ACRONIS KIT33100124739 Datenblatt

Stöbern Sie online oder laden Sie Datenblatt nach Backup-Wiederherstellungssoftware ACRONIS KIT33100124739 herunter. Acronis K/Backup & Recovery 10 Srv+5 Workst/DE Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 221
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Server for Windows

User's Guide Acronis® Backup & Recovery ™ 10 Server for Windows

Seite 2

10 Copyright © Acronis, Inc., 2000-2009 Bars '[Item's name]' actions Contains a set of actions that can be performed on the items se

Seite 3 - Table of Contents

100 Copyright © Acronis, Inc., 2000-2009 • Event source: Microsoft-Windows-WindowsUpdateClient • Event type: Information • Event ID: 18 Tip: To

Seite 4

Copyright © Acronis, Inc., 2000-2009 101 • backup task start time matters - skip the backup task if the conditions are not met at the time when th

Seite 5

102 Copyright © Acronis, Inc., 2000-2009 "Location is available" means that the destination specified for storing archives on a networked

Seite 6

Copyright © Acronis, Inc., 2000-2009 103 What if... What if a task is scheduled to be executed at a certain time and this time is outside the speci

Seite 7 - 1.2. Getting started

104 Copyright © Acronis, Inc., 2000-2009 Example: Run the backup task after free space on the managed machine has changed by at least 1 GB, but onl

Seite 8

Copyright © Acronis, Inc., 2000-2009 105 6. Direct management This section covers operations that can be performed directly on a managed machine b

Seite 9 - Shortcuts bar

106 Copyright © Acronis, Inc., 2000-2009 License Server was unavailable, or the license key data was corrupted. Check connectivity to the server an

Seite 10 - Actions

Copyright © Acronis, Inc., 2000-2009 107 Activities The calendar lets you explore the history of the Acronis Backup & Recovery 10 agent's

Seite 11 - How to expand/minimize panes

108 Copyright © Acronis, Inc., 2000-2009 108). A backup plan state is a cumulative state of the plan's tasks.The status of a backup plan (p. 1

Seite 12 - Action pages

Copyright © Acronis, Inc., 2000-2009 109 3 Waiting At least one task is waiting. Otherwise, see 4. Waiting for condition. This situation is quite

Seite 13

Copyright © Acronis, Inc., 2000-2009 11 Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can

Seite 14 - 1.3.1. Agent for Windows

110 Copyright © Acronis, Inc., 2000-2009 3 OK All the tasks are completed successfully. No action is required. Note that a backup plan can be OK

Seite 15 - 1.3.4. Management Console

Copyright © Acronis, Inc., 2000-2009 111 Task state diagram Task statuses A task can have one of the following statuses: Error; Warning; OK. A ta

Seite 16 - 1.5. Supported file systems

112 Copyright © Acronis, Inc., 2000-2009 6.1.2.2. Working with backup plans and tasks Actions on backup plans and tasks The following is a guideli

Seite 17 - 1.6. Technical support

Copyright © Acronis, Inc., 2000-2009 113 Stop a plan/task Backup plan Click Stop. Stopping the running backup plan stops all its tasks. Thus, al

Seite 18 - 2.1. Basic concepts

114 Copyright © Acronis, Inc., 2000-2009 Without the Administrator privileges on the machine, a user cannot edit plans owned by other users. • The

Seite 19

Copyright © Acronis, Inc., 2000-2009 115 Why can't I delete the task? • Task belongs to a backup plan A task belonging to a backup plan canno

Seite 20 - Backup using bootable media

116 Copyright © Acronis, Inc., 2000-2009 Run backup plan The backup plan is considered as running if at least one of its tasks is running. The Run

Seite 21

Copyright © Acronis, Inc., 2000-2009 117 Recovery (disk to new VM) Recovery of a disk/volume backup to a new virtual machine Recovery (existing V

Seite 22

118 Copyright © Acronis, Inc., 2000-2009 Backup plan details The Backup plan details window (also duplicated on the Information panel) aggregates i

Seite 23 - Incremental backup

Copyright © Acronis, Inc., 2000-2009 119 • Backup scheme - the selected backup scheme and all its settings with schedules. • Validation (if sele

Seite 24 - 2.4. Owners and credentials

12 Copyright © Acronis, Inc., 2000-2009 "Tasks" view Common way of working with views Generally, every view contains a table of items,

Seite 25 - Archive owner

120 Copyright © Acronis, Inc., 2000-2009 To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CT

Seite 26 - 2.5. GFS backup scheme

Copyright © Acronis, Inc., 2000-2009 121 Filter log entries by the original backup plan or managed entity type Under the Backup plan (or Managed en

Seite 27

122 Copyright © Acronis, Inc., 2000-2009 ---------------------------Log Entry Details--------------------------- Type: Infor

Seite 28 - The resulting archive: ideal

Copyright © Acronis, Inc., 2000-2009 123 Exclusions (p. 127) [Optional] Set up exclusions for the specific types of files you do not wish to back

Seite 29 - The resulting archive: real

124 Copyright © Acronis, Inc., 2000-2009 default one. When the default value is set, the line disappears and so you always see only the settings th

Seite 30 - Tower of Hanoi overview

Copyright © Acronis, Inc., 2000-2009 125 Select this option to back up specific files and folders. If you are not concerned about recovery of the o

Seite 31 - Tower of Hanoi by Acronis

126 Copyright © Acronis, Inc., 2000-2009 appropriate place with the zero size. A volume backup stores all other files and folders of the selected v

Seite 32

Copyright © Acronis, Inc., 2000-2009 127 • User name. When entering the name of an Active Directory user account, be sure to also specify the doma

Seite 33 - 2.7. Retention rules

128 Copyright © Acronis, Inc., 2000-2009 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the de

Seite 34 - Combination of rules 1 and 2

Copyright © Acronis, Inc., 2000-2009 129 3. Naming the new archive Once you select the archive destination, the program generates a name for the ne

Seite 35 - Best practices

Copyright © Acronis, Inc., 2000-2009 13 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Seite 36 - Recovering dynamic volumes

130 Copyright © Acronis, Inc., 2000-2009 The program will access the source data using the credentials you specify. Use this option if the plan acc

Seite 37

Copyright © Acronis, Inc., 2000-2009 131 In the Backup type field, select whether you want to create a full, incremental or differential backup (p.

Seite 38 - 2.9. Tape support

132 Copyright © Acronis, Inc., 2000-2009 Jan 8—Jan 14 D D D D W - - Jan 15—Jan 21 D D D D W - - Jan 22—Jan 28 D D D D M - - Jan 2

Seite 39

Copyright © Acronis, Inc., 2000-2009 133 At all times, a backup is not deleted until all backups that directly depend on it become subject to delet

Seite 40 - 2.10.1. Acronis Secure Zone

134 Copyright © Acronis, Inc., 2000-2009 • Start backup at: 6:00 PM • Back up on: Workdays • Weekly/monthly: Friday • Keep backups: o Daily: 1

Seite 41

Copyright © Acronis, Inc., 2000-2009 135 • Start backup at: 12:00 PM • Back up on: Friday • Weekly/monthly: Friday • Keep backups: o Daily: 1

Seite 42 - Restore)

136 Copyright © Acronis, Inc., 2000-2009 • Recur: Every 1 day • Frequency: Once at 6 PM Number of levels: 4 This is how the first 14 days (or 14

Seite 43 - Getting Universal Restore

Copyright © Acronis, Inc., 2000-2009 137 4 1 2 1 3 1 2 1 4 1 2 1 A new level 3 differential backup has not yet been created, so the back

Seite 44 - Usage scenarios

138 Copyright © Acronis, Inc., 2000-2009 Retention rules Specifies what retention rules will be applied to the archive. For example, the cleanup p

Seite 45 - How to use

Copyright © Acronis, Inc., 2000-2009 139 Full backup: Schedule: Monthly, every Last Sunday of the month, at 9:00 PM Incremental: Schedule: Weekly,

Seite 46 - 3. Options

14 Copyright © Acronis, Inc., 2000-2009 Components for a managed machine (agents) These are applications that perform data backup, recovery and oth

Seite 47 - 3.1.4. Number of tasks

140 Copyright © Acronis, Inc., 2000-2009 If you have also specified the retention rules in your backup scheme, the scheme will result in four tasks

Seite 48 - 3.2. Machine options

Copyright © Acronis, Inc., 2000-2009 141 imported to XenServer. The VMware Workstation machine can be converted to the open virtualization format (

Seite 49 - 3.2.1.2. SNMP notifications

142 Copyright © Acronis, Inc., 2000-2009 Files (p. 152) You may have to specify credentials for the destination. Skip this step when operating on

Seite 50 - Windows

Copyright © Acronis, Inc., 2000-2009 143 6.3.1. Task credentials Provide credentials for the account under which the task will run. To specify cre

Seite 51

144 Copyright © Acronis, Inc., 2000-2009 o If the archive is stored on an FTP or SFTP server, type the server name or address in the Path field as

Seite 52

Copyright © Acronis, Inc., 2000-2009 145 2. [OPTIONAL] The Acronis Active Restore check box is available when recovering Windows starting from Win

Seite 53 - 3.3.1.1. Archive protection

146 Copyright © Acronis, Inc., 2000-2009 o Use the task credentials The program will access the location using the credentials of the task account

Seite 54 - 3.3.1.3. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 147 (p. 151) section. Check the settings and make changes if necessary. Then you proceed to the regular disk

Seite 55 - Pre-backup command

148 Copyright © Acronis, Inc., 2000-2009 The program will generate a new NT signature for the target hard disk drive. • Recover from backup The pr

Seite 56 - Post-backup command

Copyright © Acronis, Inc., 2000-2009 149 On selecting this, you specify the virtualization server and the target virtual machine. Then you proceed

Seite 57 - Pre-data capture command

Copyright © Acronis, Inc., 2000-2009 15 volumes; changing a disk partitioning style between MBR and GPT or changing a disk label, can be performed

Seite 58 - Post-data capture command

150 Copyright © Acronis, Inc., 2000-2009 Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and

Seite 59 - • Do not create a snapshot

Copyright © Acronis, Inc., 2000-2009 151 6.3.6.3. Virtual machine type / virtualization server selection The new virtual machine can be created ei

Seite 60 - 3.3.1.8. Compression level

152 Copyright © Acronis, Inc., 2000-2009 set by the virtualization product. You can add virtual disks to the machine configuration or, in some case

Seite 61 - HDD writing speed

Copyright © Acronis, Inc., 2000-2009 153 Select this check box to skip files whose names match any of the criteria — called file masks — in the lis

Seite 62 - 3.3.1.10. Notifications

154 Copyright © Acronis, Inc., 2000-2009 6.3.7. Access credentials for destination To specify credentials 1. Select one of the following: o Use

Seite 63 - Messenger service (WinPopup)

Copyright © Acronis, Inc., 2000-2009 155 DVD supplied by the hardware vendor or download the drivers from the vendor’s Web site. The driver files s

Seite 64 - SNMP notifications

156 Copyright © Acronis, Inc., 2000-2009 Drivers for a virtual machine When recovering a system to a new virtual machine, the Universal Restore tec

Seite 65

Copyright © Acronis, Inc., 2000-2009 157 6. In VM server, select the type of the new virtual machine to be created or on which virtualization serv

Seite 66 - 3.3.1.13. Backup splitting

158 Copyright © Acronis, Inc., 2000-2009 • Windows was recovered to a dynamic volume that cannot be bootable Solution: Recover Windows to a basic,

Seite 67 - 3.3.1.15. Media components

Copyright © Acronis, Inc., 2000-2009 159 Such system cannot boot because its kernel tries to mount the root file system at the LVM volume. Solution

Seite 68 - 3.3.1.16. Error handling

16 Copyright © Acronis, Inc., 2000-2009 1.4. Supported operating systems Acronis Backup & Recovery 10 Management Console • Windows Professiona

Seite 69 - 3.3.1.17. Dual destination

160 Copyright © Acronis, Inc., 2000-2009 LILO 1. Perform step 1 described above. 2. Edit the LILO configuration file if the number of the partiti

Seite 70 - Skip the task execution

Copyright © Acronis, Inc., 2000-2009 161 • Not all of the files are recovered. The most likely cause of the problem is an insufficient amount of m

Seite 71

162 Copyright © Acronis, Inc., 2000-2009 bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure that the

Seite 72 - Reset archive bit

Copyright © Acronis, Inc., 2000-2009 163 After you configure all the required settings, click OK to create the validation task. 6.4.1. Task crede

Seite 73

164 Copyright © Acronis, Inc., 2000-2009 Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a

Seite 74 - 3.3.2.1. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 165 • To select a local folder, expand the Local folders group and click the required folder. • To select a

Seite 75 - Pre-recovery command

166 Copyright © Acronis, Inc., 2000-2009 6.4.6. When to validate As validation is a resource-intensive operation, it makes sense to schedule valid

Seite 76 - 3.3.2.2. Recovery priority

Copyright © Acronis, Inc., 2000-2009 167 Mount settings Volumes (p. 168) Select volumes to mount and configure the mount settings for every volume:

Seite 77 - 3.3.2.4. Notifications

168 Copyright © Acronis, Inc., 2000-2009 While you are reviewing the location content, archives can be added, deleted or modified by another user o

Seite 78 - 3.3.2.5. Event tracing

Copyright © Acronis, Inc., 2000-2009 169 2. Click on the selected volume to set its mounting parameters. o Access mode - choose the mode you want

Seite 79

Copyright © Acronis, Inc., 2000-2009 17 1.6. Technical support As part of a purchased annual Support charge you are entitled to Technical Support a

Seite 80 - 3.3.2.6. Error handling

170 Copyright © Acronis, Inc., 2000-2009 6.7.1. Creating Acronis Secure Zone You can create Acronis Secure Zone while the operating system is runn

Seite 81

Copyright © Acronis, Inc., 2000-2009 171 To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone.

Seite 82 - 4. Vaults

172 Copyright © Acronis, Inc., 2000-2009 Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…". If the

Seite 83 - 4.1. Personal vaults

Copyright © Acronis, Inc., 2000-2009 173 6.7.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 214). Once

Seite 84 - Vault content

174 Copyright © Acronis, Inc., 2000-2009 6.7.2.2. Decreasing Acronis Secure Zone To decrease Acronis Secure Zone 1. On the Manage Acronis Secure

Seite 85

Copyright © Acronis, Inc., 2000-2009 175 • back up offline any data that cannot be backed up online because of restricted access, being permanentl

Seite 86 - How can I merge two vaults?

176 Copyright © Acronis, Inc., 2000-2009 • Windows XP Professional with Service Pack 2 (PE 1.5) • Windows Server 2003 with Service Pack 1 (PE 1.6

Seite 87 - 4.2. Common operations

Copyright © Acronis, Inc., 2000-2009 177 When using the media builder, you have to specify: 1. The Acronis bootable components to be placed on the

Seite 88

178 Copyright © Acronis, Inc., 2000-2009 • Gateway • DNS server • WINS server. Once the bootable agent starts on a machine, the configuration is

Seite 89

Copyright © Acronis, Inc., 2000-2009 179 If the port has not been pre-configured, the agent uses the default port number (9876.) This port is also

Seite 90 - 5. Scheduling

Copyright © Acronis, Inc., 2000-2009 18 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders

Seite 91 - 5.1. Daily schedule

180 Copyright © Acronis, Inc., 2000-2009 • Windows PE 2005 (1.6) (Windows Server 2003 with Service Pack 1). To add Acronis Plug-in to WinPE 1.x: 1

Seite 92

Copyright © Acronis, Inc., 2000-2009 181 run the copype.cmd script to create a folder with Windows PE files. For example, from a command prompt, t

Seite 93 - 5.2. Weekly schedule

182 Copyright © Acronis, Inc., 2000-2009 6.8.1.4. Building Bart PE with Acronis Plug-in from Windows distribution 1. Get the Bart PE builder. 2.

Seite 94

Copyright © Acronis, Inc., 2000-2009 183 6.8.3. Working under bootable media Operations on a machine booted with bootable media are very similar t

Seite 95

184 Copyright © Acronis, Inc., 2000-2009 6.9.1. Basic precautions To avoid any possible disk and volume structure damage or data loss, please take

Seite 96 - 5.3. Monthly schedule

Copyright © Acronis, Inc., 2000-2009 185 When you need to perform a disk management operation on such machine, it is necessary to specify for which

Seite 97

186 Copyright © Acronis, Inc., 2000-2009 • Disk conversion: GPT to MBR (p. 190) - converts a GPT partition table to MBR • Disk conversion: Basic

Seite 98

Copyright © Acronis, Inc., 2000-2009 187 6.9.5.2. Basic disk cloning Sometimes it is necessary to transfer all the disk data onto a new disk. It c

Seite 99

188 Copyright © Acronis, Inc., 2000-2009 source disk data to the target disk is impossible even with the proportional resizing of the volumes, then

Seite 100 - 5.5. Conditions

Copyright © Acronis, Inc., 2000-2009 189 If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2.

Seite 101 - 5.5.1. User is idle

Copyright © Acronis, Inc., 2000-2009 19 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Seite 102 - 5.5.3. Fits time interval

190 Copyright © Acronis, Inc., 2000-2009 6.9.5.4. Disk conversion: GPT to MBR If you plan to install an OS that does not support GPT disks, conver

Seite 103 - 5.5.4. User logged off

Copyright © Acronis, Inc., 2000-2009 191 System disk conversion Acronis Disk Director Lite does not require an operating system reboot after basic

Seite 104 - Example:

192 Copyright © Acronis, Inc., 2000-2009 2. The machine runs this operating system. Dynamic to basic conversion of the disk, comprising of system

Seite 105 - 6. Direct management

Copyright © Acronis, Inc., 2000-2009 193 A volume created from free space on a single physical disk. It can consist of one region on the disk or se

Seite 106

194 Copyright © Acronis, Inc., 2000-2009 Create volume wizard The Create volume wizard lets you create any type of volume (including system and a

Seite 107 - Activities

Copyright © Acronis, Inc., 2000-2009 195 To create a RAID-5 volume: o Select three destination disks to create the volume on. After you choose the

Seite 108 - Backup plan execution states

196 Copyright © Acronis, Inc., 2000-2009 If you are creating a basic volume, which can be made into a system volume, this page will be different, g

Seite 109 - Backup plan statuses

Copyright © Acronis, Inc., 2000-2009 197 6.9.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volum

Seite 110 - Task states

198 Copyright © Acronis, Inc., 2000-2009 6.9.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volum

Seite 111 - Task statuses

Copyright © Acronis, Inc., 2000-2009 199 3. If you click OK to proceed with the Format Volume operation, you'll add a pending operation of fo

Seite 112

Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Seite 113

20 Copyright © Acronis, Inc., 2000-2009 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Seite 114

Copyright © Acronis, Inc., 2000-2009 200 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Seite 115 - To show or hide columns

Copyright © Acronis, Inc., 2000-2009 201 Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user rebo

Seite 116 - Task details

202 Copyright © Acronis, Inc., 2000-2009 Backup operation An operation that creates a copy of the data that exists on a machine's (p. 210)

Seite 117 - Progress

Copyright © Acronis, Inc., 2000-2009 203 By applying a policy to a group of machines, the administrator deploys multiple backup plans with a single

Seite 118 - Backup plan details

204 Copyright © Acronis, Inc., 2000-2009 • deploy an operating system on bare metal • create basic or dynamic volumes (p. 208) on bare metal • b

Seite 119 - 6.1.3. Log

Copyright © Acronis, Inc., 2000-2009 205 Centralized vault A networked location allotted by the management server (p. 210) administrator to serve a

Seite 120 - • Click View Details

206 Copyright © Acronis, Inc., 2000-2009 D Deduplicating vault A managed vault (p. 210) in which deduplication (p. 206) is enabled. Deduplication

Seite 121 - 6.1.3.3. Log entry details

Copyright © Acronis, Inc., 2000-2009 207 Disk group A number of dynamic disks (p. 207) that store the common configuration data in their LDM databa

Seite 122 - 6.2. Creating a backup plan

208 Copyright © Acronis, Inc., 2000-2009 Disk 1 MBR LDM database 1 MB Disk 2 Protec-tive MBR GPT Microsoft Reserved Partition (MSR) LDM da

Seite 123 - Backup options

Copyright © Acronis, Inc., 2000-2009 209 Dynamic volume Any volume located on dynamic disks (p. 207), or more precisely, on a disk group (p. 206).

Seite 124 - 6.2.3. Source type

Copyright © Acronis, Inc., 2000-2009 21 parallel recovery) first appeared in Acronis Backup & Recovery 10; the previous Acronis products do not

Seite 125 - 6.2.4. Items to back up

210 Copyright © Acronis, Inc., 2000-2009 I Image The same as Disk backup (p. 206). Incremental backup A backup (p. 201) that stores changes to th

Seite 126 - To specify credentials

Copyright © Acronis, Inc., 2000-2009 211 Management server (Acronis Backup & Recovery 10 Management Server) A central server that drives data p

Seite 127 - 6.2.6. Exclusions

212 Copyright © Acronis, Inc., 2000-2009 Registered machine A machine (p. 210) managed by a management server (p. 210). A machine can be registered

Seite 128 - 6.2.7. Archive

Copyright © Acronis, Inc., 2000-2009 213 Since the cleanup schedule exists on the machine (p. 210) the agent (p. 201) resides on, and therefore use

Seite 129 - 3. Naming the new archive

214 Copyright © Acronis, Inc., 2000-2009 • when the machine is booted with Acronis Startup Recovery Manager (p. 200) (using F11) or • the image b

Seite 130 - 6.2.9. Backup schemes

Copyright © Acronis, Inc., 2000-2009 215 W WinPE (Windows Preinstallation Environment) A minimal Windows system based on any of the following kerne

Seite 131 - 6.2.9.3. Simple scheme

Index A About Windows loaders • 160 Access credentials • 166, 168 Access credentials for archive location • 123, 129 Access credentials for destinat

Seite 132 - Parameters

Copyright © Acronis, Inc., 2000-2009 217 Backup schemes • 123, 130 Backup selection • 162, 164, 166, 168 Backup splitting • 52, 66 Basic concepts •

Seite 133 - Examples

218 Copyright © Acronis, Inc., 2000-2009 GPT to MBR • 186, 190 MBR to GPT • 185, 189 Disk destination • 147 Disk group • 35, 207, 209 Disk initiali

Seite 134

Copyright © Acronis, Inc., 2000-2009 219 M Machine • 201, 202, 203, 204, 207, 208, 210, 211, 212, 213, 214 Machine options • 48, 64, 65, 79 Main ar

Seite 135 - Example

22 Copyright © Acronis, Inc., 2000-2009 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Seite 136 - Roll-back period

220 Copyright © Acronis, Inc., 2000-2009 Run backup plan • 112, 116 Running Acronis Disk Director Lite • 184 S Scheduling • 69, 90, 131, 140, 166 S

Seite 137

Copyright © Acronis, Inc., 2000-2009 221 Validation rules • 202, 214 Vault • 18, 41, 173, 211, 214 Vaults • 35, 82, 162, 173 Views • 11 Virtual mac

Seite 138

Copyright © Acronis, Inc., 2000-2009 23 of only full backups. A full backup is self-sufficient - you do not need access to any other backup to reco

Seite 139 - Resulting tasks

24 Copyright © Acronis, Inc., 2000-2009 An incremental or differential backup created after disk defragmentation might be considerably larger than

Seite 140 - 6.3. Recovering data

Copyright © Acronis, Inc., 2000-2009 25 A centralized backup plan owner is the management server administrator who created or last modified the cen

Seite 141 - Where to recover

26 Copyright © Acronis, Inc., 2000-2009 A scheduled or postponed task has to run anyway, regardless if any user is logged on or not (for example, t

Seite 142 - Recovery options

Copyright © Acronis, Inc., 2000-2009 27 Assume you select backing up at 8:00 PM on workdays. Here is the total schedule you have defined. “B” stand

Seite 143 - 6.3.2. Archive selection

28 Copyright © Acronis, Inc., 2000-2009 Backup tasks created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays a

Seite 144 - 6.3.4. Content selection

Copyright © Acronis, Inc., 2000-2009 29 An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday

Seite 145 - 6.3.4.2. Files selection

Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 6 1.1. Acronis Backu

Seite 146 - 6.3.6.1. Disks

30 Copyright © Acronis, Inc., 2000-2009 The backups that outlive their nominal lifetime because of dependencies are marked pink. The initial full b

Seite 147 - NT signature

Copyright © Acronis, Inc., 2000-2009 31 other move (moves 1, 3, 5, 7, 9, 11...), the second ring at intervals of four moves (moves 2, 6, 10...), th

Seite 148 - 6.3.6.2. Volumes

32 Copyright © Acronis, Inc., 2000-2009 • incremental backups on first level (A) - to gain time and storage savings for the most frequent backup o

Seite 149 - Volume properties

Copyright © Acronis, Inc., 2000-2009 33 2.7. Retention rules The backups produced by a backup plan make an archive. The two retention rules describ

Seite 150 - Properties

34 Copyright © Acronis, Inc., 2000-2009 There is a certain risk that all but one backup will be deleted if the maximum archive size is set improper

Seite 151 - Storage

Copyright © Acronis, Inc., 2000-2009 35 When deletion of a backup affects other backups, one of the following rules is applied: • Retain the backu

Seite 152 - Exclusions

36 Copyright © Acronis, Inc., 2000-2009 • simple/spanned • striped (RAID 0) • mirrored (RAID 1) • a mirror of stripes (RAID 0+1) • RAID 5. Acr

Seite 153 - Overwriting

Copyright © Acronis, Inc., 2000-2009 37 Assume you are going to recover a 30GB striped volume to a disk group consisting of two disks. Each disk ha

Seite 154 - 6.3.9. Universal Restore

38 Copyright © Acronis, Inc., 2000-2009 You might want to change the target volume type (basic, simple/spanned, striped, mirrored, RAID 0+1, RAID 5

Seite 155 - Universal Restore settings

Copyright © Acronis, Inc., 2000-2009 39 ATIE 9.5 + + + + ATIE 9.7 + + + + ABR10 + + + + Tape written on a tape device through... Backup

Seite 156

4. Vaults ... 82 4.1. Personal vaul

Seite 157

40 Copyright © Acronis, Inc., 2000-2009 5. Because the presence of an operating system cannot be detected in a backup located on a tape, Acronis U

Seite 158

Copyright © Acronis, Inc., 2000-2009 41 Managing the Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 214). Once creat

Seite 159 - # vim /boot/grub/grub.conf

42 Copyright © Acronis, Inc., 2000-2009 Once the Acronis Secure Zone is created, you can activate or deactivate the Acronis Startup Recovery Manage

Seite 160 - Windows Vista/2008

Copyright © Acronis, Inc., 2000-2009 43 Universal Restore searches for drivers in the network folders you specify, on removable media and in the de

Seite 161

44 Copyright © Acronis, Inc., 2000-2009 Universal Restore for the other product editions is purchased separately, has its own license, and is insta

Seite 162 - When to validate

Copyright © Acronis, Inc., 2000-2009 45 Some machines are being used as storage facilities, where the operating system claims a small space segment

Seite 163 - 6.4.2. Archive selection

Copyright © Acronis, Inc., 2000-2009 46 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph

Seite 164 - 6.4.4. Location selection

Copyright © Acronis, Inc., 2000-2009 47 The option defines whether to display the pop-up messages about task run results: successful completion, fa

Seite 165 - Using the archives table

48 Copyright © Acronis, Inc., 2000-2009 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem

Seite 166 - 6.5. Mounting an image

Copyright © Acronis, Inc., 2000-2009 49 You can further override the settings set in the default backup and recovery options, when creating a backu

Seite 167 - 6.5.1. Archive selection

6.4.1. Task credentials...

Seite 168 - 6.5.4. Volume selection

50 Copyright © Acronis, Inc., 2000-2009 o Community – type the name of the SNMP community to which both the host running SNMP management applicati

Seite 169 - 6.7. Acronis Secure Zone

Copyright © Acronis, Inc., 2000-2009 51 To view and change the default backup options, connect the console to the managed machine and then select O

Seite 170

52 Copyright © Acronis, Inc., 2000-2009 Backup splitting (p. 66) + + + + File-level security (p. 66): Preserve files’ security settings in archi

Seite 171 - To disable password

Copyright © Acronis, Inc., 2000-2009 53 Event tracing: Windows events log (p. 64) + + - - SNMP (p. 64) + + - - 3.3.1.1. Archive protection

Seite 172

54 Copyright © Acronis, Inc., 2000-2009 To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidde

Seite 173 - • examine backup content

Copyright © Acronis, Inc., 2000-2009 55 The following scheme illustrates when pre/post commands are executed. Pre-backup command Backup Post-backu

Seite 174 - 6.8. Bootable media

56 Copyright © Acronis, Inc., 2000-2009 Result Preset Perform the backup only after the command is successfully executed. Fail the task if the co

Seite 175 - PE-based bootable media

Copyright © Acronis, Inc., 2000-2009 57 Using the pre/post data capture commands, you can suspend and resume a database or application that is not

Seite 176 - Using Bart PE

58 Copyright © Acronis, Inc., 2000-2009 executed. Fail the task if the command execution fails. result. Post-data capture command To specify a co

Seite 177 - Network settings

Copyright © Acronis, Inc., 2000-2009 59 Note: Files that are stored on network shares are always backed up one by one. The preset is: Create snapsh

Seite 178 - Network port

Copyright © Acronis, Inc., 2000-2009 6 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A

Seite 179 - To remove drivers:

60 Copyright © Acronis, Inc., 2000-2009 backup applications. Examples of VSS-aware database servers are Microsoft Exchange and Microsoft SQL Server

Seite 180 - 2.0 is 512MB

Copyright © Acronis, Inc., 2000-2009 61 • Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You ma

Seite 181

62 Copyright © Acronis, Inc., 2000-2009 • Click Writing speed stated as a percentage of the maximum speed of the destination hard disk, and then d

Seite 182

Copyright © Acronis, Inc., 2000-2009 63 o When backup completes successfully – to send a notification when the backup task has completed success

Seite 183 - 6.9. Disk management

64 Copyright © Acronis, Inc., 2000-2009 To configure WinPopup notifications: 1. Select the Send WinPopup notifications check box. 2. In the Machi

Seite 184 - 6.9.1. Basic precautions

Copyright © Acronis, Inc., 2000-2009 65 This option is not available when operating under the bootable media. The option defines whether the agent(

Seite 185 - 6.9.5. Disk operations

66 Copyright © Acronis, Inc., 2000-2009 3.3.1.13. Backup splitting This option is effective for Windows and Linux operating systems and bootable m

Seite 186

Copyright © Acronis, Inc., 2000-2009 67 the user who encrypted the files/folders will be able to read them. Decryption may also be useful if you ar

Seite 187 - 6.9.5.2. Basic disk cloning

68 Copyright © Acronis, Inc., 2000-2009 want more functionality during recovery. You will be able to configure the recovery operation in the same w

Seite 188 - Using advanced options

Copyright © Acronis, Inc., 2000-2009 69 3.3.1.17. Dual destination This option is effective for both Windows and Linux operating systems, when the

Seite 189

Copyright © Acronis, Inc., 2000-2009 7 1.2. Getting started Direct management 1. Install Acronis Backup & Recovery 10 Management Console and A

Seite 190

70 Copyright © Acronis, Inc., 2000-2009 Wait until the conditions are met With this setting, the scheduler starts monitoring the conditions and lau

Seite 191 - System disk conversion

Copyright © Acronis, Inc., 2000-2009 71 Stop executing the backup plan The plan's schedule will be temporarily disabled so that you have time

Seite 192 - 6.9.6. Volume operations

72 Copyright © Acronis, Inc., 2000-2009 The preset is: Disabled. The destination CD/DVD can be ejected or the tape can be dismounted after the back

Seite 193

Copyright © Acronis, Inc., 2000-2009 73 source) This option is effective for Windows and Linux operating systems and bootable media, when the backu

Seite 194 - Select destination disks

74 Copyright © Acronis, Inc., 2000-2009 Recovery priority (p. 76) + + - - File-level security (p. 76): Recover files with their security setting

Seite 195 - Set the volume options

Copyright © Acronis, Inc., 2000-2009 75 The program does not support interactive commands, i.e. commands that require user input (for example, &quo

Seite 196 - 6.9.6.2. Delete volume

76 Copyright © Acronis, Inc., 2000-2009 Post-recovery command To specify a command/executable file to be executed after the recovery is completed

Seite 197 - 6.9.6.3. Set active volume

Copyright © Acronis, Inc., 2000-2009 77 The preset is: Recover files with their security settings. If the file NTFS permissions were preserved duri

Seite 198 - 6.9.6.6. Format volume

78 Copyright © Acronis, Inc., 2000-2009 • User name – enter the user name • Password – enter the password. o Select the Use the specified outgoi

Seite 199 - 6.9.7. Pending operations

Copyright © Acronis, Inc., 2000-2009 79 Windows event log This option is effective only in Windows operating systems. This option is not available

Seite 200 - Glossary

8 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Console - Welcome screen Key elements of the console workspace

Seite 201

80 Copyright © Acronis, Inc., 2000-2009 • Send SNMP notifications individually for recovery operation events – to send the events of the recovery

Seite 202 - Backup policy (Policy)

Copyright © Acronis, Inc., 2000-2009 81 The preset is Enabled. This option defines whether to recover the files’ date and time from the archive or

Seite 203 - Bootable media

Copyright © Acronis, Inc., 2000-2009 82 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault i

Seite 204 - Centralized task

Copyright © Acronis, Inc., 2000-2009 83 A vault is called personal if it was created using direct connection of the console to a managed machine. P

Seite 205 - Consolidation

84 Copyright © Acronis, Inc., 2000-2009 4.1.1. Working with the "Personal vault" view This section briefly describes the main elements o

Seite 206 - Disk backup (Image)

Copyright © Acronis, Inc., 2000-2009 85 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplicat

Seite 207 - Dynamic disk

86 Copyright © Acronis, Inc., 2000-2009 4.1.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the

Seite 208 - Dynamic group

Copyright © Acronis, Inc., 2000-2009 87 4.2. Common operations 4.2.1. Operations with archives stored in a vault To perform any operation with an

Seite 209 - Full backup

88 Copyright © Acronis, Inc., 2000-2009 To Do View backup content in a separate window Click View content. In the Backup Content window, examine

Seite 210

Copyright © Acronis, Inc., 2000-2009 89 What happens if I delete a backup that is a base of an incremental or differential backup? To preserve arch

Seite 211

Copyright © Acronis, Inc., 2000-2009 9 Navigation tree The Navigation tree enables you to navigate across the program views. Views depend on whethe

Seite 212

Copyright © Acronis, Inc., 2000-2009 90 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Seite 213 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2009 91 All users are logged off The specified period of time has passed since the last successful backup completed

Seite 214 - Virtual machine

92 Copyright © Acronis, Inc., 2000-2009 Advanced scheduling settings are available only for machines registered on Acronis Backup & Recovery 10

Seite 215 - • Windows Vista (PE 2.0)

Copyright © Acronis, Inc., 2000-2009 93 • first at 8 AM • second at 12 PM (noon) • third at 3 PM • fourth at 5 PM • fifth at 7 PM The obvious

Seite 216

94 Copyright © Acronis, Inc., 2000-2009 Every: <...> From: <...> Until: <...> Set up how many times the task will be run during t

Seite 217

Copyright © Acronis, Inc., 2000-2009 95 2. Once at: 09:00:00 PM. 3. Effective: From: empty. If you have created the task, say on Monday at 11:30

Seite 218

96 Copyright © Acronis, Inc., 2000-2009 To: not set. Third schedule 1. Every: 1 week(s) on: Sat, Sun. 2. Once at: 09:00:00 PM. 3. Effective: Fro

Seite 219

Copyright © Acronis, Inc., 2000-2009 97 Run the task once at 10 PM on the last day of every month. The schedule's parameters are set up as fol

Seite 220

98 Copyright © Acronis, Inc., 2000-2009 First schedule 1. Months: December, January, February. 2. On: <All> <All workdays> 3. Once a

Seite 221

Copyright © Acronis, Inc., 2000-2009 99 Event source Specifies the event source, which typically indicates the program or the system component that

Kommentare zu diesen Handbüchern

Keine Kommentare