User's Guide Acronis® Backup & Recovery™ 10 Workstation
10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac
100 Copyright © Acronis, Inc., 2000-2010 Otherwise, see 2 following: Remove the reason of the failure -> [optionally] Start the failed task m
Copyright © Acronis, Inc., 2000-2010 101 The user can stop a running task or a task that needs interaction. The task changes to the Stopping state
102 Copyright © Acronis, Inc., 2000-2010 6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guidelin
Copyright © Acronis, Inc., 2000-2010 103 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all
104 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p
Copyright © Acronis, Inc., 2000-2010 105 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos
106 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
Copyright © Acronis, Inc., 2000-2010 107 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove
108 Copyright © Acronis, Inc., 2000-2010 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i
Copyright © Acronis, Inc., 2000-2010 109 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m
Copyright © Acronis, Inc., 2000-2010 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
110 Copyright © Acronis, Inc., 2000-2010 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click
Copyright © Acronis, Inc., 2000-2010 111 6.1.3.3 Log entry details Displays detailed information on the log entry you have selected and lets you c
112 Copyright © Acronis, Inc., 2000-2010 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo
Copyright © Acronis, Inc., 2000-2010 113 After any of the settings is changed against the default value, a new line that displays the newly set val
114 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following: Run under the current user The tasks will run u
Copyright © Acronis, Inc., 2000-2010 115 6.2.4.1 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for th
116 Copyright © Acronis, Inc., 2000-2010 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going
Copyright © Acronis, Inc., 2000-2010 117 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.
118 Copyright © Acronis, Inc., 2000-2010 3. Naming the new archive Once you select the archive destination, the program generates a name for the ne
Copyright © Acronis, Inc., 2000-2010 119 Warning: According to the original FTP specification, credentials required for access to FTP servers are t
12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
120 Copyright © Acronis, Inc., 2000-2010 6.2.9.3 Simple scheme With the simple backup scheme you just schedule when and how often to back up data
Copyright © Acronis, Inc., 2000-2010 121 Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies
122 Copyright © Acronis, Inc., 2000-2010 available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be
Copyright © Acronis, Inc., 2000-2010 123 Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly
124 Copyright © Acronis, Inc., 2000-2010 Example Schedule parameters are set as follows Recur: Every 1 day Frequency: Once at 6 PM Number of
Copyright © Acronis, Inc., 2000-2010 125 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Sin
126 Copyright © Acronis, Inc., 2000-2010 The archive will be cleaned up only during backup and only if there is not enough space to create a new ba
Copyright © Acronis, Inc., 2000-2010 127 By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it
128 Copyright © Acronis, Inc., 2000-2010 Incremental backup, runs manually Differential backup, runs manually You can run any of these backup
Copyright © Acronis, Inc., 2000-2010 129 6.2.11.2 Selecting a host that will perform conversion Specify the machine that will perform the conversi
Copyright © Acronis, Inc., 2000-2010 13 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron
130 Copyright © Acronis, Inc., 2000-2010 6.3 Recovering data When it comes to data recovery, first consider the most functional method: connect th
Copyright © Acronis, Inc., 2000-2010 131 Content (p. 133) Select the backup and content to be recovered. Access credentials (p. 134) [Optional] Pro
132 Copyright © Acronis, Inc., 2000-2010 [Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery
Copyright © Acronis, Inc., 2000-2010 133 If the archive is stored on a network share, expand the Network folders group, then select the required
134 Copyright © Acronis, Inc., 2000-2010 Selecting an MBR You will usually select the disk's MBR if: The operating system cannot boot Th
Copyright © Acronis, Inc., 2000-2010 135 According to the original FTP specification, credentials required for access to FTP servers are transferre
136 Copyright © Acronis, Inc., 2000-2010 Disk destination To specify a destination disk: 1. Select a disk where you want the selected disk to reco
Copyright © Acronis, Inc., 2000-2010 137 The selected volumes will be recovered to the physical disks of the machine the console is connected to. O
138 Copyright © Acronis, Inc., 2000-2010 2. Click OK. All the data stored on the target volume will be replaced by the backed up data, so be caref
Copyright © Acronis, Inc., 2000-2010 139 volume to a volume that exceeds that limit, without changing the file system. It would make sense here to
14 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil
140 Copyright © Acronis, Inc., 2000-2010 Disks Initial setting: the number and size of the source machine's disks. The number of disks is gene
Copyright © Acronis, Inc., 2000-2010 141 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.
142 Copyright © Acronis, Inc., 2000-2010 Recover now - the recovery task will be started immediately after you click the final OK. Recover la
Copyright © Acronis, Inc., 2000-2010 143 specified locations, it will specify the problem device and ask for a disc or a network path to the driver
144 Copyright © Acronis, Inc., 2000-2010 Click Recover to open the Recover data page. Start creating a recovery task as described in "Recov
Copyright © Acronis, Inc., 2000-2010 145 The system was recovered on dissimilar hardware and the new hardware is incompatible with the most crit
146 Copyright © Acronis, Inc., 2000-2010 6.3.11.1 How to reactivate GRUB and change its configuration Generally, you should refer to the boot load
Copyright © Acronis, Inc., 2000-2010 147 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first disk, run the
148 Copyright © Acronis, Inc., 2000-2010 Different ways to create a validation task Using the Validation page is the most general way to create a v
Copyright © Acronis, Inc., 2000-2010 149 Use the following credentials The task will always run under the credentials you specify, whether start
Copyright © Acronis, Inc., 2000-2010 15 XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di
150 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o
Copyright © Acronis, Inc., 2000-2010 151 The program will access the location using the credentials you specify. Use this option if the task accoun
152 Copyright © Acronis, Inc., 2000-2010 Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med
Copyright © Acronis, Inc., 2000-2010 153 According to the original FTP specification, credentials required for access to FTP servers are transferre
154 Copyright © Acronis, Inc., 2000-2010 Read only - enables exploring and opening files within the backup without committing any changes. Re
Copyright © Acronis, Inc., 2000-2010 155 Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, wr
156 Copyright © Acronis, Inc., 2000-2010 Once the export task is completed, you can run it again at any time. Before doing so, delete the archive t
Copyright © Acronis, Inc., 2000-2010 157 To specify credentials 1. Select one of the following: Run under the current user The task will run un
158 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre
Copyright © Acronis, Inc., 2000-2010 159 1. Selecting the export destination Enter the full path to the destination in the Path field, or select t
16 Copyright © Acronis, Inc., 2000-2010 1.7 Technical support As part of a purchased annual Support charge you are entitled to Technical Support a
160 Copyright © Acronis, Inc., 2000-2010 6.7.6 Access credentials for destination Specify credentials required for access to the location where th
Copyright © Acronis, Inc., 2000-2010 161 [Optional] Protect the Acronis Secure Zone from unauthorized access with a password. The prompt for the pa
162 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi
Copyright © Acronis, Inc., 2000-2010 163 dragging the slider and selecting any size between the current and maximum values. The maximum size is
164 Copyright © Acronis, Inc., 2000-2010 Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…" (if you
Copyright © Acronis, Inc., 2000-2010 165 Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent base
166 Copyright © Acronis, Inc., 2000-2010 Windows Vista SP1 and Windows Server 2008 (PE 2.1) Windows 7 (PE 3.0) If you already have media with
Copyright © Acronis, Inc., 2000-2010 167 3. [optional] The timeout interval for the boot menu plus the component that will automatically start on
168 Copyright © Acronis, Inc., 2000-2010 Prompts for the video mode to be used by the bootable media's graphical user interface. Without the v
Copyright © Acronis, Inc., 2000-2010 169 Uses PCI BIOS calls to get the interrupt routing table. You may want to use this parameter if the kernel i
Copyright © Acronis, Inc., 2000-2010 17 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst
170 Copyright © Acronis, Inc., 2000-2010 Network port While creating bootable media, you have an option to pre-configure the network port that the
Copyright © Acronis, Inc., 2000-2010 171 Windows PE 2004 (1.5) (Windows XP Professional with Service Pack 2) Windows PE 2005 (1.6) (Windows S
172 Copyright © Acronis, Inc., 2000-2010 4. [optional] Specify Windows drivers to be added to Windows PE. Once you boot a machine into Windows PE,
Copyright © Acronis, Inc., 2000-2010 173 Once the machine boots into the Bart PE and you configure the network connection, select Go -> System -
174 Copyright © Acronis, Inc., 2000-2010 1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then pr
Copyright © Acronis, Inc., 2000-2010 175 Acronis command line utilities acronis asamba lash restoreraids trueimagecmd trueimagemn
176 Copyright © Acronis, Inc., 2000-2010 hexdump readcd hotplug reboot 6.10.5 Recovering MD devices and logical volumes To recover Linux Softw
Copyright © Acronis, Inc., 2000-2010 177 6. Click Recover, then specify the path to the archive and any other required parameters, and then click
178 Copyright © Acronis, Inc., 2000-2010 The following picture illustrates this configuration. Do the following to recover data from this archive.
Copyright © Acronis, Inc., 2000-2010 179 3. In Backup, click Change and then select the backup from which you want to recover data. 4. In Data ty
18 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
180 Copyright © Acronis, Inc., 2000-2010 All operations on disks and volumes involve a certain risk of data damage. Operations on system, bootable
Copyright © Acronis, Inc., 2000-2010 181 machine. (It is also possible that this volume will have the same letter E: under any Windows OS installed
182 Copyright © Acronis, Inc., 2000-2010 Disk conversion: GPT to MBR (p. 185) - converts a GPT partition table to MBR Disk conversion: Basic
Copyright © Acronis, Inc., 2000-2010 183 3. Select a cloning method and specify advanced options. The new volume structure will be graphically rep
184 Copyright © Acronis, Inc., 2000-2010 MBR disk record. But two disks with the same NT signature cannot work properly under one operating system.
Copyright © Acronis, Inc., 2000-2010 185 Please note: A GPT-partitioned disk reserves the space in the end of the partitioned area necessary for th
186 Copyright © Acronis, Inc., 2000-2010 3. If you click OK in this warning window, the conversion will be performed immediately and if necessary,
Copyright © Acronis, Inc., 2000-2010 187 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynami
188 Copyright © Acronis, Inc., 2000-2010 Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk man
Copyright © Acronis, Inc., 2000-2010 189 A fault-tolerant volume, also sometimes called RAID 1+0, combining the advantage of the high I/O speed of
Copyright © Acronis, Inc., 2000-2010 19 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
190 Copyright © Acronis, Inc., 2000-2010 Select a destination disk and specify the unallocated space to create the basic volume on. To create a
Copyright © Acronis, Inc., 2000-2010 191 The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the volume size
192 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commit (p. 194) it. Exiting the program without committing
Copyright © Acronis, Inc., 2000-2010 193 6.11.6.5 Change volume label The volume label is an optional attribute. It is a name assigned to a volume
194 Copyright © Acronis, Inc., 2000-2010 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the
Copyright © Acronis, Inc., 2000-2010 195 7 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi
196 Copyright © Acronis, Inc., 2000-2010 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e
Copyright © Acronis, Inc., 2000-2010 197 Backup options Configuration parameters of a backup operation (p. 196), such as pre/post backup commands,
198 Copyright © Acronis, Inc., 2000-2010 5. On each machine, the agent installed on the machine creates a backup plan (p. 197) using other rules s
Copyright © Acronis, Inc., 2000-2010 199 built-in group except for deleting the machine from the management server. Virtual machines are deleted as
Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
200 Copyright © Acronis, Inc., 2000-2010 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 197) that produc
Copyright © Acronis, Inc., 2000-2010 201 operations are configured on the management server (p. 205) and propagated by the server to the managed ma
202 Copyright © Acronis, Inc., 2000-2010 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with
Copyright © Acronis, Inc., 2000-2010 203 Dynamic volume Any volume located on dynamic disks (p. 202), or more precisely, on a disk group (p. 201)
204 Copyright © Acronis, Inc., 2000-2010 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 198) aimed to maintain the optimal balance bet
Copyright © Acronis, Inc., 2000-2010 205 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n
206 Copyright © Acronis, Inc., 2000-2010 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi
Copyright © Acronis, Inc., 2000-2010 207 Since the cleanup schedule exists on the machine (p. 204) the agent (p. 195) resides on, and therefore use
208 Copyright © Acronis, Inc., 2000-2010 the image being recovered is located in Acronis Secure Zone (p. 195) or when using Acronis Active Re
Copyright © Acronis, Inc., 2000-2010 209 Windows Server 2003 with Service Pack 1 (PE 1.6) Windows Vista (PE 2.0) Windows Vista SP1 and Win
Copyright © Acronis, Inc., 2000-2010 21 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
8 Index A About Windows loaders • 147 Access credentials • 152, 153 Access credentials for archive location • 112, 118 Access credentials for desti
Copyright © Acronis, Inc., 2000-2010 211 Bootability troubleshooting • 144 Bootable agent • 38, 163, 195, 198 Bootable media • 14, 17, 62, 97, 130,
212 Copyright © Acronis, Inc., 2000-2010 Disks • 131, 135 Disks/volumes selection • 133 Drivers for Universal Restore • 167, 170 Dual destination •
Copyright © Acronis, Inc., 2000-2010 213 Managed machine • 7, 17, 43, 195, 197, 199, 200, 204, 206, 207 Managed vault • 200, 203, 204, 206, 207, 20
214 Copyright © Acronis, Inc., 2000-2010 Selecting a host that will perform conversion • 113, 129 Selecting disks and volumes • 115 Selecting files
Copyright © Acronis, Inc., 2000-2010 215 Virtual machine type / virtualization server selection • 135, 137, 139 Volume destination • 135, 137 Volum
22 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
Copyright © Acronis, Inc., 2000-2010 23 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Crea
24 Copyright © Acronis, Inc., 2000-2010 a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the warni
Copyright © Acronis, Inc., 2000-2010 25 GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme.
26 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday A
Copyright © Acronis, Inc., 2000-2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday
28 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at
Copyright © Acronis, Inc., 2000-2010 29 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow
Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 6 1.1
30 Copyright © Acronis, Inc., 2000-2010 the scheme forces every backup level to keep only the most recent backup, other backups from the level h
Copyright © Acronis, Inc., 2000-2010 31 to this interval and deletes all backups created before that moment. None of the backups created after this
32 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel
Copyright © Acronis, Inc., 2000-2010 33 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res
34 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered over any type of existing volume to una
Copyright © Acronis, Inc., 2000-2010 35 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v
36 Copyright © Acronis, Inc., 2000-2010 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 +
Copyright © Acronis, Inc., 2000-2010 37 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
38 Copyright © Acronis, Inc., 2000-2010 mount a disk backup to copy files from the backup to a physical disk safely delete archives and backu
Copyright © Acronis, Inc., 2000-2010 39 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac
4 Vaults ... 76 4.
40 Copyright © Acronis, Inc., 2000-2010 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w
Copyright © Acronis, Inc., 2000-2010 41 Because serving requests is performed simultaneously with recovery, the system operation can slow down even
42 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph
Copyright © Acronis, Inc., 2000-2010 43 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o
44 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10
Copyright © Acronis, Inc., 2000-2010 45 All events - all events (information, warnings and errors) Errors and warnings Errors only. To dis
46 Copyright © Acronis, Inc., 2000-2010 3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine
Copyright © Acronis, Inc., 2000-2010 47 Initially the option is configured during the Acronis Backup & Recovery 10 agent installation. This set
48 Copyright © Acronis, Inc., 2000-2010 Compression level (p. 55) + + + + Backup performance: Backup priority (p. 56) + + - - HDD writing speed
Copyright © Acronis, Inc., 2000-2010 49 E-mail (p. 57) + + - - Win Pop-up (p. 58) + + - - Event tracing: Windows events log (p. 59) + + - - S
6.4.1 Task credentials ...
50 Copyright © Acronis, Inc., 2000-2010 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of it
Copyright © Acronis, Inc., 2000-2010 51 The program does not support interactive commands, i.e. commands that require user input (for example, &quo
52 Copyright © Acronis, Inc., 2000-2010 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i
Copyright © Acronis, Inc., 2000-2010 53 4. Depending on the result you want to obtain, select the appropriate options as described in the table be
54 Copyright © Acronis, Inc., 2000-2010 3.3.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows and Linu
Copyright © Acronis, Inc., 2000-2010 55 The preset is: Create snapshots using VSS Acronis Backup & Recovery 10 will select the VSS provider aut
56 Copyright © Acronis, Inc., 2000-2010 3.3.1.9 Backup performance Use this group of options to specify the amount of network and system resources
Copyright © Acronis, Inc., 2000-2010 57 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server
58 Copyright © Acronis, Inc., 2000-2010 Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types a
Copyright © Acronis, Inc., 2000-2010 59 3.3.1.11 Event tracing It is possible to duplicate log events of the backup operations, performed on the m
Copyright © Acronis, Inc., 2000-2010 6 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac
60 Copyright © Acronis, Inc., 2000-2010 Send SNMP notifications individually for backup operation events – to send the events of the backup oper
Copyright © Acronis, Inc., 2000-2010 61 When backing up to removable media (CD, DVD or a tape device locally attached to the managed machine):
62 Copyright © Acronis, Inc., 2000-2010 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.
Copyright © Acronis, Inc., 2000-2010 63 When the option is disabled, the program will display a pop-up window each time it comes across a bad secto
64 Copyright © Acronis, Inc., 2000-2010 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
Copyright © Acronis, Inc., 2000-2010 65 trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depen
66 Copyright © Acronis, Inc., 2000-2010 the prompt when scheduling a backup to removable media. Then, if the removable media is available (for exam
Copyright © Acronis, Inc., 2000-2010 67 The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information
68 Copyright © Acronis, Inc., 2000-2010 File-level security (p. 70): Recover files with their security settings - + - + Error handling (p. 73):
Copyright © Acronis, Inc., 2000-2010 69 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options: E
Copyright © Acronis, Inc., 2000-2010 7 Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the G
70 Copyright © Acronis, Inc., 2000-2010 When the check box is not selected, the command execution result does not affect the task execution failure
Copyright © Acronis, Inc., 2000-2010 71 The option enables you to receive e-mail notifications about the recovery task's successful completion
72 Copyright © Acronis, Inc., 2000-2010 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine e
Copyright © Acronis, Inc., 2000-2010 73 This option is not available when operating under the bootable media. The option defines whether the agent(
74 Copyright © Acronis, Inc., 2000-2010 For example, if the network location becomes unavailable or not reachable, the program will attempt to reac
Copyright © Acronis, Inc., 2000-2010 75 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.
Copyright © Acronis, Inc., 2000-2010 76 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is
Copyright © Acronis, Inc., 2000-2010 77 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to
78 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display
Copyright © Acronis, Inc., 2000-2010 79 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault
8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o
80 Copyright © Acronis, Inc., 2000-2010 3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree,
Copyright © Acronis, Inc., 2000-2010 81 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes
82 Copyright © Acronis, Inc., 2000-2010 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap
Copyright © Acronis, Inc., 2000-2010 83 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a
84 Copyright © Acronis, Inc., 2000-2010 What-ifs What if an event occurs (and a condition, if any, is met) while the previous task run has not c
Copyright © Acronis, Inc., 2000-2010 85 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P
86 Copyright © Acronis, Inc., 2000-2010 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.
Copyright © Acronis, Inc., 2000-2010 87 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still b
88 Copyright © Acronis, Inc., 2000-2010 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 0
Copyright © Acronis, Inc., 2000-2010 89 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every m
Copyright © Acronis, Inc., 2000-2010 9 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel
90 Copyright © Acronis, Inc., 2000-2010 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not
Copyright © Acronis, Inc., 2000-2010 91 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block
92 Copyright © Acronis, Inc., 2000-2010 To view properties of an event, including the event source and event number 1. In Event Viewer, click the
Copyright © Acronis, Inc., 2000-2010 93 Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If
94 Copyright © Acronis, Inc., 2000-2010 time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that the b
Copyright © Acronis, Inc., 2000-2010 95 (2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the user h
Copyright © Acronis, Inc., 2000-2010 96 6 Direct management This section covers operations that can be performed directly on a managed machine by
Copyright © Acronis, Inc., 2000-2010 97 Please make sure you have a valid license on Acronis License Server. working. Trial version of product exp
98 Copyright © Acronis, Inc., 2000-2010 Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warn
Copyright © Acronis, Inc., 2000-2010 99 Use the Information panel to review detailed information on the selected plan (task). The panel is colla
Kommentare zu diesen Handbüchern