Acronis® Backup & Recovery ™ 10 dvanced Workstation A User's Guide
• Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the All machines group. This way you will dep
• Click Writing speed stated as a percentage of the maximum speed of the destination hard disk, and then drag the slider or select a percentage in t
o When backup completes successfully – to send a notification when the backup task has completed successfully o When backup fails – to send a notif
2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported. Under Send notifi
The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple
The option defines how a backup can be split. The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis B
Preserve file security settings in archives This option defines whether to back up NTFS permissions for files along with the files. The preset is: E
changing disk label. Adding this component to the media will enable you to prepare the disk configuration on a machine before recovering the data.
When dual destination is enabled, the agent will automatically copy each backup being created locally to the secondary destination such as a network
Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up d
In addition, the program can try to execute the failed task again. Select the Restart a failed task check box and specify the number of attempts and
Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate
If the console is connected to the management server The Use a separate tape set option has more precise definitions. So for the backup policy to be
When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To dis
When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup process is completed. For example, if the mach
Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also from a disk backup) Disk recovery File recovery (also
3.4.2.1. Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to
Result Preset Perform the recovery only after the command is successfully executed. Fail the task if the command execution failed. Perform the reco
• Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine • Normal – to run the
o From - type the e-mail address of the user from whom the message will be sent. If you leave this field empty, messages will be constructed as if t
4. Click Send Test WinPopup Message to check if the settings are correct. 3.4.2.5. Event tracing It is possible to duplicate log events of the rec
To select whether to send the recovery operations events to the SNMP managers: Choose one of the following: • Use the setting set in the Machine opt
Views for a management server When the console is connected to a management server, the following views are available in the navigation tree. • [Ma
Set current date and time for recovered files This option is effective only when recovering files. The preset is Enabled. This option defines whether
Copyright © Acronis, Inc., 2000-2009 121 3.4.2.8. VM power management These options are effective for virtual machines residing on the virtualiza
4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metad
A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each manag
Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the machine where the storage node is installed. Th
• [for managed vaults only] deduplication (p. 64) state (On, Off) • [for managed vaults only] encryption state (Yes, No) Vault content The Vault
2 Click Edit. Depending on the vault you select (managed or unmanaged), the respective Edit page will be opened: • The Edit managed vault page le
4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the following steps Vault Name Specify a unique name fo
o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o on a Network Attached Storage (NAS) o on
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the di
Bars '[Item's name]' actions Contains a set of actions that can be performed on the items selected in any of the navigation views. Cli
archives in the vault, creates and fills up the database corresponding to the vault, and starts managing the vault. When deleting a managed vault, yo
accessing the media. It is possible to view the content of a backup archive located on a tape through the console, even if a tape library is turned o
4.1.3.3. Limitations Limitations of tape library usage are the following: 1. The consolidation (p. 343) operation is not possible for archives loca
Recovery 10. The storage node will locate all tapes written in “Acronis” format into the Acronis pool at the Inventory (p. 136) operation. Acronis Ba
Tape library as a managed vault To enable data protection operations using a tape library you have to create a managed vault on the tape library. You
Actions with archives on tapes in a library The following are common functions for archive data management for a backup archive selected in the Centr
Keep in mind that a data recovery operation may require access to a number of tapes. For example, data recovery from an incremental backup commonly m
Perform the procedure every time you load new tapes into tape library slots. Rescan As stated above the storage node keeps information about tapes a
4.1.3.7. Tape options These options are effective when the backup destination is a managed vault located on a tape library. Tape options enable you
• For each full backup The preset is: Disabled. When this option is enabled, each full backup will be written onto a free tape. The tape will be loa
Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. &quo
If your backup archive must provide recovery with daily resolution for the last several days, weekly resolution for the last several weeks and monthl
Legend for the case example figures Any daily/incremental backup (16 GB) is shown in the figures as a green rectangle: . Weekly/differential backups
• the Always use a free tape: For each full backup option is cleared • the Always use a free tape: For each incremental backup option is cleared •
Keep in mind, that the Cleanup task is launched after each backup operation for the GFS scheme. This task deletes all the outdated backups. The next
The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the
GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set option is selected • the Always use a free tape:
As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups di
These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of the rotation scheme that uses 8 tapes for
16 weekly sessions so it ensures the roll-back period equal 112 days. Tape rotation for the second case includes 128 daily sessions, i.e. it allows t
The figure below shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options. The recurring part of the scheme contains
"Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Infor
• the Always use a free tape: For each incremental backup option is cleared • the Always use a free tape: For each differential backup option is cl
• the Always use a free tape: For each full backup option is selected • the Always use a free tape: For each incremental backup option is selected
• average size of incremental backups • average size of differential backups • compression level specified for backing up the data • tape rotatio
Tape planning: Example 2 Imagine the case with the following features: • full backup size is F_GB • average size of incremental backups is I_GB •
you need to do is to perform the inventory (p. 136) procedure for the managed vault on the library where the tapes were placed to. 2. If you move ta
Metadata The .meta folder is created during backup in every personal vault. This folder contains additional information about archives and backups s
Bars of the "Actions and tools" pane • [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates ac
4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the vault being created. 2. [Optional] In th
All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the
Validate a backup Click Validate. The Validation (p. 230) page will be opened with the pre-selected backup as a source. Validation of a file backup
Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The b
160 Copyright © Acronis, Inc., 2000-2009 To Do Sort backup archives by any column Click the column's header to sort the archives in ascending
5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’
The specified period of time has passed since the last successful backup completed The scheduler behavior, in case the event occurs but the condition
Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day
The obvious way is to add five simple schedules. If you spend one minute for examination, you can think out a more optimal way. As you can see, the t
To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of we
week. For more details, see the Full and incremental backups plus cleanup example in the Custom backup scheme (p. 208) section. Several weekly schedu
5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a monthly schedule In the Schedule area, selec
This schedule is widely used when creating a custom backup scheme. The "Last day of every month" schedule is added to the full backups, whi
2. On: <All> <All workdays>. 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Effective: From: 11/01/2009. To: not set. Thi
Acronis Backup & Recovery 10 includes three types of components. Components for a managed machine (agents) These are applications that perform da
Delay values range from zero to the specified maximum delay value, and are determined according to the chosen distribution method. The delay value fo
5. To enable the use of the Wake-on-LAN functionality, select the Use Wake-on-LAN check box. 6. To distribute the centralized backup tasks' st
• Event type: Error • Event ID: 7 Important: To ensure that such a task will complete despite the presence of bad blocks, you must make the task ig
5.6. Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with respect to certain conditions. Once a specifi
• Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s). As a result, (1) If the user becomes idle before 9P
specified time interval, or logs off at any other time – do not back up the users' data, i.e. skip task execution. • Event: When logging off, T
176 Copyright © Acronis, Inc., 2000-2009 (1) If all users are logged off at 8PM, the backup task will start at 8PM. (2) If the last user logs off b
6. Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection
Check connectivity to the server and run Acronis License Server to manage licenses. license server. Trial period is over Insert a full license key
Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on thi
operational machine will be placed in the folder you select. You can start the machine using the respective virtualization software or prepare the ma
• Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 183) section for detai
A backup plan status is derived from the results of the last run of the plans' tasks. State How it is determined How to handle 1 Error At l
Any running task can put itself into the Need interaction state when it needs human interaction such as changing media or ignoring a read error. The
• Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last result is "Succeeded with warning"
Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to be run. Running the backup plan starts t
Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 193), except for the following limitation
Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can
Filter plans/tasks by name or owner. Type a plan's/task's name or an owner's name in the field below the corresponding header name. A
Types of tasks Task name Description Backup (disk) Backing up disks and volumes Backup (file) Backing up files and folders Backup (virtual machine
Provides details on the selected backup: when it was created, its type (full, incremental, differential), information on the archive and the vault th
1.3.4.1. Management Server Acronis Backup & Recovery 10 Management Server is the central server that drives data protection within the enterpris
Destination The Destination tab provides the following information: • Location - name of the vault or path to the folder, where the archive is store
6.1.3.1. Actions on log entries All the operations described below are performed by clicking the corresponding items on the log toolbar. All these
Filter log entries by type Press or release the following toolbar buttons: to filter error messages to filter warning messages to filter informati
The log entry's details that you copy will have the appearance as follows: ---------------------------Log Entry Details-------------------------
Exclusions (p. 197) [Optional] Set up exclusions for the specific types of files you do not wish to back up. To access this option, select the Advanc
After that, you might be prompted for the password (p. 195). The plan you have created will be accessible for examination and managing in the Backup
Disks/volumes Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up disks an
A disk backup stores all volumes of the selected disk (including hidden volumes such as the vendor's maintenance partitions) and the zero track
To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidden files and folders Select this check box
• To back up data to a network share, expand the Network folders group, select the required networked machine and, then click the shared folder. If
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron
Setting up the storage infrastructure Install the storage nodes, add them to the management server (the procedure is similar to the managed machine r
Why two or more plans should not back up to the same archive 1. Backing up different sources to the same archive makes using the archive difficult f
• Simple – to schedule when and how often to backup data and specify retention rules. • Grandfather-Father-Son – to use the Grandfather-Father-Son
Backup Set up the backup schedule - when and how often to back up the data. To learn more about setting up the schedule, see the Scheduling (p. 161)
Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies the days on which to perform a backup. The
• Weekly/monthly: Saturday (for example) • Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly: indefinitely As a result, an archive of da
Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months. The following GFS scheme suits suc
Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 162), weekly (p. 164), or monthly (p. 167
Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to hav
6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • Custom schedule and retention rules Paramete
Full and incremental backup plus cleanup With the following scheme, the archive will consist of weekly full backups and daily incremental backups. We
The network booting: • Eliminates the need to have a technician onsite to install the bootable media (p. 341) into the system that has to be booted
Cleanup schedule: Monthly, on the Last day of All months, at 10:00 PM By default, a backup is not deleted as long as it has dependent backups that mu
6.3. Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running th
Select the archive to recover data from. Data type (p. 214) Applies to: disk recovery Choose the type of data you need to recover from the selected d
Recovery options Settings [Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery commands, recove
o If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder. If the archive is locate
6.3.4.1. Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the successive incremental backups by its creati
6.3.5. Access credentials for location Specify the credentials required for access to the location where the backup archive is stored. To specify cr
The new virtual machine will be configured automatically, the source machine configuration being copied where possible. The configuration is displaye
• Recover from backup The program will replace the NT signature of the target hard disk with one from the disk backup. Recovering the disk signature
[Volume] [Letter]: Disk # /Volume (p. 219) Sequentially map each of the source volumes to a volume or an unallocated space on the destination disk. S
• Windows XP Professional x64 Edition, Windows Server 2003/2008/ x64 Editions • Windows Vista all Editions except for Vista Home Basic and Vista Ho
installed operating system could prevent the machine from booting. You cannot set a logical drive or dynamic volume active. • Logical. Information a
6.3.6.4. Virtual machine settings The following virtual machine settings can be configured. Storage Initial setting: the default storage of the virt
C:\Documents\Finance\Reports\, the files will be recovered to the same path. If the folder does not exist, it will be created automatically. o New l
Overwriting Choose what to do if the program finds in the target folder a file with the same name as in the archive: • Overwrite existing file - thi
To learn more about the Universal Restore technology, see the Universal Restore (p. 47) section. Acronis Backup & Recovery 10 Universal Restore i
Mass storage drivers to install anyway To access this option, select the Advanced view check box. If the target hardware has a specific mass storage
3. In Data type, select Disks or Volumes depending on what you need to convert. 4. In Content, select the disks to convert or the volumes with the
Solution for Windows: Recover the volume once again. When configuring recovery, opt for using Acronis Universal Restore and specify the appropriate H
6.3.11.1. How to reactivate GRUB or LILO and change its configuration Generally, you should refer to the boot loader manual pages for the appropriat
b. Edit the record root=/dev/hdXY (or root=/dev/sdXY for a SCSI disk) in the section corresponding to the current kernel. In this record, X – disk n
Copyright © Acronis, Inc., 2000-2009 23 (i) supply code corrections to you to correct Software malfunctions in order to bring such Software into su
Note: This procedure requires restarting the machine. Use standard precautions when modifying the registry. 1. In Registry Editor, open the followin
opened with the pre-selected object as a source. All you need to do is to select when to validate and (optionally) provide a name for the task. To c
The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name. When entering th
2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select
To specify credentials 1. Select one of the following: o Use the task credentials The program will access the location using the credentials of the
Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. To mount an image, perform the follow
click Use anonymous access instead of entering credentials. As appears from the original FTP specification, credentials required for access to FTP se
6.5.4. Volume selection Select the volumes to mount and configure the mounting parameters for each of the selected volumes as follows: 1. Select th
Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more about the advantages and limitations of the A
To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone. The unallocated space is selected by defau
2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can us
Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…". If the system fails to boot, you will be able to s
6.7.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 352). Once created on a managed machine, the zone is a
o dragging the slider and selecting any size between the current and minimum values. The minimum size is approximately 50MB, depending on the geomet
Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent based on Linux kernel. The agent can boot and p
To be able to create or modify PE 2.x images, install Acronis WinPE ISO Builder on a machine where Windows Automated Installation Kit (AIK) is instal
o If you set, say, 10 sec for the bootable agent, the agent will launch 10 seconds after the menu is displayed. This enables unattended onsite opera
Once the bootable agent starts on the server, it retrieves the list of available NICs. This list is sorted by the slots the NICs occupy: the closest
1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are cre
• Creating the PE 2 ISO with the plug-in from scratch. • Adding the Acronis Plug-in to a WIM file for any future purpose (manual ISO building, addi
c:\winpe_x86\winpe_x86.iso Adding Acronis Plug-in to WinPE 2.x WIM 1. Select Acronis WinPE ISO Builder from the start menu. 2. Specify path to the
The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-20
6.8.2. Connecting to a machine booted from media Once a machine boots from bootable media, the machine terminal displays a startup window with the I
Acronis command line utilities • Acronis • asamba • lash • trueimagecmd • trueimagemnt Linux commands and utilities busybox ifconfig readcd ca
grub ping umount gunzip pktsetup uuidgen halt poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.8.5. Recovering MD devices and l
Example Suppose that you previously performed a disk backup of a machine with the following disk configuration: • The machine has two 1-gigabyte and
VG UUID 0qoQ4l-Vk7W-yDG3-uF1l-Q2AL-C0z0-vMeACu 5. Run the following command to create the logical volume; in the -L parameter, specify the size
trueimagemnt --mount /mnt --filename smb://server/backups/linux_machine.tib -i 4 This command mounts the logical volume DYN1, whose index in the back
On a machine that has an operating system on the hard disk, the BIOS must be configured so that the network interface card is either the first boot d
Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk configuration might change due to a HDD repl
6.9.3. Choosing the operating system for disk management On a machine with two or more operating systems, representation of disks and volumes depend
shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including changing the volume letter or label, are al
Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan
After the disk is initialized, its icon is now shown in green instead of grayed and the necessary new disk information appears. The disk block remain
If the destination is smaller, then the As is option of cloning will be unavailable and proportional resizing of the source disk volumes will be mand
If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2. Click to clear the Turn off the machine a
If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the selected volume, and then click Convert to
Basic to dynamic conversion of the disk, comprising of system volumes, takes a certain amount of time, and any power loss, unintentional turning off
6.9.6. Volume operations Acronis Disk Director Lite includes the following operations that can be performed on volumes: • Create Volume (p. 265) -
each disk in the volume; it means that to create a striped volume, a user will need two or more dynamic disks. The disks in a striped volume don’t ha
• Basic • Simple/Spanned • Striped • Mirrored • RAID-5 You will obtain a brief description of every type of volume for better understanding of
Set the volume size On the third wizard page, you will be able to define the size of the future volume, according to the previously made selections.
To perform the planned operation click Commit in the toolbar, and then click Proceed in the Pending Operations window. If you set a 64K cluster size
The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operatio
(To finish the added operation you will have to commit (p. 271) it. Exiting the program without committing the pending operations will effectively ca
The new label will be graphically represented in the Disk Management view of the console immediately. 6.9.6.6. Format volume You might want to form
272 Copyright © Acronis, Inc., 2000-2009 The Undo action lets you undo the latest operation in the list. While the list is not empty, this action i
7. Centralized management This section covers operations that can be performed centrally by using the components for centralized management. The con
agent will stop working until a successful license check. Vaults with low free space: X View vaults The alert is displayed if at least one centrali
Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history i
Way of working with the backup policies view • Use the toolbar's operational buttons to create new policies, apply the existing policies to mac
What to do if a policy has the Error status 1. To find out the reason of the failure, do one or more of the following: o Click the Error hyperlink
7.1.2.3. Actions on backup policies All the operations described below are performed by clicking the corresponding items on the tasks toolbar. The o
o Groups In the group tree, select the group(s) the policy will be applied to. The right part of the window lists the machines of the selected group
If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery oper
Source The tab displays information about the type of source to be backed up and the source selection rules. Destination The tab displays information
Groups The management server administrator has the ability to group machines. A machine can be a member of more than one group. One or more nested gr
Way of working with groups • In the Physical machines view, select the group. • Use the toolbar's operational buttons to perform actions on
Grouping actions To Do Create a custom static or dynamic group Click Create group. In the Create group (p. 293) window, specify the required parame
a managed machine and perform all the direct management operations. Other operations View detailed information on a machine Click View details. In t
To register an agent during agent installation, you have to be logged on with the management server administrator's account or provide the serve
Policy selection To apply the backup policy to the selected machine (group) 1. From the list, select the backup policy that you want to apply to the
Machine The tab displays the following information on the registered machine: • Name - name of the selected machine (taken from the Computer name in
The Log (p. 302) view will display a list of the log entries related to the selected backup policy. Revoke policy from the machine. Click Revoke. Th
Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to run. Running the backup plan starts the
It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental bac
Why can't I edit the backup plan? • The backup plan is currently running. Editing of the currently running backup plan is impossible. • The ba
Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as in the Backup plans and tasks view for direct mana
Filtering and sorting machines To Do Sort machines by any column Click the column's header to sort the machines in ascending order. Click it o
Edit a custom group Click Edit. In the Edit group (p. 295) window, change the required parameters of the group. Move one custom group to another Cli
Adding multiple criteria Adding multiple criteria forms a condition according to the following rules: a) All the entries of the same criteria are co
Move one group to another To move the selected group to another group or to the root 1. In the groups tree, click the group to move the selected gro
selected backup policy.View tasks of a policy Click View tasks. The Tasks (p. 300) view will display a list of the tasks related to the selected bac
Storage node enables you to: • relieve managed machines of unnecessary CPU load by using the storage node-side cleanup (p. 350) and storage node-sid
To Do Add a storage node to the management server Click Add. In the Add storage node (p. 299) window, specify the machine the storage node is insta
Adding a storage node To add a storage node 1. In the IP/Name field, enter the name or the IP address of the machine the storage node resides on, or
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Back
specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best guide to selecting the optimal backup scheme.
Vaults This tab displays a list of the vaults, managed by the storage node. To open a managed vault for detailed examination and to perform operation
Stop a task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, export
7.1.5.2. Filtering and sorting tasks The following is a guideline for you to filter and sort tasks. To Do Set a number of tasks to display Select O
Operations performed using bootable media are logged as well, but the log’s lifetime is limited to a current session. Rebooting eliminates the log, b
Tasks Select a task, and then click View log. The Log view appears with the log entries belonging to the selected task. 7.1.6.1. Actions on log
7.1.6.2. Filtering and sorting log entries The following is a guideline for you to filter and sort log entries. To Do Display log entries for a giv
• Task - The task the event relates to (if any) • Managed entity type - Type of managed entity where the event has occurred (if any) • Managed ent
You can set one or more parameters via Group Policy by using Acronis Administrative Template. For information on how to apply the administrative temp
compacting procedure. Possible values: Any integer number between 0 and 100 Default value: 80 In a deduplicating vault, the contents of all deduplic
Note: The parameters Vault Free Space Warning Limit and Vault Free Space Warning Percentage are independent of each other: a warning will be recorde
Tasks that do not belong to a backup plan, such as the recovery task, are owned by the user who has created or last modified the task. Managing a pla
This parameter contains two settings: Trace State Description: Specifies whether to collect the log entries about Acronis Backup & Recovery 10 co
Trace Level Description: Specifies the minimum level of severity of events for sending SNMP notifications about them. Only notifications about events
Default value: 30 The management server's process uses special threads—called worker threads or workers—to perform synchronization for a registe
Second Connection Attempt Description: Specifies whether to try to connect to a registered machine by using its last-known IP address after an attemp
full functionality for the number of days specified in Maximum Time Without License Server, as counted from the moment of installation or from the la
This parameter has two settings: Trace State Description: Specifies whether to record the agent's events into the event log. Possible values: Tr
Event tracing parameters Parameters called tracing parameters specify when to record notifications about events from Acronis Backup & Recovery 10
Default value: 4 (notifications about errors and critical errors will be recorded) 7.1.7.2. Parameters set through GUI The following parameters can
This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libr
Specify the path to the location, where the backup archive will be stored, and the archive name. It is advisable that the archive name be unique with
scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials to be able to start the task. 2.5. GFS b
To specify credentials 1. Select one of the following: o Use Acronis service credentials The tasks will run under the Acronis service account, whet
System volume Type or select: [System Volume] The system volume contains the hardware-specific files that are needed to start Windows, such as Ntld
attributes (including hidden and system files), the boot record, the file allocation table (FAT) if it exists, the root and the zero track of the har
• Partition number on the disk; 1 for the first partition, 2 for the second partition, etc. To guarantee backing up selected disks regardless of the
Windows folder %WINDIR% Points to the folder where Windows is located (for example, C:\Windows) Common data for all user profiles %ALLUSERSPROFILE%
The program will access the source data using the credentials of the backup policy account specified in the General section. o Use the following cre
Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and s
So, if the backup policy named, say SYSTEM_BACKUP will be applied to three machines (say, FINDEPT1, FINDEPT2, FINDEPT3), the following three archive
"fathers") and monthly (referred to as "grandfathers") backups. The expired backups will be deleted automatically. • Tower of Ha
7.2.7.4. Grandfather-Father-Son scheme At a glance • Daily incremental, weekly differential, and monthly full backups • Custom day for weekly and
The total schedule. Schedule: Workdays at 8:00 PM Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day
Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in hours, days, weeks, months, or years. For mo
available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Mon
• Keep backups: o Daily: 6 months o Weekly: 6 months o Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays
specify the sessions on which the scheme should run. In the discussion below, "days" can be replaced with "scheduled sessions". N
3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level dou
Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup. For example, the full back
Also, let all backups older than one year be deleted from the archive, and let the cleanup be performed upon creating a new backup. Retention rules:
Copyright © Acronis, Inc., 2000-2009 337 Resulting tasks Any custom scheme always produces three backup tasks and—in case the retention rules are s
Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. T
Limitations: cannot be organized on a dynamic disk (p. 345); requires manual configuration of boot loaders, such as LILO and GRUB; requires re-activa
backup and delete all daily backups that are older than you specify. Keep backups: Weekly This step defines the retention rule for weekly backups. T
Backup options Configuration parameters of a backup operation (p. 339), such as pre/post backup commands, maximum network bandwidth allotted for the
3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 339) installed on the machine finds data items using
A management server has two built-in groups that contain all machines of each type: All physical machines (p. 349), All virtual machines (p. 352). Bu
On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying
Differential backup A differential backup stores changes to the data against the latest full backup (p. 347). You need access to the corresponding fu
and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on t
816307 Best practices for using dynamic disks on Windows Server 2003-based computers http://support.microsoft.com/kb/816307 Dynamic group A group o
Encrypted vault A managed vault (p. 348) to which anything written is encrypted and anything read is decrypted transparently by the storage node (p.
M Machine A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boo
P Personal vault A local or networked vault (p. 352) created using direct management (p. 344). Once a personal vault is created, a shortcut to it app
An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly ba
Static group A group of machines which a management server (p. 348) administrator populates by manually adding machines to the group. A machine remai
T Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 348) when a certain time c
352 Copyright © Acronis, Inc., 2000-2009 While the successful validation means a high probability of successful recovery, it does not check all fac
Index A A policy on a machine or a group • 57 About Windows loaders • 229 Access credentials • 235, 236 Access credentials for archive location • 194
B Back up later scheme • 201, 328 Back up now scheme • 201, 328 Backing up dynamic volumes (Windows) • 41, 211 Backing up to tape library • 135 Backu
Configuring communication settings • 74, 78 Connecting to a machine booted from media • 250 Console (Acronis Backup & Recovery 10 Management Cons
F Fast incremental/differential backup • 90, 103 File destination • 212, 221 File-level backup snapshot • 89, 97 File-level security • 90, 104, 105,
M Machine • 19, 339, 340, 341, 342, 344, 346, 348, 349, 350, 352 Machine details • 280, 281, 284, 286 Machine management • 86, 287 Machine options •
Policy status on a group • 64 Policy status on a machine • 62 Pop-up messages • 82 Post-backup command • 94 Post-data capture command • 96 Post-recov
Storage node-side validation • 20, 123, 297, 348, 350 Supported file systems • 22 Supported operating systems • 21 T Tape compatibility table • 44, 1
An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily
360 Copyright © Acronis, Inc., 2000-2009 VM power management • 121 Volume destination • 217, 219 Volume operations • 265 Volume properties • 219 Vo
For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the following order of moves: The Tower of Hanoi ba
• differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern starts with a full backup since the very first
to this interval and deletes all backups created before that moment. None of the backups created after this moment will be deleted. 2. Keep the arch
3.1.4. Number of tasks ...
Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Exampl
This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you specify. The consolidation, however, may ta
Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volumes to the Acronis Secure Zone. trueimagecmd
Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynamic volume Type as of the target Dynamic vo
Backup archives created using different ways of access to tape have different formats. A tape written by a storage node cannot be read by an agent.
2.9.2. Using a single tape drive A tape drive that is locally attached to a managed machine can be used by local backup plans as a storage device. T
2.10. Proprietary Acronis technologies This section describes the proprietary technologies inherited by Acronis Backup & Recovery 10 from Acroni
For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 154) section. Upgrade from Acronis True Image Ech
handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. Acronis Back
Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply it to any Windows image created by Acronis
6.2.7. Archive ... ...
How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the
want the result to be predictable. When recovering a multi-boot system, choose only one system volume and boot volume at a time. 5. Once the system
Since you connect the console to the management server rather than to each machine and perform all management operations through the central manageme
You have to protect each server as a whole, the users' data on the workstations, and the virtual machines. You want to be able to track the heal
5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The storage node enables you to organize the infra
3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of the servers. The policy deployment state h
2.11.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flexibility to protect virtual machines in mul
Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks is created on each machine according to th
The same policy on a group and on a machine 1. The same policy can be applied to a group and to a machine. Nothing changes on the machine at the se
2.11.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a member of only one group beside
7.1.4. Storage nodes...
Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is G1's child. The "green" po
#4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1
the changes are transferred to the machine and the agent deletes the backup plan from it, the policy state on the machine is Revoking. You may change
The backup tasks will start on schedule as specified by the policy and produce a similar result until all data items appear on the machine or the pol
deployment completes on one of the machines while it continues on the other, the state will be "Deploying, Deployed". When the deployment c
For example, if a managed vault where deduplication is enabled contains two copies of the same file—whether in the same archive or in different archi
• When backing up in the full backup mode similar data from different sources. Such is the case when you back up operating systems and applications
disk space (say, 1 GB); the files that are specific to each machine occupy the other 50% (another 1 GB). In a deduplicating vault, the size of the fi
By default, the compacting task runs every Sunday night at 03:00. You can re-schedule the task as described in Operations with storage nodes (p. 297)
2.11.7. Privileges for centralized management This section describes the users' privileges that are required to manage a machine locally and re
1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare me
Note: On a remote machine running Windows Vista with enabled User Account Control (UAC)—and which is not part of a domain—only members of the Adminis
On a domain controller If a machine is a domain controller in an Active Directory domain, the names and default contents of Acronis security groups a
When creating the accounts, follow these guidelines: • For users whom you want to act as storage node administrators, add their accounts to the Admi
Component name Service name Necessary user rights Default user account Acronis Backup & Recovery 10 Agent Acronis Managed Machine Service Log
• Encrypted communication provides secure transfer of information between any two components—for example, between Acronis Backup & Recovery 10 A
When applied to a single machine, the Administrative Template defines the communication settings for all the components on the machine; when applied
Not configured The component will use the default settings, which is to use encryption if possible and to trust self-signed SSL certificates (see the
following option). Enabled Encryption is enabled. In Encryption, select one of the following: Enabled Data transfer will be encrypted if encryption i
Configuring the port in the operating system Windows To be able to change the ports' numbers, load and configure the Administrative Template, pr
http://msdn2.microsoft.com/en-us/library/aa374177.aspx 2.11.8.6. SSL certificates Acronis Backup & Recovery 10 components use Secure Sockets
operations • Enterprise level of security Controlling user rights to perform operations and access backups Running services with minimal user rights
To open the list of a machine's certificates 1. Click Start, then click Run, and then type: mmc 2. In the console, on the File menu, click Add
Copyright © Acronis, Inc., 2000-2009 81 (Note quotation marks; substitute the sample thumbprint shown here with that of your certificate.)
3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this s
The option defines whether to display the pop-up messages about task run results: successful completion, failure or success with warnings. When displ
3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts
3.2.2.1. Windows event log This option defines whether the management server has to record its own log events in the Application Event Log of Window
3.3. Machine options The machine options define the general behavior of all Acronis Backup & Recovery 10 agents operating on the managed machine,
3.3.2.1. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootabl
1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup &
3.4. Default backup and recovery options 3.4.1. Default backup options Each Acronis agent has its own default backup options. Once an agent is insta
The simplified way of centralized management • Backup Using the Back up control, select the machine which you want to back up and then create a back
Backup performance: Backup priority (p. 99) + + - - HDD writing speed (p. 99) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p
Reset archive bit - + - + Reboot after the backup - - + + Create full backups as synthetic backups + + + + Notifications: E-mail (p. 100) + + - -
3.4.1.2. Source files exclusion This option is effective for Windows and Linux operating systems and bootable media. This option is effective for di
.tmp files. In this case, all .tmp files in the folder MyFolder will be skipped during the backup process, but the file MyFile.tmp will not be skippe
Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not back up until the command execution is com
<------------------------------ Backup ----------------------------> Pre-backup command Pre-data capture command Data capture Po
execution is complete Result Preset Perform the data capture only after the command is successfully executed. Fail the task if the command executio
3.4.1.5. File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems. This option defines
Microsoft Volume Shadow Copy Service (VSS) provides an infrastructure for backing up data on running systems by ensuring coordination between applica
• Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You may want to select maximum compression when ba
Kommentare zu diesen Handbüchern