer (HAL), HDD controller driver and net work adapter driver(s): If the d rivers are on a vendor's disc or ot her removable media, turn on the Searc h rem o vable media . [...]
-
Страница 137
137 Copyr i ght © Acronis , In c., 2000-20 1 1 5. 2.2 .2 U ni ver sal R esto re i n Linu x When Universal Resto re is applied to a Linux operat i ng system, i t updat es a temporary fi le system known as the initial RAM disk (initrd). T hi s ensures t hat the operating system can boot on the new hardware. Universal Restore ad ds modules for th e n[...]
-
Страница 138
138 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 3 . 1 R e c o v e r i n g v o l u m e s Let's assume you backed up the system an d boot volumes (or t he entire machine) and want to recover t hese volumes to a d ifferent platform. The ability of the recovered system to boo t up depends on the foll owing facto rs: Source operatin g syste[...]
-
Страница 139
139 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are BIOS Disk: MBR BIOS Disk: GPT UEFI Disk: MBR UEFI Disk: GPT BIOS OS: non- convertible Solution Recover the oper ati ng system to an MB R disk. 2. Perform th e recovery under the bootable media. or After recove ry, turn off the UEFI m ode in BIOS. Otherwise, the[...]
-
Страница 140
140 Copyr i ght © Acronis , In c., 2000-20 1 1 The plus (+ ) sign on a green background means t hat the sourc e disk wil l be recovered wi thout any limitations. The plus (+ ) sign on a yellow background means that the so urce d isk will be rec overed with some limitations. To overcome such limitations, you mi ght need to perform some addi[...]
-
Страница 141
141 Copyr i ght © Acronis , In c., 2000-20 1 1 O ri gi nal sy ste m Ta rg et ha rdw are Platfor m : BIOS Target disk <2 TB Platfor m : BIOS Target disk >2 TB Platfor m : UEFI Target disk <2 TB Platfor m : UEFI Target disk >2 TB UEFI OS: convertible + The target di sk wi ll be initialized as MBR . The recove red disk OS will be automati[...]
-
Страница 142
142 Copyr i ght © Acronis , In c., 2000-20 1 1 Customers familiar w ith Acronis Reco v ery for M i crosoft E xchange can no te that t hi s product uses Active Restore to achieve immediate availabil ity of an Exchange information store after star ting the recovery. Whi le based on the same tech nolog y, rec ove ry of the Information Store p roceeds[...]
-
Страница 143
143 Copyr i ght © Acronis , In c., 2000-20 1 1 If your op erating syste m and i ts loader reside on d i ffere nt volumes, al ways include bot h volumes i n the backup. The volumes must also be rec overed toget h er; other wise the re is a high risk that the operat i ng system wi ll not start. 2. Create boot able medi a. 3. If a system failure oc c[...]
-
Страница 144
144 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. Micros o ft V i rtual PC does not s u pport disks t h at are larg er than 127 GB . Acro n is enab l es yo u to cr ea te a Virtual PC machi n e wit h l a rger disks s o th at you can attac h the disks to a M i crosoft Hyper -V virtu a l m a chine. To con ve rt a d is k b a ckup to a v irt ua l ma [...]
-
Страница 145
145 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 5 . 1 V i r t u a l m a c h i n e t y p e / v i r t u a l i z a t i o n s e r v e r s e l e c t i o n The new vi rtual machine c an be creat ed either on a virtualization server (t hi s requires Acron i s Backup & Rec overy 11 Agent for Hy per-V or Agent fo r ESX(i) to be installed) or i n any[...]
-
Страница 146
146 Copyr i ght © Acronis , In c., 2000-20 1 1 When adding a n ew virtual disk, al ong with interfac e and capacity, you c an specify its fo rmat. Thin format. The disk occ upies as much st orage space as the dat a it stores. T hi s saves th e s torage space. To enable thin format , select t he Thin provisioning (for ESX), or Dynamically expa [...]
-
Страница 147
147 Copyr i ght © Acronis , In c., 2000-20 1 1 When you configure recovery of a system volume to a disk that does not have an MBR, the program prompt s whether you want to rec over the MBR along with t he system volume. Opt for no t re covering, on l y if you do not want the system to b e bo otable. Solution : Recover t he volume once again alon g[...]
-
Страница 148
148 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Mount the system yo u are rec overi ng: mkdir /mnt/system/ mount - t ext3 / dev/sda2 /mnt/system/ # root partition mount - t ext3 / dev/sda1 /m nt/system/ boot/ # bo ot partiti on 3. Mount the proc and dev fil e systems to the system you are rec overi ng: mount - t proc n one /mnt/system/proc/ moun[...]
-
Страница 149
149 Copyr i ght © Acronis , In c., 2000-20 1 1 umount /mnt/system/dev/ umount /mnt/system/proc/ umount /mnt/system/boot/ umount /mnt/system/ reboot 13. Reconfigure th e bootloader by usi ng too l s and documentation fro m the Linux d i stribution t hat you use. For exampl e, in D ebi an and U buntu, you may need t o edit some c ommented lines in t[...]
-
Страница 150
150 Copyr i ght © Acronis , In c., 2000-20 1 1 A ge nt f or Wi n dow s A ge nt f or L in ux Bo ot abl e me di a ( Li nu x-b ase d or P E- bas e d) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba ck up) D is k re co ve ry F il e re cov er y ( al so fr om a di sk ba[...]
-
Страница 151
151 Copyr i ght © Acronis , In c., 2000-20 1 1 5 . 7 . 1 A d d i t i o n a l s e t t i n g s Specify th e additional settings for the recovery operat i on by selecting or clearing the fo l lowing check boxes. Validate backup archiv e before recovery The preset is Disabled . This opt i on defines whet her to vali date a backup to ensure that the ba[...]
-
Страница 152
152 Copyr i ght © Acronis , In c., 2000-20 1 1 Set current date and time for recov ered files This opt i on is effec tive only when rec overi ng files. The preset is Enabled . ?[...]
-
Страница 153
153 Copyr i ght © Acronis , In c., 2000-20 1 1 To sel ect w het he r t o se nd th e rec ov ery op er ati on s e ven t s t o the SN MP ma na ge rs : Choose one of the followi ng: Use the setting set i n the Machine o ptions to use the setting spec i fied for t he machine. For more information refer to Machine options. Send SNMP n otific[...]
-
Страница 154
154 Copyr i ght © Acronis , In c., 2000-20 1 1 If the file NTFS permi ssions were preserved during backup (p. 106 ), you c an choose whether to recover t he permissi ons or l et th e fil es inherit the N TFS permissions from the folder to which they are reco vered. 5 . 7 . 5 M o u n t p o i n t s This opt i on is effec tive only in Windows fo r re[...]
-
Страница 155
155 Copyr i ght © Acronis , In c., 2000-20 1 1 8. In the P assword field, enter the password. 9. Click Additional e-mail pa rameter s... to co nfi gure the additional e-mail parameters as follows: a. From - type the e-mail address of th e user from whom the message will be sent. If you leave this field empty, messages will be co nstructed as if t [...]
-
Страница 156
156 Copyr i ght © Acronis , In c., 2000-20 1 1 The o ption enables you to define t he commands t o be automatically executed before and after the data rec overy. Example of h ow you can use t he pre/post co m mands: Launc h the Ch e ckdisk co m mand in ord er to find an d fix logical file sy stem errors, physical errors or bad sectors to be st[...]
-
Страница 157
157 Copyr i ght © Acronis , In c., 2000-20 1 1 * A co m mand is co nsi dered failed if its exit c ode is not equal to zero. 5. 7.7 .2 Po st -rec ove ry co mman d To sp eci fy a com ma nd/ exe cu tab le fi le to b e exe cut ed a fte r th e rec o ve ry is co mpl et ed 1. In the C ommand field, type a command or browse to a batch file. 2. In the Work[...]
-
Страница 158
158 Copyr i ght © Acronis , In c., 2000-20 1 1 6 S tor in g t he bac k ed u p da ta 6. 1 Va ul ts A vault is a loc ation for st oring backup arc hi ves. For ease o f use and administration, a vault i s associated wi th t he archives' metadata. Referring t o this metadata makes for fast and convenient operations wi th arc hi ves and bac kups s[...]
-
Страница 159
159 Copyr i ght © Acronis , In c., 2000-20 1 1 'Vaults ' view Vaults (on the navi gation pane) - t op item of the vaults tree. Click this item t o display centralized an d personal vaults. To perform actions o n any vault, use the toolbar that i s located at the t op of t he Vaults view. For cent ral ized vaults, see the Actions on centr[...]
-
Страница 160
160 Copyr i ght © Acronis , In c., 2000-20 1 1 6 . 1 . 2 C e n t r a l i z e d v a u l t s A centralized vault is a net worked location allott ed by the management server adm i nistrator to serve as sto rage for t he ba ckup archive s. A centralized vau lt can be managed by a sto rage node or be unmanaged. The t otal number and si ze of archives s[...]
-
Страница 161
161 Copyr i ght © Acronis , In c., 2000-20 1 1 All the operations described here are performed by c l ic ki ng the c orresponding buttons o n the vaults toolbar. T hese operations c an be also acc essed from t he [Vault name] actions item of t he main menu. The fo l lowing is a guideline for you to perform operations with c entrali zed vaults. To [...]
-
Страница 162
162 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Delete a vault 1. Select the vault. 2. Click Dele t e . The vault w ill be delet ed along with a ll the archiv es stor ed in there. The plans and tasks that use this vault will fa i l. Change use r credent ials for accessin g a vau lt Click Chang e user . Changing use r credentia l s is availabl[...]
-
Страница 163
163 Copyr i ght © Acronis , In c., 2000-20 1 1 The dedu pl ication d atabase stores the hash values of al l items stored i n the v ault except fo r those that can no t be dedu pl icated, suc h as encrypted files. If the vault i s creat ed on the disk local t o the storage nod e, the deduplication dat abase is placed t o the same vault (the Pl [...]
-
Страница 164
164 Copyr i ght © Acronis , In c., 2000-20 1 1 Va ult pa th To sp eci fy t h e pa th w her e the ma nag ed va ul t w ill be cr ea te d 1. Enter the full path to the folder in the Path field or select the desired folder in the folders tree. Managed vaults can be organized: On the hard drives local to the storage nod e. On a network share. ?[...]
-
Страница 165
165 Copyr i ght © Acronis , In c., 2000-20 1 1 The AES cryptographic algorithm operat es in the C ipher-block c hai ning (CBC) mode and uses a randomly generated key with a user-defined size o f 128, 192 or 25 6 bits. The larger t he key size, the longer it will t ake for the pro g ram to en crypt the archives stored in t he vault and the more sec[...]
-
Страница 166
166 Copyr i ght © Acronis , In c., 2000-20 1 1 If no o bjects were foun d, delete the name and enter another one. If several objec ts for the entered name we re found , select one of them and click OK , or click Cancel and specify another name. At first, the software tries t o find the entered names in the l ist of loc al users and groups on the m[...]
-
Страница 167
167 Copyr i ght © Acronis , In c., 2000-20 1 1 At ta chi ng a m ana g ed va ult A vault managed by a storage node can b e a ttach ed to another storage no de. You might need to do so when retiri ng the st orage node hardware, when the storage nod e is lost or when balancing loads between st orage nodes. As a result, t he first node stops managing [...]
-
Страница 168
168 Copyr i ght © Acronis , In c., 2000-20 1 1 Zone is con si dered as a personal vault available to al l users th at can log on t he system. Personal vaults are c reated automat i cally when backing up any of th e above locations. Personal vaults c an be used by local backup plans or local tasks. Centralized bac kup plans cannot use personal vaul[...]
-
Страница 169
169 Copyr i ght © Acronis , In c., 2000-20 1 1 Validate a vault Click Validate . You will be taken to the Val idation (p. 211 ) page, wh ere this vault is already pre-selecte d as a source . The vault va l idation c hecks all the arc hives sto red in the vault. Delete a vau lt Click Dele t e . The deletin g operat ion actua lly remov es only a sho[...]
-
Страница 170
170 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Make sure that none of the b ackup plans uses vault A while m erging, or disable th e gi ven plans. See Actions on backup plans and tasks (p. 2 58). 2. Move t he content of vault A folder t o vault B manually by means of a third-party file manager. 3. Edit the backup pl ans th at use vault A : redi[...]
-
Страница 171
171 Copyr i ght © Acronis , In c., 2000-20 1 1 After you configure the required settings, cli ck O K. In the Resul t co nfi rmation (p. 172 ) window, review the expect ed layout and cli ck O K t o start c reati ng the zon e. 6. 2.1 .1 Ac ron is Se cu re Zo ne Dis k The Acro ni s Secure Z one c an be located on any fixed h ard drive. Acronis Sec ur[...]
-
Страница 172
172 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 2.1 .4 R es ult co nfi rma tio n The Res u lt confirmati on wi ndow displa ys the expect ed partition layout ac cording t o the sett i ngs you have cho sen. Click OK , if you are satisfied with the layout and the Acronis Sec ure Zone creation will start. How the set t ings you make will be processe[...]
-
Страница 173
173 Copyr i ght © Acronis , In c., 2000-20 1 1 If there is n ot enough un allocated space, the program will take free spa ce from the sel ected volumes, propo rtionall y reducing t he volumes' size. Re si zing of loc ke d part i tions requires a reboot. Reducing a system volum e to t he mi n imum s iz e mi ght prevent t h e mach i ne&apos[...]
-
Страница 174
1 74 Cop yright © Acronis, In c., 200 0 -2011 An autoloader is a p articular case of tape libraries. It c ontains one drive, several slots, a changer and a barc ode reader (optional). A s ta nd-a l on e tape drive (al so called streamer ) contains one slot and can hold only one tap e a t a time. 6 . 3 . 2 O v e r v i e w o f t a p e s u p p o r t [...]
-
Страница 175
175 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Add the reg istry key described bel ow. Sp ecify the new locat ion path in the registry value TapesDatabase Path . Registry key: HKEY_L OCAL_MACH I NESOFTWAREAc ronis ARSMSet tings Registry value: Tapes DatabasePat h Possible data val u es: Any string 0 to 327 65 characters l ong. Description: [...]
-
Страница 176
176 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.2 .5 Pa ral l el op erat ion s Acronis Bac kup & Recovery 11 can simultaneously perf orm operations with v arious co m ponents of a tape d evice. During an op eration that uses a drive (backing up, reco v ering, rescanning (p. 186 ), or erasing (p. 185 )), you can launch an operation t hat us[...]
-
Страница 177
177 Copyr i ght © Acronis , In c., 2000-20 1 1 ABR11 Bootable Media ABR11 Agent for Windows ABR11 Agent for Linux ABR11 Storage Node Ta pe wr it te n on a l oca ll y a tt ac he d ta pe de vi ce (t ap e d ri ve or ta pe li br ar y) by .. . Bootable M edia 9.1 + + + + Echo + + + + ABR10 + + + + ABR11 + + + + Agent for Windows 9.1 + + + + Echo + + + [...]
-
Страница 178
178 Copyr i ght © Acronis , In c., 2000-20 1 1 Backing up On t he Actions menu, click Back up now or Create backup plan . Confi g ure (p. 45 ) th e backup settings. When spec i fying t he backup dest i nation, sel ect t he tape d evice. Results The resulting b ackups wi ll be loc ated in an aut omatically created personal vault (p. 189 ). To a[...]
-
Страница 179
179 Copyr i ght © Acronis , In c., 2000-20 1 1 6. In the N a vigation tree, c l ick Storage nodes . Select the storage n ode t o which your tape device is attac hed, and then click Cre a te vault . Proceed as descr ibed in the "Creating a m anaged centralized vault" (p. 162 ) section. In the Tape pool step, sel ect the pool you decided t[...]
-
Страница 180
180 Copyr i ght © Acronis , In c., 2000-20 1 1 5. If any of the detected backups c on tinue on o ther tap es that have not been rescanned yet, l oad these t apes as prompted a nd rescan them. 6. After th at, you can select t he required backup. If the backup is located on a stora g e node 1. Connect the console to the management server. 2. Detect [...]
-
Страница 181
181 Copyr i ght © Acronis , In c., 2000-20 1 1 15. Click OK t o s tart the recovery. 16. If any of the required tapes are n ot loaded for some reason, the software will show you a message with the identifier of th e needed tape. Load the tap e, and click Retry to c on tinue the recovery. 6. 3.3 .5 R ec ove ri ng un der bo otab le med ia fr om a ta[...]
-
Страница 182
182 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .2 Ta p e p oo l s Acronis Bac kup & Recovery 11 uses tape p ools that are logical groups of tapes. The software contains the fo l lowing predefined t ape pools: Unrecognized tap es , I mported tapes , Free tapes , and Acronis . Also, you can create your o wn custom po ols. Predefined pools[...]
-
Страница 183
183 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.4 .3 O p era ti ons wit h p ool s Cr eat in g a p ool To crea t e a po ol : 1. In the N a vigation tree, c l ick Tape managem en t . If connect ed to the management server, select the st orage node to which y our tape device is attached. 2. Click New poo l . 3. Specify th e pool name. 4. [Opt i o[...]
-
Страница 184
184 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Select t he required pool and click Remove . 3. Select t he pool to which the t apes of the pool being deleted will be moved after the deletion. 4. Click OK t o delete the pool. 6. 3.4 .4 O p era ti ons wit h tap es R ena mi ng When a n ew tape i s detec ted by the s oftware, it i s automaticall y [...]
-
Страница 185
185 Copyr i ght © Acronis , In c., 2000-20 1 1 You need to take several tapes out of a tape devi ce simultaneously . Your tape dev ice does not have a mail slot and t he tapes to be taken o ut are locat ed in slots of non-det achable magazine(s). You need to move tapes on e by one to slots of one slot magazine and then t ake the magazi ne [...]
-
Страница 186
186 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o s tart the operation. R es cann in g The informat i on abo ut the c o ntents of t apes is st ored in a dedicated database. The rescanning operation reads the content s of tapes and u pda tes the database i f the information in it mi smatches the dat a s tored o n tapes. The arc hives d[...]
-
Страница 187
187 Copyr i ght © Acronis , In c., 2000-20 1 1 Result. T he selected tap es are moved to the pool associated with the sel ected vault. The b a ckups stored on the t apes can be fo und in th i s vault. A backup spread over several tapes will not appear in the vault until all of th ese tapes are rescanned. In ve nto ryi ng The invento ryi ng operati[...]
-
Страница 188
188 Copyr i ght © Acronis , In c., 2000-20 1 1 Combination of fast an d full inventorying Full inventory i ng of an entire tape device may t ake a long time. If you need t o inventory only a few tapes, proceed as follows: 1. Perform the fast inventorying of t he tape device. 2. Click th e Unrecognized tapes pool. Find the tapes you want t o invent[...]
-
Страница 189
189 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat to d o if I re mov ed a t ap e b y mis ta ke? Unlike an erased (p. 185 ) tape, the data from a remove d tape i s not physically deleted. Hence, you can make backups stored on such tape available again. To do so: 1. Load the tape int o your tape device. 2. Perform the fast inventorying (p. 187 ) [...]
-
Страница 190
190 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip. If you back u p multipl e machines t o a tape library with multiple drives, assoc iate the vaul t with the who l e library. This wil l allow you t o back up the m achines simul taneousl y via different dri ves. If you assoc i ate a v ault or sev eral vaults with o ne drive, backups will be queued[...]
-
Страница 191
191 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .2 Ex am ple 2. Bac kin g u p t o ta p es o n a w e ek ly r o ta tio nal ba sis Consider the fo l lowing scenar i o: You want to back up several machines to a tap e devi ce at tached to Acronis Backup & Recovery 11 Storage Node. You want to create full backup s on Fridays and i ncre[...]
-
Страница 192
192 Copyr i ght © Acronis , In c., 2000-20 1 1 6. 3.6 .3 Ex am ple 3. Dis k- to -di sk- to tap e wi th se ndin g tap es to an off- sit e st ora ge Consider the fo l lowing scenar i o: You want to back up a machine t o a hard di sk and replicat e each backup to t he locally attach ed tape d evice. You want to eject tapes wi th each bac kup [...]
-
Страница 193
193 Copyr i ght © Acronis , In c., 2000-20 1 1 2. Perform the fast inventorying (p. 187 ) with the Mov e newly detected tapes f rom the 'Unrecognized ta p es' or ' Imported tapes' pools to the 'Fr ee tapes' pool chec k box select ed. Result . The l oaded t apes are in the Free tapes po ol. If some of them are sent to [...]
-
Страница 194
194 Copyr i ght © Acronis , In c., 2000-20 1 1 Up to 50 storage nodes c an be set up. 6 . 4 . 2 S u p p o r t e d t y p e s o f s t o r a g e A managed vault c an be organized: On t he hard drives local to t he storage nod e On a network share On a St orage Area Network (SAN) On a Network Attached St orage (NAS) On a tape libra[...]
-
Страница 195
195 Copyr i ght © Acronis , In c., 2000-20 1 1 The mac hi ne where t he storage node i s planned to be installed meet s the system requirements described in t he installation document ation . You downloaded the setup p rogram of Ac ronis Backup & Recovery 11. Setting up the storag e node 1. Install Acronis Backup & Recovery 1 1 Sto[...]
-
Страница 196
196 Copyr i ght © Acronis , In c., 2000-20 1 1 3. Select t he storage node; th en, perform t he required operations as described i n "Actions o n storage no des" (p. 197 ). 6 . 4 . 5 U s e r p r i v i l e g e s o n a s t o r a g e n o d e User acco unts can have the different s cope of user's privileges on Acronis Bac kup & Re c[...]
-
Страница 197
197 Copyr i ght © Acronis , In c., 2000-20 1 1 However, if UserA i s a memb er of the Administrato rs group on the mac hi ne, t hi s user can additionally ac cess the archives creat ed from this machine by UserB even though UserA's accou nt on t he storage node is a regular one. 6 . 4 . 6 O p e r a t i o n s w i t h s t o r a g e n o d e [...]
-
Страница 198
198 Copyr i ght © Acronis , In c., 2000-20 1 1 Refresh th e list of storage nodes Click Refresh . The manage ment conso l e will update the list of sto r age nodes from the managem ent serve r with the most r ecent in format i on. The list of storag e nodes is refreshed auto m atically based on even ts. Howeve r , the data m ay not be retrieved im[...]
-
Страница 199
199 Copyr i ght © Acronis , In c., 2000-20 1 1 Withdrawn - the storage node was registered on ano t her management server . As a result, it is not possibl e to c ontrol t he node from t he current management server . Archives - the total number of archives stored i n all the vaults managed by the storage no de. Backups - the total numb[...]
-
Страница 200
200 Copyr i ght © Acronis , In c., 2000-20 1 1 Parameters related to compac ting As backups are deleted from a d edupli cating vault, its dedupli cation data store (p. 205) may contain unused dat a blocks (items) th at are no l onger referred to fro m any backup. T he storage node processes the dat a store to delete the u nused items. This operat [...]
-
Страница 201
201 Copyr i ght © Acronis , In c., 2000-20 1 1 The C o mpacting Trigger Threshold parameter enables you to set up a balance between t he extra space requ i red to store unused i tems and the compacting frequency. The l arger the value o f this parameter, the fewer unused i tems are allowed in t he data sto re, but compac ting wil l likely be more [...]
-
Страница 202
202 Copyr i ght © Acronis , In c., 2000-20 1 1 Fast Operation C on nection Limit Description: Specifi es the maximum number of si multaneous co nnec tions to t he st orage node for purposes o ther than backup, rec overy, and operations with arc hi ves. Possible values: A ny integer number between 1 and 2 147483647 Default value: 10 Components o f [...]
-
Страница 203
203 Copyr i ght © Acronis , In c., 2000-20 1 1 The C h eck Hash Va lue On Ser v er Si d e parameter determines whether the storage node must ensure th at the hash value matc hes the data block. Such check puts an additional load on th e storage no de. Normally, suc h check i s not necessary. You can set this parameter to True to make th e deduplic[...]
-
Страница 204
204 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the am ount of free space in a managed vault, in megabytes, below which an error is recorded i n the storage node's log and any backup to the vault bec omes prohibited. Possible values: A ny integer number bet ween 0 and 21474 83647 Default value: 50 When th e amount of fr[...]
-
Страница 205
205 Copyr i ght © Acronis , In c., 2000-20 1 1 deduplicati ng vault . The D edupli cation add-on t o the agent must be installed on any mach i ne that backs u p to such vault. Without the add -on backing up t o the vault i s not possible. The dedu pl ication is p erformed on data blocks. T he block size is 4 KB for dis k -level backups and 1 B to [...]
-
Страница 206
206 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e the backup pr ocess is c ompl eted, the v ault c onta ins the resulting backup and the temporary file with the unique data blocks. T he temporary file will be pro cessed on the next stage. The ba ckup (TIB file) cont ai ns hash values and the data that cannot be d edupli cated. Furt her processi[...]
-
Страница 207
207 Copyr i ght © Acronis , In c., 2000-20 1 1 Compac ting After one or more backup s or archives have been del eted fro m the vaul t either manually or during cleanup the dat a store may c on tain blocks whi ch are no longer referred to from any arch i ve. Such blocks are d el eted by t he compacting task, which is a sc heduled task perfo[...]
-
Страница 208
208 Copyr i ght © Acronis , In c., 2000-20 1 1 To increase deduplicat i on performanc e, follow the rec ommendations b el ow. Place the deduplication databas e and dedupl icating va ult on separate physical devices To increase th e speed o f access to a deduplication dat abase, the dat abase and t he vault must b e located on separate physical dev[...]
-
Страница 209
209 Copyr i ght © Acronis , In c., 2000-20 1 1 64 -bit opera ting sys tem For o ptimal deduplication performance, install t he sto r ag e node i n a 6 4 -bi t o pera ting system. The machine should n ot run applications t hat require much system resourc es; for example, Database Management Syst em s (DBMS) or Enterpr i se Resource Planning (E RP )[...]
-
Страница 210
210 Copyr i ght © Acronis , In c., 2000-20 1 1 Tip: The al l ocati o n unit si ze on most NTFS and ext3 volumes is 4 KB. This al l ows f o r block-le v el de duplicat i on. Other exam p les o f all o cation u nit sizes allowing f o r block-lev el dedu p licati o n incl u de 8 KB, 16 KB, and 64 KB. File-level backup Deduplication of a file is not p[...]
-
Страница 211
211 Copyr i ght © Acronis , In c., 2000-20 1 1 7 Op er ati ons wi th a rchiv es and ba ckup s 7. 1 Va l ida ti ng ar chi ve s a nd ba ck ups Validation is an o peration that checks t he possibili ty of data rec overy from a backup. Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validatio[...]
-
Страница 212
212 Copyr i ght © Acronis , In c., 2000-20 1 1 [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have enough privileges to access it. When to validate Start validation (p. 213 ) Specify when and ho w often to perform validation. Task para meters Task name [Opt i onal] Ent er a unique name fo r the val idat[...]
-
Страница 213
213 Copyr i ght © Acronis , In c., 2000-20 1 1 To select a cent ral ized vault, ex pand t he Centrali zed group and click th e appropriat e vault. To select a personal vault, expand the Personal group and cli ck t he appropriate vault. To select a l ocal folder (C D/DVD d rive, or loc al ly attached t ape device), expand the Local fold[...]
-
Страница 214
214 Copyr i ght © Acronis , In c., 2000-20 1 1 Ch oo se on e o f th e f o llo win g : Now - to start t he val idation t ask rig ht aft er its creation, t ha t is, aft er clicking OK on the Validation page . Later - to start t he one-time validation task, at the date and time you specify. Specify th e appropriate parameters as follows: [...]
-
Страница 215
215 Copyr i ght © Acronis , In c., 2000-20 1 1 Your choice o f backups belonging t o the same arch i ve - the resul ting archive will c ontain only the specified backup s. Consolidat i on is performed as required, so the resulting archive may co ntain full, incremental an d differential bac kups. An entire v ault that can be exported by us[...]
-
Страница 216
216 Copyr i ght © Acronis , In c., 2000-20 1 1 personal vaults, locally att ached tape dev ices, removable media and , in the ad v anced produ ct versions, managed an d unmanaged c entralized vaults. When th e console is connect ed to a management server , two export methods are available: Export from a manag ed vault . The export is performed[...]
-
Страница 217
217 Copyr i ght © Acronis , In c., 2000-20 1 1 Backups - you n ee d to specify the archive first, and then select t he desired backup(s) in this archive. Browse Select t he Archive (p. 217) or the Backups (p. 217 ) . Show access credentials (p. 217 ) [Opt i onal] Provide credent i als for ac cessing the source if the task a ccount does n ot have e[...]
-
Страница 218
218 Copyr i ght © Acronis , In c., 2000-20 1 1 To sp eci fy cr ede nt ia ls 1. Select o ne of the following: Use the curre nt user credentials The so ftware wil l access the location usi ng the credentials of th e current u ser. Use the following cr edentials The pro g ram will access t he location using t he credential s you spec ify. Use[...]
-
Страница 219
219 Copyr i ght © Acronis , In c., 2000-20 1 1 To export data t o a locally att ac hed tap e devi ce, expan d the Tape drives group, t hen click the required device. I n stan d- al one editions of A cronis Backup & Recovery 11, t ape devices are available only if you have upgraded from Acro ni s Back up & Rec overy 10. For information [...]
-
Страница 220
220 Copyr i ght © Acronis , In c., 2000-20 1 1 Pass word . The passwor d for the account. 2. Click OK . Acc o rding to the original FTP s p ecif i catio n , crede ntials requir ed for acces s to FTP servers are transferr ed through a n etwork as plaintext . This me ans that the user name and pa ssw ord can be intercept ed by an eavesdro pp er [...]
-
Страница 221
221 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 1 A r c h i v e s e l e c t i o n Selecting the archive 1. Enter the full path to the l ocation in t he Path field, or sel ect the desired folder in th e folders tree. If the arc hive is stored in Acro ni s Online Bac kup St orag e, click Log in and specify the credent ials to log in t o t[...]
-
Страница 222
222 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 2 B a c k u p s e l e c t i o n To sel ect a ba ck up : 1. Select o ne of the backups by its creation date/time. 2. To assist you wi th choosing th e rig ht bac kup , th e bottom table d isplays the volume s contained in the select ed backup. To obtain info rmation on a vo lume, right-click it[...]
-
Страница 223
223 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 3 . 5 M a n a g i n g m o u n t e d i m a g e s Onc e a volume is mount ed, you can b r owse files and folders co ntained in the backup usi ng a file manager and c opy the desired files to any destination. Th us, if you need to take out only a few fi les and folders from a volume backup, you do no[...]
-
Страница 224
224 Copyr i ght © Acronis , In c., 2000-20 1 1 source. Validation of an a r chive will check all the a rc hive's backups . Export an archiv e Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted archive as a sou rce. The expo r t of an archive cr eates a dupl ic at e of th e arch i ve w i th all its backups in t[...]
-
Страница 225
225 Copyr i ght © Acronis , In c., 2000-20 1 1 data block sav ed in the backup . Export a backup Click Exp o rt . The Export (p. 214 ) page wi ll be o pened with th e pre-selec ted backup as a source . The expo r t of a backup c r eates a new archiv e with a se l f -sufficient c opy of the backup in the locat i on you speci fy. Convert a ba ckup t[...]
-
Страница 226
226 Copyr i ght © Acronis , In c., 2000-20 1 1 7 . 4 . 4 D e l e t i n g a r c h i v e s a n d b a ck u p s The Backups del etion window disp l ays the same tab as for the vaults view, but with check boxes for each arc hive and backup. The arc hiv e or b ackup you have cho sen to delete has th e check mark. Review th e archive or bac kup that you [...]
-
Страница 227
227 Copyr i ght © Acronis , In c., 2000-20 1 1 8 Bo ot ab le med ia Bootable media Bootab l e media is physical media (C D, D VD, U SB drive or other m edia support ed by a machine BIO S as a bo ot device) th at boots on any PC-compatible machine and enables you to ru n Acronis Bac kup & Recovery 11 Agent either in a L i nux-based environment [...]
-
Страница 228
228 Copyr i ght © Acronis , In c., 2000-20 1 1 PE -based bootable media does n ot support UEFI. 8. 1 Ho w to c rea te bo ota bl e med ia To enable creat ing physical media, t he machine must have a CD/DVD recording drive or allow a flash drive to b e attached. To enable PXE or WDS/RIS configuration, the machine must h av e a net work connec tion. [...]
-
Страница 229
229 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// www.microsoft . com/downloads/detai l s.aspx?fa m ilyid=696DD 665 -9F76 - 4177 -A 811-39C26 D3B3B3 4&displayl ang=en You can find system requirements for installation b y follow ing the abo v e links. 2. [optional] Burn the WAIK to DV D or copy t o a flash d ri ve. 3. Install the M i cros[...]
-
Страница 230
230 Copyr i ght © Acronis , In c., 2000-20 1 1 build an ISO i mage of a b ootab le disc to burn it later on a blank d isc upload t he selected co mponents to Acronis PXE Server upload t he selected co mponents to a WDS/RIS. 8. [optional] Wi ndows system drivers to be used by Acronis Universal Restore (p. 232 ). T hi s window appears on[...]
-
Страница 231
231 Copyr i ght © Acronis , In c., 2000-20 1 1 nousb2 Disables USB 2.0 sup port. USB 1.1 devices st i ll work wit h this parameter. This p arame ter allows you t o use some USB drives in th e U SB 1.1 mode if they do not work in the USB 2.0 mode. nodma Disables direct memory access (DMA) for all IDE hard d isk drives. Prevents t he kernel from fre[...]
-
Страница 232
232 Copyr i ght © Acronis , In c., 2000-20 1 1 Pre-configuring multiple netwo rk connection s You can pre-con fi gure TCP/I P settings fo r up to ten network interface cards. To ensu re that each NIC will be assigned th e appropriate sett i ngs, c reate the media on the serv er for whic h the media is custo m ized. When you sel ect an existing NIC[...]
-
Страница 233
233 Copyr i ght © Acronis , In c., 2000-20 1 1 to get the mass-storage drivers t hat you explicitly specify fro m the m edia. This is necessary when the t arget hardware has a spe cific mass storage cont ro ll er (such as a SCSI, RAID, o r Fi ber Channel adapter) for t he hard disk. For more i nformation p l ease refer to Univ ersal Restore. T[...]
-
Страница 234
234 Copyr i ght © Acronis , In c., 2000-20 1 1 8 . 1 . 3 A d d i n g t h e A c r o n i s P l u g - i n t o W i n P E 2. x o r 3 . 0 Bootab l e Media Builder provides t hree methods of integrating Acron i s Backup & Recovery 11 with WinPE 2.x or 3.0: Adding the Acro ni s Plug-in to the exi sting PE ISO. T his c omes in handy when you have t[...]
-
Страница 235
235 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e a mac hine boots into WinPE, Acronis Backup & Recovery 11 starts automatic al ly. To crea t e a PE i mag e (ISO fil e) fr om th e resu lt ing W IM f ile : replace th e default boot .wim file in your Windo ws PE fo l der with t he newly created WIM fi le. For the ab ove example, t ype: co[...]
-
Страница 236
236 Copyr i ght © Acronis , In c., 2000-20 1 1 Remote connection To connect to the m achine remot el y, select Connect -> M a nage a remote machine in the console menu and specify one of the mac hine's IP addresses. P rovi de the user name and password if these have been configured when creat i ng the boo table media. Local c o nnection Ac[...]
-
Страница 237
237 Copyr i ght © Acronis , In c., 2000-20 1 1 3. From t he list of suppor ted video mod es, choose the ap propriate one b y typing its number (for example, 318 ), an d then press ENT ER. If you do not wish t o follow this procedure every time you bo ot from media on a given hardware configuration, re-create th e bootable media with t he a ppropri[...]
-
Страница 238
238 Copyr i ght © Acronis , In c., 2000-20 1 1 acronis asamba lash Linux commands and utilities busybox ifco nfig rm cat init rmmod cdre cord insmod route chmod iscs iadm scp chown kill scsi_id chroot kpartx sed cp ln sg_m ap26 dd ls sh df lspci sleep dmesg lvm ssh dmraid mdadm sshd e2fsck mkdir strace e2label mke2fs swapoff echo mknod[...]
-
Страница 239
239 Copyr i ght © Acronis , In c., 2000-20 1 1 8. 5 A cro ni s Sta rtu p Re cov ery Man age r Acronis St artup Recovery Manager is a modificat i on of the boot abl e agent (p. 368), residi ng on the system disk in Windows, or on t he /boot partition in Linux and co nfi gured to start at boot time on pressing F11. It el iminates t he need fo r a se[...]
-
Страница 240
240 Copyr i ght © Acronis , In c., 2000-20 1 1 Bootab l e compon ents are u ploaded to Acro nis PXE Server using Acronis Boo table Media Builder. To upload bo otable component s , start th e Bootable Media Bu i lder (either from t he management conso le, by select i ng Tools > Cr ea te bootable media or as a separate component) and fol low the [...]
-
Страница 241
241 Copyr i ght © Acronis , In c., 2000-20 1 1 If the h ardware has multiple network interfac e cards, make sure t hat the card suppor ted by the BIO S has th e network cable plugged in. 8 . 6 . 3 W o r k a c r o s s s u b n e t s To enable the Acronis PXE Serve r to work in another subnet (acro ss the switch ), configure the swi tch to relay the [...]
-
Страница 242
242 Copyr i ght © Acronis , In c., 2000-20 1 1 9 D isk m ana gem ent Acronis Disk D irector Lite is a tool for prepa ri ng a machine disk/volume co nfi guration fo r recovering the volume ima g es saved by t he Acronis Backup & Recovery 11 software. Sometimes after the volume has been backed up and i ts image placed int o a safe storage, the m[...]
-
Страница 243
243 Copyr i ght © Acronis , In c., 2000-20 1 1 1. Back up the disk on whi ch volumes will b e created or managed. Havin g your most i mportant data backed up to ano ther hard disk, network share o r rem ovable media will allo w you to wor k on disk volumes b ei ng reassured th at your dat a is safe. 2. Test y our disk t o make sure it i s fully fu[...]
-
Страница 244
244 Copyr i ght © Acronis , In c., 2000-20 1 1 The t op part of the view co ntains a disks and v olumes table enabling data sorting and c ol umns custo m ization and toolbar. The table presents th e numbers of t he disks, as well as assigned letter, label, type, capacity, free spac e size, used space size, fi le system, and status fo r each volume[...]
-
Страница 245
245 Copyr i ght © Acronis , In c., 2000-20 1 1 Acronis Disk D irector Lite wil l detect that the disk is u n usable by the syst em and n ee ds to be initialized. The Dis k management view will show t he newly detected hardware as a gray block with a grayed icon, thus indicating t hat the di sk is unusable by the sy stem. I f you ne ed to in it ia [...]
-
Страница 246
246 Copyr i ght © Acronis , In c., 2000-20 1 1 ?[...]
-
Страница 247
247 Copyr i ght © Acronis , In c., 2000-20 1 1 I f you ne ed to co p y th e NT si gna tu re: 1. Select t he Copy NT signature system on the hard disk, uninsta[...]
-
Страница 248
248 Copyr i ght © Acronis , In c., 2000-20 1 1 1. MBR disk c onversi on: dynami c to basic (p. 249) using t he Convert to basic operat i on. 2. Basic disk c onversi on: M BR to GPT using the Convert to G PT operation. 3. GPT disk c onversi on: b asi c t o dynamic (p. 248 ) using t he Convert to dynamic operation. 9 . 6 . 4 D i s k c o n v e r s i [...]
-
Страница 249
249 Copyr i ght © Acronis , In c., 2000-20 1 1 Sys tem disk conversion Acronis Disk D irector Lite does not require an operat i ng system rebo ot after basic to dynamic conversion o f the disk, if: 1. There is a si ngle Windows 2008 /Vi sta op erating syste m installed on the di sk. 2. The mac hi ne runs this operating system. Basic to dynamic c o[...]
-
Страница 250
250 Copyr i ght © Acronis , In c., 2000-20 1 1 safe co nversion of a dynami c disk t o basic when it co n t ains volumes with data for simp l e and mirrored volumes in multiboot systems, boot ability of a syst em that was offline during t he operation 9 . 6 . 7 C h a n g i n g d i s k st a t u s Changing disk st atus is effec tive for Wind[...]
-
Страница 251
251 Copyr i ght © Acronis , In c., 2000-20 1 1 Store coll ections of simi lar files separately for exam ple, an MP3 c ollection or vi deo files on a separate volume; Store backups (images) of oth er volumes/disks on a spec i al volume; Install a new op erating system (or swap file) on a new volume; Add new hard ware to a mac hi[...]
-
Страница 252
252 Copyr i ght © Acronis , In c., 2000-20 1 1 data it self. If a physical disk fai l s, t he portion of the RA ID -5 volume t hat was on that failed disk can be re-creat ed from the rem aining data and the parity. A RAID-5 volume provides re liability and is able t o overcome t he physical disk size limit ations with a higher than mirrored disk- [...]
-
Страница 253
253 Copyr i ght © Acronis , In c., 2000-20 1 1 To create a S triped volume: Select t wo or more dest i nation disks to create the v olum e on. To create a RA ID-5 volume: Select t hree destination disks t o create the volume o n. After you choose the disks, t he wizard will calculat e th e maximum size of the resulting volume, depending on[...]
-
Страница 254
254 Copyr i ght © Acronis , In c., 2000-20 1 1 In setting t he cluster size you can ch oose between any number in t he preset amount for each file system. Note, t he program suggests the cluster size best sui ted t o the volume with the chosen file system. If you are creating a basic volume, whi ch c an be made into a syst em volume, t hi s page w[...]
-
Страница 255
255 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 3 S e t a c t i v e v o l u m e If you have several pri mary volumes, you must specify one to be the boot vol ume. For t hi s, you can set a v olume to become active. A disk can have only one ac tive volume, so if you set a volume as active, the volume, which was ac tive before, wi ll be au to[...]
-
Страница 256
256 Copyr i ght © Acronis , In c., 2000-20 1 1 9 . 7 . 5 C h a n g e v o l u m e l a b e l The volume label i s an optional at tribute. It is a name a ssi gned to a volume for easier recognition. Fo r example, one volume c ould be called SYST EM a volum e with an operating system, o r PROGRAM an applicat i on volume, D A TA a data v ol[...]
-
Страница 257
257 Copyr i ght © Acronis , In c., 2000-20 1 1 If you set a 64K cl uster size for FAT16/F AT32 or an 8KB-64KB cluster size f o r NTFS, W indows ca n mo u nt the volume, b ut s o me pro g rams (e.g. Setup pro grams) might ca lculate its disk s pa ce incorr ectly. 9. 8 P end i ng op er ati on s All operat i ons, whi ch were prepared by the user in m[...]
-
Страница 258
258 Copyr i ght © Acronis , In c., 2000-20 1 1 10 Ad mi nis ter ing a man ag e d mac hin e This sect i on desc ri bes the v iews that are avail able through the navigation tree o f the console connec ted to a managed machine and ex plains how to work with each vi ew. 10 .1 Ba ck up pla ns an d tas ks The Backup plans an d tasks view keeps you i nf[...]
-
Страница 259
259 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a plan/tas k Click Det a ils . In the respect ive Plan De t ails (p. 267 ) or Task De t ails (p. 26 8) wi ndo w, revie w the plan or task deta i ls. View plan' s/task's log Click Log . You will be taken to the Lo g (p. 269 ) view contain ing the list of the log entr i[...]
-
Страница 260
260 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/task Click Edi t . Backup plan editin g is perform ed in the same way as creation (p . 45 ) , except f or the follow i ng limita t ions : It is not always pos sible to use all sch eme options, when ed iting a backup pl an if the creat ed arch i ve is not empty (i.e. conta i ns backup[...]
-
Страница 261
261 Copyr i ght © Acronis , In c., 2000-20 1 1 1 Need intera ction At least one task ne eds user interactio n. Otherwise, see 2. Identify the tasks that need i ntera ction (the p r ogram wil l display what actio n is ne eded) -> Stop the tasks or enable the tasks to run ( change m edia; p rovide addit i onal spa ce on the vault; i gnore the rea[...]
-
Страница 262
262 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 2.3 Ta s k st ate s A task c an be in one of the fo llowing stat es: Idle ; Waiting ; Running ; Need i nteraction . The initial t ask state i s Idle . Onc e the task is st arted manually or th e event spec i fied by th e s chedule occ urs , th e task enters either the Ru nning stat e or the Wai[...]
-
Страница 263
263 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 1 . 3 E x p o r t a n d i m p o r t o f b a c k u p p l a n s The expo rt operation creates a fil e with c ompl ete c onf ig uration of the bac kup plan. You can import the file to reuse the export ed backup pl an on another machine. Centralized backup plans can be exported from a manag ement se[...]
-
Страница 264
264 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .1. 3.1 Ed it ing th e exp ort f il e The expo rt file is an .xml file and c an be edited with a text editor. Here is how t o make some useful chan g es. How to m o dify credentials In the export fi le, the <login> tags include t he user name and the < pa sswo r d> tags include the user[...]
-
Страница 265
265 Copyr i ght © Acronis , In c., 2000-20 1 1 </lo gin> <pas sword e n crypted= "true"> XXXY YYZZZ888 </pa ssword> How to change item s to back up Replacing a directly spec ified item with another directly s pecified item Inside the <plan><target s><in clusi ons> section: 1. Delete the <ID> tag.[...]
-
Страница 266
266 Copyr i ght © Acronis , In c., 2000-20 1 1 <specific> <backup_type > disks </backup_typ e> <disk_level_ options /> <file_level_ options /> <inclusion_r ules> <rules_ty pe> disks </rules_t ype> <rules> <rule> [BOOT] </ rule> <rule> [SYSTEM] </ rule> </rules> <[...]
-
Страница 267
267 Copyr i ght © Acronis , In c., 2000-20 1 1 The default path to the dedicat ed f older is %ALLUSERSPROFI LE%AcronisBa ck u pAndReco v eryim p ort . The pat h is stored in the reg istry key HKEY_LOC AL_MACHINESOFTWAREAcronis MMS Configur a tionImport f olderPath . The ab sence o f the key means t hat the ag ent does not monitor th e ded[...]
-
Страница 268
268 Copyr i ght © Acronis , In c., 2000-20 1 1 Last finis h time - how much time has passed since the last plan o r task end. Last r esult - the result o f the last plan or t ask run. Type - backup plan or task type. Owner - th e name of the user who creat ed or last mo di fied the p l an Next s ta rt tim e - when the plan o r [...]
-
Страница 269
269 Copyr i ght © Acronis , In c., 2000-20 1 1 10 .2 Lo g The loc al event log st ores the history of o perations performed by Acronis Bac kup & Recovery 11 o n the mac hi ne. To view a plain list of log ent ri es, select Events in the D isplay drop-down l ist; to view log entries grouped by activities, select Activities . The details of the s[...]
-
Страница 270
270 Copyr i ght © Acronis , In c., 2000-20 1 1 Save all the filtered log entries to a file 1. Set filters to get a list of the log entri es that satisfy the filteri ng criteria. 2. Click Save all to file . 3. In the opened window, spec if y a path and a na m e for the f ile. All log ent ri es in the list w i ll be saved t o the spec if ied f ile. [...]
-
Страница 271
271 Copyr i ght © Acronis , In c., 2000-20 1 1 Fixing issues that caused ale rts To find and fi x the issue that caused th e alert , click Fix th e is sue . You wi ll be t aken to the correspo nding view,where you c an examine the issue and take t he ne cessary steps to resolve it. Optionally, y ou c an click View d etails to get more infor mation[...]
-
Страница 272
272 Copyr i ght © Acronis , In c., 2000-20 1 1 1 0 . 5 . 1 C u s t o m e r E x p e r i e n c e P r o g r a m This opt i on defines whet her the machine will participa te in th e Acronis Customer Experienc e Program (ACEP). If you c hoose Yes, I want to partici p ate in the ACEP , information ab out the hardware c onfig uration, the most and least [...]
-
Страница 273
273 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts view of the Navigation pane. When the c onsole is connected to the management serv er, t hi s sett i ng will also co ntrol the color sc heme of the Last backup column's value for eac h machine. Last c onnection This opt i on is effec tive when t he c onsole [...]
-
Страница 274
274 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 273 ). To con fig ur e a le rt no [...]
-
Страница 275
275 Copyr i ght © Acronis , In c., 2000-20 1 1 You can override the set tings set here, ex clusively for the events th at occ ur during backup or during recovery, i n the D efaul t backup and recovery options. In this c ase, the settings set here wi ll be effective for operations oth er than bac kup and recovery, suc h as archive vali dation or cl[...]
-
Страница 276
276 Copyr i ght © Acronis , In c., 2000-20 1 1 /etc/snmp/snmpd.conf - co nfi guration file for the Net-SNMP SNMP agent /etc/snmp/snmptrapd . conf - c onfiguration file for th e Net-SN MP trap daemon. 10 .5. 4.3 W ind ows ev ent l o g This opt i on is effec tive only in Windows o perating systems. This opt i on is no t availabl e when o per[...]
-
Страница 277
277 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to use this option, you must be l ogged on as a member of the Administrators g roup on the mac hi ne. You have the opportunity to register the mac hi ne on the management server when i nsta l ling an Acronis Bac kup & Recovery 11 agent. If the m achine is no t registered, selecting Cent[...]
-
Страница 278
278 Copyr i ght © Acronis , In c., 2000-20 1 1 Google Chr o me. In Options , click Under th e Hood . Under Netw o rk , click Change proxy s ettings .[...]
-
Страница 279
279 Copyr i ght © Acronis , In c., 2000-20 1 1 11 Ce nt ral ize d m ana gem ent This sect i on c overs operations that can be performed centrally by using the components fo r centralized manage ment. The c ontent of this section i s only applicable t o advanced editions of Acronis Bac kup & Recovery 11. 11 .1 Un der st and ing cen tra liz ed m[...]
-
Страница 280
280 Copyr i ght © Acronis , In c., 2000-20 1 1 Organizing a manag ed archive storage What sho uld the capacity o f your cent ral ized vault be? What if tran sferri ng size able backups t o the vault will c ause networ k congestion? D oes backup o f a n online prod uction server affect t he server performance? To ensure that the cen tralized backup[...]
-
Страница 281
281 Copyr i ght © Acronis , In c., 2000-20 1 1 3. To specify creden tials for c on nection, c lick Options and then type the u ser name and password in the Us er name and Password boxes respec tivel y. In Windows, if you leave the User na me box empty, the c redentials under which the co ns ole is running will be used. 4. To save the password for [...]
-
Страница 282
282 Copyr i ght © Acronis , In c., 2000-20 1 1 For informat i on abou t Acronis security g roups and t hei r default mem bers, see Acronis security groups (p. 283 ). 11 .1. 2.4 Pr ivi l eges fo r rem o t e con nect i o n in Li nux Remote c onnections to a machine running L i nux i ncluding those performed by the roo t user are established [...]
-
Страница 283
283 Copyr i ght © Acronis , In c., 2000-20 1 1 Example 2 The ab ove auth entication policy might not work on Linux distributions with kernel version 2.4 because the p am_succeed_if.so modul e is not sup ported there. In this c ase, you can use the fo l lowing authentic[...]
-
Страница 284
284 Copyr i ght © Acronis , In c., 2000-20 1 1 To be able to c onne ct to the management serv er remotely , an admi nistrator of the management server must also b e a member of the A cronis Remot e Users group. No user even a me mber of the A dministrators group can b e an administrator o f the management serv er without being a member of [...]
-
Страница 285
285 Copyr i ght © Acronis , In c., 2000-20 1 1 New accounts If you c hoose to create dedicated user accounts for the services, th e setup program wil l create the following user ac counts: For t he service of Acronis Bac kup & Rec overy 1 1 Agent fo r Windows and Acro nis Backup & Recovery 11 Agent for VMware vSphere ESX(i) (Windows), [...]
-
Страница 286
286 Copyr i ght © Acronis , In c., 2000-20 1 1 In addition, there are two Acronis services which ru n under a syst em acc oun t: The Acr on is Scheduler 2 Servi ce provides scheduling fo r Acronis compon ents' tasks. It runs und er the L ocal System account and cannot run u nder a different ac count. The Acr o nis Rem o te Agent Servi[...]
-
Страница 287
287 Copyr i ght © Acronis , In c., 2000-20 1 1 C omp on en t na me C an be cl ien t C an be s erv er Acronis Backup & Recover y 11 Management Console Yes No Acronis Backup & Recover y 11 Agent Yes Yes Acronis Backup & Recover y 11 Management Server Yes Yes Acronis Backup & Recover y 11 Storag e Node Yes Yes Acronis PXE Ser ver No Y[...]
-
Страница 288
288 Copyr i ght © Acronis , In c., 2000-20 1 1 the Acro ni s client. Du ring component installation you mig ht b e asked to c onfirm the port opening o r to open the po r t manually, in case y ou are usi ng a firewall other than Windows Firewall. After installation, you can c h ange the ports a t any time to mat ch your p referabl e values or fo r[...]
-
Страница 289
289 Copyr i ght © Acronis , In c., 2000-20 1 1 For self-signed cert ificates, the c ertifi cate thumbprint (also known as fingerprint or hash) is used for future host identification: if a client has p rev iously connec ted to a server by using a self -signed certificat e and tries to establish c onnection again, the server checks whet her the cert[...]
-
Страница 290
290 Copyr i ght © Acronis , In c., 2000-20 1 1 When selecting what data to back up, you can either s el ect items on the registered mac hi nes directly or use the selection rul es. For more i nformation, see "Selecting data to ba ck up" (p. 290 ). When spec ifying where t o store mach i nes' arch ives, you can select to stor[...]
-
Страница 291
291 Copyr i ght © Acronis , In c., 2000-20 1 1 Selecting a c heck box for a mac hi ne means bac ki ng up all the machine's disks. To select individual disks and/or v olumes, expand the m achine item an d select check boxes next to t he disks and/or volumes . Notes for p hysical m achines, their dis ks and volumes If your o perating system[...]
-
Страница 292
292 Copyr i ght © Acronis , In c., 2000-20 1 1 Point t o t he folders and files to be ba cked up . If you specified a pat h to a file or folder explicitly, t he plan will back up this item on each machine where this exact path will be foun d. To i nc l ude I n th e Fi l es and f ol de rs co lum n, t yp e or se le ct : File Text.do c in folder D: [...]
-
Страница 293
293 Copyr i ght © Acronis , In c., 2000-20 1 1 The root user's home directory /root Directory for all user-related prog ram s /usr Directory for system configurat i on fi l es /etc 1 1 . 2 . 3 S e l e c t i o n r u l e s f o r v o l u m e s Define volume se l ection ru l es, ac cording to which the volumes on the mac hines included in the cen[...]
-
Страница 294
294 Copyr i ght © Acronis , In c., 2000-20 1 1 Boot volu me Type or sel ec t: [ B OOT] Refers to the re g iste red machin e's boot volume. The boot volu me contains th e W indows folder and the suppo rting files for th e Windows op erating sys tem ( typ i cally located in the Wi ndowsSystem32 folder ) . It may or may not be the same as the s[...]
-
Страница 295
295 Copyr i ght © Acronis , In c., 2000-20 1 1 Note on Li nu x machines You can include bo th Windows and Linux volumes (partitions) in on e centrali zed backup plan. For example, i t is possible to set up a cent rali zed backup plan to back up volume C: on Windows machines and partition /dev/hda1 on Linux machines. Unlike Windows, there is no c l[...]
-
Страница 296
296 Copyr i ght © Acronis , In c., 2000-20 1 1 /dev/vg_mymachine/lv_root /dev/vg_mymachine/lv_bin To see the l ist of logical volumes on a machine, run the lvdisplay ut ili ty. In our exam p l e, t he out pu t would be similar to the fo l lowing: --- Logical volume --- LV Name /dev/vg_mymachine/l v_root VG Name vg_mymachine … --- Logical volume [...]
-
Страница 297
297 Copyr i ght © Acronis , In c., 2000-20 1 1 You need to create Acronis Secu re Z one in ad v ance o n each mac hi ne the cen tralized plan is created for. For information on how to c reate Acronis Secure Zone, see t he C reating Acronis Secure Zone (p. 170 ) section. 2. Naming the archives Data from each machine wi ll be bac ked up to a separa [...]
-
Страница 298
298 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 2 . 6 W h a t i f a m a c h i n e d o e s n o t h a v e d a t a m e e t i n g t h e s e l e c t i o n r u l e s A centralized b ackup plan can be deployed to a machi ne that does not have data meeting the selection rules. No erro r or warning will be lo gged during the plan deployment because it[...]
-
Страница 299
299 Copyr i ght © Acronis , In c., 2000-20 1 1 from th e regi stered machines and fro m the m anagement server. The c hart shows the n umber of log entries of each t ype ( Su cceeded , With warnings , Failed ) for a part i cular day. Statistic s for the selected date are displaye d to the right o f the ch art. Al l the st atistics fields are inter[...]
-
Страница 300
300 Copyr i ght © Acronis , In c., 2000-20 1 1 Select a m achine (or group) to perform ac tions on it. See "Actions on machines" (p. 301) and "Actions on groups" (p. 308 ). To view detailed information about the selected m achine or group and perform additional operations (such as run/stop t asks, import/export backup p[...]
-
Страница 301
301 Copyr i ght © Acronis , In c., 2000-20 1 1 Example: T he accounting depart m ent fo rm s a separate Act i ve Directory organizational unit (OU). You si mply specify the ac counting O U as the group m e mbership criterion and create t he centralized b ackup pl an for i t. If a new ac countant is hired, the new machine will be added to the group[...]
-
Страница 302
302 Copyr i ght © Acronis , In c., 2000-20 1 1 deleted fro m the m achine . If the machi ne is not ava i lable at the m oment, these actions will be per formed on the ma c hine as soon as the mach ine becomes ava il ab l e to th e manage m ent serv er. Grouping actions To Do Create a cus tom static or dynamic group Click Cre at e gr oup . In the C[...]
-
Страница 303
303 Copyr i ght © Acronis , In c., 2000-20 1 1 Other actions To Do View deta i led i nformat i on on a ma chine Click Det a ils . In the Machi ne details (p . 306 ) window, exa mine infor mati o n on the ma chine. View log entries of a machine Click L og . The Log (p. 324 ) view will di splay a l i st of the machine' s l o g entries . Update [...]
-
Страница 304
304 Copyr i ght © Acronis , In c., 2000-20 1 1 Select t he Sav e passw o rd check box to store t he pass word fo r futu re connections. 5. Click Next , and then click Proceed . Initiating registration on the machine side The registrat i on proc edure can be initiated on the machine side. 1. Connect the console to the machine where Acro ni s Backup[...]
-
Страница 305
305 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the P ath field, enter a path to the .txt or . csv file, or click Browse and select the file in the Browse window. 4. Under Logon setti ngs , specify t he user name and p assword of a user who is a member of the Administrato rs group on all machines th at are listed in the file. 5. Click OK t o [...]
-
Страница 306
306 Copyr i ght © Acronis , In c., 2000-20 1 1 4. Click OK t o add machines. Onc e the machines app ear in th e group, the centralized backup plans created for the group (if any) are deployed t o the mach ines. If any of t he selected machines is not av ailable or reachable at the moment, the action will be kept in t he management server as pendin[...]
-
Страница 307
307 Copyr i ght © Acronis , In c., 2000-20 1 1 Installed a gents - full name of A cronis agents, installed on the machine. Proces sor - the type of CPU used in t he managed machine. CPU clock - c l ock rate of the C PU. RAM - m emory size. Descri ption - th e machine's description ( taken from the Computer desc ription in [...]
-
Страница 308
308 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 2.3 Ac ti ons on gr oup s Actions are avai lable when y ou select the Machines with agents vi ew i n the N av igation tree. You sel ect a g roup in the Navigation tree o r in the Machines wi th agents view to perform an action on t he group. The fo l lowing is a guideline to perform ac tions on[...]
-
Страница 309
309 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Move one c ustom group to another Click Move to . In the Move t o gro up (p. 311 ) window, sp ecify a group that will be a new parent of the sele cted group. Delete a custom group Click Dele t e . Deletion of a pa r ent g r oup wi l l delete i ts chi ld groups as w ell. Centrali z ed backup plan[...]
-
Страница 310
310 Copyr i ght © Acronis , In c., 2000-20 1 1 Operating system: Windows Server 2 008 Operating syst em : Windows Server 2003 will add t o the same group all the m achines whose operating system is W indows 20 00 OR Windows 200 3. b) Entries of different criteria are c ombined by logical multipli cation (AND) For example, consider the fo l lowing [...]
-
Страница 311
311 Copyr i ght © Acronis , In c., 2000-20 1 1 A registered machin e has to be specified by its registration address, that is, you need t o provide exactly t he same host name, full y qualified domain na me (FQDN), or I P address as was specified when th e machine was i nitially added t o the management server. Otherwise, the machine will not be a[...]
-
Страница 312
312 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do View deta i ls of a backup plan Click Det a ils . In the Backup plans and tasks window, exa mine all infor m ati on related to the selected ba ckup plan. View log o f a back up plan Click Log . The Log vie w wil l display a list of the l og ent r ies related to the selected backu p plan. Run a b[...]
-
Страница 313
313 Copyr i ght © Acronis , In c., 2000-20 1 1 Adding a virtu al machine as a virtual machi n e On Ac ronis Backup & Recovery 11 Management Server, a machine is considered virtual i f it c an be backed up from t he virtualization host without inst alli ng an agent on the machine. This is po ssi ble when using th e Acronis Backup & Recovery[...]
-
Страница 314
314 Copyr i ght © Acronis , In c., 2000-20 1 1 To review detailed informat i on on the sel ected plan (task), use t he information panel at the bott om of the wi ndow. The pan el is collapsed by defaul t. To expand the panel, c l ick the arrow mark ( ). The con tent of the panel is also duplicat ed in the Plan details (p. 267 ) and Task detail[...]
-
Страница 315
315 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Edit a plan/tas k Click Edi t . Centralized backup pla n The editing of centra lized backu p plans is performe d in th e same way as creating . Once the plan is ed ited, the m ana g ement serv er updates the plan on all machin es the plan was deployed to . Task The editing of tasks is performe d[...]
-
Страница 316
316 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 3 . 6 L i c e n s e s The L icenses view enables you to m anage licenses stored on Acronis Lic ense Server. The l icense server can be either integrated with A cronis Backup & Recovery 11 Management Server, or installed as a separat e component . Acces sing the Licenses view To access the Li[...]
-
Страница 317
317 Copyr i ght © Acronis , In c., 2000-20 1 1 3. In the Acti on s menu, sel ect C h ange licens e server . 4. Specify th e name or IP address of the machine with th e license server . 5. Click OK . After ch ang ing the license server, the management server deploys the new license server's IP address to the registered mac hines and they st ar[...]
-
Страница 318
318 Copyr i ght © Acronis , In c., 2000-20 1 1 LicenseServerCmdLine .exe supports t he followi ng para meters: --status <IP -ad dress or ho stname> Displays the t otal number of l icenses and t he number of available licenses for eac h Acronis produc t. --import <IP -ad dress or ho stname> <l icense key > Adds a new l icense key [...]
-
Страница 319
319 Copyr i ght © Acronis , In c., 2000-20 1 1 A predefined report template is preset so that you can generate a repo rt with one click. To start generating a report , select a report template in the Repo rts view, an d then c l ick Generate on the toolbar. The repo rt will con tain the information sel ected, grouped and sorted a ccording to th e [...]
-
Страница 320
320 Copyr i ght © Acronis , In c., 2000-20 1 1 Origin : The types of origin of t he ba ckup plans Local and/or Ce n tralized . Machines : The list of machines on which the backup plans exis t. Backed up data ty pe : Th e types of backed up data Machines/Disks/Volum es and/or Files . Deployment state : The deployment stat es[...]
-
Страница 321
321 Copyr i ght © Acronis , In c., 2000-20 1 1 Select whet her to show all items in a sing l e table or to group them by a particular column. Specify which table columns to show, and in which order. Specify how to sort the table. 11 .3. 7.4 R ep ort ab out th e a rch ive s a nd b ac kup s In this view, you can generate a report about t[...]
-
Страница 322
322 Copyr i ght © Acronis , In c., 2000-20 1 1 With th e default filter settings, the report includes informat ion about all centralized manage d vaults plus the combined total. Report view Under Report view , choose ho w the report will look: Specify which table columns to show, and in which order. Select which diag rams to i nclude in t [...]
-
Страница 323
323 Copyr i ght © Acronis , In c., 2000-20 1 1 11 .3. 7.8 R ep ort v iew In order fo r your web bro wse r to correct ly display dates and other information i n generated repo rts , enable act i ve cont ent (JavaScript). You can all ow act i ve cont ent to run t emporar i ly for t he currently displayed webpa ge, or enable i t permanent l y. To all[...]
-
Страница 324
324 Copyr i ght © Acronis , In c., 2000-20 1 1 To export en tire table cont en ts to a *.txt or *.csv file, click Save all to fil e . Alerts view on the management s erver When th e console is connect ed to the management server, the Alerts view displays a l erts c ol lected from bot h the registered machines and t he management server. Alerts col[...]
-
Страница 325
325 Copyr i ght © Acronis , In c., 2000-20 1 1 To Do Select a s i ngle a c tivity Select Activi t ies in the Dis play drop-down list and click an a cti vity. The Informa t ion pane wi l l show l og ent r ies for the se lected activ i ty. Select a s i ngle log entry Click on it. Select m ultiple lo g entries non-contig u ous : ho ld down C TRL [...]
-
Страница 326
326 Copyr i ght © Acronis , In c., 2000-20 1 1 To copy the d etail s, c l ick the Copy to clipboard button . Log entry data fields A log entry c ontains the fo l lowing data fields: Type - Type o f event (Error; Warning; I nformation). Date and time - Date and time when t he event took place. Backup plan - T he backup plan t he event r[...]
-
Страница 327
327 Copyr i ght © Acronis , In c., 2000-20 1 1 You al so have t he abili ty to delete proxies from th e list. Please keep i n mind th at an y chan ge to this option affects the entire management server. If you de lete a proxy from the list, the Wake - On -LAN funct i onality in the corresponding subnet wi ll be disabl ed for all cent ral ized back[...]
-
Страница 328
328 Copyr i ght © Acronis , In c., 2000-20 1 1 The alert i s displayed in the Ale rts sec tion of the Dashbo ard . When t he console is c onnected to the management serv er, t hi s sett i ng will also c ontrol the color scheme o f the Last c onnect column's value for eac h machine. 11 .3. 10.3 Do main a cce ss cre den tia ls This opt i on det[...]
-
Страница 329
329 Copyr i ght © Acronis , In c., 2000-20 1 1 This opt i on enables you to specify when and how ofte n to recei ve notificat i ons about t he certain types of al erts. The preset is: Disabled . Note: Before configurin g alert notificat ions, specify the SMT P server settings in t h e E-mail n oti ficat ions (p . 273 ). To con fig ur e a le rt no [...]
-
Страница 330
330 Copyr i ght © Acronis , In c., 2000-20 1 1 To disable this opt i on, clear t he Log events check box. S NMP not ifi cat ion s This opt i on defines whet her the management server h as to send it s own log events t o the specified Simple Network Management Protoc ol (SNMP) manag ers. You can choose the t y pes of events t o be sent. For det ai [...]
-
Страница 331
331 Copyr i ght © Acronis , In c., 2000-20 1 1 The preset is: Maximum log si ze: 1 GB . On cleanup , keep 95% of the maximum log size . When th e option is enabled, the program compares the act ual log size with the maximum size aft er every 100 l og entries. On ce t h e maximum log size is ex ceeded, t he pr ogram deletes th e oldest log entries.[...]
-
Страница 332
332 Copyr i ght © Acronis , In c., 2000-20 1 1 1 1 . 4 . 1 P a r a m e t e r s s e t t h r o u g h a d m i n i s t r a t i v e t e m p l a t e The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 component s that can be set by using Acronis Adm i nistrative Template. For informatio n on how to apply the administrative template[...]
-
Страница 333
333 Copyr i ght © Acronis , In c., 2000-20 1 1 http :// msdn2.microsoft.c om/en-us/library/aa374 177.aspx 11 .4. 1.2 Ac ron is Ba ckup & Re cov ery 11 Ag ent f or Wind ow s The fo l lowing are the paramet ers of Ac ronis Backup & Recovery 1 1 Agent that can be set by using Acronis Administrat iv e Temp la te. Lice n sing Specifies how o ft[...]
-
Страница 334
334 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 11 will cont i nue working with full func tionali ty for the number of days specified in Maximum T ime W ithout License S erver , as count ed fr om the m oment o f installation or from the last successful check. [...]
-
Страница 335
335 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: 0 (Internal event), 1 (Debugging information), 2 (Information), 3 (Warning), 4 (Error), or 5 (Critical error) Default value: 4 (only errors and critical errors will be sent if Trace State is set t o True ) SNMP Specifies the types of the ag ent's events to send notificat i on[...]
-
Страница 336
336 Copyr i ght © Acronis , In c., 2000-20 1 1 An empty st ri ng means the folder %AllUsersProfile%Application DataAcron isBackupAndRecovery MMS Temp. You can specify a l ocal folder on any volume, including a volume you are bac king up. Snapshot St o rage Absolu te Size Description: Specifi es the i nitial size of the snapshot storage, in me[...]
-
Страница 337
337 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the password for aut hen tication wi th t he proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Important. The password can be viewed by any user w ho has access to the admi nistrative template, such as to an administrator of the [...]
-
Страница 338
338 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es whether to record Acronis Bac ku p & Rec overy 11 Management Serve r's events into the event log. Possible values: T rue or Fa lse Default value: Fal se Trace Le v el Description: Specifi es the m inimum level o f severi ty of ev ents t o be recorded into the ev ent lo[...]
-
Страница 339
339 Copyr i ght © Acronis , In c., 2000-20 1 1 Default value: 200 If the t otal number of online registered machines d oes not exceed the value in Maximum Con nections , c onnections to those m achines are always kept , and the management serv er periodical l y performs sync hronization wi th eac h machine. Otherwise, i t c onnects to a number o f[...]
-
Страница 340
340 Copyr i ght © Acronis , In c., 2000-20 1 1 Possible values: T rue or Fa lse Default value: Fal se By default, Acronis Backup & Recovery 11 Management Server c onnec ts t o registered machines to perform synchronizat i on in particular, t o retrieve data such as backup l ogs. This appro ach is known as a po l ling mechanism . If Real Ti[...]
-
Страница 341
341 Copyr i ght © Acronis , In c., 2000-20 1 1 Specifies the l ocation and initial size of the snapshot storage a temporary file that i s used when backing up data by taking a snapsho t. This file is delete d as soon as the backup is c omplete. With th e default settings, t he snapshot st orage is created in t he temporary files folder of the [...]
-
Страница 342
342 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the name or IP address of the proxy server Possible values: A ny string 0 to 32765 ch aracters long Default value: E mpty string Proxy Ser v er P ort Description: Specifi es the port number o f the proxy server Possible values: A ny integer number between 0 and 65 535 Default v[...]
-
Страница 343
343 Copyr i ght © Acronis , In c., 2000-20 1 1 The c omponent wil l use the default settings, whic h is to use encryption if possible and to trust sel f-signed SSL c ertifi cates (se e the foll owing option). Enabled Enc ryption is enab l ed. In Encryption , select one of the foll owing: Enabled Data transfer will be enc rypted if encrypt i on is [...]
-
Страница 344
344 Copyr i ght © Acronis , In c., 2000-20 1 1 Disabled Enc ryption is disabled; any connection t o a client ap pl ication which requires encryption will not be established. Required Data transfer will be perfo rm ed only if enc ryption is enabled on the client application (see "Client Enc ryption options" ); it will be encrypt ed. Authe[...]
-
Страница 345
345 Copyr i ght © Acronis , In c., 2000-20 1 1 Description: Specifi es the minimum sever i ty level o f events to b e recorded in the file. Only events of levels great er than or equal to File Trace Mi n imal Level will be recorded. Possible values: A ny severity l evel from Unkn o wn throu g h Cri tical , or Blocked to not record any events Defau[...]
-
Страница 346
346 Copyr i ght © Acronis , In c., 2000-20 1 1 12 On lin e bac kup This sect i on pro v ides details about using the Acronis Backup & Recovery Online service. T his service enables you t o do online backups t o Acronis Online Backup St orage. Acr o nis Backup & Rec o very On line might be un a vailable in y ou r region. To find m ore info [...]
-
Страница 347
347 Copyr i ght © Acronis , In c., 2000-20 1 1 directly from the o nl ine storage. Files c an be recovered from disk -lev el bac kups as well as from file-level bac kups. For informat i on abou t backing up v irtual machines see "How to back up virtual machines to the online storage? (p. 347 )" 1 2 . 1 . 3 H o w l o n g w i l l m y b a c[...]
-
Страница 348
348 Copyr i ght © Acronis , In c., 2000-20 1 1 Install Acronis software into the guest syst e m The mac hi ne will be treated as a physical one. Y ou wil l need a separa te server or workst ation subscription for this machine. This app roach comes in handy when: the mac hi ne is not hos ted o n a virtualization server the virtualization pr[...]
-
Страница 349
349 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 6.5 W hat ha ppen s if I ru n out of spa ce? When a mac hi ne's bac kups are about to exceed the storage space allowed by its subsc ri ption, you receive an e-mail n otification wi th an al ert. In addition, you can see this alert on t he account management web page near the m achine. This[...]
-
Страница 350
350 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 7.3 Is I niti al S eedi ng a pa id s ervi ce? Ye s, you need to buy one Initial Seeding l icense per ma chine. 12 .1. 7.4 W hat typ es of h ard dri ve can I us e f or Ini tia l S eedi ng? Acronis ac cepts hard disk drives of t he followi ng interf ace types: I DE, ATA, SA TA, USB connected driv[...]
-
Страница 351
351 Copyr i ght © Acronis , In c., 2000-20 1 1 In Backup scheme , select Initial seeding . Specify t he s aid media as the b ackup destination. [Opt i onal, bu t strongly recommended] Enable backup encryption in Backup options > Archive protec tion . The bac kup starts immediately after you click the fi nal OK . 5. [Opt i onal] If you w[...]
-
Страница 352
352 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 1 Delicately remo v e your hard di sk drive from t he machine. S tep 2 Place the hard drive into an anti -static bag to pro tect the drive from electrostat ic discharge. If y ou do not have an anti-static bag, si mply wrap the hard drive into aluminum foil. S tep 3 Use a sturdy box that is at l [...]
-
Страница 353
353 Copyr i ght © Acronis , In c., 2000-20 1 1 S tep 4 Choose the transport company t hat you will use for shi pping. On that company's web si te, prepare and print two prepaid shipping labels: 1. Shipping l abel for se nding your hard driv e. T his label is pl aced o n the top of the box. Y ou should send your package to one of the A cronis [...]
-
Страница 354
354 Copyr i ght © Acronis , In c., 2000-20 1 1 An order w a s cr eated The backup is about t o start and t he license cannot be used for the same or any other machine. From t his point on, you can cancel th e order if something goes wron g . This will return the license to the po ol of available licenses. A full backup h a s s tarted ?[...]
-
Страница 355
355 Copyr i ght © Acronis , In c., 2000-20 1 1 Onc e you o r der Large Scale Rec overy for a par ticular machine, Ac ronis sends yo u a USB hard disk drive with all of t he bac kups made from t his machine. You can recover data directly fro m the di sk or copy the backups to a local or network folder. 12 .1. 8.2 W hy w oul d I us e Lar ge Scal e R[...]
-
Страница 356
356 Copyr i ght © Acronis , In c., 2000-20 1 1 can cancel the o rder if something goes wrong. This will return t he l icense to t he pool of available licenses. The order i s being process ed - Order processing in t he datacent er s tarted. Writing data Your backups are b ei ng written o nto the media. From this p oi nt o n, you cannot[...]
-
Страница 357
357 Copyr i ght © Acronis , In c., 2000-20 1 1 If you purc hased your subscriptions o nl ine using the Ac ronis Web site, t hey are available immediate ly on your ac count management Web page. The newl y o btained subscriptions are li sted at the Man age Subscriptions tab . 12 .1. 9.3 W hen do es my sub scri pti on be gin? Your subscription begins[...]
-
Страница 358
358 Copyr i ght © Acronis , In c., 2000-20 1 1 W hat doe s " Aut o- rene w" mean? Auto-renewal means t hat when th e curren t subscription expires, t he next subscription will be automat i cally selected from the available subscript ions. The n ext subscription must be ident i cal to the c urrent subscription. If an identical subscriptio[...]
-
Страница 359
359 Copyr i ght © Acronis , In c., 2000-20 1 1 12 .1. 9.8 Ca n I r evo ke a su bsc rip ti on f ro m a machi n e? You cann ot retur n an activated subscription to th e list of av ailable subsc ri ptions, but you can reassig n (p. 361 ) it to a di fferent mac hi ne in Acro ni s Backup & R ecovery 11 GUI . 12 .1. 9.9 Ca n I canc el my sub scri pt[...]
-
Страница 360
360 Copyr i ght © Acronis , In c., 2000-20 1 1 Windows Server 20 08/2008 R2 (x64) with Hy per- V. Microsoft Hyper-V Server 2008 / 2008 R2 . If your bac kups are likely to exceed the storage quota f or this type of subscription, you may want to use a sub scription with larger storage quota. For example, you c an use a server subscription or[...]
-
Страница 361
361 Copyr i ght © Acronis , In c., 2000-20 1 1 To act iv ate s ubs cri pt io n s 1. Connect the console to the management server. 2. In the Acti on s pane, click Activate online backu p subsc riptions . 3. Specify th e credentials to l og in to the onli ne storage. 4. Select t he machine and then c l ick Select s u bscription . 5. From Available s[...]
-
Страница 362
362 Copyr i ght © Acronis , In c., 2000-20 1 1 Depending on your settings, t his backup wil l be either fu l l or incremental. But its size is not l ikely to be less than a full backup size. T herefore, it is not practical to reassi gn a subsc ri ption t o a machine whose first backup was done as an initial seeding. You wi ll need to either redo t[...]
-
Страница 363
363 Copyr i ght © Acronis , In c., 2000-20 1 1 To con fig ur e p ro xy se tti ng s f or an ag en t 1. Connect the console to the mac hi ne for whi ch you want to c onfig ure proxy set tings. 2. In the Opti o ns menu, l ocated on the toolbar, click Machine options . 3. Click Online b ackup prox y . 4. Enter the proxy server settings. For detailed i[...]
-
Страница 364
364 Copyr i ght © Acronis , In c., 2000-20 1 1 Backup and recovery options Some bac kup and recovery options are not supported by online backups. For example, Backup splitting (p. 101 ). By using the Backup perf ormance > Network con nection speed opt ion, you can vary the tran sferri ng speed as kilobytes p er second, but not as a per centage.[...]
-
Страница 365
365 Copyr i ght © Acronis , In c., 2000-20 1 1 Permission for a machine to use an extra service of Ac r onis Backup & Recovery Online. You can buy Initial Seeding lic enses and/or Large Scale Recovery licenses . Reassign a subs cription Assign a sub scription that is already ac tivated, to a d iffe rent mach i ne. Registration code A charac te[...]
-
Страница 366
366 Copyr i ght © Acronis , In c., 2000-20 1 1 13 G los sary A Ac ron is A c t ive Re stor e The Acro ni s proprietary technology that brings a system online immediately aft er the system recovery is st arted. The system b oots fr om the backup (p. 372 ) and the m achine bec omes operational an d ready t o provide necessary services. T he data req[...]
-
Страница 367
367 Copyr i ght © Acronis , In c., 2000-20 1 1 Ac ron is Uni ve rsa l R est ore The Acro ni s proprietary technology that helps b oot up Windows or Linux on dissimilar hardware o r a virtual machine . Universal Restore handles differences in devices that are critical fo r the operat i ng system start -up, su ch as storage c ontrollers, motherboard[...]
-
Страница 368
368 Copyr i ght © Acronis , In c., 2000-20 1 1 B ack up opti on s Configuration parameters of a backup o peration (p. 3 6 7), suc h as pre/post backup commands, maximum net work bandwidth all otted for the backup stream o r data compression level. Backup options are a part of a backup pl an (p. 368). B ack up p la n (P lan ) A set o f rules th at [...]
-
Страница 369
369 Copyr i ght © Acronis , In c., 2000-20 1 1 B oota bl e medi a A physical med i a (CD, D VD, USB flash drive o r ot her m edia supported by a machine (p. 375 ) as a bo ot device) that contains the bootable agent (p. 368 ) or Windows Preinstallat ion Environment (Wi nPE) (p. 379 ) with t he Acr onis Plug-i n for Wi nPE (p. 366 ). A machine c an [...]
-
Страница 370
370 Copyr i ght © Acronis , In c., 2000-20 1 1 creating and managi ng centralized vau lts (p. 370 ) for storing archives managing sto rage nodes (p. 378 ) monitoring act i vities of the Acronis Bac kup & Reco v ery 11 compo nents, creating report s, viewing the c entralized log and more. Ce ntr al iz e d ta sk A t ask (p. 378 ) pro[...]
-
Страница 371
371 Copyr i ght © Acronis , In c., 2000-20 1 1 Consolidation m i ght be n ee ded when deleting backups , either manu al ly or during cleanup (p. 370 ) . For example, the retention rul es require to delete a ful l bac kup (p. 374 ) that has expired b ut retain the next incremental (p. 375 ) one. The backup s wil l be combined i nto a si ngle full b[...]
-
Страница 372
372 Copyr i ght © Acronis , In c., 2000-20 1 1 viewing the st ate, progress and properties of the centrali zed tasks (p. 370 ) exi sting on t he machine viewing and manag i ng the l og of t he agent's operat ions disk management operations, suc h as clone a disk, create volume, c onvert volume. A kind of d i rect management i s pe[...]
-
Страница 373
37 3 Cop yright © Acr o nis, In c., 200 0 -2011 D ynam ic dis k A hard disk managed by Logical Disk Manager (LD M) that i s available in Windows st arting with Windows 200 0. LDM helps flexibly allocate v olumes o n a storage device for bet ter fault t ol erance, better performance or larger volume size. A dynamic disk c a n use either the master [...]
-
Страница 374
374 Copyr i ght © Acronis , In c., 2000-20 1 1 D ynam ic vol um e Any volume loc ated on dynamic d isks (p. 372 ), or more precisely, on a d isk group (p. 372 ). Dynamic volumes can spa n multiple disks. Dynam ic volumes are usually configured depending on the desired goal: to increase th e volume size (a span ned volume) to reduce the acc[...]
-
Страница 375
375 Copyr i ght © Acronis , In c., 2000-20 1 1 I Im ag e The same as Disk backup (p. 372). In cr eme nta l ba cku p A bac kup (p. 367 ) that stores changes to the data ag ainst t he latest bac kup. You need ac cess to ot her backups from the same arch ive (p. 367 ) to res tore data from an i ncremental bac kup. In de xing An act i vity (p. 367 ) p[...]
-
Страница 376
376 Copyr i ght © Acronis , In c., 2000-20 1 1 M Ma ch ine A physical or v irtual comput er uniquely identified by an operat i ng system installation . Machines with multiple op erating systems (mu lti -boot syst em s) are c onsidered as multipl e machines. Ma nag ed ma chin e A mac hine (p. 375 ), either physical or virtual, where at l east one A[...]
-
Страница 377
377 Copyr i ght © Acronis , In c., 2000-20 1 1 P Pe rs ona l va ult A local or networked vault (p. 379 ) created using direct managem ent (p. 371 ). On ce a personal vault is created, a shortcut to it appears on the managed machine i n the Vaults list. Multiple machines c an use the same physical location; for exampl e, a network share; as a perso[...]
-
Страница 378
378 Copyr i ght © Acronis , In c., 2000-20 1 1 S S tat ic gr o u p A group of machines which a management server (p. 376 ) ad ministrator po pulates by manually adding machines t o the group. A mac hi ne remains in a static group until the administrator rem oves it from th e group or from the m anagement server. S to rage n o de (A cr oni s Ba cku[...]
-
Страница 379
379 Copyr i ght © Acronis , In c., 2000-20 1 1 Validation of a fil e backup i mitates reco v ery of all fi l es from the bac kup to a dummy destinat i on. Validation of a disk backup c al culates a chec ksum for ev ery data bl ock saved in th e backup . Both procedu res are resource-intensive. While the suc cessful vali dation means a high probab [...]