ACRONIS Backup & Recovery 10 Workstation Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Backup-Wiederherstellungssoftware ACRONIS Backup & Recovery 10 Workstation herunter. Acronis Backup & Recovery 10 Workstation [en] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 215
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Workstation

User's Guide Acronis® Backup & Recovery™ 10 Workstation

Seite 2

10 Copyright © Acronis, Inc., 2000-2010 "Tools" bar Help Contains a list of help topics. Different views and action pages of Acronis Bac

Seite 3 - Table of contents

100 Copyright © Acronis, Inc., 2000-2010 Otherwise, see 2 following:  Remove the reason of the failure -> [optionally] Start the failed task m

Seite 4

Copyright © Acronis, Inc., 2000-2010 101 The user can stop a running task or a task that needs interaction. The task changes to the Stopping state

Seite 5

102 Copyright © Acronis, Inc., 2000-2010 6.1.2.2 Working with backup plans and tasks Actions on backup plans and tasks The following is a guidelin

Seite 6 - Backup & Recovery™ 10

Copyright © Acronis, Inc., 2000-2010 103 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, all

Seite 7

104 Copyright © Acronis, Inc., 2000-2010 Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p

Seite 8 - Shortcuts bar

Copyright © Acronis, Inc., 2000-2010 105 Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan&apos

Seite 9 - Actions

106 Copyright © Acronis, Inc., 2000-2010 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Seite 10 - How to expand/minimize panes

Copyright © Acronis, Inc., 2000-2010 107 Recovery (file) File and folder recovery Recovery (volume) Recovery of volumes from a disk backup Recove

Seite 11 - Action pages

108 Copyright © Acronis, Inc., 2000-2010 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i

Seite 12 - Action page - Controls

Copyright © Acronis, Inc., 2000-2010 109 6.1.3 Log The Log stores the history of operations performed by Acronis Backup & Recovery 10 on the m

Seite 13 - 1.3.1 Agent for Windows

Copyright © Acronis, Inc., 2000-2010 11 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Seite 14 - 1.4 Supported file systems

110 Copyright © Acronis, Inc., 2000-2010 Save the selected log entries to a file 1. Select a single log entry or multiple log entries. 2. Click

Seite 15 - 1.6 System requirements

Copyright © Acronis, Inc., 2000-2010 111 6.1.3.3 Log entry details Displays detailed information on the log entry you have selected and lets you c

Seite 16 - 1.7 Technical support

112 Copyright © Acronis, Inc., 2000-2010 [Optional] Type a description of the backup plan. To access this option, select the Advanced view check bo

Seite 17 - 2.1 Basic concepts

Copyright © Acronis, Inc., 2000-2010 113 After any of the settings is changed against the default value, a new line that displays the newly set val

Seite 18

114 Copyright © Acronis, Inc., 2000-2010 To specify credentials 1. Select one of the following:  Run under the current user The tasks will run u

Seite 19 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2010 115 6.2.4.1 Selecting disks and volumes To specify disks/volumes to back up 1. Select the check boxes for th

Seite 20

116 Copyright © Acronis, Inc., 2000-2010 6.2.5 Access credentials for source Specify the credentials required for access to the data you are going

Seite 21

Copyright © Acronis, Inc., 2000-2010 117 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.

Seite 22 - Differential backup

118 Copyright © Acronis, Inc., 2000-2010 3. Naming the new archive Once you select the archive destination, the program generates a name for the ne

Seite 23 - 2.4 Owners and credentials

Copyright © Acronis, Inc., 2000-2010 119 Warning: According to the original FTP specification, credentials required for access to FTP servers are t

Seite 24 - 2.5 GFS backup scheme

12 Copyright © Acronis, Inc., 2000-2010 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Seite 25 - GFS by Acronis

120 Copyright © Acronis, Inc., 2000-2010 6.2.9.3 Simple scheme With the simple backup scheme you just schedule when and how often to back up data

Seite 26 - The resulting archive: ideal

Copyright © Acronis, Inc., 2000-2010 121 Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies

Seite 27 - The resulting archive: real

122 Copyright © Acronis, Inc., 2000-2010 available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be

Seite 28 - Tower of Hanoi overview

Copyright © Acronis, Inc., 2000-2010 123  Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays, with weekly

Seite 29 - Tower of Hanoi by Acronis

124 Copyright © Acronis, Inc., 2000-2010 Example Schedule parameters are set as follows  Recur: Every 1 day  Frequency: Once at 6 PM Number of

Seite 30 - 2.7 Retention rules

Copyright © Acronis, Inc., 2000-2010 125 A new level 3 differential backup has not yet been created, so the backup of day five is still stored. Sin

Seite 31

126 Copyright © Acronis, Inc., 2000-2010 The archive will be cleaned up only during backup and only if there is not enough space to create a new ba

Seite 32 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2010 127 By default, a one-year-old full backup will not be deleted until all incremental backups that depend on it

Seite 33 - Backing up dynamic volumes

128 Copyright © Acronis, Inc., 2000-2010  Incremental backup, runs manually  Differential backup, runs manually You can run any of these backup

Seite 34 - Recovering dynamic volumes

Copyright © Acronis, Inc., 2000-2010 129 6.2.11.2 Selecting a host that will perform conversion Specify the machine that will perform the conversi

Seite 35 - 2.9 Tape support

Copyright © Acronis, Inc., 2000-2010 13 Navigation buttons 1.3 Acronis Backup & Recovery 10 components This section contains a list of Acron

Seite 36

130 Copyright © Acronis, Inc., 2000-2010 6.3 Recovering data When it comes to data recovery, first consider the most functional method: connect th

Seite 37 - 2.10.1 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 131 Content (p. 133) Select the backup and content to be recovered. Access credentials (p. 134) [Optional] Pro

Seite 38 - Restore)

132 Copyright © Acronis, Inc., 2000-2010 [Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery

Seite 39

Copyright © Acronis, Inc., 2000-2010 133  If the archive is stored on a network share, expand the Network folders group, then select the required

Seite 40 - How it works

134 Copyright © Acronis, Inc., 2000-2010 Selecting an MBR You will usually select the disk's MBR if:  The operating system cannot boot  Th

Seite 41 - How to use

Copyright © Acronis, Inc., 2000-2010 135 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 42 - 3 Options

136 Copyright © Acronis, Inc., 2000-2010 Disk destination To specify a destination disk: 1. Select a disk where you want the selected disk to reco

Seite 43 - 3.1.5 Fonts

Copyright © Acronis, Inc., 2000-2010 137 The selected volumes will be recovered to the physical disks of the machine the console is connected to. O

Seite 44 - 3.2 Machine options

138 Copyright © Acronis, Inc., 2000-2010 2. Click OK. All the data stored on the target volume will be replaced by the backed up data, so be caref

Seite 45 - 3.2.1.2 SNMP notifications

Copyright © Acronis, Inc., 2000-2010 139 volume to a volume that exceeds that limit, without changing the file system. It would make sense here to

Seite 46 - 3.2.2 Log cleanup rules

14 Copyright © Acronis, Inc., 2000-2010 Other operations Conversion to a virtual machine Rather than converting a disk backup to a virtual disk fil

Seite 47

140 Copyright © Acronis, Inc., 2000-2010 Disks Initial setting: the number and size of the source machine's disks. The number of disks is gene

Seite 48

Copyright © Acronis, Inc., 2000-2010 141 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.

Seite 49 - 3.3.1.1 Archive protection

142 Copyright © Acronis, Inc., 2000-2010  Recover now - the recovery task will be started immediately after you click the final OK.  Recover la

Seite 50 - 3.3.1.3 Pre/Post commands

Copyright © Acronis, Inc., 2000-2010 143 specified locations, it will specify the problem device and ask for a disc or a network path to the driver

Seite 51 - Post-backup command

144 Copyright © Acronis, Inc., 2000-2010  Click Recover to open the Recover data page. Start creating a recovery task as described in "Recov

Seite 52 - Pre-data capture command

Copyright © Acronis, Inc., 2000-2010 145  The system was recovered on dissimilar hardware and the new hardware is incompatible with the most crit

Seite 53 - Post-data capture command

146 Copyright © Acronis, Inc., 2000-2010 6.3.11.1 How to reactivate GRUB and change its configuration Generally, you should refer to the boot load

Seite 54 -  Do not create a snapshot

Copyright © Acronis, Inc., 2000-2010 147 10. Install GRUB. For example, to install GRUB in the master boot record (MBR) of the first disk, run the

Seite 55 - 3.3.1.8 Compression level

148 Copyright © Acronis, Inc., 2000-2010 Different ways to create a validation task Using the Validation page is the most general way to create a v

Seite 56 - Network connection speed

Copyright © Acronis, Inc., 2000-2010 149  Use the following credentials The task will always run under the credentials you specify, whether start

Seite 57 - 3.3.1.10 Notifications

Copyright © Acronis, Inc., 2000-2010 15  XFS - volume recovery without the volume resize capability; particular files cannot be recovered from di

Seite 58 - Messenger service (WinPopup)

150 Copyright © Acronis, Inc., 2000-2010 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Seite 59 - SNMP notifications

Copyright © Acronis, Inc., 2000-2010 151 The program will access the location using the credentials you specify. Use this option if the task accoun

Seite 60 - 3.3.1.13 Backup splitting

152 Copyright © Acronis, Inc., 2000-2010  Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable med

Seite 61 - 3.3.1.15 Media components

Copyright © Acronis, Inc., 2000-2010 153 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 62 - 3.3.1.16 Error handling

154 Copyright © Acronis, Inc., 2000-2010  Read only - enables exploring and opening files within the backup without committing any changes.  Re

Seite 63 - 3.3.1.17 Dual destination

Copyright © Acronis, Inc., 2000-2010 155 Export enables you to separate a specific backup from a chain of incremental backups for fast recovery, wr

Seite 64 - Skip the task execution

156 Copyright © Acronis, Inc., 2000-2010 Once the export task is completed, you can run it again at any time. Before doing so, delete the archive t

Seite 65

Copyright © Acronis, Inc., 2000-2010 157 To specify credentials 1. Select one of the following:  Run under the current user The task will run un

Seite 66 - Reset archive bit

158 Copyright © Acronis, Inc., 2000-2010 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 67 - Use FTP in Active mode

Copyright © Acronis, Inc., 2000-2010 159 1. Selecting the export destination Enter the full path to the destination in the Path field, or select t

Seite 68 - 3.3.2.1 Pre/Post commands

16 Copyright © Acronis, Inc., 2000-2010 1.7 Technical support As part of a purchased annual Support charge you are entitled to Technical Support a

Seite 69 - Post-recovery command

160 Copyright © Acronis, Inc., 2000-2010 6.7.6 Access credentials for destination Specify credentials required for access to the location where th

Seite 70 - 3.3.2.4 Notifications

Copyright © Acronis, Inc., 2000-2010 161 [Optional] Protect the Acronis Secure Zone from unauthorized access with a password. The prompt for the pa

Seite 71

162 Copyright © Acronis, Inc., 2000-2010 6.8.1.4 Result confirmation The Result confirmation window displays the expected partition layout accordi

Seite 72 - 3.3.2.5 Event tracing

Copyright © Acronis, Inc., 2000-2010 163  dragging the slider and selecting any size between the current and maximum values. The maximum size is

Seite 73 - 3.3.2.6 Error handling

164 Copyright © Acronis, Inc., 2000-2010 Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…" (if you

Seite 74 - 3.3.2.7 Additional settings

Copyright © Acronis, Inc., 2000-2010 165 Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent base

Seite 75

166 Copyright © Acronis, Inc., 2000-2010  Windows Vista SP1 and Windows Server 2008 (PE 2.1)  Windows 7 (PE 3.0) If you already have media with

Seite 76 - 4 Vaults

Copyright © Acronis, Inc., 2000-2010 167 3. [optional] The timeout interval for the boot menu plus the component that will automatically start on

Seite 77 - 4.1 Personal vaults

168 Copyright © Acronis, Inc., 2000-2010 Prompts for the video mode to be used by the bootable media's graphical user interface. Without the v

Seite 78 - Vault content

Copyright © Acronis, Inc., 2000-2010 169 Uses PCI BIOS calls to get the interrupt routing table. You may want to use this parameter if the kernel i

Seite 79 - How can I merge two vaults?

Copyright © Acronis, Inc., 2000-2010 17 2 Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear underst

Seite 80 - 4.2 Common operations

170 Copyright © Acronis, Inc., 2000-2010 Network port While creating bootable media, you have an option to pre-configure the network port that the

Seite 81

Copyright © Acronis, Inc., 2000-2010 171  Windows PE 2004 (1.5) (Windows XP Professional with Service Pack 2)  Windows PE 2005 (1.6) (Windows S

Seite 82 - To show or hide columns

172 Copyright © Acronis, Inc., 2000-2010 4. [optional] Specify Windows drivers to be added to Windows PE. Once you boot a machine into Windows PE,

Seite 83 - 5 Scheduling

Copyright © Acronis, Inc., 2000-2010 173 Once the machine boots into the Bart PE and you configure the network connection, select Go -> System -

Seite 84 - 5.1 Daily schedule

174 Copyright © Acronis, Inc., 2000-2010 1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then pr

Seite 85 -  fifth at 7 PM

Copyright © Acronis, Inc., 2000-2010 175 Acronis command line utilities  acronis  asamba  lash  restoreraids  trueimagecmd  trueimagemn

Seite 86 - 5.2 Weekly schedule

176 Copyright © Acronis, Inc., 2000-2010 hexdump readcd hotplug reboot 6.10.5 Recovering MD devices and logical volumes To recover Linux Softw

Seite 87

Copyright © Acronis, Inc., 2000-2010 177 6. Click Recover, then specify the path to the archive and any other required parameters, and then click

Seite 88 - 5.3 Monthly schedule

178 Copyright © Acronis, Inc., 2000-2010 The following picture illustrates this configuration. Do the following to recover data from this archive.

Seite 89

Copyright © Acronis, Inc., 2000-2010 179 3. In Backup, click Change and then select the backup from which you want to recover data. 4. In Data ty

Seite 90

18 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Seite 91

180 Copyright © Acronis, Inc., 2000-2010 All operations on disks and volumes involve a certain risk of data damage. Operations on system, bootable

Seite 92 - 5.5 Conditions

Copyright © Acronis, Inc., 2000-2010 181 machine. (It is also possible that this volume will have the same letter E: under any Windows OS installed

Seite 93 - 5.5.3 Fits time interval

182 Copyright © Acronis, Inc., 2000-2010  Disk conversion: GPT to MBR (p. 185) - converts a GPT partition table to MBR  Disk conversion: Basic

Seite 94 - 5.5.4 User logged off

Copyright © Acronis, Inc., 2000-2010 183 3. Select a cloning method and specify advanced options. The new volume structure will be graphically rep

Seite 95 - Example:

184 Copyright © Acronis, Inc., 2000-2010 MBR disk record. But two disks with the same NT signature cannot work properly under one operating system.

Seite 96 - 6 Direct management

Copyright © Acronis, Inc., 2000-2010 185 Please note: A GPT-partitioned disk reserves the space in the end of the partitioned area necessary for th

Seite 97 - Activities

186 Copyright © Acronis, Inc., 2000-2010 3. If you click OK in this warning window, the conversion will be performed immediately and if necessary,

Seite 98 - Way of working

Copyright © Acronis, Inc., 2000-2010 187 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after dynami

Seite 99 - Backup plan statuses

188 Copyright © Acronis, Inc., 2000-2010 Acronis Disk Director Lite must obtain exclusive access to the target volume. This means no other disk man

Seite 100 - Task states

Copyright © Acronis, Inc., 2000-2010 189 A fault-tolerant volume, also sometimes called RAID 1+0, combining the advantage of the high I/O speed of

Seite 101 - Task statuses

Copyright © Acronis, Inc., 2000-2010 19 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Seite 102 -  Validation task (p. 147)

190 Copyright © Acronis, Inc., 2000-2010  Select a destination disk and specify the unallocated space to create the basic volume on. To create a

Seite 103

Copyright © Acronis, Inc., 2000-2010 191 The wizard will prompt you to choose one of the Windows file systems: FAT16 (disabled, if the volume size

Seite 104

192 Copyright © Acronis, Inc., 2000-2010 (To finish the added operation you will have to commit (p. 194) it. Exiting the program without committing

Seite 105

Copyright © Acronis, Inc., 2000-2010 193 6.11.6.5 Change volume label The volume label is an optional attribute. It is a name assigned to a volume

Seite 106 - Task details

194 Copyright © Acronis, Inc., 2000-2010 If you set a 64K cluster size for FAT16/FAT32 or an 8KB-64KB cluster size for NTFS, Windows can mount the

Seite 107 - Progress

Copyright © Acronis, Inc., 2000-2010 195 7 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immedi

Seite 108 - Backup plan details

196 Copyright © Acronis, Inc., 2000-2010 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and e

Seite 109 - 6.1.3 Log

Copyright © Acronis, Inc., 2000-2010 197 Backup options Configuration parameters of a backup operation (p. 196), such as pre/post backup commands,

Seite 110 - Configuring the log table

198 Copyright © Acronis, Inc., 2000-2010 5. On each machine, the agent installed on the machine creates a backup plan (p. 197) using other rules s

Seite 111 - 6.2 Creating a backup plan

Copyright © Acronis, Inc., 2000-2010 199 built-in group except for deleting the machine from the management server. Virtual machines are deleted as

Seite 112 - Backup options

Copyright © Acronis, Inc., 2000-2010. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Seite 113 - Convert to VM

20 Copyright © Acronis, Inc., 2000-2010 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Seite 114 - 6.2.4 Items to back up

200 Copyright © Acronis, Inc., 2000-2010 Cleanup consists in applying to an archive the retention rules set by the backup plan (p. 197) that produc

Seite 115

Copyright © Acronis, Inc., 2000-2010 201 operations are configured on the management server (p. 205) and propagated by the server to the managed ma

Seite 116 - 6.2.6 Exclusions

202 Copyright © Acronis, Inc., 2000-2010 Dynamic disk A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with

Seite 117 - 6.2.7 Archive

Copyright © Acronis, Inc., 2000-2010 203 Dynamic volume Any volume located on dynamic disks (p. 202), or more precisely, on a disk group (p. 201)

Seite 118

204 Copyright © Acronis, Inc., 2000-2010 G GFS (Grandfather-Father-Son) A popular backup scheme (p. 198) aimed to maintain the optimal balance bet

Seite 119 - 6.2.9 Backup schemes

Copyright © Acronis, Inc., 2000-2010 205 Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage n

Seite 120 - 6.2.9.3 Simple scheme

206 Copyright © Acronis, Inc., 2000-2010 R Recovery point Date and time to which the backed up data can be reverted to. Registered machine A machi

Seite 121 - Examples

Copyright © Acronis, Inc., 2000-2010 207 Since the cleanup schedule exists on the machine (p. 204) the agent (p. 195) resides on, and therefore use

Seite 122

208 Copyright © Acronis, Inc., 2000-2010  the image being recovered is located in Acronis Secure Zone (p. 195) or  when using Acronis Active Re

Seite 123 - Parameters

Copyright © Acronis, Inc., 2000-2010 209  Windows Server 2003 with Service Pack 1 (PE 1.6)  Windows Vista (PE 2.0)  Windows Vista SP1 and Win

Seite 124 - Roll-back period

Copyright © Acronis, Inc., 2000-2010 21 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Seite 125

8 Index A About Windows loaders • 147 Access credentials • 152, 153 Access credentials for archive location • 112, 118 Access credentials for desti

Seite 126

Copyright © Acronis, Inc., 2000-2010 211 Bootability troubleshooting • 144 Bootable agent • 38, 163, 195, 198 Bootable media • 14, 17, 62, 97, 130,

Seite 127 - Resulting tasks

212 Copyright © Acronis, Inc., 2000-2010 Disks • 131, 135 Disks/volumes selection • 133 Drivers for Universal Restore • 167, 170 Dual destination •

Seite 128 - 6.2.10 Archive validation

Copyright © Acronis, Inc., 2000-2010 213 Managed machine • 7, 17, 43, 195, 197, 199, 200, 204, 206, 207 Managed vault • 200, 203, 204, 206, 207, 20

Seite 129

214 Copyright © Acronis, Inc., 2000-2010 Selecting a host that will perform conversion • 113, 129 Selecting disks and volumes • 115 Selecting files

Seite 130 - 6.3 Recovering data

Copyright © Acronis, Inc., 2000-2010 215 Virtual machine type / virtualization server selection • 135, 137, 139 Volume destination • 135, 137 Volum

Seite 131 - Recovery options

22 Copyright © Acronis, Inc., 2000-2010 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Seite 132 - 6.3.2 Archive selection

Copyright © Acronis, Inc., 2000-2010 23 Parameter Full backup Differential backup Incremental backup Storage space Maximal Medium Minimal Crea

Seite 133 - 6.3.4 Content selection

24 Copyright © Acronis, Inc., 2000-2010 a warning each time you are trying to edit a plan (task) last modified by another user. On seeing the warni

Seite 134 - 6.3.4.2 Files selection

Copyright © Acronis, Inc., 2000-2010 25 GFS as a tape rotation scheme GFS was initially created and is often referred to as a tape rotation scheme.

Seite 135 - 6.3.6 Destination selection

26 Copyright © Acronis, Inc., 2000-2010 The schedule marked out according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday A

Seite 136 - 6.3.6.2 Volumes

Copyright © Acronis, Inc., 2000-2010 27 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Seite 137 - Volume destination

28 Copyright © Acronis, Inc., 2000-2010 An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at

Seite 138 - Volume properties

Copyright © Acronis, Inc., 2000-2010 29 For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the follow

Seite 139 - Storage

Table of contents 1 Introducing Acronis® Backup & Recovery™ 10 ... 6 1.1

Seite 140 - Recovery exclusions

30 Copyright © Acronis, Inc., 2000-2010  the scheme forces every backup level to keep only the most recent backup, other backups from the level h

Seite 141 - 6.3.8 When to recover

Copyright © Acronis, Inc., 2000-2010 31 to this interval and deletes all backups created before that moment. None of the backups created after this

Seite 142 - 6.3.9 Universal Restore

32 Copyright © Acronis, Inc., 2000-2010 Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram bel

Seite 143

Copyright © Acronis, Inc., 2000-2010 33 Please be aware that consolidation is just a method of deletion but not an alternative to deletion. The res

Seite 144

34 Copyright © Acronis, Inc., 2000-2010 Recovering dynamic volumes A dynamic volume can be recovered  over any type of existing volume  to una

Seite 145

Copyright © Acronis, Inc., 2000-2010 35 Unallocated space (basic GPT disk) Basic GPT volume Basic GPT volume Basic GPT volume Moving and resizing v

Seite 146

36 Copyright © Acronis, Inc., 2000-2010 library) by... Windows ATIE 9.5 - - - + ATIE 9.7 - - - + ABR10 + + + + Agent for Linux ATIE 9.1 +

Seite 147 - Windows Vista/2008

Copyright © Acronis, Inc., 2000-2010 37 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont

Seite 148 - 6.4.1 Task credentials

38 Copyright © Acronis, Inc., 2000-2010  mount a disk backup to copy files from the backup to a physical disk  safely delete archives and backu

Seite 149 - 6.4.2 Archive selection

Copyright © Acronis, Inc., 2000-2010 39 Acronis Backup & Recovery 10 Universal Restore purpose A system can be easily recovered from a disk bac

Seite 151 - 6.5 Mounting an image

40 Copyright © Acronis, Inc., 2000-2010 profiles. If you are going to change the above settings on a recovered system, you can prepare the system w

Seite 152 - 6.5.1 Archive selection

Copyright © Acronis, Inc., 2000-2010 41 Because serving requests is performed simultaneously with recovery, the system operation can slow down even

Seite 153 - 6.5.4 Volume selection

42 Copyright © Acronis, Inc., 2000-2010 3 Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph

Seite 154 - 6.6 Managing mounted images

Copyright © Acronis, Inc., 2000-2010 43 The preset is: Enabled for all results. To make a setting for each result (successful completion, failure o

Seite 155

44 Copyright © Acronis, Inc., 2000-2010 The option defines the fonts to be used in the Graphical User Interface of Acronis Backup & Recovery 10

Seite 156 - 6.7.1 Task credentials

Copyright © Acronis, Inc., 2000-2010 45  All events - all events (information, warnings and errors)  Errors and warnings  Errors only. To dis

Seite 157 - 6.7.2 Archive selection

46 Copyright © Acronis, Inc., 2000-2010 3.2.1.3 Setting up SNMP services on the receiving machine Windows To install the SNMP service on a machine

Seite 158 - 6.7.5 Location selection

Copyright © Acronis, Inc., 2000-2010 47 Initially the option is configured during the Acronis Backup & Recovery 10 agent installation. This set

Seite 159 - 3. Naming the new archive

48 Copyright © Acronis, Inc., 2000-2010 Compression level (p. 55) + + + + Backup performance: Backup priority (p. 56) + + - - HDD writing speed

Seite 160 - 6.8 Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2010 49 E-mail (p. 57) + + - - Win Pop-up (p. 58) + + - - Event tracing: Windows events log (p. 59) + + - - S

Seite 161 - To disable password

6.4.1 Task credentials ...

Seite 162 - 6.8.1.4 Result confirmation

50 Copyright © Acronis, Inc., 2000-2010 Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of it

Seite 163

Copyright © Acronis, Inc., 2000-2010 51 The program does not support interactive commands, i.e. commands that require user input (for example, &quo

Seite 164 - 6.10 Bootable media

52 Copyright © Acronis, Inc., 2000-2010 4. If successful execution of the command is critical for your backup strategy, select the Fail the task i

Seite 165 - PE-based bootable media

Copyright © Acronis, Inc., 2000-2010 53 4. Depending on the result you want to obtain, select the appropriate options as described in the table be

Seite 166 - Using Bart PE

54 Copyright © Acronis, Inc., 2000-2010 3.3.1.5 File-level backup snapshot This option is effective only for file-level backup in Windows and Linu

Seite 167 - Kernel parameters

Copyright © Acronis, Inc., 2000-2010 55 The preset is: Create snapshots using VSS Acronis Backup & Recovery 10 will select the VSS provider aut

Seite 168

56 Copyright © Acronis, Inc., 2000-2010 3.3.1.9 Backup performance Use this group of options to specify the amount of network and system resources

Seite 169 - Network settings

Copyright © Acronis, Inc., 2000-2010 57 This option is available when a location on the network (network share, managed vault or an FTP/SFTP server

Seite 170 - Network port

58 Copyright © Acronis, Inc., 2000-2010  Use encryption – you can opt for encrypted connection to the mail server. SSL and TLS encryption types a

Seite 171

Copyright © Acronis, Inc., 2000-2010 59 3.3.1.11 Event tracing It is possible to duplicate log events of the backup operations, performed on the m

Seite 172

Copyright © Acronis, Inc., 2000-2010 6 1 Introducing Acronis® Backup & Recovery™ 10 1.1 Acronis Backup & Recovery 10 overview Based on Ac

Seite 173

60 Copyright © Acronis, Inc., 2000-2010  Send SNMP notifications individually for backup operation events – to send the events of the backup oper

Seite 174 - To add an NDAS device

Copyright © Acronis, Inc., 2000-2010 61  When backing up to removable media (CD, DVD or a tape device locally attached to the managed machine):

Seite 175 - Linux commands and utilities

62 Copyright © Acronis, Inc., 2000-2010 When backing up to removable media, you can make this media work as regular Linux-based bootable media (p.

Seite 176

Copyright © Acronis, Inc., 2000-2010 63 When the option is disabled, the program will display a pop-up window each time it comes across a bad secto

Seite 177

64 Copyright © Acronis, Inc., 2000-2010 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Seite 178

Copyright © Acronis, Inc., 2000-2010 65 trying as soon as an attempt completes successfully OR the specified number of attempts is performed, depen

Seite 179 - 6.11 Disk management

66 Copyright © Acronis, Inc., 2000-2010 the prompt when scheduling a backup to removable media. Then, if the removable media is available (for exam

Seite 180 - 6.11.1 Basic precautions

Copyright © Acronis, Inc., 2000-2010 67 The preset is: Enabled. When this option is enabled, Acronis Backup & Recovery 10 will save information

Seite 181 - 6.11.5 Disk operations

68 Copyright © Acronis, Inc., 2000-2010 File-level security (p. 70): Recover files with their security settings - + - + Error handling (p. 73):

Seite 182 - 6.11.5.2 Basic disk cloning

Copyright © Acronis, Inc., 2000-2010 69 To specify pre/post commands 1. Enable pre/post commands execution by checking the following options:  E

Seite 183 - Using advanced options

Copyright © Acronis, Inc., 2000-2010 7 Where to go from here For what to do next see "Basic concepts (p. 17)". For understanding of the G

Seite 184

70 Copyright © Acronis, Inc., 2000-2010 When the check box is not selected, the command execution result does not affect the task execution failure

Seite 185

Copyright © Acronis, Inc., 2000-2010 71 The option enables you to receive e-mail notifications about the recovery task's successful completion

Seite 186 - System disk conversion

72 Copyright © Acronis, Inc., 2000-2010 Before configuring WinPopup notifications, make sure the Messenger service is started on both the machine e

Seite 187 - 6.11.6 Volume operations

Copyright © Acronis, Inc., 2000-2010 73 This option is not available when operating under the bootable media. The option defines whether the agent(

Seite 188 - Types of dynamic volumes

74 Copyright © Acronis, Inc., 2000-2010 For example, if the network location becomes unavailable or not reachable, the program will attempt to reac

Seite 189 - Select destination disks

Copyright © Acronis, Inc., 2000-2010 75 Acronis Backup & Recovery 10 can generate an unique security identifier (SID) for the recovered system.

Seite 190 - Set the volume options

Copyright © Acronis, Inc., 2000-2010 76 4 Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is

Seite 191 - 6.11.6.2 Delete volume

Copyright © Acronis, Inc., 2000-2010 77 4.1 Personal vaults A vault is called personal if it was created using direct connection of the console to

Seite 192 - 6.11.6.3 Set active volume

78 Copyright © Acronis, Inc., 2000-2010 Vault content The Vault content section contains the archives table and toolbar. The archives table display

Seite 193 - 6.11.6.6 Format volume

Copyright © Acronis, Inc., 2000-2010 79 Explore a vault's content Click Explore. In the appearing Explorer window, examine the selected vault

Seite 194 - 6.11.7 Pending operations

8 Copyright © Acronis, Inc., 2000-2010 Menu bar Appears across the top of the program window and lets you perform all the operations, available o

Seite 195 - 7 Glossary

80 Copyright © Acronis, Inc., 2000-2010 3. Edit the backup plans that use vault A: redirect their destination to vault B. 4. In the vaults tree,

Seite 196

Copyright © Acronis, Inc., 2000-2010 81 All the operations described below are performed by clicking the corresponding buttons on the toolbar. Thes

Seite 197 - Backup policy (Policy)

82 Copyright © Acronis, Inc., 2000-2010 The filters in this window are from the archives list of the vault view. Thus, if some filters have been ap

Seite 198 - Built-in group

Copyright © Acronis, Inc., 2000-2010 83 5 Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine a

Seite 199 - Cleanup

84 Copyright © Acronis, Inc., 2000-2010 What-ifs  What if an event occurs (and a condition, if any, is met) while the previous task run has not c

Seite 200

Copyright © Acronis, Inc., 2000-2010 85 3. Effective: From: not set. The task will be started on the current day, if it has been created before 6P

Seite 201 - Disk group

86 Copyright © Acronis, Inc., 2000-2010 Second daily schedule 1. Every: 3 day(s). 2. Every: 2 hour(s). From: 03:00:00 PM Until: 07:00:00 PM. 3.

Seite 202 - Dynamic group

Copyright © Acronis, Inc., 2000-2010 87 To: 11/13/2009. The task will be performed for the last time on this date, but the task itself will still b

Seite 203 - Full backup

88 Copyright © Acronis, Inc., 2000-2010 From: not set. To: not set. Second schedule 1. Every 1 week(s) on: Tue, Wed, Thu. 2. Every 3 hours From 0

Seite 204

Copyright © Acronis, Inc., 2000-2010 89 Examples "Last day of every month" schedule Run the task once at 10 PM on the last day of every m

Seite 205

Copyright © Acronis, Inc., 2000-2010 9 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items sel

Seite 206

90 Copyright © Acronis, Inc., 2000-2010 2. On: <All> <All workdays> 3. Once at: 10:00:00 PM. 4. Effective: From: 11/01/2009. To: not

Seite 207 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2010 91 For example, an Error event with Event source disk and Event ID 7 occurs when Windows discovers a bad block

Seite 208

92 Copyright © Acronis, Inc., 2000-2010 To view properties of an event, including the event source and event number 1. In Event Viewer, click the

Seite 209 -  Windows Vista (PE 2.0)

Copyright © Acronis, Inc., 2000-2010 93 Example: Run the backup task on the managed machine every day at 9PM, preferably when the user is idle. If

Seite 210 - 8 Index

94 Copyright © Acronis, Inc., 2000-2010 time, in order to free network bandwidth. By specifying the upper limit as 10 PM, it is supposed that the b

Seite 211

Copyright © Acronis, Inc., 2000-2010 95 (2) If the last user logs off between 8PM and 11PM, the backup task will start immediately after the user h

Seite 212

Copyright © Acronis, Inc., 2000-2010 96 6 Direct management This section covers operations that can be performed directly on a managed machine by

Seite 213

Copyright © Acronis, Inc., 2000-2010 97 Please make sure you have a valid license on Acronis License Server. working. Trial version of product exp

Seite 214

98 Copyright © Acronis, Inc., 2000-2010 Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warn

Seite 215

Copyright © Acronis, Inc., 2000-2010 99  Use the Information panel to review detailed information on the selected plan (task). The panel is colla

Kommentare zu diesen Handbüchern

Keine Kommentare