User's Guide Acronis® Backup & Recovery ™ 10 Advanced Workstation
10 Copyright © Acronis, Inc., 2000-2009 • Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the
100 Copyright © Acronis, Inc., 2000-2009 3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable
Copyright © Acronis, Inc., 2000-2009 101 • Normal – to run the backup process with normal speed, allocating resources on a par with other processe
102 Copyright © Acronis, Inc., 2000-2009 3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about ba
Copyright © Acronis, Inc., 2000-2009 103 • Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct.
104 Copyright © Acronis, Inc., 2000-2009 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one
Copyright © Acronis, Inc., 2000-2009 105 • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP man
106 Copyright © Acronis, Inc., 2000-2009 to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since
Copyright © Acronis, Inc., 2000-2009 107 Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is t
108 Copyright © Acronis, Inc., 2000-2009 the data will be backed up and you will be able to mount the resulting disk backup and extract valid files
Copyright © Acronis, Inc., 2000-2009 109 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the
Copyright © Acronis, Inc., 2000-2009 11 Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate to the different
110 Copyright © Acronis, Inc., 2000-2009 The program will try to execute the failed task again if you select the Restart a failed task check box an
Copyright © Acronis, Inc., 2000-2009 111 If the console is connected to the management server The Use a separate tape set option has more precise d
112 Copyright © Acronis, Inc., 2000-2009 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you
Copyright © Acronis, Inc., 2000-2009 113 When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup pro
114 Copyright © Acronis, Inc., 2000-2009 3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is
Copyright © Acronis, Inc., 2000-2009 115 Validate backup archive before recovery + + + + Check file system after recovery + - + - Reboot mach
116 Copyright © Acronis, Inc., 2000-2009 Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1.
Copyright © Acronis, Inc., 2000-2009 117 3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This op
118 Copyright © Acronis, Inc., 2000-2009 To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notificati
Copyright © Acronis, Inc., 2000-2009 119 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the se
12 Copyright © Acronis, Inc., 2000-2009 • [Management server name]. Root of the tree also called a Welcome view. Displays the name of the managem
120 Copyright © Acronis, Inc., 2000-2009 This option is not available when operating under the bootable media. The option defines whether the agent
Copyright © Acronis, Inc., 2000-2009 121 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se
122 Copyright © Acronis, Inc., 2000-2009 The preset is Disabled. This option enables booting the machine into the recovered operating system withou
Copyright © Acronis, Inc., 2000-2009 123 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault
124 Copyright © Acronis, Inc., 2000-2009 A vault is called personal if it was created using direct connection of the console to a managed machine.
Copyright © Acronis, Inc., 2000-2009 125 Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the mach
126 Copyright © Acronis, Inc., 2000-2009 • [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contai
Copyright © Acronis, Inc., 2000-2009 127 password (if the vault is encrypted) and information in the Comments field. • The Edit unmanaged vault pa
128 Copyright © Acronis, Inc., 2000-2009 4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the followin
Copyright © Acronis, Inc., 2000-2009 129 o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o
Copyright © Acronis, Inc., 2000-2009 13 actions bar will be named as 'System backup' actions and will have the set of actions typical to
130 Copyright © Acronis, Inc., 2000-2009 o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm w
Copyright © Acronis, Inc., 2000-2009 131 To create a new folder for the vault, click Create folder. A vault can be created in an empty folder onl
132 Copyright © Acronis, Inc., 2000-2009 4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acroni
Copyright © Acronis, Inc., 2000-2009 133 If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by sof
134 Copyright © Acronis, Inc., 2000-2009 If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to
Copyright © Acronis, Inc., 2000-2009 135 Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted,
136 Copyright © Acronis, Inc., 2000-2009 At the Delete operation, the vault content will be deleted from the storage node database without accessin
Copyright © Acronis, Inc., 2000-2009 137 The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction w
138 Copyright © Acronis, Inc., 2000-2009 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage
Copyright © Acronis, Inc., 2000-2009 139 Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the
14 Copyright © Acronis, Inc., 2000-2009 Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 p
140 Copyright © Acronis, Inc., 2000-2009 • Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape,
Copyright © Acronis, Inc., 2000-2009 141 Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes
142 Copyright © Acronis, Inc., 2000-2009 • the full size of the data to protect is approximately 320 GB • the approximate size of daily changes o
Copyright © Acronis, Inc., 2000-2009 143 • GFS Example 3 (p. 147). The Use a separate tape set option is selected. All the Always use a free tape
144 Copyright © Acronis, Inc., 2000-2009 • four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of
Copyright © Acronis, Inc., 2000-2009 145 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the
146 Copyright © Acronis, Inc., 2000-2009 GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set opti
Copyright © Acronis, Inc., 2000-2009 147 As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the sec
148 Copyright © Acronis, Inc., 2000-2009 These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of
Copyright © Acronis, Inc., 2000-2009 149 go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it
Copyright © Acronis, Inc., 2000-2009 15 "Tasks" view Common way of working with views Generally, every view contains a table of items, a
150 Copyright © Acronis, Inc., 2000-2009 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac
Copyright © Acronis, Inc., 2000-2009 151 The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options.
152 Copyright © Acronis, Inc., 2000-2009 The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the
Copyright © Acronis, Inc., 2000-2009 153 • tape rotation scheme ( frequency of backups, retention rules) • tape-append options • requirements to
154 Copyright © Acronis, Inc., 2000-2009 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compress
Copyright © Acronis, Inc., 2000-2009 155 • What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis age
156 Copyright © Acronis, Inc., 2000-2009 name. If you accidentally delete the .meta folder, it will be automatically recreated next time you access
Copyright © Acronis, Inc., 2000-2009 157 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplica
158 Copyright © Acronis, Inc., 2000-2009 4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the
Copyright © Acronis, Inc., 2000-2009 159 All the operations described below are performed by clicking the corresponding buttons on the toolbar. The
16 Copyright © Acronis, Inc., 2000-2009 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of
160 Copyright © Acronis, Inc., 2000-2009 Recover a disk/volume as a virtual machine Right-click the disk backup, then select Recover as virtual mac
Copyright © Acronis, Inc., 2000-2009 161 There should be enough space in the vault for temporary files created during consolidation. Backups result
Copyright © Acronis, Inc., 2000-2009 162 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine
Copyright © Acronis, Inc., 2000-2009 163 The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not
164 Copyright © Acronis, Inc., 2000-2009 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day
Copyright © Acronis, Inc., 2000-2009 165 First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Ef
166 Copyright © Acronis, Inc., 2000-2009 Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certa
Copyright © Acronis, Inc., 2000-2009 167 • Tuesday: every 3 hours from 9 AM till 9 PM • Wednesday: every 3 hours from 9 AM till 9 PM • Thursday:
168 Copyright © Acronis, Inc., 2000-2009 In the During the day execute the task... area, select one of the following: Once at: <...> Set up
Copyright © Acronis, Inc., 2000-2009 169 3. Every: 6 hours. From: 12:00:00 AM Until: 06:00:00 PM. 4. Effective: From: 08/30/2009. Actually the ta
Copyright © Acronis, Inc., 2000-2009 17 Navigation buttons 1.3. Acronis Backup & Recovery 10 components This section contains a list of Acron
170 Copyright © Acronis, Inc., 2000-2009 From: 11/01/2009. To: not set. 5.4. Advanced scheduling settings The following advanced settings are avai
Copyright © Acronis, Inc., 2000-2009 171 Second machine: Every day at 09:00:00 AM Third machine: Every day at 09:59:59 AM Example 2 Suppose that yo
172 Copyright © Acronis, Inc., 2000-2009 Event source Specifies the event source, which typically indicates the program or the system component tha
Copyright © Acronis, Inc., 2000-2009 173 • Event type: Information • Event ID: 18 Tip: To set up a similar backup plan for machines running Micr
174 Copyright © Acronis, Inc., 2000-2009 Example: It is required to run the backup task after free space on the managed machine is changed by at le
Copyright © Acronis, Inc., 2000-2009 175 • Event: Weekly, Every 1 week(s) on <workdays>; Once at 09:00:00 PM. • Condition: Location's
176 Copyright © Acronis, Inc., 2000-2009 • If the task start conditions are Skip the task execution, the task will never run. • If the task start
Copyright © Acronis, Inc., 2000-2009 177 (2) if the free space changes by more than 1GB after 12 hours pass since the last backup successful comple
Copyright © Acronis, Inc., 2000-2009 178 6. Direct management This section covers operations that can be performed directly on a managed machine b
Copyright © Acronis, Inc., 2000-2009 179 server and run Acronis License Server to manage licenses. Please make sure you have a valid license on Acr
18 Copyright © Acronis, Inc., 2000-2009 File backup File-level data protection is based on backing up files and folders residing on the machine whe
180 Copyright © Acronis, Inc., 2000-2009 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared i
Copyright © Acronis, Inc., 2000-2009 181 unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 187) s
182 Copyright © Acronis, Inc., 2000-2009 Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup pl
Copyright © Acronis, Inc., 2000-2009 183 Need interaction Any running task can put itself into the Need interaction state when it needs human inter
184 Copyright © Acronis, Inc., 2000-2009 • Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last
Copyright © Acronis, Inc., 2000-2009 185 Run a plan/task Click Backup plan Run. In the Run Backup Plan (p. 188) window, select the task you need t
186 Copyright © Acronis, Inc., 2000-2009 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.
Copyright © Acronis, Inc., 2000-2009 187 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'
188 Copyright © Acronis, Inc., 2000-2009 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth
Copyright © Acronis, Inc., 2000-2009 189 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover
Copyright © Acronis, Inc., 2000-2009 19 Restore handles differences in devices that are critical for Windows start-up, such as storage controllers,
190 Copyright © Acronis, Inc., 2000-2009 Settings The Settings tab displays information on scheduling and the options changed against the default
Copyright © Acronis, Inc., 2000-2009 191 • Archive name - name of the archive. • Archive comments - comments on the archive (if provided). Settin
192 Copyright © Acronis, Inc., 2000-2009 To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CTR
Copyright © Acronis, Inc., 2000-2009 193 Filter log entries by task, managed entity, machine, code, owner Type the required value (task name, machi
194 Copyright © Acronis, Inc., 2000-2009 6.2. Creating a backup plan Before creating your first backup plan (p. 370), please familiarize yourself
Copyright © Acronis, Inc., 2000-2009 195 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view
196 Copyright © Acronis, Inc., 2000-2009 Host (p. 213) Specify the machine that will perform the conversion. The machine has to have Acronis Backup
Copyright © Acronis, Inc., 2000-2009 197 6.2.3. Source type Select the type of data you want to be backed up on the managed machine. The list of
198 Copyright © Acronis, Inc., 2000-2009 What does a disk or volume backup store? For supported file systems, with the sector-by-sector option turn
Copyright © Acronis, Inc., 2000-2009 199 The program will access the source data using the credentials you specify. Use this option if the plan&apo
Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro
20 Copyright © Acronis, Inc., 2000-2009 VMware vCenter integration This add-on provides the capability to view virtual machines managed by a VMware
200 Copyright © Acronis, Inc., 2000-2009 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the de
Copyright © Acronis, Inc., 2000-2009 201 Backing up to an existing archive You can configure the backup plan to back up to an existing archive. To
202 Copyright © Acronis, Inc., 2000-2009 6.2.9. Backup schemes Choose one of the available backup schemes: • Back up now – to create a backup tas
Copyright © Acronis, Inc., 2000-2009 203 6.2.9.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up data
204 Copyright © Acronis, Inc., 2000-2009 Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup
Copyright © Acronis, Inc., 2000-2009 205 • Weekly/monthly: Saturday (for example) • Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly:
206 Copyright © Acronis, Inc., 2000-2009 Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six
Copyright © Acronis, Inc., 2000-2009 207 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p
208 Copyright © Acronis, Inc., 2000-2009 Roll-back period The number of days we can go back in the archive is different on different days. The mini
Copyright © Acronis, Inc., 2000-2009 209 6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C
Copyright © Acronis, Inc., 2000-2009 21 This functionality cannot be disabled in a managed vault. The next two operations are optional. Deduplicati
210 Copyright © Acronis, Inc., 2000-2009 might end up with no backups if the program is not able to create the new backup for some reason. Apply th
Copyright © Acronis, Inc., 2000-2009 211 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates th
212 Copyright © Acronis, Inc., 2000-2009 • Full backup, runs every Friday at 10:00 PM • Incremental backup, runs manually • Differential backup,
Copyright © Acronis, Inc., 2000-2009 213 task manually after powering off the machine. Any changes made to the machine while it was powered on, wil
214 Copyright © Acronis, Inc., 2000-2009 Virtual machines created on a Hyper-V server or workstation type machines (VMware Workstation, Microsoft V
Copyright © Acronis, Inc., 2000-2009 215 Task credentials (p. 217) [Optional] The task will run on behalf of the user who is creating the task. You
216 Copyright © Acronis, Inc., 2000-2009 [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (
Copyright © Acronis, Inc., 2000-2009 217 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners an
218 Copyright © Acronis, Inc., 2000-2009 • Disks - to recover disks • Volumes - to recover volumes • Files - to recover specific files and folde
Copyright © Acronis, Inc., 2000-2009 219 6.3.5. Access credentials for location Specify the credentials required for access to the location where
22 Copyright © Acronis, Inc., 2000-2009 1.3.5. Acronis Wake-On-LAN Proxy Acronis Wake-On-LAN Proxy enables Acronis Backup & Recovery 10 Manage
220 Copyright © Acronis, Inc., 2000-2009 The new virtual machine will be configured automatically, the source machine configuration being copied wh
Copyright © Acronis, Inc., 2000-2009 221 • Create new The program will generate a new NT signature for the target hard disk drive. • Recover from
222 Copyright © Acronis, Inc., 2000-2009 Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 222) Choose the
Copyright © Acronis, Inc., 2000-2009 223 Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and
224 Copyright © Acronis, Inc., 2000-2009 To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the
Copyright © Acronis, Inc., 2000-2009 225 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of
226 Copyright © Acronis, Inc., 2000-2009 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.
Copyright © Acronis, Inc., 2000-2009 227 • Password. The password for the account. 2. Click OK. 6.3.8. When to recover Select when to start the
228 Copyright © Acronis, Inc., 2000-2009 - If the drivers are on a vendor's disc or other removable media, turn on the Search removable media.
Copyright © Acronis, Inc., 2000-2009 229 XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMware Workstation
Copyright © Acronis, Inc., 2000-2009 23 1.5. Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file sys
230 Copyright © Acronis, Inc., 2000-2009 6.3.11. Bootability troubleshooting If a system was bootable at the time of backup, you expect that it wi
Copyright © Acronis, Inc., 2000-2009 231 • The system loader points to the wrong volume This may happen when system or boot volumes are not recov
232 Copyright © Acronis, Inc., 2000-2009 The lines starting with title, root, kernel, and initrd respectively determine: o The title of the menu i
Copyright © Acronis, Inc., 2000-2009 233 multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin
234 Copyright © Acronis, Inc., 2000-2009 bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure that the
Copyright © Acronis, Inc., 2000-2009 235 To specify credentials 1. Select one of the following: o Run under the current user The task will run un
236 Copyright © Acronis, Inc., 2000-2009 According to the original FTP specification, credentials required for access to FTP servers are transferre
Copyright © Acronis, Inc., 2000-2009 237 6.4.5. Access credentials for source Specify the credentials required for access to the location where th
238 Copyright © Acronis, Inc., 2000-2009 Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, cre
Copyright © Acronis, Inc., 2000-2009 239 o If the archive is stored on a network share, expand the Network folders group, then select the required
24 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Server Item Minimum requirements Recommended System memory 5
240 Copyright © Acronis, Inc., 2000-2009 Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify
Copyright © Acronis, Inc., 2000-2009 241 To unmount an image, select it in the table and click Unmount. To unmount all the mounted volumes, click
242 Copyright © Acronis, Inc., 2000-2009 The resulting archive's options The exported archive inherits the options of the original archive, in
Copyright © Acronis, Inc., 2000-2009 243 Task credentials (p. 243) [Optional] The export task will run on behalf of the user who is creating the t
244 Copyright © Acronis, Inc., 2000-2009 To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials
Copyright © Acronis, Inc., 2000-2009 245 6.7.3. Backup selection To specify a backup(s) to export 1. At the top of the window, select the respect
246 Copyright © Acronis, Inc., 2000-2009 • To export data to a network share, expand the Network folders group, select the required networked mac
Copyright © Acronis, Inc., 2000-2009 247 In any of the above cases, provide an archive name that is unique to the destination folder or vault. If y
248 Copyright © Acronis, Inc., 2000-2009 Size (p. 248) Specify the exact size of the zone. Moving or resizing of locked volumes, such as the volume
Copyright © Acronis, Inc., 2000-2009 249 2. In the Enter the password field, type a new password. 3. In the Confirm the password field, re-type t
Copyright © Acronis, Inc., 2000-2009 25 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders
250 Copyright © Acronis, Inc., 2000-2009 • examine backup content • mount a volume backup to copy files from the backup to a physical disk • saf
Copyright © Acronis, Inc., 2000-2009 251 If you select several volumes, the space will be distributed proportionally to each partition. If you do n
252 Copyright © Acronis, Inc., 2000-2009 • recover an operating system that cannot start • access and back up the data that has survived in a cor
Copyright © Acronis, Inc., 2000-2009 253 Linux-based bootable media Start the Bootable Media Builder either from the management console, by selecti
254 Copyright © Acronis, Inc., 2000-2009 It is recommended that you familiarize yourself with the help documentation supplied with Windows AIK. To
Copyright © Acronis, Inc., 2000-2009 255 Kernel parameters This window lets you specify one or more parameters of the Linux kernel. They will be au
256 Copyright © Acronis, Inc., 2000-2009 nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing
Copyright © Acronis, Inc., 2000-2009 257 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i
258 Copyright © Acronis, Inc., 2000-2009 • to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the
Copyright © Acronis, Inc., 2000-2009 259 7. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots int
26 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo
260 Copyright © Acronis, Inc., 2000-2009 8. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots int
Copyright © Acronis, Inc., 2000-2009 261 6.10.2. Connecting to a machine booted from media Once a machine boots from bootable media, the machine t
262 Copyright © Acronis, Inc., 2000-2009 1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then pr
Copyright © Acronis, Inc., 2000-2009 263 6.10.4. List of commands and utilities available in Linux-based bootable media Linux-based bootable media
264 Copyright © Acronis, Inc., 2000-2009 gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount
Copyright © Acronis, Inc., 2000-2009 265 Under the archive contents, Acronis Backup & Recovery 10 will display a message saying that it detecte
266 Copyright © Acronis, Inc., 2000-2009 8. Click Recover, then specify the path to the archive and any other required parameters, and then click
Copyright © Acronis, Inc., 2000-2009 267 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size
268 Copyright © Acronis, Inc., 2000-2009 ... Dynamic & GPT Volumes: DYN1 4 my_volgroup-my_logvol 12533760 Ext2 You will need the volume&apos
Copyright © Acronis, Inc., 2000-2009 269 6.10.6.2. Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS supp
Copyright © Acronis, Inc., 2000-2009 27 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati
270 Copyright © Acronis, Inc., 2000-2009 6.11. Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configurat
Copyright © Acronis, Inc., 2000-2009 271 Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare
272 Copyright © Acronis, Inc., 2000-2009 Displaying operation results The results of any disk or volume operation, you have just planned, are immed
Copyright © Acronis, Inc., 2000-2009 273 After the initialization, all the disk space remains unallocated and so still impossible to be used for p
274 Copyright © Acronis, Inc., 2000-2009 If the destination is smaller, then the As is option of cloning will be unavailable and proportional resi
Copyright © Acronis, Inc., 2000-2009 275 If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2.
276 Copyright © Acronis, Inc., 2000-2009 If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the
Copyright © Acronis, Inc., 2000-2009 277 In contrast to Windows Disk Manager the program ensures bootability of an offline operating system on the
278 Copyright © Acronis, Inc., 2000-2009 One of the following disk statuses always appears in the graphical view of the disk next to the disk'
Copyright © Acronis, Inc., 2000-2009 279 Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can
28 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates data recovery under the operating system (online). No backup can proceed
280 Copyright © Acronis, Inc., 2000-2009 Create volume wizard The Create volume wizard lets you create any type of volume (including system and a
Copyright © Acronis, Inc., 2000-2009 281 o Select three destination disks to create the volume on. After you choose the disks, the wizard will cal
282 Copyright © Acronis, Inc., 2000-2009 If you are creating a basic volume, which can be made into a system volume, this page will be different, g
Copyright © Acronis, Inc., 2000-2009 283 6.11.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volu
284 Copyright © Acronis, Inc., 2000-2009 6.11.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volum
Copyright © Acronis, Inc., 2000-2009 285 The new volume structure will be graphically represented in the Disk management view. If you set a 64K clu
Copyright © Acronis, Inc., 2000-2009 286 7. Centralized management This section covers operations that can be performed centrally by using the com
Copyright © Acronis, Inc., 2000-2009 287 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has l
288 Copyright © Acronis, Inc., 2000-2009 Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recover
Copyright © Acronis, Inc., 2000-2009 289 • Use the Information pane's tabs to view detailed information about the selected policy and perfor
Copyright © Acronis, Inc., 2000-2009 29 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot
290 Copyright © Acronis, Inc., 2000-2009 o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select a
Copyright © Acronis, Inc., 2000-2009 291 To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is de
292 Copyright © Acronis, Inc., 2000-2009 The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and
Copyright © Acronis, Inc., 2000-2009 293 Settings The tab displays information about the backup scheme used by the policy and backup options that w
294 Copyright © Acronis, Inc., 2000-2009 The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a
Copyright © Acronis, Inc., 2000-2009 295 7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or i
296 Copyright © Acronis, Inc., 2000-2009 Add a machine to another static group Click Add to another group. In the Add to group (p. 299) window, sp
Copyright © Acronis, Inc., 2000-2009 297 View tasks existing on a machine Click View tasks. The Tasks (p. 318) view will display a list of the tas
298 Copyright © Acronis, Inc., 2000-2009 To perform registration through a local or remote console-agent connection, you have to be connected with
Copyright © Acronis, Inc., 2000-2009 299 A registered machine has to be specified by its registration address, that is, you need to provide exactly
Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Backu
30 Copyright © Acronis, Inc., 2000-2009 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech
300 Copyright © Acronis, Inc., 2000-2009 The machine being added becomes a member of more than one group. As a result, the backup policies applied
Copyright © Acronis, Inc., 2000-2009 301 o Online - the machine is available for the management server. This means that the management server&ap
302 Copyright © Acronis, Inc., 2000-2009 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the
Copyright © Acronis, Inc., 2000-2009 303 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all
304 Copyright © Acronis, Inc., 2000-2009 Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing
Copyright © Acronis, Inc., 2000-2009 305 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tas
306 Copyright © Acronis, Inc., 2000-2009 Configuring the machines table By default, the table has five columns that are displayed, others are hidde
Copyright © Acronis, Inc., 2000-2009 307 Refresh a list of groups Click Refresh. The management console will update the list of groups from the ma
308 Copyright © Acronis, Inc., 2000-2009 For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windo
Copyright © Acronis, Inc., 2000-2009 309 Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machine has to be specified
Copyright © Acronis, Inc., 2000-2009 31 specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best gui
310 Copyright © Acronis, Inc., 2000-2009 • Type - type of the group (static, or dynamic) • Criteria (for dynamic groups only) - grouping criteria
Copyright © Acronis, Inc., 2000-2009 311 7.1.4. Virtual machines You can centrally manage virtual machines using either of the following methods
312 Copyright © Acronis, Inc., 2000-2009 7.1.4.1. Virtual machines on a management server Availability of virtual machines Virtual machines are d
Copyright © Acronis, Inc., 2000-2009 313 • Host/VA Using this criterion, you can create a dynamic group of virtual machines hosted on a specified
314 Copyright © Acronis, Inc., 2000-2009 5. Licenses Click Provide license. When installing the trial product version, select Use the following t
Copyright © Acronis, Inc., 2000-2009 315 The group that has the same name as the vCenter Server will be removed and the policies applied to this gr
316 Copyright © Acronis, Inc., 2000-2009 7.1.5.1. Actions on storage nodes All the operations described here, are performed by clicking the corres
Copyright © Acronis, Inc., 2000-2009 317 Refresh the list of storage nodes Click Refresh. The management console will update the list of storage n
318 Copyright © Acronis, Inc., 2000-2009 o Withdrawn - the storage node was registered on another management server. As a result, it is not possib
Copyright © Acronis, Inc., 2000-2009 319 or the backup plan will run. View details of a task Click View details. In the Tasks details (p. 188) win
32 Copyright © Acronis, Inc., 2000-2009 Managing a plan (task) owned by another user Having Administrator privileges on the machine, a user can mod
320 Copyright © Acronis, Inc., 2000-2009 tasks owned by other users. • Each storage node has a built-in service task called a compacting task. This
Copyright © Acronis, Inc., 2000-2009 321 Local and centralized logging in Acronis Backup & Recovery 10 Acronis Backup & Recovery 10 has loc
322 Copyright © Acronis, Inc., 2000-2009 7.1.7.1. Actions on log entries All the operations described below are performed by clicking the corres
Copyright © Acronis, Inc., 2000-2009 323 To Do Display log entries for a given time period 1 In the From field, select the date starting from whi
324 Copyright © Acronis, Inc., 2000-2009 • Machine - The name of the machine where the event has occurred (if any) • Code - Blank or the program
Copyright © Acronis, Inc., 2000-2009 325 Reports about vaults' statistics and task activities are interval-based and provide historical inform
326 Copyright © Acronis, Inc., 2000-2009 7.1.8.2. Report about the backup policies In this view, you can generate a report about the backup polici
Copyright © Acronis, Inc., 2000-2009 327 With the default filter settings, the report includes all backup plans from all machines. Report view Unde
328 Copyright © Acronis, Inc., 2000-2009 Filters Under Filters, choose which archives to include in the report. Only the archives that meet all fi
Copyright © Acronis, Inc., 2000-2009 329 • Specify which table columns to show, and in which order. • Select which diagrams to include in the rep
Copyright © Acronis, Inc., 2000-2009 33 2.5. GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme
330 Copyright © Acronis, Inc., 2000-2009 Explorer, click the Information bar that appears at the top of the webpage by default, and then click Allo
Copyright © Acronis, Inc., 2000-2009 331 7.2.1.1. How to load Acronis Administrative Template The Administrative Template, provided by Acronis, en
332 Copyright © Acronis, Inc., 2000-2009 7.2.1.2. Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup
Copyright © Acronis, Inc., 2000-2009 333 Vault Free Space Warning Percentage Description: Specifies the amount of free space in a managed vault, a
334 Copyright © Acronis, Inc., 2000-2009 Default value: 10 If the amount of free space on the disk containing a managed vault's database is le
Copyright © Acronis, Inc., 2000-2009 335 For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 83). Windows Event L
336 Copyright © Acronis, Inc., 2000-2009 Possible values: Any string 0 to 32765 characters long Default value: public Synchronization Specifies how
Copyright © Acronis, Inc., 2000-2009 337 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priori
338 Copyright © Acronis, Inc., 2000-2009 We recommend setting Second Connection Atempt to True only in networks which often experience problems
Copyright © Acronis, Inc., 2000-2009 339 Default value: 0 If this setting is 0, the management server uses the Snapshot Storage Relative Size setti
34 Copyright © Acronis, Inc., 2000-2009 Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day of the we
340 Copyright © Acronis, Inc., 2000-2009 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue
Copyright © Acronis, Inc., 2000-2009 341 Default value: False Trace Level Description: Specifies the minimum level of severity of events to be reco
342 Copyright © Acronis, Inc., 2000-2009 You may want to increase the initial size of the snapshot storage—or to place it on a different volume—wh
Copyright © Acronis, Inc., 2000-2009 343 Specifies the port that the component will use for incoming and outgoing communication with other Acronis
344 Copyright © Acronis, Inc., 2000-2009 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S
Copyright © Acronis, Inc., 2000-2009 345 Each event has a level from zero to five based on the event's severity, as shown in the following tab
346 Copyright © Acronis, Inc., 2000-2009 You will find the description of these parameters in the correspondent topic about configuration through t
Copyright © Acronis, Inc., 2000-2009 347 General Policy name [Optional] Enter a unique name for the backup policy. A conscious name lets you identi
348 Copyright © Acronis, Inc., 2000-2009 Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, create a custo
Copyright © Acronis, Inc., 2000-2009 349 Storage (p. 213) Choose the storage on the virtualization server or the folder to place the virtual machin
Copyright © Acronis, Inc., 2000-2009 35 Keep backups: Monthly This step defines the retention rule for monthly backups. The cleanup task will run a
350 Copyright © Acronis, Inc., 2000-2009 7.3.2.1. Volumes to back up selection rules Define volume selection rules, according to which the volumes
Copyright © Acronis, Inc., 2000-2009 351 First partition on the first SCSI hard disk of a Linux machine Type or select: /dev/sda1 sda1 is the stan
352 Copyright © Acronis, Inc., 2000-2009 /dev/hda2, and /dev/hda3, respectively. To perform a disk backup of the, say, third partition, one can typ
Copyright © Acronis, Inc., 2000-2009 353 Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, th
354 Copyright © Acronis, Inc., 2000-2009 The root user's home directory /root Directory for all user-related programs /usr Directory for syste
Copyright © Acronis, Inc., 2000-2009 355 You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero
356 Copyright © Acronis, Inc., 2000-2009 The program generates a common name for the new archives and displays it in the Name field. The name looks
Copyright © Acronis, Inc., 2000-2009 357 7.3.7. Backup scheme selection Choose one of the available backup schemes: • Back up now – to create a b
358 Copyright © Acronis, Inc., 2000-2009 7.3.7.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up da
Copyright © Acronis, Inc., 2000-2009 359 • Daily ("Son") backups are incremental. Parameters You can set up the following parameters of
36 Copyright © Acronis, Inc., 2000-2009 Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups wil
360 Copyright © Acronis, Inc., 2000-2009 Backup scheme parameters can then be set up as follows. • Start backup at: 11:00 PM • Back up on: All da
Copyright © Acronis, Inc., 2000-2009 361 • Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (dail
362 Copyright © Acronis, Inc., 2000-2009 • One backup of each level is stored at a time • Higher density of more recent backups Parameters You ca
Copyright © Acronis, Inc., 2000-2009 363 Roll-back period The number of days we can go back in the archive is different on different days. The mini
364 Copyright © Acronis, Inc., 2000-2009 7.3.7.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C
Copyright © Acronis, Inc., 2000-2009 365 might end up with no backups if the program is not able to create the new backup for some reason. Apply th
366 Copyright © Acronis, Inc., 2000-2009 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates th
Copyright © Acronis, Inc., 2000-2009 367 • Full backup, runs every Friday at 10:00 PM • Incremental backup, runs manually • Differential backup,
Copyright © Acronis, Inc., 2000-2009 368 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate
Copyright © Acronis, Inc., 2000-2009 369 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and
Copyright © Acronis, Inc., 2000-2009 37 2.6. Tower of Hanoi backup scheme The need to have frequent backups always conflicts with the cost of keepi
370 Copyright © Acronis, Inc., 2000-2009 Backup options Configuration parameters of a backup operation (p. 369), such as pre/post backup commands
Copyright © Acronis, Inc., 2000-2009 371 3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 369) inst
372 Copyright © Acronis, Inc., 2000-2009 A management server has two built-in groups that contain all machines of each type: All physical machines
Copyright © Acronis, Inc., 2000-2009 373 On a machine that is not registered on the management server, a user having the privilege to back up to th
374 Copyright © Acronis, Inc., 2000-2009 Differential backup A differential backup stores changes to the data against the latest full backup (p.
Copyright © Acronis, Inc., 2000-2009 375 and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the
376 Copyright © Acronis, Inc., 2000-2009 • IP address range. A machine remains in a dynamic group as long as the machine meets the group's c
Copyright © Acronis, Inc., 2000-2009 377 F Full backup A self-sufficient backup (p. 369) containing all data chosen for backup. You do not need ac
378 Copyright © Acronis, Inc., 2000-2009 Managed vault A centralized vault (p. 372) managed by a storage node (p. 379). Archives (p. 369) in a mana
Copyright © Acronis, Inc., 2000-2009 379 Plan See Backup plan (p. 370). Policy See Backup policy (p. 370). R Recovery point Date and time to whic
38 Copyright © Acronis, Inc., 2000-2009 Tower of Hanoi by Acronis The Tower of Hanoi backup scheme is generally too complex to mentally calculate t
380 Copyright © Acronis, Inc., 2000-2009 • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef
Copyright © Acronis, Inc., 2000-2009 381 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolo
382 Copyright © Acronis, Inc., 2000-2009 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 377) is considered vi
Index A A policy on a machine or a group • 57 About Windows loaders • 232 Access credentials • 238, 239 Access credentials for archive location • 19
384 Copyright © Acronis, Inc., 2000-2009 At Windows Event Log event • 171 Attaching a managed vault • 127, 131 B Back up later scheme • 202, 357 Ba
Copyright © Acronis, Inc., 2000-2009 385 Components for centralized management • 19 Compression level • 91, 100 Conditions • 108, 173 Configuring A
386 Copyright © Acronis, Inc., 2000-2009 Drivers for Universal Restore • 254, 257 Dual destination • 46, 92, 108 Dynamic disk • 41, 368, 374, 375,
Copyright © Acronis, Inc., 2000-2009 387 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 134, 137, 154 Items to back up • 194, 197,
388 Copyright © Acronis, Inc., 2000-2009 Organizational unit criterion • 85, 307, 308 Overview • 64, 113, 124, 128, 132, 315 Overwriting • 226 Owne
Copyright © Acronis, Inc., 2000-2009 389 Running Acronis Disk Director Lite • 270 S Scheduling • 108, 162, 203, 212, 237, 358, 367 Secure communica
Copyright © Acronis, Inc., 2000-2009 39 For information about using Tower of Hanoi for tape libraries, see Using the Tower of Hanoi tape rotation s
390 Copyright © Acronis, Inc., 2000-2009 Tower of Hanoi backup scheme • 37, 132, 141, 380 Tower of Hanoi scheme • 206, 361 Types of connection to a
3.1.3. Time-based alerts ...
40 Copyright © Acronis, Inc., 2000-2009 There is a certain risk that all but one backup will be deleted if the maximum archive size is set improper
Copyright © Acronis, Inc., 2000-2009 41 • Retain the backup until all dependent backups become subject to deletion The outdated backup will be kep
42 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, with minor limitations, basic
Copyright © Acronis, Inc., 2000-2009 43 o If the data size is less than 20GB, then one disk can hold, say, 10GB; the other will hold the remaining
44 Copyright © Acronis, Inc., 2000-2009 2.9. Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tape
Copyright © Acronis, Inc., 2000-2009 45 Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7
46 Copyright © Acronis, Inc., 2000-2009 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont
Copyright © Acronis, Inc., 2000-2009 47 With the new Acronis Secure Zone behavior, you obtain the ability to: • list archives located in the zone
48 Copyright © Acronis, Inc., 2000-2009 2.10.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recove
Copyright © Acronis, Inc., 2000-2009 49 Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardwa
6.2.1. Why is the program asking for the password? ... 196 6.2.2
50 Copyright © Acronis, Inc., 2000-2009 Limitation The only supported archive location is a local drive, or more precisely, any device available th
Copyright © Acronis, Inc., 2000-2009 51 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Resto
52 Copyright © Acronis, Inc., 2000-2009 Since you connect the console to the management server rather than to each machine and perform all manageme
Copyright © Acronis, Inc., 2000-2009 53 You have to protect each server as a whole, the users' data on the workstations, and the virtual mach
54 Copyright © Acronis, Inc., 2000-2009 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor
Copyright © Acronis, Inc., 2000-2009 55 3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of
56 Copyright © Acronis, Inc., 2000-2009 2.11.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flex
Copyright © Acronis, Inc., 2000-2009 57 Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks
58 Copyright © Acronis, Inc., 2000-2009 The same policy on a group and on a machine 1. The same policy can be applied to a group and to a machine
Copyright © Acronis, Inc., 2000-2009 59 2.11.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machin
6.10.6. Acronis PXE Server ...
60 Copyright © Acronis, Inc., 2000-2009 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is
Copyright © Acronis, Inc., 2000-2009 61 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited
62 Copyright © Acronis, Inc., 2000-2009 You may change grouping conditions or the machine may change its properties so that the machine leaves one
Copyright © Acronis, Inc., 2000-2009 63 Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is
64 Copyright © Acronis, Inc., 2000-2009 2.11.5.4. Policy status on a group To see this parameter, select Machines in the tree, then select the gr
Copyright © Acronis, Inc., 2000-2009 65 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a du
66 Copyright © Acronis, Inc., 2000-2009 Before sending the item to the vault, the agent queries the deduplication database to determine whether the
Copyright © Acronis, Inc., 2000-2009 67 • When performing incremental backups of data that does not change itself, but changes its location. Such
68 Copyright © Acronis, Inc., 2000-2009 What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previou
Copyright © Acronis, Inc., 2000-2009 69 File-level deduplication restrictions During a file backup to an archive in a deduplicating vault, deduplic
Copyright © Acronis, Inc., 2000-2009 7 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A
70 Copyright © Acronis, Inc., 2000-2009 3. To specify credentials for connection, click Options and then type the user name and password in the Us
Copyright © Acronis, Inc., 2000-2009 71 A user who is a member of this group is a management server administrator. Management server administrators
72 Copyright © Acronis, Inc., 2000-2009 Users with these additional privileges are also called storage node administrators. Recommendations on user
Copyright © Acronis, Inc., 2000-2009 73 2.11.7.7. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Bac
74 Copyright © Acronis, Inc., 2000-2009 2.11.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acron
Copyright © Acronis, Inc., 2000-2009 75 Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node
76 Copyright © Acronis, Inc., 2000-2009 Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disable
Copyright © Acronis, Inc., 2000-2009 77 Always use The use of SSL certificates is enabled. The connection will be established only if the use of SS
78 Copyright © Acronis, Inc., 2000-2009 2.11.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network
Copyright © Acronis, Inc., 2000-2009 79 In Windows, the certificate path and the server certificate's file name are specified in the registry
8 Copyright © Acronis, Inc., 2000-2009 • Enterprise level of security Controlling user rights to perform operations and access backups Running ser
80 Copyright © Acronis, Inc., 2000-2009 Non-self-signed certificates You have the option to use trusted third-party certificates or certificates cr
Copyright © Acronis, Inc., 2000-2009 81 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph
82 Copyright © Acronis, Inc., 2000-2009 The option defines whether to display the pop-up messages about task run results: successful completion, fa
Copyright © Acronis, Inc., 2000-2009 83 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem
84 Copyright © Acronis, Inc., 2000-2009 entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the
Copyright © Acronis, Inc., 2000-2009 85 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appr
86 Copyright © Acronis, Inc., 2000-2009 b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is installe
Copyright © Acronis, Inc., 2000-2009 87 On the vCenter Server side When integration is enabled, the vCenter Server will store and show information
88 Copyright © Acronis, Inc., 2000-2009 3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the ma
Copyright © Acronis, Inc., 2000-2009 89 The option defines whether the agent(s) operating on the managed machine have to send the log events to the
Copyright © Acronis, Inc., 2000-2009 9 The simplified way of centralized management • Backup Using the Back up control, select the machine which y
90 Copyright © Acronis, Inc., 2000-2009 5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operati
Copyright © Acronis, Inc., 2000-2009 91 • The type of the data being backed up (disk, file) • The backup destination (networked location or local
92 Copyright © Acronis, Inc., 2000-2009 media media Error handling (p. 107): Do not show messages and dialogs while processing (silent mode) + +
Copyright © Acronis, Inc., 2000-2009 93 3.4.1.1. Archive protection This option is effective for Windows and Linux operating systems and bootable
94 Copyright © Acronis, Inc., 2000-2009 • Exclude all system files and folders Select this check box to skip files and folders with the System att
Copyright © Acronis, Inc., 2000-2009 95 The program does not support interactive commands, i.e. commands that require user input (for example, &quo
96 Copyright © Acronis, Inc., 2000-2009 Post-backup command To specify a command/executable file to be executed after the backup is completed 1. I
Copyright © Acronis, Inc., 2000-2009 97 o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture co
98 Copyright © Acronis, Inc., 2000-2009 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do no
Copyright © Acronis, Inc., 2000-2009 99 The option determines whether to take snapshots of multiple volumes at the same time or one by one. The pre
Kommentare zu diesen Handbüchern