ACRONIS TIDLBPDES Datenblatt

Stöbern Sie online oder laden Sie Datenblatt nach Backup-Wiederherstellungssoftware ACRONIS TIDLBPDES herunter. Acronis Backup & Recovery 10 Advanced Workstation Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 360
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - User's Guide

Acronis® Backup & Recovery ™ 10 dvanced Workstation A User's Guide

Seite 2

• Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the All machines group. This way you will dep

Seite 3 - Table of Contents

• Click Writing speed stated as a percentage of the maximum speed of the destination hard disk, and then drag the slider or select a percentage in t

Seite 4

o When backup completes successfully – to send a notification when the backup task has completed successfully o When backup fails – to send a notif

Seite 5

2. In the Machine name field, enter the name of the machine to which notifications will be sent. Multiple names are not supported. Under Send notifi

Seite 6

The option defines whether the agent(s) operating on the managed machine have to send the log events of the backup operations to the specified Simple

Seite 7

The option defines how a backup can be split. The preset is: Automatic. The following settings are available. Automatic With this setting, Acronis B

Seite 8 - 1.2. Getting started

Preserve file security settings in archives This option defines whether to back up NTFS permissions for files along with the files. The preset is: E

Seite 9

changing disk label. Adding this component to the media will enable you to prepare the disk configuration on a machine before recovering the data.

Seite 10

When dual destination is enabled, the agent will automatically copy each backup being created locally to the secondary destination such as a network

Seite 11 - Navigation tree

Time diagram: Wait until conditions are met Skip the task execution Delaying a backup might be unacceptable, for example, when you need to back up d

Seite 12 - Shortcuts bar

In addition, the program can try to execute the failed task again. Select the Restart a failed task check box and specify the number of attempts and

Seite 13 - Actions

Key elements of the console workspace Name Description Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate

Seite 14 - How to expand/minimize panes

If the console is connected to the management server The Use a separate tape set option has more precise definitions. So for the backup policy to be

Seite 15 - Action pages

When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you are about to lose data on the tape. To dis

Seite 16

When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup process is completed. For example, if the mach

Seite 17 - 1.3.1. Agent for Windows

Agent for Windows Bootable media (Linux-based or PE-based) Disk recovery File recovery (also from a disk backup) Disk recovery File recovery (also

Seite 18 - 1.3.3. WinPE ISO Builder

3.4.2.1. Pre/Post commands This option is effective for Windows and Linux operating systems and PE-based bootable media. The option enables you to

Seite 19 - 1.3.4.2. Storage Node

Result Preset Perform the recovery only after the command is successfully executed. Fail the task if the command execution failed. Perform the reco

Seite 20 - 1.3.4.3. PXE Server

• Low – to minimize resources taken by the recovery process, leaving more resources to other processes running on the machine • Normal – to run the

Seite 21 - 1.3.5. Management Console

o From - type the e-mail address of the user from whom the message will be sent. If you leave this field empty, messages will be constructed as if t

Seite 22 - 1.6. Technical support

4. Click Send Test WinPopup Message to check if the settings are correct. 3.4.2.5. Event tracing It is possible to duplicate log events of the rec

Seite 23

To select whether to send the recovery operations events to the SNMP managers: Choose one of the following: • Use the setting set in the Machine opt

Seite 24 - 2.1. Basic concepts

Views for a management server When the console is connected to a management server, the following views are available in the navigation tree. • [Ma

Seite 25

Set current date and time for recovered files This option is effective only when recovering files. The preset is Enabled. This option defines whether

Seite 26 - Backup using bootable media

Copyright © Acronis, Inc., 2000-2009 121 3.4.2.8. VM power management These options are effective for virtual machines residing on the virtualiza

Seite 27

4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault is associated with the archives' metad

Seite 28 - Full backup

A vault is called personal if it was created using direct connection of the console to a managed machine. Personal vaults are specific for each manag

Seite 29 - Differential backup

Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the machine where the storage node is installed. Th

Seite 30 - 2.4. Owners and credentials

• [for managed vaults only] deduplication (p. 64) state (On, Off) • [for managed vaults only] encryption state (Yes, No) Vault content The Vault

Seite 31 - Archive owner

2 Click Edit. Depending on the vault you select (managed or unmanaged), the respective Edit page will be opened: • The Edit managed vault page le

Seite 32 - 2.5. GFS backup scheme

4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the following steps Vault Name Specify a unique name fo

Seite 33

o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o on a Network Attached Storage (NAS) o on

Seite 34 - The resulting archive: ideal

The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not stored anywhere on the di

Seite 35 - The resulting archive: real

Bars '[Item's name]' actions Contains a set of actions that can be performed on the items selected in any of the navigation views. Cli

Seite 36 - Tower of Hanoi overview

archives in the vault, creates and fills up the database corresponding to the vault, and starts managing the vault. When deleting a managed vault, yo

Seite 37 - Tower of Hanoi by Acronis

accessing the media. It is possible to view the content of a backup archive located on a tape through the console, even if a tape library is turned o

Seite 38 - 2.7. Retention rules

4.1.3.3. Limitations Limitations of tape library usage are the following: 1. The consolidation (p. 343) operation is not possible for archives loca

Seite 39

Recovery 10. The storage node will locate all tapes written in “Acronis” format into the Acronis pool at the Inventory (p. 136) operation. Acronis Ba

Seite 40 - Combination of rules 1 and 2

Tape library as a managed vault To enable data protection operations using a tape library you have to create a managed vault on the tape library. You

Seite 41 - Backing up dynamic volumes

Actions with archives on tapes in a library The following are common functions for archive data management for a backup archive selected in the Centr

Seite 42 - Recovering dynamic volumes

Keep in mind that a data recovery operation may require access to a number of tapes. For example, data recovery from an incremental backup commonly m

Seite 43 - 2.9. Tape support

Perform the procedure every time you load new tapes into tape library slots. Rescan As stated above the storage node keeps information about tapes a

Seite 44

4.1.3.7. Tape options These options are effective when the backup destination is a managed vault located on a tape library. Tape options enable you

Seite 45

• For each full backup The preset is: Disabled. When this option is enabled, each full backup will be written onto a free tape. The tape will be loa

Seite 46 - 2.10.1. Acronis Secure Zone

Tools Contains a list of the Acronis tools. Always the same across all the program views. All the tools can also be accessed in the Tools menu. &quo

Seite 47 - Restore)

If your backup archive must provide recovery with daily resolution for the last several days, weekly resolution for the last several weeks and monthl

Seite 48

Legend for the case example figures Any daily/incremental backup (16 GB) is shown in the figures as a green rectangle: . Weekly/differential backups

Seite 49 - Limitation

• the Always use a free tape: For each full backup option is cleared • the Always use a free tape: For each incremental backup option is cleared •

Seite 50 - How to use

Keep in mind, that the Cleanup task is launched after each backup operation for the GFS scheme. This task deletes all the outdated backups. The next

Seite 51 - 2.11.1. Basic concepts

The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the first Friday of the following year. At the

Seite 52

GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set option is selected • the Always use a free tape:

Seite 53

As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the second year the tapes keep only the backups di

Seite 54 - Setting up the storage node

These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of the rotation scheme that uses 8 tapes for

Seite 55

16 weekly sessions so it ensures the roll-back period equal 112 days. Tape rotation for the second case includes 128 daily sessions, i.e. it allows t

Seite 56

The figure below shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options. The recurring part of the scheme contains

Seite 57 - Policy on a group

"Tasks" view Common way of working with views Generally, every view contains a table of items, a table toolbar with buttons, and the Infor

Seite 58

• the Always use a free tape: For each incremental backup option is cleared • the Always use a free tape: For each differential backup option is cl

Seite 59

• the Always use a free tape: For each full backup option is selected • the Always use a free tape: For each incremental backup option is selected

Seite 60

• average size of incremental backups • average size of differential backups • compression level specified for backing up the data • tape rotatio

Seite 61

Tape planning: Example 2 Imagine the case with the following features: • full backup size is F_GB • average size of incremental backups is I_GB •

Seite 62 - Backup policy state diagram

you need to do is to perform the inventory (p. 136) procedure for the managed vault on the library where the tapes were placed to. 2. If you move ta

Seite 63

Metadata The .meta folder is created during backup in every personal vault. This folder contains additional information about archives and backups s

Seite 64 - 2.11.6. Deduplication

Bars of the "Actions and tools" pane • [Vault Name] The Actions bar is available when clicking the vault in the vaults tree. Duplicates ac

Seite 65 - Deduplication database

4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the vault being created. 2. [Optional] In th

Seite 66 - What ratio to expect

All the operations described below are performed by clicking the corresponding buttons on the toolbar. These operations can be also accessed from the

Seite 67 - Deduplication at target

Validate a backup Click Validate. The Validation (p. 230) page will be opened with the pre-selected backup as a source. Validation of a file backup

Seite 68

Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of representation: basic and advanced. The b

Seite 69 - Remote connection

160 Copyright © Acronis, Inc., 2000-2009 To Do Sort backup archives by any column Click the column's header to sort the archives in ascending

Seite 70

5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine and each employee’s work style. The plans’

Seite 71 - On a domain controller

The specified period of time has passed since the last successful backup completed The scheduler behavior, in case the event occurs but the condition

Seite 72

Examples "Simple" daily schedule Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day

Seite 73

The obvious way is to add five simple schedules. If you spend one minute for examination, you can think out a more optimal way. As you can see, the t

Seite 74

To: <...> Set up a date when this schedule will be disabled. If this check box is cleared, the task will be run for an indefinite number of we

Seite 75 - Client Encryption options

week. For more details, see the Full and incremental backups plus cleanup example in the Custom backup scheme (p. 208) section. Several weekly schedu

Seite 76 - Server Encryption options

5.3. Monthly schedule Monthly schedule is effective in Windows and Linux operating systems. To specify a monthly schedule In the Schedule area, selec

Seite 77

This schedule is widely used when creating a custom backup scheme. The "Last day of every month" schedule is added to the full backups, whi

Seite 78 - • The currently used port

2. On: <All> <All workdays>. 3. Every: 12 hours From: 12:00:00 AM Until: 12:00:00 PM. 4. Effective: From: 11/01/2009. To: not set. Thi

Seite 79 - 2.11.8.6. SSL certificates

Acronis Backup & Recovery 10 includes three types of components. Components for a managed machine (agents) These are applications that perform da

Seite 80 - Non-self-signed certificates

Delay values range from zero to the specified maximum delay value, and are determined according to the chosen distribution method. The delay value fo

Seite 81

5. To enable the use of the Wake-on-LAN functionality, select the Use Wake-on-LAN check box. 6. To distribute the centralized backup tasks' st

Seite 82 - 3. Options

• Event type: Error • Event ID: 7 Important: To ensure that such a task will complete despite the presence of bad blocks, you must make the task ig

Seite 83 - 3.1.4. Number of tasks

5.6. Conditions Conditions add more flexibility to the scheduler, enabling to execute backup tasks with respect to certain conditions. Once a specifi

Seite 84 - 3.2.2. Event tracing

• Task start conditions: Wait until the conditions are met, Run the task anyway after 2 hour(s). As a result, (1) If the user becomes idle before 9P

Seite 85 - 3.2.2.2. SNMP notifications

specified time interval, or logs off at any other time – do not back up the users' data, i.e. skip task execution. • Event: When logging off, T

Seite 86 - 3.3. Machine options

176 Copyright © Acronis, Inc., 2000-2009 (1) If all users are logged off at 8PM, the backup task will start at 8PM. (2) If the last user logs off b

Seite 87 - 3.3.2.2. SNMP notifications

6. Direct management This section covers operations that can be performed directly on a managed machine by using the direct console-agent connection

Seite 88

Check connectivity to the server and run Acronis License Server to manage licenses. license server. Trial period is over Insert a full license key

Seite 89

Warnings Highlight the date in yellow if no "Error" entries appeared and at least one "Warning" entry appeared in the log on thi

Seite 90

operational machine will be placed in the folder you select. You can start the machine using the respective virtualization software or prepare the ma

Seite 91 - 3.4.1.1. Archive protection

• Use the toolbar's buttons to take an action on the selected plan (task). See the Actions on backup plans and tasks (p. 183) section for detai

Seite 92

A backup plan status is derived from the results of the last run of the plans' tasks. State How it is determined How to handle 1 Error At l

Seite 93 - Pre-backup command

Any running task can put itself into the Need interaction state when it needs human interaction such as changing media or ignoring a read error. The

Seite 94 - Post-backup command

• Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last result is "Succeeded with warning"

Seite 95 - Pre-data capture command

Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to be run. Running the backup plan starts t

Seite 96 - Post-data capture command

Edit a plan/task Backup plan Click Edit. Backup plan editing is performed in the same way as creation (p. 193), except for the following limitation

Seite 97 - • Do not create a snapshot

Delete a plan/task Backup plan Click Delete. What will happen if I delete the backup plan? The plan's deletion deletes all its tasks. Why can

Seite 98 - 3.4.1.8. Compression level

Filter plans/tasks by name or owner. Type a plan's/task's name or an owner's name in the field below the corresponding header name. A

Seite 99 - HDD writing speed

Types of tasks Task name Description Backup (disk) Backing up disks and volumes Backup (file) Backing up files and folders Backup (virtual machine

Seite 100 - 3.4.1.10. Notifications

Provides details on the selected backup: when it was created, its type (full, incremental, differential), information on the archive and the vault th

Seite 101 - Messenger service (WinPopup)

1.3.4.1. Management Server Acronis Backup & Recovery 10 Management Server is the central server that drives data protection within the enterpris

Seite 102 - SNMP notifications

Destination The Destination tab provides the following information: • Location - name of the vault or path to the folder, where the archive is store

Seite 103 - 3.4.1.13. Backup splitting

6.1.3.1. Actions on log entries All the operations described below are performed by clicking the corresponding items on the log toolbar. All these

Seite 104 - Automatic

Filter log entries by type Press or release the following toolbar buttons: to filter error messages to filter warning messages to filter informati

Seite 105 - 3.4.1.15. Media components

The log entry's details that you copy will have the appearance as follows: ---------------------------Log Entry Details-------------------------

Seite 106 - 3.4.1.17. Dual destination

Exclusions (p. 197) [Optional] Set up exclusions for the specific types of files you do not wish to back up. To access this option, select the Advanc

Seite 107 - To use Dual destination:

After that, you might be prompted for the password (p. 195). The plan you have created will be accessible for examination and managing in the Backup

Seite 108 - Skip the task execution

Disks/volumes Available if the Acronis Backup & Recovery 10 Agent for Windows (or for Linux) is installed. Select this option to back up disks an

Seite 109 - 3.4.1.20. Tape options

A disk backup stores all volumes of the selected disk (including hidden volumes such as the vendor's maintenance partitions) and the zero track

Seite 110 - Always use a free tape

To specify which files and folders to exclude: Set up any of the following parameters: • Exclude all hidden files and folders Select this check box

Seite 111 - Reset archive bit

• To back up data to a network share, expand the Network folders group, select the required networked machine and, then click the shared folder. If

Seite 112

Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acron

Seite 113

Setting up the storage infrastructure Install the storage nodes, add them to the management server (the procedure is similar to the managed machine r

Seite 114 - Pre-recovery command

Why two or more plans should not back up to the same archive 1. Backing up different sources to the same archive makes using the archive difficult f

Seite 115 - 3.4.2.2. Recovery priority

• Simple – to schedule when and how often to backup data and specify retention rules. • Grandfather-Father-Son – to use the Grandfather-Father-Son

Seite 116 - 3.4.2.4. Notifications

Backup Set up the backup schedule - when and how often to back up the data. To learn more about setting up the schedule, see the Scheduling (p. 161)

Seite 117

Start backup at: Specifies when to start a backup. The default value is 12:00 PM. Back up on: Specifies the days on which to perform a backup. The

Seite 118 - 3.4.2.5. Event tracing

• Weekly/monthly: Saturday (for example) • Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly: indefinitely As a result, an archive of da

Seite 119 - 3.4.2.6. Error handling

Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six months. The following GFS scheme suits suc

Seite 120

Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p. 162), weekly (p. 164), or monthly (p. 167

Seite 121

Roll-back period The number of days we can go back in the archive is different on different days. The minimum number of days we are guaranteed to hav

Seite 122 - 4. Vaults

6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • Custom schedule and retention rules Paramete

Seite 123 - 4.1. Centralized vaults

Full and incremental backup plus cleanup With the following scheme, the archive will consist of weekly full backups and daily incremental backups. We

Seite 124 - Pie chart with legend

The network booting: • Eliminates the need to have a technician onsite to install the bootable media (p. 341) into the system that has to be booted

Seite 125 - Vault content

Cleanup schedule: Monthly, on the Last day of All months, at 10:00 PM By default, a backup is not deleted as long as it has dependent backups that mu

Seite 126

6.3. Recovering data When it comes to data recovery, first consider the most functional method: connect the console to the managed machine running th

Seite 127 - Vault path

Select the archive to recover data from. Data type (p. 214) Applies to: disk recovery Choose the type of data you need to recover from the selected d

Seite 128 - Vault encryption

Recovery options Settings [Optional] Customize the recovery operation by configuring the recovery options, such as pre/post recovery commands, recove

Seite 129

o If the archive is stored in a local folder on the machine, expand the Local folders group and click the required folder. If the archive is locate

Seite 130 - 4.1.3. Tape libraries

6.3.4.1. Disks/volumes selection To select a backup and disks/volumes to recover: 1. Select one of the successive incremental backups by its creati

Seite 131 - 4.1.3.2. Hardware

6.3.5. Access credentials for location Specify the credentials required for access to the location where the backup archive is stored. To specify cr

Seite 132 - 4.1.3.4. RSM Media Pools

The new virtual machine will be configured automatically, the source machine configuration being copied where possible. The configuration is displaye

Seite 133 - Prerequisites

• Recover from backup The program will replace the NT signature of the target hard disk with one from the disk backup. Recovering the disk signature

Seite 134

[Volume] [Letter]: Disk # /Volume (p. 219) Sequentially map each of the source volumes to a volume or an unallocated space on the destination disk. S

Seite 135 - Recovering from tape library

• Windows XP Professional x64 Edition, Windows Server 2003/2008/ x64 Editions • Windows Vista all Editions except for Vista Home Basic and Vista Ho

Seite 136 - Inventory

installed operating system could prevent the machine from booting. You cannot set a logical drive or dynamic volume active. • Logical. Information a

Seite 137 - Labeling

6.3.6.4. Virtual machine settings The following virtual machine settings can be configured. Storage Initial setting: the default storage of the virt

Seite 138 - 4.1.3.7. Tape options

C:\Documents\Finance\Reports\, the files will be recovered to the same path. If the folder does not exist, it will be created automatically. o New l

Seite 139 - Choosing a backup scheme

Overwriting Choose what to do if the program finds in the target folder a file with the same name as in the archive: • Overwrite existing file - thi

Seite 140 - Case to analyze

To learn more about the Universal Restore technology, see the Universal Restore (p. 47) section. Acronis Backup & Recovery 10 Universal Restore i

Seite 141 - GFS Example 1

Mass storage drivers to install anyway To access this option, select the Advanced view check box. If the target hardware has a specific mass storage

Seite 142

3. In Data type, select Disks or Volumes depending on what you need to convert. 4. In Content, select the disks to convert or the volumes with the

Seite 143

Solution for Windows: Recover the volume once again. When configuring recovery, opt for using Acronis Universal Restore and specify the appropriate H

Seite 144

6.3.11.1. How to reactivate GRUB or LILO and change its configuration Generally, you should refer to the boot loader manual pages for the appropriat

Seite 145 - GFS Example 2

b. Edit the record root=/dev/hdXY (or root=/dev/sdXY for a SCSI disk) in the section corresponding to the current kernel. In this record, X – disk n

Seite 146 - GFS Example 3

Copyright © Acronis, Inc., 2000-2009 23 (i) supply code corrections to you to correct Software malfunctions in order to bring such Software into su

Seite 147

Note: This procedure requires restarting the machine. Use standard precautions when modifying the registry. 1. In Registry Editor, open the followin

Seite 148 - ToH Example 1

opened with the pre-selected object as a source. All you need to do is to select when to validate and (optionally) provide a name for the task. To c

Seite 149 - ToH Example 2

The task will always run under the credentials you specify, whether started manually or executed on schedule. Specify: • User name. When entering th

Seite 150 - ToH Example 3

2. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select

Seite 151 - Tape planning

To specify credentials 1. Select one of the following: o Use the task credentials The program will access the location using the credentials of the

Seite 152 - Tape planning: Example 1

Limitation: Mounting of volume backups stored on Acronis Backup & Recovery 10 Storage Node is not possible. To mount an image, perform the follow

Seite 153 - 4.1.3.9. What if

click Use anonymous access instead of entering credentials. As appears from the original FTP specification, credentials required for access to FTP se

Seite 154 - 4.2. Personal vaults

6.5.4. Volume selection Select the volumes to mount and configure the mounting parameters for each of the selected volumes as follows: 1. Select th

Seite 155 - Metadata

Certain Windows applications, such as Acronis disk management tools, can access the zone. To learn more about the advantages and limitations of the A

Seite 156

To allocate space for Acronis Secure Zone 1. Choose a hard disk (if several) on which to create the zone. The unallocated space is selected by defau

Seite 157 - 4.3. Common operations

2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear understanding of the product so that they can us

Seite 158

Activate Enables the boot time prompt "Press F11 for Acronis Startup Recovery Manager…". If the system fails to boot, you will be able to s

Seite 159

6.7.2. Managing Acronis Secure Zone Acronis Secure Zone is considered as a personal vault (p. 352). Once created on a managed machine, the zone is a

Seite 160 - To show or hide columns

o dragging the slider and selecting any size between the current and minimum values. The minimum size is approximately 50MB, depending on the geomet

Seite 161 - 5. Scheduling

Linux-based bootable media Linux-based media contains Acronis Backup & Recovery 10 Bootable Agent based on Linux kernel. The agent can boot and p

Seite 162 - 5.1. Daily schedule

To be able to create or modify PE 2.x images, install Acronis WinPE ISO Builder on a machine where Windows Automated Installation Kit (AIK) is instal

Seite 163 - Examples

o If you set, say, 10 sec for the bootable agent, the agent will launch 10 seconds after the menu is displayed. This enables unattended onsite opera

Seite 164 - 5.2. Weekly schedule

Once the bootable agent starts on the server, it retrieves the list of available NICs. This list is sorted by the slots the NICs occupy: the closest

Seite 165

1. The Acronis Backup & Recovery 10 Universal Restore add-on is installed on the machine where the bootable media is created AND 2. You are cre

Seite 166

• Creating the PE 2 ISO with the plug-in from scratch. • Adding the Acronis Plug-in to a WIM file for any future purpose (manual ISO building, addi

Seite 167 - 5.3. Monthly schedule

c:\winpe_x86\winpe_x86.iso Adding Acronis Plug-in to WinPE 2.x WIM 1. Select Acronis WinPE ISO Builder from the start menu. 2. Specify path to the

Seite 168

The following diagram illustrates the notions discussed above. For more definitions please refer to the Glossary. Copyright © Acronis, Inc., 2000-20

Seite 169 - Use Wake-on-LAN

6.8.2. Connecting to a machine booted from media Once a machine boots from bootable media, the machine terminal displays a startup window with the I

Seite 170 - To specify advanced settings

Acronis command line utilities • Acronis • asamba • lash • trueimagecmd • trueimagemnt Linux commands and utilities busybox ifconfig readcd ca

Seite 171 - Parameters

grub ping umount gunzip pktsetup uuidgen halt poweroff vconfig hexdump ps vi hotplug raidautorun zcat 6.8.5. Recovering MD devices and l

Seite 172

Example Suppose that you previously performed a disk backup of a machine with the following disk configuration: • The machine has two 1-gigabyte and

Seite 173 - 5.6. Conditions

VG UUID 0qoQ4l-Vk7W-yDG3-uF1l-Q2AL-C0z0-vMeACu 5. Run the following command to create the logical volume; in the -L parameter, specify the size

Seite 174 - 5.6.3. Fits time interval

trueimagemnt --mount /mnt --filename smb://server/backups/linux_machine.tib -i 4 This command mounts the logical volume DYN1, whose index in the back

Seite 175 - 5.6.4. User logged off

On a machine that has an operating system on the hard disk, the BIOS must be configured so that the network interface card is either the first boot d

Seite 176 - Example:

Sometimes after the volume has been backed up and its image placed into a safe storage, the machine disk configuration might change due to a HDD repl

Seite 177 - 6. Direct management

6.9.3. Choosing the operating system for disk management On a machine with two or more operating systems, representation of disks and volumes depend

Seite 178 - Activities

shown in the table, as well as in graphical form at the bottom of the view. Any volume changes, including changing the volume letter or label, are al

Seite 179 - Way of working

Backup using bootable media You can boot the machine using the bootable media, configure the backup operation in the same way as a simple backup plan

Seite 180 - Backup plan statuses

After the disk is initialized, its icon is now shown in green instead of grayed and the necessary new disk information appears. The disk block remain

Seite 181 - Task states

If the destination is smaller, then the As is option of cloning will be unavailable and proportional resizing of the source disk volumes will be mand

Seite 182 - Task statuses

If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2. Click to clear the Turn off the machine a

Seite 183

If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the selected volume, and then click Convert to

Seite 184

Basic to dynamic conversion of the disk, comprising of system volumes, takes a certain amount of time, and any power loss, unintentional turning off

Seite 185

6.9.6. Volume operations Acronis Disk Director Lite includes the following operations that can be performed on volumes: • Create Volume (p. 265) -

Seite 186

each disk in the volume; it means that to create a striped volume, a user will need two or more dynamic disks. The disks in a striped volume don’t ha

Seite 187 - Task details

• Basic • Simple/Spanned • Striped • Mirrored • RAID-5 You will obtain a brief description of every type of volume for better understanding of

Seite 188 - Archive

Set the volume size On the third wizard page, you will be able to define the size of the future volume, according to the previously made selections.

Seite 189 - Backup plan details

To perform the planned operation click Commit in the toolbar, and then click Proceed in the Pending Operations window. If you set a 64K cluster size

Seite 190 - 6.1.3. Log

The following diagram illustrates data recovery under the operating system (online). No backup can proceed on the machine while the recovery operatio

Seite 191

(To finish the added operation you will have to commit (p. 271) it. Exiting the program without committing the pending operations will effectively ca

Seite 192 - 6.1.3.3. Log entry details

The new label will be graphically represented in the Disk Management view of the console immediately. 6.9.6.6. Format volume You might want to form

Seite 193 - 6.2. Creating a backup plan

272 Copyright © Acronis, Inc., 2000-2009 The Undo action lets you undo the latest operation in the list. While the list is not empty, this action i

Seite 194 - How to back up

7. Centralized management This section covers operations that can be performed centrally by using the components for centralized management. The con

Seite 195 - 6.2.3. Source type

agent will stop working until a successful license check. Vaults with low free space: X View vaults The alert is displayed if at least one centrali

Seite 196 - 6.2.4. Items to back up

Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recovery 10 agents' activities. The history i

Seite 197 - 6.2.6. Exclusions

Way of working with the backup policies view • Use the toolbar's operational buttons to create new policies, apply the existing policies to mac

Seite 198 - 6.2.7. Archive

What to do if a policy has the Error status 1. To find out the reason of the failure, do one or more of the following: o Click the Error hyperlink

Seite 199 - 3. Naming the new archive

7.1.2.3. Actions on backup policies All the operations described below are performed by clicking the corresponding items on the tasks toolbar. The o

Seite 200 - 6.2.9. Backup schemes

o Groups In the group tree, select the group(s) the policy will be applied to. The right part of the window lists the machines of the selected group

Seite 201 - 6.2.9.3. Simple scheme

If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the bootable media and configure the recovery oper

Seite 202 - Description

Source The tab displays information about the type of source to be backed up and the source selection rules. Destination The tab displays information

Seite 203

Groups The management server administrator has the ability to group machines. A machine can be a member of more than one group. One or more nested gr

Seite 204

Way of working with groups • In the Physical machines view, select the group. • Use the toolbar's operational buttons to perform actions on

Seite 205

Grouping actions To Do Create a custom static or dynamic group Click Create group. In the Create group (p. 293) window, specify the required parame

Seite 206 - Example

a managed machine and perform all the direct management operations. Other operations View detailed information on a machine Click View details. In t

Seite 207 - Roll-back period

To register an agent during agent installation, you have to be logged on with the management server administrator's account or provide the serve

Seite 208

Policy selection To apply the backup policy to the selected machine (group) 1. From the list, select the backup policy that you want to apply to the

Seite 209

Machine The tab displays the following information on the registered machine: • Name - name of the selected machine (taken from the Computer name in

Seite 210 - 6.2.10. Archive validation

The Log (p. 302) view will display a list of the log entries related to the selected backup policy. Revoke policy from the machine. Click Revoke. Th

Seite 211 - 6.3. Recovering data

Run a plan/task Backup plan Click Run. In the Run Backup Plan (p. 187) window, select the task you need to run. Running the backup plan starts the

Seite 212 - When to recover

It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis technologies, recovery from an incremental bac

Seite 213 - 6.3.2. Archive selection

Why can't I edit the backup plan? • The backup plan is currently running. Editing of the currently running backup plan is impossible. • The ba

Seite 214 - 6.3.4. Content selection

Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as in the Backup plans and tasks view for direct mana

Seite 215 - 6.3.4.2. Files selection

Filtering and sorting machines To Do Sort machines by any column Click the column's header to sort the machines in ascending order. Click it o

Seite 216 - 6.3.6.1. Disks

Edit a custom group Click Edit. In the Edit group (p. 295) window, change the required parameters of the group. Move one custom group to another Cli

Seite 217 - NT signature

Adding multiple criteria Adding multiple criteria forms a condition according to the following rules: a) All the entries of the same criteria are co

Seite 218 - 6.3.6.2. Volumes

Move one group to another To move the selected group to another group or to the root 1. In the groups tree, click the group to move the selected gro

Seite 219 - Volume properties

selected backup policy.View tasks of a policy Click View tasks. The Tasks (p. 300) view will display a list of the tasks related to the selected bac

Seite 220

Storage node enables you to: • relieve managed machines of unnecessary CPU load by using the storage node-side cleanup (p. 350) and storage node-sid

Seite 221 - 6.3.6.5. File destination

To Do Add a storage node to the management server Click Add. In the Add storage node (p. 299) window, specify the machine the storage node is insta

Seite 222 - Exclusions

Adding a storage node To add a storage node 1. In the IP/Name field, enter the name or the IP address of the machine the storage node resides on, or

Seite 223 - 6.3.9. Universal Restore

Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Back

Seite 224 - Universal Restore settings

specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best guide to selecting the optimal backup scheme.

Seite 225

Vaults This tab displays a list of the vaults, managed by the storage node. To open a managed vault for detailed examination and to perform operation

Seite 226

Stop a task Click Stop. What will happen if I stop the task? Generally, stopping the task aborts its operation (backup, recovery, validation, export

Seite 227

7.1.5.2. Filtering and sorting tasks The following is a guideline for you to filter and sort tasks. To Do Set a number of tasks to display Select O

Seite 228

Operations performed using bootable media are logged as well, but the log’s lifetime is limited to a current session. Rebooting eliminates the log, b

Seite 229 - Windows Vista/2008

Tasks Select a task, and then click View log. The Log view appears with the log entries belonging to the selected task. 7.1.6.1. Actions on log

Seite 230

7.1.6.2. Filtering and sorting log entries The following is a guideline for you to filter and sort log entries. To Do Display log entries for a giv

Seite 231 - 6.4.1. Task credentials

• Task - The task the event relates to (if any) • Managed entity type - Type of managed entity where the event has occurred (if any) • Managed ent

Seite 232 - 6.4.2. Archive selection

You can set one or more parameters via Group Policy by using Acronis Administrative Template. For information on how to apply the administrative temp

Seite 233 - 6.4.4. Location selection

compacting procedure. Possible values: Any integer number between 0 and 100 Default value: 80 In a deduplicating vault, the contents of all deduplic

Seite 234 - 6.5. Mounting an image

Note: The parameters Vault Free Space Warning Limit and Vault Free Space Warning Percentage are independent of each other: a warning will be recorde

Seite 235 - 6.5.1. Archive selection

Tasks that do not belong to a backup plan, such as the recovery task, are owned by the user who has created or last modified the task. Managing a pla

Seite 236 - 6.5.3. Access credentials

This parameter contains two settings: Trace State Description: Specifies whether to collect the log entries about Acronis Backup & Recovery 10 co

Seite 237 - 6.7. Acronis Secure Zone

Trace Level Description: Specifies the minimum level of severity of events for sending SNMP notifications about them. Only notifications about events

Seite 238 - Settings

Default value: 30 The management server's process uses special threads—called worker threads or workers—to perform synchronization for a registe

Seite 239 - To disable password

Second Connection Attempt Description: Specifies whether to try to connect to a registered machine by using its last-known IP address after an attemp

Seite 240

full functionality for the number of days specified in Maximum Time Without License Server, as counted from the moment of installation or from the la

Seite 241

This parameter has two settings: Trace State Description: Specifies whether to record the agent's events into the event log. Possible values: Tr

Seite 242 - 6.8. Bootable media

Event tracing parameters Parameters called tracing parameters specify when to record notifications about events from Acronis Backup & Recovery 10

Seite 243 - PE-based bootable media

Default value: 4 (notifications about errors and critical errors will be recorded) 7.1.7.2. Parameters set through GUI The following parameters can

Seite 244 - Using Bart PE

This database contains a list of tape vaults that are managed by the storage node. Its size depends on the number of archives stored in the tape libr

Seite 245 - Network settings

Specify the path to the location, where the backup archive will be stored, and the archive name. It is advisable that the archive name be unique with

Seite 246 - Network port

scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials to be able to start the task. 2.5. GFS b

Seite 247

To specify credentials 1. Select one of the following: o Use Acronis service credentials The tasks will run under the Acronis service account, whet

Seite 248

System volume Type or select: [System Volume] The system volume contains the hardware-specific files that are needed to start Windows, such as Ntld

Seite 249

attributes (including hidden and system files), the boot record, the file allocation table (FAT) if it exists, the root and the zero track of the har

Seite 250

• Partition number on the disk; 1 for the first partition, 2 for the second partition, etc. To guarantee backing up selected disks regardless of the

Seite 251 - Linux commands and utilities

Windows folder %WINDIR% Points to the folder where Windows is located (for example, C:\Windows) Common data for all user profiles %ALLUSERSPROFILE%

Seite 252

The program will access the source data using the credentials of the backup policy account specified in the General section. o Use the following cre

Seite 253

Mask (*) *.log Excludes all files with the .log extension. Mask (?) my???.log Excludes all .log files with names consisting of five symbols and s

Seite 254 - Mounting backup volumes

So, if the backup policy named, say SYSTEM_BACKUP will be applied to three machines (say, FINDEPT1, FINDEPT2, FINDEPT3), the following three archive

Seite 255 - 6.8.6. Acronis PXE Server

"fathers") and monthly (referred to as "grandfathers") backups. The expired backups will be deleted automatically. • Tower of Ha

Seite 256 - 6.9. Disk management

7.2.7.4. Grandfather-Father-Son scheme At a glance • Daily incremental, weekly differential, and monthly full backups • Custom day for weekly and

Seite 257 - 6.9.1. Basic precautions

The total schedule. Schedule: Workdays at 8:00 PM Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day

Seite 258 - Displaying operation results

Keep backups: Specifies how long you want the backups to be stored in the archive. A term can be set in hours, days, weeks, months, or years. For mo

Seite 259 - 6.9.5. Disk operations

available through next Sunday, January 8; the first weekly backup, the one of Saturday, January 7, will be stored on the system until February 7. Mon

Seite 260 - 6.9.5.2. Basic disk cloning

• Keep backups: o Daily: 6 months o Weekly: 6 months o Monthly: 5 years Here, daily incremental backups will be created on Tuesdays and Thursdays

Seite 261 - Using advanced options

specify the sessions on which the scheme should run. In the discussion below, "days" can be replaced with "scheduled sessions". N

Seite 262

3 4 days 2 to 5 days 2 days 4 8 days 4 to 11 days 4 days 5 16 days 8 to 23 days 8 days 6 32 days 16 to 47 days 16 days Adding a level dou

Seite 263 - System disk conversion

Parameters Parameter Meaning Full backup Specifies on what schedule and under which conditions to perform a full backup. For example, the full back

Seite 264

Also, let all backups older than one year be deleted from the archive, and let the cleanup be performed upon creating a new backup. Retention rules:

Seite 265 - 6.9.6. Volume operations

Copyright © Acronis, Inc., 2000-2009 337 Resulting tasks Any custom scheme always produces three backup tasks and—in case the retention rules are s

Seite 266 - Create volume wizard

Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediately after the system recovery is started. T

Seite 267 - Select destination disks

Limitations: cannot be organized on a dynamic disk (p. 345); requires manual configuration of boot loaders, such as LILO and GRUB; requires re-activa

Seite 268 - Set the volume options

backup and delete all daily backups that are older than you specify. Keep backups: Weekly This step defines the retention rule for weekly backups. T

Seite 269 - 6.9.6.3. Set active volume

Backup options Configuration parameters of a backup operation (p. 339), such as pre/post backup commands, maximum network bandwidth allotted for the

Seite 270

3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 339) installed on the machine finds data items using

Seite 271 - 6.9.7. Pending operations

A management server has two built-in groups that contain all machines of each type: All physical machines (p. 349), All virtual machines (p. 352). Bu

Seite 272

On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying

Seite 273 - 7. Centralized management

Differential backup A differential backup stores changes to the data against the latest full backup (p. 347). You need access to the corresponding fu

Seite 274

and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on t

Seite 275 - 7.1.2. Backup policies

816307 Best practices for using dynamic disks on Windows Server 2003-based computers http://support.microsoft.com/kb/816307 Dynamic group A group o

Seite 276

Encrypted vault A managed vault (p. 348) to which anything written is encrypted and anything read is decrypted transparently by the storage node (p.

Seite 277

M Machine A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boo

Seite 278 - Machines selection

P Personal vault A local or networked vault (p. 352) created using direct management (p. 344). Once a personal vault is created, a shortcut to it app

Seite 279 - 7.1.2.4. Policy details

An ideal archive created according to the GFS scheme. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily backups: 7 days Keep weekly ba

Seite 280 - 7.1.3. Physical machines

Static group A group of machines which a management server (p. 348) administrator populates by manually adding machines to the group. A machine remai

Seite 281

T Task In Acronis Backup & Recovery 10, a task is a set of sequential actions to be performed on a managed machine (p. 348) when a certain time c

Seite 282 - Applying policies

352 Copyright © Acronis, Inc., 2000-2009 While the successful validation means a high probability of successful recovery, it does not check all fac

Seite 283 - Other actions

Index A A policy on a machine or a group • 57 About Windows loaders • 229 Access credentials • 235, 236 Access credentials for archive location • 194

Seite 284 - • installing the agent

B Back up later scheme • 201, 328 Back up now scheme • 201, 328 Backing up dynamic volumes (Windows) • 41, 211 Backing up to tape library • 135 Backu

Seite 285

Configuring communication settings • 74, 78 Connecting to a machine booted from media • 250 Console (Acronis Backup & Recovery 10 Management Cons

Seite 286 - Machine details

F Fast incremental/differential backup • 90, 103 File destination • 212, 221 File-level backup snapshot • 89, 97 File-level security • 90, 104, 105,

Seite 287

M Machine • 19, 339, 340, 341, 342, 344, 346, 348, 349, 350, 352 Machine details • 280, 281, 284, 286 Machine management • 86, 287 Machine options •

Seite 288 - Plans and tasks

Policy status on a group • 64 Policy status on a machine • 62 Pop-up messages • 82 Post-backup command • 94 Post-data capture command • 96 Post-recov

Seite 289

Storage node-side validation • 20, 123, 297, 348, 350 Supported file systems • 22 Supported operating systems • 21 T Tape compatibility table • 44, 1

Seite 290

An archive created according to the GFS scheme by Acronis Backup & Recovery 10. Schedule: Workdays at 8:00 PM Weekly/Monthly: Friday Keep daily

Seite 291 - Inheritance order

360 Copyright © Acronis, Inc., 2000-2009 VM power management • 121 Volume destination • 217, 219 Volume operations • 265 Volume properties • 219 Vo

Seite 292 - 7.1.3.2. Actions on groups

For example, if there are five rings labeled A, B, C, D, and E in the puzzle, the solution gives the following order of moves: The Tower of Hanoi ba

Seite 293 - • IP range

• differential backups on all intermediate levels (B, C and D for five-level pattern) • the pattern starts with a full backup since the very first

Seite 294 - Adding multiple criteria

to this interval and deletes all backups created before that moment. None of the backups created after this moment will be deleted. 2. Keep the arch

Seite 295 - Group details

3.1.4. Number of tasks ...

Seite 296 - 7.1.4. Storage nodes

Combination of rules 1 and 2 You can limit both the backups’ lifetime and the archive size. The diagram below illustrates the resulting rule. Exampl

Seite 297 - • Information panel

This mode ensures that after each cleanup the archive size and the backups’ age are within the bounds you specify. The consolidation, however, may ta

Seite 298

Command line examples trueimagecmd /create /partition:DYN1,DYN2 /asz This will back up DYN1 and DYN2 volumes to the Acronis Secure Zone. trueimagecmd

Seite 299 - Adding a storage node

Backed up (source): Recovered to: Dynamic volume Basic MBR volume Basic GPT volume Dynamic volume Dynamic volume Type as of the target Dynamic vo

Seite 300 - 7.1.5. Tasks

Backup archives created using different ways of access to tape have different formats. A tape written by a storage node cannot be read by an agent.

Seite 301

2.9.2. Using a single tape drive A tape drive that is locally attached to a managed machine can be used by local backup plans as a storage device. T

Seite 302 - 7.1.6. Log

2.10. Proprietary Acronis technologies This section describes the proprietary technologies inherited by Acronis Backup & Recovery 10 from Acroni

Seite 303 - Centralized event log

For more information about operations available in Acronis Secure Zone, see the Personal vaults (p. 154) section. Upgrade from Acronis True Image Ech

Seite 304

handles differences in devices that are critical for the operating system start-up, such as storage controllers, motherboard or chipset. Acronis Back

Seite 305 - Configuring the log table

Universal Restore and Microsoft Sysprep Universal Restore is not a system preparation tool. You can apply it to any Windows image created by Acronis

Seite 306

6.2.7. Archive ... ...

Seite 307

How it works When configuring a recovery operation, you select disks or volumes to recover from a backup. Acronis Backup & Recovery 10 scans the

Seite 308

want the result to be predictable. When recovering a multi-boot system, choose only one system volume and boot volume at a time. 5. Once the system

Seite 309

Since you connect the console to the management server rather than to each machine and perform all management operations through the central manageme

Seite 310

You have to protect each server as a whole, the users' data on the workstations, and the virtual machines. You want to be able to track the heal

Seite 311

5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The storage node enables you to organize the infra

Seite 312

3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of the servers. The policy deployment state h

Seite 313

2.11.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flexibility to protect virtual machines in mul

Seite 314

Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks is created on each machine according to th

Seite 315

The same policy on a group and on a machine 1. The same policy can be applied to a group and to a machine. Nothing changes on the machine at the se

Seite 316 - Event tracing parameters

2.11.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machine can be a member of only one group beside

Seite 317 - When to modify

7.1.4. Storage nodes...

Seite 318 - What to back up

Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is G1's child. The "green" po

Seite 319 - 7.2.1. Policy credentials

#4 "green" "orange" "blue" "violet" Inherited Inherited Inherited Applied directly All machines -> #4 G1

Seite 320 - 7.2.2. Items to back up

the changes are transferred to the machine and the agent deletes the backup plan from it, the policy state on the machine is Revoking. You may change

Seite 321

The backup tasks will start on schedule as specified by the policy and produce a similar result until all data items appear on the machine or the pol

Seite 322

deployment completes on one of the machines while it continues on the other, the state will be "Deploying, Deployed". When the deployment c

Seite 323 - Windows

For example, if a managed vault where deduplication is enabled contains two copies of the same file—whether in the same archive or in different archi

Seite 324 - To specify credentials

• When backing up in the full backup mode similar data from different sources. Such is the case when you back up operating systems and applications

Seite 325 - 7.2.4. Exclusions

disk space (say, 1 GB); the files that are specific to each machine occupy the other 50% (another 1 GB). In a deduplicating vault, the size of the fi

Seite 326 - 7.2.5. Archive

By default, the compacting task runs every Sunday night at 03:00. You can re-schedule the task as described in Operations with storage nodes (p. 297)

Seite 327

2.11.7. Privileges for centralized management This section describes the users' privileges that are required to manage a machine locally and re

Seite 328 - 7.2.7.3. Simple scheme

1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on Acronis’ patented disk imaging and bare me

Seite 329

Note: On a remote machine running Windows Vista with enabled User Account Control (UAC)—and which is not part of a domain—only members of the Adminis

Seite 330

On a domain controller If a machine is a domain controller in an Active Directory domain, the names and default contents of Acronis security groups a

Seite 331

When creating the accounts, follow these guidelines: • For users whom you want to act as storage node administrators, add their accounts to the Admi

Seite 332

Component name Service name Necessary user rights Default user account Acronis Backup & Recovery 10 Agent Acronis Managed Machine Service Log

Seite 333

• Encrypted communication provides secure transfer of information between any two components—for example, between Acronis Backup & Recovery 10 A

Seite 334

When applied to a single machine, the Administrative Template defines the communication settings for all the components on the machine; when applied

Seite 335

Not configured The component will use the default settings, which is to use encryption if possible and to trust self-signed SSL certificates (see the

Seite 336

following option). Enabled Encryption is enabled. In Encryption, select one of the following: Enabled Data transfer will be encrypted if encryption i

Seite 337 - 7.2.8. Archive validation

Configuring the port in the operating system Windows To be able to change the ports' numbers, load and configure the Administrative Template, pr

Seite 338 - Glossary

http://msdn2.microsoft.com/en-us/library/aa374177.aspx 2.11.8.6. SSL certificates Acronis Backup & Recovery 10 components use Secure Sockets

Seite 339

operations • Enterprise level of security Controlling user rights to perform operations and access backups Running services with minimal user rights

Seite 340 - Backup policy (Policy)

To open the list of a machine's certificates 1. Click Start, then click Run, and then type: mmc 2. In the console, on the File menu, click Add

Seite 341 - Built-in group

Copyright © Acronis, Inc., 2000-2009 81 (Note quotation marks; substitute the sample thumbprint shown here with that of your certificate.)

Seite 342 - Centralized vault

3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graphical User Interface. The content of this s

Seite 343 - Deduplication

The option defines whether to display the pop-up messages about task run results: successful completion, failure or success with warnings. When displ

Seite 344 - Disk group

3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the management server. The option defines the fonts

Seite 345 - Dynamic disk

3.2.2.1. Windows event log This option defines whether the management server has to record its own log events in the Application Event Log of Window

Seite 346 - Encrypted archive

3.3. Machine options The machine options define the general behavior of all Acronis Backup & Recovery 10 agents operating on the managed machine,

Seite 347

3.3.2.1. Windows event log This option is effective only in Windows operating systems. This option is not available when operating under the bootabl

Seite 348 - Media builder

1.3.6.1.4.1.24769.100.200.2.0 - string containing the text description of the event (it looks identical to messages published by Acronis Backup &

Seite 349

3.4. Default backup and recovery options 3.4.1. Default backup options Each Acronis agent has its own default backup options. Once an agent is insta

Seite 350 - Storage node-side validation

The simplified way of centralized management • Backup Using the Back up control, select the machine which you want to back up and then create a back

Seite 351 - Validation

Backup performance: Backup priority (p. 99) + + - - HDD writing speed (p. 99) Dest: HDD Dest: HDD Dest: HDD Dest: HDD Network connection speed (p

Seite 352 - Virtual machine

Reset archive bit - + - + Reboot after the backup - - + + Create full backups as synthetic backups + + + + Notifications: E-mail (p. 100) + + - -

Seite 353

3.4.1.2. Source files exclusion This option is effective for Windows and Linux operating systems and bootable media. This option is effective for di

Seite 354

.tmp files. In this case, all .tmp files in the folder MyFolder will be skipped during the backup process, but the file MyFile.tmp will not be skippe

Seite 355

Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do not back up until the command execution is com

Seite 356

<------------------------------ Backup ----------------------------> Pre-backup command Pre-data capture command Data capture Po

Seite 357

execution is complete Result Preset Perform the data capture only after the command is successfully executed. Fail the task if the command executio

Seite 358

3.4.1.5. File-level backup snapshot This option is effective only for file-level backup in Windows and Linux operating systems. This option defines

Seite 359

Microsoft Volume Shadow Copy Service (VSS) provides an infrastructure for backing up data on running systems by ensuring coordination between applica

Seite 360

• Maximum – the data will be compressed as much as possible. The backup duration will be maximal. You may want to select maximum compression when ba

Kommentare zu diesen Handbüchern

Keine Kommentare