ACRONIS Backup & Recovery 10 Advanced Server, ES Handbücher

Bedienungsanleitungen und Benutzerhandbücher für Softwarelizenzen / Upgrades ACRONIS Backup & Recovery 10 Advanced Server, ES.
Wir stellen 1 PDF-Handbücher ACRONIS Backup & Recovery 10 Advanced Server, ES zum kostenlosen herunterladen nach Dokumenttypen zur Verfügung Betriebsanweisung


Inhaltsverzeichnis

Advanced Server

1

Table of contents

3

1.2 Getting started

9

Name Description

11

Navigation tree

12

Shortcuts bar

13

Actions

14

How to expand/minimize panes

15

Action pages

16

Action page - Controls

17

1.3.1 Agent for Windows

18

1.3.2 Agent for Linux

19

1.3.2.1 Deduplication

20

1.3.3.1 Management Server

20

1.3.3.2 Storage Node

21

1.3.4 Management Console

22

1.4 Supported file systems

23

10 Storage Node

24

1.6 System requirements

25

1.7 Technical Support

26

2.1 Basic concepts

27

Backup using bootable media

29

Windows

31

2.3 Owners and credentials

32

Full backup

33

Incremental backup

34

Differential backup

34

2.5 GFS backup scheme

35

The resulting archive: ideal

37

The resulting archive: real

37

Tower of Hanoi overview

39

Tower of Hanoi by Acronis

39

2.7 Retention rules

41

Combination of rules 1 and 2

42

Best practices

43

Backing up dynamic volumes

44

Recovering dynamic volumes

44

Backup (GUI)

45

2.9.2 Backing up MD devices

46

2.11 Tape support

49

2.12 Support for SNMP

50

2.13.1 Acronis Secure Zone

51

Advantages

52

Limitations

52

Restore)

53

Getting Universal Restore

55

Supported operating systems

55

Limitation

55

How it works

55

Usage scenarios

55

How to use

56

2.14.1 Basic concepts

57

Setting up the storage node

59

2.14.3.4 Example

62

Policy on a machine

65

Policy on a group

65

Backup policy state diagram

69

2.14.6 Deduplication

71

Deduplication database

72

Deduplication at source

72

Deduplication at target

73

Compacting

73

What ratio to expect

74

Local connection

76

Remote connection

76

Example 1

78

Example 2

78

On a domain controller

79

Remote Agent ports

84

Client Encryption options

84

Server Encryption options

85

2.14.8.5 SSL certificates

86

Certificate path

87

Self-signed certificates

87

Non-self-signed certificates

88

3 Options

89

3.1.3 Time-based alerts

90

3.1.4 Number of tasks

90

3.1.5 Fonts

90

3.2.1 Logging level

91

3.2.2 Log cleanup rules

91

3.2.3 Event tracing

92

3.2.5 Acronis WOL Proxy

93

3.2.6 VM protection options

93

3.2.7 Online backup proxy

94

3.3 Machine options

95

3.3.2 Event tracing

96

3.3.3 Log cleanup rules

98

3.3.4 Online backup proxy

98

3.4.1.1 Archive protection

101

3.4.1.3 Pre/Post commands

103

Pre-backup command

104

Post-backup command

104

Pre-data capture command

105

Post-data capture command

106

 Always create a snapshot

107

 Do not create a snapshot

107

3.4.1.8 Compression level

108

3.4.1.9 Backup performance

109

Backup priority

109

HDD writing speed

109

Network connection speed

110

3.4.1.10 Notifications

110

Messenger service (WinPopup)

111

3.4.1.11 Event tracing

112

Windows event log

112

SNMP notifications

112

3.4.1.13 Backup splitting

113

3.4.1.15 Media components

114

3.4.1.16 Error handling

115

3.4.1.17 Dual destination

116

Skip the task execution

117

3.4.1.20 Tape support

118

Always use a free tape

119

Reset archive bit

120

Use FTP in Active mode

121

3.4.2.1 Pre/Post commands

123

Pre-recovery command

123

Post-recovery command

124

3.4.2.2 Recovery priority

124

3.4.2.3 File-level security

125

3.4.2.4 Notifications

125

3.4.2.5 Event tracing

126

3.4.2.6 Error handling

128

3.4.2.7 Additional settings

128

4 Vaults

130

4.1 Centralized vaults

131

Vault toolbar

132

Pie chart with legend

132

Vault content

132

Vault path

135

Vault database path

136

Vault encryption

136

4.1.3 Tape libraries

138

4.1.3.2 Hardware

139

4.1.3.3 Limitations

139

4.1.3.4 RSM Media Pools

140

Prerequisites

141

Backing up to tape library

142

Recovering from tape library

143

Inventory

144

Labeling

145

4.1.3.7 Tape support

145

4.1.3.8 Tape rotation

146

Choosing a backup scheme

147

Criteria of the choice

147

Case to analyze

148

GFS Example 1

149

GFS Example 2

152

GFS Example 3

154

ToH Example 1

156

ToH Example 2

157

ToH Example 3

158

Tape planning

158

Tape planning: Example 1

159

Tape planning: Example 2

160

4.1.3.9 What if

160

4.2 Personal vaults

161

Metadata

162

4.3 Common operations

164

To show or hide columns

167

5 Scheduling

168

5.1 Daily schedule

169

 first at 8 AM

170

 second at 12 PM (noon)

170

 third at 3 PM

170

 fourth at 5 PM

170

 fifth at 7 PM

170

5.2 Weekly schedule

171

5.3 Monthly schedule

173

Examples

174

Parameters

176

Use Wake-On-LAN

177

To specify advanced settings

178

5.7 Conditions

179

5.7.1 User is idle

180

5.7.3 Fits time interval

181

5.7.4 User logged off

181

Example:

182

Example

182

6 Direct management

183

Activities

184

System view

185

Way of working

185

Backup plan execution states

186

Backup plan statuses

186

Task states

187

Task statuses

188

 Backup plan (p. 198)

189

 Recovery task (p. 222)

189

 Validation task (p. 243)

189

Run backup plan

193

Task details

193

Archive

194

Settings

194

Backup plan details

195

6.1.3 Log

196

6.2 Creating a backup plan

198

General

199

What to backup

199

Where to back up

199

How to back up

200

Archive validation

200

Backup options

200

Convert to VM

200

6.2.3 Source type

201

6.2.4 Items to back up

202

6.2.6 Exclusions

204

6.2.7 Archive

205

6.2.8.1 Usage examples

207

6.2.8.2 The [DATE] variable

210

6.2.10 Backup schemes

211

6.2.10.3 Simple scheme

212

At a glance

215

Roll-back period

216

6.2.10.7 Initial seeding

220

6.2.11 Archive validation

221

6.3 Recovering data

222

What to recover

223

Where to recover

224

When to recover

224

Recovery options

224

6.3.1 Task credentials

225

6.3.2 Archive selection

225

6.3.3 Data type

226

6.3.4 Content selection

226

6.3.4.2 Files selection

227

6.3.6 Destination selection

228

Disk destination

229

NT signature

229

6.3.6.2 Volumes

230

MBR destination

231

Volume destination

231

Volume properties

231

6.3.6.5 File destination

233

Recovery exclusions

234

Overwriting

234

6.3.8 When to recover

235

6.3.9 Universal Restore

235

Universal Restore settings

236

Post-conversion operations

238

Windows NT/2000/XP/2003

241

Windows Vista/2008

241

6.4.1 Task credentials

244

6.4.2 Archive selection

245

6.4.3 Backup selection

246

6.4.4 Location selection

246

6.5 Mounting an image

247

6.5.1 Archive selection

248

6.5.2 Backup selection

249

6.5.3 Access credentials

249

6.6 Managing mounted images

250

6.7.1 Task credentials

253

6.7.2 Archive selection

254

6.7.3 Backup selection

255

6.7.5 Location selection

255

2. Using the archives table

256

3. Naming the new archive

256

6.8 Acronis Secure Zone

257

To set up a password

258

To disable password

258

6.8.1.4 Result confirmation

259

6.10 Bootable media

261

Linux-based bootable media

262

PE-based bootable media

262

Using Bart PE

263

Kernel parameters

264

Network settings

266

Network port

267

\winpe_x86\ISO

269

To add an iSCSI device

271

Linux commands and utilities

272

Mounting backup volumes

276

6.10.6 Acronis PXE Server

277

6.11 Disk management

279

Starting the operations

280

6.11.5 Disk operations

281

6.11.5.2 Basic disk cloning

282

Using advanced options

283

System disk conversion

285

6.11.6 Volume operations

287

Create volume wizard

288

Select destination disks

289

Set the volume size

289

Set the volume options

290

6.11.6.2 Delete volume

291

6.11.6.3 Set active volume

291

6.11.6.6 Format volume

292

6.11.7 Pending operations

293

7 Centralized management

295

7.1.2 Backup policies

297

Machines selection

300

7.1.2.4 Policy details

301

7.1.3 Physical machines

302

7.1.3.1 Actions on machines

303

Applying policies

304

Grouping actions

304

Other actions

305

To add a machine

306

Text file requirements

307

Adding machines to a group

309

Machine details

309

Plans and tasks

311

Member of

313

Inheritance order

314

7.1.3.2 Actions on groups

315

Adding multiple criteria

316

Move one group to another

318

Editing custom groups

318

Group details

318

7.1.4 Virtual machines

319

Grouping of virtual machines

321

7.1.5 Storage nodes

324

 Information panel

325

Adding a storage node

326

Storage node properties

327

7.1.6 Tasks

328

7.1.7 Log

330

Configuring the log table

333

7.1.8 Reporting

334

Report view

335

Filters

335

Report coverage

337

7.1.8.8 Column selection

338

7.1.8.9 Report view

339

Connection parameters

351

Event tracing parameters

353

What to back up

356

7.3.1 Policy credentials

358

7.3.2 Items to back up

359

Names for logical volumes

362

7.3.4 Exclusions

364

7.3.5 Archive

365

2. Naming the archives

366

7.3.7.1 Back up now scheme

368

7.3.7.3 Simple scheme

368

Description

369

Resulting tasks

376

8 Online backup

377

Server uses a free license

379

8.1.7 Initial Seeding FAQ

381

Hard drive types

383

Packaging

383

Scale Recovery?

386

To renew a subscription

389

8.2 Where do I start?

390

8.3 Choosing a subscription

390

Trial subscriptions

391

Operations

394

Backup and recovery options

394

8.7 Terminology reference

395

9 Glossary

397

Backup plan (Plan)

399

Backup policy (Policy)

399

Backup scheme

400

Bootable agent

400

Bootable media

400

Built-in group

400

Centralized backup plan

401

Centralized management

401

Centralized task

401

Centralized vault

401

Direct management

403

Disk backup (Image)

403

Disk group

403

Dynamic disk

404

Dynamic group

404

Dynamic volume

405

Encrypted archive

405

Encrypted vault

405

Managed vault

407

Media builder

407

Personal vault

407

Physical machine

407

Storage node-side cleanup

409

Storage node-side validation

409

Tower of Hanoi

409

Unmanaged vault

410

Validation

410

Validation rules

410

Virtual machine

411





Weitere Produkte und Handbücher für Softwarelizenzen / Upgrades ACRONIS

Modelle Dokumententyp
Backup & Recovery 10 Advanced Workstation, ES Betriebsanweisung   Acronis Backup & Recovery 10 Advanced Workstation, EN, 401 Seiten
Backup & Recovery 10 Server for Windows, ES Betriebsanweisung   Acronis Backup & Recovery 10 Server for Windows, ES, 241 Seiten
Backup & Recovery 10 Workstation, ES Betriebsanweisung   Acronis Backup & Recovery 10 Workstation, EN, 240 Seiten
DCTXRPEND26 Betriebsanweisung   Acronis DCTXRPEND25, 31 Seiten
DISK DIRECTOR SERVER 10 Betriebsanweisung   ACRONIS DISK DIRECTOR SERVER 10 User`s guide, 94 Seiten
PRIVACY EXPERT CORPORATE - Bedienungsanleitung   Acronis Privacy Expert Corporate Installation Guide, 8 Seiten
A1ENLPDEE22 Datenblatt   Acronis Backup Advanced for Exchange v11.5, 13 Seiten
TPDXMSENS71 Datenblatt   Acronis Backup & Recovery 11.5 Advanced Workstation, 1Y, 2 Seiten
DDSXRBFRA33 Datenblatt   Acronis Disk Director Server 10.0, AAS>AAP, ALP, 50-499u, Upg, FR, 2 Seiten
DDDMLPDES21 Datenblatt   Acronis DDDMLPDES21, 92 Seiten
Backup & Recovery 10 Advanced Server Virtual Edition, ES Betriebsanweisung   Acronis Backup & Recovery 10 Advanced Server Virtual Edition, ES, 422 Seiten