ACRONIS Acronis Backup & Recovery 10 Advanced Workstation Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Backup-Wiederherstellungssoftware ACRONIS Acronis Backup & Recovery 10 Advanced Workstation herunter. Acronis Backup & Recovery 10 Advanced Workstation Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 390
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Advanced Workstation

User's Guide Acronis® Backup & Recovery ™ 10 Advanced Workstation

Seite 2

10 Copyright © Acronis, Inc., 2000-2009 • Creating a backup policy rather than backup plans Set up a centralized backup policy and apply it to the

Seite 3 - Table of Contents

100 Copyright © Acronis, Inc., 2000-2009 3.4.1.8. Compression level This option is effective for Windows and Linux operating systems and bootable

Seite 4

Copyright © Acronis, Inc., 2000-2009 101 • Normal – to run the backup process with normal speed, allocating resources on a par with other processe

Seite 5

102 Copyright © Acronis, Inc., 2000-2009 3.4.1.10. Notifications Acronis Backup & Recovery 10 provides the ability of notifying users about ba

Seite 6

Copyright © Acronis, Inc., 2000-2009 103 • Password – enter the password. 6. Click Send test e-mail message to check if the settings are correct.

Seite 7

104 Copyright © Acronis, Inc., 2000-2009 To select whether to log the backup operations events in the Application Event Log of Windows: Choose one

Seite 8 - 1.2. Getting started

Copyright © Acronis, Inc., 2000-2009 105 • Do not send SNMP notifications – to disable sending the log events of the backup operations to SNMP man

Seite 9

106 Copyright © Acronis, Inc., 2000-2009 to multiple CDs or DVDs later on. You might also want to split the backup destined to an FTP server, since

Seite 10

Copyright © Acronis, Inc., 2000-2009 107 Select the check boxes for the components you want to put on the bootable media: • One-Click Restore is t

Seite 11 - Navigation tree

108 Copyright © Acronis, Inc., 2000-2009 the data will be backed up and you will be able to mount the resulting disk backup and extract valid files

Seite 12 - Shortcuts bar

Copyright © Acronis, Inc., 2000-2009 109 The preset is: Wait until the conditions are met. Wait until the conditions are met With this setting, the

Seite 13 - Actions

Copyright © Acronis, Inc., 2000-2009 11 Navigation pane Contains the Navigation tree and the Shortcuts bar and lets you navigate to the different

Seite 14 - How to expand/minimize panes

110 Copyright © Acronis, Inc., 2000-2009 The program will try to execute the failed task again if you select the Restart a failed task check box an

Seite 15 - Action pages

Copyright © Acronis, Inc., 2000-2009 111 If the console is connected to the management server The Use a separate tape set option has more precise d

Seite 16

112 Copyright © Acronis, Inc., 2000-2009 When starting backup to a non-empty tape in a locally attached tape device, the program will warn that you

Seite 17 - 1.3.1. Agent for Windows

Copyright © Acronis, Inc., 2000-2009 113 When the option is enabled, Acronis Backup & Recovery 10 will restart the machine after the backup pro

Seite 18 - 1.3.1.2. Deduplication

114 Copyright © Acronis, Inc., 2000-2009 3.4.2. Default recovery options Each Acronis agent has its own default recovery options. Once an agent is

Seite 19 - 1.3.3.1. Management Server

Copyright © Acronis, Inc., 2000-2009 115 Validate backup archive before recovery + + + + Check file system after recovery + - + - Reboot mach

Seite 20 - 1.3.3.2. Storage Node

116 Copyright © Acronis, Inc., 2000-2009 Pre-recovery command To specify a command/batch file to be executed before the recovery process starts 1.

Seite 21 - 1.3.4. Management Console

Copyright © Acronis, Inc., 2000-2009 117 3.4.2.2. Recovery priority This option is effective for both Windows and Linux operating systems. This op

Seite 22 - 10 Storage Node

118 Copyright © Acronis, Inc., 2000-2009 To configure e-mail notification 1. Select the Send e-mail notifications check box to activate notificati

Seite 23 - 1.6. Hardware requirements

Copyright © Acronis, Inc., 2000-2009 119 The Messenger service is not started by default in the Microsoft Windows Server 2003 family. Change the se

Seite 24 - 1.7. Technical support

12 Copyright © Acronis, Inc., 2000-2009 • [Management server name]. Root of the tree also called a Welcome view. Displays the name of the managem

Seite 25 - 2.1. Basic concepts

120 Copyright © Acronis, Inc., 2000-2009 This option is not available when operating under the bootable media. The option defines whether the agent

Seite 26

Copyright © Acronis, Inc., 2000-2009 121 When a recoverable error occurs, the program re-attempts to perform the unsuccessful operation. You can se

Seite 27 - Backup using bootable media

122 Copyright © Acronis, Inc., 2000-2009 The preset is Disabled. This option enables booting the machine into the recovered operating system withou

Seite 28

Copyright © Acronis, Inc., 2000-2009 123 4. Vaults A vault is a location for storing backup archives. For ease of use and administration, a vault

Seite 29 - Full backup

124 Copyright © Acronis, Inc., 2000-2009 A vault is called personal if it was created using direct connection of the console to a managed machine.

Seite 30 - Differential backup

Copyright © Acronis, Inc., 2000-2009 125 Accessing managed vaults To be able to back up to a managed vault, a user must have an account on the mach

Seite 31 - 2.4. Owners and credentials

126 Copyright © Acronis, Inc., 2000-2009 • [for managed vaults only] encryption state (Yes, No) Vault content The Vault content section contai

Seite 32 - Archive owner

Copyright © Acronis, Inc., 2000-2009 127 password (if the vault is encrypted) and information in the Comments field. • The Edit unmanaged vault pa

Seite 33 - 2.5. GFS backup scheme

128 Copyright © Acronis, Inc., 2000-2009 4.1.2.1. Creating a managed centralized vault To create a managed centralized vault, perform the followin

Seite 34

Copyright © Acronis, Inc., 2000-2009 129 o on the hard drives local to the storage node o on a network share o on a Storage Area Network (SAN) o

Seite 35 - The resulting archive: ideal

Copyright © Acronis, Inc., 2000-2009 13 actions bar will be named as 'System backup' actions and will have the set of actions typical to

Seite 36 - The resulting archive: real

130 Copyright © Acronis, Inc., 2000-2009 o AES 128 – the vault contents will be encrypted using the Advanced Standard Encryption (AES) algorithm w

Seite 37 - Tower of Hanoi overview

Copyright © Acronis, Inc., 2000-2009 131 To create a new folder for the vault, click Create folder. A vault can be created in an empty folder onl

Seite 38 - Tower of Hanoi by Acronis

132 Copyright © Acronis, Inc., 2000-2009 4.1.3.1. Overview Acronis Backup & Recovery 10 provides full support of a tape library through Acroni

Seite 39 - 2.7. Retention rules

Copyright © Acronis, Inc., 2000-2009 133 If all cartridges in a tape library have barcodes, the library is ready to be automatically managed by sof

Seite 40 - Combination of rules 1 and 2

134 Copyright © Acronis, Inc., 2000-2009 If a tape was used previously, the RSM tries to detect the registered application the tape is concerned to

Seite 41 - Best practices

Copyright © Acronis, Inc., 2000-2009 135 Fill the library slots with tape cartridges. If a tape does not get a barcode or its barcode is corrupted,

Seite 42 - Recovering dynamic volumes

136 Copyright © Acronis, Inc., 2000-2009 At the Delete operation, the vault content will be deleted from the storage node database without accessin

Seite 43

Copyright © Acronis, Inc., 2000-2009 137 The program finds the tapes and inserts them automatically in the right order. The Task Need Interaction w

Seite 44 - 2.9. Tape support

138 Copyright © Acronis, Inc., 2000-2009 To launch the procedure select the tape library vault in the Navigation pane of the console, click Manage

Seite 45

Copyright © Acronis, Inc., 2000-2009 139 Tapes from the Free or the Imported pool can be renamed on condition that the user account used to run the

Seite 46 - 2.10.1. Acronis Secure Zone

14 Copyright © Acronis, Inc., 2000-2009 Help Contains a list of help topics. Different views and action pages of Acronis Backup & Recovery 10 p

Seite 47 - Limitation

140 Copyright © Acronis, Inc., 2000-2009 • Ask for user interaction - the backup task will enter the Need Interaction state and wait for the tape,

Seite 48 - Restore)

Copyright © Acronis, Inc., 2000-2009 141 Simple backup scheme is disabled, because backup consolidation is impossible for archives located on tapes

Seite 49 - Supported operating systems

142 Copyright © Acronis, Inc., 2000-2009 • the full size of the data to protect is approximately 320 GB • the approximate size of daily changes o

Seite 50 - How to use

Copyright © Acronis, Inc., 2000-2009 143 • GFS Example 3 (p. 147). The Use a separate tape set option is selected. All the Always use a free tape

Seite 51 - 2.11.1. Basic concepts

144 Copyright © Acronis, Inc., 2000-2009 • four incremental backups on the 4th week. The next full backup (320 Gb) should be written on Friday of

Seite 52

Copyright © Acronis, Inc., 2000-2009 145 The next figure shows the actual usage of the tapes with free space instead of the deleted backups on the

Seite 53

146 Copyright © Acronis, Inc., 2000-2009 GFS Example 2 Suppose, the backup plan has the following tape options: • the Use a separate tape set opti

Seite 54 - Setting up the storage node

Copyright © Acronis, Inc., 2000-2009 147 As the GFS backup scheme forces automatic deletion of the outdated backups, on the first Friday of the sec

Seite 55

148 Copyright © Acronis, Inc., 2000-2009 These options define the tape rotation scheme that is classical for GFS. The figure shows the beginning of

Seite 56

Copyright © Acronis, Inc., 2000-2009 149 go back in the archive) is 8 weeks. Tape rotation for the second case includes 128 daily sessions, i.e. it

Seite 57 - Policy on a group

Copyright © Acronis, Inc., 2000-2009 15 "Tasks" view Common way of working with views Generally, every view contains a table of items, a

Seite 58

150 Copyright © Acronis, Inc., 2000-2009 As the Tower of Hanoi backup scheme forces presence of only one backup on each level, all the outdated bac

Seite 59

Copyright © Acronis, Inc., 2000-2009 151 The first figure shows the tapes’ usage for the ToH scheme combined with the above mentioned tape options.

Seite 60

152 Copyright © Acronis, Inc., 2000-2009 The figure shows tape rotation for the ToH scheme with these options. Maximal number of tapes used in the

Seite 61

Copyright © Acronis, Inc., 2000-2009 153 • tape rotation scheme ( frequency of backups, retention rules) • tape-append options • requirements to

Seite 62 - Backup policy state diagram

154 Copyright © Acronis, Inc., 2000-2009 • average size of incremental backups is I_GB • average size of differential backups is D_GB • compress

Seite 63

Copyright © Acronis, Inc., 2000-2009 155 • What if I need to use a tape from the tape library in the local tape device and vice versa? Acronis age

Seite 64 - 2.11.6. Deduplication

156 Copyright © Acronis, Inc., 2000-2009 name. If you accidentally delete the .meta folder, it will be automatically recreated next time you access

Seite 65 - Deduplication at source

Copyright © Acronis, Inc., 2000-2009 157 • [Archive Name] The Actions bar is available when you select an archive in the archives table. Duplica

Seite 66 - Deduplication at target

158 Copyright © Acronis, Inc., 2000-2009 4.2.2.1. Creating a personal vault To create a personal vault 1. In the Name field, type a name for the

Seite 67

Copyright © Acronis, Inc., 2000-2009 159 All the operations described below are performed by clicking the corresponding buttons on the toolbar. The

Seite 68 - What ratio to expect

16 Copyright © Acronis, Inc., 2000-2009 Action page - Create backup plan Using controls and specifying settings The action pages offer two ways of

Seite 69 - Remote connection

160 Copyright © Acronis, Inc., 2000-2009 Recover a disk/volume as a virtual machine Right-click the disk backup, then select Recover as virtual mac

Seite 70

Copyright © Acronis, Inc., 2000-2009 161 There should be enough space in the vault for temporary files created during consolidation. Backups result

Seite 71 - On a domain controller

Copyright © Acronis, Inc., 2000-2009 162 5. Scheduling Acronis scheduler helps the administrator adapt backup plans to the company’s daily routine

Seite 72

Copyright © Acronis, Inc., 2000-2009 163 The scheduler behavior, in case the event occurs but the condition (or any of multiple conditions) is not

Seite 73

164 Copyright © Acronis, Inc., 2000-2009 Run the task every day at 6PM. The schedule's parameters are thus set up as follows. 1. Every: 1 day

Seite 74

Copyright © Acronis, Inc., 2000-2009 165 First daily schedule 1. Every: 3 day(s). 2. Every: 4 hours. From: 08:00:00 AM Until: 12:00:00 PM. 3. Ef

Seite 75 - Remote Agent ports

166 Copyright © Acronis, Inc., 2000-2009 Examples "One day in the week" schedule Run the task every Friday at 10PM, starting from a certa

Seite 76 - Client Encryption options

Copyright © Acronis, Inc., 2000-2009 167 • Tuesday: every 3 hours from 9 AM till 9 PM • Wednesday: every 3 hours from 9 AM till 9 PM • Thursday:

Seite 77 - Server Encryption options

168 Copyright © Acronis, Inc., 2000-2009 In the During the day execute the task... area, select one of the following: Once at: <...> Set up

Seite 78 - 2.11.8.5. SSL certificates

Copyright © Acronis, Inc., 2000-2009 169 3. Every: 6 hours. From: 12:00:00 AM Until: 06:00:00 PM. 4. Effective: From: 08/30/2009. Actually the ta

Seite 79 - Self-signed certificates

Copyright © Acronis, Inc., 2000-2009 17 Navigation buttons 1.3. Acronis Backup & Recovery 10 components This section contains a list of Acron

Seite 80 - Non-self-signed certificates

170 Copyright © Acronis, Inc., 2000-2009 From: 11/01/2009. To: not set. 5.4. Advanced scheduling settings The following advanced settings are avai

Seite 81 - 3. Options

Copyright © Acronis, Inc., 2000-2009 171 Second machine: Every day at 09:00:00 AM Third machine: Every day at 09:59:59 AM Example 2 Suppose that yo

Seite 82 - 3.1.4. Number of tasks

172 Copyright © Acronis, Inc., 2000-2009 Event source Specifies the event source, which typically indicates the program or the system component tha

Seite 83 - 3.2.2. Log cleanup rules

Copyright © Acronis, Inc., 2000-2009 173 • Event type: Information • Event ID: 18 Tip: To set up a similar backup plan for machines running Micr

Seite 84 - 3.2.3. Event tracing

174 Copyright © Acronis, Inc., 2000-2009 Example: It is required to run the backup task after free space on the managed machine is changed by at le

Seite 85 - 3.2.5. Acronis WOL Proxy

Copyright © Acronis, Inc., 2000-2009 175 • Event: Weekly, Every 1 week(s) on <workdays>; Once at 09:00:00 PM. • Condition: Location's

Seite 86

176 Copyright © Acronis, Inc., 2000-2009 • If the task start conditions are Skip the task execution, the task will never run. • If the task start

Seite 87 - 3.3. Machine options

Copyright © Acronis, Inc., 2000-2009 177 (2) if the free space changes by more than 1GB after 12 hours pass since the last backup successful comple

Seite 88 - 3.3.2. Event tracing

Copyright © Acronis, Inc., 2000-2009 178 6. Direct management This section covers operations that can be performed directly on a managed machine b

Seite 89

Copyright © Acronis, Inc., 2000-2009 179 server and run Acronis License Server to manage licenses. Please make sure you have a valid license on Acr

Seite 90 - 3.3.3. Log cleanup rules

18 Copyright © Acronis, Inc., 2000-2009 File backup File-level data protection is based on backing up files and folders residing on the machine whe

Seite 91

180 Copyright © Acronis, Inc., 2000-2009 How it is determined Errors Highlight the date in red if at least one "Error" entry appeared i

Seite 92

Copyright © Acronis, Inc., 2000-2009 181 unneeded columns and show the hidden ones. See the Filtering and sorting backup plans and tasks (p. 187) s

Seite 93 - 3.4.1.1. Archive protection

182 Copyright © Acronis, Inc., 2000-2009 Backup plan statuses A backup plan can have one of the following statuses: Error; Warning; OK. A backup pl

Seite 94 - 3.4.1.3. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 183 Need interaction Any running task can put itself into the Need interaction state when it needs human inter

Seite 95 - Pre-backup command

184 Copyright © Acronis, Inc., 2000-2009 • Edit the backup policy on the management server in case a centralized plan has failed 2 Warning Last

Seite 96 - Post-backup command

Copyright © Acronis, Inc., 2000-2009 185 Run a plan/task Click Backup plan Run. In the Run Backup Plan (p. 188) window, select the task you need t

Seite 97 - Post-data capture command

186 Copyright © Acronis, Inc., 2000-2009 Edit a plan/task Click Backup plan Edit. Backup plan editing is performed in the same way as creation (p.

Seite 98 - • Do not create a snapshot

Copyright © Acronis, Inc., 2000-2009 187 Delete a plan/task Click Backup plan Delete. What will happen if I delete the backup plan? The plan'

Seite 99 - Volume shadow copy writers

188 Copyright © Acronis, Inc., 2000-2009 Configuring backup plans and the tasks table By default, the table has six columns that are displayed, oth

Seite 100 - Backup priority

Copyright © Acronis, Inc., 2000-2009 189 Recovery (disk) Disk backup recovery Recovery (file) File and folder recovery Recovery (volume) Recover

Seite 101 - Network connection speed

Copyright © Acronis, Inc., 2000-2009 19 Restore handles differences in devices that are critical for Windows start-up, such as storage controllers,

Seite 102 - 3.4.1.10. Notifications

190 Copyright © Acronis, Inc., 2000-2009 Settings The Settings tab displays information on scheduling and the options changed against the default

Seite 103 - 3.4.1.11. Event tracing

Copyright © Acronis, Inc., 2000-2009 191 • Archive name - name of the archive. • Archive comments - comments on the archive (if provided). Settin

Seite 104 - SNMP notifications

192 Copyright © Acronis, Inc., 2000-2009 To Do Select a single log entry Click on it. Select multiple log entries • non-contiguous: hold down CTR

Seite 105 - 3.4.1.13. Backup splitting

Copyright © Acronis, Inc., 2000-2009 193 Filter log entries by task, managed entity, machine, code, owner Type the required value (task name, machi

Seite 106 - 3.4.1.15. Media components

194 Copyright © Acronis, Inc., 2000-2009 6.2. Creating a backup plan Before creating your first backup plan (p. 370), please familiarize yourself

Seite 107 - 3.4.1.16. Error handling

Copyright © Acronis, Inc., 2000-2009 195 Archive comments [Optional] Enter comments on the archive. To access this option, select the Advanced view

Seite 108 - 3.4.1.17. Dual destination

196 Copyright © Acronis, Inc., 2000-2009 Host (p. 213) Specify the machine that will perform the conversion. The machine has to have Acronis Backup

Seite 109 - Skip the task execution

Copyright © Acronis, Inc., 2000-2009 197 6.2.3. Source type Select the type of data you want to be backed up on the managed machine. The list of

Seite 110 - 3.4.1.20. Tape support

198 Copyright © Acronis, Inc., 2000-2009 What does a disk or volume backup store? For supported file systems, with the sector-by-sector option turn

Seite 111 - Always use a free tape

Copyright © Acronis, Inc., 2000-2009 199 The program will access the source data using the credentials you specify. Use this option if the plan&apo

Seite 112 - Reset archive bit

Copyright © Acronis, Inc., 2000-2009. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acro

Seite 113 - Use FTP in Active mode

20 Copyright © Acronis, Inc., 2000-2009 VMware vCenter integration This add-on provides the capability to view virtual machines managed by a VMware

Seite 114

200 Copyright © Acronis, Inc., 2000-2009 6.2.7. Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the de

Seite 115 - 3.4.2.1. Pre/Post commands

Copyright © Acronis, Inc., 2000-2009 201 Backing up to an existing archive You can configure the backup plan to back up to an existing archive. To

Seite 116 - Post-recovery command

202 Copyright © Acronis, Inc., 2000-2009 6.2.9. Backup schemes Choose one of the available backup schemes: • Back up now – to create a backup tas

Seite 117 - 3.4.2.4. Notifications

Copyright © Acronis, Inc., 2000-2009 203 6.2.9.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up data

Seite 118

204 Copyright © Acronis, Inc., 2000-2009 Parameters You can set up the following parameters of a Grandfather-Father-Son (GFS) scheme. Start backup

Seite 119 - 3.4.2.5. Event tracing

Copyright © Acronis, Inc., 2000-2009 205 • Weekly/monthly: Saturday (for example) • Keep backups: o Daily: 1 week o Weekly: 1 month o Monthly:

Seite 120 - 3.4.2.6. Error handling

206 Copyright © Acronis, Inc., 2000-2009 Moreover, assume that you want to retain access to all backups, including the daily ones, for at least six

Seite 121

Copyright © Acronis, Inc., 2000-2009 207 Parameters You can set up the following parameters of a Tower of Hanoi scheme. Schedule Set up a daily (p

Seite 122

208 Copyright © Acronis, Inc., 2000-2009 Roll-back period The number of days we can go back in the archive is different on different days. The mini

Seite 123 - 4. Vaults

Copyright © Acronis, Inc., 2000-2009 209 6.2.9.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C

Seite 124 - 4.1. Centralized vaults

Copyright © Acronis, Inc., 2000-2009 21 This functionality cannot be disabled in a managed vault. The next two operations are optional. Deduplicati

Seite 125 - Pie chart with legend

210 Copyright © Acronis, Inc., 2000-2009 might end up with no backups if the program is not able to create the new backup for some reason. Apply th

Seite 126 - Vault content

Copyright © Acronis, Inc., 2000-2009 211 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates th

Seite 127

212 Copyright © Acronis, Inc., 2000-2009 • Full backup, runs every Friday at 10:00 PM • Incremental backup, runs manually • Differential backup,

Seite 128 - Vault path

Copyright © Acronis, Inc., 2000-2009 213 task manually after powering off the machine. Any changes made to the machine while it was powered on, wil

Seite 129 - Vault encryption

214 Copyright © Acronis, Inc., 2000-2009 Virtual machines created on a Hyper-V server or workstation type machines (VMware Workstation, Microsoft V

Seite 130

Copyright © Acronis, Inc., 2000-2009 215 Task credentials (p. 217) [Optional] The task will run on behalf of the user who is creating the task. You

Seite 131 - 4.1.3. Tape libraries

216 Copyright © Acronis, Inc., 2000-2009 [Optional] Acronis Universal Restore Applies to: Windows OS and system volume recovery Universal Restore (

Seite 132 - 4.1.3.2. Hardware

Copyright © Acronis, Inc., 2000-2009 217 2. Click OK. To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners an

Seite 133 - 4.1.3.4. RSM Media Pools

218 Copyright © Acronis, Inc., 2000-2009 • Disks - to recover disks • Volumes - to recover volumes • Files - to recover specific files and folde

Seite 134 - Prerequisites

Copyright © Acronis, Inc., 2000-2009 219 6.3.5. Access credentials for location Specify the credentials required for access to the location where

Seite 135

22 Copyright © Acronis, Inc., 2000-2009 1.3.5. Acronis Wake-On-LAN Proxy Acronis Wake-On-LAN Proxy enables Acronis Backup & Recovery 10 Manage

Seite 136 - Recovering from tape library

220 Copyright © Acronis, Inc., 2000-2009 The new virtual machine will be configured automatically, the source machine configuration being copied wh

Seite 137 - Inventory

Copyright © Acronis, Inc., 2000-2009 221 • Create new The program will generate a new NT signature for the target hard disk drive. • Recover from

Seite 138 - Labeling

222 Copyright © Acronis, Inc., 2000-2009 Recover [Disk #] MBR to: [If the Master Boot Record is selected for recovery] Disk # (p. 222) Choose the

Seite 139 - 4.1.3.7. Tape support

Copyright © Acronis, Inc., 2000-2009 223 Properties Type A basic MBR disk can contain up to four primary volumes or up to three primary volumes and

Seite 140 - Choosing a backup scheme

224 Copyright © Acronis, Inc., 2000-2009 To select the virtualization server the new virtual machine will be created on 1. Choose the Place on the

Seite 141 - Case to analyze

Copyright © Acronis, Inc., 2000-2009 225 This is the number of processors of the new virtual machine. In most cases it is set to one. The result of

Seite 142

226 Copyright © Acronis, Inc., 2000-2009 Exclusion examples Criterion Example Description By name File1.log Excludes all files named File1.log.

Seite 143 - GFS Example 1

Copyright © Acronis, Inc., 2000-2009 227 • Password. The password for the account. 2. Click OK. 6.3.8. When to recover Select when to start the

Seite 144

228 Copyright © Acronis, Inc., 2000-2009 - If the drivers are on a vendor's disc or other removable media, turn on the Search removable media.

Seite 145

Copyright © Acronis, Inc., 2000-2009 229 XenServer virtual appliance can be imported to a XenServer using Citrix XenCenter. The VMware Workstation

Seite 146 - GFS Example 2

Copyright © Acronis, Inc., 2000-2009 23 1.5. Supported file systems Acronis Backup & Recovery 10 can back up and recover the following file sys

Seite 147 - GFS Example 3

230 Copyright © Acronis, Inc., 2000-2009 6.3.11. Bootability troubleshooting If a system was bootable at the time of backup, you expect that it wi

Seite 148

Copyright © Acronis, Inc., 2000-2009 231 • The system loader points to the wrong volume This may happen when system or boot volumes are not recov

Seite 149 - ToH Example 1

232 Copyright © Acronis, Inc., 2000-2009 The lines starting with title, root, kernel, and initrd respectively determine: o The title of the menu i

Seite 150 - ToH Example 2

Copyright © Acronis, Inc., 2000-2009 233 multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin

Seite 151 - ToH Example 3

234 Copyright © Acronis, Inc., 2000-2009 bootable environment to a spare hard drive can guarantee success of the recovery. At least ensure that the

Seite 152 - Tape planning

Copyright © Acronis, Inc., 2000-2009 235 To specify credentials 1. Select one of the following: o Run under the current user The task will run un

Seite 153 - Tape planning: Example 2

236 Copyright © Acronis, Inc., 2000-2009 According to the original FTP specification, credentials required for access to FTP servers are transferre

Seite 154 - 4.1.3.9. What if

Copyright © Acronis, Inc., 2000-2009 237 6.4.5. Access credentials for source Specify the credentials required for access to the location where th

Seite 155 - 4.2. Personal vaults

238 Copyright © Acronis, Inc., 2000-2009 Mounting volumes in the read/write mode enables you to modify the backup content, that is, save, move, cre

Seite 156

Copyright © Acronis, Inc., 2000-2009 239 o If the archive is stored on a network share, expand the Network folders group, then select the required

Seite 157

24 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 Management Server Item Minimum requirements Recommended System memory 5

Seite 158 - 4.3. Common operations

240 Copyright © Acronis, Inc., 2000-2009 Specify: • User name. When entering the name of an Active Directory user account, be sure to also specify

Seite 159

Copyright © Acronis, Inc., 2000-2009 241 To unmount an image, select it in the table and click Unmount. To unmount all the mounted volumes, click

Seite 160

242 Copyright © Acronis, Inc., 2000-2009 The resulting archive's options The exported archive inherits the options of the original archive, in

Seite 161 - To show or hide columns

Copyright © Acronis, Inc., 2000-2009 243 Task credentials (p. 243) [Optional] The export task will run on behalf of the user who is creating the t

Seite 162 - 5. Scheduling

244 Copyright © Acronis, Inc., 2000-2009 To learn more about using credentials in Acronis Backup & Recovery 10, see the Owners and credentials

Seite 163 - 5.1. Daily schedule

Copyright © Acronis, Inc., 2000-2009 245 6.7.3. Backup selection To specify a backup(s) to export 1. At the top of the window, select the respect

Seite 164

246 Copyright © Acronis, Inc., 2000-2009 • To export data to a network share, expand the Network folders group, select the required networked mac

Seite 165 - 5.2. Weekly schedule

Copyright © Acronis, Inc., 2000-2009 247 In any of the above cases, provide an archive name that is unique to the destination folder or vault. If y

Seite 166 - Examples

248 Copyright © Acronis, Inc., 2000-2009 Size (p. 248) Specify the exact size of the zone. Moving or resizing of locked volumes, such as the volume

Seite 167 - 5.3. Monthly schedule

Copyright © Acronis, Inc., 2000-2009 249 2. In the Enter the password field, type a new password. 3. In the Confirm the password field, re-type t

Seite 168

Copyright © Acronis, Inc., 2000-2009 25 2. Understanding Acronis Backup & Recovery 10 This section attempts to give its readers a clear unders

Seite 169

250 Copyright © Acronis, Inc., 2000-2009 • examine backup content • mount a volume backup to copy files from the backup to a physical disk • saf

Seite 170 - Use Wake-On-LAN

Copyright © Acronis, Inc., 2000-2009 251 If you select several volumes, the space will be distributed proportionally to each partition. If you do n

Seite 171 - Parameters

252 Copyright © Acronis, Inc., 2000-2009 • recover an operating system that cannot start • access and back up the data that has survived in a cor

Seite 172

Copyright © Acronis, Inc., 2000-2009 253 Linux-based bootable media Start the Bootable Media Builder either from the management console, by selecti

Seite 173 - 5.6. Conditions

254 Copyright © Acronis, Inc., 2000-2009 It is recommended that you familiarize yourself with the help documentation supplied with Windows AIK. To

Seite 174 - 5.6.1. User is idle

Copyright © Acronis, Inc., 2000-2009 255 Kernel parameters This window lets you specify one or more parameters of the Linux kernel. They will be au

Seite 175 - 5.6.3. Fits time interval

256 Copyright © Acronis, Inc., 2000-2009 nodma Disables direct memory access (DMA) for all IDE hard disk drives. Prevents the kernel from freezing

Seite 176 - 5.6.4. User logged off

Copyright © Acronis, Inc., 2000-2009 257 Pre-configuring multiple network connections You can pre-configure TCP/IP settings for up to ten network i

Seite 177

258 Copyright © Acronis, Inc., 2000-2009 • to get the mass-storage drivers that you explicitly specify from the media. This is necessary when the

Seite 178 - 6. Direct management

Copyright © Acronis, Inc., 2000-2009 259 7. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots int

Seite 179 - Activities

26 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates the notions discussed above. For more definitions please refer to the Glo

Seite 180 - Way of working

260 Copyright © Acronis, Inc., 2000-2009 8. Burn the .ISO to CD or DVD using a third-party tool or copy to a flash drive. Once a machine boots int

Seite 181 - Backup plan execution states

Copyright © Acronis, Inc., 2000-2009 261 6.10.2. Connecting to a machine booted from media Once a machine boots from bootable media, the machine t

Seite 182 - Task states

262 Copyright © Acronis, Inc., 2000-2009 1. In the boot menu, press F11. 2. Add to the command prompt the following command: vga=ask, and then pr

Seite 183 - Task statuses

Copyright © Acronis, Inc., 2000-2009 263 6.10.4. List of commands and utilities available in Linux-based bootable media Linux-based bootable media

Seite 184 - • Validation task (p. 233)

264 Copyright © Acronis, Inc., 2000-2009 gawk mtx tune2fs gpm mv udev grep parted udevinfo growisofs pccardctl udevstart grub ping umount

Seite 185

Copyright © Acronis, Inc., 2000-2009 265 Under the archive contents, Acronis Backup & Recovery 10 will display a message saying that it detecte

Seite 186

266 Copyright © Acronis, Inc., 2000-2009 8. Click Recover, then specify the path to the archive and any other required parameters, and then click

Seite 187

Copyright © Acronis, Inc., 2000-2009 267 --- Volume group --- VG Name my_volgroup ... VG Access read/write VG Status resizable ... VG Size

Seite 188 - Task details

268 Copyright © Acronis, Inc., 2000-2009 ... Dynamic & GPT Volumes: DYN1 4 my_volgroup-my_logvol 12533760 Ext2 You will need the volume&apos

Seite 189 - Archive

Copyright © Acronis, Inc., 2000-2009 269 6.10.6.2. Setting up a machine to boot from PXE For bare metal, it is enough that the machine’s BIOS supp

Seite 190 - Backup plan details

Copyright © Acronis, Inc., 2000-2009 27 Backup using bootable media You can boot the machine using the bootable media, configure the backup operati

Seite 191 - 6.1.3. Log

270 Copyright © Acronis, Inc., 2000-2009 6.11. Disk management Acronis Disk Director Lite is a tool for preparing a machine disk/volume configurat

Seite 192 - • Click View Details

Copyright © Acronis, Inc., 2000-2009 271 Running Acronis Disk Director Lite from a bootable media You can run Acronis Disk Director Lite on a bare

Seite 193 - 6.1.3.3. Log entry details

272 Copyright © Acronis, Inc., 2000-2009 Displaying operation results The results of any disk or volume operation, you have just planned, are immed

Seite 194 - 6.2. Creating a backup plan

Copyright © Acronis, Inc., 2000-2009 273 After the initialization, all the disk space remains unallocated and so still impossible to be used for p

Seite 195 - Convert to VM

274 Copyright © Acronis, Inc., 2000-2009 If the destination is smaller, then the As is option of cloning will be unavailable and proportional resi

Seite 196 - To specify credentials

Copyright © Acronis, Inc., 2000-2009 275 If you need to leave an NT signature: 1. Click to clear the Copy NT signature check box, if necessary. 2.

Seite 197 - 6.2.4. Items to back up

276 Copyright © Acronis, Inc., 2000-2009 If you need to convert a GPT disk to MBR: 1. Select a GPT disk to convert to MBR. 2. Right-click on the

Seite 198

Copyright © Acronis, Inc., 2000-2009 277 In contrast to Windows Disk Manager the program ensures bootability of an offline operating system on the

Seite 199 - 6.2.6. Exclusions

278 Copyright © Acronis, Inc., 2000-2009 One of the following disk statuses always appears in the graphical view of the disk next to the disk'

Seite 200 - 6.2.7. Archive

Copyright © Acronis, Inc., 2000-2009 279 Types of dynamic volumes Simple Volume A volume created from free space on a single physical disk. It can

Seite 201

28 Copyright © Acronis, Inc., 2000-2009 The following diagram illustrates data recovery under the operating system (online). No backup can proceed

Seite 202 - 6.2.9. Backup schemes

280 Copyright © Acronis, Inc., 2000-2009 Create volume wizard The Create volume wizard lets you create any type of volume (including system and a

Seite 203 - 6.2.9.3. Simple scheme

Copyright © Acronis, Inc., 2000-2009 281 o Select three destination disks to create the volume on. After you choose the disks, the wizard will cal

Seite 204

282 Copyright © Acronis, Inc., 2000-2009 If you are creating a basic volume, which can be made into a system volume, this page will be different, g

Seite 205

Copyright © Acronis, Inc., 2000-2009 283 6.11.6.3. Set active volume If you have several primary volumes, you must specify one to be the boot volu

Seite 206 - At a glance

284 Copyright © Acronis, Inc., 2000-2009 6.11.6.5. Change volume label The volume label is an optional attribute. It is a name assigned to a volum

Seite 207 - Example

Copyright © Acronis, Inc., 2000-2009 285 The new volume structure will be graphically represented in the Disk management view. If you set a 64K clu

Seite 208 - Roll-back period

Copyright © Acronis, Inc., 2000-2009 286 7. Centralized management This section covers operations that can be performed centrally by using the com

Seite 209

Copyright © Acronis, Inc., 2000-2009 287 Vaults with low free space: X View vaults The alert is displayed if at least one centralized vault has l

Seite 210

288 Copyright © Acronis, Inc., 2000-2009 Activities The stacked column chart lets you explore the daily history of the Acronis Backup & Recover

Seite 211 - Resulting tasks

Copyright © Acronis, Inc., 2000-2009 289 • Use the Information pane's tabs to view detailed information about the selected policy and perfor

Seite 212 - 6.2.10. Archive validation

Copyright © Acronis, Inc., 2000-2009 29 If the machine fails to boot or you need to recover data to bare metal, you boot the machine using the boot

Seite 213

290 Copyright © Acronis, Inc., 2000-2009 o Select the policy and click View tasks. Check the tasks that have Failed as their last result: select a

Seite 214 - 6.3. Recovering data

Copyright © Acronis, Inc., 2000-2009 291 To Do Create a backup policy Click Create backup policy. The procedure of creating a backup policy is de

Seite 215 - When to recover

292 Copyright © Acronis, Inc., 2000-2009 The Acronis Backup & Recovery 10 Management Server will deploy the policy to the selected machines and

Seite 216 - 6.3.1. Task credentials

Copyright © Acronis, Inc., 2000-2009 293 Settings The tab displays information about the backup scheme used by the policy and backup options that w

Seite 217 - 6.3.3. Data type

294 Copyright © Acronis, Inc., 2000-2009 The main goal of grouping is protection of multiple machines with one policy. Once a machine appears in a

Seite 218 - 6.3.4. Content selection

Copyright © Acronis, Inc., 2000-2009 295 7.1.3.1. Actions on machines Registering machines on the management server Once the machine is added or i

Seite 219 - 6.3.6.1. Disks

296 Copyright © Acronis, Inc., 2000-2009 Add a machine to another static group Click Add to another group. In the Add to group (p. 299) window, sp

Seite 220 - NT signature

Copyright © Acronis, Inc., 2000-2009 297 View tasks existing on a machine Click View tasks. The Tasks (p. 318) view will display a list of the tas

Seite 221 - 6.3.6.2. Volumes

298 Copyright © Acronis, Inc., 2000-2009 To perform registration through a local or remote console-agent connection, you have to be connected with

Seite 222 - Volume properties

Copyright © Acronis, Inc., 2000-2009 299 A registered machine has to be specified by its registration address, that is, you need to provide exactly

Seite 223 - Properties

Table of Contents 1. Introducing Acronis® Backup & Recovery™ 10 ... 7 1.1. Acronis Backu

Seite 224 - Processors

30 Copyright © Acronis, Inc., 2000-2009 It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronis tech

Seite 225 - Exclusions

300 Copyright © Acronis, Inc., 2000-2009 The machine being added becomes a member of more than one group. As a result, the backup policies applied

Seite 226 - Overwriting

Copyright © Acronis, Inc., 2000-2009 301 o Online - the machine is available for the management server. This means that the management server&ap

Seite 227 - 6.3.9. Universal Restore

302 Copyright © Acronis, Inc., 2000-2009 Filtering and sorting Filtering and sorting of the backup policies is performed in the same way as for the

Seite 228

Copyright © Acronis, Inc., 2000-2009 303 Stop a plan/task Click Backup plan Stop. Stopping the running backup plan stops all its tasks. Thus, all

Seite 229

304 Copyright © Acronis, Inc., 2000-2009 Only tasks that do not belong to a backup plan, such as a recovery task, can be modified by direct editing

Seite 230

Copyright © Acronis, Inc., 2000-2009 305 View tasks related to a group Click View tasks. You will be taken to the Tasks view with pre-filtered tas

Seite 231

306 Copyright © Acronis, Inc., 2000-2009 Configuring the machines table By default, the table has five columns that are displayed, others are hidde

Seite 232 - Windows NT/2000/XP/2003

Copyright © Acronis, Inc., 2000-2009 307 Refresh a list of groups Click Refresh. The management console will update the list of groups from the ma

Seite 233 - Windows Vista/2008

308 Copyright © Acronis, Inc., 2000-2009 For example, the following set of criteria Operating system: Windows Server 2008 Operating system: Windo

Seite 234 - 6.4.1. Task credentials

Copyright © Acronis, Inc., 2000-2009 309 Example: Machine_name_1 Machine_name_2 192.168.1.14 192.168.1.15 A registered machine has to be specified

Seite 235 - 6.4.2. Archive selection

Copyright © Acronis, Inc., 2000-2009 31 specifications of the devices, the backup/recovery options you set, to name a few. Practice is the best gui

Seite 236 - 6.4.4. Location selection

310 Copyright © Acronis, Inc., 2000-2009 • Type - type of the group (static, or dynamic) • Criteria (for dynamic groups only) - grouping criteria

Seite 237 - 6.5. Mounting an image

Copyright © Acronis, Inc., 2000-2009 311 7.1.4. Virtual machines You can centrally manage virtual machines using either of the following methods

Seite 238 - 6.5.1. Archive selection

312 Copyright © Acronis, Inc., 2000-2009 7.1.4.1. Virtual machines on a management server Availability of virtual machines Virtual machines are d

Seite 239 - 6.5.3. Access credentials

Copyright © Acronis, Inc., 2000-2009 313 • Host/VA Using this criterion, you can create a dynamic group of virtual machines hosted on a specified

Seite 240 - 6.6. Managing mounted images

314 Copyright © Acronis, Inc., 2000-2009 5. Licenses Click Provide license. When installing the trial product version, select Use the following t

Seite 241

Copyright © Acronis, Inc., 2000-2009 315 The group that has the same name as the vCenter Server will be removed and the policies applied to this gr

Seite 242 - General

316 Copyright © Acronis, Inc., 2000-2009 7.1.5.1. Actions on storage nodes All the operations described here, are performed by clicking the corres

Seite 243 - 6.7.1. Task credentials

Copyright © Acronis, Inc., 2000-2009 317 Refresh the list of storage nodes Click Refresh. The management console will update the list of storage n

Seite 244 - 6.7.2. Archive selection

318 Copyright © Acronis, Inc., 2000-2009 o Withdrawn - the storage node was registered on another management server. As a result, it is not possib

Seite 245 - 6.7.5. Location selection

Copyright © Acronis, Inc., 2000-2009 319 or the backup plan will run. View details of a task Click View details. In the Tasks details (p. 188) win

Seite 246 - 3. Naming the new archive

32 Copyright © Acronis, Inc., 2000-2009 Managing a plan (task) owned by another user Having Administrator privileges on the machine, a user can mod

Seite 247 - 6.8. Acronis Secure Zone

320 Copyright © Acronis, Inc., 2000-2009 tasks owned by other users. • Each storage node has a built-in service task called a compacting task. This

Seite 248 - Settings

Copyright © Acronis, Inc., 2000-2009 321 Local and centralized logging in Acronis Backup & Recovery 10 Acronis Backup & Recovery 10 has loc

Seite 249

322 Copyright © Acronis, Inc., 2000-2009 7.1.7.1. Actions on log entries All the operations described below are performed by clicking the corres

Seite 250

Copyright © Acronis, Inc., 2000-2009 323 To Do Display log entries for a given time period 1 In the From field, select the date starting from whi

Seite 251 - 6.10. Bootable media

324 Copyright © Acronis, Inc., 2000-2009 • Machine - The name of the machine where the event has occurred (if any) • Code - Blank or the program

Seite 252 - PE-based bootable media

Copyright © Acronis, Inc., 2000-2009 325 Reports about vaults' statistics and task activities are interval-based and provide historical inform

Seite 253

326 Copyright © Acronis, Inc., 2000-2009 7.1.8.2. Report about the backup policies In this view, you can generate a report about the backup polici

Seite 254 - Using Bart PE

Copyright © Acronis, Inc., 2000-2009 327 With the default filter settings, the report includes all backup plans from all machines. Report view Unde

Seite 255 - Kernel parameters

328 Copyright © Acronis, Inc., 2000-2009 Filters Under Filters, choose which archives to include in the report. Only the archives that meet all fi

Seite 256 - Network settings

Copyright © Acronis, Inc., 2000-2009 329 • Specify which table columns to show, and in which order. • Select which diagrams to include in the rep

Seite 257 - Network port

Copyright © Acronis, Inc., 2000-2009 33 2.5. GFS backup scheme This section covers implementation of the Grandfather-Father-Son (GFS) backup scheme

Seite 258

330 Copyright © Acronis, Inc., 2000-2009 Explorer, click the Information bar that appears at the top of the webpage by default, and then click Allo

Seite 259 - 2.0 is 512MB

Copyright © Acronis, Inc., 2000-2009 331 7.2.1.1. How to load Acronis Administrative Template The Administrative Template, provided by Acronis, en

Seite 260

332 Copyright © Acronis, Inc., 2000-2009 7.2.1.2. Acronis Backup & Recovery 10 Storage Node The following are the parameters of Acronis Backup

Seite 261

Copyright © Acronis, Inc., 2000-2009 333 Vault Free Space Warning Percentage Description: Specifies the amount of free space in a managed vault, a

Seite 262 - To add an NDAS device

334 Copyright © Acronis, Inc., 2000-2009 Default value: 10 If the amount of free space on the disk containing a managed vault's database is le

Seite 263 - Linux commands and utilities

Copyright © Acronis, Inc., 2000-2009 335 For details on how the centralized event log is cleaned up, see Log cleanup rules (p. 83). Windows Event L

Seite 264

336 Copyright © Acronis, Inc., 2000-2009 Possible values: Any string 0 to 32765 characters long Default value: public Synchronization Specifies how

Seite 265

Copyright © Acronis, Inc., 2000-2009 337 Acronis Backup & Recovery 10 Management Server tries to perform synchronization for each normal-priori

Seite 266

338 Copyright © Acronis, Inc., 2000-2009 We recommend setting Second Connection Atempt to True only in networks which often experience problems

Seite 267 - Mounting backup volumes

Copyright © Acronis, Inc., 2000-2009 339 Default value: 0 If this setting is 0, the management server uses the Snapshot Storage Relative Size setti

Seite 268 - 6.10.6. Acronis PXE Server

34 Copyright © Acronis, Inc., 2000-2009 Weekly/Monthly This step forms the daily, weekly and monthly cycles in the schedule. Select a day of the we

Seite 269

340 Copyright © Acronis, Inc., 2000-2009 Default value: 30 If Acronis License Server is unavailable, Acronis Backup & Recovery 10 will continue

Seite 270 - 6.11. Disk management

Copyright © Acronis, Inc., 2000-2009 341 Default value: False Trace Level Description: Specifies the minimum level of severity of events to be reco

Seite 271 - Starting the operations

342 Copyright © Acronis, Inc., 2000-2009 You may want to increase the initial size of the snapshot storage—or to place it on a different volume—wh

Seite 272 - 6.11.5. Disk operations

Copyright © Acronis, Inc., 2000-2009 343 Specifies the port that the component will use for incoming and outgoing communication with other Acronis

Seite 273

344 Copyright © Acronis, Inc., 2000-2009 Always use The use of SSL certificates is enabled. The connection will be established only if the use of S

Seite 274 - Using advanced options

Copyright © Acronis, Inc., 2000-2009 345 Each event has a level from zero to five based on the event's severity, as shown in the following tab

Seite 275

346 Copyright © Acronis, Inc., 2000-2009 You will find the description of these parameters in the correspondent topic about configuration through t

Seite 276 - System disk conversion

Copyright © Acronis, Inc., 2000-2009 347 General Policy name [Optional] Enter a unique name for the backup policy. A conscious name lets you identi

Seite 277

348 Copyright © Acronis, Inc., 2000-2009 Use well-known optimized backup schemes, such as Grandfather-Father-Son and Tower of Hanoi, create a custo

Seite 278 - 6.11.6. Volume operations

Copyright © Acronis, Inc., 2000-2009 349 Storage (p. 213) Choose the storage on the virtualization server or the folder to place the virtual machin

Seite 279 - Types of dynamic volumes

Copyright © Acronis, Inc., 2000-2009 35 Keep backups: Monthly This step defines the retention rule for monthly backups. The cleanup task will run a

Seite 280 - Select destination disks

350 Copyright © Acronis, Inc., 2000-2009 7.3.2.1. Volumes to back up selection rules Define volume selection rules, according to which the volumes

Seite 281 - Set the volume options

Copyright © Acronis, Inc., 2000-2009 351 First partition on the first SCSI hard disk of a Linux machine Type or select: /dev/sda1 sda1 is the stan

Seite 282 - 6.11.6.2. Delete volume

352 Copyright © Acronis, Inc., 2000-2009 /dev/hda2, and /dev/hda3, respectively. To perform a disk backup of the, say, third partition, one can typ

Seite 283 - 6.11.6.3. Set active volume

Copyright © Acronis, Inc., 2000-2009 353 Point to the folders and files to be backed up. If you specified a path to a file or folder explicitly, th

Seite 284 - 6.11.6.6. Format volume

354 Copyright © Acronis, Inc., 2000-2009 The root user's home directory /root Directory for all user-related programs /usr Directory for syste

Seite 285 - 6.11.7. Pending operations

Copyright © Acronis, Inc., 2000-2009 355 You can use one or more wildcard characters * and ? in a file mask: The asterisk (*) substitutes for zero

Seite 286 - 7. Centralized management

356 Copyright © Acronis, Inc., 2000-2009 The program generates a common name for the new archives and displays it in the Name field. The name looks

Seite 287

Copyright © Acronis, Inc., 2000-2009 357 7.3.7. Backup scheme selection Choose one of the available backup schemes: • Back up now – to create a b

Seite 288 - 7.1.2. Backup policies

358 Copyright © Acronis, Inc., 2000-2009 7.3.7.3. Simple scheme With the simple backup scheme you just schedule when and how often to back up da

Seite 289

Copyright © Acronis, Inc., 2000-2009 359 • Daily ("Son") backups are incremental. Parameters You can set up the following parameters of

Seite 290

36 Copyright © Acronis, Inc., 2000-2009 Starting from the third week, weekly backups will be regularly deleted. After 6 months, monthly backups wil

Seite 291 - Machines selection

360 Copyright © Acronis, Inc., 2000-2009 Backup scheme parameters can then be set up as follows. • Start backup at: 11:00 PM • Back up on: All da

Seite 292 - 7.1.2.4. Policy details

Copyright © Acronis, Inc., 2000-2009 361 • Track changes to the financial statements, spreadsheets, etc. performed on Tuesdays and Thursdays (dail

Seite 293 - 7.1.3. Physical machines

362 Copyright © Acronis, Inc., 2000-2009 • One backup of each level is stored at a time • Higher density of more recent backups Parameters You ca

Seite 294

Copyright © Acronis, Inc., 2000-2009 363 Roll-back period The number of days we can go back in the archive is different on different days. The mini

Seite 295 - Grouping actions

364 Copyright © Acronis, Inc., 2000-2009 7.3.7.6. Custom backup scheme At a glance • Custom schedule and conditions for backups of each type • C

Seite 296 - Other actions

Copyright © Acronis, Inc., 2000-2009 365 might end up with no backups if the program is not able to create the new backup for some reason. Apply th

Seite 297 - • installing the agent

366 Copyright © Acronis, Inc., 2000-2009 Monthly full, weekly differential, and daily incremental backups plus cleanup This example demonstrates th

Seite 298 - Text file requirements

Copyright © Acronis, Inc., 2000-2009 367 • Full backup, runs every Friday at 10:00 PM • Incremental backup, runs manually • Differential backup,

Seite 299

Copyright © Acronis, Inc., 2000-2009 368 Glossary A Acronis Active Restore The Acronis proprietary technology that brings a system online immediate

Seite 300 - Machine details

Copyright © Acronis, Inc., 2000-2009 369 Agent (Acronis Backup & Recovery 10 Agent) An application that performs data backup and recovery and

Seite 301

Copyright © Acronis, Inc., 2000-2009 37 2.6. Tower of Hanoi backup scheme The need to have frequent backups always conflicts with the cost of keepi

Seite 302 - Plans and tasks

370 Copyright © Acronis, Inc., 2000-2009 Backup options Configuration parameters of a backup operation (p. 369), such as pre/post backup commands

Seite 303

Copyright © Acronis, Inc., 2000-2009 371 3. The management server deploys the policy to the machines. 4. On each machine, the agent (p. 369) inst

Seite 304 - Member of

372 Copyright © Acronis, Inc., 2000-2009 A management server has two built-in groups that contain all machines of each type: All physical machines

Seite 305 - Inheritance order

Copyright © Acronis, Inc., 2000-2009 373 On a machine that is not registered on the management server, a user having the privilege to back up to th

Seite 306 - 7.1.3.2. Actions on groups

374 Copyright © Acronis, Inc., 2000-2009 Differential backup A differential backup stores changes to the data against the latest full backup (p.

Seite 307 - Adding multiple criteria

Copyright © Acronis, Inc., 2000-2009 375 and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the

Seite 308

376 Copyright © Acronis, Inc., 2000-2009 • IP address range. A machine remains in a dynamic group as long as the machine meets the group's c

Seite 309 - Group details

Copyright © Acronis, Inc., 2000-2009 377 F Full backup A self-sufficient backup (p. 369) containing all data chosen for backup. You do not need ac

Seite 310

378 Copyright © Acronis, Inc., 2000-2009 Managed vault A centralized vault (p. 372) managed by a storage node (p. 379). Archives (p. 369) in a mana

Seite 311 - 7.1.4. Virtual machines

Copyright © Acronis, Inc., 2000-2009 379 Plan See Backup plan (p. 370). Policy See Backup policy (p. 370). R Recovery point Date and time to whic

Seite 312 - Grouping of virtual machines

38 Copyright © Acronis, Inc., 2000-2009 Tower of Hanoi by Acronis The Tower of Hanoi backup scheme is generally too complex to mentally calculate t

Seite 313 - • Host/VA

380 Copyright © Acronis, Inc., 2000-2009 • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malef

Seite 314

Copyright © Acronis, Inc., 2000-2009 381 U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technolo

Seite 315 - 7.1.5. Storage nodes

382 Copyright © Acronis, Inc., 2000-2009 Virtual machine On Acronis Backup & Recovery 10 Management Server, a machine (p. 377) is considered vi

Seite 316

Index A A policy on a machine or a group • 57 About Windows loaders • 232 Access credentials • 238, 239 Access credentials for archive location • 19

Seite 317 - Adding a storage node

384 Copyright © Acronis, Inc., 2000-2009 At Windows Event Log event • 171 Attaching a managed vault • 127, 131 B Back up later scheme • 202, 357 Ba

Seite 318 - 7.1.6. Tasks

Copyright © Acronis, Inc., 2000-2009 385 Components for centralized management • 19 Compression level • 91, 100 Conditions • 108, 173 Configuring A

Seite 319

386 Copyright © Acronis, Inc., 2000-2009 Drivers for Universal Restore • 254, 257 Dual destination • 46, 92, 108 Dynamic disk • 41, 368, 374, 375,

Seite 320 - 7.1.7. Log

Copyright © Acronis, Inc., 2000-2009 387 Introducing Acronis® Backup & Recovery™ 10 • 7 Inventory • 134, 137, 154 Items to back up • 194, 197,

Seite 321 - Centralized event log

388 Copyright © Acronis, Inc., 2000-2009 Organizational unit criterion • 85, 307, 308 Overview • 64, 113, 124, 128, 132, 315 Overwriting • 226 Owne

Seite 322

Copyright © Acronis, Inc., 2000-2009 389 Running Acronis Disk Director Lite • 270 S Scheduling • 108, 162, 203, 212, 237, 358, 367 Secure communica

Seite 323 - Configuring the log table

Copyright © Acronis, Inc., 2000-2009 39 For information about using Tower of Hanoi for tape libraries, see Using the Tower of Hanoi tape rotation s

Seite 324 - 7.1.8. Reporting

390 Copyright © Acronis, Inc., 2000-2009 Tower of Hanoi backup scheme • 37, 132, 141, 380 Tower of Hanoi scheme • 206, 361 Types of connection to a

Seite 325 - Report view

3.1.3. Time-based alerts ...

Seite 326

40 Copyright © Acronis, Inc., 2000-2009 There is a certain risk that all but one backup will be deleted if the maximum archive size is set improper

Seite 327

Copyright © Acronis, Inc., 2000-2009 41 • Retain the backup until all dependent backups become subject to deletion The outdated backup will be kep

Seite 328 - Report coverage

42 Copyright © Acronis, Inc., 2000-2009 Acronis Backup & Recovery 10 can back up and recover dynamic volumes and, with minor limitations, basic

Seite 329 - 7.1.8.9. Report view

Copyright © Acronis, Inc., 2000-2009 43 o If the data size is less than 20GB, then one disk can hold, say, 10GB; the other will hold the remaining

Seite 330

44 Copyright © Acronis, Inc., 2000-2009 2.9. Tape support Acronis Backup & Recovery 10 supports tape libraries, autoloaders, SCSI and USB tape

Seite 331

Copyright © Acronis, Inc., 2000-2009 45 Tape written on a tape device through... Backup Server ATIE 9.1 + + + + ATIE 9.5 - - - + ATIE 9.7

Seite 332

46 Copyright © Acronis, Inc., 2000-2009 Recovery from a locally attached tape device Before creating a recovery task, insert or mount the tape cont

Seite 333

Copyright © Acronis, Inc., 2000-2009 47 With the new Acronis Secure Zone behavior, you obtain the ability to: • list archives located in the zone

Seite 334

48 Copyright © Acronis, Inc., 2000-2009 2.10.3. Universal Restore (Acronis Backup & Recovery 10 Universal Restore) Acronis Backup & Recove

Seite 335

Copyright © Acronis, Inc., 2000-2009 49 Universal Restore relies on the built-in Plug and Play discovery and configuration process to handle hardwa

Seite 336

6.2.1. Why is the program asking for the password? ... 196 6.2.2

Seite 337

50 Copyright © Acronis, Inc., 2000-2009 Limitation The only supported archive location is a local drive, or more precisely, any device available th

Seite 338

Copyright © Acronis, Inc., 2000-2009 51 4. Configure the system recovery: select the system disk or volume and select the Use Acronis Active Resto

Seite 339

52 Copyright © Acronis, Inc., 2000-2009 Since you connect the console to the management server rather than to each machine and perform all manageme

Seite 340

Copyright © Acronis, Inc., 2000-2009 53 You have to protect each server as a whole, the users' data on the workstations, and the virtual mach

Seite 341

54 Copyright © Acronis, Inc., 2000-2009 5. Install Acronis Backup & Recovery 10 Storage Node [ASN] on one of the Windows servers (9). The stor

Seite 342 - Connection parameters

Copyright © Acronis, Inc., 2000-2009 55 3. Apply the policy to the S_1 group. Make sure that the policy has been successfully deployed to each of

Seite 343

56 Copyright © Acronis, Inc., 2000-2009 2.11.2.3. Protecting the virtual machines Acronis Backup & Recovery 10 Agent for ESX provides the flex

Seite 344 - Event tracing parameters

Copyright © Acronis, Inc., 2000-2009 57 Deploying a policy transfers the established correspondence to the machines. Physically, a bundle of tasks

Seite 345

58 Copyright © Acronis, Inc., 2000-2009 The same policy on a group and on a machine 1. The same policy can be applied to a group and to a machine

Seite 346 - When to modify

Copyright © Acronis, Inc., 2000-2009 59 2.11.4.3. Inheritance of policies Policy inheritance can be easily understood if we assume that a machin

Seite 347 - Where to back up

6.10.6. Acronis PXE Server ...

Seite 348

60 Copyright © Acronis, Inc., 2000-2009 Besides the All machines group, we have the custom G1 group in the root and the custom G2 group, which is

Seite 349 - 7.3.2. Items to back up

Copyright © Acronis, Inc., 2000-2009 61 #4 "green" "orange" "blue" "violet" Inherited Inherited Inherited

Seite 350

62 Copyright © Acronis, Inc., 2000-2009 You may change grouping conditions or the machine may change its properties so that the machine leaves one

Seite 351

Copyright © Acronis, Inc., 2000-2009 63 Examples Assume, the selection rule states that the policy has to back up volumes D: and F:. The policy is

Seite 352 - Windows

64 Copyright © Acronis, Inc., 2000-2009 2.11.5.4. Policy status on a group To see this parameter, select Machines in the tree, then select the gr

Seite 353

Copyright © Acronis, Inc., 2000-2009 65 Deduplication may also reduce network load: if, during a backup, a file or a disk block is found to be a du

Seite 354 - 7.3.4. Exclusions

66 Copyright © Acronis, Inc., 2000-2009 Before sending the item to the vault, the agent queries the deduplication database to determine whether the

Seite 355 - 7.3.5. Archive

Copyright © Acronis, Inc., 2000-2009 67 • When performing incremental backups of data that does not change itself, but changes its location. Such

Seite 356

68 Copyright © Acronis, Inc., 2000-2009 What ratio to expect Although, in some situations, the deduplication ratio may be very high (in the previou

Seite 357 - 7.3.7.1. Back up now scheme

Copyright © Acronis, Inc., 2000-2009 69 File-level deduplication restrictions During a file backup to an archive in a deduplicating vault, deduplic

Seite 358 - 7.3.7.3. Simple scheme

Copyright © Acronis, Inc., 2000-2009 7 1. Introducing Acronis® Backup & Recovery™ 10 1.1. Acronis Backup & Recovery 10 overview Based on A

Seite 359

70 Copyright © Acronis, Inc., 2000-2009 3. To specify credentials for connection, click Options and then type the user name and password in the Us

Seite 360

Copyright © Acronis, Inc., 2000-2009 71 A user who is a member of this group is a management server administrator. Management server administrators

Seite 361

72 Copyright © Acronis, Inc., 2000-2009 Users with these additional privileges are also called storage node administrators. Recommendations on user

Seite 362

Copyright © Acronis, Inc., 2000-2009 73 2.11.7.7. Rights for Acronis services The Acronis Backup & Recovery 10 Agent for Windows, Acronis Bac

Seite 363

74 Copyright © Acronis, Inc., 2000-2009 2.11.8. Communication between Acronis Backup & Recovery 10 components This section describes how Acron

Seite 364

Copyright © Acronis, Inc., 2000-2009 75 Acronis Backup & Recovery 10 Management Server Yes Yes Acronis Backup & Recovery 10 Storage Node

Seite 365

76 Copyright © Acronis, Inc., 2000-2009 Enabled The component will use the specified port; type the port number in the Server TCP Port box. Disable

Seite 366

Copyright © Acronis, Inc., 2000-2009 77 Always use The use of SSL certificates is enabled. The connection will be established only if the use of SS

Seite 367 - 7.3.8. Archive validation

78 Copyright © Acronis, Inc., 2000-2009 2.11.8.4. Network port configuration Acronis Backup & Recovery 10 components use the 9876/TCP network

Seite 368 - Glossary

Copyright © Acronis, Inc., 2000-2009 79 In Windows, the certificate path and the server certificate's file name are specified in the registry

Seite 369

8 Copyright © Acronis, Inc., 2000-2009 • Enterprise level of security Controlling user rights to perform operations and access backups Running ser

Seite 370 - Backup policy (Policy)

80 Copyright © Acronis, Inc., 2000-2009 Non-self-signed certificates You have the option to use trusted third-party certificates or certificates cr

Seite 371 - Built-in group

Copyright © Acronis, Inc., 2000-2009 81 3. Options This section covers Acronis Backup & Recovery 10 options that can be configured using Graph

Seite 372 - Centralized vault

82 Copyright © Acronis, Inc., 2000-2009 The option defines whether to display the pop-up messages about task run results: successful completion, fa

Seite 373 - Deduplication

Copyright © Acronis, Inc., 2000-2009 83 3.1.5. Fonts This option is effective when the console is connected to a managed machine or to the managem

Seite 374 - Disk group

84 Copyright © Acronis, Inc., 2000-2009 entries. You can select the amount of log entries to retain. The default 95% setting will keep most of the

Seite 375 - Dynamic group

Copyright © Acronis, Inc., 2000-2009 85 To set up sending SNMP messages 1. Select the Send messages to SNMP server check box. 2. Specify the appr

Seite 376 - Encrypted vault

86 Copyright © Acronis, Inc., 2000-2009 b. Click Add, and then enter the name or IP address of the machine where the Acronis WOL Proxy is installe

Seite 377

Copyright © Acronis, Inc., 2000-2009 87 On the vCenter Server side When integration is enabled, the vCenter Server will store and show information

Seite 378 - Physical machine

88 Copyright © Acronis, Inc., 2000-2009 3.3.2. Event tracing It is possible to duplicate log events generated by the agent(s), operating on the ma

Seite 379

Copyright © Acronis, Inc., 2000-2009 89 The option defines whether the agent(s) operating on the managed machine have to send the log events to the

Seite 380 - Tower of Hanoi

Copyright © Acronis, Inc., 2000-2009 9 The simplified way of centralized management • Backup Using the Back up control, select the machine which y

Seite 381 - Validation rules

90 Copyright © Acronis, Inc., 2000-2009 5. Click OK. You might be asked for lmmib2.dll that can be found on the installation disc of your operati

Seite 382 - Virtual machine

Copyright © Acronis, Inc., 2000-2009 91 • The type of the data being backed up (disk, file) • The backup destination (networked location or local

Seite 383

92 Copyright © Acronis, Inc., 2000-2009 media media Error handling (p. 107): Do not show messages and dialogs while processing (silent mode) + +

Seite 384

Copyright © Acronis, Inc., 2000-2009 93 3.4.1.1. Archive protection This option is effective for Windows and Linux operating systems and bootable

Seite 385

94 Copyright © Acronis, Inc., 2000-2009 • Exclude all system files and folders Select this check box to skip files and folders with the System att

Seite 386

Copyright © Acronis, Inc., 2000-2009 95 The program does not support interactive commands, i.e. commands that require user input (for example, &quo

Seite 387

96 Copyright © Acronis, Inc., 2000-2009 Post-backup command To specify a command/executable file to be executed after the backup is completed 1. I

Seite 388

Copyright © Acronis, Inc., 2000-2009 97 o Select the existing command or the batch file from the drop-down list 3. Click OK. Pre-data capture co

Seite 389

98 Copyright © Acronis, Inc., 2000-2009 Check box Selection Fail the task if the command execution fails Selected Cleared Selected Cleared Do no

Seite 390

Copyright © Acronis, Inc., 2000-2009 99 The option determines whether to take snapshots of multiple volumes at the same time or one by one. The pre

Kommentare zu diesen Handbüchern

Keine Kommentare